MediaWiki  master
UploadBase.php
Go to the documentation of this file.
1 <?php
25 
40 abstract class UploadBase {
42  protected $mTempPath;
44  protected $tempFileObj;
45 
47  protected $mTitle = false, $mTitleError = 0;
52 
53  protected static $safeXmlEncodings = [
54  'UTF-8',
55  'ISO-8859-1',
56  'ISO-8859-2',
57  'UTF-16',
58  'UTF-32',
59  'WINDOWS-1250',
60  'WINDOWS-1251',
61  'WINDOWS-1252',
62  'WINDOWS-1253',
63  'WINDOWS-1254',
64  'WINDOWS-1255',
65  'WINDOWS-1256',
66  'WINDOWS-1257',
67  'WINDOWS-1258',
68  ];
69 
70  const SUCCESS = 0;
71  const OK = 0;
72  const EMPTY_FILE = 3;
74  const ILLEGAL_FILENAME = 5;
75  const OVERWRITE_EXISTING_FILE = 7; # Not used anymore; handled by verifyTitlePermissions()
76  const FILETYPE_MISSING = 8;
77  const FILETYPE_BADTYPE = 9;
78  const VERIFICATION_ERROR = 10;
79  const HOOK_ABORTED = 11;
80  const FILE_TOO_LARGE = 12;
82  const FILENAME_TOO_LONG = 14;
83 
89  $code_to_status = [
90  self::EMPTY_FILE => 'empty-file',
91  self::FILE_TOO_LARGE => 'file-too-large',
92  self::FILETYPE_MISSING => 'filetype-missing',
93  self::FILETYPE_BADTYPE => 'filetype-banned',
94  self::MIN_LENGTH_PARTNAME => 'filename-tooshort',
95  self::ILLEGAL_FILENAME => 'illegal-filename',
96  self::OVERWRITE_EXISTING_FILE => 'overwrite',
97  self::VERIFICATION_ERROR => 'verification-error',
98  self::HOOK_ABORTED => 'hookaborted',
99  self::WINDOWS_NONASCII_FILENAME => 'windows-nonascii-filename',
100  self::FILENAME_TOO_LONG => 'filename-toolong',
101  ];
102  return $code_to_status[$error] ?? 'unknown-error';
103  }
104 
110  public static function isEnabled() {
111  global $wgEnableUploads;
112 
113  if ( !$wgEnableUploads ) {
114  return false;
115  }
116 
117  # Check php's file_uploads setting
118  return wfIsHHVM() || wfIniGetBool( 'file_uploads' );
119  }
120 
129  public static function isAllowed( $user ) {
130  foreach ( [ 'upload', 'edit' ] as $permission ) {
131  if ( !$user->isAllowed( $permission ) ) {
132  return $permission;
133  }
134  }
135 
136  return true;
137  }
138 
145  public static function isThrottled( $user ) {
146  return $user->pingLimiter( 'upload' );
147  }
148 
149  // Upload handlers. Should probably just be a global.
150  private static $uploadHandlers = [ 'Stash', 'File', 'Url' ];
151 
159  public static function createFromRequest( &$request, $type = null ) {
160  $type = $type ?: $request->getVal( 'wpSourceType', 'File' );
161 
162  if ( !$type ) {
163  return null;
164  }
165 
166  // Get the upload class
167  $type = ucfirst( $type );
168 
169  // Give hooks the chance to handle this request
170  $className = null;
171  Hooks::run( 'UploadCreateFromRequest', [ $type, &$className ] );
172  if ( is_null( $className ) ) {
173  $className = 'UploadFrom' . $type;
174  wfDebug( __METHOD__ . ": class name: $className\n" );
175  if ( !in_array( $type, self::$uploadHandlers ) ) {
176  return null;
177  }
178  }
179 
180  // Check whether this upload class is enabled
181  if ( !call_user_func( [ $className, 'isEnabled' ] ) ) {
182  return null;
183  }
184 
185  // Check whether the request is valid
186  if ( !call_user_func( [ $className, 'isValidRequest' ], $request ) ) {
187  return null;
188  }
189 
191  $handler = new $className;
192 
193  $handler->initializeFromRequest( $request );
194 
195  return $handler;
196  }
197 
203  public static function isValidRequest( $request ) {
204  return false;
205  }
206 
207  public function __construct() {
208  }
209 
216  public function getSourceType() {
217  return null;
218  }
219 
228  public function initializePathInfo( $name, $tempPath, $fileSize, $removeTempFile = false ) {
229  $this->mDesiredDestName = $name;
230  if ( FileBackend::isStoragePath( $tempPath ) ) {
231  throw new MWException( __METHOD__ . " given storage path `$tempPath`." );
232  }
233 
234  $this->setTempFile( $tempPath, $fileSize );
235  $this->mRemoveTempFile = $removeTempFile;
236  }
237 
243  abstract public function initializeFromRequest( &$request );
244 
249  protected function setTempFile( $tempPath, $fileSize = null ) {
250  $this->mTempPath = $tempPath;
251  $this->mFileSize = $fileSize ?: null;
252  if ( strlen( $this->mTempPath ) && file_exists( $this->mTempPath ) ) {
253  $this->tempFileObj = new TempFSFile( $this->mTempPath );
254  if ( !$fileSize ) {
255  $this->mFileSize = filesize( $this->mTempPath );
256  }
257  } else {
258  $this->tempFileObj = null;
259  }
260  }
261 
266  public function fetchFile() {
267  return Status::newGood();
268  }
269 
274  public function isEmptyFile() {
275  return empty( $this->mFileSize );
276  }
277 
282  public function getFileSize() {
283  return $this->mFileSize;
284  }
285 
290  public function getTempFileSha1Base36() {
291  return FSFile::getSha1Base36FromPath( $this->mTempPath );
292  }
293 
298  public function getRealPath( $srcPath ) {
299  $repo = RepoGroup::singleton()->getLocalRepo();
300  if ( FileRepo::isVirtualUrl( $srcPath ) ) {
304  $tmpFile = $repo->getLocalCopy( $srcPath );
305  if ( $tmpFile ) {
306  $tmpFile->bind( $this ); // keep alive with $this
307  }
308  $path = $tmpFile ? $tmpFile->getPath() : false;
309  } else {
