MediaWiki REL1_33
UploadBase.php
Go to the documentation of this file.
1<?php
25
40abstract class UploadBase {
42 protected $mTempPath;
44 protected $tempFileObj;
45
47 protected $mTitle = false, $mTitleError = 0;
52
53 protected static $safeXmlEncodings = [
54 'UTF-8',
55 'ISO-8859-1',
56 'ISO-8859-2',
57 'UTF-16',
58 'UTF-32',
59 'WINDOWS-1250',
60 'WINDOWS-1251',
61 'WINDOWS-1252',
62 'WINDOWS-1253',
63 'WINDOWS-1254',
64 'WINDOWS-1255',
65 'WINDOWS-1256',
66 'WINDOWS-1257',
67 'WINDOWS-1258',
68 ];
69
70 const SUCCESS = 0;
71 const OK = 0;
72 const EMPTY_FILE = 3;
75 const OVERWRITE_EXISTING_FILE = 7; # Not used anymore; handled by verifyTitlePermissions()
79 const HOOK_ABORTED = 11;
80 const FILE_TOO_LARGE = 12;
83
89 $code_to_status = [
90 self::EMPTY_FILE => 'empty-file',
91 self::FILE_TOO_LARGE => 'file-too-large',
92 self::FILETYPE_MISSING => 'filetype-missing',
93 self::FILETYPE_BADTYPE => 'filetype-banned',
94 self::MIN_LENGTH_PARTNAME => 'filename-tooshort',
95 self::ILLEGAL_FILENAME => 'illegal-filename',
96 self::OVERWRITE_EXISTING_FILE => 'overwrite',
97 self::VERIFICATION_ERROR => 'verification-error',
98 self::HOOK_ABORTED => 'hookaborted',
99 self::WINDOWS_NONASCII_FILENAME => 'windows-nonascii-filename',
100 self::FILENAME_TOO_LONG => 'filename-toolong',
101 ];
102 return $code_to_status[$error] ?? 'unknown-error';
103 }
104
110 public static function isEnabled() {
111 global $wgEnableUploads;
112
113 if ( !$wgEnableUploads ) {
114 return false;
115 }
116
117 # Check php's file_uploads setting
118 return wfIsHHVM() || wfIniGetBool( 'file_uploads' );
119 }
120
129 public static function isAllowed( $user ) {
130 foreach ( [ 'upload', 'edit' ] as $permission ) {
131 if ( !$user->isAllowed( $permission ) ) {
132 return $permission;
133 }
134 }
135
136 return true;
137 }
138
145 public static function isThrottled( $user ) {
146 return $user->pingLimiter( 'upload' );
147 }
148
149 // Upload handlers. Should probably just be a global.
150 private static $uploadHandlers = [ 'Stash', 'File', 'Url' ];
151
159 public static function createFromRequest( &$request, $type = null ) {
160 $type = $type ?: $request->getVal( 'wpSourceType', 'File' );
161
162 if ( !$type ) {
163 return null;
164 }
165
166 // Get the upload class
167 $type = ucfirst( $type );
168
169 // Give hooks the chance to handle this request
170 $className = null;
171 Hooks::run( 'UploadCreateFromRequest', [ $type, &$className ] );
172 if ( is_null( $className ) ) {
173 $className = 'UploadFrom' . $type;
174 wfDebug( __METHOD__ . ": class name: $className\n" );
175 if ( !in_array( $type, self::$uploadHandlers ) ) {
176 return null;
177 }
178 }
179
180 // Check whether this upload class is enabled
181 if ( !call_user_func( [ $className, 'isEnabled' ] ) ) {
182 return null;
183 }
184
185 // Check whether the request is valid
186 if ( !call_user_func( [ $className, 'isValidRequest' ], $request ) ) {
187 return null;
188 }
189
191 $handler = new $className;
192
193 $handler->initializeFromRequest( $request );
194
195 return $handler;
196 }
197
203 public static function isValidRequest( $request ) {
204 return false;
205 }
206
207 public function __construct() {
208 }
209
216 public function getSourceType() {
217 return null;
218 }
219
228 public function initializePathInfo( $name, $tempPath, $fileSize, $removeTempFile = false ) {
229 $this->mDesiredDestName = $name;
230 if ( FileBackend::isStoragePath( $tempPath ) ) {
231 throw new MWException( __METHOD__ . " given storage path `$tempPath`." );
232 }
233
234 $this->setTempFile( $tempPath, $fileSize );
235 $this->mRemoveTempFile = $removeTempFile;
236 }
237
243 abstract public function initializeFromRequest( &$request );
244
249 protected function setTempFile( $tempPath, $fileSize = null ) {
250 $this->mTempPath = $tempPath;
251 $this->mFileSize = $fileSize ?: null;
252 if ( strlen( $this->mTempPath ) && file_exists( $this->mTempPath ) ) {
253 $this->tempFileObj = new TempFSFile( $this->mTempPath );
254 if ( !$fileSize ) {
255 $this->mFileSize = filesize( $this->mTempPath );
256 }
257 } else {
258 $this->tempFileObj = null;
259 }
260 }
261
266 public function fetchFile() {
267 return Status::newGood();
268 }
269
274 public function isEmptyFile() {
275 return empty( $this->mFileSize );
276 }
277
282 public function getFileSize() {
283 return $this->mFileSize;
284 }
285
290 public function getTempFileSha1Base36() {
291 return FSFile::getSha1Base36FromPath( $this->mTempPath );
292 }
293
298 public function getRealPath( $srcPath ) {
299 $repo = RepoGroup::singleton()->getLocalRepo();
300 if ( FileRepo::isVirtualUrl( $srcPath ) ) {
304 $tmpFile = $repo->getLocalCopy( $srcPath );
305 if ( $tmpFile ) {
306 $tmpFile->bind( $this ); // keep alive with $this
307 }
308 $path = $tmpFile ? $tmpFile->getPath() : false;
309 } else {
310 $path = $srcPath;
311 }
312
313 return $path;
314 }
315
320 public function verifyUpload() {
324 if ( $this->isEmptyFile() ) {
325 return [ 'status' => self::EMPTY_FILE ];
326 }
327
331 $maxSize = self::getMaxUploadSize( $this->getSourceType() );
332 if ( $this->mFileSize > $maxSize ) {
333 return [
334 'status' => self::FILE_TOO_LARGE,
335 'max' => $maxSize,
336 ];
337 }
338
344 $verification = $this->verifyFile();
345 if ( $verification !== true ) {
346 return [
347 'status' => self::VERIFICATION_ERROR,
348 'details' => $verification
349 ];
350 }
351
355 $result = $this->validateName();
356 if ( $result !== true ) {
357 return $result;
358 }
359
360 $error = '';
361 if ( !Hooks::run( 'UploadVerification',
362 [ $this->mDestName, $this->mTempPath, &$error ], '1.28' )
363 ) {
364 return [ 'status' => self::HOOK_ABORTED, 'error' => $error ];
365 }
366
367 return [ 'status' => self::OK ];
368 }
369
376 public function validateName() {
377 $nt = $this->getTitle();
378 if ( is_null( $nt ) ) {
379 $result = [ 'status' => $this->mTitleError ];
380 if ( $this->mTitleError == self::ILLEGAL_FILENAME ) {
381 $result['filtered'] = $this->mFilteredName;
382 }
383 if ( $this->mTitleError == self::FILETYPE_BADTYPE ) {
384 $result['finalExt'] = $this->mFinalExtension;
385 if ( count( $this->mBlackListedExtensions ) ) {
386 $result['blacklistedExt'] = $this->mBlackListedExtensions;
387 }
388 }
389
390 return $result;
391 }
392 $this->mDestName = $this->getLocalFile()->getName();
393
394 return true;
395 }
396
406 protected function verifyMimeType( $mime ) {
407 global $wgVerifyMimeType;
408 if ( $wgVerifyMimeType ) {
409 wfDebug( "mime: <$mime> extension: <{$this->mFinalExtension}>\n" );
411 if ( $this->checkFileExtension( $mime, $wgMimeTypeBlacklist ) ) {
412 return [ 'filetype-badmime', $mime ];
413 }
414
415 # Check what Internet Explorer would detect
416 $fp = fopen( $this->mTempPath, 'rb' );
417 $chunk = fread( $fp, 256 );
418 fclose( $fp );
419
420 $magic = MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer();
421 $extMime = $magic->guessTypesForExtension( $this->mFinalExtension );
422 $ieTypes = $magic->getIEMimeTypes( $this->mTempPath, $chunk, $extMime );
423 foreach ( $ieTypes as $ieType ) {
424 if ( $this->checkFileExtension( $ieType, $wgMimeTypeBlacklist ) ) {
425 return [ 'filetype-bad-ie-mime', $ieType ];
426 }
427 }
428 }
429
430 return true;
431 }
432
438 protected function verifyFile() {
440
441 $status = $this->verifyPartialFile();
442 if ( $status !== true ) {
443 return $status;
444 }
445
446 $mwProps = new MWFileProps( MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer() );
447 $this->mFileProps = $mwProps->getPropsFromPath( $this->mTempPath, $this->mFinalExtension );
448 $mime = $this->mFileProps['mime'];
449
450 if ( $wgVerifyMimeType ) {
451 # XXX: Missing extension will be caught by validateName() via getTitle()
452 if ( $this->mFinalExtension != '' && !$this->verifyExtension( $mime, $this->mFinalExtension ) ) {
453 return [ 'filetype-mime-mismatch', $this->mFinalExtension, $mime ];
454 }
455 }
456
457 # check for htmlish code and javascript
459 if ( $this->mFinalExtension == 'svg' || $mime == 'image/svg+xml' ) {
460 $svgStatus = $this->detectScriptInSvg( $this->mTempPath, false );
461 if ( $svgStatus !== false ) {
462 return $svgStatus;
463 }
464 }
465 }
466
468 if ( $handler ) {
469 $handlerStatus = $handler->verifyUpload( $this->mTempPath );
470 if ( !$handlerStatus->isOK() ) {
471 $errors = $handlerStatus->getErrorsArray();
472
473 return reset( $errors );
474 }
475 }
476
477 $error = true;
478 Hooks::run( 'UploadVerifyFile', [ $this, $mime, &$error ] );
479 if ( $error !== true ) {
480 if ( !is_array( $error ) ) {
481 $error = [ $error ];
482 }
483 return $error;
484 }
485
486 wfDebug( __METHOD__ . ": all clear; passing.\n" );
487
488 return true;
489 }
490
499 protected function verifyPartialFile() {
501
502 # getTitle() sets some internal parameters like $this->mFinalExtension
503 $this->getTitle();
504
505 $mwProps = new MWFileProps( MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer() );
506 $this->mFileProps = $mwProps->getPropsFromPath( $this->mTempPath, $this->mFinalExtension );
507
508 # check MIME type, if desired
509 $mime = $this->mFileProps['file-mime'];
510 $status = $this->verifyMimeType( $mime );
511 if ( $status !== true ) {
512 return $status;
513 }
514
515 # check for htmlish code and javascript
517 if ( self::detectScript( $this->mTempPath, $mime, $this->mFinalExtension ) ) {
518 return [ 'uploadscripted' ];
519 }
520 if ( $this->mFinalExtension == 'svg' || $mime == 'image/svg+xml' ) {
521 $svgStatus = $this->detectScriptInSvg( $this->mTempPath, true );
522 if ( $svgStatus !== false ) {
523 return $svgStatus;
524 }
525 }
526 }
527
528 # Check for Java applets, which if uploaded can bypass cross-site
529 # restrictions.
