2014-05-06 22:00:30 +01:00
|
|
|
<?php
|
2021-04-19 19:51:05 +01:00
|
|
|
|
|
|
|
// {{{ License
|
2018-07-18 05:31:24 +01:00
|
|
|
// This file is part of GNU social - https://www.gnu.org/software/social
|
|
|
|
//
|
|
|
|
// GNU social is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// GNU social is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with GNU social. If not, see <http://www.gnu.org/licenses/>.
|
2021-04-19 19:51:05 +01:00
|
|
|
// }}}
|
2018-07-18 05:31:24 +01:00
|
|
|
|
|
|
|
/**
|
2019-07-06 04:31:02 +01:00
|
|
|
* OEmbed and OpenGraph implementation for GNU social
|
2018-07-18 05:31:24 +01:00
|
|
|
*
|
|
|
|
* @package GNUsocial
|
2021-04-14 16:27:37 +01:00
|
|
|
*
|
2021-02-19 10:34:21 +00:00
|
|
|
* @author Mikael Nordfeldth
|
2018-07-18 05:31:24 +01:00
|
|
|
* @author Stephen Paul Weber
|
|
|
|
* @author hannes
|
|
|
|
* @author Mikael Nordfeldth
|
2021-02-19 10:34:21 +00:00
|
|
|
* @author Miguel Dantas
|
2021-04-19 19:51:05 +01:00
|
|
|
* @author Diogo Peralta Cordeiro <mail@diogo.site>
|
|
|
|
* @authir Hugo Sales <hugo@hsal.es>
|
|
|
|
*
|
2021-02-19 10:34:21 +00:00
|
|
|
* @copyright 2014-2021 Free Software Foundation, Inc http://www.fsf.org
|
2018-07-18 05:31:24 +01:00
|
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
|
|
|
*/
|
|
|
|
|
2021-04-14 16:27:37 +01:00
|
|
|
namespace Plugin\Embed;
|
2018-07-18 05:31:24 +01:00
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
use App\Core\Cache;
|
|
|
|
use App\Core\DB\DB;
|
|
|
|
use App\Core\Event;
|
|
|
|
use App\Core\HTTPClient;
|
|
|
|
use App\Core\Log;
|
2021-04-19 19:51:05 +01:00
|
|
|
use App\Core\Modules\Plugin;
|
2021-04-25 22:23:46 +01:00
|
|
|
use App\Core\Router\RouteLoader;
|
|
|
|
use App\Core\Router\Router;
|
|
|
|
use App\Entity\Attachment;
|
|
|
|
use App\Util\Exception\DuplicateFoundException;
|
|
|
|
use App\Util\Exception\NotFoundException;
|
|
|
|
use Plugin\Embed\Entity\FileEmbed;
|
|
|
|
use Symfony\Component\HttpFoundation\Request;
|
2019-07-07 13:26:10 +01:00
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
2019-07-06 04:31:02 +01:00
|
|
|
* Base class for the Embed plugin that does most of the heavy lifting to get
|
2018-07-18 05:31:24 +01:00
|
|
|
* and display representations for remote content.
|
|
|
|
*
|
2021-02-19 10:34:21 +00:00
|
|
|
* @copyright 2014-2021 Free Software Foundation, Inc http://www.fsf.org
|
2018-07-18 05:31:24 +01:00
|
|
|
* @license https://www.gnu.org/licenses/agpl.html GNU AGPL v3 or later
|
|
|
|
*/
|
2021-04-19 19:51:05 +01:00
|
|
|
class Embed extends Plugin
|
2014-05-06 22:00:30 +01:00
|
|
|
{
|
2021-04-25 22:23:46 +01:00
|
|
|
/**
|
|
|
|
* Settings which can be set in social.local.yaml
|
|
|
|
* WARNING, these are _regexps_ (slashes added later). Always escape your dots and end ('$') your strings
|
|
|
|
*/
|
|
|
|
public $domain_allowlist = [
|
2019-07-06 04:31:02 +01:00
|
|
|
// hostname => service provider
|
2021-04-14 16:27:37 +01:00
|
|
|
'^i\d*\.ytimg\.com$' => 'YouTube',
|
2019-07-06 04:31:02 +01:00
|
|
|
'^i\d*\.vimeocdn\.com$' => 'Vimeo',
|
|
|
|
];
|
2019-07-06 16:52:30 +01:00
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* This code executes when GNU social creates the page routing, and we hook
|
2019-07-06 04:31:02 +01:00
|
|
|
* on this event to add our action handler for Embed.