310  $path = $srcPath;
311  }
312 
313  return $path;
314  }
315 
320  public function verifyUpload() {
324  if ( $this->isEmptyFile() ) {
325  return [ 'status' => self::EMPTY_FILE ];
326  }
327 
331  $maxSize = self::getMaxUploadSize( $this->getSourceType() );
332  if ( $this->mFileSize > $maxSize ) {
333  return [
334  'status' => self::FILE_TOO_LARGE,
335  'max' => $maxSize,
336  ];
337  }
338 
344  $verification = $this->verifyFile();
345  if ( $verification !== true ) {
346  return [
347  'status' => self::VERIFICATION_ERROR,
348  'details' => $verification
349  ];
350  }
351 
355  $result = $this->validateName();
356  if ( $result !== true ) {
357  return $result;
358  }
359 
360  $error = '';
361  if ( !Hooks::run( 'UploadVerification',
362  [ $this->mDestName, $this->mTempPath, &$error ], '1.28' )
363  ) {
364  return [ 'status' => self::HOOK_ABORTED, 'error' => $error ];
365  }
366 
367  return [ 'status' => self::OK ];
368  }
369 
376  public function validateName() {
377  $nt = $this->getTitle();
378  if ( is_null( $nt ) ) {
379  $result = [ 'status' => $this->mTitleError ];
380  if ( $this->mTitleError == self::ILLEGAL_FILENAME ) {
381  $result['filtered'] = $this->mFilteredName;
382  }
383  if ( $this->mTitleError == self::FILETYPE_BADTYPE ) {
384  $result['finalExt'] = $this->mFinalExtension;
385  if ( count( $this->mBlackListedExtensions ) ) {
386  $result['blacklistedExt'] = $this->mBlackListedExtensions;
387  }
388  }
389 
390  return $result;
391  }
392  $this->mDestName = $this->getLocalFile()->getName();
393 
394  return true;
395  }
396 
406  protected function verifyMimeType( $mime ) {
407  global $wgVerifyMimeType;
408  if ( $wgVerifyMimeType ) {
409  wfDebug( "mime: <$mime> extension: <{$this->mFinalExtension}>\n" );
410  global $wgMimeTypeBlacklist;
411  if ( $this->checkFileExtension( $mime, $wgMimeTypeBlacklist ) ) {
412  return [ 'filetype-badmime', $mime ];
413  }
414 
415  # Check what Internet Explorer would detect
416  $fp = fopen( $this->mTempPath, 'rb' );
417  $chunk = fread( $fp, 256 );
418  fclose( $fp );
419 
420  $magic = MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer();
421  $extMime = $magic->guessTypesForExtension( $this->mFinalExtension );
422  $ieTypes = $magic->getIEMimeTypes( $this->mTempPath, $chunk, $extMime );
423  foreach ( $ieTypes as $ieType ) {
424  if ( $this->checkFileExtension( $ieType, $wgMimeTypeBlacklist ) ) {
425  return [ 'filetype-bad-ie-mime', $ieType ];
426  }
427  }
428  }
429 
430  return true;
431  }
432 
438  protected function verifyFile() {
440 
441  $status = $this->verifyPartialFile();
442  if ( $status !== true ) {
443  return $status;
444  }
445 
446  $mwProps = new MWFileProps( MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer() );
447  $this->mFileProps = $mwProps->getPropsFromPath( $this->mTempPath, $this->mFinalExtension );
448  $mime = $this->mFileProps['mime'];
449 
450  if ( $wgVerifyMimeType ) {
451  # XXX: Missing extension will be caught by validateName() via getTitle()
452  if ( $this->mFinalExtension != '' && !$this->verifyExtension( $mime, $this->mFinalExtension ) ) {
453  return [ 'filetype-mime-mismatch', $this->mFinalExtension, $mime ];
454  }
455  }
456 
457  # check for htmlish code and javascript
458  if ( !$wgDisableUploadScriptChecks ) {
459  if ( $this->mFinalExtension == 'svg' || $mime == 'image/svg+xml' ) {
460  $svgStatus = $this->detectScriptInSvg( $this->mTempPath, false );
461  if ( $svgStatus !== false ) {
462  return $svgStatus;
463  }
464  }
465  }
466 
468  if ( $handler ) {
469  $handlerStatus = $handler->verifyUpload( $this->mTempPath );
470  if ( !$handlerStatus->isOK() ) {
471  $errors = $handlerStatus->getErrorsArray();
472 
473  return reset( $errors );
474  }
475  }
476 
477  $error = true;
478  Hooks::run( 'UploadVerifyFile', [ $this, $mime, &$error ] );
479  if ( $error !== true ) {
480  if ( !is_array( $error ) ) {
481  $error = [ $error ];
482  }
483  return $error;
484  }
485 
486  wfDebug( __METHOD__ . ": all clear; passing.\n" );
487 
488  return true;
489  }
490 
499  protected function verifyPartialFile() {
501 
502  # getTitle() sets some internal parameters like $this->mFinalExtension
503  $this->getTitle();
504 
505  $mwProps = new MWFileProps( MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer() );
506  $this->mFileProps = $mwProps->getPropsFromPath( $this->mTempPath, $this->mFinalExtension );
507 
508  # check MIME type, if desired
509  $mime = $this->mFileProps['file-mime'];
510  $status = $this->verifyMimeType( $mime );
511  if ( $status !== true ) {
512  return $status;
513  }
514 
515  # check for htmlish code and javascript
516  if ( !$wgDisableUploadScriptChecks ) {
517  if ( self::detectScript( $this->mTempPath, $mime, $this->mFinalExtension ) ) {
518  return [ 'uploadscripted' ];
519  }
520  if ( $this->mFinalExtension == 'svg' || $mime == 'image/svg+xml' ) {
521  $svgStatus = $this->detectScriptInSvg( $this->mTempPath, true );
522  if ( $svgStatus !== false ) {
523  return $svgStatus;
524  }
525  }
526  }
527 
528  # Check for Java applets, which if uploaded can bypass cross-site
529  # restrictions.