530 if ( !$wgAllowJavaUploads ) {
531 $this->mJavaDetected = false;
532 $zipStatus = ZipDirectoryReader::read( $this->mTempPath,
533 [ $this, 'zipEntryCallback' ] );
534 if ( !$zipStatus->isOK() ) {
535 $errors = $zipStatus->getErrorsArray();
536 $error = reset( $errors );
537 if ( $error[0] !== 'zip-wrong-format' ) {
538 return $error;
539 }
540 }
541 if ( $this->mJavaDetected ) {
542 return [ 'uploadjava' ];
543 }
544 }
545
546 # Scan the uploaded file for viruses
547 $virus = $this->detectVirus( $this->mTempPath );
548 if ( $virus ) {
549 return [ 'uploadvirus', $virus ];
550 }
551
552 return true;
553 }
554
560 public function zipEntryCallback( $entry ) {
561 $names = [ $entry['name'] ];
562
563 // If there is a null character, cut off the name at it, because JDK's
564 // ZIP_GetEntry() uses strcmp() if the name hashes match. If a file name
565 // were constructed which had ".class\0" followed by a string chosen to
566 // make the hash collide with the truncated name, that file could be
567 // returned in response to a request for the .class file.
568 $nullPos = strpos( $entry['name'], "\000" );
569 if ( $nullPos !== false ) {
570 $names[] = substr( $entry['name'], 0, $nullPos );
571 }
572
573 // If there is a trailing slash in the file name, we have to strip it,
574 // because that's what ZIP_GetEntry() does.
575 if ( preg_grep( '!\.class/?$!', $names ) ) {
576 $this->mJavaDetected = true;
577 }
578 }
579
589 public function verifyPermissions( $user ) {
590 return $this->verifyTitlePermissions( $user );
591 }
592
604 public function verifyTitlePermissions( $user ) {
609 $nt = $this->getTitle();
610 if ( is_null( $nt ) ) {
611 return true;
612 }
613 $permErrors = $nt->getUserPermissionsErrors( 'edit', $user );
614 $permErrorsUpload = $nt->getUserPermissionsErrors( 'upload', $user );
615 if ( !$nt->exists() ) {
616 $permErrorsCreate = $nt->getUserPermissionsErrors( 'create', $user );
617 } else {
618 $permErrorsCreate = [];
619 }
620 if ( $permErrors || $permErrorsUpload || $permErrorsCreate ) {
621 $permErrors = array_merge( $permErrors, wfArrayDiff2( $permErrorsUpload, $permErrors ) );
622 $permErrors = array_merge( $permErrors, wfArrayDiff2( $permErrorsCreate, $permErrors ) );
623
624 return $permErrors;
625 }
626
627 $overwriteError = $this->checkOverwrite( $user );
628 if ( $overwriteError !== true ) {
629 return [ $overwriteError ];
630 }
631
632 return true;
633 }
634
642 public function checkWarnings() {
643 $warnings = [];
644
645 $localFile = $this->getLocalFile();
646 $localFile->load( File::READ_LATEST );
647 $filename = $localFile->getName();
648 $hash = $this->getTempFileSha1Base36();
649
650 $badFileName = $this->checkBadFileName( $filename, $this->mDesiredDestName );
651 if ( $badFileName !== null ) {
652 $warnings['badfilename'] = $badFileName;
653 }
654
655 $unwantedFileExtensionDetails = $this->checkUnwantedFileExtensions( $this->mFinalExtension );
656 if ( $unwantedFileExtensionDetails !== null ) {
657 $warnings['filetype-unwanted-type'] = $unwantedFileExtensionDetails;
658 }
659
660 $fileSizeWarnings = $this->checkFileSize( $this->mFileSize );
661 if ( $fileSizeWarnings ) {
662 $warnings = array_merge( $warnings, $fileSizeWarnings );
663 }
664
665 $localFileExistsWarnings = $this->checkLocalFileExists( $localFile, $hash );
666 if ( $localFileExistsWarnings ) {
667 $warnings = array_merge( $warnings, $localFileExistsWarnings );
668 }
669
670 if ( $this->checkLocalFileWasDeleted( $localFile ) ) {
671 $warnings['was-deleted'] = $filename;
672 }
673
674 // If a file with the same name exists locally then the local file has already been tested
675 // for duplication of content
676 $ignoreLocalDupes = isset( $warnings[ 'exists '] );
677 $dupes = $this->checkAgainstExistingDupes( $hash, $ignoreLocalDupes );
678 if ( $dupes ) {
679 $warnings['duplicate'] = $dupes;
680 }
681
682 $archivedDupes = $this->checkAgainstArchiveDupes( $hash );
683 if ( $archivedDupes !== null ) {
684 $warnings['duplicate-archive'] = $archivedDupes;
685 }
686
687 return $warnings;
688 }
689
699 private function checkBadFileName( $filename, $desiredFileName ) {
700 $comparableName = str_replace( ' ', '_', $desiredFileName );
701 $comparableName = Title::capitalize( $comparableName, NS_FILE );
702
703 if ( $desiredFileName != $filename && $comparableName != $filename ) {
704 return $filename;
705 }
706
707 return null;
708 }
709
718 private function checkUnwantedFileExtensions( $fileExtension ) {
720
722 $extensions = array_unique( $wgFileExtensions );
723 if ( !$this->checkFileExtension( $fileExtension, $extensions ) ) {
724 return [
726 $wgLang->commaList( $extensions ),
727 count( $extensions )
728 ];
729 }
730 }
731
732 return null;
733 }
734
740 private function checkFileSize( $fileSize ) {
742
743 $warnings = [];
744
745 if ( $wgUploadSizeWarning && ( $fileSize > $wgUploadSizeWarning ) ) {
746 $warnings['large-file'] = [ $wgUploadSizeWarning, $fileSize ];
747 }
748
749 if ( $fileSize == 0 ) {
750 $warnings['empty-file'] = true;
751 }
752
753 return $warnings;
754 }
755
762 private function checkLocalFileExists( LocalFile $localFile, $hash ) {
763 $warnings = [];
764
765 $exists = self::getExistsWarning( $localFile );
766 if ( $exists !== false ) {
767 $warnings['exists'] = $exists;
768
769 // check if file is an exact duplicate of current file version
770 if ( $hash === $localFile->getSha1() ) {
771 $warnings['no-change'] = $localFile;
772 }
773
774 // check if file is an exact duplicate of older versions of this file
775 $history = $localFile->getHistory();
776 foreach ( $history as $oldFile ) {
777 if ( $hash === $oldFile->getSha1() ) {
778 $warnings['duplicate-version'][] = $oldFile;
779 }
780 }
781 }
782
783 return $warnings;
784 }
785
786 private function checkLocalFileWasDeleted( LocalFile $localFile ) {
787 return $localFile->wasDeleted() && !$localFile->exists();
788 }
789
796 private function checkAgainstExistingDupes( $hash, $ignoreLocalDupes ) {
797 $dupes = RepoGroup::singleton()->findBySha1( $hash );
798 $title = $this->getTitle();
799 foreach ( $dupes as $key => $dupe ) {
800 if (
801 ( $dupe instanceof LocalFile ) &&
802 $ignoreLocalDupes &&
803 $title->equals( $dupe->getTitle() )
804 ) {
805 unset( $dupes[$key] );
806 }
807 }
808
809 return $dupes;
810 }
811
818 private function checkAgainstArchiveDupes( $hash ) {
819 $archivedFile = new ArchivedFile( null, 0, '', $hash );
820 if ( $archivedFile->getID() > 0 ) {
821 if ( $archivedFile->userCan( File::DELETED_FILE ) ) {
822 return $archivedFile->getName();
823 } else {
824 return '';
825 }
826 }
827
828 return null;
829 }
830
844 public function performUpload( $comment, $pageText, $watch, $user, $tags = [] ) {
845 $this->getLocalFile()->load( File::READ_LATEST );
846 $props = $this->mFileProps;
847
848 $error = null;
849 Hooks::run( 'UploadVerifyUpload', [ $this, $user, $props, $comment, $pageText, &$error ] );
850 if ( $error ) {
851 if ( !is_array( $error ) ) {
852 $error = [ $error ];
853 }
854 return Status::newFatal( ...$error );
855 }
856
857 $status = $this->getLocalFile()->upload(
858 $this->mTempPath,
859 $comment,
860 $pageText,
862 $props,
863 false,
864 $user,
865 $tags
866 );
867
868 if ( $status->isGood() ) {
869 if ( $watch ) {
871 $this->getLocalFile()->getTitle(),
872 $user,
874 );
875 }
876 // Avoid PHP 7.1 warning of passing $this by reference
877 $uploadBase = $this;
878 Hooks::run( 'UploadComplete', [ &$uploadBase ] );
879
880 $this->postProcessUpload();
881 }
882
883 return $status;
884 }
885
891 public function postProcessUpload() {
892 }
893
900 public function getTitle() {
901 if ( $this->mTitle !== false ) {
902 return $this->mTitle;
903 }
904 if ( !is_string( $this->mDesiredDestName ) ) {
905 $this->mTitleError = self::ILLEGAL_FILENAME;
906 $this->mTitle = null;
907
908 return $this->mTitle;
909 }
910 /* Assume that if a user specified File:Something.jpg, this is an error
911 * and that the namespace prefix needs to be stripped of.
912 */
913 $title = Title::newFromText( $this->mDesiredDestName );
914 if ( $title && $title->getNamespace() == NS_FILE ) {
915 $this->mFilteredName = $title->getDBkey();
916 } else {
917 $this->mFilteredName = $this->mDesiredDestName;
918 }
919
920 # oi_archive_name is max 255 bytes, which include a timestamp and an
921 # exclamation mark, so restrict file name to 240 bytes.
