2015-10-18 12:23:02 +00:00
< ? php
register_module ([
" name " => " Uploader " ,
2020-08-06 14:29:15 +00:00
" version " => " 0.7 " ,
2015-10-18 12:23:02 +00:00
" author " => " Starbeamrainbowlabs " ,
2016-06-04 11:03:01 +00:00
" description " => " Adds the ability to upload files to Pepperminty Wiki. Uploaded files act as pages and have the special 'File/' prefix. " ,
2015-10-18 12:23:02 +00:00
" id " => " feature-upload " ,
" code " => function () {
2015-12-21 14:03:21 +00:00
global $settings ;
2016-06-12 20:15:43 +00:00
/**
2017-06-17 14:36:11 +00:00
* @ api { get } ? action = upload [ & avatar = yes ] Get a page to let you upload a file .
2016-06-12 20:15:43 +00:00
* @ apiName UploadFilePage
* @ apiGroup Upload
2016-06-15 18:20:03 +00:00
* @ apiPermission User
2017-06-17 14:36:11 +00:00
*
2020-01-05 20:59:21 +00:00
* @ apiParam { bool } avatar Optional . If true then a special page to upload your avatar is displayed instead .
2020-04-18 11:37:07 +00:00
*/
2016-06-12 20:15:43 +00:00
/**
* @ api { post } ? action = upload Upload a file
* @ apiName UploadFile
* @ apiGroup Upload
* @ apiPermission User
2020-04-18 04:53:05 +00:00
*
2016-06-13 10:55:40 +00:00
* @ apiParam { string } name The name of the file to upload .
* @ apiParam { string } description A description of the file .
* @ apiParam { file } file The file to upload .
2020-01-05 20:59:21 +00:00
* @ apiParam { bool } avatar Whether this upload should be uploaded as the current user ' s avatar . If specified , any filenames provided will be ignored .
2016-06-12 20:15:43 +00:00
*
* @ apiUse UserNotLoggedInError
* @ apiError UploadsDisabledError Uploads are currently disabled in the wiki ' s settings .
* @ apiError UnknownFileTypeError The type of the file you uploaded is not currently allowed in the wiki ' s settings .
* @ apiError ImageDimensionsFiledError PeppermintyWiki couldn ' t obtain the dimensions of the image you uploaded .
* @ apiError DangerousFileError The file uploaded appears to be dangerous .
* @ apiError DuplicateFileError The filename specified is a duplicate of a file that already exists .
* @ apiError FileTamperedError Pepperminty Wiki couldn 't verify that the file wasn' t tampered with during theupload process .
*/
2020-04-18 11:37:07 +00:00
2015-12-26 12:55:19 +00:00
/*
2020-04-18 04:53:05 +00:00
* ██ ██ ██████ ██ ██████ █████ ██████
* ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██
* ██ ██ ██████ ██ ██ ██ ███████ ██ ██
* ██ ██ ██ ██ ██ ██ ██ ██ ██ ██
* ██████ ██ ███████ ██████ ██ ██ ██████
2015-12-26 12:55:19 +00:00
*/
2015-10-18 12:23:02 +00:00
add_action ( " upload " , function () {
2015-11-09 07:25:28 +00:00
global $settings , $env , $pageindex , $paths ;
2020-04-18 11:37:07 +00:00
2017-05-23 19:31:34 +00:00
$is_avatar = ! empty ( $_POST [ " avatar " ]) || ! empty ( $_GET [ " avatar " ]);
2020-04-18 11:37:07 +00:00
2015-10-18 12:23:02 +00:00
switch ( $_SERVER [ " REQUEST_METHOD " ])
{
case " GET " :
// Send upload page
2020-04-18 11:37:07 +00:00
2015-10-22 07:38:50 +00:00
if ( ! $settings -> upload_enabled )
2016-06-22 08:13:32 +00:00
exit ( page_renderer :: render ( " Upload Disabled - $setting->sitename " , " <p>You can't upload anything at the moment because $settings->sitename has uploads disabled. Try contacting $settings->admindetails_name , your site Administrator. <a href='javascript:history.back();'>Go back</a>.</p> " ));
2015-10-22 07:38:50 +00:00
if ( ! $env -> is_logged_in )
exit ( page_renderer :: render ( " Upload Error - $settings->sitename " , " <p>You are not currently logged in, so you can't upload anything.</p>
< p > Try < a href = '?action=login&returnto=" . rawurlencode("?action=upload") . "' > logging in </ a > first .</ p > " ));
2020-04-18 11:37:07 +00:00
2017-05-23 19:31:34 +00:00
if ( $is_avatar ) {
2017-06-17 14:36:11 +00:00
exit ( page_renderer :: render ( " Upload avatar - $settings->sitename " , " <h1>Upload avatar</h1>
2017-05-23 19:31:34 +00:00
< p > Select an image below , and then press upload . $settings -> sitename currently supports the following file types ( though not all of them may be suitable for an avatar ) : " . implode( " , " , $settings->upload_allowed_file_types ) . " </ p >
2017-06-17 14:36:11 +00:00
< form method = 'post' action = '?action=upload' enctype = 'multipart/form-data' >
2017-05-23 19:31:34 +00:00
< label for = 'file' > Select a file to upload .</ label >
< input type = 'file' name = 'file' id = 'file-upload-selector' tabindex = '1' />
< br />
2020-04-18 11:37:07 +00:00
2017-05-23 19:31:34 +00:00
< p class = 'editing_message' > $settings -> editing_message </ p >
< input type = 'hidden' name = 'avatar' value = 'yes' />
< input type = 'submit' value = 'Upload' tabindex = '20' />
</ form > " ));
}
2020-04-18 11:37:07 +00:00
2016-10-11 18:22:29 +00:00
exit ( page_renderer :: render ( " Upload - $settings->sitename " , " <h1>Upload file</h1>
