2014-05-06 22:00:30 +01:00
|
|
|
<?php
|
2018-07-18 05:31:24 +01:00
|
|
|
// This file is part of GNU social - https://www.gnu.org/software/social
|
|
|
|
//
|
|
|
|
// GNU social is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// GNU social is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with GNU social. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
/**
|
2019-07-06 04:31:02 +01:00
|
|
|
* OEmbed and OpenGraph implementation for GNU social
|
2018-07-18 05:31:24 +01:00
|
|
|
*
|
|
|
|
* @package GNUsocial
|
2021-02-19 10:34:21 +00:00
|
|
|
* @author Mikael Nordfeldth
|
2018-07-18 05:31:24 +01:00
|
|
|
* @author Stephen Paul Weber
|
|
|
|
* @author hannes
|
|
|
|
* @author Mikael Nordfeldth
|
2021-02-19 10:34:21 +00:00
|
|
|
* @author Diogo Peralta Cordeiro
|
|
|
|
* @author Miguel Dantas
|
|
|
|
* @author Diogo Peralta Cordeiro
|
|
|
|
* @copyright 2014-2021 Free Software Foundation, Inc http://www.fsf.org
|
2018-07-18 05:31:24 +01:00
|
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
|
|
|
*/
|
|
|
|
|
|
|
|
defined('GNUSOCIAL') || die();
|
|
|
|
|
2019-07-07 13:26:10 +01:00
|
|
|
use Embed\Embed;
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
2019-07-06 04:31:02 +01:00
|
|
|
* Base class for the Embed plugin that does most of the heavy lifting to get
|
2018-07-18 05:31:24 +01:00
|
|
|
* and display representations for remote content.
|
|
|
|
*
|
2021-02-19 10:34:21 +00:00
|
|
|
* @copyright 2014-2021 Free Software Foundation, Inc http://www.fsf.org
|
2018-07-18 05:31:24 +01:00
|
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
|
|
|
*/
|
2019-07-06 04:31:02 +01:00
|
|
|
class EmbedPlugin extends Plugin
|
2014-05-06 22:00:30 +01:00
|
|
|
{
|
2021-02-19 10:34:21 +00:00
|
|
|
const PLUGIN_VERSION = '2.1.0';
|
2019-07-06 04:31:02 +01:00
|
|
|
|
2019-07-15 22:08:19 +01:00
|
|
|
// settings which can be set in config.php with addPlugin('Embed', ['param'=>'value', ...]);
|
2019-07-06 04:31:02 +01:00
|
|
|
// WARNING, these are _regexps_ (slashes added later). Always escape your dots and end ('$') your strings
|
|
|
|
|
|
|
|
public $domain_whitelist = [
|
|
|
|
// hostname => service provider
|
|
|
|
'^i\d*\.ytimg\.com$' => 'YouTube',
|
|
|
|
'^i\d*\.vimeocdn\.com$' => 'Vimeo',
|
|
|
|
];
|
2019-07-15 22:08:19 +01:00
|
|
|
public $append_whitelist = []; // fill this array as domain_whitelist to add more trusted sources
|
2015-04-03 20:00:19 +01:00
|
|
|
public $check_whitelist = false; // security/abuse precaution
|
2015-01-25 01:34:40 +00:00
|
|
|
|
2021-02-21 20:20:48 +00:00
|
|
|
public $thumbnail_width = 128;
|
|
|
|
public $thumbnail_height = 128;
|
|
|
|
public $crop = true;
|
2021-02-19 12:10:37 +00:00
|
|
|
public $max_size = null;
|
2019-07-23 11:07:47 +01:00
|
|
|
|
2019-07-15 22:08:19 +01:00
|
|
|
protected $imgData = [];
|
2015-01-25 01:34:40 +00:00
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
2019-07-06 04:31:02 +01:00
|
|
|
* Initialize the Embed plugin and set up the environment it needs for it.
|
2018-07-18 05:31:24 +01:00
|
|
|
* Returns true if it initialized properly, the exception object if it
|
|
|
|
* doesn't.
|
|
|
|
*/
|
2015-01-25 01:34:40 +00:00
|
|
|
public function initialize()
|
|
|
|
{
|
|
|
|
parent::initialize();
|
|
|
|
|
|
|
|
$this->domain_whitelist = array_merge($this->domain_whitelist, $this->append_whitelist);
|
2021-02-19 12:10:37 +00:00
|
|
|
|
|
|
|
// Load global configuration if specific not provided
|
|
|
|
$this->thumbnail_width = $this->thumbnail_width ?? common_config('thumbnail', 'width');
|
|
|
|
$this->thumbnail_height = $this->thumbnail_height ?? common_config('thumbnail', 'height');
|
|
|
|
$this->max_size = $this->max_size ?? common_config('attachments', 'file_quota');
|
2021-02-21 10:35:02 +00:00
|
|
|
$this->crop = $this->crop ?? common_config('thumbnail', 'crop');
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* The code executed on GNU social checking the database schema, which in
|
|
|
|
* this case is to make sure we have the plugin table we need.
|
|
|
|
*
|
|
|
|
* @return bool true if it ran successfully, the exception object if it doesn't.
|
|
|
|
*/
|
2014-05-06 22:00:30 +01:00
|
|
|
public function onCheckSchema()
|
|
|
|
{
|
2019-07-06 16:52:30 +01:00
|
|
|
$this->onEndUpgrade(); // Ensure rename
|
|
|
|
|
2014-05-06 22:00:30 +01:00
|
|
|
$schema = Schema::get();
|
2019-07-06 16:52:30 +01:00
|
|
|
$schema->ensureTable('file_embed', File_embed::schemaDef());
|
2014-05-06 22:00:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-07-06 16:52:30 +01:00
|
|
|
public function onEndUpgrade()
|
|
|
|
{
|
|
|
|
$schema = Schema::get();
|
|
|
|
return $schema->renameTable('file_oembed', 'file_embed');
|
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* This code executes when GNU social creates the page routing, and we hook
|
2019-07-06 04:31:02 +01:00
|
|
|
* on this event to add our action handler for Embed.