922 if ( strlen( $this->mFilteredName ) > 240 ) {
923 $this->mTitleError = self::FILENAME_TOO_LONG;
924 $this->mTitle = null;
925
926 return $this->mTitle;
927 }
928
934 $this->mFilteredName = wfStripIllegalFilenameChars( $this->mFilteredName );
935 /* Normalize to title form before we do any further processing */
936 $nt = Title::makeTitleSafe( NS_FILE, $this->mFilteredName );
937 if ( is_null( $nt ) ) {
938 $this->mTitleError = self::ILLEGAL_FILENAME;
939 $this->mTitle = null;
940
941 return $this->mTitle;
942 }
943 $this->mFilteredName = $nt->getDBkey();
944
949 list( $partname, $ext ) = $this->splitExtensions( $this->mFilteredName );
950
951 if ( $ext !== [] ) {
952 $this->mFinalExtension = trim( end( $ext ) );
953 } else {
954 $this->mFinalExtension = '';
955
956 # No extension, try guessing one
957 $magic = MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer();
958 $mime = $magic->guessMimeType( $this->mTempPath );
959 if ( $mime !== 'unknown/unknown' ) {
960 # Get a space separated list of extensions
961 $extList = $magic->getExtensionsForType( $mime );
962 if ( $extList ) {
963 # Set the extension to the canonical extension
964 $this->mFinalExtension = strtok( $extList, ' ' );
965
966 # Fix up the other variables
967 $this->mFilteredName .= ".{$this->mFinalExtension}";
968 $nt = Title::makeTitleSafe( NS_FILE, $this->mFilteredName );
970 }
971 }
972 }
973
974 /* Don't allow users to override the blacklist (check file extension) */
977
978 $blackListedExtensions = $this->checkFileExtensionList( $ext, $wgFileBlacklist );
979
980 if ( $this->mFinalExtension == '' ) {
981 $this->mTitleError = self::FILETYPE_MISSING;
982 $this->mTitle = null;
983
984 return $this->mTitle;
985 } elseif ( $blackListedExtensions ||
987 !$this->checkFileExtension( $this->mFinalExtension, $wgFileExtensions ) )
988 ) {
989 $this->mBlackListedExtensions = $blackListedExtensions;
990 $this->mTitleError = self::FILETYPE_BADTYPE;
991 $this->mTitle = null;
992
993 return $this->mTitle;
994 }
995
996 // Windows may be broken with special characters, see T3780
997 if ( !preg_match( '/^[\x0-\x7f]*$/', $nt->getText() )
998 && !RepoGroup::singleton()->getLocalRepo()->backendSupportsUnicodePaths()
999 ) {
1000 $this->mTitleError = self::WINDOWS_NONASCII_FILENAME;
1001 $this->mTitle = null;
1002
1003 return $this->mTitle;
1004 }
1005
1006 # If there was more than one "extension", reassemble the base
1007 # filename to prevent bogus complaints about length
1008 if ( count( $ext ) > 1 ) {
1009 $iterations = count( $ext ) - 1;
1010 for ( $i = 0; $i < $iterations; $i++ ) {
1011 $partname .= '.' . $ext[$i];
1012 }
1013 }
1014
1015 if ( strlen( $partname ) < 1 ) {
1016 $this->mTitleError = self::MIN_LENGTH_PARTNAME;
1017 $this->mTitle = null;
1018
1019 return $this->mTitle;
1020 }
1021
1022 $this->mTitle = $nt;
1023
1024 return $this->mTitle;
1025 }
1026
1032 public function getLocalFile() {
1033 if ( is_null( $this->mLocalFile ) ) {
1034 $nt = $this->getTitle();
1035 $this->mLocalFile = is_null( $nt ) ? null : wfLocalFile( $nt );
1036 }
1037
1038 return $this->mLocalFile;
1039 }
1040
1044 public function getStashFile() {
1045 return $this->mStashFile;
1046 }
1047
1059 public function tryStashFile( User $user, $isPartial = false ) {
1060 if ( !$isPartial ) {
1061 $error = $this->runUploadStashFileHook( $user );
1062 if ( $error ) {
1063 return Status::newFatal( ...$error );
1064 }
1065 }
1066 try {
1067 $file = $this->doStashFile( $user );
1068 return Status::newGood( $file );
1069 } catch ( UploadStashException $e ) {
1070 return Status::newFatal( 'uploadstash-exception', get_class( $e ), $e->getMessage() );
1071 }
1072 }
1073
1078 protected function runUploadStashFileHook( User $user ) {
1079 $props = $this->mFileProps;
1080 $error = null;
1081 Hooks::run( 'UploadStashFile', [ $this, $user, $props, &$error ] );
1082 if ( $error && !is_array( $error ) ) {
1083 $error = [ $error ];
1084 }
1085 return $error;
1086 }
1087
1107 public function stashFile( User $user = null ) {
1108 return $this->doStashFile( $user );
1109 }
1110
1117 protected function doStashFile( User $user = null ) {
1118 $stash = RepoGroup::singleton()->getLocalRepo()->getUploadStash( $user );
1119 $file = $stash->stashFile( $this->mTempPath, $this->getSourceType() );
1120 $this->mStashFile = $file;
1121
1122 return $file;
1123 }
1124
1132 public function stashFileGetKey() {
1133 wfDeprecated( __METHOD__, '1.28' );
1134 return $this->doStashFile()->getFileKey();
1135 }
1136
1143 public function stashSession() {
1144 wfDeprecated( __METHOD__, '1.28' );
1145 return $this->doStashFile()->getFileKey();
1146 }
1147
1152 public function cleanupTempFile() {
1153 if ( $this->mRemoveTempFile && $this->tempFileObj ) {
1154 // Delete when all relevant TempFSFile handles go out of scope
1155 wfDebug( __METHOD__ . ": Marked temporary file '{$this->mTempPath}' for removal\n" );
1156 $this->tempFileObj->autocollect();
1157 }
1158 }
1159
1160 public function getTempPath() {
1161 return $this->mTempPath;
1162 }
1163
1173 public static function splitExtensions( $filename ) {
1174 $bits = explode( '.', $filename );
1175 $basename = array_shift( $bits );
1176
1177 return [ $basename, $bits ];
1178 }
1179
1188 public static function checkFileExtension( $ext, $list ) {
1189 return in_array( strtolower( $ext ), $list );
1190 }
1191
1200 public static function checkFileExtensionList( $ext, $list ) {
1201 return array_intersect( array_map( 'strtolower', $ext ), $list );
1202 }
1203
1211 public static function verifyExtension( $mime, $extension ) {
1212 $magic = MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer();
1213
1214 if ( !$mime || $mime == 'unknown' || $mime == 'unknown/unknown' ) {
1215 if ( !$magic->isRecognizableExtension( $extension ) ) {
1216 wfDebug( __METHOD__ . ": passing file with unknown detected mime type; " .
1217 "unrecognized extension '$extension', can't verify\n" );
1218
1219 return true;
1220 } else {
1221 wfDebug( __METHOD__ . ": rejecting file with unknown detected mime type; " .
1222 "recognized extension '$extension', so probably invalid file\n" );
1223
1224 return false;
1225 }
1226 }
1227
1228 $match = $magic->isMatchingExtension( $extension, $mime );
1229
1230 if ( $match === null ) {
1231 if ( $magic->getTypesForExtension( $extension ) !== null ) {
1232 wfDebug( __METHOD__ . ": No extension known for $mime, but we know a mime for $extension\n" );
1233
1234 return false;
1235 } else {
1236 wfDebug( __METHOD__ . ": no file extension known for mime type $mime, passing file\n" );
1237
1238 return true;
1239 }
1240 } elseif ( $match === true ) {
1241 wfDebug( __METHOD__ . ": mime type $mime matches extension $extension, passing file\n" );
1242
1244 return true;
1245 } else {
1246 wfDebug( __METHOD__
1247 . ": mime type $mime mismatches file extension $extension, rejecting file\n" );
1248
1249 return false;
1250 }
1251 }
1252
1264 public static function detectScript( $file, $mime, $extension ) {
1265 global $wgAllowTitlesInSVG;
1266
1267 # ugly hack: for text files, always look at the entire file.
1268 # For binary field, just check the first K.
1269
1270 if ( strpos( $mime, 'text/' ) === 0 ) {
1271 $chunk = file_get_contents( $file );
1272 } else {
1273 $fp = fopen( $file, 'rb' );
1274 $chunk = fread( $fp, 1024 );
1275 fclose( $fp );
1276 }
1277
1278 $chunk = strtolower( $chunk );
1279
1280 if ( !$chunk ) {
1281 return false;
1282 }
1283
1284 # decode from UTF-16 if needed (could be used for obfuscation).
1285 if ( substr( $chunk, 0, 2 ) == "\xfe\xff" ) {
1286 $enc = 'UTF-16BE';
1287 } elseif ( substr( $chunk, 0, 2 ) == "\xff\xfe" ) {
1288 $enc = 'UTF-16LE';
1289 } else {
1290 $enc = null;
1291 }
1292
1293 if ( $enc ) {
1294 $chunk = iconv( $enc, "ASCII//IGNORE", $chunk );
1295 }
1296
1297 $chunk = trim( $chunk );
1298
1300 wfDebug( __METHOD__ . ": checking for embedded scripts and HTML stuff\n" );
1301
1302 # check for HTML doctype
1303 if ( preg_match( "/<!DOCTYPE *X?HTML/i", $chunk ) ) {
1304 return true;
1305 }
1306
1307 // Some browsers will interpret obscure xml encodings as UTF-8, while
1308 // PHP/expat will interpret the given encoding in the xml declaration (T49304)
1309 if ( $extension == 'svg' || strpos( $mime, 'image/svg' ) === 0 ) {
1310 if ( self::checkXMLEncodingMissmatch( $file ) ) {
1311 return true;
1312 }
1313 }
1314
1330 $tags = [
1331 '<a href',
1332 '<body',
1333 '<head',
1334 '<html', # also in safari
1335 '<img',
1336 '<pre',
1337 '<script', # also in safari
1338 '<table'
1339 ];
1340
1341 if ( !$wgAllowTitlesInSVG && $extension !== 'svg' && $mime !== 'image/svg' ) {
1342 $tags[] = '<title';
1343 }
1344
1345 foreach ( $tags as $tag ) {
1346 if ( strpos( $chunk, $tag ) !== false ) {
1347 wfDebug( __METHOD__ . ": found something that may make it be mistaken for html: $tag\n" );
1348
1349 return true;
1350 }
1351 }
1352
1353 /*
1354 * look for JavaScript
1355 */
1356
1357 # resolve entity-refs to look at attributes. may be harsh on big files... cache result?
1358 $chunk = Sanitizer::decodeCharReferences( $chunk );
1359
1360 # look for script-types
1361 if ( preg_match( '!type\s*=\s*[\'"]?\s*(?:\w*/)?(?:ecma|java)!sim', $chunk ) ) {
1362 wfDebug( __METHOD__ . ": found script types\n" );
1363
1364 return true;
1365 }
1366
1367 # look for html-style script-urls
1368 if ( preg_match( '!(?:href|src|data)\s*=\s*[\'"]?\s*(?:ecma|java)script:!sim', $chunk ) ) {
1369 wfDebug( __METHOD__ . ": found html-style script urls\n" );
1370
1371 return true;
1372 }
1373
1374 # look for css-style script-urls
1375 if ( preg_match( '!url\s*\‍(\s*[\'"]?\s*(?:ecma|java)script:!sim', $chunk ) ) {
1376 wfDebug( __METHOD__ . ": found css-style script urls\n" );
1377
1378 return true;
1379 }
1380
1381 wfDebug( __METHOD__ . ": no scripts found\n" );
1382
1383 return false;
1384 }
1385
1393 public static function checkXMLEncodingMissmatch( $file ) {
1394 global $wgSVGMetadataCutoff;
1395 $contents = file_get_contents( $file, false, null, 0, $wgSVGMetadataCutoff );
1396 $encodingRegex = '!encoding[ \t\n\r]*=[ \t\n\r]*[\'"](.*?)[\'"]!si';
1397
1398 if ( preg_match( "!<\?xml\b(.*?)\?>!si", $contents, $matches ) ) {
1399 if ( preg_match( $encodingRegex, $matches[1], $encMatch )
1400 && !in_array( strtoupper( $encMatch[1] ), self::$safeXmlEncodings )
1401 ) {
1402 wfDebug( __METHOD__ . ": Found unsafe XML encoding '{$encMatch[1]}'\n" );
1403
1404 return true;
1405 }
1406 } elseif ( preg_match( "!<\?xml\b!si", $contents ) ) {
1407 // Start of XML declaration without an end in the first $wgSVGMetadataCutoff
1408 // bytes. There shouldn't be a legitimate reason for this to happen.