530  if ( !$wgAllowJavaUploads ) {
531  $this->mJavaDetected = false;
532  $zipStatus = ZipDirectoryReader::read( $this->mTempPath,
533  [ $this, 'zipEntryCallback' ] );
534  if ( !$zipStatus->isOK() ) {
535  $errors = $zipStatus->getErrorsArray();
536  $error = reset( $errors );
537  if ( $error[0] !== 'zip-wrong-format' ) {
538  return $error;
539  }
540  }
541  if ( $this->mJavaDetected ) {
542  return [ 'uploadjava' ];
543  }
544  }
545 
546  # Scan the uploaded file for viruses
547  $virus = $this->detectVirus( $this->mTempPath );
548  if ( $virus ) {
549  return [ 'uploadvirus', $virus ];
550  }
551 
552  return true;
553  }
554 
560  public function zipEntryCallback( $entry ) {
561  $names = [ $entry['name'] ];
562 
563  // If there is a null character, cut off the name at it, because JDK's
564  // ZIP_GetEntry() uses strcmp() if the name hashes match. If a file name
565  // were constructed which had ".class\0" followed by a string chosen to
566  // make the hash collide with the truncated name, that file could be
567  // returned in response to a request for the .class file.
568  $nullPos = strpos( $entry['name'], "\000" );
569  if ( $nullPos !== false ) {
570  $names[] = substr( $entry['name'], 0, $nullPos );
571  }
572 
573  // If there is a trailing slash in the file name, we have to strip it,
574  // because that's what ZIP_GetEntry() does.
575  if ( preg_grep( '!\.class/?$!', $names ) ) {
576  $this->mJavaDetected = true;
577  }
578  }
579 
589  public function verifyPermissions( $user ) {
590  return $this->verifyTitlePermissions( $user );
591  }
592 
604  public function verifyTitlePermissions( $user ) {
609  $nt = $this->getTitle();
610  if ( is_null( $nt ) ) {
611  return true;
612  }
613  $permErrors = $nt->getUserPermissionsErrors( 'edit', $user );
614  $permErrorsUpload = $nt->getUserPermissionsErrors( 'upload', $user );
615  if ( !$nt->exists() ) {
616  $permErrorsCreate = $nt->getUserPermissionsErrors( 'create', $user );
617  } else {
618  $permErrorsCreate = [];
619  }
620  if ( $permErrors || $permErrorsUpload || $permErrorsCreate ) {
621  $permErrors = array_merge( $permErrors, wfArrayDiff2( $permErrorsUpload, $permErrors ) );
622  $permErrors = array_merge( $permErrors, wfArrayDiff2( $permErrorsCreate, $permErrors ) );
623 
624  return $permErrors;
625  }
626 
627  $overwriteError = $this->checkOverwrite( $user );
628  if ( $overwriteError !== true ) {
629  return [ $overwriteError ];
630  }
631 
632  return true;
633  }
634 
642  public function checkWarnings() {
643  $warnings = [];
644 
645  $localFile = $this->getLocalFile();
646  $localFile->load( File::READ_LATEST );
647  $filename = $localFile->getName();
648  $hash = $this->getTempFileSha1Base36();
649 
650  $badFileName = $this->checkBadFileName( $filename, $this->mDesiredDestName );
651  if ( $badFileName !== null ) {
652  $warnings['badfilename'] = $badFileName;
653  }
654 
655  $unwantedFileExtensionDetails = $this->checkUnwantedFileExtensions( $this->mFinalExtension );
656  if ( $unwantedFileExtensionDetails !== null ) {
657  $warnings['filetype-unwanted-type'] = $unwantedFileExtensionDetails;
658  }
659 
660  $fileSizeWarnings = $this->checkFileSize( $this->mFileSize );
661  if ( $fileSizeWarnings ) {
662  $warnings = array_merge( $warnings, $fileSizeWarnings );
663  }
664 
665  $localFileExistsWarnings = $this->checkLocalFileExists( $localFile, $hash );
666  if ( $localFileExistsWarnings ) {
667  $warnings = array_merge( $warnings, $localFileExistsWarnings );
668  }
669 
670  if ( $this->checkLocalFileWasDeleted( $localFile ) ) {
671  $warnings['was-deleted'] = $filename;
672  }
673 
674  // If a file with the same name exists locally then the local file has already been tested
675  // for duplication of content
676  $ignoreLocalDupes = isset( $warnings[ 'exists '] );
677  $dupes = $this->checkAgainstExistingDupes( $hash, $ignoreLocalDupes );
678  if ( $dupes ) {
679  $warnings['duplicate'] = $dupes;
680  }
681 
682  $archivedDupes = $this->checkAgainstArchiveDupes( $hash );
683  if ( $archivedDupes !== null ) {
684  $warnings['duplicate-archive'] = $archivedDupes;
685  }
686 
687  return $warnings;
688  }
689 
699  private function checkBadFileName( $filename, $desiredFileName ) {
700  $comparableName = str_replace( ' ', '_', $desiredFileName );
701  $comparableName = Title::capitalize( $comparableName, NS_FILE );
