89 self::EMPTY_FILE =>
'empty-file',
90 self::FILE_TOO_LARGE =>
'file-too-large',
91 self::FILETYPE_MISSING =>
'filetype-missing',
92 self::FILETYPE_BADTYPE =>
'filetype-banned',
93 self::MIN_LENGTH_PARTNAME =>
'filename-tooshort',
94 self::ILLEGAL_FILENAME =>
'illegal-filename',
95 self::OVERWRITE_EXISTING_FILE =>
'overwrite',
96 self::VERIFICATION_ERROR =>
'verification-error',
97 self::HOOK_ABORTED =>
'hookaborted',
98 self::WINDOWS_NONASCII_FILENAME =>
'windows-nonascii-filename',
99 self::FILENAME_TOO_LONG =>
'filename-toolong',
101 if ( isset( $code_to_status[$error] ) ) {
102 return $code_to_status[$error];
105 return 'unknown-error';
120 # Check php's file_uploads setting
133 foreach ( [
'upload',
'edit' ] as $permission ) {
134 if ( !$user->isAllowed( $permission ) ) {
149 return $user->pingLimiter(
'upload' );
174 Hooks::run(
'UploadCreateFromRequest', [
$type, &$className ] );
175 if ( is_null( $className ) ) {
176 $className =
'UploadFrom' .
$type;
177 wfDebug( __METHOD__ .
": class name: $className\n" );
178 if ( !in_array(
$type, self::$uploadHandlers ) ) {
184 if ( !call_user_func( [ $className,
'isEnabled' ] ) ) {
189 if ( !call_user_func( [ $className,
'isValidRequest' ],
$request ) ) {
232 $this->mDesiredDestName =
$name;
234 throw new MWException( __METHOD__ .
" given storage path `$tempPath`." );
238 $this->mRemoveTempFile = $removeTempFile;
253 $this->mTempPath = $tempPath;
254 $this->mFileSize = $fileSize ?:
null;
255 if ( strlen( $this->mTempPath ) && file_exists( $this->mTempPath ) ) {
256 $this->tempFileObj =
new TempFSFile( $this->mTempPath );
258 $this->mFileSize = filesize( $this->mTempPath );
261 $this->tempFileObj =
null;
270 return Status::newGood();
278 return empty( $this->mFileSize );
303 if ( $repo->isVirtualUrl( $srcPath ) ) {
307 $tmpFile = $repo->getLocalCopy( $srcPath );
309 $tmpFile->bind( $this );
311 $path = $tmpFile ? $tmpFile->getPath() :
false;
335 if ( $this->mFileSize > $maxSize ) {
348 if ( $verification !==
true ) {
351 'details' => $verification
359 if ( $result !==
true ) {
364 if ( !Hooks::run(
'UploadVerification',
365 [ $this->mDestName, $this->mTempPath, &$error ],
'1.28' )
381 if ( is_null( $nt ) ) {
383 if ( $this->mTitleError == self::ILLEGAL_FILENAME ) {
386 if ( $this->mTitleError == self::FILETYPE_BADTYPE ) {
388 if ( count( $this->mBlackListedExtensions ) ) {
412 wfDebug(
"mime: <$mime> extension: <{$this->mFinalExtension}>\n" );
415 return [
'filetype-badmime',
$mime ];
418 # Check what Internet Explorer would detect
419 $fp = fopen( $this->mTempPath,
'rb' );
420 $chunk = fread( $fp, 256 );
423 $magic = MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer();
424 $extMime = $magic->guessTypesForExtension( $this->mFinalExtension );
425 $ieTypes = $magic->getIEMimeTypes( $this->mTempPath, $chunk, $extMime );
426 foreach ( $ieTypes as $ieType ) {
428 return [
'filetype-bad-ie-mime', $ieType ];
450 $this->mFileProps = $mwProps->getPropsFromPath( $this->mTempPath, $this->mFinalExtension );
451 $mime = $this->mFileProps[
'mime'];
454 # XXX: Missing extension will be caught by validateName() via getTitle()
455 if ( $this->mFinalExtension !=
'' && !$this->
verifyExtension(
$mime, $this->mFinalExtension ) ) {
460 # check for htmlish code and javascript
462 if ( $this->mFinalExtension ==
'svg' ||
$mime ==
'image/svg+xml' ) {
464 if ( $svgStatus !==
false ) {
472 $handlerStatus =
$handler->verifyUpload( $this->mTempPath );
473 if ( !$handlerStatus->isOK() ) {
474 $errors = $handlerStatus->getErrorsArray();
476 return reset( $errors );
481 Hooks::run(
'UploadVerifyFile', [ $this,
$mime, &$error ] );
482 if ( $error !==
true ) {
483 if ( !is_array( $error ) ) {
489 wfDebug( __METHOD__ .
": all clear; passing.\n" );
505 # getTitle() sets some internal parameters like $this->mFinalExtension
509 $this->mFileProps = $mwProps->getPropsFromPath( $this->mTempPath, $this->mFinalExtension );
511 # check MIME type, if desired
512 $mime = $this->mFileProps[
'file-mime'];
518 # check for htmlish code and javascript
520 if ( self::detectScript( $this->mTempPath,
$mime, $this->mFinalExtension ) ) {
521 return [
'uploadscripted' ];
523 if ( $this->mFinalExtension ==
'svg' ||
$mime ==
'image/svg+xml' ) {
525 if ( $svgStatus !==
false ) {
531 # Check for Java applets, which if uploaded can bypass cross-site
534 $this->mJavaDetected =
false;
536 [ $this,
'zipEntryCallback' ] );
537 if ( !$zipStatus->isOK() ) {
538 $errors = $zipStatus->getErrorsArray();
539 $error = reset( $errors );
540 if ( $error[0] !==
'zip-wrong-format' ) {
544 if ( $this->mJavaDetected ) {
545 return [
'uploadjava' ];
549 # Scan the uploaded file for viruses
552 return [
'uploadvirus', $virus ];
564 $names = [ $entry[
'name'] ];
571 $nullPos = strpos( $entry[
'name'],
"\000" );
572 if ( $nullPos !==
false ) {
573 $names[] = substr( $entry[
'name'], 0, $nullPos );
578 if ( preg_grep(
'!\.class/?$!', $names ) ) {
579 $this->mJavaDetected =
true;
613 if ( is_null( $nt ) ) {
616 $permErrors = $nt->getUserPermissionsErrors(
'edit', $user );
617 $permErrorsUpload = $nt->getUserPermissionsErrors(
'upload', $user );
618 if ( !$nt->exists() ) {
619 $permErrorsCreate = $nt->getUserPermissionsErrors(
'create', $user );
621 $permErrorsCreate = [];
623 if ( $permErrors || $permErrorsUpload || $permErrorsCreate ) {
624 $permErrors = array_merge( $permErrors,
wfArrayDiff2( $permErrorsUpload, $permErrors ) );
625 $permErrors = array_merge( $permErrors,
wfArrayDiff2( $permErrorsCreate, $permErrors ) );
631 if ( $overwriteError !==
true ) {
632 return [ $overwriteError ];
649 $localFile->load( File::READ_LATEST );
650 $filename = $localFile->getName();
653 $badFileName = $this->
checkBadFileName( $filename, $this->mDesiredDestName );
654 if ( $badFileName !==
null ) {
655 $warnings[
'badfilename'] = $badFileName;
659 if ( $unwantedFileExtensionDetails !==
null ) {
660 $warnings[
'filetype-unwanted-type'] = $unwantedFileExtensionDetails;
663 $fileSizeWarnings = $this->
checkFileSize( $this->mFileSize );