|
2018-07-18 05:31:24 +01:00
|
|
|
*
|
|
|
|
* @param $m URLMapper the router that was initialized.
|
2019-07-12 03:13:40 +01:00
|
|
|
* @return void true if successful, the exception object if it isn't.
|
|
|
|
* @throws Exception
|
2018-07-18 05:31:24 +01:00
|
|
|
*/
|
2014-05-06 22:00:30 +01:00
|
|
|
public function onRouterInitialized(URLMapper $m)
|
|
|
|
{
|
2019-08-07 23:12:03 +01:00
|
|
|
$m->connect('main/oembed', ['action' => 'oembed']);
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* This event executes when GNU social encounters a remote URL we then decide
|
2019-07-07 13:26:10 +01:00
|
|
|
* to interrogate for metadata. Embed gloms onto it to see if we have an
|
2018-07-18 05:31:24 +01:00
|
|
|
* oEmbed endpoint or image to try to represent in the post.
|
|
|
|
*
|
|
|
|
* @param $url string the remote URL we're looking at
|
|
|
|
* @param $dom DOMDocument the document we're getting metadata from
|
|
|
|
* @param $metadata stdClass class representing the metadata
|
|
|
|
* @return bool true if successful, the exception object if it isn't.
|
|
|
|
*/
|
2015-11-30 01:06:04 +00:00
|
|
|
public function onGetRemoteUrlMetadataFromDom($url, DOMDocument $dom, stdClass &$metadata)
|
|
|
|
{
|
|
|
|
try {
|
2019-07-07 13:26:10 +01:00
|
|
|
common_log(LOG_INFO, "Trying to find Embed data for {$url} with 'oscarotero/Embed'");
|
|
|
|
$info = Embed::create($url);
|
|
|
|
|
|
|
|
$metadata->version = '1.0'; // Yes.
|
|
|
|
$metadata->provider_name = $info->authorName;
|
|
|
|
$metadata->title = $info->title;
|
|
|
|
$metadata->html = common_purify($info->description);
|
|
|
|
$metadata->type = $info->type;
|
|
|
|
$metadata->url = $info->url;
|
|
|
|
$metadata->thumbnail_height = $info->imageHeight;
|
|
|
|
$metadata->thumbnail_width = $info->imageWidth;
|
2019-08-19 01:40:31 +01:00
|
|
|
|
|
|
|
if (substr($info->image, 0, 4) === 'data') {
|
|
|
|
// Inline image
|
2019-09-02 16:31:32 +01:00
|
|
|
$imgData = base64_decode(substr($info->image, stripos($info->image, 'base64,') + 7));
|
|
|
|
list($filename, , ) = $this->validateAndWriteImage($imgData);
|
2019-08-19 01:40:31 +01:00
|
|
|
// Use a file URI for images, as file_embed can't store a filename
|
|
|
|
$metadata->thumbnail_url = 'file://' . File_thumbnail::path($filename);
|
|
|
|
} else {
|
|
|
|
$metadata->thumbnail_url = $info->image;
|
|
|
|
}
|
2019-07-07 13:26:10 +01:00
|
|
|
} catch (Exception $e) {
|
2019-08-19 01:40:31 +01:00
|
|
|
common_log(LOG_INFO, "Failed to find Embed data for {$url} with 'oscarotero/Embed'" .
|
2021-02-16 18:30:21 +00:00
|
|
|
", got exception: " . get_class($e));
|
2015-11-30 01:06:04 +00:00
|
|
|
}
|
2016-01-28 15:19:29 +00:00
|
|
|
|
2016-02-25 18:46:17 +00:00
|
|
|
if (isset($metadata->thumbnail_url)) {
|
|
|
|
// sometimes sites serve the path, not the full URL, for images
|
|
|
|
// let's "be liberal in what you accept from others"!
|
|
|
|
// add protocol and host if the thumbnail_url starts with /
|
2019-07-14 23:35:11 +01:00
|
|
|
if ($metadata->thumbnail_url[0] == '/') {
|
2016-02-25 18:46:17 +00:00
|
|
|
$thumbnail_url_parsed = parse_url($metadata->url);
|
2019-07-14 23:35:11 +01:00
|
|
|
$metadata->thumbnail_url = "{$thumbnail_url_parsed['scheme']}://".
|
2021-02-16 18:30:21 +00:00
|
|
|
"{$thumbnail_url_parsed['host']}{$metadata->thumbnail_url}";
|
2016-02-25 18:46:17 +00:00
|
|
|
}
|
2018-07-18 05:31:24 +01:00
|
|
|
|
2016-02-25 18:46:17 +00:00
|
|
|
// some wordpress opengraph implementations sometimes return a white blank image
|
|
|
|
// no need for us to save that!
|
2018-07-18 05:31:24 +01:00
|
|
|
if ($metadata->thumbnail_url == 'https://s0.wp.com/i/blank.jpg') {
|
2016-02-25 18:46:17 +00:00
|
|
|
unset($metadata->thumbnail_url);
|
|
|
|
}
|
2016-01-28 15:19:29 +00:00
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
// FIXME: this is also true of locally-installed wordpress so we should watch out for that.