702 
703  if ( $desiredFileName != $filename && $comparableName != $filename ) {
704  return $filename;
705  }
706 
707  return null;
708  }
709 
718  private function checkUnwantedFileExtensions( $fileExtension ) {
720 
721  if ( $wgCheckFileExtensions ) {
722  $extensions = array_unique( $wgFileExtensions );
723  if ( !$this->checkFileExtension( $fileExtension, $extensions ) ) {
724  return [
725  $fileExtension,
726  $wgLang->commaList( $extensions ),
727  count( $extensions )
728  ];
729  }
730  }
731 
732  return null;
733  }
734 
740  private function checkFileSize( $fileSize ) {
741  global $wgUploadSizeWarning;
742 
743  $warnings = [];
744 
745  if ( $wgUploadSizeWarning && ( $fileSize > $wgUploadSizeWarning ) ) {
746  $warnings['large-file'] = [ $wgUploadSizeWarning, $fileSize ];
747  }
748 
749  if ( $fileSize == 0 ) {
750  $warnings['empty-file'] = true;
751  }
752 
753  return $warnings;
754  }
755 
762  private function checkLocalFileExists( LocalFile $localFile, $hash ) {
763  $warnings = [];
764 
765  $exists = self::getExistsWarning( $localFile );
766  if ( $exists !== false ) {
767  $warnings['exists'] = $exists;
768 
769  // check if file is an exact duplicate of current file version
770  if ( $hash === $localFile->getSha1() ) {
771  $warnings['no-change'] = $localFile;
772  }
773 
774  // check if file is an exact duplicate of older versions of this file
775  $history = $localFile->getHistory();
776  foreach ( $history as $oldFile ) {
777  if ( $hash === $oldFile->getSha1() ) {
778  $warnings['duplicate-version'][] = $oldFile;
779  }
780  }
781  }
782 
783  return $warnings;
784  }
785 
786  private function checkLocalFileWasDeleted( LocalFile $localFile ) {
787  return $localFile->wasDeleted() && !$localFile->exists();
788  }
789 
796  private function checkAgainstExistingDupes( $hash, $ignoreLocalDupes ) {
797  $dupes = RepoGroup::singleton()->findBySha1( $hash );
798  $title = $this->getTitle();
799  foreach ( $dupes as $key => $dupe ) {
800  if (
801  ( $dupe instanceof LocalFile ) &&
802  $ignoreLocalDupes &&
803  $title->equals( $dupe->getTitle() )
804  ) {
805  unset( $dupes[$key] );
806  }
807  }
808 
809  return $dupes;
810  }
811 
818  private function checkAgainstArchiveDupes( $hash ) {
819  $archivedFile = new ArchivedFile( null, 0, '', $hash );
820  if ( $archivedFile->getID() > 0 ) {
821  if ( $archivedFile->userCan( File::DELETED_FILE ) ) {
822  return $archivedFile->getName();
823  } else {
824  return '';
825  }
826  }
827 
828  return null;
829  }
830 
844  public function performUpload( $comment, $pageText, $watch, $user, $tags = [] ) {
845  $this->getLocalFile()->load( File::READ_LATEST );
846  $props = $this->mFileProps;
847 
848  $error = null;
849  Hooks::run( 'UploadVerifyUpload', [ $this, $user, $props, $comment, $pageText, &$error ] );
850  if ( $error ) {
851  if ( !is_array( $error ) ) {
852  $error = [ $error ];
853  }
854  return Status::newFatal( ...$error );
855  }
856 
857  $status = $this->getLocalFile()->upload(
858  $this->mTempPath,
859  $comment,
860  $pageText,
862  $props,
863  false,
864  $user,
865  $tags
866  );
867 
868  if ( $status->isGood() ) {
869  if ( $watch ) {
871  $this->getLocalFile()->getTitle(),
872  $user,
874  );
875  }
876  // Avoid PHP 7.1 warning of passing $this by reference
877  $uploadBase = $this;
878  Hooks::run( 'UploadComplete', [ &$uploadBase ] );
879 
880  $this->postProcessUpload();
881  }
882 
883  return $status;
884  }
885 
891  public function postProcessUpload() {
892  }
893 
900  public function getTitle() {
901  if ( $this->mTitle !== false ) {
902  return $this->mTitle;
903  }
904  if ( !is_string( $this->mDesiredDestName ) ) {
905  $this->mTitleError = self::ILLEGAL_FILENAME;
906  $this->mTitle = null;
907 
908  return $this->mTitle;
909  }
910  /* Assume that if a user specified File:Something.jpg, this is an error
911  * and that the namespace prefix needs to be stripped of.
912  */
913  $title = Title::newFromText( $this->mDesiredDestName );
914  if ( $title && $title->getNamespace() == NS_FILE ) {
915  $this->mFilteredName = $title->getDBkey();
916  } else {
917  $this->mFilteredName = $this->mDesiredDestName;
918  }
919 
920  # oi_archive_name is max 255 bytes, which include a timestamp and an
921  # exclamation mark, so restrict file name to 240 bytes.