664 if ( $fileSizeWarnings ) {
665 $warnings = array_merge( $warnings, $fileSizeWarnings );
669 if ( $localFileExistsWarnings ) {
670 $warnings = array_merge( $warnings, $localFileExistsWarnings );
674 $warnings[
'was-deleted'] = $filename;
679 $ignoreLocalDupes = isset( $warnings[
'exists '] );
682 $warnings[
'duplicate'] = $dupes;
686 if ( $archivedDupes !==
null ) {
687 $warnings[
'duplicate-archive'] = $archivedDupes;
703 $comparableName = str_replace(
' ',
'_', $desiredFileName );
704 $comparableName = Title::capitalize( $comparableName,
NS_FILE );
706 if ( $desiredFileName != $filename && $comparableName != $filename ) {
729 $wgLang->commaList( $extensions ),
752 if ( $fileSize == 0 ) {
753 $warnings[
'empty-file'] =
true;
769 if ( $exists !==
false ) {
770 $warnings[
'exists'] = $exists;
773 if ( $hash === $localFile->getSha1() ) {
774 $warnings[
'no-change'] = $localFile;
778 $history = $localFile->getHistory();
779 foreach ( $history as $oldFile ) {
780 if ( $hash === $oldFile->getSha1() ) {
781 $warnings[
'duplicate-version'][] = $oldFile;
790 return $localFile->wasDeleted() && !$localFile->exists();
802 foreach ( $dupes as $key => $dupe ) {
806 $title->equals( $dupe->getTitle() )
808 unset( $dupes[$key] );
823 if ( $archivedFile->getID() > 0 ) {
825 return $archivedFile->getName();
847 public function performUpload( $comment, $pageText, $watch, $user, $tags = [] ) {
852 Hooks::run(
'UploadVerifyUpload', [ $this, $user, $props, $comment, $pageText, &$error ] );
854 if ( !is_array( $error ) ) {
857 return call_user_func_array(
'Status::newFatal', $error );
881 Hooks::run(
'UploadComplete', [ &$uploadBase ] );
904 if ( $this->mTitle !==
false ) {
907 if ( !is_string( $this->mDesiredDestName ) ) {
909 $this->mTitle =
null;
916 $title = Title::newFromText( $this->mDesiredDestName );
917 if ( $title && $title->getNamespace() ==
NS_FILE ) {
918 $this->mFilteredName = $title->getDBkey();
923 # oi_archive_name is max 255 bytes, which include a timestamp and an
924 # exclamation mark, so restrict file name to 240 bytes.
925 if ( strlen( $this->mFilteredName ) > 240 ) {
927 $this->mTitle =
null;
939 $nt = Title::makeTitleSafe(
NS_FILE, $this->mFilteredName );
940 if ( is_null( $nt ) ) {
942 $this->mTitle =
null;
946 $this->mFilteredName = $nt->getDBkey();
954 if ( count(
$ext ) ) {
955 $this->mFinalExtension = trim(
$ext[count(
$ext ) - 1] );
957 $this->mFinalExtension =
'';
959 # No extension, try guessing one
960 $magic = MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer();
961 $mime = $magic->guessMimeType( $this->mTempPath );
962 if (
$mime !==
'unknown/unknown' ) {
963 # Get a space separated list of extensions
964 $extList = $magic->getExtensionsForType(
$mime );
966 # Set the extension to the canonical extension
967 $this->mFinalExtension = strtok( $extList,
' ' );
969 # Fix up the other variables
970 $this->mFilteredName .=
".{$this->mFinalExtension}";
971 $nt = Title::makeTitleSafe(
NS_FILE, $this->mFilteredName );
983 if ( $this->mFinalExtension ==
'' ) {
985 $this->mTitle =
null;
988 } elseif ( $blackListedExtensions ||
992 $this->mBlackListedExtensions = $blackListedExtensions;
994 $this->mTitle =
null;
1000 if ( !preg_match(
'/^[\x0-\x7f]*$/', $nt->getText() )
1004 $this->mTitle =
null;
1009 # If there was more than one "extension", reassemble the base
1010 # filename to prevent bogus complaints about length
1011 if ( count(
$ext ) > 1 ) {
1012 $iterations = count(
$ext ) - 1;
1013 for ( $i = 0; $i < $iterations; $i++ ) {
1014 $partname .=
'.' .
$ext[$i];
1018 if ( strlen( $partname ) < 1 ) {
1020 $this->mTitle =
null;
1025 $this->mTitle = $nt;
1036 if ( is_null( $this->mLocalFile ) ) {
1038 $this->mLocalFile = is_null( $nt ) ? null :
wfLocalFile( $nt );
1063 if ( !$isPartial ) {
1066 return call_user_func_array(
'Status::newFatal', $error );
1071 return Status::newGood( $file );
1073 return Status::newFatal(
'uploadstash-exception', get_class(
$e ),
$e->getMessage() );
1084 Hooks::run(
'UploadStashFile', [ $this, $user, $props, &$error ] );
1086 if ( !is_array( $error ) ) {
1087 $error = [ $error ];
1124 $file = $stash->stashFile( $this->mTempPath, $this->
getSourceType() );
1125 $this->mStashFile = $file;
1158 if ( $this->mRemoveTempFile && $this->tempFileObj ) {
1160 wfDebug( __METHOD__ .
": Marked temporary file '{$this->mTempPath}' for removal\n" );
1161 $this->tempFileObj->autocollect();
1179 $bits = explode(
'.', $filename );
1180 $basename = array_shift( $bits );
1182 return [ $basename, $bits ];
1194 return in_array( strtolower(
$ext ), $list );
1206 return array_intersect( array_map(
'strtolower',
$ext ), $list );
1217 $magic = MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer();
1220 if ( !$magic->isRecognizableExtension( $extension ) ) {
1221 wfDebug( __METHOD__ .
": passing file with unknown detected mime type; " .
1222 "unrecognized extension '$extension', can't verify\n" );
1226 wfDebug( __METHOD__ .
": rejecting file with unknown detected mime type; " .
1227 "recognized extension '$extension', so probably invalid file\n" );
1233 $match = $magic->isMatchingExtension( $extension,
$mime );
1235 if ( $match ===
null ) {
1236 if ( $magic->getTypesForExtension( $extension ) !==
null ) {
1237 wfDebug( __METHOD__ .
": No extension known for $mime, but we know a mime for $extension\n" );
1241 wfDebug( __METHOD__ .
": no file extension known for mime type $mime, passing file\n" );
1245 } elseif ( $match ===
true ) {
1246 wfDebug( __METHOD__ .
": mime type $mime matches extension $extension, passing file\n" );
1252 .
": mime type $mime mismatches file extension $extension, rejecting file\n" );
1272 # ugly hack: for text files, always look at the entire file.
1273 # For binary field, just check the first K.
1275 if ( strpos(
$mime,
'text/' ) === 0 ) {
1276 $chunk = file_get_contents( $file );
1278 $fp = fopen( $file,
'rb' );
1279 $chunk = fread( $fp, 1024 );
1283 $chunk = strtolower( $chunk );
1289 # decode from UTF-16 if needed (could be used for obfuscation).