|
2018-07-18 05:31:24 +01:00
|
|
|
*
|
|
|
|
* @param $m URLMapper the router that was initialized.
|
2021-04-14 16:27:37 +01:00
|
|
|
*
|
2019-07-12 03:13:40 +01:00
|
|
|
* @throws Exception
|
2021-04-14 16:27:37 +01:00
|
|
|
*
|
|
|
|
* @return void true if successful, the exception object if it isn't.
|
2018-07-18 05:31:24 +01:00
|
|
|
*/
|
2021-04-25 22:23:46 +01:00
|
|
|
public function onAddRoute(RouteLoader $m)
|
2014-05-06 22:00:30 +01:00
|
|
|
{
|
2021-04-25 22:23:46 +01:00
|
|
|
$m->connect('oembed', 'main/oembed', Controller\Embed::class);
|
|
|
|
$m->connect('embed', 'main/embed', Controller\Embed::class);
|
|
|
|
return Event::next;
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* This event executes when GNU social encounters a remote URL we then decide
|
2019-07-07 13:26:10 +01:00
|
|
|
* to interrogate for metadata. Embed gloms onto it to see if we have an
|
2018-07-18 05:31:24 +01:00
|
|
|
* oEmbed endpoint or image to try to represent in the post.
|
|
|
|
*
|
|
|
|
* @param $url string the remote URL we're looking at
|
|
|
|
* @param $dom DOMDocument the document we're getting metadata from
|
|
|
|
* @param $metadata stdClass class representing the metadata
|
2021-04-14 16:27:37 +01:00
|
|
|
*
|
2018-07-18 05:31:24 +01:00
|
|
|
* @return bool true if successful, the exception object if it isn't.
|
|
|
|
*/
|
2021-04-12 03:30:35 +01:00
|
|
|
public function onGetRemoteUrlMetadataFromDom(string $url, DOMDocument $dom, stdClass &$metadata)
|
2015-11-30 01:06:04 +00:00
|
|
|
{
|
|
|
|
try {
|
2021-04-14 16:27:37 +01:00
|
|
|
common_log(LOG_INFO, "Trying to find Embed data for {$url} with 'oscarotero/Embed'");
|
|
|
|
$info = self::create($url);
|
|
|
|
|
|
|
|
$metadata->version = '1.0'; // Yes.
|
|
|
|
$metadata->provider_name = $info->authorName;
|
|
|
|
$metadata->title = $info->title;
|
|
|
|
$metadata->html = common_purify($info->description);
|
|
|
|
$metadata->type = $info->type;
|
|
|
|
$metadata->url = $info->url;
|
2019-07-07 13:26:10 +01:00
|
|
|
$metadata->thumbnail_height = $info->imageHeight;
|
2021-04-14 16:27:37 +01:00
|
|
|
$metadata->thumbnail_width = $info->imageWidth;
|
2019-08-19 01:40:31 +01:00
|
|
|
|
|
|
|
if (substr($info->image, 0, 4) === 'data') {
|
|
|
|
// Inline image
|
2021-04-14 16:27:37 +01:00
|
|
|
$imgData = base64_decode(substr($info->image, stripos($info->image, 'base64,') + 7));
|
|
|
|
list($filename) = $this->validateAndWriteImage($imgData);
|
2019-08-19 01:40:31 +01:00
|
|
|
// Use a file URI for images, as file_embed can't store a filename
|
|
|
|
$metadata->thumbnail_url = 'file://' . File_thumbnail::path($filename);
|
|
|
|
} else {
|
|
|
|
$metadata->thumbnail_url = $info->image;
|
|
|
|
}
|
2019-07-07 13:26:10 +01:00
|
|
|
} catch (Exception $e) {
|
2021-04-14 16:27:37 +01:00
|
|
|
common_log(LOG_INFO, "Failed to find Embed data for {$url} with 'oscarotero/Embed'" .