1409 wfDebug( __METHOD__ . ": Unmatched XML declaration start\n" );
1410
1411 return true;
1412 } elseif ( substr( $contents, 0, 4 ) == "\x4C\x6F\xA7\x94" ) {
1413 // EBCDIC encoded XML
1414 wfDebug( __METHOD__ . ": EBCDIC Encoded XML\n" );
1415
1416 return true;
1417 }
1418
1419 // It's possible the file is encoded with multi-byte encoding, so re-encode attempt to
1420 // detect the encoding in case is specifies an encoding not whitelisted in self::$safeXmlEncodings
1421 $attemptEncodings = [ 'UTF-16', 'UTF-16BE', 'UTF-32', 'UTF-32BE' ];
1422 foreach ( $attemptEncodings as $encoding ) {
1424 $str = iconv( $encoding, 'UTF-8', $contents );
1426 if ( $str != '' && preg_match( "!<\?xml\b(.*?)\?>!si", $str, $matches ) ) {
1427 if ( preg_match( $encodingRegex, $matches[1], $encMatch )
1428 && !in_array( strtoupper( $encMatch[1] ), self::$safeXmlEncodings )
1429 ) {
1430 wfDebug( __METHOD__ . ": Found unsafe XML encoding '{$encMatch[1]}'\n" );
1431
1432 return true;
1433 }
1434 } elseif ( $str != '' && preg_match( "!<\?xml\b!si", $str ) ) {
1435 // Start of XML declaration without an end in the first $wgSVGMetadataCutoff
1436 // bytes. There shouldn't be a legitimate reason for this to happen.
1437 wfDebug( __METHOD__ . ": Unmatched XML declaration start\n" );
1438
1439 return true;
1440 }
1441 }
1442
1443 return false;
1444 }
1445
1451 protected function detectScriptInSvg( $filename, $partial ) {
1452 $this->mSVGNSError = false;
1453 $check = new XmlTypeCheck(
1454 $filename,
1455 [ $this, 'checkSvgScriptCallback' ],
1456 true,
1457 [
1458 'processing_instruction_handler' => 'UploadBase::checkSvgPICallback',
1459 'external_dtd_handler' => 'UploadBase::checkSvgExternalDTD',
1460 ]
1461 );
1462 if ( $check->wellFormed !== true ) {
1463 // Invalid xml (T60553)
1464 // But only when non-partial (T67724)
1465 return $partial ? false : [ 'uploadinvalidxml' ];
1466 } elseif ( $check->filterMatch ) {
1467 if ( $this->mSVGNSError ) {
1468 return [ 'uploadscriptednamespace', $this->mSVGNSError ];
1469 }
1470
1471 return $check->filterMatchType;
1472 }
1473
1474 return false;
1475 }
1476
1483 public static function checkSvgPICallback( $target, $data ) {
1484 // Don't allow external stylesheets (T59550)
1485 if ( preg_match( '/xml-stylesheet/i', $target ) ) {
1486 return [ 'upload-scripted-pi-callback' ];
1487 }
1488
1489 return false;
1490 }
1491
1503 public static function checkSvgExternalDTD( $type, $publicId, $systemId ) {
1504 // This doesn't include the XHTML+MathML+SVG doctype since we don't
1505 // allow XHTML anyways.
1506 $allowedDTDs = [
1507 'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd',
1508 'http://www.w3.org/TR/2001/REC-SVG-20010904/DTD/svg10.dtd',
1509 'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11-basic.dtd',
1510 'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11-tiny.dtd',
1511 // https://phabricator.wikimedia.org/T168856
1512 'http://www.w3.org/TR/2001/PR-SVG-20010719/DTD/svg10.dtd',
1513 ];
1514 if ( $type !== 'PUBLIC'
1515 || !in_array( $systemId, $allowedDTDs )
1516 || strpos( $publicId, "-//W3C//" ) !== 0
1517 ) {
1518 return [ 'upload-scripted-dtd' ];
1519 }
1520 return false;
1521 }
1522
1530 public function checkSvgScriptCallback( $element, $attribs, $data = null ) {
1531 list( $namespace, $strippedElement ) = $this->splitXmlNamespace( $element );
1532
1533 // We specifically don't include:
1534 // http://www.w3.org/1999/xhtml (T62771)
1535 static $validNamespaces = [
1536 '',
1537 'adobe:ns:meta/',
1538 'http://creativecommons.org/ns#',
1539 'http://inkscape.sourceforge.net/dtd/sodipodi-0.dtd',
1540 'http://ns.adobe.com/adobeillustrator/10.0/',
1541 'http://ns.adobe.com/adobesvgviewerextensions/3.0/',
1542 'http://ns.adobe.com/extensibility/1.0/',
1543 'http://ns.adobe.com/flows/1.0/',
1544 'http://ns.adobe.com/illustrator/1.0/',
1545 'http://ns.adobe.com/imagereplacement/1.0/',
1546 'http://ns.adobe.com/pdf/1.3/',
1547 'http://ns.adobe.com/photoshop/1.0/',
1548 'http://ns.adobe.com/saveforweb/1.0/',
1549 'http://ns.adobe.com/variables/1.0/',
1550 'http://ns.adobe.com/xap/1.0/',
1551 'http://ns.adobe.com/xap/1.0/g/',
1552 'http://ns.adobe.com/xap/1.0/g/img/',
1553 'http://ns.adobe.com/xap/1.0/mm/',
1554 'http://ns.adobe.com/xap/1.0/rights/',
1555 'http://ns.adobe.com/xap/1.0/stype/dimensions#',
1556 'http://ns.adobe.com/xap/1.0/stype/font#',
1557 'http://ns.adobe.com/xap/1.0/stype/manifestitem#',
1558 'http://ns.adobe.com/xap/1.0/stype/resourceevent#',
1559 'http://ns.adobe.com/xap/1.0/stype/resourceref#',
1560 'http://ns.adobe.com/xap/1.0/t/pg/',
1561 'http://purl.org/dc/elements/1.1/',
1562 'http://purl.org/dc/elements/1.1',
1563 'http://schemas.microsoft.com/visio/2003/svgextensions/',
1564 'http://sodipodi.sourceforge.net/dtd/sodipodi-0.dtd',
1565 'http://taptrix.com/inkpad/svg_extensions',
1566 'http://web.resource.org/cc/',
1567 'http://www.freesoftware.fsf.org/bkchem/cdml',
1568 'http://www.inkscape.org/namespaces/inkscape',
1569 'http://www.opengis.net/gml',
1570 'http://www.w3.org/1999/02/22-rdf-syntax-ns#',
1571 'http://www.w3.org/2000/svg',
1572 'http://www.w3.org/tr/rec-rdf-syntax/',
1573 'http://www.w3.org/2000/01/rdf-schema#',
1574 ];
1575
1576 // Inkscape mangles namespace definitions created by Adobe Illustrator.
1577 // This is nasty but harmless. (T144827)
1578 $isBuggyInkscape = preg_match( '/^&(#38;)*ns_[a-z_]+;$/', $namespace );
1579
1580 if ( !( $isBuggyInkscape || in_array( $namespace, $validNamespaces ) ) ) {
1581 wfDebug( __METHOD__ . ": Non-svg namespace '$namespace' in uploaded file.\n" );
1583 $this->mSVGNSError = $namespace;
1584
1585 return true;
1586 }
1587
1588 /*
1589 * check for elements that can contain javascript
1590 */
1591 if ( $strippedElement == 'script' ) {
1592 wfDebug( __METHOD__ . ": Found script element '$element' in uploaded file.\n" );
1593
1594 return [ 'uploaded-script-svg', $strippedElement ];
1595 }
1596
1597 # e.g., <svg xmlns="http://www.w3.org/2000/svg">
1598 # <handler xmlns:ev="http://www.w3.org/2001/xml-events" ev:event="load">alert(1)</handler> </svg>
1599 if ( $strippedElement == 'handler' ) {
1600 wfDebug( __METHOD__ . ": Found scriptable element '$element' in uploaded file.\n" );
1601
1602 return [ 'uploaded-script-svg', $strippedElement ];
1603 }
1604
1605 # SVG reported in Feb '12 that used xml:stylesheet to generate javascript block
1606 if ( $strippedElement == 'stylesheet' ) {
1607 wfDebug( __METHOD__ . ": Found scriptable element '$element' in uploaded file.\n" );
1608
1609 return [ 'uploaded-script-svg', $strippedElement ];
1610 }
1611
1612 # Block iframes, in case they pass the namespace check
1613 if ( $strippedElement == 'iframe' ) {
1614 wfDebug( __METHOD__ . ": iframe in uploaded file.\n" );
1615
1616 return [ 'uploaded-script-svg', $strippedElement ];
1617 }
1618
1619 # Check <style> css
1620 if ( $strippedElement == 'style'
1621 && self::checkCssFragment( Sanitizer::normalizeCss( $data ) )
1622 ) {
1623 wfDebug( __METHOD__ . ": hostile css in style element.\n" );
1624 return [ 'uploaded-hostile-svg' ];
1625 }
1626
1627 foreach ( $attribs as $attrib => $value ) {
1628 $stripped = $this->stripXmlNamespace( $attrib );
1630
1631 if ( substr( $stripped, 0, 2 ) == 'on' ) {
1632 wfDebug( __METHOD__
1633 . ": Found event-handler attribute '$attrib'='$value' in uploaded file.\n" );
1634
1635 return [ 'uploaded-event-handler-on-svg', $attrib, $value ];
1636 }
1637
1638 # Do not allow relative links, or unsafe url schemas.
1639 # For <a> tags, only data:, http: and https: and same-document
1640 # fragment links are allowed. For all other tags, only data:
1641 # and fragment are allowed.
1642 if ( $stripped == 'href'
1643 && $value !== ''
1644 && strpos( $value, 'data:' ) !== 0
1645 && strpos( $value, '#' ) !== 0
1646 ) {
1647 if ( !( $strippedElement === 'a'
1648 && preg_match( '!^https?://!i', $value ) )
1649 ) {
1650 wfDebug( __METHOD__ . ": Found href attribute <$strippedElement "
1651 . "'$attrib'='$value' in uploaded file.\n" );
1652
1653 return [ 'uploaded-href-attribute-svg', $strippedElement, $attrib, $value ];
1654 }
1655 }
1656
1657 # only allow data: targets that should be safe. This prevents vectors like,
1658 # image/svg, text/xml, application/xml, and text/html, which can contain scripts
1659 if ( $stripped == 'href' && strncasecmp( 'data:', $value, 5 ) === 0 ) {
1660 // rfc2397 parameters. This is only slightly slower than (;[\w;]+)*.