1290 if ( substr( $chunk, 0, 2 ) ==
"\xfe\xff" ) {
1292 } elseif ( substr( $chunk, 0, 2 ) ==
"\xff\xfe" ) {
1299 $chunk = iconv( $enc,
"ASCII//IGNORE", $chunk );
1302 $chunk = trim( $chunk );
1305 wfDebug( __METHOD__ .
": checking for embedded scripts and HTML stuff\n" );
1307 # check for HTML doctype
1308 if ( preg_match(
"/<!DOCTYPE *X?HTML/i", $chunk ) ) {
1314 if ( $extension ==
'svg' || strpos(
$mime,
'image/svg' ) === 0 ) {
1315 if ( self::checkXMLEncodingMissmatch( $file ) ) {
1339 '<html', # also in safari
1342 '<script', # also in safari
1350 foreach ( $tags as $tag ) {
1351 if (
false !== strpos( $chunk, $tag ) ) {
1352 wfDebug( __METHOD__ .
": found something that may make it be mistaken for html: $tag\n" );
1362 # resolve entity-refs to look at attributes. may be harsh on big files... cache result?
1363 $chunk = Sanitizer::decodeCharReferences( $chunk );
1365 # look for script-types
1366 if ( preg_match(
'!type\s*=\s*[\'"]?\s*(?:\w*/)?(?:ecma|java)!sim', $chunk ) ) {
1367 wfDebug( __METHOD__ .
": found script types\n" );
1372 # look for html-style script-urls
1373 if ( preg_match(
'!(?:href|src|data)\s*=\s*[\'"]?\s*(?:ecma|java)script:!sim', $chunk ) ) {
1374 wfDebug( __METHOD__ .
": found html-style script urls\n" );
1379 # look for css-style script-urls
1380 if ( preg_match(
'!url\s*\(\s*[\'"]?\s*(?:ecma|java)script:!sim', $chunk ) ) {
1381 wfDebug( __METHOD__ .
": found css-style script urls\n" );
1386 wfDebug( __METHOD__ .
": no scripts found\n" );
1401 $encodingRegex =
'!encoding[ \t\n\r]*=[ \t\n\r]*[\'"](.*?)[\'"]!si';
1403 if ( preg_match(
"!<\?xml\b(.*?)\?>!si", $contents,
$matches ) ) {
1404 if ( preg_match( $encodingRegex,
$matches[1], $encMatch )
1405 && !in_array( strtoupper( $encMatch[1] ), self::$safeXmlEncodings )
1407 wfDebug( __METHOD__ .
": Found unsafe XML encoding '{$encMatch[1]}'\n" );
1411 } elseif ( preg_match(
"!<\?xml\b!si", $contents ) ) {
1414 wfDebug( __METHOD__ .
": Unmatched XML declaration start\n" );
1417 } elseif ( substr( $contents, 0, 4 ) ==
"\x4C\x6F\xA7\x94" ) {
1419 wfDebug( __METHOD__ .
": EBCDIC Encoded XML\n" );
1426 $attemptEncodings = [
'UTF-16',
'UTF-16BE',
'UTF-32',
'UTF-32BE' ];
1427 foreach ( $attemptEncodings as $encoding ) {
1428 Wikimedia\suppressWarnings();
1429 $str = iconv( $encoding,
'UTF-8', $contents );
1430 Wikimedia\restoreWarnings();
1431 if ( $str !=
'' && preg_match(
"!<\?xml\b(.*?)\?>!si", $str,
$matches ) ) {
1432 if ( preg_match( $encodingRegex,
$matches[1], $encMatch )
1433 && !in_array( strtoupper( $encMatch[1] ), self::$safeXmlEncodings )
1435 wfDebug( __METHOD__ .
": Found unsafe XML encoding '{$encMatch[1]}'\n" );
1439 } elseif ( $str !=
'' && preg_match(
"!<\?xml\b!si", $str ) ) {
1442 wfDebug( __METHOD__ .
": Unmatched XML declaration start\n" );
1457 $this->mSVGNSError =
false;
1460 [ $this,
'checkSvgScriptCallback' ],
1463 'processing_instruction_handler' =>
'UploadBase::checkSvgPICallback',
1464 'external_dtd_handler' =>
'UploadBase::checkSvgExternalDTD',
1467 if ( $check->wellFormed !==
true ) {
1470 return $partial ?
false : [
'uploadinvalidxml' ];
1471 } elseif ( $check->filterMatch ) {
1472 if ( $this->mSVGNSError ) {
1476 return $check->filterMatchType;
1490 if ( preg_match(
'/xml-stylesheet/i', $target ) ) {
1491 return [
'upload-scripted-pi-callback' ];
1512 'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd',
1513 'http://www.w3.org/TR/2001/REC-SVG-20010904/DTD/svg10.dtd',
1514 'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11-basic.dtd',
1515 'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11-tiny.dtd',
1517 'http://www.w3.org/TR/2001/PR-SVG-20010719/DTD/svg10.dtd',
1519 if (
$type !==
'PUBLIC'
1520 || !in_array( $systemId, $allowedDTDs )
1521 || strpos( $publicId,
"-//W3C//" ) !== 0
1523 return [
'upload-scripted-dtd' ];
1540 static $validNamespaces = [
1543 'http://creativecommons.org/ns#',
1544 'http://inkscape.sourceforge.net/dtd/sodipodi-0.dtd',
1545 'http://ns.adobe.com/adobeillustrator/10.0/',
1546 'http://ns.adobe.com/adobesvgviewerextensions/3.0/',
1547 'http://ns.adobe.com/extensibility/1.0/',
1548 'http://ns.adobe.com/flows/1.0/',
1549 'http://ns.adobe.com/illustrator/1.0/',
1550 'http://ns.adobe.com/imagereplacement/1.0/',
1551 'http://ns.adobe.com/pdf/1.3/',
1552 'http://ns.adobe.com/photoshop/1.0/',
1553 'http://ns.adobe.com/saveforweb/1.0/',
1554 'http://ns.adobe.com/variables/1.0/',
1555 'http://ns.adobe.com/xap/1.0/',
1556 'http://ns.adobe.com/xap/1.0/g/',
1557 'http://ns.adobe.com/xap/1.0/g/img/',
1558 'http://ns.adobe.com/xap/1.0/mm/',
1559 'http://ns.adobe.com/xap/1.0/rights/',
1560 'http://ns.adobe.com/xap/1.0/stype/dimensions#',
1561 'http://ns.adobe.com/xap/1.0/stype/font#',
1562 'http://ns.adobe.com/xap/1.0/stype/manifestitem#',
1563 'http://ns.adobe.com/xap/1.0/stype/resourceevent#',
1564 'http://ns.adobe.com/xap/1.0/stype/resourceref#',
1565 'http://ns.adobe.com/xap/1.0/t/pg/',
1566 'http://purl.org/dc/elements/1.1/',
1567 'http://purl.org/dc/elements/1.1',
1568 'http://schemas.microsoft.com/visio/2003/svgextensions/',
1569 'http://sodipodi.sourceforge.net/dtd/sodipodi-0.dtd',
1570 'http://taptrix.com/inkpad/svg_extensions',
1571 'http://web.resource.org/cc/',
1572 'http://www.freesoftware.fsf.org/bkchem/cdml',
1573 'http://www.inkscape.org/namespaces/inkscape',
1574 'http://www.opengis.net/gml',
1575 'http://www.w3.org/1999/02/22-rdf-syntax-ns#',
1576 'http://www.w3.org/2000/svg',
1577 'http://www.w3.org/tr/rec-rdf-syntax/',
1578 'http://www.w3.org/2000/01/rdf-schema#',
1583 $isBuggyInkscape = preg_match(
'/^&(#38;)*ns_[a-z_]+;$/', $namespace );
1585 if ( !( $isBuggyInkscape || in_array( $namespace, $validNamespaces ) ) ) {
1586 wfDebug( __METHOD__ .