|
|
|
|
', got exception: ' . get_class($e));
|
2015-11-30 01:06:04 +00:00
|
|
|
}
|
2016-01-28 15:19:29 +00:00
|
|
|
|
2016-02-25 18:46:17 +00:00
|
|
|
if (isset($metadata->thumbnail_url)) {
|
|
|
|
// sometimes sites serve the path, not the full URL, for images
|
|
|
|
// let's "be liberal in what you accept from others"!
|
|
|
|
// add protocol and host if the thumbnail_url starts with /
|
2019-07-14 23:35:11 +01:00
|
|
|
if ($metadata->thumbnail_url[0] == '/') {
|
2021-04-14 16:27:37 +01:00
|
|
|
$thumbnail_url_parsed = parse_url($metadata->url);
|
|
|
|
$metadata->thumbnail_url = "{$thumbnail_url_parsed['scheme']}://" .
|
2021-04-12 03:30:35 +01:00
|
|
|
"{$thumbnail_url_parsed['host']}$metadata->thumbnail_url";
|
2016-02-25 18:46:17 +00:00
|
|
|
}
|
2018-07-18 05:31:24 +01:00
|
|
|
|
2016-02-25 18:46:17 +00:00
|
|
|
// some wordpress opengraph implementations sometimes return a white blank image
|
|
|
|
// no need for us to save that!
|
2018-07-18 05:31:24 +01:00
|
|
|
if ($metadata->thumbnail_url == 'https://s0.wp.com/i/blank.jpg') {
|
2021-04-14 16:27:37 +01:00
|
|
|
$metadata->thumbnail_url = null;
|
2016-02-25 18:46:17 +00:00
|
|
|
}
|
2016-01-28 15:19:29 +00:00
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
// FIXME: this is also true of locally-installed wordpress so we should watch out for that.
|
|
|
|
}
|
|
|
|
return true;
|
2015-11-30 01:06:04 +00:00
|
|
|
}
|
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
/**
|
|
|
|
* Insert oembed and opengraph tags in all HTML head elements
|
|
|
|
*/
|
|
|
|
public function onShowHeadElements(Request $request, array $result)
|
2014-05-06 22:00:30 +01:00
|
|
|
{
|
2021-04-25 22:23:46 +01:00
|
|
|
$matches = [];
|
|
|
|
preg_match(',/?([^/]+)/?.*,', $request->getPathInfo(), $matches);
|
|
|
|
switch ($matches[1]) {
|
|
|
|
case 'attachment':
|
|
|
|
$url = "{$matches[1]}/{$matches[2]}";
|
|
|
|
break;
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
|
2019-07-14 23:35:11 +01:00
|
|
|
if (isset($url)) {
|
|
|
|
foreach (['xml', 'json'] as $format) {
|
2021-04-25 22:23:46 +01:00
|
|
|
$result[] = [
|
|
|
|
'link' => [
|
2021-04-14 16:27:37 +01:00
|
|
|
'rel' => 'alternate',
|
|
|
|
'type' => "application/{$format}+oembed",
|
2021-04-25 22:23:46 +01:00
|
|
|
'href' => Router::url('embed', ['format' => $format, 'url' => $url]),
|
2021-04-14 16:27:37 +01:00
|
|
|
'title' => 'oEmbed',
|
2021-04-25 22:23:46 +01:00
|
|
|
], ];
|
2019-07-14 23:35:11 +01:00
|
|
|
}
|
|
|
|
}
|
2021-04-25 22:23:46 +01:00
|
|
|
return Event::next;
|
2016-03-16 23:31:45 +00:00
|
|
|
}
|
|
|
|
|
2014-05-06 22:00:30 +01:00
|
|
|
/**
|
2021-04-25 22:23:46 +01:00
|
|
|
* Save embedding information for an Attachment, if applicable.