2017-05-23 19:31:34 +00:00
< p > Select an image or file below , and then type a name for it in the box . This server currently supports uploads up to " . human_filesize(get_max_upload_size()) . " in size .</ p >
2015-10-19 07:03:38 +00:00
< p > $settings -> sitename currently supports uploading of the following file types : " . implode( " , " , $settings->upload_allowed_file_types ) . " .</ p >
< form method = 'post' action = '?action=upload' enctype = 'multipart/form-data' >
2017-08-27 15:48:36 +00:00
< label for = 'file-upload-selector' > Select a file to upload .</ label >
2016-11-20 09:41:23 +00:00
< input type = 'file' name = 'file' id = 'file-upload-selector' tabindex = '1' />
2015-10-18 20:01:18 +00:00
< br />
2017-08-27 15:48:36 +00:00
< label for = 'file-upload-name' > Name :</ label >
2016-11-20 09:41:23 +00:00
< input type = 'text' name = 'name' id = 'file-upload-name' tabindex = '5' />
2015-10-22 07:38:50 +00:00
< br />
< label for = 'description' > Description :</ label >
2016-11-20 09:41:23 +00:00
< textarea name = 'description' tabindex = '10' ></ textarea >
2016-04-07 17:29:38 +00:00
< p class = 'editing_message' > $settings -> editing_message </ p >
2016-11-20 09:41:23 +00:00
< input type = 'submit' value = 'Upload' tabindex = '20' />
2016-08-22 16:24:22 +00:00
</ form >
< script >
2017-08-27 15:48:36 +00:00
document . getElementById ( 'file-upload-selector' ) . addEventListener ( 'change' , function ( event ) {
2016-08-22 16:24:22 +00:00
var newName = event . target . value . substring ( event . target . value . lastIndexOf ( \ " \\ \\ \" ) + 1, event.target.value.lastIndexOf( \" . \" ));
console . log ( 'Changing content of name box to:' , newName );
document . getElementById ( 'file-upload-name' ) . value = newName ;
});
</ script > " ));
2020-04-18 11:37:07 +00:00
2015-10-18 12:23:02 +00:00
break ;
2020-04-18 11:37:07 +00:00
2015-10-18 12:23:02 +00:00
case " POST " :
2020-04-18 04:53:05 +00:00
// Receive file
2020-04-18 11:37:07 +00:00
2017-12-31 23:17:25 +00:00
if ( ! $settings -> editing ) {
exit ( page_renderer :: render_main ( " Upload failed - $settings->sitename " , " <p>Your upload couldn't be processed because editing is currently disabled on $settings->sitename . Please contact $settings->admindetails_name , $settings->sitename 's administrator for more information - their contact details can be found at the bottom of this page. <a href='index.php'>Go back to the main page</a>. " ));
}
2020-04-18 11:37:07 +00:00
2015-10-22 07:38:50 +00:00
// Make sure uploads are enabled
if ( ! $settings -> upload_enabled )
2015-10-19 07:03:38 +00:00
{
2019-06-01 18:57:03 +00:00
if ( ! empty ( $_FILES [ " file " ]) && file_exists ( $_FILES [ " file " ][ " tmp_name " ]))
2017-05-23 19:31:34 +00:00
unlink ( $_FILES [ " file " ][ " tmp_name " ]);
2015-10-19 07:03:38 +00:00
http_response_code ( 412 );
exit ( page_renderer :: render ( " Upload failed - $settings->sitename " , " <p>Your upload couldn't be processed because uploads are currently disabled on $settings->sitename . <a href='index.php'>Go back to the main page</a>.</p> " ));
}
2020-04-18 11:37:07 +00:00
2015-10-22 07:38:50 +00:00
// Make sure that the user is logged in
2015-10-19 07:03:38 +00:00
if ( ! $env -> is_logged_in )
{
2020-04-21 19:08:17 +00:00
if ( ! empty ( $_FILES [ " file " ]) && file_exists ( $_FILES [ " file " ]))
2017-05-23 19:31:34 +00:00
unlink ( $_FILES [ " file " ][ " tmp_name " ]);
2015-10-19 07:03:38 +00:00
http_response_code ( 401 );
exit ( page_renderer :: render ( " Upload failed - $settings->sitename " , " <p>Your upload couldn't be processed because you are not logged in.</p><p>Try <a href='?action=login&returnto= " . rawurlencode ( " ?action=upload " ) . " '>logging in</a> first. " ));
}
2020-04-18 11:37:07 +00:00
2017-07-29 09:31:23 +00:00
// Check for php upload errors
if ( $_FILES [ " file " ][ " error " ] > 0 )
{
2020-04-21 19:08:17 +00:00
if ( ! empty ( $_FILES [ " file " ]) && file_exists ( $_FILES [ " file " ]))
2017-07-29 09:31:23 +00:00
unlink ( $_FILES [ " file " ][ " tmp_name " ]);
if ( $_FILES [ " file " ][ " error " ] == 1 || $_FILES [ " file " ][ " error " ] == 2 )
http_response_code ( 413 ); // file is too large
else
http_response_code ( 500 ); // something else went wrong
exit ( page_renderer :: render ( " Upload failed - $settings->sitename " , " <p>Your upload couldn't be processed because " . (( $_FILES [ " file " ][ " error " ] == 1 || $_FILES [ " file " ][ " error " ] == 2 ) ? " the file is too large " : " an error occurred " ) . " .</p><p>Please contact $settings->admindetails_name , $settings->sitename 's administrator for help.</p> " ));
}
2020-04-18 11:37:07 +00:00
2016-04-02 14:07:18 +00:00
// Calculate the target name, removing any characters we
2015-10-19 07:03:38 +00:00
// are unsure about.