922  if ( strlen( $this->mFilteredName ) > 240 ) {
923  $this->mTitleError = self::FILENAME_TOO_LONG;
924  $this->mTitle = null;
925 
926  return $this->mTitle;
927  }
928 
934  $this->mFilteredName = wfStripIllegalFilenameChars( $this->mFilteredName );
935  /* Normalize to title form before we do any further processing */
936  $nt = Title::makeTitleSafe( NS_FILE, $this->mFilteredName );
937  if ( is_null( $nt ) ) {
938  $this->mTitleError = self::ILLEGAL_FILENAME;
939  $this->mTitle = null;
940 
941  return $this->mTitle;
942  }
943  $this->mFilteredName = $nt->getDBkey();
944 
949  list( $partname, $ext ) = $this->splitExtensions( $this->mFilteredName );
950 
951  if ( $ext !== [] ) {
952  $this->mFinalExtension = trim( end( $ext ) );
953  } else {
954  $this->mFinalExtension = '';
955 
956  # No extension, try guessing one
957  $magic = MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer();
958  $mime = $magic->guessMimeType( $this->mTempPath );
959  if ( $mime !== 'unknown/unknown' ) {
960  # Get a space separated list of extensions
961  $extList = $magic->getExtensionsForType( $mime );
962  if ( $extList ) {
963  # Set the extension to the canonical extension
964  $this->mFinalExtension = strtok( $extList, ' ' );
965 
966  # Fix up the other variables
967  $this->mFilteredName .= ".{$this->mFinalExtension}";
968  $nt = Title::makeTitleSafe( NS_FILE, $this->mFilteredName );
970  }
971  }
972  }
973 
974  /* Don't allow users to override the blacklist (check file extension) */
977 
978  $blackListedExtensions = $this->checkFileExtensionList( $ext, $wgFileBlacklist );
979 
980  if ( $this->mFinalExtension == '' ) {
981  $this->mTitleError = self::FILETYPE_MISSING;
982  $this->mTitle = null;
983 
984  return $this->mTitle;
985  } elseif ( $blackListedExtensions ||
986  ( $wgCheckFileExtensions && $wgStrictFileExtensions &&
987  !$this->checkFileExtension( $this->mFinalExtension, $wgFileExtensions ) )
988  ) {
989  $this->mBlackListedExtensions = $blackListedExtensions;
990  $this->mTitleError = self::FILETYPE_BADTYPE;
991  $this->mTitle = null;
992 
993  return $this->mTitle;
994  }
995 
996  // Windows may be broken with special characters, see T3780
997  if ( !preg_match( '/^[\x0-\x7f]*$/', $nt->getText() )
998  && !RepoGroup::singleton()->getLocalRepo()->backendSupportsUnicodePaths()
999  ) {
1000  $this->mTitleError = self::WINDOWS_NONASCII_FILENAME;
1001  $this->mTitle = null;
1002 
1003  return $this->mTitle;
1004  }
1005 
1006  # If there was more than one "extension", reassemble the base
1007  # filename to prevent bogus complaints about length
1008  if ( count( $ext ) > 1 ) {
1009  $iterations = count( $ext ) - 1;
1010  for ( $i = 0; $i < $iterations; $i++ ) {
1011  $partname .= '.' . $ext[$i];
1012  }
1013  }
1014 
1015  if ( strlen( $partname ) < 1 ) {
1016  $this->mTitleError = self::MIN_LENGTH_PARTNAME;
1017  $this->mTitle = null;
1018 
1019  return $this->mTitle;
1020  }
1021 
1022  $this->mTitle = $nt;
1023 
1024  return $this->mTitle;
1025  }
1026 
1032  public function getLocalFile() {
1033  if ( is_null( $this->mLocalFile ) ) {
1034  $nt = $this->getTitle();
1035  $this->mLocalFile = is_null( $nt ) ? null : wfLocalFile( $nt );
1036  }
1037 
1038  return $this->mLocalFile;
1039  }
1040 
1044  public function getStashFile() {
1045  return $this->mStashFile;
1046  }
1047 
1059  public function tryStashFile( User $user, $isPartial = false ) {
1060  if ( !$isPartial ) {
1061  $error = $this->runUploadStashFileHook( $user );
1062  if ( $error ) {
1063  return Status::newFatal( ...$error );
1064  }
1065  }
1066  try {
1067  $file = $this->doStashFile( $user );
1068  return Status::newGood( $file );
1069  } catch ( UploadStashException $e ) {
1070  return Status::newFatal( 'uploadstash-exception', get_class( $e ), $e->getMessage() );
1071  }
1072  }
1073 
1078  protected function runUploadStashFileHook( User $user ) {
1079  $props = $this->mFileProps;
1080  $error = null;
1081  Hooks::run( 'UploadStashFile', [ $this, $user, $props, &$error ] );
1082  if ( $error && !is_array( $error ) ) {
1083  $error = [ $error ];
1084  }
1085  return $error;
1086  }
1087 
1107  public function stashFile( User $user = null ) {
1108  return $this->doStashFile( $user );
1109  }
1110 
1117  protected function doStashFile( User $user = null ) {
1118  $stash = RepoGroup::singleton()->getLocalRepo()->getUploadStash( $user );
1119  $file = $stash->stashFile( $this->mTempPath, $this->getSourceType() );
1120  $this->mStashFile = $file;
1121 
1122  return $file;
1123  }
1124 
1132  public function stashFileGetKey() {
1133  wfDeprecated( __METHOD__, '1.28' );
1134  return $this->doStashFile()->getFileKey();
1135  }
1136 
1143  public function stashSession() {
1144  wfDeprecated( __METHOD__, '1.28' );
1145  return $this->doStashFile()->getFileKey();
1146  }
1147 
1152  public function cleanupTempFile() {
1153  if ( $this->mRemoveTempFile && $this->tempFileObj ) {
1154  // Delete when all relevant TempFSFile handles go out of scope
1155  wfDebug( __METHOD__ . ": Marked temporary file '{$this->mTempPath}' for removal\n" );
1156  $this->tempFileObj->autocollect();
1157  }
1158  }
1159 
1160  public function getTempPath() {
1161  return $this->mTempPath;
1162  }
1163 
1173  public static function splitExtensions( $filename ) {
1174  $bits = explode( '.', $filename );
1175  $basename = array_shift( $bits );
1176 
1177  return [ $basename, $bits ];
1178  }
1179 
1188  public static function checkFileExtension( $ext, $list ) {
1189  return in_array( strtolower( $ext ), $list );
1190  }
1191 
1200  public static function checkFileExtensionList( $ext, $list ) {
1201  return array_intersect( array_map( 'strtolower', $ext ), $list );
1202  }
1203 
1211  public static function verifyExtension( $mime, $extension ) {
1212  $magic = MediaWiki\MediaWikiServices::getInstance()->getMimeAnalyzer();
1213 
1214  if ( !$mime || $mime == 'unknown' || $mime == 'unknown/unknown' ) {
1215  if ( !$magic->isRecognizableExtension( $extension ) ) {
1216  wfDebug( __METHOD__ . ": passing file with unknown detected mime type; " .
