MediaWiki REL1_33
img_auth.php
Go to the documentation of this file.
1<?php
41define( 'MW_NO_OUTPUT_COMPRESSION', 1 );
42require __DIR__ . '/includes/WebStart.php';
43
44# Set action base paths so that WebRequest::getPathInfo()
45# recognizes the "X" as the 'title' in ../img_auth.php/X urls.
46$wgArticlePath = false; # Don't let a "/*" article path clober our action path
47$wgActionPaths = [ "$wgUploadPath/" ];
48
49wfImageAuthMain();
50
51$mediawiki = new MediaWiki();
52$mediawiki->doPostOutputShutdown( 'fast' );
53
54function wfImageAuthMain() {
55 global $wgImgAuthUrlPathMap;
56
57 $request = RequestContext::getMain()->getRequest();
58 $publicWiki = in_array( 'read', User::getGroupPermissions( [ '*' ] ), true );
59
60 // Get the requested file path (source file or thumbnail)
61 $matches = WebRequest::getPathInfo();
62 if ( !isset( $matches['title'] ) ) {
63 wfForbidden( 'img-auth-accessdenied', 'img-auth-nopathinfo' );
64 return;
65 }
66 $path = $matches['title'];
67 if ( $path && $path[0] !== '/' ) {
68 // Make sure $path has a leading /
69 $path = "/" . $path;
70 }
71
72 // Check for T30235: QUERY_STRING overriding the correct extension
73 $whitelist = [];
74 $extension = FileBackend::extensionFromPath( $path, 'rawcase' );
75 if ( $extension != '' ) {
76 $whitelist[] = $extension;
77 }
78 if ( !$request->checkUrlExtension( $whitelist ) ) {
79 return;
80 }
81
82 // Various extensions may have their own backends that need access.
83 // Check if there is a special backend and storage base path for this file.
84 foreach ( $wgImgAuthUrlPathMap as $prefix => $storageDir ) {
85 $prefix = rtrim( $prefix, '/' ) . '/'; // implicit trailing slash
86 if ( strpos( $path, $prefix ) === 0 ) {
87 $be = FileBackendGroup::singleton()->backendFromPath( $storageDir );
88 $filename = $storageDir . substr( $path, strlen( $prefix ) ); // strip prefix
89 // Check basic user authorization
90 if ( !RequestContext::getMain()->getUser()->isAllowed( 'read' ) ) {
91 wfForbidden( 'img-auth-accessdenied', 'img-auth-noread', $path );
92 return;
93 }
94 if ( $be->fileExists( [ 'src' => $filename ] ) ) {
95 wfDebugLog( 'img_auth', "Streaming `" . $filename . "`." );
96 $be->streamFile( [
97 'src' => $filename,
98 'headers' => [ 'Cache-Control: private', 'Vary: Cookie' ]
99 ] );
100 } else {
101 wfForbidden( 'img-auth-accessdenied', 'img-auth-nofile', $path );
102 }
103 return;
104 }
105 }
106
107 // Get the local file repository
108 $repo = RepoGroup::singleton()->getRepo( 'local' );
109 $zone = strstr( ltrim( $path, '/' ), '/', true );
110
111 // Get the full file storage path and extract the source file name.
112 // (e.g. 120px-Foo.png => Foo.png or page2-120px-Foo.png => Foo.png).
113 // This only applies to thumbnails/transcoded, and each of them should
114 // be under a folder that has the source file name.