|
2014-05-06 22:00:30 +01:00
|
|
|
*
|
|
|
|
* Normally this event is called through File::saveNew()
|
|
|
|
*
|
2021-04-25 22:23:46 +01:00
|
|
|
* @param Attachment $attachment The newly inserted Attachment object.
|
2014-05-06 22:00:30 +01:00
|
|
|
*
|
2021-04-14 16:27:37 +01:00
|
|
|
* @return bool success
|
2014-05-06 22:00:30 +01:00
|
|
|
*/
|
2021-04-25 22:23:46 +01:00
|
|
|
public function onAttachmentStoreNew(Attachment $attachment)
|
2014-05-06 22:00:30 +01:00
|
|
|
{
|
2021-04-25 22:23:46 +01:00
|
|
|
try {
|
|
|
|
DB::findOneBy('attachment_embed', ['attachment_id' => $attachment->getId()]);
|
|
|
|
} catch (NotFoundException) {
|
|
|
|
} catch (DuplicateFoundException) {
|
|
|
|
Log::warning("Strangely, an attachment_embed object exists for new file {$attachment->getID()}");
|
|
|
|
return Event::next;
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
if (!is_null($attachment->getRemoteUrl()) || (!is_null($mimetype = $attachment->getMimetype()) && (('text/html' === substr($mimetype, 0, 9) || 'application/xhtml+xml' === substr($mimetype, 0, 21))))) {
|
2014-05-06 22:00:30 +01:00
|
|
|
try {
|
2021-04-25 22:23:46 +01:00
|
|
|
$embed_data = EmbedHelper::getEmbed($attachment->getRemoteUrl());
|
|
|
|
dd($embed_data);
|
2019-07-06 04:31:02 +01:00
|
|
|
if ($embed_data === false) {
|
2021-04-25 22:23:46 +01:00
|
|
|
throw new Exception("Did not get Embed data from URL {$attachment->url}");
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
2021-04-25 22:23:46 +01:00
|
|
|
$attachment->setTitle($embed_data['title']);
|
2014-05-06 22:00:30 +01:00
|
|
|
} catch (Exception $e) {
|
2021-04-25 22:23:46 +01:00
|
|
|
Log::warning($e);
|
2014-05-06 22:00:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
FileEmbed::saveNew($embed_data, $attachment->getId());
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
/**
|
|
|
|
* Replace enclosure representation of an attachment with the data from embed
|
|
|
|
*
|
|
|
|
* @param mixed $enclosure
|
|
|
|
*/
|
|
|
|
public function onFileEnclosureMetadata(Attachment $attachment, &$enclosure)
|
2014-05-06 22:00:30 +01:00
|
|
|
{
|
|
|
|
// Never treat generic HTML links as an enclosure type!
|
2019-07-06 04:31:02 +01:00
|
|
|
// But if we have embed info, we'll consider it golden.