": Non-svg namespace '$namespace' in uploaded file.\n" );
1588 $this->mSVGNSError = $namespace;
1596 if ( $strippedElement ==
'script' ) {
1597 wfDebug( __METHOD__ .
": Found script element '$element' in uploaded file.\n" );
1599 return [
'uploaded-script-svg', $strippedElement ];
1602 # e.g., <svg xmlns="http://www.w3.org/2000/svg">
1603 # <handler xmlns:ev="http://www.w3.org/2001/xml-events" ev:event="load">alert(1)</handler> </svg>
1604 if ( $strippedElement ==
'handler' ) {
1605 wfDebug( __METHOD__ .
": Found scriptable element '$element' in uploaded file.\n" );
1607 return [
'uploaded-script-svg', $strippedElement ];
1610 # SVG reported in Feb '12 that used xml:stylesheet to generate javascript block
1611 if ( $strippedElement ==
'stylesheet' ) {
1612 wfDebug( __METHOD__ .
": Found scriptable element '$element' in uploaded file.\n" );
1614 return [
'uploaded-script-svg', $strippedElement ];
1617 # Block iframes, in case they pass the namespace check
1618 if ( $strippedElement ==
'iframe' ) {
1619 wfDebug( __METHOD__ .
": iframe in uploaded file.\n" );
1621 return [
'uploaded-script-svg', $strippedElement ];
1625 if ( $strippedElement ==
'style'
1626 && self::checkCssFragment( Sanitizer::normalizeCss( $data ) )
1628 wfDebug( __METHOD__ .
": hostile css in style element.\n" );
1629 return [
'uploaded-hostile-svg' ];
1636 if ( substr( $stripped, 0, 2 ) ==
'on' ) {
1638 .
": Found event-handler attribute '$attrib'='$value' in uploaded file.\n" );
1640 return [
'uploaded-event-handler-on-svg', $attrib,
$value ];
1643 # Do not allow relative links, or unsafe url schemas.
1644 # For <a> tags, only data:, http: and https: and same-document
1645 # fragment links are allowed. For all other tags, only data:
1646 # and fragment are allowed.
1647 if ( $stripped ==
'href'
1649 && strpos(
$value,
'data:' ) !== 0
1650 && strpos(
$value,
'#' ) !== 0
1652 if ( !( $strippedElement ===
'a'
1653 && preg_match(
'!^https?://!i',
$value ) )
1655 wfDebug( __METHOD__ .
": Found href attribute <$strippedElement "
1656 .
"'$attrib'='$value' in uploaded file.\n" );
1658 return [
'uploaded-href-attribute-svg', $strippedElement, $attrib,
$value ];
1662 # only allow data: targets that should be safe. This prevents vectors like,
1663 # image/svg, text/xml, application/xml, and text/html, which can contain scripts
1664 if ( $stripped ==
'href' && strncasecmp(
'data:',
$value, 5 ) === 0 ) {
1667 $parameters =
'(?>;[a-zA-Z0-9\!#$&\'*+.^_`{|}~-]+=(?>[a-zA-Z0-9\!#$&\'*+.^_`{|}~-]+|"(?>[\0-\x0c\x0e-\x21\x23-\x5b\x5d-\x7f]+|\\\\[\0-\x7f])*"))*(?:;base64)?';
1669 if ( !preg_match(
"!^data:\s*image/(gif|jpeg|jpg|png)$parameters,!i",
$value ) ) {
1670 wfDebug( __METHOD__ .
": Found href to unwhitelisted data: uri "
1671 .
"\"<$strippedElement '$attrib'='$value'...\" in uploaded file.\n" );
1672 return [
'uploaded-href-unsafe-target-svg', $strippedElement, $attrib,
$value ];
1676 # Change href with animate from (http:
1677 if ( $stripped ===
'attributename'
1678 && $strippedElement ===
'animate'
1681 wfDebug( __METHOD__ .
": Found animate that might be changing href using from "
1682 .
"\"<$strippedElement '$attrib'='$value'...\" in uploaded file.\n" );
1684 return [
'uploaded-animate-svg', $strippedElement, $attrib,
$value ];
1687 # use set/animate to add event-handler attribute to parent
1688 if ( ( $strippedElement ==
'set' || $strippedElement ==
'animate' )
1689 && $stripped ==
'attributename'
1690 && substr(
$value, 0, 2 ) ==
'on'
1692 wfDebug( __METHOD__ .
": Found svg setting event-handler attribute with "
1693 .
"\"<$strippedElement $stripped='$value'...\" in uploaded file.\n" );
1695 return [
'uploaded-setting-event-handler-svg', $strippedElement, $stripped,
$value ];
1698 # use set to add href attribute to parent element
1699 if ( $strippedElement ==
'set'
1700 && $stripped ==
'attributename'
1701 && strpos(
$value,
'href' ) !==
false
1703 wfDebug( __METHOD__ .
": Found svg setting href attribute '$value' in uploaded file.\n" );
1705 return [
'uploaded-setting-href-svg' ];
1708 # use set to add a remote / data / script target to an element
1709 if ( $strippedElement ==
'set'
1710 && $stripped ==
'to'
1711 && preg_match(
'!(http|https|data|script):!sim',
$value )
1713 wfDebug( __METHOD__ .
": Found svg setting attribute to '$value' in uploaded file.\n" );
1715 return [
'uploaded-wrong-setting-svg',
$value ];
1718 # use handler attribute with remote / data / script
1719 if ( $stripped ==
'handler' && preg_match(
'!(http|https|data|script):!sim',
$value ) ) {
1720 wfDebug( __METHOD__ .
": Found svg setting handler with remote/data/script "
1721 .
"'$attrib'='$value' in uploaded file.\n" );
1723 return [
'uploaded-setting-handler-svg', $attrib,
$value ];
1726 # use CSS styles to bring in remote code
1727 if ( $stripped ==
'style'
1728 && self::checkCssFragment( Sanitizer::normalizeCss(
$value ) )
1730 wfDebug( __METHOD__ .
": Found svg setting a style with "
1731 .
"remote url '$attrib'='$value' in uploaded file.\n" );
1732 return [
'uploaded-remote-url-svg', $attrib,
$value ];
1735 # Several attributes can include css, css character escaping isn't allowed
1736 $cssAttrs = [
'font',
'clip-path',
'fill',
'filter',
'marker',
1737 'marker-end',
'marker-mid',
'marker-start',
'mask',
'stroke' ];
1738 if ( in_array( $stripped, $cssAttrs )
1739 && self::checkCssFragment(
$value )
1741 wfDebug( __METHOD__ .
": Found svg setting a style with "
1742 .
"remote url '$attrib'='$value' in uploaded file.\n" );
1743 return [
'uploaded-remote-url-svg', $attrib,
$value ];
1746 # image filters can pull in url, which could be svg that executes scripts
1747 if ( $strippedElement ==
'image'
1748 && $stripped ==
'filter'
1749 && preg_match(
'!url\s*\(!sim',
$value )
1751 wfDebug( __METHOD__ .