|
|
|
|
}
|
|
|
|
return true;
|
2015-11-30 01:06:04 +00:00
|
|
|
}
|
|
|
|
|
2014-05-06 22:00:30 +01:00
|
|
|
public function onEndShowHeadElements(Action $action)
|
|
|
|
{
|
|
|
|
switch ($action->getActionName()) {
|
2021-02-16 18:30:21 +00:00
|
|
|
case 'attachment':
|
|
|
|
$url = common_local_url('attachment', ['attachment' => $action->attachment->getID()]);
|
|
|
|
break;
|
|
|
|
case 'shownotice':
|
|
|
|
if (!$action->notice->isLocal()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
$url = $action->notice->getUrl();
|
|
|
|
} catch (InvalidUrlException $e) {
|
|
|
|
// The notice is probably a share or similar, which don't
|
|
|
|
// have a representational URL of their own.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
break;
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
|
2019-07-14 23:35:11 +01:00
|
|
|
if (isset($url)) {
|
|
|
|
foreach (['xml', 'json'] as $format) {
|
2019-07-15 22:08:19 +01:00
|
|
|
$action->element(
|
|
|
|
'link',
|
2020-09-21 21:54:23 +01:00
|
|
|
[
|
|
|
|
'rel' =>'alternate',
|
|
|
|
'type' => "application/{$format}+oembed",
|
|
|
|
'href' => common_local_url('oembed', [], ['format' => $format, 'url' => $url]),
|
|
|
|
'title' => 'oEmbed'
|
|
|
|
]
|
2019-07-15 22:08:19 +01:00
|
|
|
);
|
2019-07-14 23:35:11 +01:00
|
|
|
}
|
|
|
|
}
|
2014-05-06 22:00:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
public function onEndShowStylesheets(Action $action)
|
|
|
|
{
|
2019-07-06 04:31:02 +01:00
|
|
|
$action->cssLink($this->path('css/embed.css'));
|
2016-03-16 23:31:45 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-05-06 22:00:30 +01:00
|
|
|
/**
|
|
|
|
* Save embedding information for a File, if applicable.
|
|
|
|
*
|
|
|
|
* Normally this event is called through File::saveNew()
|
|
|
|
*
|
2019-07-14 23:35:11 +01:00
|
|
|
* @param File $file The newly inserted File object.
|
2014-05-06 22:00:30 +01:00
|
|
|
*
|
|
|
|
* @return boolean success
|
|
|
|
*/
|
2015-11-02 05:15:08 +00:00
|
|
|
public function onEndFileSaveNew(File $file)
|
2014-05-06 22:00:30 +01:00
|
|
|
{
|
2019-07-14 23:35:11 +01:00
|
|
|
$fe = File_embed::getKV('file_id', $file->getID());
|
|
|
|
if ($fe instanceof File_embed) {
|
2019-07-06 04:31:02 +01:00
|
|
|
common_log(LOG_WARNING, "Strangely, a File_embed object exists for new file {$file->getID()}", __FILE__);
|
2015-10-01 21:18:33 +01:00
|
|
|
return true;
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
|
2015-11-02 05:15:08 +00:00
|
|
|
if (isset($file->mimetype)
|
2019-07-14 23:35:11 +01:00
|
|
|
&& (('text/html' === substr($file->mimetype, 0, 9) ||
|
2021-02-16 18:30:21 +00:00
|
|
|
'application/xhtml+xml' === substr($file->mimetype, 0, 21)))) {
|
2014-05-06 22:00:30 +01:00
|
|
|
try {
|
2019-07-14 23:35:11 +01:00
|
|
|
$embed_data = File_embed::getEmbed($file->url);
|
2019-07-06 04:31:02 +01:00
|
|
|
if ($embed_data === false) {
|
2019-07-14 23:35:11 +01:00
|
|
|
throw new Exception("Did not get Embed data from URL {$file->url}");
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
2019-07-06 04:31:02 +01:00
|
|
|
$file->setTitle($embed_data->title);
|
2014-05-06 22:00:30 +01:00
|
|
|
} catch (Exception $e) {
|
2019-07-15 22:08:19 +01:00
|
|
|
common_log(LOG_WARNING, sprintf(
|
|
|
|
__METHOD__.': %s thrown when getting embed data: %s',
|
|
|
|
get_class($e),
|
|
|
|
_ve($e->getMessage())
|
|
|
|
));
|
2014-05-06 22:00:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-07-06 04:31:02 +01:00
|
|
|
File_embed::saveNew($embed_data, $file->getID());
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
public function onEndShowAttachmentLink(HTMLOutputter $out, File $file)
|
|
|
|
{
|
2019-07-06 04:31:02 +01:00
|
|
|
$embed = File_embed::getKV('file_id', $file->getID());
|
|
|
|
if (empty($embed->author_name) && empty($embed->provider)) {
|
2014-05-06 22:00:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
2019-07-15 22:08:19 +01:00
|
|
|
$out->elementStart('div', ['id'=>'oembed_info', 'class'=>'e-content']);
|
2019-07-14 23:35:11 +01:00
|
|
|
foreach (['author_name' => ['class' => ' author', 'url' => 'author_url'],
|
2021-02-16 18:30:21 +00:00
|
|
|
'provider' => ['class' => '', 'url' => 'provider_url']]
|
2019-07-14 23:35:11 +01:00
|
|
|
as $field => $options) {
|
|
|
|
if (!empty($embed->{$field})) {
|
|
|
|
$out->elementStart('div', "fn vcard" . $options['class']);
|
|
|
|
if (empty($embed->{$options['url']})) {
|
|
|
|
$out->text($embed->{$field});
|
|
|
|
} else {
|
2019-07-15 22:08:19 +01:00
|
|
|
$out->element(
|
|
|
|
'a',
|
|
|
|
['href' => $embed->{$options['url']},
|
2021-02-16 18:30:21 +00:00
|
|
|
'class' => 'url'],
|
2019-07-15 22:08:19 +01:00
|
|
|
$embed->{$field}
|
2019-07-14 23:35:11 +01:00
|
|
|
);
|
|
|
|
}
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
$out->elementEnd('div');
|
|
|
|
}
|
|
|
|
|
|
|
|
public function onFileEnclosureMetadata(File $file, &$enclosure)
|
|
|
|
{
|
|
|
|
// Never treat generic HTML links as an enclosure type!