1661 // phpcs:ignore Generic.Files.LineLength
1662 $parameters = '(?>;[a-zA-Z0-9\!#$&\'*+.^_`{|}~-]+=(?>[a-zA-Z0-9\!#$&\'*+.^_`{|}~-]+|"(?>[\0-\x0c\x0e-\x21\x23-\x5b\x5d-\x7f]+|\\\\[\0-\x7f])*"))*(?:;base64)?';
1663
1664 if ( !preg_match( "!^data:\s*image/(gif|jpeg|jpg|png)$parameters,!i", $value ) ) {
1665 wfDebug( __METHOD__ . ": Found href to unwhitelisted data: uri "
1666 . "\"<$strippedElement '$attrib'='$value'...\" in uploaded file.\n" );
1667 return [ 'uploaded-href-unsafe-target-svg', $strippedElement, $attrib, $value ];
1668 }
1669 }
1670
1671 # Change href with animate from (http://html5sec.org/#137).
1672 if ( $stripped === 'attributename'
1673 && $strippedElement === 'animate'
1674 && $this->stripXmlNamespace( $value ) == 'href'
1675 ) {
1676 wfDebug( __METHOD__ . ": Found animate that might be changing href using from "
1677 . "\"<$strippedElement '$attrib'='$value'...\" in uploaded file.\n" );
1678
1679 return [ 'uploaded-animate-svg', $strippedElement, $attrib, $value ];
1680 }
1681
1682 # use set/animate to add event-handler attribute to parent
1683 if ( ( $strippedElement == 'set' || $strippedElement == 'animate' )
1684 && $stripped == 'attributename'
1685 && substr( $value, 0, 2 ) == 'on'
1686 ) {
1687 wfDebug( __METHOD__ . ": Found svg setting event-handler attribute with "
1688 . "\"<$strippedElement $stripped='$value'...\" in uploaded file.\n" );
1689
1690 return [ 'uploaded-setting-event-handler-svg', $strippedElement, $stripped, $value ];
1691 }
1692
1693 # use set to add href attribute to parent element
1694 if ( $strippedElement == 'set'
1695 && $stripped == 'attributename'
1696 && strpos( $value, 'href' ) !== false
1697 ) {
1698 wfDebug( __METHOD__ . ": Found svg setting href attribute '$value' in uploaded file.\n" );
1699
1700 return [ 'uploaded-setting-href-svg' ];
1701 }
1702
1703 # use set to add a remote / data / script target to an element
1704 if ( $strippedElement == 'set'
1705 && $stripped == 'to'
1706 && preg_match( '!(http|https|data|script):!sim', $value )
1707 ) {
1708 wfDebug( __METHOD__ . ": Found svg setting attribute to '$value' in uploaded file.\n" );
1709
1710 return [ 'uploaded-wrong-setting-svg', $value ];
1711 }
1712
1713 # use handler attribute with remote / data / script
1714 if ( $stripped == 'handler' && preg_match( '!(http|https|data|script):!sim', $value ) ) {
1715 wfDebug( __METHOD__ . ": Found svg setting handler with remote/data/script "
1716 . "'$attrib'='$value' in uploaded file.\n" );
1717
1718 return [ 'uploaded-setting-handler-svg', $attrib, $value ];
1719 }
1720
1721 # use CSS styles to bring in remote code
1722 if ( $stripped == 'style'
1723 && self::checkCssFragment( Sanitizer::normalizeCss( $value ) )
1724 ) {
1725 wfDebug( __METHOD__ . ": Found svg setting a style with "
1726 . "remote url '$attrib'='$value' in uploaded file.\n" );
1727 return [ 'uploaded-remote-url-svg', $attrib, $value ];
1728 }
1729
1730 # Several attributes can include css, css character escaping isn't allowed
1731 $cssAttrs = [ 'font', 'clip-path', 'fill', 'filter', 'marker',
1732 'marker-end', 'marker-mid', 'marker-start', 'mask', 'stroke' ];
1733 if ( in_array( $stripped, $cssAttrs )
1734 && self::checkCssFragment( $value )
1735 ) {
1736 wfDebug( __METHOD__ . ": Found svg setting a style with "
1737 . "remote url '$attrib'='$value' in uploaded file.\n" );
1738 return [ 'uploaded-remote-url-svg', $attrib, $value ];
1739 }
1740
1741 # image filters can pull in url, which could be svg that executes scripts
1742 # Only allow url( "#foo" ). Do not allow url( http://example.com )
1743 if ( $strippedElement == 'image'
1744 && $stripped == 'filter'
1745 && preg_match( '!url\s*\‍(\s*["\']?[^#]!sim', $value )
1746 ) {
1747 wfDebug( __METHOD__ . ": Found image filter with url: "
1748 . "\"<$strippedElement $stripped='$value'...\" in uploaded file.\n" );
1749
1750 return [ 'uploaded-image-filter-svg', $strippedElement, $stripped, $value ];
1751 }
1752 }
1753
1754 return false; // No scripts detected
1755 }
1756
1764 private static function checkCssFragment( $value ) {
1765 # Forbid external stylesheets, for both reliability and to protect viewer's privacy
1766 if ( stripos( $value, '@import' ) !== false ) {
1767 return true;
1768 }
1769
1770 # We allow @font-face to embed fonts with data: urls, so we snip the string
1771 # 'url' out so this case won't match when we check for urls below
1772 $pattern = '!(@font-face\s*{[^}]*src:)url(\‍("data:;base64,)!im';
1773 $value = preg_replace( $pattern, '$1$2', $value );
1774
1775 # Check for remote and executable CSS. Unlike in Sanitizer::checkCss, the CSS
1776 # properties filter and accelerator don't seem to be useful for xss in SVG files.
1777 # Expression and -o-link don't seem to work either, but filtering them here in case.
1778 # Additionally, we catch remote urls like url("http:..., url('http:..., url(http:...,
1779 # but not local ones such as url("#..., url('#..., url(#....
1780 if ( preg_match( '!expression
1781 | -o-link\s*:
1782 | -o-link-source\s*:
1783 | -o-replace\s*:!imx', $value ) ) {
1784 return true;
1785 }
1786
1787 if ( preg_match_all(
1788 "!(\s*(url|image|image-set)\s*\‍(\s*[\"']?\s*[^#]+.*?\‍))!sim",
1789 $value,
1790 $matches
1791 ) !== 0
1792 ) {
1793 # TODO: redo this in one regex. Until then, url("#whatever") matches the first
1794 foreach ( $matches[1] as $match ) {
1795 if ( !preg_match( "!\s*(url|image|image-set)\s*\‍(\s*(#|'#|\"#)!im", $match ) ) {
1796 return true;
1797 }
1798 }
1799 }
1800
1801 if ( preg_match( '/[\000-\010\013\016-\037\177]/', $value ) ) {
1802 return true;
1803 }
1804
1805 return false;
1806 }
1807
1813 private static function splitXmlNamespace( $element ) {
1814 // 'http://www.w3.org/2000/svg:script' -> [ 'http://www.w3.org/2000/svg', 'script' ]
1815 $parts = explode( ':', strtolower( $element ) );
1816 $name = array_pop( $parts );
1817 $ns = implode( ':', $parts );
1818
1819 return [ $ns, $name ];
1820 }
1821
1826 private function stripXmlNamespace( $name ) {
1827 // 'http://www.w3.org/2000/svg:script' -> 'script'
1828 $parts = explode( ':', strtolower( $name ) );
1829
1830 return array_pop( $parts );
1831 }
1832
1843 public static function detectVirus( $file ) {
1845
1846 if ( !$wgAntivirus ) {
1847 wfDebug( __METHOD__ . ": virus scanner disabled\n" );
1848
1849 return null;
1850 }
1851
1853 wfDebug( __METHOD__ . ": unknown virus scanner: $wgAntivirus\n" );
1854 $wgOut->wrapWikiMsg( "<div class=\"error\">\n$1\n</div>",
1855 [ 'virus-badscanner', $wgAntivirus ] );
1856
1857 return wfMessage( 'virus-unknownscanner' )->text() . " $wgAntivirus";
1858 }
1859
1860 # look up scanner configuration
1862 $exitCodeMap = $wgAntivirusSetup[$wgAntivirus]['codemap'];
1863 $msgPattern = $wgAntivirusSetup[$wgAntivirus]['messagepattern'] ?? null;
1864
1865 if ( strpos( $command, "%f" ) === false ) {
1866 # simple pattern: append file to scan
1867 $command .= " " . Shell::escape( $file );
1868 } else {
1869 # complex pattern: replace "%f" with file to scan
1870 $command = str_replace( "%f", Shell::escape( $file ), $command );
1871 }
1872
1873 wfDebug( __METHOD__ . ": running virus scan: $command \n" );
1874
1875 # execute virus scanner
1876 $exitCode = false;
1877
1878 # NOTE: there's a 50 line workaround to make stderr redirection work on windows, too.
1879 # that does not seem to be worth the pain.
1880 # Ask me (Duesentrieb) about it if it's ever needed.
1881 $output = wfShellExecWithStderr( $command, $exitCode );
1882
1883 # map exit code to AV_xxx constants.
1884 $mappedCode = $exitCode;
1885 if ( $exitCodeMap ) {
1886 if ( isset( $exitCodeMap[$exitCode] ) ) {
1887 $mappedCode = $exitCodeMap[$exitCode];
1888 } elseif ( isset( $exitCodeMap["*"] ) ) {
1889 $mappedCode = $exitCodeMap["*"];
1890 }
1891 }
1892
1893 /* NB: AV_NO_VIRUS is 0 but AV_SCAN_FAILED is false,
1894 * so we need the strict equalities === and thus can't use a switch here
1895 */
1896 if ( $mappedCode === AV_SCAN_FAILED ) {
1897 # scan failed (code was mapped to false by $exitCodeMap)
1898 wfDebug( __METHOD__ . ": failed to scan $file (code $exitCode).\n" );
1899
1901 ? wfMessage( 'virus-scanfailed', [ $exitCode ] )->text()
1902 : null;
1903 } elseif ( $mappedCode === AV_SCAN_ABORTED ) {
1904 # scan failed because filetype is unknown (probably imune)
1905 wfDebug( __METHOD__ . ": unsupported file type $file (code $exitCode).\n" );
1906 $output = null;
1907 } elseif ( $mappedCode === AV_NO_VIRUS ) {
1908 # no virus found
1909 wfDebug( __METHOD__ . ": file passed virus scan.\n" );
1910 $output = false;
1911 } else {
1912 $output = trim( $output );
1913
1914 if ( !$output ) {
1915 $output = true; # if there's no output, return true
1916 } elseif ( $msgPattern ) {
1917 $groups = [];
1918 if ( preg_match( $msgPattern, $output, $groups ) && $groups[1] ) {
1919 $output = $groups[1];
1920 }
1921 }
1922
1923 wfDebug( __METHOD__ . ": FOUND VIRUS! scanner feedback: $output \n" );
1924 }
1925
1926 return $output;
1927 }
1928
1937 private function checkOverwrite( $user ) {
1938 // First check whether the local file can be overwritten
1939 $file = $this->getLocalFile();
1940 $file->load( File::READ_LATEST );
1941 if ( $file->exists() ) {
1942 if ( !self::userCanReUpload( $user, $file ) ) {
1943 return [ 'fileexists-forbidden', $file->getName() ];
1944 } else {
1945 return true;
1946 }
1947 }
1948
1949 /* Check shared conflicts: if the local file does not exist, but
1950 * wfFindFile finds a file, it exists in a shared repository.