": Found image filter with url: "
1752 .
"\"<$strippedElement $stripped='$value'...\" in uploaded file.\n" );
1754 return [
'uploaded-image-filter-svg', $strippedElement, $stripped,
$value ];
1769 # Forbid external stylesheets, for both reliability and to protect viewer's privacy
1770 if ( stripos(
$value,
'@import' ) !==
false ) {
1774 # We allow @font-face to embed fonts with data: urls, so we snip the string
1775 # 'url' out so this case won't match when we check for urls below
1776 $pattern =
'!(@font-face\s*{[^}]*src:)url(\("data:;base64,)!im';
1779 # Check for remote and executable CSS. Unlike in Sanitizer::checkCss, the CSS
1780 # properties filter and accelerator don't seem to be useful for xss in SVG files.
1781 # Expression and -o-link don't seem to work either, but filtering them here in case.
1782 # Additionally, we catch remote urls like url("http:..., url('http:..., url(http:...,
1783 # but not local ones such as url("#..., url('#..., url(#....
1784 if ( preg_match(
'!expression
1786 | -o-link-source\s*:
1787 | -o-replace\s*:!imx',
$value ) ) {
1791 if ( preg_match_all(
1792 "!(\s*(url|image|image-set)\s*\(\s*[\"']?\s*[^#]+.*?\))!sim",
1797 # TODO: redo this in one regex. Until then, url("#whatever") matches the first
1798 foreach (
$matches[1] as $match ) {
1799 if ( !preg_match(
"!\s*(url|image|image-set)\s*\(\s*(#|'#|\"#)!im", $match ) ) {
1805 if ( preg_match(
'/[\000-\010\013\016-\037\177]/',
$value ) ) {
1819 $parts = explode(
':', strtolower( $element ) );
1820 $name = array_pop( $parts );
1821 $ns = implode(
':', $parts );
1823 return [ $ns,
$name ];
1832 $parts = explode(
':', strtolower( $name ) );
1834 return array_pop( $parts );
1851 wfDebug( __METHOD__ .
": virus scanner disabled\n" );
1857 wfDebug( __METHOD__ .
": unknown virus scanner: $wgAntivirus\n" );
1858 $wgOut->wrapWikiMsg(
"<div class=\"error\">\n$1\n</div>",
1861 return wfMessage(
'virus-unknownscanner' )->text() .
" $wgAntivirus";
1864 # look up scanner configuration
1870 if ( strpos(
$command,
"%f" ) ===
false ) {
1871 # simple pattern: append file to scan
1874 # complex pattern: replace "%f" with file to scan
1878 wfDebug( __METHOD__ .
": running virus scan: $command \n" );
1880 # execute virus scanner
1883 # NOTE: there's a 50 line workaround to make stderr redirection work on windows, too.
1884 # that does not seem to be worth the pain.
1885 # Ask me (Duesentrieb) about it if it's ever needed.
1888 # map exit code to AV_xxx constants.
1889 $mappedCode = $exitCode;
1890 if ( $exitCodeMap ) {
1891 if ( isset( $exitCodeMap[$exitCode] ) ) {
1892 $mappedCode = $exitCodeMap[$exitCode];
1893 } elseif ( isset( $exitCodeMap[
"*"] ) ) {
1894 $mappedCode = $exitCodeMap[
"*"];
1902 # scan failed (code was mapped to false by $exitCodeMap)
1903 wfDebug( __METHOD__ .
": failed to scan $file (code $exitCode).\n" );
1906 ?
wfMessage(
'virus-scanfailed', [ $exitCode ] )->text()
1909 # scan failed because filetype is unknown (probably imune)
1910 wfDebug( __METHOD__ .
": unsupported file type $file (code $exitCode).\n" );
1914 wfDebug( __METHOD__ .
": file passed virus scan.\n" );
1920 $output =
true; #
if there
's no output, return true
1921 } elseif ( $msgPattern ) {
1923 if ( preg_match( $msgPattern, $output, $groups ) ) {
1925 $output = $groups[1];
1930 wfDebug( __METHOD__ . ": FOUND VIRUS! scanner feedback: $output \n" );
1944 private function checkOverwrite( $user ) {
1945 // First check whether the local file can be overwritten
1946 $file = $this->getLocalFile();
1947 $file->load( File::READ_LATEST );
1948 if ( $file->exists() ) {
1949 if ( !self::userCanReUpload( $user, $file ) ) {
1950 return [ 'fileexists-forbidden
', $file->getName() ];
1956 /* Check shared conflicts: if the local file does not exist, but
1957 * wfFindFile finds a file, it exists in a shared repository.
1959 $file = wfFindFile( $this->getTitle(), [ 'latest
' => true ] );
1960 if ( $file && !$user->isAllowed( 'reupload-shared
' ) ) {
1961 return [ 'fileexists-shared-forbidden
', $file->getName() ];
1974 public static function userCanReUpload( User $user, File $img ) {
1975 if ( $user->isAllowed( 'reupload
' ) ) {
1976 return true; // non-conditional
1977 } elseif ( !$user->isAllowed( 'reupload-own
' ) ) {
1981 if ( !( $img instanceof LocalFile ) ) {
1987 return $user->getId() == $img->getUser( 'id' );
2001 public static function getExistsWarning( $file ) {
2002 if ( $file->exists() ) {
2003 return [ 'warning
' => 'exists
', 'file
' => $file ];
2006 if ( $file->getTitle()->getArticleID() ) {
2007 return [ 'warning
' => 'page-exists
', 'file
' => $file ];
2010 if ( strpos( $file->getName(), '.
' ) == false ) {
2011 $partname = $file->getName();
2014 $n = strrpos( $file->getName(), '.
' );
2015 $extension = substr( $file->getName(), $n + 1 );
2016 $partname = substr( $file->getName(), 0, $n );
2018 $normalizedExtension = File::normalizeExtension( $extension );
2020 if ( $normalizedExtension != $extension ) {
2021 // We're not
using the normalized
form of the extension.
2026 $nt_lc = Title::makeTitle(
NS_FILE,
"{$partname}.{$normalizedExtension}" );
2029 if ( $file_lc->exists() ) {
2031 'warning' =>
'exists-normalized',
2033 'normalizedFile' => $file_lc
2040 "{$partname}.", 1 );
2041 if ( count( $similarFiles ) ) {
2043 'warning' =>
'exists-normalized',
2045 'normalizedFile' => $similarFiles[0],
2049 if ( self::isThumbName( $file->getName() ) ) {
2050 # Check for filenames like 50px- or 180px-, these are mostly thumbnails
2052 substr( $partname, strpos( $partname,
'-' ) + 1 ) .