2020-04-21 20:18:50 +00:00
// Also trim off whitespace (from both ends), and full stops (from the end)
$target_name = rtrim ( trim ( makepathsafe ( $_POST [ " name " ] ? ? " Users/ $env->user /Avatar " )), " . " );
2015-10-22 07:38:50 +00:00
$temp_filename = $_FILES [ " file " ][ " tmp_name " ];
2020-04-18 11:37:07 +00:00
2015-10-22 07:43:29 +00:00
$mimechecker = finfo_open ( FILEINFO_MIME_TYPE );
2015-10-22 07:38:50 +00:00
$mime_type = finfo_file ( $mimechecker , $temp_filename );
2015-10-22 07:44:55 +00:00
finfo_close ( $mimechecker );
2020-04-18 11:37:07 +00:00
2016-04-02 14:07:18 +00:00
if ( ! in_array ( $mime_type , $settings -> upload_allowed_file_types ))
{
http_response_code ( 415 );
exit ( page_renderer :: render ( " Unknown file type - Upload error - $settings->sitename " , " <p> $settings->sitename recieved the file you tried to upload successfully, but detected that the type of file you uploaded is not in the allowed file types list. The file has been discarded.</p>
< p > The file you tried to upload appeared to be of type < code > $mime_type </ code > , but $settings -> sitename currently only allows the uploading of the following file types : < code > " . implode( " </ code > , < code > " , $settings->upload_allowed_file_types ) . " </ code >.</ p >
< p >< a href = '?action=$settings->defaultaction' > Go back </ a > to the Main Page .</ p > " ));
}
2020-04-18 11:37:07 +00:00
2015-10-22 07:38:50 +00:00
// Perform appropriate checks based on the *real* filetype
2017-05-23 19:31:34 +00:00
if ( $is_avatar && substr ( $mime_type , 0 , strpos ( $mime_type , " / " )) !== " image " ) {
http_response_code ( 415 );
exit ( page_renderer :: render_main ( " Error uploading avatar - $settings->sitename " , " <p>That file appears to be unsuitable as an avatar, as $settings->sitename has detected it to be of type <code> $mime_type </code>, which doesn't appear to be an image. Please try <a href='?action=upload&avatar=yes'>uploading a different file</a> to use as your avatar.</p> " ));
}
2020-04-18 11:37:07 +00:00
2015-10-22 07:38:50 +00:00
switch ( substr ( $mime_type , 0 , strpos ( $mime_type , " / " )))
{
case " image " :
$extra_data = [];
2016-06-04 12:33:02 +00:00
// Check SVG uploads with a special function
$imagesize = $mime_type !== " image/svg+xml " ? getimagesize ( $temp_filename , $extra_data ) : upload_check_svg ( $temp_filename );
2020-04-18 11:37:07 +00:00
2015-10-22 07:38:50 +00:00
// Make sure that the image size is defined
2015-10-22 07:47:21 +00:00
if ( ! is_int ( $imagesize [ 0 ]) or ! is_int ( $imagesize [ 1 ]))
2015-10-24 13:28:56 +00:00
{
http_response_code ( 415 );
2016-04-02 14:07:18 +00:00
exit ( page_renderer :: render ( " Upload Error - $settings->sitename " , " <p>Although the file that you uploaded appears to be an image, $settings->sitename has been unable to determine it's dimensions. The uploaded file has been discarded. <a href='?action=upload'>Go back to try again</a>.</p>
< p > You may wish to consider < a href = 'https://github.com/sbrl/Pepperminty-Wiki' > opening an issue </ a > against Pepperminty Wiki ( the software that powers $settings -> sitename ) if this isn ' t the first time that you have seen this message .</ p > " ));
2015-10-24 13:28:56 +00:00
}
2015-10-22 07:38:50 +00:00
break ;
}
2020-04-18 11:37:07 +00:00
2015-10-22 07:38:50 +00:00
$file_extension = system_mime_type_extension ( $mime_type );
2020-04-18 11:37:07 +00:00
2016-04-02 14:07:18 +00:00
// Override the detected file extension if a file extension
// is explicitly specified in the settings
2016-08-22 13:56:34 +00:00
if ( isset ( $settings -> mime_mappings_overrides -> $mime_type ))
$file_extension = $settings -> mime_mappings_overrides -> $mime_type ;
2020-04-18 11:37:07 +00:00
2020-04-21 20:18:50 +00:00
if ( in_array ( $file_extension , [ " phtml " , " php5 " , " php " , " .htaccess " , " asp " , " aspx " ]))
2016-04-02 14:07:18 +00:00
{
http_response_code ( 415 );
exit ( page_renderer :: render ( " Upload Error - $settings->sitename " , " <p>The file you uploaded appears to be dangerous and has been discarded. Please contact $settings->sitename 's administrator for assistance.</p>
< p > Additional information : The file uploaded appeared to be of type < code > $mime_type </ code > , which mapped onto the extension < code > $file_extension </ code >. This file extension has the potential to be executed accidentally by the web server .</ p > " ));
}
2020-04-18 11:37:07 +00:00
2020-04-21 20:18:50 +00:00
// Remove dots from both ends, just in case
$file_extension = trim ( $file_extension , " . " );
2017-05-23 19:31:34 +00:00
// Rewrite the name to include the _actual_ file extension we've cleverly calculated :D
2020-04-18 11:37:07 +00:00
2017-06-17 14:36:11 +00:00
// The path to the place (relative to the wiki data root)
// that we're actually going to store the uploaded file itself
2020-04-21 20:18:50 +00:00
$new_filename = " $paths->upload_file_prefix $target_name . $file_extension " ;
2017-06-17 14:36:11 +00:00
// The path (relative, as before) to the description file
2015-10-22 07:59:03 +00:00
$new_description_filename = " $new_filename .md " ;
2020-04-18 11:37:07 +00:00
2017-06-17 14:36:11 +00:00
// The page path that the new file will be stored under
$new_pagepath = $new_filename ;
2020-04-18 11:37:07 +00:00
2017-06-17 14:36:11 +00:00
// Rewrite the paths to store avatars in the right place
if ( $is_avatar ) {
$new_pagepath = $target_name ;
$new_filename = " $target_name . $file_extension " ;
}
2020-04-18 11:37:07 +00:00
2017-06-17 14:36:11 +00:00
if ( isset ( $pageindex -> $new_pagepath ) && ! $is_avatar )
2015-10-22 07:38:50 +00:00
exit ( page_renderer :: render ( " Upload Error - $settings->sitename " , " <p>A page or file has already been uploaded with the name ' $new_filename '. Try deleting it first. If you do not have permission to delete things, try contacting one of the moderators.</p> " ));
2020-04-18 11:37:07 +00:00
2017-06-17 14:36:11 +00:00
// Delete the previously uploaded avatar, if it exists
// In the future we _may_ not need this once we have
// file history online.