|
2021-04-25 22:23:46 +01:00
|
|
|
try {
|
|
|
|
$embed = DB::findOneBy('attachment_embed', ['attachment_id' => $attachment->getId()]);
|
|
|
|
} catch (NotFoundException) {
|
|
|
|
return Event::next;
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
|
2019-07-14 23:35:11 +01:00
|
|
|
foreach (['mimetype', 'url', 'title', 'modified', 'width', 'height'] as $key) {
|
2019-07-06 04:31:02 +01:00
|
|
|
if (isset($embed->{$key}) && !empty($embed->{$key})) {
|
|
|
|
$enclosure->{$key} = $embed->{$key};
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2016-03-16 23:31:45 +00:00
|
|
|
|
2021-04-14 16:27:37 +01:00
|
|
|
/** Placeholder */
|
2021-04-25 22:23:46 +01:00
|
|
|
public function onShowAttachment(Attachment $attachment, array &$res)
|
2016-03-16 23:31:45 +00:00
|
|
|
{
|
|
|
|
try {
|
2021-04-25 22:23:46 +01:00
|
|
|
$embed = Cache::get('attachment-embed-' . $attachment->getId(),
|
|
|
|
fn () => DB::findOneBy('attachment_embed', ['attachment_id' => $attachment->getId()]));
|
|
|
|
} catch (DuplicateFoundException $e) {
|
|
|
|
Log::waring($e);
|
|
|
|
return Event::next;
|
|
|
|
} catch (NotFoundException) {
|
|
|
|
return Event::next;
|
2016-03-16 23:31:45 +00:00
|
|
|
}
|
2021-04-25 22:23:46 +01:00
|
|
|
if (is_null($embed) && empty($embed->getAuthorName()) && empty($embed->getProvider())) {
|
|
|
|
return Event::next;
|
2016-03-22 13:02:36 +00:00
|
|
|
}
|
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
$thumbnail = AttachmentThumbnail::getOrCreate(attachment: $attachment, width: $width, height: $height, crop: $smart_crop);
|
|
|
|
$attributes = $thumbnail->getHTMLAttributes(['class' => 'u-photo embed']);
|
|
|
|
|
|
|
|
$res[] = Formatting::twigRender(<<<END
|
|
|
|
<article class="h-entry embed">
|
|
|
|
<header>
|
|
|
|
<img class="u-photo embed" width="{{attributes['width']}}" height="{{attributes['height']}}" src="{{attributes['src']}}" />
|
|
|
|
<h5 class="p-name embed">
|
|
|
|
<a class="u-url" href="{{attachment.getUrl()}}">{{embed.getTitle() | escape}}</a>
|
|
|
|
</h5>
|
|
|
|
<div class="p-author embed">
|
|
|
|
{% if embed.getAuthorName() is not null %}
|
|
|
|
<div class="fn vcard author">
|
|
|
|
{% if embed.getAuthorUrl() is null %}
|
|
|
|
<p>{{embed.getAuthorName()}}</p>
|
|
|
|
{% else %}
|
|
|
|
<a href="{{embed.getAuthorUrl()}}" class="url">{{embed.getAuthorName()}}</a>
|
|
|
|
{% endif %}
|
|
|
|
</div>
|
|
|
|
{% endif %}
|
|
|
|
{% if embed.getProvider() is not null %}
|
|
|
|
<div class="fn vcard">
|
|
|
|
{% if embed.getProviderUrl() is null %}
|
|
|
|
<p>{{embed.getProvider()}}</p>
|
|
|
|
{% else %}
|
|
|
|
<a href="{{embed.getProviderUrl()}}" class="url">{{embed.getProvider()}}</a>
|
|
|
|
{% endif %}
|
|
|
|
</div>
|
|
|
|
{% endif %}
|
|
|
|
</div>
|
|
|
|
</header>
|
|
|
|
<div class="p-summary embed">
|
|
|
|
{{ embed.getHtml() | escape }}
|
|
|
|
</div>
|
|
|
|
</article>
|
|
|
|
END, ['embed' => $embed, 'thumbnail' => $thumbnail, 'attributes' => $attributes]);
|
|
|
|
|
|
|
|
return Event::stop;
|
2014-05-06 22:00:30 +01:00
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
2021-04-14 16:27:37 +01:00
|
|
|
* @throws ServerException if check is made but fails
|
|
|
|
*
|
|
|
|
* @return bool false on no check made, provider name on success
|
2015-01-25 01:34:40 +00:00
|
|
|
*/
|
2021-04-25 22:23:46 +01:00
|
|
|
protected function checkAllowlist(string $url)
|
2015-01-25 01:34:40 +00:00
|
|
|
{
|
2021-04-25 22:23:46 +01:00
|
|
|
if (!$this->check_allowlist) {
|
2015-01-25 01:34:40 +00:00
|
|
|
return false; // indicates "no check made"
|
|
|
|
}
|
|
|
|
|
|
|
|
$host = parse_url($url, PHP_URL_HOST);
|
2021-04-25 22:23:46 +01:00
|
|
|
foreach ($this->domain_allowlist as $regex => $provider) {
|
2021-04-14 16:27:37 +01:00
|
|
|
if (preg_match("/{$regex}/", $host)) {
|
2015-01-25 10:18:57 +00:00
|
|
|
return $provider; // we trust this source, return provider name
|
|
|
|
}
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
throw new ServerException(_m('Domain not in remote thumbnail source allowlist: {host}', ['host' => $host]));
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
|
|
|
* Check the file size of a remote file using a HEAD request and checking
|
|
|
|
* the content-length variable returned. This isn't 100% foolproof but is
|
|
|
|
* reliable enough for our purposes.