1951 */
1952 $file = wfFindFile( $this->getTitle(), [ 'latest' => true ] );
1953 if ( $file && !$user->isAllowed( 'reupload-shared' ) ) {
1954 return [ 'fileexists-shared-forbidden', $file->getName() ];
1955 }
1956
1957 return true;
1958 }
1959
1967 public static function userCanReUpload( User $user, File $img ) {
1968 if ( $user->isAllowed( 'reupload' ) ) {
1969 return true; // non-conditional
1970 } elseif ( !$user->isAllowed( 'reupload-own' ) ) {
1971 return false;
1972 }
1973
1974 if ( !( $img instanceof LocalFile ) ) {
1975 return false;
1976 }
1977
1978 $img->load();
1979
1980 return $user->getId() == $img->getUser( 'id' );
1981 }
1982
1994 public static function getExistsWarning( $file ) {
1995 if ( $file->exists() ) {
1996 return [ 'warning' => 'exists', 'file' => $file ];
1997 }
1998
1999 if ( $file->getTitle()->getArticleID() ) {
2000 return [ 'warning' => 'page-exists', 'file' => $file ];
2001 }
2002
2003 if ( strpos( $file->getName(), '.' ) == false ) {
2004 $partname = $file->getName();
2005 $extension = '';
2006 } else {
2007 $n = strrpos( $file->getName(), '.' );
2008 $extension = substr( $file->getName(), $n + 1 );
2009 $partname = substr( $file->getName(), 0, $n );
2010 }
2011 $normalizedExtension = File::normalizeExtension( $extension );
2012
2013 if ( $normalizedExtension != $extension ) {
2014 // We're not using the normalized form of the extension.
2015 // Normal form is lowercase, using most common of alternate
2016 // extensions (eg 'jpg' rather than 'JPEG').
2017
2018 // Check for another file using the normalized form...
2019 $nt_lc = Title::makeTitle( NS_FILE, "{$partname}.{$normalizedExtension}" );
2020 $file_lc = wfLocalFile( $nt_lc );
2021
2022 if ( $file_lc->exists() ) {
2023 return [
2024 'warning' => 'exists-normalized',
2025 'file' => $file,
2026 'normalizedFile' => $file_lc
2027 ];
2028 }
2029 }
2030
2031 // Check for files with the same name but a different extension
2032 $similarFiles = RepoGroup::singleton()->getLocalRepo()->findFilesByPrefix(
2033 "{$partname}.", 1 );
2034 if ( count( $similarFiles ) ) {
2035 return [
2036 'warning' => 'exists-normalized',
2037 'file' => $file,
2038 'normalizedFile' => $similarFiles[0],
2039 ];
2040 }
2041
2042 if ( self::isThumbName( $file->getName() ) ) {
2043 # Check for filenames like 50px- or 180px-, these are mostly thumbnails
2044 $nt_thb = Title::newFromText(
2045 substr( $partname, strpos( $partname, '-' ) + 1 ) . '.' . $extension,
2046 NS_FILE
2047 );
2048 $file_thb = wfLocalFile( $nt_thb );
2049 if ( $file_thb->exists() ) {
2050 return [
2051 'warning' => 'thumb',
2052 'file' => $file,
2053 'thumbFile' => $file_thb
2054 ];
2055 } else {
2056 // File does not exist, but we just don't like the name
2057 return [
2058 'warning' => 'thumb-name',
2059 'file' => $file,
2060 'thumbFile' => $file_thb
2061 ];
2062 }
2063 }
2064
2065 foreach ( self::getFilenamePrefixBlacklist() as $prefix ) {
2066 if ( substr( $partname, 0, strlen( $prefix ) ) == $prefix ) {
2067 return [
2068 'warning' => 'bad-prefix',
2069 'file' => $file,
2070 'prefix' => $prefix
2071 ];
2072 }
2073 }
2074
2075 return false;
2076 }
2077
2083 public static function isThumbName( $filename ) {
2084 $n = strrpos( $filename, '.' );
2085 $partname = $n ? substr( $filename, 0, $n ) : $filename;
2086
2087 return (
2088 substr( $partname, 3, 3 ) == 'px-' ||
2089 substr( $partname, 2, 3 ) == 'px-'
2090 ) &&
2091 preg_match( "/[0-9]{2}/", substr( $partname, 0, 2 ) );
2092 }
2093
2099 public static function getFilenamePrefixBlacklist() {
2100 $blacklist = [];
2101 $message = wfMessage( 'filename-prefix-blacklist' )->inContentLanguage();
2102 if ( !$message->isDisabled() ) {
2103 $lines = explode( "\n", $message->plain() );
2104 foreach ( $lines as $line ) {
2105 // Remove comment lines
2106 $comment = substr( trim( $line ), 0, 1 );
2107 if ( $comment == '#' || $comment == '' ) {
2108 continue;
2109 }
2110 // Remove additional comments after a prefix
2111 $comment = strpos( $line, '#' );
2112 if ( $comment > 0 ) {
2113 $line = substr( $line, 0, $comment - 1 );
2114 }
2115 $blacklist[] = trim( $line );
2116 }
2117 }
2118
2119 return $blacklist;
2120 }
2121
2133 public function getImageInfo( $result ) {
2134 $localFile = $this->getLocalFile();
2135 $stashFile = $this->getStashFile();
2136 // Calling a different API module depending on whether the file was stashed is less than optimal.
2137 // In fact, calling API modules here at all is less than optimal. Maybe it should be refactored.
2138 if ( $stashFile ) {
2140 $info = ApiQueryStashImageInfo::getInfo( $stashFile, array_flip( $imParam ), $result );
2141 } else {
2143 $info = ApiQueryImageInfo::getInfo( $localFile, array_flip( $imParam ), $result );
2144 }
2145
2146 return $info;
2147 }
2148
2153 public function convertVerifyErrorToStatus( $error ) {
2154 $code = $error['status'];
2155 unset( $code['status'] );
2156
2157 return Status::newFatal( $this->getVerificationErrorCode( $code ), $error );
2158 }
2159
2167 public static function getMaxUploadSize( $forType = null ) {
2168 global $wgMaxUploadSize;
2169
2170 if ( is_array( $wgMaxUploadSize ) ) {
2171 if ( !is_null( $forType ) && isset( $wgMaxUploadSize[$forType] ) ) {
2172 return $wgMaxUploadSize[$forType];
2173 } else {
2174 return $wgMaxUploadSize['*'];
2175 }
2176 } else {
2177 return intval( $wgMaxUploadSize );
2178 }
2179 }
2180
2188 public static function getMaxPhpUploadSize() {
2189 $phpMaxFileSize = wfShorthandToInteger(
2190 ini_get( 'upload_max_filesize' ) ?: ini_get( 'hhvm.server.upload.upload_max_file_size' ),
2192 );
2193 $phpMaxPostSize = wfShorthandToInteger(
2194 ini_get( 'post_max_size' ) ?: ini_get( 'hhvm.server.max_post_size' ),
2196 ) ?: PHP_INT_MAX;
2197 return min( $phpMaxFileSize, $phpMaxPostSize );
2198 }
2199
2209 public static function getSessionStatus( User $user, $statusKey ) {
2210 $cache = MediaWikiServices::getInstance()->getMainObjectStash();
2211 $key = $cache->makeKey( 'uploadstatus', $user->getId() ?: md5( $user->getName() ), $statusKey );
2212
2213 return $cache->get( $key );
2214 }
2215
2226 public static function setSessionStatus( User $user, $statusKey, $value ) {
2227 $cache = MediaWikiServices::getInstance()->getMainObjectStash();
2228 $key = $cache->makeKey( 'uploadstatus', $user->getId() ?: md5( $user->getName() ), $statusKey );
2229
2230 if ( $value === false ) {
2231 $cache->delete( $key );
2232 } else {
2233 $cache->set( $key, $value, $cache::TTL_DAY );
2234 }
2235 }
2236}
and that you know you can do these things To protect your we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restrictions translate to certain responsibilities for you if you distribute copies of the or if you modify it For if you distribute copies of such a whether gratis or for a you must give the recipients all the rights that you have You must make sure that receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two and(2) offer you this license which gives you legal permission to copy
we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY BECAUSE THE PROGRAM IS LICENSED FREE OF THERE IS NO WARRANTY FOR THE TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY EITHER EXPRESSED OR BUT NOT LIMITED THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE YOU ASSUME THE COST OF ALL NECESSARY REPAIR OR CORRECTION IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED BE LIABLE TO YOU FOR INCLUDING ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new and you want it to be of the greatest possible use to the public
Definition COPYING.txt:285
$wgAntivirus
Internal name of virus scanner.
$wgFileExtensions
This is the list of preferred extensions for uploading files.
$wgCheckFileExtensions
This is a flag to determine whether or not to check file extensions on upload.
$wgAntivirusRequired
Determines if a failed virus scan (AV_SCAN_FAILED) will cause the file to be rejected.
$wgUploadSizeWarning
Warn if uploaded files are larger than this (in bytes), or false to disable.
$wgDisableUploadScriptChecks
Setting this to true will disable the upload system's checks for HTML/JavaScript.
$wgVerifyMimeType
Determines if the MIME type of uploaded files should be checked.
$wgAntivirusSetup
Configuration for different virus scanners.
$wgFileBlacklist
Files with these extensions will never be allowed as uploads.
$wgEnableUploads
Allow users to upload files.
$wgAllowJavaUploads
Allow Java archive uploads.
$wgStrictFileExtensions
If this is turned off, users may override the warning for files not covered by $wgFileExtensions.
$wgMimeTypeBlacklist
Files with these MIME types will never be allowed as uploads if $wgVerifyMimeType is enabled.
$wgMaxUploadSize
Max size for uploads, in bytes.
$wgSVGMetadataCutoff
Don't read SVG metadata beyond this point.