if ( $is_avatar && isset ( $pageindex -> $new_pagepath ) && $pageindex -> $new_pagepath -> uploadedfile )
unlink ( $pageindex -> $new_pagepath -> uploadedfilepath );
2020-04-18 04:53:05 +00:00
2020-04-21 19:08:17 +00:00
// Make sure that the place we're uploading to exists
2017-06-17 14:36:11 +00:00
if ( ! file_exists ( dirname ( $env -> storage_prefix . $new_filename )))
mkdir ( dirname ( $env -> storage_prefix . $new_filename ), 0775 , true );
2020-04-18 11:37:07 +00:00
2015-11-08 21:15:08 +00:00
if ( ! move_uploaded_file ( $temp_filename , $env -> storage_prefix . $new_filename ))
2015-10-24 13:28:56 +00:00
{
http_response_code ( 409 );
2017-06-17 14:36:11 +00:00
exit ( page_renderer :: render ( " Upload Error - $settings->sitename " , " <p>The file you uploaded was valid, but $settings->sitename couldn't verify that it was tampered with during the upload process. This probably means that either is a configuration error, or that $settings->sitename has been attacked. Please contact " . $settings -> admindetails_name . " , your $settings->sitename Administrator.</p> " ));
2015-10-24 13:28:56 +00:00
}
2020-04-18 11:37:07 +00:00
2017-06-18 13:13:38 +00:00
$description = $_POST [ " description " ] ? ? " _(No description provided)_ \n " ;
2020-04-18 11:37:07 +00:00
2015-11-08 21:15:08 +00:00
// Escape the raw html in the provided description if the setting is enabled
2015-10-22 07:38:50 +00:00
if ( $settings -> clean_raw_html )
$description = htmlentities ( $description , ENT_QUOTES );
2020-04-18 11:37:07 +00:00
2015-11-08 21:15:08 +00:00
file_put_contents ( $env -> storage_prefix . $new_description_filename , $description );
2020-04-18 11:37:07 +00:00
2015-10-22 07:38:50 +00:00
// Construct a new entry for the pageindex
$entry = new stdClass ();
2015-10-22 07:41:01 +00:00
// Point to the description's filepath since this property
// should point to a markdown file
2020-04-18 04:53:05 +00:00
$entry -> filename = $new_description_filename ;
2017-06-17 14:36:11 +00:00
$entry -> size = strlen ( $description ? ? " (No description provided) " );
2015-10-22 07:38:50 +00:00
$entry -> lastmodified = time ();
$entry -> lasteditor = $env -> user ;
$entry -> uploadedfile = true ;
$entry -> uploadedfilepath = $new_filename ;
2015-10-22 08:56:42 +00:00
$entry -> uploadedfilemime = $mime_type ;
2015-10-22 07:38:50 +00:00
// Add the new entry to the pageindex
2015-10-22 07:41:01 +00:00
// Assign the new entry to the image's filepath as that
// should be the page name.
2017-06-17 14:36:11 +00:00
$pageindex -> $new_pagepath = $entry ;
2020-04-18 11:37:07 +00:00
2016-06-04 18:04:50 +00:00
// Generate a revision to keep the page history up to date
2016-06-04 12:52:45 +00:00
if ( module_exists ( " feature-history " ))
{
$oldsource = " " ; // Only variables can be passed by reference, not literals
history_add_revision ( $entry , $description , $oldsource , false );
}
2020-04-18 11:37:07 +00:00
2015-10-22 07:38:50 +00:00
// Save the pageindex
2019-06-01 14:55:48 +00:00
save_pageindex ();
2020-04-18 11:37:07 +00:00
2016-04-03 15:10:37 +00:00
if ( module_exists ( " feature-recent-changes " ))
{
add_recent_change ([
" type " => " upload " ,
" timestamp " => time (),
2017-06-18 13:16:03 +00:00
" page " => $new_pagepath ,
2016-04-03 15:10:37 +00:00
" user " => $env -> user ,
2016-08-22 13:56:34 +00:00
" filesize " => filesize ( $env -> storage_prefix . $entry -> uploadedfilepath )
2016-04-03 15:10:37 +00:00
]);
}
2020-04-18 11:37:07 +00:00
2017-06-17 14:36:11 +00:00
header ( " location: ?action=view&page= $new_pagepath &upload=success " );
2020-04-18 11:37:07 +00:00
2015-10-18 12:23:02 +00:00
break ;
}
});
2020-04-18 11:37:07 +00:00
2016-06-13 10:55:40 +00:00
/**
2016-06-15 18:20:03 +00:00
* @ api { get } ? action = preview & page = { pageName }[ & size = { someSize }] Get a preview of a file
2016-06-13 10:55:40 +00:00
* @ apiName PreviewFile
* @ apiGroup Upload
* @ apiPermission Anonymous
2020-04-18 04:53:05 +00:00
*
2016-06-13 10:55:40 +00:00
* @ apiParam { string } page The name of the file to preview .
* @ apiParam { number } size Optional . The size fo the resulting preview . Will be clamped to fit within the bounds specified in the wiki 's settings. May also be set to the keyword ' original ', which will cause the original file to be returned with it' s appropriate mime type instead .
*
* @ apiError PreviewNoFileError No file was found associated with the specified page .
* @ apiError PreviewUnknownFileTypeError Pepperminty Wiki was unable to generate a preview for the requested file ' s type .