'.' . $extension,
2056 if ( $file_thb->exists() ) {
2058 'warning' =>
'thumb',
2060 'thumbFile' => $file_thb
2065 'warning' =>
'thumb-name',
2067 'thumbFile' => $file_thb
2072 foreach ( self::getFilenamePrefixBlacklist() as $prefix ) {
2073 if ( substr( $partname, 0, strlen( $prefix ) ) == $prefix ) {
2075 'warning' =>
'bad-prefix',
2091 $n = strrpos( $filename,
'.' );
2092 $partname = $n ? substr( $filename, 0, $n ) : $filename;
2095 substr( $partname, 3, 3 ) ==
'px-' ||
2096 substr( $partname, 2, 3 ) ==
'px-'
2098 preg_match(
"/[0-9]{2}/", substr( $partname, 0, 2 ) );
2108 $message =
wfMessage(
'filename-prefix-blacklist' )->inContentLanguage();
2109 if ( !$message->isDisabled() ) {
2110 $lines = explode(
"\n", $message->plain() );
2113 $comment = substr( trim(
$line ), 0, 1 );
2114 if ( $comment ==
'#' || $comment ==
'' ) {
2118 $comment = strpos(
$line,
'#' );
2119 if ( $comment > 0 ) {
2122 $blacklist[] = trim(
$line );
2161 $code = $error[
'status'];
2162 unset(
$code[
'status'] );
2197 ini_get(
'upload_max_filesize' ) ?: ini_get(
'hhvm.server.upload.upload_max_file_size' ),
2201 ini_get(
'post_max_size' ) ?: ini_get(
'hhvm.server.max_post_size' ),
2204 return min( $phpMaxFileSize, $phpMaxPostSize );
2217 $cache = MediaWikiServices::getInstance()->getMainObjectStash();
2218 $key =
$cache->makeKey(
'uploadstatus', $user->getId() ?: md5( $user->getName() ), $statusKey );
2220 return $cache->get( $key );
2234 $cache = MediaWikiServices::getInstance()->getMainObjectStash();
2235 $key =
$cache->makeKey(
'uploadstatus', $user->getId() ?: md5( $user->getName() ), $statusKey );
2237 if (
$value ===
false ) {
we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY BECAUSE THE PROGRAM IS LICENSED FREE OF THERE IS NO WARRANTY FOR THE TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY EITHER EXPRESSED OR BUT NOT LIMITED THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE YOU ASSUME THE COST OF ALL NECESSARY REPAIR OR CORRECTION IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED BE LIABLE TO YOU FOR INCLUDING ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new and you want it to be of the greatest possible use to the public
$wgAntivirus
Internal name of virus scanner.
$wgFileExtensions
This is the list of preferred extensions for uploading files.
$wgCheckFileExtensions
This is a flag to determine whether or not to check file extensions on upload.
$wgAntivirusRequired
Determines if a failed virus scan (AV_SCAN_FAILED) will cause the file to be rejected.
$wgUploadSizeWarning
Warn if uploaded files are larger than this (in bytes), or false to disable.
$wgDisableUploadScriptChecks
Setting this to true will disable the upload system's checks for HTML/JavaScript.
$wgVerifyMimeType
Determines if the MIME type of uploaded files should be checked.
$wgAntivirusSetup
Configuration for different virus scanners.
$wgFileBlacklist
Files with these extensions will never be allowed as uploads.
$wgEnableUploads
Uploads have to be specially set up to be secure.
$wgAllowJavaUploads
Allow Java archive uploads.
$wgStrictFileExtensions
If this is turned off, users may override the warning for files not covered by $wgFileExtensions.
$wgMimeTypeBlacklist
Files with these MIME types will never be allowed as uploads if $wgVerifyMimeType is enabled.
$wgMaxUploadSize
Max size for uploads, in bytes.
$wgSVGMetadataCutoff
Don't read SVG metadata beyond this point.
$wgAllowTitlesInSVG
Disallow <title> element in SVG files.
wfDebug( $text, $dest='all', array $context=[])
Sends a line to the debug log if enabled or, optionally, to a comment in output.
wfIniGetBool( $setting)
Safety wrapper around ini_get() for boolean settings.
wfLocalFile( $title)
Get an object referring to a locally registered file.
wfEscapeShellArg()
Version of escapeshellarg() that works better on Windows.
wfArrayDiff2( $a, $b)
Like array_diff( $a, $b ) except that it works with two-dimensional arrays.
wfShellExecWithStderr( $cmd, &$retval=null, $environ=[], $limits=[])
Execute a shell command, returning both stdout and stderr.
wfStripIllegalFilenameChars( $name)
Replace all invalid characters with '-'.
wfShorthandToInteger( $string='', $default=-1)
Converts shorthand byte notation to integer form.
wfDeprecated( $function, $version=false, $component=false, $callerOffset=2)
Throws a warning that $function is deprecated.
wfIsHHVM()
Check if we are running under HHVM.
static getPropertyNames( $filter=[])
Returns all possible parameters to iiprop.
static getInfo( $file, $prop, $result, $thumbParams=null, $opts=false)
Get result information for an image revision.
Class representing a row of the 'filearchive' table.
static getSha1Base36FromPath( $path)
Get a SHA-1 hash of a file in the local filesystem, in base-36 lower case encoding,...
static isStoragePath( $path)
Check if a given path is a "mwstore://" path.
Class to represent a local file in the wiki's own database.
MimeMagic helper wrapper.
static singleton()
Get a RepoGroup instance.
This class is used to hold the location and do limited manipulation of files stored temporarily (this...
static newFromText( $text, $defaultNamespace=NS_MAIN)
Create a new Title from text, such as what one would find in a link.
UploadBase and subclasses are the backend of MediaWiki's file uploads.
getSourceType()
Returns the upload type.
checkOverwrite( $user)
Check if there's an overwrite conflict and, if so, if restrictions forbid this user from performing t...
static verifyExtension( $mime, $extension)
Checks if the MIME type of the uploaded file matches the file extension.
postProcessUpload()
Perform extra steps after a successful upload.
verifyTitlePermissions( $user)
Check whether the user can edit, upload and create the image.
checkSvgScriptCallback( $element, $attribs, $data=null)
checkLocalFileExists(LocalFile $localFile, $hash)
getLocalFile()
Return the local file and initializes if necessary.
stripXmlNamespace( $name)
string $mTempPath
Local file system path to the file to upload (or a local copy)
checkBadFileName( $filename, $desiredFileName)
Check whether the resulting filename is different from the desired one, but ignore things like ucfirs...
static createFromRequest(&$request, $type=null)
Create a form of UploadBase depending on wpSourceType and initializes it.
verifyPermissions( $user)
Alias for verifyTitlePermissions.
runUploadStashFileHook(User $user)
static getSessionStatus(User $user, $statusKey)
Get the current status of a chunked upload (used for polling)
zipEntryCallback( $entry)
Callback for ZipDirectoryReader to detect Java class files.
static checkSvgPICallback( $target, $data)
Callback to filter SVG Processing Instructions.
static isValidRequest( $request)
Check whether a request if valid for this handler.
convertVerifyErrorToStatus( $error)
verifyPartialFile()
A verification routine suitable for partial files.
static detectScript( $file, $mime, $extension)
Heuristic for detecting files that could contain JavaScript instructions or things that may look like...
verifyFile()
Verifies that it's ok to include the uploaded file.
static isEnabled()
Returns true if uploads are enabled.
static isThumbName( $filename)
Helper function that checks whether the filename looks like a thumbnail.
getVerificationErrorCode( $error)
static checkCssFragment( $value)
Check a block of CSS or CSS fragment for anything that looks like it is bringing in remote code.
static getFilenamePrefixBlacklist()
Get a list of blacklisted filename prefixes from [[MediaWiki:Filename-prefix-blacklist]].
checkAgainstArchiveDupes( $hash)
const OVERWRITE_EXISTING_FILE
setTempFile( $tempPath, $fileSize=null)
stashSession()
alias for stashFileGetKey, for backwards compatibility
static checkXMLEncodingMissmatch( $file)
Check a whitelist of xml encodings that are known not to be interpreted differently by the server's x...