|
|
|
|
*
|
2021-04-25 22:23:46 +01:00
|
|
|
* @param string $url
|
|
|
|
* @param array $headers - if we already made a request
|
2021-04-14 16:27:37 +01:00
|
|
|
*
|
|
|
|
* @return bool|string the file size if it succeeds, false otherwise.
|
2018-07-18 05:31:24 +01:00
|
|
|
*/
|
2021-04-25 22:23:46 +01:00
|
|
|
private function getRemoteFileSize(string $url, ?array $headers = null): ?int
|
2015-01-25 01:34:40 +00:00
|
|
|
{
|
2018-07-18 05:31:24 +01:00
|
|
|
try {
|
2019-07-14 23:35:11 +01:00
|
|
|
if ($headers === null) {
|
2021-04-25 22:23:46 +01:00
|
|
|
if (!Common::isValidHttpUrl($url)) {
|
|
|
|
Log::error('Invalid URL in Embed::getRemoteFileSize()');
|
2018-07-18 05:31:24 +01:00
|
|
|
return false;
|
|
|
|
}
|
2021-04-25 22:23:46 +01:00
|
|
|
$head = HTTPClient::head($url);
|
|
|
|
$headers = $head->getHeaders();
|
2019-07-14 23:56:31 +01:00
|
|
|
$headers = array_change_key_case($headers, CASE_LOWER);
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
2021-04-12 03:30:35 +01:00
|
|
|
return $headers['content-length'] ?? false;
|
2021-04-25 22:23:46 +01:00
|
|
|
} catch (Exception $e) {
|
|
|
|
Loog::error($e);
|
2018-07-18 05:31:24 +01:00
|
|
|
return false;
|
2015-01-25 01:34:40 +00:00
|
|
|
}
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
2015-01-25 01:34:40 +00:00
|
|
|
|
2018-07-18 05:31:24 +01:00
|
|
|
/**
|
2021-04-25 22:23:46 +01:00
|
|
|
* A private helper function that uses a HEAD request to check the mime type
|
2018-07-18 05:31:24 +01:00
|
|
|
* of a remote URL to see it it's an image.
|
|
|
|
*
|
2021-04-14 16:27:37 +01:00
|
|
|
* @param mixed $url
|
|
|
|
* @param null|mixed $headers
|
|
|
|
*
|
2018-07-18 05:31:24 +01:00
|
|
|
* @return bool true if the remote URL is an image, or false otherwise.