*/
2020-04-18 11:37:07 +00:00
2015-12-26 12:55:19 +00:00
/*
2020-04-18 04:53:05 +00:00
* ██████ ██████ ███████ ██ ██ ██ ███████ ██ ██
* ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██
* ██████ ██████ █████ ██ ██ ██ █████ ██ █ ██
* ██ ██ ██ ██ ██ ██ ██ ██ ██ ███ ██
* ██ ██ ██ ███████ ████ ██ ███████ ███ ███
2015-12-26 12:55:19 +00:00
*/
2015-10-18 12:23:02 +00:00
add_action ( " preview " , function () {
2016-04-06 17:30:11 +00:00
global $settings , $env , $pageindex , $start_time ;
2020-04-18 11:37:07 +00:00
2016-04-08 08:01:12 +00:00
if ( empty ( $pageindex -> { $env -> page } -> uploadedfilepath ))
{
$im = errorimage ( " The page ' $env->page ' doesn't have an associated file. " );
header ( " content-type: image/png " );
imagepng ( $im );
exit ();
}
2020-04-18 11:37:07 +00:00
2017-07-29 09:31:23 +00:00
$filepath = realpath ( $env -> storage_prefix . $pageindex -> { $env -> page } -> uploadedfilepath );
2015-10-22 08:56:42 +00:00
$mime_type = $pageindex -> { $env -> page } -> uploadedfilemime ;
2016-09-11 17:12:31 +00:00
$shortFilename = substr ( $filepath , 1 + ( strrpos ( $filepath , '/' ) !== false ? strrpos ( $filepath , '/' ) : - 1 ));
2020-04-18 11:37:07 +00:00
2016-09-11 17:12:31 +00:00
header ( " content-disposition: inline; filename= \" $shortFilename\ " " );
2017-06-18 13:52:04 +00:00
header ( " last-modified: " . gmdate ( 'D, d M Y H:i:s T' , $pageindex -> { $env -> page } -> lastmodified ));
2020-04-18 11:37:07 +00:00
2018-02-05 15:10:35 +00:00
// If the size is set to original, then send (or redirect to) the original image
2016-06-04 12:33:02 +00:00
// Also do the same for SVGs if svg rendering is disabled.
if ( isset ( $_GET [ " size " ]) and $_GET [ " size " ] == " original " or
( empty ( $settings -> render_svg_previews ) && $mime_type == " image/svg+xml " ))
2015-11-08 21:15:08 +00:00
{
// Get the file size
$filesize = filesize ( $filepath );
2020-04-18 11:37:07 +00:00
2015-11-08 21:15:08 +00:00
// Send some headers
header ( " content-length: $filesize " );
header ( " content-type: $mime_type " );
2020-04-18 11:37:07 +00:00
2015-11-08 21:15:08 +00:00
// Open the file and send it to the user
$handle = fopen ( $filepath , " rb " );
fpassthru ( $handle );
fclose ( $handle );
exit ();
}
2020-04-18 11:37:07 +00:00
2015-10-24 09:04:24 +00:00
// Determine the target size of the image
$target_size = 512 ;
if ( isset ( $_GET [ " size " ]))
$target_size = intval ( $_GET [ " size " ]);
if ( $target_size < $settings -> min_preview_size )
$target_size = $settings -> min_preview_size ;
if ( $target_size > $settings -> max_preview_size )
$target_size = $settings -> max_preview_size ;
2020-04-18 11:37:07 +00:00
2015-10-24 09:04:24 +00:00
// Determine the output file type
$output_mime = $settings -> preview_file_type ;
if ( isset ( $_GET [ " type " ]) and in_array ( $_GET [ " type " ], [ " image/png " , " image/jpeg " , " image/webp " ]))
$output_mime = $_GET [ " type " ];
2020-04-18 11:37:07 +00:00
2016-04-07 09:18:58 +00:00
/// ETag handling ///
// Generate the etag and send it to the client
$preview_etag = sha1 ( " $output_mime | $target_size | $filepath | $mime_type " );
$allheaders = getallheaders ();
$allheaders = array_change_key_case ( $allheaders , CASE_LOWER );
if ( ! isset ( $allheaders [ " if-none-match " ]))
header ( " etag: $preview_etag " );
2020-04-18 11:37:07 +00:00
else {
2016-04-07 09:18:58 +00:00
if ( $allheaders [ " if-none-match " ] === $preview_etag )
{
http_response_code ( 304 );
header ( " x-generation-time: " . ( microtime ( true ) - $start_time ));
exit ();
}
}
/// ETag handling end ///
2020-04-18 11:37:07 +00:00
2016-04-10 10:29:44 +00:00
/* Disabled until we work out what to do about caching previews *
$previewFilename = " $filepath .preview. $outputFormat " ;
if ( $target_size === $settings -> default_preview_size )
{
// The request is for the default preview size
// Check to see if we have a preview pre-rendered
2020-04-18 11:37:07 +00:00
2016-04-10 10:29:44 +00:00
}
*/
2020-04-18 11:37:07 +00:00
2016-04-07 16:37:11 +00:00
$preview = new Imagick ();
2015-10-22 08:56:42 +00:00
switch ( substr ( $mime_type , 0 , strpos ( $mime_type , " / " )))
{
case " image " :
2016-04-07 16:37:11 +00:00
$preview -> readImage ( $filepath );
2015-10-22 08:56:42 +00:00
break ;
2020-04-18 11:37:07 +00:00
2016-04-06 15:35:03 +00:00
case " application " :
2020-08-06 14:28:24 +00:00
if ( $mime_type == " application/pdf " ) {
2016-04-07 16:37:11 +00:00
$preview = new imagick ();
$preview -> readImage ( " { $filepath } [0] " );
$preview -> setResolution ( 300 , 300 );
$preview -> setImageColorspace ( 255 );
2016-04-06 15:35:03 +00:00
break ;
}
2020-04-18 11:37:07 +00:00
2016-04-07 16:37:11 +00:00
case " video " :
case " audio " :
2016-04-10 10:29:44 +00:00
if ( $settings -> data_storage_dir == " . " )
{
// The data storage directory is the current directory
// Redirect to the file isntead
http_response_code ( 307 );
header ( " location: " . $pageindex -> { $env -> page } -> uploadedfilepath );
exit ();
}
2016-04-07 17:29:38 +00:00
// TODO: Add support for ranges here.
