2018-10-17 08:19:58 -04:00
|
|
|
<?php
|
|
|
|
/**
|
2020-02-09 10:18:46 -05:00
|
|
|
* @copyright Copyright (C) 2020, Friendica
|
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
2018-10-17 08:19:58 -04:00
|
|
|
*/
|
|
|
|
|
2020-09-30 05:14:01 -04:00
|
|
|
namespace Friendica\Security;
|
2018-10-17 08:19:58 -04:00
|
|
|
|
|
|
|
use Friendica\Database\DBA;
|
|
|
|
use Friendica\Model\Contact;
|
|
|
|
use Friendica\Model\Group;
|
2019-01-06 12:37:48 -05:00
|
|
|
use Friendica\Model\User;
|
2019-09-28 05:36:41 -04:00
|
|
|
use Friendica\Core\Session;
|
2018-10-17 08:19:58 -04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Secures that User is allow to do requests
|
|
|
|
*/
|
2019-12-15 17:28:01 -05:00
|
|
|
class Security
|
2018-10-17 08:19:58 -04:00
|
|
|
{
|
2018-10-17 15:30:41 -04:00
|
|
|
public static function canWriteToUserWall($owner)
|
2018-10-17 08:19:58 -04:00
|
|
|
{
|
|
|
|
static $verified = 0;
|
|
|
|
|
2019-09-28 14:09:11 -04:00
|
|
|
if (!Session::isAuthenticated()) {
|
2018-10-17 08:19:58 -04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$uid = local_user();
|
|
|
|
if ($uid == $owner) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (local_user() && ($owner == 0)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-09-28 05:36:41 -04:00
|
|
|
if (!empty(Session::getRemoteContactID($owner))) {
|
2018-10-17 08:19:58 -04:00
|
|
|
// use remembered decision and avoid a DB lookup for each and every display item
|
|
|
|
// DO NOT use this function if there are going to be multiple owners
|
|
|
|
// We have a contact-id for an authenticated remote user, this block determines if the contact
|
|
|
|
// belongs to this page owner, and has the necessary permissions to post content
|
|
|
|
|
|
|
|
if ($verified === 2) {
|
|
|
|
return true;
|
|
|
|
} elseif ($verified === 1) {
|
|
|
|
return false;
|
|
|
|
} else {
|
2019-09-28 05:36:41 -04:00
|
|
|
$cid = Session::getRemoteContactID($owner);
|
2018-10-17 08:19:58 -04:00
|
|
|
if (!$cid) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$r = q("SELECT `contact`.*, `user`.`page-flags` FROM `contact` INNER JOIN `user` on `user`.`uid` = `contact`.`uid`
|
|
|
|
WHERE `contact`.`uid` = %d AND `contact`.`id` = %d AND `contact`.`blocked` = 0 AND `contact`.`pending` = 0
|
2019-09-27 01:49:23 -04:00
|
|
|
AND `user`.`blockwall` = 0 AND `readonly` = 0 AND (`contact`.`rel` IN (%d , %d) OR `user`.`page-flags` = %d) LIMIT 1",
|
2018-10-17 08:19:58 -04:00
|
|
|
intval($owner),
|
|
|
|
intval($cid),
|
|
|
|
intval(Contact::SHARING),
|
|
|
|
intval(Contact::FRIEND),
|
2019-01-06 12:37:48 -05:00
|
|
|
intval(User::PAGE_FLAGS_COMMUNITY)
|
2018-10-17 08:19:58 -04:00
|
|
|
);
|
|
|
|
|
|
|
|
if (DBA::isResult($r)) {
|
|
|
|
$verified = 2;
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
$verified = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-03-08 09:16:59 -04:00
|
|
|
/**
|
|
|
|
* Create a permission string for an element based on the visitor
|
|
|
|
*
|
|
|
|
* @param integer $owner_id User ID of the owner of the element
|
|
|
|
* @param boolean $accessible Should the element be accessible anyway?
|
|
|
|
* @return string SQL permissions
|
|
|
|
*/
|
|
|
|
public static function getPermissionsSQLByUserId(int $owner_id, bool $accessible = false)
|
2018-10-17 08:19:58 -04:00
|
|
|
{
|
|
|
|
$local_user = local_user();
|
2019-09-28 05:36:41 -04:00
|
|
|
$remote_contact = Session::getRemoteContactID($owner_id);
|
2020-03-08 09:16:59 -04:00
|
|
|
$acc_sql = '';
|
|
|
|
|
|
|
|
if ($accessible) {
|
|
|
|
$acc_sql = ' OR `accessible`';
|
|
|
|
}
|
2018-10-17 08:19:58 -04:00
|
|
|
|
2018-10-17 15:30:41 -04:00
|
|
|
/*
|
2018-10-17 08:19:58 -04:00
|
|
|
* Construct permissions
|
|
|
|
*
|
|
|
|
* default permissions - anonymous user
|
|
|
|
*/
|
2020-03-08 09:16:59 -04:00
|
|
|
$sql = " AND (allow_cid = ''
|
2019-09-27 01:49:23 -04:00
|
|
|
AND allow_gid = ''
|
|
|
|
AND deny_cid = ''
|
2020-03-08 09:16:59 -04:00
|
|
|
AND deny_gid = ''" . $acc_sql . ") ";
|
2018-10-17 08:19:58 -04:00
|
|
|
|
2018-10-17 15:30:41 -04:00
|
|
|
/*
|
2018-10-17 08:19:58 -04:00
|
|
|
* Profile owner - everything is visible
|
|
|
|
*/
|
|
|
|
if ($local_user && $local_user == $owner_id) {
|
|
|
|
$sql = '';
|
2018-10-17 15:30:41 -04:00
|
|
|
/*
|
2019-09-28 05:36:41 -04:00
|
|
|
* Authenticated visitor. Load the groups the visitor belongs to.
|
2018-10-17 08:19:58 -04:00
|
|
|
*/
|
2019-09-28 05:36:41 -04:00
|
|
|
} elseif ($remote_contact) {
|
|
|
|
$gs = '<<>>'; // should be impossible to match
|
2018-10-17 08:19:58 -04:00
|
|
|
|
2019-09-28 05:36:41 -04:00
|
|
|
$groups = Group::getIdsByContactId($remote_contact);
|
2018-10-17 08:19:58 -04:00
|
|
|
|
2019-09-28 05:36:41 -04:00
|
|
|
if (is_array($groups)) {
|
|
|
|
foreach ($groups as $g) {
|
|
|
|
$gs .= '|<' . intval($g) . '>';
|
2018-10-17 08:19:58 -04:00
|
|
|
}
|
|
|
|
}
|
2019-09-28 05:36:41 -04:00
|
|
|
|
|
|
|
$sql = sprintf(
|
|
|
|
" AND (NOT (deny_cid REGEXP '<%d>' OR deny_gid REGEXP '%s')
|
2020-03-08 09:16:59 -04:00
|
|
|
AND (allow_cid REGEXP '<%d>' OR allow_gid REGEXP '%s'
|
|
|
|
OR (allow_cid = '' AND allow_gid = ''))" . $acc_sql . ") ",
|
2019-09-28 05:36:41 -04:00
|
|
|
intval($remote_contact),
|
|
|
|
DBA::escape($gs),
|
|
|
|
intval($remote_contact),
|
|
|
|
DBA::escape($gs)
|
|
|
|
);
|
2018-10-17 08:19:58 -04:00
|
|
|
}
|
|
|
|
return $sql;
|
|
|
|
}
|
|
|
|
}
|