1217  "unrecognized extension '$extension', can't verify\n" );
1218 
1219  return true;
1220  } else {
1221  wfDebug( __METHOD__ . ": rejecting file with unknown detected mime type; " .
1222  "recognized extension '$extension', so probably invalid file\n" );
1223 
1224  return false;
1225  }
1226  }
1227 
1228  $match = $magic->isMatchingExtension( $extension, $mime );
1229 
1230  if ( $match === null ) {
1231  if ( $magic->getTypesForExtension( $extension ) !== null ) {
1232  wfDebug( __METHOD__ . ": No extension known for $mime, but we know a mime for $extension\n" );
1233 
1234  return false;
1235  } else {
1236  wfDebug( __METHOD__ . ": no file extension known for mime type $mime, passing file\n" );
1237 
1238  return true;
1239  }
1240  } elseif ( $match === true ) {
1241  wfDebug( __METHOD__ . ": mime type $mime matches extension $extension, passing file\n" );
1242 
1244  return true;
1245  } else {
1246  wfDebug( __METHOD__
1247  . ": mime type $mime mismatches file extension $extension, rejecting file\n" );
1248 
1249  return false;
1250  }
1251  }
1252 
1264  public static function detectScript( $file, $mime, $extension ) {
1265  global $wgAllowTitlesInSVG;
1266 
1267  # ugly hack: for text files, always look at the entire file.
1268  # For binary field, just check the first K.
1269 
1270  if ( strpos( $mime, 'text/' ) === 0 ) {
1271  $chunk = file_get_contents( $file );
1272  } else {
1273  $fp = fopen( $file, 'rb' );
1274  $chunk = fread( $fp, 1024 );
1275  fclose( $fp );
1276  }
1277 
1278  $chunk = strtolower( $chunk );
1279 
1280  if ( !$chunk ) {
1281  return false;
1282  }
1283 
1284  # decode from UTF-16 if needed (could be used for obfuscation).
1285  if ( substr( $chunk, 0, 2 ) == "\xfe\xff" ) {
1286  $enc = 'UTF-16BE';
1287  } elseif ( substr( $chunk, 0, 2 ) == "\xff\xfe" ) {
1288  $enc = 'UTF-16LE';
1289  } else {
1290  $enc = null;
1291  }
1292 
1293  if ( $enc ) {
1294  $chunk = iconv( $enc, "ASCII//IGNORE", $chunk );
1295  }
1296 
1297  $chunk = trim( $chunk );
1298 
1300  wfDebug( __METHOD__ . ": checking for embedded scripts and HTML stuff\n" );
1301 
1302  # check for HTML doctype
1303  if ( preg_match( "/<!DOCTYPE *X?HTML/i", $chunk ) ) {
1304  return true;
1305  }
1306 
1307  // Some browsers will interpret obscure xml encodings as UTF-8, while
1308  // PHP/expat will interpret the given encoding in the xml declaration (T49304)
1309  if ( $extension == 'svg' || strpos( $mime, 'image/svg' ) === 0 ) {
1310  if ( self::checkXMLEncodingMissmatch( $file ) ) {
1311  return true;
1312  }
1313  }
1314 
1330  $tags = [
1331  '<a href',
1332  '<body',
1333  '<head',
1334  '<html', # also in safari
1335  '<img',
1336  '<pre',
1337  '<script', # also in safari
1338  '<table'
1339  ];
1340 
1341  if ( !$wgAllowTitlesInSVG && $extension !== 'svg' && $mime !== 'image/svg' ) {
1342  $tags[] = '<title';
1343  }
1344 
1345  foreach ( $tags as $tag ) {
1346  if ( strpos( $chunk, $tag ) !== false ) {
1347  wfDebug( __METHOD__ . ": found something that may make it be mistaken for html: $tag\n" );
1348 
1349  return true;
1350  }
1351  }
1352 
1353  /*
1354  * look for JavaScript
1355  */
1356 
1357  # resolve entity-refs to look at attributes. may be harsh on big files... cache result?
1358  $chunk = Sanitizer::decodeCharReferences( $chunk );
1359 
1360  # look for script-types
1361  if ( preg_match( '!type\s*=\s*[\'"]?\s*(?:\w*/)?(?:ecma|java)!sim', $chunk ) ) {
1362  wfDebug( __METHOD__ . ": found script types\n" );
1363 
1364  return true;
1365  }
1366 
1367  # look for html-style script-urls
1368  if ( preg_match( '!(?:href|src|data)\s*=\s*[\'"]?\s*(?:ecma|java)script:!sim', $chunk ) ) {
1369  wfDebug( __METHOD__ . ": found html-style script urls\n" );
1370 
1371  return true;
1372  }
1373 
1374  # look for css-style script-urls
1375  if ( preg_match( '!url\s*\(\s*[\'"]?\s*(?:ecma|java)script:!sim', $chunk ) ) {
1376  wfDebug( __METHOD__ . ": found css-style script urls\n" );
1377 
1378  return true;
1379  }
1380 
1381  wfDebug( __METHOD__ . ": no scripts found\n" );
1382 
1383  return false;
1384  }
1385 
1393  public static function checkXMLEncodingMissmatch( $file ) {
1394  global $wgSVGMetadataCutoff;
1395  $contents = file_get_contents( $file, false, null, 0, $wgSVGMetadataCutoff );
1396  $encodingRegex = '!encoding[ \t\n\r]*=[ \t\n\r]*[\'"](.*?)[\'"]!si';
1397 
1398  if ( preg_match( "!<\?xml\b(.*?)\?>!si", $contents, $matches ) ) {
1399  if ( preg_match( $encodingRegex, $matches[1], $encMatch )
1400  && !in_array( strtoupper( $encMatch[1] ), self::$safeXmlEncodings )
1401  ) {
1402  wfDebug( __METHOD__ . ": Found unsafe XML encoding '{$encMatch[1]}'\n" );
1403 
1404  return true;
1405  }
1406  } elseif ( preg_match( "!<\?xml\b!si", $contents ) ) {
1407  // Start of XML declaration without an end in the first $wgSVGMetadataCutoff
1408  // bytes. There shouldn't be a legitimate reason for this to happen.