2016-04-07 17:26:59 +00:00
// Get the file size
$filesize = filesize ( $filepath );
2020-04-18 11:37:07 +00:00
2016-04-07 17:26:59 +00:00
// Send some headers
header ( " content-length: $filesize " );
header ( " content-type: $mime_type " );
2020-04-18 11:37:07 +00:00
2016-04-07 17:26:59 +00:00
// Open the file and send it to the user
$handle = fopen ( $filepath , " rb " );
fpassthru ( $handle );
fclose ( $handle );
exit ();
2016-04-07 16:37:11 +00:00
break ;
2020-04-18 11:37:07 +00:00
2015-10-23 20:04:58 +00:00
default :
http_response_code ( 501 );
2016-04-09 08:26:18 +00:00
$preview = errorimage ( " Unrecognised file type ' $mime_type '. " , $target_size );
2016-04-06 15:35:03 +00:00
header ( " content-type: image/png " );
2016-04-07 16:37:11 +00:00
imagepng ( $preview );
2016-04-06 15:35:03 +00:00
exit ();
2016-04-02 18:34:01 +00:00
}
2020-04-18 11:37:07 +00:00
2016-04-06 15:20:53 +00:00
// Scale the image down to the target size
2016-04-07 16:37:11 +00:00
$preview -> resizeImage ( $target_size , $target_size , imagick :: FILTER_LANCZOS , 1 , true );
2020-04-18 11:37:07 +00:00
2016-04-02 18:34:01 +00:00
// Send the completed preview image to the user
header ( " content-type: $output_mime " );
2016-04-06 17:30:11 +00:00
header ( " x-generation-time: " . ( microtime ( true ) - $start_time ) . " s " );
2016-04-10 10:29:44 +00:00
$outputFormat = substr ( $output_mime , strpos ( $output_mime , " / " ) + 1 );
$preview -> setImageFormat ( $outputFormat );
2016-04-07 16:37:11 +00:00
echo ( $preview -> getImageBlob ());
2016-04-10 10:29:44 +00:00
/* Disabled while we work out what to do about caching previews *
// Save a preview file if there isn't one alreaddy
if ( ! file_exists ( $previewFilename ))
file_put_contents ( $previewFilename , $preview -> getImageBlob ());
*/
2015-10-18 12:23:02 +00:00
});
2020-04-18 11:37:07 +00:00
2016-04-07 16:37:11 +00:00
/*
* ██████ ██████ ███████ ██ ██ ██ ███████ ██ ██
* ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██
* ██████ ██████ █████ ██ ██ ██ █████ ██ █ ██
* ██ ██ ██ ██ ██ ██ ██ ██ ██ ███ ██
* ██ ██ ██ ███████ ████ ██ ███████ ███ ███
2020-04-18 04:53:05 +00:00
*
2016-04-07 16:37:11 +00:00
* ██████ ██ ███████ ██████ ██ █████ ██ ██ ███████ ██████
* ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██
* ██ ██ ██ ███████ ██████ ██ ███████ ████ █████ ██████
* ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██
* ██████ ██ ███████ ██ ███████ ██ ██ ██ ███████ ██ ██
*/
2015-10-18 12:23:02 +00:00
page_renderer :: register_part_preprocessor ( function ( & $parts ) {
2015-10-24 13:28:56 +00:00
global $pageindex , $env , $settings ;
2016-04-07 16:37:11 +00:00
// Don't do anything if the action isn't view
if ( $env -> action !== " view " )
return ;
2020-04-18 11:37:07 +00:00
2015-10-24 13:28:56 +00:00
if ( isset ( $pageindex -> { $env -> page } -> uploadedfile ) and $pageindex -> { $env -> page } -> uploadedfile == true )
{
// We are looking at a page that is paired with an uploaded file
$filepath = $pageindex -> { $env -> page } -> uploadedfilepath ;
$mime_type = $pageindex -> { $env -> page } -> uploadedfilemime ;
2016-06-04 12:33:02 +00:00
$dimensions = $mime_type !== " image/svg+xml " ? getimagesize ( $env -> storage_prefix . $filepath ) : getsvgsize ( $env -> storage_prefix . $filepath );
2016-04-07 16:37:11 +00:00
$fileTypeDisplay = substr ( $mime_type , 0 , strpos ( $mime_type , " / " ));
$previewUrl = " ?action=preview&size= $settings->default_preview_size &page= " . rawurlencode ( $env -> page );
2019-06-01 19:25:44 +00:00
$originalUrl = $env -> storage_prefix == " ./ " ? $filepath : " ?action=preview&size=original&page= " . rawurlencode ( $env -> page );
if ( $mime_type == " application/pdf " )
$fileTypeDisplay = " pdf " ;
2020-04-18 11:37:07 +00:00
2016-04-07 16:37:11 +00:00
$preview_html = " " ;
switch ( $fileTypeDisplay )
{
2016-04-09 06:57:40 +00:00
case " application " :
2016-04-07 16:37:11 +00:00
case " image " :
2017-12-13 20:20:34 +00:00
$preview_sizes = [ 256 , 512 , 768 , 1024 , 1440 , 1920 ];
2016-04-07 16:37:11 +00:00
$preview_html .= " \t \t \t <figure class='preview'>
2018-04-07 12:38:45 +00:00
< a href = '$originalUrl' >< img src = '$previewUrl' /></ a >
2016-06-04 12:33:02 +00:00
< nav class = 'image-controls' >
2018-04-07 12:38:45 +00:00
< ul >< li >< a href = '$originalUrl' >& #x01f304; Original $fileTypeDisplay</a></li>";
2016-06-04 12:33:02 +00:00
if ( $mime_type !== " image/svg+xml " )
{
$preview_html .= " <li>Other Sizes: " ;
foreach ( $preview_sizes as $size )
$preview_html .= " <a href='?action=preview&page= " . rawurlencode ( $env -> page ) . " &size= $size '> $size " . " px</a> " ;
$preview_html .= " </li> " ;
}
$preview_html .= " </ul></nav> \n \t \t \t </figure> " ;
2016-04-07 16:37:11 +00:00
break ;
2020-04-18 11:37:07 +00:00
2016-04-07 16:37:11 +00:00
case " video " :
2016-04-07 17:26:59 +00:00
$preview_html .= " \t \t \t <figure class='preview'>
< video src = '$previewUrl' controls preload = 'metadata' > Your browser doesn 't support HTML5 video, but you can still <a href=' $previewUrl '>download it</a> if you' d like .</ video >
</ figure > " ;
2016-04-07 16:37:11 +00:00
break ;
2020-04-18 11:37:07 +00:00
2016-04-07 17:26:59 +00:00