$wgAllowTitlesInSVG
Disallow <title> element in SVG files.
wfDebug( $text, $dest='all', array $context=[])
Sends a line to the debug log if enabled or, optionally, to a comment in output.
wfIniGetBool( $setting)
Safety wrapper around ini_get() for boolean settings.
wfLocalFile( $title)
Get an object referring to a locally registered file.
wfArrayDiff2( $a, $b)
Like array_diff( $a, $b ) except that it works with two-dimensional arrays.
wfShellExecWithStderr( $cmd, &$retval=null, $environ=[], $limits=[])
Execute a shell command, returning both stdout and stderr.
wfStripIllegalFilenameChars( $name)
Replace all invalid characters with '-'.
wfShorthandToInteger( $string='', $default=-1)
Converts shorthand byte notation to integer form.
wfDeprecated( $function, $version=false, $component=false, $callerOffset=2)
Throws a warning that $function is deprecated.
wfIsHHVM()
Check if we are running under HHVM.
$wgOut
Definition Setup.php:880
$wgLang
Definition Setup.php:875
$line
Definition cdb.php:59
$command
Definition cdb.php:65
static getPropertyNames( $filter=[])
Returns all possible parameters to iiprop.
static getInfo( $file, $prop, $result, $thumbParams=null, $opts=false)
Get result information for an image revision.
Class representing a row of the 'filearchive' table.
static getSha1Base36FromPath( $path)
Get a SHA-1 hash of a file in the local filesystem, in base-36 lower case encoding,...
Definition FSFile.php:218
static isStoragePath( $path)
Check if a given path is a "mwstore://" path.
static isVirtualUrl( $url)
Determine if a string is an mwrepo:// URL.
Definition FileRepo.php:254
const DELETE_SOURCE
Definition File.php:67
const DELETED_FILE
Definition File.php:54
Class to represent a local file in the wiki's own database.
Definition LocalFile.php:46
MediaWiki exception.
MimeMagic helper wrapper.
static getHandler( $type)
Get a MediaHandler for a given MIME type from the instance cache.
MediaWikiServices is the service locator for the application scope of MediaWiki.
Executes shell commands.
Definition Shell.php:44
static singleton()
Get a RepoGroup instance.
Definition RepoGroup.php:61
This class is used to hold the location and do limited manipulation of files stored temporarily (this...
static newFromText( $text, $defaultNamespace=NS_MAIN)
Create a new Title from text, such as what one would find in a link.
Definition Title.php:306
UploadBase and subclasses are the backend of MediaWiki's file uploads.
getSourceType()
Returns the upload type.
checkOverwrite( $user)
Check if there's an overwrite conflict and, if so, if restrictions forbid this user from performing t...
const EMPTY_FILE
static verifyExtension( $mime, $extension)
Checks if the MIME type of the uploaded file matches the file extension.
postProcessUpload()
Perform extra steps after a successful upload.
verifyTitlePermissions( $user)
Check whether the user can edit, upload and create the image.
checkSvgScriptCallback( $element, $attribs, $data=null)
checkLocalFileExists(LocalFile $localFile, $hash)
getLocalFile()
Return the local file and initializes if necessary.
const SUCCESS
stripXmlNamespace( $name)
string $mTempPath
Local file system path to the file to upload (or a local copy)
checkBadFileName( $filename, $desiredFileName)
Check whether the resulting filename is different from the desired one, but ignore things like ucfirs...
$mBlackListedExtensions
getRealPath( $srcPath)
static createFromRequest(&$request, $type=null)
Create a form of UploadBase depending on wpSourceType and initializes it.
verifyPermissions( $user)
Alias for verifyTitlePermissions.
runUploadStashFileHook(User $user)
static getSessionStatus(User $user, $statusKey)
Get the current status of a chunked upload (used for polling)
zipEntryCallback( $entry)
Callback for ZipDirectoryReader to detect Java class files.
static checkSvgPICallback( $target, $data)
Callback to filter SVG Processing Instructions.
static isValidRequest( $request)
Check whether a request if valid for this handler.
const FILETYPE_MISSING
convertVerifyErrorToStatus( $error)
verifyPartialFile()
A verification routine suitable for partial files.
static detectScript( $file, $mime, $extension)
Heuristic for detecting files that could contain JavaScript instructions or things that may look like...
verifyFile()
Verifies that it's ok to include the uploaded file.
static isEnabled()
Returns true if uploads are enabled.
static isThumbName( $filename)
Helper function that checks whether the filename looks like a thumbnail.
getVerificationErrorCode( $error)
static checkCssFragment( $value)
Check a block of CSS or CSS fragment for anything that looks like it is bringing in remote code.
static getFilenamePrefixBlacklist()
Get a list of blacklisted filename prefixes from [[MediaWiki:Filename-prefix-blacklist]].
checkAgainstArchiveDupes( $hash)
const OVERWRITE_EXISTING_FILE
setTempFile( $tempPath, $fileSize=null)
stashSession()
alias for stashFileGetKey, for backwards compatibility
static checkXMLEncodingMissmatch( $file)
Check a whitelist of xml encodings that are known not to be interpreted differently by the server's x...
static $uploadHandlers
doStashFile(User $user=null)
Implementation for stashFile() and tryStashFile().
const HOOK_ABORTED
const VERIFICATION_ERROR
const WINDOWS_NONASCII_FILENAME
cleanupTempFile()
If we've modified the upload file we need to manually remove it on exit to clean up.
validateName()
Verify that the name is valid and, if necessary, that we can overwrite.
checkFileSize( $fileSize)
isEmptyFile()
Return true if the file is empty.
static checkFileExtension( $ext, $list)
Perform case-insensitive match against a list of file extensions.
const FILETYPE_BADTYPE
tryStashFile(User $user, $isPartial=false)
Like stashFile(), but respects extensions' wishes to prevent the stashing.
getTitle()
Returns the title of the file to be uploaded.
initializePathInfo( $name, $tempPath, $fileSize, $removeTempFile=false)
Initialize the path information.
static getMaxUploadSize( $forType=null)
Get the MediaWiki maximum uploaded file size for given type of upload, based on $wgMaxUploadSize.
static checkSvgExternalDTD( $type, $publicId, $systemId)
Verify that DTD urls referenced are only the standard dtds.
getTempFileSha1Base36()
Get the base 36 SHA1 of the file.
static splitXmlNamespace( $element)
Divide the element name passed by the xml parser to the callback into URI and prifix.
getImageInfo( $result)
Gets image info about the file just uploaded.
detectScriptInSvg( $filename, $partial)
static splitExtensions( $filename)
Split a file into a base name and all dot-delimited 'extensions' on the end.
fetchFile()
Fetch the file.
const FILE_TOO_LARGE
static isThrottled( $user)
Returns true if the user has surpassed the upload rate limit, false otherwise.
checkLocalFileWasDeleted(LocalFile $localFile)
stashFileGetKey()
Stash a file in a temporary directory, returning a key which can be used to find the file again.
performUpload( $comment, $pageText, $watch, $user, $tags=[])
Really perform the upload.
getFileSize()
Return the file size.
verifyUpload()
Verify whether the upload is sane.
stashFile(User $user=null)
If the user does not supply all necessary information in the first upload form submission (either by ...
const ILLEGAL_FILENAME
const MIN_LENGTH_PARTNAME
static checkFileExtensionList( $ext, $list)
Perform case-insensitive match against a list of file extensions.
checkWarnings()
Check for non fatal problems with the file.
static detectVirus( $file)
Generic wrapper function for a virus scanner program.
static isAllowed( $user)
Returns true if the user can use this upload module or else a string identifying the missing permissi...
checkUnwantedFileExtensions( $fileExtension)
TempFSFile null $tempFileObj
Wrapper to handle deleting the temp file.
static getExistsWarning( $file)
Helper function that does various existence checks for a file.
const FILENAME_TOO_LONG
static getMaxPhpUploadSize()
Get the PHP maximum uploaded file size, based on ini settings.
static $safeXmlEncodings
verifyMimeType( $mime)
Verify the MIME type.
static setSessionStatus(User $user, $statusKey, $value)
Set the current status of a chunked upload (used for polling)
initializeFromRequest(&$request)
Initialize from a WebRequest.
checkAgainstExistingDupes( $hash, $ignoreLocalDupes)
The User object encapsulates all of the user-specific settings (user_id, name, rights,...
Definition User.php:48
const IGNORE_USER_RIGHTS
Definition User.php:78
static doWatch(Title $title, User $user, $checkRights=User::CHECK_USER_RIGHTS)
Watch a page.
static read( $fileName, $callback, $options=[])
Read a ZIP file and call a function for each file discovered in it.