115 if ( $zone === 'thumb' || $zone === 'transcoded' ) {
116 $name = wfBaseName( dirname( $path ) );
117 $filename = $repo->getZonePath( $zone ) . substr( $path, strlen( "/" . $zone ) );
118 // Check to see if the file exists
119 if ( !$repo->fileExists( $filename ) ) {
120 wfForbidden( 'img-auth-accessdenied', 'img-auth-nofile', $filename );
121 return;
122 }
123 } else {
124 $name = wfBaseName( $path ); // file is a source file
125 $filename = $repo->getZonePath( 'public' ) . $path;
126 // Check to see if the file exists and is not deleted
127 $bits = explode( '!', $name, 2 );
128 if ( substr( $path, 0, 9 ) === '/archive/' && count( $bits ) == 2 ) {
129 $file = $repo->newFromArchiveName( $bits[1], $name );
130 } else {
131 $file = $repo->newFile( $name );
132 }
133 if ( !$file->exists() || $file->isDeleted( File::DELETED_FILE ) ) {
134 wfForbidden( 'img-auth-accessdenied', 'img-auth-nofile', $filename );
135 return;
136 }
137 }
138
139 $headers = []; // extra HTTP headers to send
140
141 $title = Title::makeTitleSafe( NS_FILE, $name );
142
143 if ( !$publicWiki ) {
144 // For private wikis, run extra auth checks and set cache control headers
145 $headers['Cache-Control'] = 'private';
146 $headers['Vary'] = 'Cookie';
147
148 if ( !$title instanceof Title ) { // files have valid titles
149 wfForbidden( 'img-auth-accessdenied', 'img-auth-badtitle', $name );
150 return;
151 }
152
153 // Run hook for extension authorization plugins
155 $result = null;
156 if ( !Hooks::run( 'ImgAuthBeforeStream', [ &$title, &$path, &$name, &$result ] ) ) {
157 wfForbidden( $result[0], $result[1], array_slice( $result, 2 ) );
158 return;
159 }
160
161 // Check user authorization for this title
162 // Checks Whitelist too
163 if ( !$title->userCan( 'read' ) ) {
164 wfForbidden( 'img-auth-accessdenied', 'img-auth-noread', $name );
165 return;
166 }
167 }
168
169 if ( isset( $_SERVER['HTTP_RANGE'] ) ) {
170 $headers['Range'] = $_SERVER['HTTP_RANGE'];
171 }
172 if ( isset( $_SERVER['HTTP_IF_MODIFIED_SINCE'] ) ) {
173 $headers['If-Modified-Since'] = $_SERVER['HTTP_IF_MODIFIED_SINCE'];
174 }
175
176 if ( $request->getCheck( 'download' ) ) {
177 $headers['Content-Disposition'] = 'attachment';
178 }
179
180 // Allow modification of headers before streaming a file
181 Hooks::run( 'ImgAuthModifyHeaders', [ $title->getTitleValue(), &$headers ] );
182
183 // Stream the requested file
184 list( $headers, $options ) = HTTPFileStreamer::preprocessHeaders( $headers );
185 wfDebugLog( 'img_auth', "Streaming `" . $filename . "`." );
186 $repo->streamFile( $filename, $headers, $options );
187}
188
196function wfForbidden( $msg1, $msg2 ) {
197 global $wgImgAuthDetails;
198
199 $args = func_get_args();
200 array_shift( $args );
201 array_shift( $args );
202 $args = ( isset( $args[0] ) && is_array( $args[0] ) ) ? $args[0] : $args;
203
204 $msgHdr = wfMessage( $msg1 )->escaped();
205 $detailMsgKey = $wgImgAuthDetails ? $msg2 : 'badaccess-group0';
206 $detailMsg = wfMessage( $detailMsgKey, $args )->escaped();
207
208 wfDebugLog( 'img_auth',
209 "wfForbidden Hdr: " . wfMessage( $msg1 )->inLanguage( 'en' )->text() . " Msg: " .
210 wfMessage( $msg2, $args )->inLanguage( 'en' )->text()
211 );
212
213 HttpStatus::header( 403 );
214 header( 'Cache-Control: no-cache' );
215 header( 'Content-Type: text/html; charset=utf-8' );
216 echo <<<ENDS
217<!DOCTYPE html>
218<html>
219<head>
220<meta charset="UTF-8" />
221<title>$msgHdr</title>
222</head>
223<body>
224<h1>$msgHdr</h1>
225<p>$detailMsg</p>
226</body>
227</html>
228ENDS;
229}
This list may contain false positives That usually means there is additional text with links below the first Each row contains links to the first and second as well as the first line of the second redirect text
$wgArticlePath
Definition img_auth.php:46
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency which acts as the top level factory for services in MediaWiki which can be used to gain access to default instances of various services MediaWikiServices however also allows new services to be defined and default services to be redefined Services are defined or redefined by providing a callback the instantiator that will return a new instance of the service When it will create an instance of MediaWikiServices and populate it with the services defined in the files listed by thereby bootstrapping the DI framework Per $wgServiceWiringFiles lists includes ServiceWiring php
Definition injection.txt:37
Base interface for content objects.
Definition Content.php:34
you have access to all of the normal MediaWiki so you can get a DB use the cache
title