doStashFile(User $user=null)
Implementation for stashFile() and tryStashFile().
const WINDOWS_NONASCII_FILENAME
cleanupTempFile()
If we've modified the upload file we need to manually remove it on exit to clean up.
validateName()
Verify that the name is valid and, if necessary, that we can overwrite.
checkFileSize( $fileSize)
isEmptyFile()
Return true if the file is empty.
static checkFileExtension( $ext, $list)
Perform case-insensitive match against a list of file extensions.
tryStashFile(User $user, $isPartial=false)
Like stashFile(), but respects extensions' wishes to prevent the stashing.
getTitle()
Returns the title of the file to be uploaded.
initializePathInfo( $name, $tempPath, $fileSize, $removeTempFile=false)
Initialize the path information.
static getMaxUploadSize( $forType=null)
Get the MediaWiki maximum uploaded file size for given type of upload, based on $wgMaxUploadSize.
static checkSvgExternalDTD( $type, $publicId, $systemId)
Verify that DTD urls referenced are only the standard dtds.
getTempFileSha1Base36()
Get the base 36 SHA1 of the file.
static splitXmlNamespace( $element)
Divide the element name passed by the xml parser to the callback into URI and prifix.
getImageInfo( $result)
Gets image info about the file just uploaded.
detectScriptInSvg( $filename, $partial)
static splitExtensions( $filename)
Split a file into a base name and all dot-delimited 'extensions' on the end.
fetchFile()
Fetch the file.
static isThrottled( $user)
Returns true if the user has surpassed the upload rate limit, false otherwise.
checkLocalFileWasDeleted(LocalFile $localFile)
stashFileGetKey()
Stash a file in a temporary directory, returning a key which can be used to find the file again.
performUpload( $comment, $pageText, $watch, $user, $tags=[])
Really perform the upload.
getFileSize()
Return the file size.
verifyUpload()
Verify whether the upload is sane.
stashFile(User $user=null)
If the user does not supply all necessary information in the first upload form submission (either by ...
const MIN_LENGTH_PARTNAME
static checkFileExtensionList( $ext, $list)
Perform case-insensitive match against a list of file extensions.
checkWarnings()
Check for non fatal problems with the file.
static detectVirus( $file)
Generic wrapper function for a virus scanner program.
static isAllowed( $user)
Returns true if the user can use this upload module or else a string identifying the missing permissi...
checkUnwantedFileExtensions( $fileExtension)
TempFSFile null $tempFileObj
Wrapper to handle deleting the temp file.
static getExistsWarning( $file)
Helper function that does various existence checks for a file.
static getMaxPhpUploadSize()
Get the PHP maximum uploaded file size, based on ini settings.
verifyMimeType( $mime)
Verify the MIME type.
static setSessionStatus(User $user, $statusKey, $value)
Set the current status of a chunked upload (used for polling)
initializeFromRequest(&$request)
Initialize from a WebRequest.
checkAgainstExistingDupes( $hash, $ignoreLocalDupes)
The User object encapsulates all of the user-specific settings (user_id, name, rights,...
static doWatch(Title $title, User $user, $checkRights=User::CHECK_USER_RIGHTS)
Watch a page.
static read( $fileName, $callback, $options=[])
Read a ZIP file and call a function for each file discovered in it.
deferred txt A few of the database updates required by various functions here can be deferred until after the result page is displayed to the user For updating the view updating the linked to tables after a etc PHP does not yet have any way to tell the server to actually return and disconnect while still running these but it might have such a feature in the future We handle these by creating a deferred update object and putting those objects on a global list
when a variable name is used in a function
this class mediates it Skin Encapsulates a look and feel for the wiki All of the functions that render HTML and make choices about how to render it are here and are called from various other places when and is meant to be subclassed with other skins that may override some of its functions The User object contains a reference to a and so rather than having a global skin object we just rely on the global User and get the skin with $wgUser and also has some character encoding functions and other locale stuff The current user interface language is instantiated as $wgLang
namespace being checked & $result
do that in ParserLimitReportFormat instead use this to modify the parameters of the image all existing parser cache entries will be invalid To avoid you ll need to handle that somehow(e.g. with the RejectParserCacheValue hook) because MediaWiki won 't do it for you. & $defaults also a ContextSource after deleting those rows but within the same transaction you ll probably need to make sure the header is varied on $request
static configuration should be added through ResourceLoaderGetConfigVars instead can be used to get the real title after the basic globals have been set but before ordinary actions take place $output
Status::newGood()` to allow deletion, and then `return false` from the hook function. Ensure you consume the 'ChangeTagAfterDelete' hook to carry out custom deletion actions. $tag:name of the tag $user:user initiating the action & $status:Status object. See above. 'ChangeTagsListActive':Allows you to nominate which of the tags your extension uses are in active use. & $tags:list of all active tags. Append to this array. 'ChangeTagsAfterUpdateTags':Called after tags have been updated with the ChangeTags::updateTags function. Params:$addedTags:tags effectively added in the update $removedTags:tags effectively removed in the update $prevTags:tags that were present prior to the update $rc_id:recentchanges table id $rev_id:revision table id $log_id:logging table id $params:tag params $rc:RecentChange being tagged when the tagging accompanies the action or null $user:User who performed the tagging when the tagging is subsequent to the action or null 'ChangeTagsAllowedAdd':Called when checking if a user can add tags to a change. & $allowedTags:List of all the tags the user is allowed to add. Any tags the user wants to add( $addTags) that are not in this array will cause it to fail. You may add or remove tags to this array as required. $addTags:List of tags user intends to add. $user:User who is adding the tags. 'ChangeUserGroups':Called before user groups are changed. $performer:The User who will perform the change $user:The User whose groups will be changed & $add:The groups that will be added & $remove:The groups that will be removed 'Collation::factory':Called if $wgCategoryCollation is an unknown collation. $collationName:Name of the collation in question & $collationObject:Null. Replace with a subclass of the Collation class that implements the collation given in $collationName. 'ConfirmEmailComplete':Called after a user 's email has been confirmed successfully. $user:user(object) whose email is being confirmed 'ContentAlterParserOutput':Modify parser output for a given content object. Called by Content::getParserOutput after parsing has finished. Can be used for changes that depend on the result of the parsing but have to be done before LinksUpdate is called(such as adding tracking categories based on the rendered HTML). $content:The Content to render $title:Title of the page, as context $parserOutput:ParserOutput to manipulate 'ContentGetParserOutput':Customize parser output for a given content object, called by AbstractContent::getParserOutput. May be used to override the normal model-specific rendering of page content. $content:The Content to render $title:Title of the page, as context $revId:The revision ID, as context $options:ParserOptions for rendering. To avoid confusing the parser cache, the output can only depend on parameters provided to this hook function, not on global state. $generateHtml:boolean, indicating whether full HTML should be generated. If false, generation of HTML may be skipped, but other information should still be present in the ParserOutput object. & $output:ParserOutput, to manipulate or replace 'ContentHandlerDefaultModelFor':Called when the default content model is determined for a given title. May be used to assign a different model for that title. $title:the Title in question & $model:the model name. Use with CONTENT_MODEL_XXX constants. 'ContentHandlerForModelID':Called when a ContentHandler is requested for a given content model name, but no entry for that model exists in $wgContentHandlers. Note:if your extension implements additional models via this hook, please use GetContentModels hook to make them known to core. $modeName:the requested content model name & $handler:set this to a ContentHandler object, if desired. 