|
|
|
|
*/
|
2021-04-25 22:23:46 +01:00
|
|
|
private function isRemoteImage(string $url, ?array $headers = null): ?int
|
2018-07-18 05:31:24 +01:00
|
|
|
{
|
2021-04-25 22:23:46 +01:00
|
|
|
try {
|
|
|
|
if ($headers === null) {
|
|
|
|
if (!Common::isValidHttpUrl($url)) {
|
|
|
|
Log::error('Invalid URL in Embed::getRemoteFileSize()');
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
$head = HTTPClient::head($url);
|
|
|
|
$headers = $head->getHeaders();
|
|
|
|
$headers = array_change_key_case($headers, CASE_LOWER);
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
2021-04-25 22:23:46 +01:00
|
|
|
return !empty($headers['content-type']) && GSFile::mimetypeMajor($headers['content-type']) === 'image';
|
|
|
|
} catch (Exception $e) {
|
|
|
|
Loog::error($e);
|
|
|
|
return false;
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2021-04-25 22:23:46 +01:00
|
|
|
* Validate that $imgData is a valid image, place it in it's folder and resize
|
2018-07-18 05:31:24 +01:00
|
|
|
*
|
2021-04-25 22:23:46 +01:00
|
|
|
* @param $imgData - The image data to validate
|
2021-04-14 16:27:37 +01:00
|
|
|
* @param null|string $url - The url where the image came from, to fetch metadata
|
|
|
|
* @param null|array $headers - The headers possible previous request to $url
|
2018-07-18 05:31:24 +01:00
|
|
|
*/
|
2021-04-25 22:23:46 +01:00
|
|
|
protected function validateAndWriteImage($imgData, string $url, array $headers): array
|
2018-07-18 05:31:24 +01:00
|
|
|
{
|
2021-04-25 22:23:46 +01:00
|
|
|
$file = new TemporaryFile();
|
|
|
|
$file->write($imgData);
|
2016-02-25 21:31:45 +00:00
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
if (array_key_exists('content-disposition', $headers) && preg_match('/^.+; filename="(.+?)"$/', $headers['content-disposition'], $matches) === 1) {
|
|
|
|
$original_name = $matches[1];
|
2021-04-12 03:30:35 +01:00
|
|
|
}
|
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
$mimetype = $headers['content-type'];
|
|
|
|
Event::handle('AttachmentValidation', [$file, &$mimetype]);
|
2019-07-23 11:07:47 +01:00
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
$hash = hash_file(Attachment::FILEHASH_ALGO, $file->getPathname());
|
|
|
|
$filename = Common::config('attachments', 'dir') . "embed/{$hash}";
|
|
|
|
$file->commit($filename);
|
|
|
|
unset($file);
|
2019-08-19 01:40:31 +01:00
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
return [$filename, $width, $height, $original_name, $mimetype];
|
2019-08-19 01:40:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function to create and store a thumbnail representation of a remote image
|
|
|
|
*
|
2021-04-25 22:23:46 +01:00
|
|
|
* @param $thumbnail FileThumbnail object containing the file thumbnail
|
2021-04-14 16:27:37 +01:00
|
|
|
*
|
2019-08-19 01:40:31 +01:00
|
|
|
* @return bool true if it succeeded, the exception if it fails, or false if it
|
2021-04-14 16:27:37 +01:00
|
|
|
* is limited by system limits (ie the file is too large.)