deferred txt A few of the database updates required by various functions here can be deferred until after the result page is displayed to the user For updating the view updating the linked to tables after a etc PHP does not yet have any way to tell the server to actually return and disconnect while still running these but it might have such a feature in the future We handle these by creating a deferred update object and putting those objects on a global list
Definition deferred.txt:11
namespace being checked & $result
Definition hooks.txt:2340
do that in ParserLimitReportFormat instead use this to modify the parameters of the image all existing parser cache entries will be invalid To avoid you ll need to handle that somehow(e.g. with the RejectParserCacheValue hook) because MediaWiki won 't do it for you. & $defaults also a ContextSource after deleting those rows but within the same transaction you ll probably need to make sure the header is varied on $request
Definition hooks.txt:2843
this hook is for auditing only or null if authentication failed before getting that far or null if we can t even determine that When $user is not it can be in the form of< username >< more info > e g for bot passwords intended to be added to log contexts Fields it might only if the login was with a bot password it is not rendered in wiki pages or galleries in category pages allow injecting custom HTML after the section Any uses of the hook need to handle escaping see BaseTemplate::getToolbox and BaseTemplate::makeListItem for details on the format of individual items inside of this array or by returning and letting standard HTTP rendering take place modifiable or by returning false and taking over the output modifiable modifiable after all normalizations have been except for the $wgMaxImageArea check set to true or false to override the $wgMaxImageArea check result gives extension the possibility to transform it themselves $handler
Definition hooks.txt:894
null means default in associative array form
Definition hooks.txt:1994
this hook is for auditing only or null if authentication failed before getting that far or null if we can t even determine that When $user is not null
Definition hooks.txt:783
this hook is for auditing only or null if authentication failed before getting that far or null if we can t even determine that When $user is not it can be in the form of< username >< more info > e g for bot passwords intended to be added to log contexts Fields it might only if the login was with a bot password it is not rendered in wiki pages or galleries in category pages allow injecting custom HTML after the section Any uses of the hook need to handle escaping see BaseTemplate::getToolbox and BaseTemplate::makeListItem for details on the format of individual items inside of this array or by returning and letting standard HTTP rendering take place modifiable or by returning false and taking over the output modifiable & $code
Definition hooks.txt:856
either a unescaped string or a HtmlArmor object after in associative array form externallinks including delete and has completed for all link tables whether this was an auto creation use $formDescriptor instead default is conds Array Extra conditions for the No matching items in log is displayed if loglist is empty msgKey Array If you want a nice box with a set this to the key of the message First element is the message additional optional elements are parameters for the key that are processed with wfMessage() -> params() ->parseAsBlock() - offset Set to overwrite offset parameter in $wgRequest set to '' to unset offset - wrap String Wrap the message in html(usually something like "&lt;div ...>$1&lt;/div>"). - flags Integer display flags(NO_ACTION_LINK, NO_EXTRA_USER_LINKS) 'LogException':Called before an exception(or PHP error) is logged. This is meant for integration with external error aggregation services
Allows to change the fields on the form that will be generated $name
Definition hooks.txt:271
null means default in associative array with keys and values unescaped Should be merged with default with a value of false meaning to suppress the attribute in associative array with keys and values unescaped noclasses just before the function returns a value If you return an< a > element with HTML attributes $attribs and contents $html will be returned If you return $ret will be returned and may include noclasses after processing & $attribs
Definition hooks.txt:2012
Status::newGood()` to allow deletion, and then `return false` from the hook function. Ensure you consume the 'ChangeTagAfterDelete' hook to carry out custom deletion actions. $tag:name of the tag $user:user initiating the action & $status:Status object. See above. 'ChangeTagsListActive':Allows you to nominate which of the tags your extension uses are in active use. & $tags:list of all active tags. Append to this array. 'ChangeTagsAfterUpdateTags':Called after tags have been updated with the ChangeTags::updateTags function. Params:$addedTags:tags effectively added in the update $removedTags:tags effectively removed in the update $prevTags:tags that were present prior to the update $rc_id:recentchanges table id $rev_id:revision table id $log_id:logging table id $params:tag params $rc:RecentChange being tagged when the tagging accompanies the action, or null $user:User who performed the tagging when the tagging is subsequent to the action, or null 'ChangeTagsAllowedAdd':Called when checking if a user can add tags to a change. & $allowedTags:List of all the tags the user is allowed to add. Any tags the user wants to add( $addTags) that are not in this array will cause it to fail. You may add or remove tags to this array as required. $addTags:List of tags user intends to add. $user:User who is adding the tags. 'ChangeUserGroups':Called before user groups are changed. $performer:The User who will perform the change $user:The User whose groups will be changed & $add:The groups that will be added & $remove:The groups that will be removed 'Collation::factory':Called if $wgCategoryCollation is an unknown collation. $collationName:Name of the collation in question & $collationObject:Null. Replace with a subclass of the Collation class that implements the collation given in $collationName. 'ConfirmEmailComplete':Called after a user 's email has been confirmed successfully. $user:user(object) whose email is being confirmed 'ContentAlterParserOutput':Modify parser output for a given content object. Called by Content::getParserOutput after parsing has finished. Can be used for changes that depend on the result of the parsing but have to be done before LinksUpdate is called(such as adding tracking categories based on the rendered HTML). $content:The Content to render $title:Title of the page, as context $parserOutput:ParserOutput to manipulate 'ContentGetParserOutput':Customize parser output for a given content object, called by AbstractContent::getParserOutput. May be used to override the normal model-specific rendering of page content. $content:The Content to render $title:Title of the page, as context $revId:The revision ID, as context $options:ParserOptions for rendering. To avoid confusing the parser cache, the output can only depend on parameters provided to this hook function, not on global state. $generateHtml:boolean, indicating whether full HTML should be generated. If false, generation of HTML may be skipped, but other information should still be present in the ParserOutput object. & $output:ParserOutput, to manipulate or replace 'ContentHandlerDefaultModelFor':Called when the default content model is determined for a given title. May be used to assign a different model for that title. $title:the Title in question & $model:the model name. Use with CONTENT_MODEL_XXX constants. 'ContentHandlerForModelID':Called when a ContentHandler is requested for a given content model name, but no entry for that model exists in $wgContentHandlers. Note:if your extension implements additional models via this hook, please use GetContentModels hook to make them known to core. $modeName:the requested content model name & $handler:set this to a ContentHandler object, if desired. 'ContentModelCanBeUsedOn':Called to determine whether that content model can be used on a given page. This is especially useful to prevent some content models to be used in some special location. $contentModel:ID of the content model in question $title:the Title in question. & $ok:Output parameter, whether it is OK to use $contentModel on $title. Handler functions that modify $ok should generally return false to prevent further hooks from further modifying $ok. 'ContribsPager::getQueryInfo':Before the contributions query is about to run & $pager:Pager object for contributions & $queryInfo:The query for the contribs Pager 'ContribsPager::reallyDoQuery':Called before really executing the query for My Contributions & $data:an array of results of all contribs queries $pager:The ContribsPager object hooked into $offset:Index offset, inclusive $limit:Exact query limit $descending:Query direction, false for ascending, true for descending 'ContributionsLineEnding':Called before a contributions HTML line is finished $page:SpecialPage object for contributions & $ret:the HTML line $row:the DB row for this line & $classes:the classes to add to the surrounding< li > & $attribs:associative array of other HTML attributes for the< li > element. Currently only data attributes reserved to MediaWiki are allowed(see Sanitizer::isReservedDataAttribute). 'ContributionsToolLinks':Change tool links above Special:Contributions $id:User identifier $title:User page title & $tools:Array of tool links $specialPage:SpecialPage instance for context and services. Can be either SpecialContributions or DeletedContributionsPage. Extensions should type hint against a generic SpecialPage though. 'ConvertContent':Called by AbstractContent::convert when a conversion to another content model is requested. Handler functions that modify $result should generally return false to disable further attempts at conversion. $content:The Content object to be converted. $toModel:The ID of the content model to convert to. $lossy: boolean indicating whether lossy conversion is allowed. & $result:Output parameter, in case the handler function wants to provide a converted Content object. Note that $result->getContentModel() must return $toModel. 'ContentSecurityPolicyDefaultSource':Modify the allowed CSP load sources. This affects all directives except for the script directive. If you want to add a script source, see ContentSecurityPolicyScriptSource hook. & $defaultSrc:Array of Content-Security-Policy allowed sources $policyConfig:Current configuration for the Content-Security-Policy header $mode:ContentSecurityPolicy::REPORT_ONLY_MODE or ContentSecurityPolicy::FULL_MODE depending on type of header 'ContentSecurityPolicyDirectives':Modify the content security policy directives. Use this only if ContentSecurityPolicyDefaultSource and ContentSecurityPolicyScriptSource do not meet your needs. & $directives:Array of CSP directives $policyConfig:Current configuration for the CSP header $mode:ContentSecurityPolicy::REPORT_ONLY_MODE or ContentSecurityPolicy::FULL_MODE depending on type of header 'ContentSecurityPolicyScriptSource':Modify the allowed CSP script sources. Note that you also have to use ContentSecurityPolicyDefaultSource if you want non-script sources to be loaded from whatever you add. & $scriptSrc:Array of CSP directives $policyConfig:Current configuration for the CSP header $mode:ContentSecurityPolicy::REPORT_ONLY_MODE or ContentSecurityPolicy::FULL_MODE depending on type of header 'CustomEditor':When invoking the page editor Return true to allow the normal editor to be used, or false if implementing a custom editor, e.g. for a special namespace, etc. $article:Article being edited $user:User performing the edit 'DatabaseOraclePostInit':Called after initialising an Oracle database $db:the DatabaseOracle object 'DeletedContribsPager::reallyDoQuery':Called before really executing the query for Special:DeletedContributions Similar to ContribsPager::reallyDoQuery & $data:an array of results of all contribs queries $pager:The DeletedContribsPager object hooked into $offset:Index offset, inclusive $limit:Exact query limit $descending:Query direction, false for ascending, true for descending 'DeletedContributionsLineEnding':Called before a DeletedContributions HTML line is finished. Similar to ContributionsLineEnding $page:SpecialPage object for DeletedContributions & $ret:the HTML line $row:the DB row for this line & $classes:the classes to add to the surrounding< li > & $attribs:associative array of other HTML attributes for the< li > element. Currently only data attributes reserved to MediaWiki are allowed(see Sanitizer::isReservedDataAttribute). 'DeleteUnknownPreferences':Called by the cleanupPreferences.php maintenance script to build a WHERE clause with which to delete preferences that are not known about. This hook is used by extensions that have dynamically-named preferences that should not be deleted in the usual cleanup process. For example, the Gadgets extension creates preferences prefixed with 'gadget-', and so anything with that prefix is excluded from the deletion. &where:An array that will be passed as the $cond parameter to IDatabase::select() to determine what will be deleted from the user_properties table. $db:The IDatabase object, useful for accessing $db->buildLike() etc. 'DifferenceEngineAfterLoadNewText':called in DifferenceEngine::loadNewText() after the new revision 's content has been loaded into the class member variable $differenceEngine->mNewContent but before returning true from this function. $differenceEngine:DifferenceEngine object 'DifferenceEngineLoadTextAfterNewContentIsLoaded':called in DifferenceEngine::loadText() after the new revision 's content has been loaded into the class member variable $differenceEngine->mNewContent but before checking if the variable 's value is null. This hook can be used to inject content into said class member variable. $differenceEngine:DifferenceEngine object 'DifferenceEngineMarkPatrolledLink':Allows extensions to change the "mark as patrolled" link which is shown both on the diff header as well as on the bottom of a page, usually wrapped in a span element which has class="patrollink". $differenceEngine:DifferenceEngine object & $markAsPatrolledLink:The "mark as patrolled" link HTML(string) $rcid:Recent change ID(rc_id) for this change(int) 'DifferenceEngineMarkPatrolledRCID':Allows extensions to possibly change the rcid parameter. For example the rcid might be set to zero due to the user being the same as the performer of the change but an extension might still want to show it under certain conditions. & $rcid:rc_id(int) of the change or 0 $differenceEngine:DifferenceEngine object $change:RecentChange object $user:User object representing the current user 'DifferenceEngineNewHeader':Allows extensions to change the $newHeader variable, which contains information about the new revision, such as the revision 's author, whether the revision was marked as a minor edit or not, etc. $differenceEngine:DifferenceEngine object & $newHeader:The string containing the various #mw-diff-otitle[1-5] divs, which include things like revision author info, revision comment, RevisionDelete link and more $formattedRevisionTools:Array containing revision tools, some of which may have been injected with the DiffRevisionTools hook $nextlink:String containing the link to the next revision(if any) $status
Definition hooks.txt:1032
static configuration should be added through ResourceLoaderGetConfigVars instead can be used to get the real title e g db for database replication lag or jobqueue for job queue size converted to pseudo seconds It is possible to add more fields and they will be returned to the user in the API response after the basic globals have been set but before ordinary actions take place $output
Definition hooks.txt:2272
processing should stop and the error should be shown to the user * false
Definition hooks.txt:187
returning false will NOT prevent logging $e
Definition hooks.txt:2175
$data
Utility to generate mapping file used in mw.Title (phpCharToUpper.json)
const AV_SCAN_FAILED
Definition Defines.php:123
const NS_FILE
Definition Defines.php:79
const AV_SCAN_ABORTED
Definition Defines.php:122
const AV_NO_VIRUS
Definition Defines.php:120
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency which acts as the top level factory for services in MediaWiki which can be used to gain access to default instances of various services MediaWikiServices however also allows new services to be defined and default services to be redefined Services are defined or redefined by providing a callback function
Definition injection.txt:30
$cache
Definition mcc.php:33
A helper class for throttling authentication attempts.
$lines
Definition router.php:61
if(!is_readable( $file)) $ext
Definition router.php:48
if(PHP_SAPI !='cli-server') if(!isset( $_SERVER['SCRIPT_FILENAME'])) $file
Definition router.php:42