|
2019-07-06 04:31:02 +01:00
|
|
|
// But if we have embed info, we'll consider it golden.
|
|
|
|
$embed = File_embed::getKV('file_id', $file->getID());
|
2019-07-15 22:08:19 +01:00
|
|
|
if (!$embed instanceof File_embed || !in_array($embed->type, ['photo', 'video'])) {
|
2014-05-06 22:00:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-07-14 23:35:11 +01:00
|
|
|
foreach (['mimetype', 'url', 'title', 'modified', 'width', 'height'] as $key) {
|
2019-07-06 04:31:02 +01:00
|
|
|
if (isset($embed->{$key}) && !empty($embed->{$key})) {
|
|
|
|
$enclosure->{$key} = $embed->{$key};
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2016-03-16 23:31:45 +00:00
|
|
|
|
|
|
|
public function onStartShowAttachmentRepresentation(HTMLOutputter $out, File $file)
|
|
|
|
{
|
|
|
|
try {
|
2019-07-06 04:31:02 +01:00
|
|
|
$embed = File_embed::getByFile($file);
|
2016-03-16 23:31:45 +00:00
|
|
|
} catch (NoResultException $e) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-03-22 13:02:36 +00:00
|
|
|
// Show thumbnail as usual if it's a photo.
|
2019-07-06 04:31:02 +01:00
|
|
|
if ($embed->type === 'photo') {
|
2016-03-22 13:02:36 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-07-06 04:31:02 +01:00
|
|
|
$out->elementStart('article', ['class'=>'h-entry embed']);
|
2016-03-16 23:31:45 +00:00
|
|
|
$out->elementStart('header');
|
2018-07-18 05:31:24 +01:00
|
|
|
try {
|
2019-07-23 11:07:47 +01:00
|
|
|
$thumb = $file->getThumbnail($this->thumbnail_width, $this->thumbnail_height);
|
2019-07-06 04:31:02 +01:00
|
|
|
$out->element('img', $thumb->getHtmlAttrs(['class'=>'u-photo embed']));
|
2016-03-16 23:31:45 +00:00
|
|
|
unset($thumb);
|
2019-07-15 22:08:19 +01:00
|
|
|
} catch (FileNotFoundException $e) {
|
2019-07-13 02:56:47 +01:00
|
|
|
// Nothing to show
|
2016-03-16 23:31:45 +00:00
|
|
|
} catch (Exception $e) {
|
|
|
|
$out->element('div', ['class'=>'error'], $e->getMessage());
|
|
|
|
}
|
2019-07-06 04:31:02 +01:00
|
|
|
$out->elementStart('h5', ['class'=>'p-name embed']);
|
|
|
|
$out->element('a', ['class'=>'u-url', 'href'=>$file->getUrl()], common_strip_html($embed->title));
|
2016-03-16 23:31:45 +00:00
|
|
|
$out->elementEnd('h5');
|
2019-07-06 04:31:02 +01:00
|
|
|
$out->elementStart('div', ['class'=>'p-author embed']);
|
|
|
|
if (!empty($embed->author_name)) {
|
|
|
|
// TRANS: text before the author name of embed attachment representation
|
2016-03-16 23:31:45 +00:00
|
|
|
// FIXME: The whole "By x from y" should be i18n because of different language constructions.
|
|
|
|
$out->text(_('By '));
|
2016-03-27 15:21:43 +01:00
|
|
|
$attrs = ['class'=>'h-card p-author'];
|
2019-07-06 04:31:02 +01:00
|
|
|
if (!empty($embed->author_url)) {
|
|
|
|
$attrs['href'] = $embed->author_url;
|
2016-03-16 23:31:45 +00:00
|
|
|
$tag = 'a';
|
|
|
|
} else {
|
|
|
|
$tag = 'span';
|
|
|
|
}
|
2019-07-06 04:31:02 +01:00
|
|
|
$out->element($tag, $attrs, $embed->author_name);
|
2016-03-16 23:31:45 +00:00
|
|
|
}
|
2019-07-06 04:31:02 +01:00
|
|
|
if (!empty($embed->provider)) {
|
|
|
|
// TRANS: text between the embed author name and provider url
|
2016-03-16 23:31:45 +00:00
|
|
|
// FIXME: The whole "By x from y" should be i18n because of different language constructions.