case " audio " :
$preview_html .= " \t \t \t <figure class='preview'>
< audio src = '$previewUrl' controls preload = 'metadata' > Your browser doesn 't support HTML5 audio, but you can still <a href=' $previewUrl '>download it</a> if you' d like .</ audio >
</ figure > " ;
2019-06-01 19:25:44 +00:00
break ;
2020-04-18 11:37:07 +00:00
2019-06-01 19:25:44 +00:00
case " pdf " :
$preview_html .= " \t \t \t <object type='application/pdf' data=' $originalUrl '></object> " ;
break ;
2020-04-18 11:37:07 +00:00
2019-06-01 20:37:35 +00:00
default :
$preview_html .= " \t \t \t <p><em>No preview is available, but you can download it instead:</em></p>
< a class = 'button' href = '$originalUrl' > Download </ a > " ;
break ;
2016-04-07 16:37:11 +00:00
}
2020-04-18 11:37:07 +00:00
2016-04-07 16:37:11 +00:00
$fileInfo = [];
2017-12-12 23:00:29 +00:00
$fileInfo [ " Name " ] = str_replace ( " Files/ " , " " , $filepath );
2016-04-07 16:37:11 +00:00
$fileInfo [ " Type " ] = $mime_type ;
2016-08-22 13:56:34 +00:00
$fileInfo [ " Size " ] = human_filesize ( filesize ( $env -> storage_prefix . $filepath ));
2016-04-07 16:37:11 +00:00
switch ( $fileTypeDisplay )
{
case " image " :
2016-08-22 16:46:13 +00:00
$dimensionsKey = $mime_type !== " image/svg+xml " ? " Original dimensions " : " Native size " ;
2016-06-04 12:33:02 +00:00
$fileInfo [ $dimensionsKey ] = " $dimensions[0] x $dimensions[1] " ;
2016-04-07 16:37:11 +00:00
break ;
}
$fileInfo [ " Uploaded by " ] = $pageindex -> { $env -> page } -> lasteditor ;
2018-01-27 13:54:39 +00:00
$fileInfo [ " Short markdown embed code " ] = " <input type='text' class='short-embed-markdown-code' value='![ " . htmlentities ( $fileInfo [ " Name " ], ENT_QUOTES | ENT_HTML5 ) . " ]( " . htmlentities ( $filepath , ENT_QUOTES | ENT_HTML5 ) . " | right | 350x350)' readonly /> <button class='short-embed-markdown-button'>Copy</button> " ;
2020-04-18 11:37:07 +00:00
2016-04-07 16:37:11 +00:00
$preview_html .= " \t \t \t <h2>File Information</h2>
< table > " ;
foreach ( $fileInfo as $displayName => $displayValue )
{
$preview_html .= " <tr><th> $displayName </th><td> $displayValue </td></tr> \n " ;
}
$preview_html .= " </table> " ;
2020-04-18 11:37:07 +00:00
2015-10-24 13:28:56 +00:00
$parts [ " { content} " ] = str_replace ( " </h1> " , " </h1> \n $preview_html " , $parts [ " { content} " ]);
}
2015-10-18 12:23:02 +00:00
});
2020-04-18 11:37:07 +00:00
2017-12-12 23:00:29 +00:00
// Add the snippet that copies the embed markdown code to the clipboard
2019-01-27 22:56:51 +00:00
page_renderer :: add_js_snippet ( ' window . addEventListener ( " load " , function ( event ) {
2017-12-12 23:00:29 +00:00
let button = document . querySelector ( " .short-embed-markdown-button " );
2017-12-13 09:48:29 +00:00
if ( button == null ) return ;
2017-12-12 23:00:29 +00:00
button . addEventListener ( " click " , function ( inner_event ) {
let input = document . querySelector ( " .short-embed-markdown-code " );
input . select ();
button . innerHTML = document . execCommand ( " copy " ) ? " Copied! " : " Failed to copy :-( " ;
});
}); ' );
2020-04-18 11:37:07 +00:00
2015-12-21 14:03:21 +00:00
// Register a section on the help page on uploading files
2016-06-22 08:13:32 +00:00
add_help_section ( " 28-uploading-files " , " Uploading Files " , " <p> $settings->sitename supports the uploading of files, though it is up to " . $settings -> admindetails_name . " , $settings->sitename 's administrator as to whether it is enabled or not (uploads are currently " . (( $settings -> upload_enabled ) ? " enabled " : " disabled " ) . " ).</p>
2019-05-24 20:50:27 +00:00
< p > Currently Pepperminty Wiki ( the software that $settings -> sitename uses ) only supports the uploading of images , videos , and audio , although more file types should be supported in the future ( < a href = '//github.com/sbrl/Pepperminty-Wiki/issues' > open an issue on GitHub </ a > if you are interested in support for more file types ) .</ p >
2015-12-21 14:03:21 +00:00
< p > Uploading a file is actually quite simple . Click the & quot ; Upload & quot ; option in the & quot ; More ...& quot ; menu to go to the upload page . The upload page will tell you what types of file $settings -> sitename allows , and the maximum supported filesize for files that you upload ( this is usually set by the web server that the wiki is running on ) .</ p >
< p > Use the file chooser to select the file that you want to upload , and then decide on a name for it . Note that the name that you choose should not include the file extension , as this will be determined automatically . Enter a description that will appear on the file ' s page , and then click upload .</ p > " );
2015-10-18 12:23:02 +00:00
}
]);
2017-09-15 22:06:10 +00:00
/**
* Calculates the actual maximum upload size supported by the server
* Returns a file size limit in bytes based on the PHP upload_max_filesize and
* post_max_size
* @ package feature - upload
* @ author Lifted from Drupal by @ meustrus from Stackoverflow
* @ see http :// stackoverflow . com / a / 25370978 / 1460422 Source Stackoverflow answer
2019-08-15 21:55:50 +00:00
* @ return int The maximum upload size supported bythe server , in bytes .
