friendica/mod/wall_attach.php

173 lines
4.0 KiB
PHP
Raw Normal View History

2011-05-25 01:40:52 -04:00
<?php
/**
* @file mod/wall_attach.php
*/
use Friendica\App;
use Friendica\Core\Config;
2018-01-21 13:33:59 -05:00
use Friendica\Core\L10n;
2017-11-07 22:57:46 -05:00
use Friendica\Database\DBM;
use Friendica\Util\Mimetype;
require_once 'include/datetime.php';
2011-05-25 01:40:52 -04:00
function wall_attach_post(App $a) {
2011-05-25 01:40:52 -04:00
$r_json = (x($_GET,'response') && $_GET['response']=='json');
if($a->argc > 1) {
2011-05-25 01:40:52 -04:00
$nick = $a->argv[1];
$r = q("SELECT `user`.*, `contact`.`id` FROM `user` LEFT JOIN `contact` on `user`.`uid` = `contact`.`uid` WHERE `user`.`nickname` = '%s' AND `user`.`blocked` = 0 and `contact`.`self` = 1 LIMIT 1",
2011-05-25 01:40:52 -04:00
dbesc($nick)
);
2017-11-07 22:57:46 -05:00
if (! DBM::is_result($r)) {
if ($r_json) {
2018-01-22 09:16:25 -05:00
echo json_encode(['error'=>L10n::t('Invalid request.')]);
2016-11-14 12:49:51 -05:00
killme();
}
2011-05-25 01:40:52 -04:00
return;
2016-11-14 12:49:51 -05:00
}
2011-05-25 01:40:52 -04:00
} else {
if ($r_json) {
2018-01-22 09:16:25 -05:00
echo json_encode(['error'=>L10n::t('Invalid request.')]);
2016-11-14 12:49:51 -05:00
killme();
}
2011-05-25 01:40:52 -04:00
return;
2016-11-14 12:49:51 -05:00
}
2011-05-25 01:40:52 -04:00
$can_post = false;
$visitor = 0;
$page_owner_uid = $r[0]['uid'];
$page_owner_cid = $r[0]['id'];
2011-05-25 01:40:52 -04:00
$page_owner_nick = $r[0]['nickname'];
$community_page = (($r[0]['page-flags'] == PAGE_COMMUNITY) ? true : false);
if((local_user()) && (local_user() == $page_owner_uid))
2011-05-25 01:40:52 -04:00
$can_post = true;
else {
if($community_page && remote_user()) {
2016-11-14 12:49:51 -05:00
$contact_id = 0;
if(is_array($_SESSION['remote'])) {
foreach($_SESSION['remote'] as $v) {
if($v['uid'] == $page_owner_uid) {
2016-11-14 12:49:51 -05:00
$contact_id = $v['cid'];
break;
}
}
}
if($contact_id) {
$r = q("SELECT `uid` FROM `contact` WHERE `blocked` = 0 AND `pending` = 0 AND `id` = %d AND `uid` = %d LIMIT 1",
2016-11-14 12:49:51 -05:00
intval($contact_id),
intval($page_owner_uid)
);
2017-11-07 22:57:46 -05:00
if (DBM::is_result($r)) {
$can_post = true;
2016-11-14 12:49:51 -05:00
$visitor = $contact_id;
}
2011-05-25 01:40:52 -04:00
}
}
}
if(! $can_post) {
if ($r_json) {
2018-01-22 09:16:25 -05:00
echo json_encode(['error'=>L10n::t('Permission denied.')]);
2016-11-14 12:49:51 -05:00
killme();
}
2018-01-21 13:33:59 -05:00
notice(L10n::t('Permission denied.') . EOL );
2011-05-25 01:40:52 -04:00
killme();
}
if(! x($_FILES,'userfile')) {
if ($r_json) {
2018-01-22 09:16:25 -05:00
echo json_encode(['error'=>L10n::t('Invalid request.')]);
2016-11-14 12:49:51 -05:00
}
2011-05-25 01:40:52 -04:00
killme();
}
2011-05-25 01:40:52 -04:00
$src = $_FILES['userfile']['tmp_name'];
$filename = basename($_FILES['userfile']['name']);
$filesize = intval($_FILES['userfile']['size']);
$maxfilesize = Config::get('system','maxfilesize');
2011-05-25 01:40:52 -04:00
/* Found html code written in text field of form,
* when trying to upload a file with filesize
* greater than upload_max_filesize. Cause is unknown.
* Then Filesize gets <= 0.
*/
if($filesize <=0) {
2018-01-22 09:16:25 -05:00
$msg = L10n::t('Sorry, maybe your upload is bigger than the PHP configuration allows') . EOL .(L10n::t('Or - did you try to upload an empty file?'));
if ($r_json) {
echo json_encode(['error'=>$msg]);
} else {
notice( $msg. EOL );
}
@unlink($src);
killme();
}
if(($maxfilesize) && ($filesize > $maxfilesize)) {
$msg = L10n::t('File exceeds size limit of %s', formatBytes($maxfilesize));
if ($r_json) {
echo json_encode(['error'=>$msg]);
} else {
echo $msg. EOL ;
}
2011-05-25 01:40:52 -04:00
@unlink($src);
killme();
2011-05-25 01:40:52 -04:00
}
$filedata = @file_get_contents($src);
$mimetype = Mimetype::getContentType($filename);
$hash = get_guid(64);
2011-05-25 01:40:52 -04:00
$created = datetime_convert();
$fields = ['uid' => $page_owner_uid, 'hash' => $hash, 'filename' => $filename, 'filetype' => $mimetype,
'filesize' => $filesize, 'data' => $filedata, 'created' => $created, 'edited' => $created,
'allow_cid' => '<' . $page_owner_cid . '>', 'allow_gid' => '','deny_cid' => '', 'deny_gid' => ''];
$r = dba::insert('attach', $fields);
2011-05-25 01:40:52 -04:00
@unlink($src);
if(! $r) {
2018-01-22 09:16:25 -05:00
$msg = L10n::t('File upload failed.');
if ($r_json) {
echo json_encode(['error'=>$msg]);
} else {
echo $msg. EOL ;
}
2011-05-25 01:40:52 -04:00
killme();
}
$r = q("SELECT `id` FROM `attach` WHERE `uid` = %d AND `created` = '%s' AND `hash` = '%s' LIMIT 1",
intval($page_owner_uid),
dbesc($created),
dbesc($hash)
);
2017-11-07 22:57:46 -05:00
if (! DBM::is_result($r)) {
2018-01-22 09:16:25 -05:00
$msg = L10n::t('File upload failed.');
if ($r_json) {
echo json_encode(['error'=>$msg]);
} else {
echo $msg. EOL ;
}
2011-05-25 01:40:52 -04:00
killme();
}
if ($r_json) {
echo json_encode(['ok'=>true]);
2016-11-14 12:49:51 -05:00
killme();
}
$lf = "\n";
echo $lf . $lf . '[attachment]' . $r[0]['id'] . '[/attachment]' . $lf;
2011-05-25 01:40:52 -04:00
killme();
// NOTREACHED
}