'ContentModelCanBeUsedOn':Called to determine whether that content model can be used on a given page. This is especially useful to prevent some content models to be used in some special location. $contentModel:ID of the content model in question $title:the Title in question. & $ok:Output parameter, whether it is OK to use $contentModel on $title. Handler functions that modify $ok should generally return false to prevent further hooks from further modifying $ok. 'ContribsPager::getQueryInfo':Before the contributions query is about to run & $pager:Pager object for contributions & $queryInfo:The query for the contribs Pager 'ContribsPager::reallyDoQuery':Called before really executing the query for My Contributions & $data:an array of results of all contribs queries $pager:The ContribsPager object hooked into $offset:Index offset, inclusive $limit:Exact query limit $descending:Query direction, false for ascending, true for descending 'ContributionsLineEnding':Called before a contributions HTML line is finished $page:SpecialPage object for contributions & $ret:the HTML line $row:the DB row for this line & $classes:the classes to add to the surrounding< li > & $attribs:associative array of other HTML attributes for the< li > element. Currently only data attributes reserved to MediaWiki are allowed(see Sanitizer::isReservedDataAttribute). 'ContributionsToolLinks':Change tool links above Special:Contributions $id:User identifier $title:User page title & $tools:Array of tool links $specialPage:SpecialPage instance for context and services. Can be either SpecialContributions or DeletedContributionsPage. Extensions should type hint against a generic SpecialPage though. 'ConvertContent':Called by AbstractContent::convert when a conversion to another content model is requested. Handler functions that modify $result should generally return false to disable further attempts at conversion. $content:The Content object to be converted. $toModel:The ID of the content model to convert to. $lossy: boolean indicating whether lossy conversion is allowed. & $result:Output parameter, in case the handler function wants to provide a converted Content object. Note that $result->getContentModel() must return $toModel. 'CustomEditor':When invoking the page editor Return true to allow the normal editor to be used, or false if implementing a custom editor, e.g. for a special namespace, etc. $article:Article being edited $user:User performing the edit 'DatabaseOraclePostInit':Called after initialising an Oracle database $db:the DatabaseOracle object 'DeletedContribsPager::reallyDoQuery':Called before really executing the query for Special:DeletedContributions Similar to ContribsPager::reallyDoQuery & $data:an array of results of all contribs queries $pager:The DeletedContribsPager object hooked into $offset:Index offset, inclusive $limit:Exact query limit $descending:Query direction, false for ascending, true for descending 'DeletedContributionsLineEnding':Called before a DeletedContributions HTML line is finished. Similar to ContributionsLineEnding $page:SpecialPage object for DeletedContributions & $ret:the HTML line $row:the DB row for this line & $classes:the classes to add to the surrounding< li > & $attribs:associative array of other HTML attributes for the< li > element. Currently only data attributes reserved to MediaWiki are allowed(see Sanitizer::isReservedDataAttribute). 'DeleteUnknownPreferences':Called by the cleanupPreferences.php maintenance script to build a WHERE clause with which to delete preferences that are not known about. This hook is used by extensions that have dynamically-named preferences that should not be deleted in the usual cleanup process. For example, the Gadgets extension creates preferences prefixed with 'gadget-', and so anything with that prefix is excluded from the deletion. &where:An array that will be passed as the $cond parameter to IDatabase::select() to determine what will be deleted from the user_properties table. $db:The IDatabase object, useful for accessing $db->buildLike() etc. 'DifferenceEngineAfterLoadNewText':called in DifferenceEngine::loadNewText() after the new revision 's content has been loaded into the class member variable $differenceEngine->mNewContent but before returning true from this function. $differenceEngine:DifferenceEngine object 'DifferenceEngineLoadTextAfterNewContentIsLoaded':called in DifferenceEngine::loadText() after the new revision 's content has been loaded into the class member variable $differenceEngine->mNewContent but before checking if the variable 's value is null. This hook can be used to inject content into said class member variable. $differenceEngine:DifferenceEngine object 'DifferenceEngineMarkPatrolledLink':Allows extensions to change the "mark as patrolled" link which is shown both on the diff header as well as on the bottom of a page, usually wrapped in a span element which has class="patrollink". $differenceEngine:DifferenceEngine object & $markAsPatrolledLink:The "mark as patrolled" link HTML(string) $rcid:Recent change ID(rc_id) for this change(int) 'DifferenceEngineMarkPatrolledRCID':Allows extensions to possibly change the rcid parameter. For example the rcid might be set to zero due to the user being the same as the performer of the change but an extension might still want to show it under certain conditions. & $rcid:rc_id(int) of the change or 0 $differenceEngine:DifferenceEngine object $change:RecentChange object $user:User object representing the current user 'DifferenceEngineNewHeader':Allows extensions to change the $newHeader variable, which contains information about the new revision, such as the revision 's author, whether the revision was marked as a minor edit or not, etc. $differenceEngine:DifferenceEngine object & $newHeader:The string containing the various #mw-diff-otitle[1-5] divs, which include things like revision author info, revision comment, RevisionDelete link and more $formattedRevisionTools:Array containing revision tools, some of which may have been injected with the DiffRevisionTools hook $nextlink:String containing the link to the next revision(if any) $status
this hook is for auditing only or null if authentication failed before getting that far or null if we can t even determine that probably a stub it is not rendered in wiki pages or galleries in category pages allow injecting custom HTML after the section Any uses of the hook need to handle escaping see BaseTemplate::getToolbox and BaseTemplate::makeListItem for details on the format of individual items inside of this array or by returning and letting standard HTTP rendering take place modifiable or by returning false and taking over the output modifiable & $code
null means default in associative array form
either a unescaped string or a HtmlArmor object after in associative array form externallinks including delete and has completed for all link tables whether this was an auto creation default is conds Array Extra conditions for the No matching items in log is displayed if loglist is empty msgKey Array If you want a nice box with a set this to the key of the message First element is the message additional optional elements are parameters for the key that are processed with wfMessage() -> params() ->parseAsBlock() - offset Set to overwrite offset parameter in $wgRequest set to '' to unset offset - wrap String Wrap the message in html(usually something like "<div ...>$1</div>"). - flags Integer display flags(NO_ACTION_LINK, NO_EXTRA_USER_LINKS) 'LogException':Called before an exception(or PHP error) is logged. This is meant for integration with external error aggregation services
Allows to change the fields on the form that will be generated $name
null means default in associative array with keys and values unescaped Should be merged with default with a value of false meaning to suppress the attribute in associative array with keys and values unescaped noclasses just before the function returns a value If you return an< a > element with HTML attributes $attribs and contents $html will be returned If you return $ret will be returned and may include noclasses after processing & $attribs
this hook is for auditing only or null if authentication failed before getting that far or null if we can t even determine that probably a stub it is not rendered in wiki pages or galleries in category pages allow injecting custom HTML after the section Any uses of the hook need to handle escaping see BaseTemplate::getToolbox and BaseTemplate::makeListItem for details on the format of individual items inside of this array or by returning and letting standard HTTP rendering take place modifiable or by returning false and taking over the output modifiable modifiable after all normalizations have been except for the $wgMaxImageArea check set to true or false to override the $wgMaxImageArea check result gives extension the possibility to transform it themselves $handler
processing should stop and the error should be shown to the user * false
returning false will NOT prevent logging $e
if( $ext=='php'|| $ext=='php5') $mime
if(!is_readable( $file)) $ext