2017-09-15 22:06:10 +00:00
*/
2015-10-19 07:03:38 +00:00
function get_max_upload_size ()
2015-10-18 20:01:18 +00:00
{
static $max_size = - 1 ;
if ( $max_size < 0 ) {
// Start with post_max_size.
$max_size = parse_size ( ini_get ( 'post_max_size' ));
// If upload_max_size is less, then reduce. Except if upload_max_size is
// zero, which indicates no limit.
$upload_max = parse_size ( ini_get ( 'upload_max_filesize' ));
if ( $upload_max > 0 && $upload_max < $max_size ) {
$max_size = $upload_max ;
}
}
return $max_size ;
}
2017-09-15 22:06:10 +00:00
/**
* Parses a PHP size to an integer
* @ package feature - upload
* @ author Lifted from Drupal by @ meustrus from Stackoverflow
* @ see http :// stackoverflow . com / a / 25370978 / 1460422 Source Stackoverflow answer
* @ param string $size The size to parse .
2019-08-14 00:18:53 +00:00
* @ return int The number of bytees represented by the specified
2017-09-15 22:06:10 +00:00
* size string .
*/
2015-10-18 20:01:18 +00:00
function parse_size ( $size ) {
$unit = preg_replace ( '/[^bkmgtpezy]/i' , '' , $size ); // Remove the non-unit characters from the size.
$size = preg_replace ( '/[^0-9\.]/' , '' , $size ); // Remove the non-numeric characters from the size.
if ( $unit ) {
// Find the position of the unit in the ordered string which is the power of magnitude to multiply a kilobyte by.
return round ( $size * pow ( 1024 , stripos ( 'bkmgtpezy' , $unit [ 0 ])));
} else {
return round ( $size );
}
}
2017-09-15 22:06:10 +00:00
/**
* Checks an uploaded SVG file to make sure it ' s ( at least somewhat ) safe .
* Sends an error to the client if a problem is found .
* @ package feature - upload
* @ param string $temp_filename The filename of the SVG file to check .
* @ return int [] The size of the SVG image .
*/
2016-06-04 12:33:02 +00:00
function upload_check_svg ( $temp_filename )
{
global $settings ;
// Check for script tags
if ( strpos ( file_get_contents ( $temp_filename ), " <script " ) !== false )
{
http_response_code ( 415 );
exit ( page_renderer :: render ( " Upload Error - $settings->sitename " , " <p> $settings->sitename detected that you uploaded an SVG image and performed some extra security checks on your file. Whilst performing these checks it was discovered that the file you uploaded contains some Javascript, which could be dangerous. The uploaded file has been discarded. <a href='?action=upload'>Go back to try again</a>.</p>
< p > You may wish to consider < a href = 'https://github.com/sbrl/Pepperminty-Wiki' > opening an issue </ a > against Pepperminty Wiki ( the software that powers $settings -> sitename ) if this isn ' t the first time that you have seen this message .</ p > " ));
}
2020-04-18 04:53:05 +00:00
2016-06-04 12:33:02 +00:00
// Find and return the size of the SVG image
return getsvgsize ( $temp_filename );
}
2017-09-15 22:06:10 +00:00
/**
* Calculates the size of the specified SVG file .
* @ package feature - upload
* @ param string $svgFilename The filename to calculate the size of .
* @ return int [] The width and height respectively of the
* specified SVG file .
*/
2016-06-04 12:33:02 +00:00
function getsvgsize ( $svgFilename )
{
2018-01-27 13:38:53 +00:00
global $settings ;
2017-12-13 20:20:34 +00:00
libxml_disable_entity_loader ( true ); // Ref: XXE Billion Laughs Attack, issue #152
2018-01-27 13:38:53 +00:00
$rawSvg = file_get_contents ( $svgFilename );
$svg = simplexml_load_string ( $rawSvg ); // Load it as XML
unset ( $rawSvg );
2016-06-04 12:33:02 +00:00
if ( $svg === false )
{
http_response_code ( 415 );
exit ( page_renderer :: render ( " Upload Error - $settings->sitename " , " <p>When $settings->sitename tried to open your SVG file for checking, it found some invalid syntax. The uploaded file has been discarded. <a href='?action=upload'>Go back to try again</a>.</p> " ));
}
$rootAttrs = $svg -> attributes ();
$imageSize = false ;
if ( isset ( $rootAttrs -> width ) and isset ( $rootAttrs -> height ))
$imageSize = [ intval ( $rootAttrs -> width ), intval ( $rootAttrs -> height ) ];
else if ( isset ( $rootAttrs -> viewBox ))
$imageSize = array_map ( " intval " , array_slice ( explode ( " " , $rootAttrs -> viewBox ), - 2 , 2 ));
2020-04-18 11:37:07 +00:00
2016-06-04 12:33:02 +00:00
return $imageSize ;
}
2015-10-18 12:23:02 +00:00
?>