1409  wfDebug( __METHOD__ . ": Unmatched XML declaration start\n" );
1410 
1411  return true;
1412  } elseif ( substr( $contents, 0, 4 ) == "\x4C\x6F\xA7\x94" ) {
1413  // EBCDIC encoded XML
1414  wfDebug( __METHOD__ . ": EBCDIC Encoded XML\n" );
1415 
1416  return true;
1417  }
1418 
1419  // It's possible the file is encoded with multi-byte encoding, so re-encode attempt to
1420  // detect the encoding in case is specifies an encoding not whitelisted in self::$safeXmlEncodings
1421  $attemptEncodings = [ 'UTF-16', 'UTF-16BE', 'UTF-32', 'UTF-32BE' ];
1422  foreach ( $attemptEncodings as $encoding ) {
1423  Wikimedia\suppressWarnings();
1424  $str = iconv( $encoding, 'UTF-8', $contents );
1425  Wikimedia\restoreWarnings();
1426  if ( $str != '' && preg_match( "!<\?xml\b(.*?)\?>!si", $str, $matches ) ) {
1427  if ( preg_match( $encodingRegex, $matches[1], $encMatch )
1428  && !in_array( strtoupper( $encMatch[1] ), self::$safeXmlEncodings )
1429  ) {
1430  wfDebug( __METHOD__ . ": Found unsafe XML encoding '{$encMatch[1]}'\n" );
1431 
1432  return true;
1433  }
1434  } elseif ( $str != '' && preg_match( "!<\?xml\b!si", $str ) ) {
1435  // Start of XML declaration without an end in the first $wgSVGMetadataCutoff
1436  // bytes. There shouldn't be a legitimate reason for this to happen.
1437  wfDebug( __METHOD__ . ": Unmatched XML declaration start\n" );
1438 
1439  return true;
1440  }
1441  }
1442 
1443  return false;
1444  }
1445 
1451  protected function detectScriptInSvg( $filename, $partial ) {
1452  $this->mSVGNSError = false;
1453  $check = new XmlTypeCheck(
1454  $filename,
1455  [ $this, 'checkSvgScriptCallback' ],
1456  true,
1457  [
1458  'processing_instruction_handler' => 'UploadBase::checkSvgPICallback',
1459  'external_dtd_handler' => 'UploadBase::checkSvgExternalDTD',
1460  ]
1461  );
1462  if ( $check->wellFormed !== true ) {
1463  // Invalid xml (T60553)
1464  // But only when non-partial (T67724)
1465  return $partial ? false : [ 'uploadinvalidxml' ];
1466  } elseif ( $check->filterMatch ) {
1467  if ( $this->mSVGNSError ) {
1468  return [ 'uploadscriptednamespace', $this->mSVGNSError ];
1469  }
1470 
1471  return $check->filterMatchType;
1472  }
1473 
1474  return false;
1475  }
1476 
1483  public static function checkSvgPICallback( $target, $data ) {
1484  // Don't allow external stylesheets (T59550)
1485  if ( preg_match( '/xml-stylesheet/i', $target ) ) {
1486  return [ 'upload-scripted-pi-callback' ];
1487  }
1488 
1489  return false;
1490  }
1491 
1503  public static function checkSvgExternalDTD( $type, $publicId, $systemId ) {
1504  // This doesn't include the XHTML+MathML+SVG doctype since we don't
1505  // allow XHTML anyways.
1506  $allowedDTDs = [
1507  'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd',
1508  'http://www.w3.org/TR/2001/REC-SVG-20010904/DTD/svg10.dtd',
1509  'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11-basic.dtd',
1510  'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11-tiny.dtd',
1511  // https://phabricator.wikimedia.org/T168856
1512  'http://www.w3.org/TR/2001/PR-SVG-20010719/DTD/svg10.dtd',
1513  ];
1514  if ( $type !== 'PUBLIC'
1515  || !in_array( $systemId, $allowedDTDs )
1516  || strpos( $publicId, "-//W3C//" ) !== 0
1517  ) {
1518  return [ 'upload-scripted-dtd' ];
1519  }
1520  return false;
1521  }
1522 
1530  public function checkSvgScriptCallback( $element, $attribs, $data = null ) {
1531  list( $namespace, $strippedElement ) = $this->splitXmlNamespace( $element );
1532 
1533  // We specifically don't include:
1534  // http://www.w3.org/1999/xhtml (T62771)
1535  static $validNamespaces = [
1536  '',
1537  'adobe:ns:meta/',
1538  'http://creativecommons.org/ns#',
1539  'http://inkscape.sourceforge.net/dtd/sodipodi-0.dtd',
1540  'http://ns.adobe.com/adobeillustrator/10.0/',
1541  'http://ns.adobe.com/adobesvgviewerextensions/3.0/',
1542  'http://ns.adobe.com/extensibility/1.0/',
1543  'http://ns.adobe.com/flows/1.0/',
1544  'http://ns.adobe.com/illustrator/1.0/',
1545  'http://ns.adobe.com/imagereplacement/1.0/',
1546  'http://ns.adobe.com/pdf/1.3/',
1547  'http://ns.adobe.com/photoshop/1.0/',
1548  'http://ns.adobe.com/saveforweb/1.0/',
1549  'http://ns.adobe.com/variables/1.0/',
1550  'http://ns.adobe.com/xap/1.0/',
1551  'http://ns.adobe.com/xap/1.0/g/',
1552  'http://ns.adobe.com/xap/1.0/g/img/',