|
2019-08-19 01:40:31 +01:00
|
|
|
*/
|
2021-04-25 22:23:46 +01:00
|
|
|
protected function storeRemoteThumbnail(Attachment $attachment): bool
|
2019-08-19 01:40:31 +01:00
|
|
|
{
|
2021-04-25 22:23:46 +01:00
|
|
|
$path = $attachment->getPath();
|
|
|
|
if (file_exists($path)) {
|
|
|
|
throw new AlreadyFulfilledException(_m('A thumbnail seems to already exist for remote file with id=={id}', ['id' => $attachment->id]));
|
2019-08-19 01:40:31 +01:00
|
|
|
}
|
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
$url = $attachment->getRemoteUrl();
|
2019-08-19 01:40:31 +01:00
|
|
|
|
|
|
|
if (substr($url, 0, 7) == 'file://') {
|
|
|
|
$filename = substr($url, 7);
|
2021-04-14 16:27:37 +01:00
|
|
|
$info = getimagesize($filename);
|
2019-08-19 01:40:31 +01:00
|
|
|
$filename = basename($filename);
|
2021-04-14 16:27:37 +01:00
|
|
|
$width = $info[0];
|
|
|
|
$height = $info[1];
|
2019-08-19 01:40:31 +01:00
|
|
|
} else {
|
2021-04-25 22:23:46 +01:00
|
|
|
$this->checkAllowlist($url);
|
|
|
|
$head = HTTPClient::head($url);
|
|
|
|
$headers = $head->getHeaders();
|
2019-08-19 01:40:31 +01:00
|
|
|
$headers = array_change_key_case($headers, CASE_LOWER);
|
|
|
|
|
|
|
|
try {
|
2019-08-19 01:40:31 +01:00
|
|
|
$is_image = $this->isRemoteImage($url, $headers);
|
|
|
|
if ($is_image == true) {
|
2019-08-19 01:40:31 +01:00
|
|
|
$file_size = $this->getRemoteFileSize($url, $headers);
|
2021-04-25 22:23:46 +01:00
|
|
|
$max_size = Common::config('attachments', 'file_quota');
|
|
|
|
if (($file_size != false) && ($file_size > $max_size)) {
|
|
|
|
Log::debug("Wanted to store remote thumbnail of size {$file_size} but the upload limit is {$max_size} so we aborted.");
|
2019-08-19 01:40:31 +01:00
|
|
|
return false;
|
|
|
|
}
|
2019-09-02 16:31:32 +01:00
|
|
|
} else {
|
|
|
|
return false;
|
2019-08-19 01:40:31 +01:00
|
|
|
}
|
|
|
|
} catch (Exception $err) {
|
2021-04-25 22:23:46 +01:00
|
|
|
Log::debug('Could not determine size of remote image, aborted local storage.');
|
2021-02-16 18:30:21 +00:00
|
|
|
throw $err;
|
2019-08-19 01:40:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// First we download the file to memory and test whether it's actually an image file
|
2021-04-25 22:23:46 +01:00
|
|
|
Log::debug("Downloading remote thumbnail for file id=={$attachment->id} with thumbnail URL: {$url}");
|
2019-09-02 16:31:32 +01:00
|
|
|
try {
|
2021-04-25 22:23:46 +01:00
|
|
|
$imgData = HTTPClient::get($url);
|
2019-09-02 16:31:32 +01:00
|
|
|
if (isset($imgData)) {
|
2021-04-25 22:23:46 +01:00
|
|
|
[$filename, $width, $height, $original_name, $mimetype] = $this->validateAndWriteImage($imgData, $url, $headers);
|
2019-09-02 16:31:32 +01:00
|
|
|
} else {
|
2021-04-25 22:23:46 +01:00
|
|
|
throw new UnsupportedMediaException(_m('HTTPClient returned an empty result'));
|
2019-09-02 16:31:32 +01:00
|
|
|
}
|
2019-11-01 11:19:42 +00:00
|
|
|
} catch (UnsupportedMediaException $e) {
|
2019-09-02 16:31:32 +01:00
|
|
|
// Couldn't find anything that looks like an image, nothing to do
|
2021-04-25 22:23:46 +01:00
|
|
|
Log::debug($e);
|
2019-09-02 16:31:32 +01:00
|
|
|
return false;
|
|
|
|
}
|
2018-07-18 05:31:24 +01:00
|
|
|
}
|
|
|
|
|
2021-04-25 22:23:46 +01:00
|
|
|
DB::persist(AttachmentThumbnail::create(['attachment_id' => $attachment->id, 'width' => $width, 'height' => $height]));
|
|
|
|
$attachment->setFilename($filename);
|
|
|
|
DB::flush();
|
2015-01-25 01:34:40 +00:00
|
|
|
|
2014-05-06 22:00:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|