|
|
|
|
$out->text(_(' from '));
|
|
|
|
$attrs = ['class'=>'h-card'];
|
2019-07-06 04:31:02 +01:00
|
|
|
if (!empty($embed->provider_url)) {
|
|
|
|
$attrs['href'] = $embed->provider_url;
|
2016-03-16 23:31:45 +00:00
|
|
|
$tag = 'a';
|
|
|
|
} else {
|
|
|
|
$tag = 'span';
|
|
|
|
}
|
2019-07-06 04:31:02 +01:00
|
|
|
$out->element($tag, $attrs, $embed->provider);
|
2016-03-16 23:31:45 +00:00
|
|
|
}
|
|
|
|
$out->elementEnd('div');
|
|
|
|
$out->elementEnd('header');
|
2019-07-14 23:35:11 +01:00
|
|
|
$out->elementStart('div', ['class'=>'p-summary embed']);
|
2019-07-06 04:31:02 +01:00
|
|
|
$out->raw(common_purify($embed->html));
|
2016-03-17 11:58:40 +00:00
|
|
|
$out->elementEnd('div');
|
2016-03-16 23:31:45 +00:00
|
|
|
$out->elementStart('footer');
|
|
|
|
$out->elementEnd('footer');
|
|
|
|
$out->elementEnd('article');
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
2018-07-18 05:31:24 +01:00
|
|
|
|
2016-01-07 16:35:37 +00:00
|
|
|
public function onShowUnsupportedAttachmentRepresentation(HTMLOutputter $out, File $file)
|
2014-05-06 22:00:30 +01:00
|
|
|
{
|
2015-10-01 21:18:33 +01:00
|
|
|
try {
|
2019-07-06 04:31:02 +01:00
|
|
|
$embed = File_embed::getByFile($file);
|
2015-10-01 21:18:33 +01:00
|
|
|
} catch (NoResultException $e) {
|
2014-05-06 22:00:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
2015-10-01 21:18:33 +01:00
|
|
|
|
2016-01-07 16:35:37 +00:00
|
|
|
// the 'photo' type is shown through ordinary means, using StartShowAttachmentRepresentation!
|
2019-07-06 04:31:02 +01:00
|
|
|
switch ($embed->type) {
|
2021-02-16 18:30:21 +00:00
|
|
|
case 'video':
|
|
|
|
case 'link':
|
|
|
|
if (!empty($embed->html)
|
2015-02-27 11:44:15 +00:00
|
|
|
&& (GNUsocial::isAjax() || common_config('attachments', 'show_html'))) {
|
2021-02-16 18:30:21 +00:00
|
|
|
$purifier = new HTMLPurifier();
|
|
|
|
// FIXME: do we allow <object> and <embed> here? we did that when we used htmLawed,
|
|
|
|
// but I'm not sure anymore...
|
|
|
|
$out->raw($purifier->purify($embed->html));
|
|
|
|
}
|
|
|
|
return false;
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
2016-01-07 16:35:37 +00:00
|
|
|
|
|
|
|
return true;
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* This event executes when GNU social is creating a file thumbnail entry in
|
2019-07-06 04:31:02 +01:00
|
|
|
* the database. We glom onto this to create proper information for Embed
|
2018-07-18 05:31:24 +01:00
|
|
|
* object thumbnails.
|
|
|
|
*
|
|
|
|
* @param $file File the file of the created thumbnail
|
|
|
|
* @param &$imgPath string = the path to the created thumbnail
|
2021-02-16 18:30:21 +00:00
|
|
|
* @param $media string = media type
|
2018-07-18 05:31:24 +01:00
|
|
|
* @return bool true if it succeeds (including non-action
|
|
|
|
* states where it isn't oEmbed data, so it doesn't mess up the event handle
|
|
|
|
* for other things hooked into it), or the exception if it fails.
|
2021-02-16 18:30:21 +00:00
|
|
|
* @throws FileNotFoundException
|
|
|
|
* @throws NoResultException
|
|
|
|
* @throws ServerException
|
2018-07-18 05:31:24 +01:00
|
|
|
*/
|
2021-02-16 18:30:21 +00:00
|
|
|
public function onCreateFileImageThumbnailSource(File $file, &$imgPath, string $media): bool
|
2015-01-25 01:34:40 +00:00
|
|
|
{
|
|
|
|
// If we are on a private node, we won't do any remote calls (just as a precaution until
|
|
|
|
// we can configure this from config.php for the private nodes)
|
|
|
|
if (common_config('site', 'private')) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-07-06 04:31:02 +01:00
|
|
|
// All our remote Embed images lack a local filename property in the File object
|
2021-02-16 18:30:21 +00:00
|
|
|
if ($file->isLocal()) {
|
|
|
|
common_debug(sprintf('File of id==%d is local (filename: %s), so nothing Embed '.
|
|
|
|
'should handle.', $file->getID(), _ve($file->filename)));
|
2015-01-25 01:34:40 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
2019-07-23 11:07:47 +01:00
|
|
|
// If we have proper Embed data, there should be an entry in the File_thumbnail table.
|
|
|
|
// If not, we're not going to do anything.
|
2018-07-18 05:31:24 +01:00
|
|
|
$thumbnail = File_thumbnail::byFile($file);
|
2016-02-10 03:43:30 +00:00
|
|
|
} catch (NoResultException $e) {
|
2019-07-06 04:31:02 +01:00
|
|
|
// Not Embed data, or at least nothing we either can or want to use.
|
|
|
|
common_debug('No Embed data found for file id=='.$file->getID());
|
2015-01-25 01:34:40 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
$this->storeRemoteFileThumbnail($thumbnail);
|
|
|
|
} catch (AlreadyFulfilledException $e) {
|
|
|
|
// aw yiss!
|
2017-09-10 13:04:12 +01:00
|
|
|
} catch (Exception $e) {
|
2019-07-15 22:08:19 +01:00
|
|
|
common_debug(sprintf(
|
|
|
|
'Embed encountered an exception (%s) for file id==%d: %s',
|
|
|
|
get_class($e),
|
|
|
|
$file->getID(),
|
|
|
|
_ve($e->getMessage())
|
|
|
|
));
|
2017-09-10 13:04:12 +01:00
|
|
|
throw $e;
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
|
|
|
|
2019-06-30 13:36:33 +01:00
|
|
|
// Out
|
2015-01-25 01:34:40 +00:00
|
|
|
$imgPath = $thumbnail->getPath();
|
|
|
|
|
2019-07-13 02:56:47 +01:00
|
|
|
return !file_exists($imgPath);
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
|
|
|
|
2020-08-13 21:56:31 +01:00
|
|
|
public function onFileDeleteRelated(File $file, array &$related): bool
|
|
|
|
{
|
|
|
|
$related[] = 'File_embed';
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-01-25 01:34:40 +00:00
|
|
|
/**
|
2018-07-18 05:31:24 +01:00
|
|
|
* @return bool false on no check made, provider name on success
|
2015-01-25 01:34:40 +00:00
|
|
|
* @throws ServerException if check is made but fails
|
|
|
|
*/
|
|
|
|
protected function checkWhitelist($url)
|
|
|
|
{
|
|
|
|
if (!$this->check_whitelist) {
|
|
|
|
return false; // indicates "no check made"
|
|
|
|
}
|
|
|
|
|
|
|
|
$host = parse_url($url, PHP_URL_HOST);
|
2015-01-25 10:18:57 +00:00
|
|
|
foreach ($this->domain_whitelist as $regex => $provider) {
|
|
|
|
if (preg_match("/$regex/", $host)) {
|
|
|
|
return $provider; // we trust this source, return provider name
|
|
|
|
}
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
|
|
|
|
2015-01-25 10:18:57 +00:00
|
|
|
throw new ServerException(sprintf(_('Domain not in remote thumbnail source whitelist: %s'), $host));
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* Check the file size of a remote file using a HEAD request and checking
|
|
|
|
* the content-length variable returned. This isn't 100% foolproof but is
|
|
|
|
* reliable enough for our purposes.
|
|
|
|
*
|
|
|
|
* @return string|bool the file size if it succeeds, false otherwise.
|
|
|
|
*/
|
2019-07-14 23:35:11 +01:00
|
|
|
private function getRemoteFileSize($url, $headers = null)
|
2015-01-25 01:34:40 +00:00
|
|
|
{
|
2018-07-18 05:31:24 +01:00
|
|
|
try {
|
2019-07-14 23:35:11 +01:00
|
|
|
if ($headers === null) {
|
|
|
|
if (!common_valid_http_url($url)) {
|
|
|
|
common_log(LOG_ERR, "Invalid URL in Embed::getRemoteFileSize()");
|
2018-07-18 05:31:24 +01:00
|
|
|
return false;
|
|
|
|
}
|
2019-07-14 23:35:11 +01:00
|
|
|
$head = (new HTTPClient())->head($url);
|
|
|
|
$headers = $head->getHeader();
|
2019-07-14 23:56:31 +01:00
|
|
|
$headers = array_change_key_case($headers, CASE_LOWER);
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
2019-07-23 11:07:47 +01:00
|
|
|
return isset($headers['content-length']) ? $headers['content-length'] : false;
|
2018-07-18 05:31:24 +01:00
|
|
|
} catch (Exception $err) {
|
2019-07-14 23:35:11 +01:00
|
|
|
common_log(LOG_ERR, __CLASS__.': getRemoteFileSize on URL : '._ve($url).
|
2021-02-16 18:30:21 +00:00
|
|
|
' threw exception: '.$err->getMessage());
|
2018-07-18 05:31:24 +01:00
|
|
|
return false;
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
2015-01-25 01:34:40 +00:00
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* A private helper function that uses a CURL lookup to check the mime type
|
|
|
|
* of a remote URL to see it it's an image.
|
|
|
|
*
|
|
|
|
* @return bool true if the remote URL is an image, or false otherwise.
|
|
|
|
*/
|
2019-07-14 23:35:11 +01:00
|
|
|
private function isRemoteImage($url, $headers = null)
|
2018-07-18 05:31:24 +01:00
|
|
|
{
|
2019-07-14 23:35:11 +01:00
|
|
|
if (empty($headers)) {
|
|
|
|
if (!common_valid_http_url($url)) {
|
|
|
|
common_log(LOG_ERR, "Invalid URL in Embed::isRemoteImage()");
|
2018-07-18 05:31:24 +01:00
|
|
|
return false;
|
|
|
|
}
|
2019-07-14 23:35:11 +01:00
|
|
|
$head = (new HTTPClient())->head($url);
|
|
|
|
$headers = $head->getHeader();
|
2019-07-14 23:56:31 +01:00
|
|
|
$headers = array_change_key_case($headers, CASE_LOWER);
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
2019-07-14 23:35:11 +01:00
|
|
|
return !empty($headers['content-type']) && common_get_mime_media($headers['content-type']) === 'image';
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-08-19 01:40:31 +01:00
|
|
|
* Validate that $imgData is a valid image before writing it to
|
2019-08-19 01:40:31 +01:00
|
|
|
* disk, as well as resizing it to at most $this->thumbnail_width
|
|
|
|
* by $this->thumbnail_height
|
2018-07-18 05:31:24 +01:00
|
|
|
*
|
2019-08-19 01:40:31 +01:00
|
|
|
* @param $imgData - The image data to validate. Taken by reference to avoid copying
|
2019-08-19 01:40:31 +01:00
|
|
|
* @param string|null $url - The url where the image came from, to fetch metadata
|
|
|
|
* @param array|null $headers - The headers possible previous request to $url
|
|
|
|
* @param int|null $file_id - The id of the file this image belongs to, used for logging
|
2018-07-18 05:31:24 +01:00
|
|
|
*/
|
2021-02-16 18:30:21 +00:00
|
|
|
protected function validateAndWriteImage(&$imgData, ?string $url = null, ?array $headers = null, ?int $file_id = null) : array
|
2018-07-18 05:31:24 +01:00
|
|
|
{
|
2019-08-19 01:40:31 +01:00
|
|
|
$info = @getimagesizefromstring($imgData);
|
2019-07-23 11:07:47 +01:00
|
|
|
// array indexes documented on php.net:
|
|
|
|
// https://php.net/manual/en/function.getimagesize.php
|
2015-01-25 01:34:40 +00:00
|
|
|
if ($info === false) {
|
2018-07-18 05:31:24 +01:00
|
|
|
throw new UnsupportedMediaException(_('Remote file format was not identified as an image.'), $url);
|
2015-01-25 01:34:40 +00:00
|
|
|
} elseif (!$info[0] || !$info[1]) {
|
|
|
|
throw new UnsupportedMediaException(_('Image file had impossible geometry (0 width or height)'));
|
|
|
|
}
|
|
|
|
|
2019-07-23 11:07:47 +01:00
|
|
|
$width = min($info[0], $this->thumbnail_width);
|
|
|
|
$height = min($info[1], $this->thumbnail_height);
|
2019-08-19 01:40:31 +01:00
|
|
|
$filehash = hash(File::FILEHASH_ALG, $imgData);
|
2016-02-25 21:31:45 +00:00
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
try {
|
2019-08-19 01:40:31 +01:00
|
|
|
if (!empty($url)) {
|
|
|
|
$original_name = HTTPClient::get_filename($url, $headers);
|
|
|
|
}
|
2021-02-16 18:30:21 +00:00
|
|
|
$filename = MediaFile::encodeFilename($original_name ?? _m('Untitled attachment'), $filehash);
|
2018-07-18 05:31:24 +01:00
|
|
|
$fullpath = File_thumbnail::path($filename);
|
|
|
|
// Write the file to disk. Throw Exception on failure
|
2019-07-14 23:35:11 +01:00
|
|
|
if (!file_exists($fullpath)) {
|
2019-09-02 16:31:32 +01:00
|
|
|
if (strpos($fullpath, INSTALLDIR) !== 0 || file_put_contents($fullpath, $imgData) === false) {
|
2019-07-14 23:35:11 +01:00
|
|
|
throw new ServerException(_('Could not write downloaded file to disk.'));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (common_get_mime_media(MediaFile::getUploadedMimeType($fullpath)) !== 'image') {
|
|
|
|
@unlink($fullpath);
|
|
|
|
throw new UnsupportedMediaException(
|
2019-07-15 22:08:19 +01:00
|
|
|
_('Remote file format was not identified as an image.'),
|
|
|
|
$url
|
|
|
|
);
|
2019-07-14 23:35:11 +01:00
|
|
|
}
|
2019-07-23 11:07:47 +01:00
|
|
|
|
|
|
|
// If the image is not of the desired size, resize it
|
2021-02-19 12:10:37 +00:00
|
|
|
if ($this->crop && ($info[0] > $this->thumbnail_width || $info[1] > $this->thumbnail_height)) {
|
2019-07-23 11:07:47 +01:00
|
|
|
// Temporary object, not stored in DB
|
|
|
|
$img = new ImageFile(-1, $fullpath);
|
2021-02-19 12:10:37 +00:00
|
|
|
list($width, $height, $x, $y, $w, $h) = $img->scaleToFit($this->thumbnail_width, $this->thumbnail_height, $this->crop);
|
|
|
|
|
|
|
|
// The boundary box for our resizing
|
|
|
|
$box = [
|
|
|
|
'width' => $width, 'height' => $height,
|
|
|
|
'x' => $x, 'y' => $y,
|
|
|
|
'w' => $w, 'h' => $h,
|
|
|
|
];
|
|
|
|
|
|
|
|
$width = $box['width'];
|
|
|
|
$height = $box['height'];
|
|
|
|
$img->resizeTo($fullpath, $box);
|
2019-07-23 11:07:47 +01:00
|
|
|
}
|
2019-07-14 23:35:11 +01:00
|
|
|
} else {
|
2019-08-19 01:40:31 +01:00
|
|
|
throw new AlreadyFulfilledException('A thumbnail seems to already exist for remote file' .
|
2021-02-16 18:30:21 +00:00
|
|
|
($file_id ? 'with id==' . $file_id : '') . ' at path ' . $fullpath);
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
2019-07-15 00:03:56 +01:00
|
|
|
} catch (AlreadyFulfilledException $e) {
|
|
|
|
// Carry on
|
2018-07-18 05:31:24 +01:00
|
|
|
} catch (Exception $err) {
|
2019-07-14 23:35:11 +01:00
|
|
|
common_log(LOG_ERR, "Went to write a thumbnail to disk in EmbedPlugin::storeRemoteThumbnail " .
|
2021-02-16 18:30:21 +00:00
|
|
|
"but encountered error: {$err}");
|
2019-08-19 01:40:31 +01:00
|
|
|
throw $err;
|
2018-07-18 05:31:24 +01:00
|
|
|
} finally {
|
2019-09-02 16:31:32 +01:00
|
|
|
unset($imgData);
|
2019-08-19 01:40:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return [$filename, $width, $height];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function to create and store a thumbnail representation of a remote image
|
|
|
|
*
|
|
|
|
* @param $thumbnail File_thumbnail object containing the file thumbnail
|
|
|
|
* @return bool true if it succeeded, the exception if it fails, or false if it
|
|
|
|
* is limited by system limits (ie the file is too large.)
|
|
|
|
*/
|
|
|
|
protected function storeRemoteFileThumbnail(File_thumbnail $thumbnail)
|
|
|
|
{
|
|
|
|
if (!empty($thumbnail->filename) && file_exists($thumbnail->getPath())) {
|
|
|
|
throw new AlreadyFulfilledException(
|
|
|
|
sprintf('A thumbnail seems to already exist for remote file with id==%u', $thumbnail->file_id)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2021-02-21 10:35:02 +00:00
|
|
|
$url = $thumbnail->url; // Important not to use the getter here.
|
2019-08-19 01:40:31 +01:00
|
|
|
|
|
|
|
if (substr($url, 0, 7) == 'file://') {
|
|
|
|
$filename = substr($url, 7);
|
|
|
|
$info = getimagesize($filename);
|
|
|
|
$filename = basename($filename);
|
|
|
|
$width = $info[0];
|
|
|
|
$height = $info[1];
|
|
|
|
} else {
|
|
|
|
$this->checkWhitelist($url);
|
|
|
|
$head = (new HTTPClient())->head($url);
|
|
|
|
$headers = $head->getHeader();
|
|
|
|
$headers = array_change_key_case($headers, CASE_LOWER);
|
|
|
|
|
|
|
|
try {
|
2019-08-19 01:40:31 +01:00
|
|
|
$is_image = $this->isRemoteImage($url, $headers);
|
|
|
|
if ($is_image == true) {
|
2019-08-19 01:40:31 +01:00
|
|
|
$file_size = $this->getRemoteFileSize($url, $headers);
|
2021-02-19 12:10:37 +00:00
|
|
|
if (($file_size!=false) && ($file_size > $this->max_size)) {
|
2019-08-19 01:40:31 +01:00
|
|
|
common_debug("Went to store remote thumbnail of size " . $file_size .
|
2021-02-19 12:10:37 +00:00
|
|
|
" but the upload limit is " . $this->max_size . " so we aborted.");
|
2019-08-19 01:40:31 +01:00
|
|
|
return false;
|
|
|
|
}
|
2019-09-02 16:31:32 +01:00
|
|
|
} else {
|
|
|
|
return false;
|
2019-08-19 01:40:31 +01:00
|
|
|
}
|
|
|
|
} catch (Exception $err) {
|
|
|
|
common_debug("Could not determine size of remote image, aborted local storage.");
|
2021-02-16 18:30:21 +00:00
|
|
|
throw $err;
|
2019-08-19 01:40:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// First we download the file to memory and test whether it's actually an image file
|
|
|
|
// FIXME: To support remote video/whatever files, this needs reworking.
|
|
|
|
common_debug(sprintf(
|
|
|
|
'Downloading remote thumbnail for file id==%u with thumbnail URL: %s',
|
|
|
|
$thumbnail->file_id,
|
|
|
|
$url
|
|
|
|
));
|
2019-09-02 16:31:32 +01:00
|
|
|
try {
|
|
|
|
$imgData = HTTPClient::quickGet($url);
|
|
|
|
if (isset($imgData)) {
|
2019-11-01 11:19:42 +00:00
|
|
|
list($filename, $width, $height) = $this->validateAndWriteImage(
|
|
|
|
$imgData,
|
|
|
|
$url,
|
|
|
|
$headers,
|
|
|
|
$thumbnail->file_id
|
|
|
|
);
|
2019-09-02 16:31:32 +01:00
|
|
|
} else {
|
|
|
|
throw new UnsupportedMediaException('HTTPClient returned an empty result');
|
|
|
|
}
|
2019-11-01 11:19:42 +00:00
|
|
|
} catch (UnsupportedMediaException $e) {
|
2019-09-02 16:31:32 +01:00
|
|
|
// Couldn't find anything that looks like an image, nothing to do
|
|
|
|
common_debug("Embed was not able to find an image for URL `{$url}`: " . $e->getMessage());
|
|
|
|
return false;
|
|
|
|
}
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
2021-02-21 10:35:02 +00:00
|
|
|
// Update our database for the thumbnail record
|
2018-07-18 05:31:24 +01:00
|
|
|
$orig = clone($thumbnail);
|
|
|
|
$thumbnail->filename = $filename;
|
2019-07-23 11:07:47 +01:00
|
|
|
$thumbnail->width = $width;
|
|
|
|
$thumbnail->height = $height;
|
2018-07-18 05:31:24 +01:00
|
|
|
// Throws exception on failure.
|
|
|
|
$thumbnail->updateWithKeys($orig);
|
2019-07-23 11:07:47 +01:00
|
|
|
} catch (Exception $err) {
|
2019-07-14 23:35:11 +01:00
|
|
|
common_log(LOG_ERR, "Went to write a thumbnail entry to the database in " .
|
2021-02-16 18:30:21 +00:00
|
|
|
"EmbedPlugin::storeRemoteThumbnail but encountered error: ".$err);
|
|
|
|
throw $err;
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
|
|
|
return true;
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* Event raised when GNU social polls the plugin for information about it.
|
|
|
|
* Adds this plugin's version information to $versions array
|
|
|
|
*
|
|
|
|
* @param &$versions array inherited from parent
|
|
|
|
* @return bool true hook value
|
|
|
|
*/
|
2019-08-12 15:03:30 +01:00
|
|
|
public function onPluginVersion(array &$versions): bool
|
2014-05-06 22:00:30 +01:00
|
|
|
{
|
2019-07-15 22:08:19 +01:00
|
|
|
$versions[] = ['name' => 'Embed',
|
|
|
|
'version' => self::PLUGIN_VERSION,
|
|
|
|
'author' => 'Mikael Nordfeldth',
|
2019-11-21 00:21:22 +00:00
|
|
|
'homepage' => GNUSOCIAL_ENGINE_URL,
|
2019-07-15 22:08:19 +01:00
|
|
|
'description' =>
|
|
|
|
// TRANS: Plugin description.
|
|
|
|
_m('Plugin for using and representing oEmbed, OpenGraph and other data.')];
|
2014-05-06 22:00:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|