1553  'http://ns.adobe.com/xap/1.0/mm/',
1554  'http://ns.adobe.com/xap/1.0/rights/',
1555  'http://ns.adobe.com/xap/1.0/stype/dimensions#',
1556  'http://ns.adobe.com/xap/1.0/stype/font#',
1557  'http://ns.adobe.com/xap/1.0/stype/manifestitem#',
1558  'http://ns.adobe.com/xap/1.0/stype/resourceevent#',
1559  'http://ns.adobe.com/xap/1.0/stype/resourceref#',
1560  'http://ns.adobe.com/xap/1.0/t/pg/',
1561  'http://purl.org/dc/elements/1.1/',
1562  'http://purl.org/dc/elements/1.1',
1563  'http://schemas.microsoft.com/visio/2003/svgextensions/',
1564  'http://sodipodi.sourceforge.net/dtd/sodipodi-0.dtd',
1565  'http://taptrix.com/inkpad/svg_extensions',
1566  'http://web.resource.org/cc/',
1567  'http://www.freesoftware.fsf.org/bkchem/cdml',
1568  'http://www.inkscape.org/namespaces/inkscape',
1569  'http://www.opengis.net/gml',
1570  'http://www.w3.org/1999/02/22-rdf-syntax-ns#',
1571  'http://www.w3.org/2000/svg',
1572  'http://www.w3.org/tr/rec-rdf-syntax/',
1573  'http://www.w3.org/2000/01/rdf-schema#',
1574  ];
1575 
1576  // Inkscape mangles namespace definitions created by Adobe Illustrator.
1577  // This is nasty but harmless. (T144827)
1578  $isBuggyInkscape = preg_match( '/^&(#38;)*ns_[a-z_]+;$/', $namespace );
1579 
1580  if ( !( $isBuggyInkscape || in_array( $namespace, $validNamespaces ) ) ) {
1581  wfDebug( __METHOD__ . ": Non-svg namespace '$namespace' in uploaded file.\n" );
1583  $this->mSVGNSError = $namespace;
1584 
1585  return true;
1586  }
1587 
1588  /*
1589  * check for elements that can contain javascript
1590  */
1591  if ( $strippedElement == 'script' ) {
1592  wfDebug( __METHOD__ . ": Found script element '$element' in uploaded file.\n" );
1593 
1594  return [ 'uploaded-script-svg', $strippedElement ];
1595  }
1596 
1597  # e.g., <svg xmlns="http://www.w3.org/2000/svg">
1598  # <handler xmlns:ev="http://www.w3.org/2001/xml-events" ev:event="load">alert(1)</handler> </svg>
1599  if ( $strippedElement == 'handler' ) {
1600  wfDebug( __METHOD__ . ": Found scriptable element '$element' in uploaded file.\n" );
1601 
1602  return [ 'uploaded-script-svg', $strippedElement ];
1603  }
1604 
1605  # SVG reported in Feb '12 that used xml:stylesheet to generate javascript block
1606  if ( $strippedElement == 'stylesheet' ) {
1607  wfDebug( __METHOD__ . ": Found scriptable element '$element' in uploaded file.\n" );
1608 
1609  return [ 'uploaded-script-svg', $strippedElement ];
1610  }
1611 
1612  # Block iframes, in case they pass the namespace check
1613  if ( $strippedElement == 'iframe' ) {
1614  wfDebug( __METHOD__ . ": iframe in uploaded file.\n" );
1615 
1616  return [ 'uploaded-script-svg', $strippedElement ];
1617  }
1618 
1619  # Check <style> css
1620  if ( $strippedElement == 'style'
1621  && self::checkCssFragment( Sanitizer::normalizeCss( $data ) )
1622  ) {
1623  wfDebug( __METHOD__ . ": hostile css in style element.\n" );
1624  return [ 'uploaded-hostile-svg' ];
1625  }
1626 
1627  foreach ( $attribs as $attrib => $value ) {
1628  $stripped = $this->stripXmlNamespace( $attrib );
1629  $value = strtolower( $value );
1630 
1631  if ( substr( $stripped, 0, 2 ) == 'on' ) {
1632  wfDebug( __METHOD__
1633  . ": Found event-handler attribute '$attrib'='$value' in uploaded file.\n" );
1634 
1635  return [ 'uploaded-event-handler-on-svg', $attrib, $value ];
1636  }
1637 
1638  # Do not allow relative links, or unsafe url schemas.
1639  # For <a> tags, only data:, http: and https: and same-document
1640  # fragment links are allowed. For all other tags, only data:
1641  # and fragment are allowed.
1642  if ( $stripped == 'href'
1643  && $value !== ''
1644  && strpos( $value, 'data:' ) !== 0
1645  && strpos( $value, '#' ) !== 0
1646  ) {
1647  if ( !( $strippedElement === 'a'
1648  && preg_match( '!^https?://!i', $value ) )
1649  ) {
1650  wfDebug( __METHOD__ . ": Found href attribute <$strippedElement "
1651  . "'$attrib'='$value' in uploaded file.\n" );
1652 
1653  return [ 'uploaded-href-attribute-svg', $strippedElement, $attrib, $value ];
1654  }
1655  }
1656 
1657  # only allow data: targets that should be safe. This prevents vectors like,
1658  # image/svg, text/xml, application/xml, and text/html, which can contain scripts
1659  if ( $stripped == 'href' && strncasecmp( 'data:', $value, 5 ) === 0 ) {
1660  // rfc2397 parameters. This is only slightly slower than (;[\w;]+)*.
1661  // phpcs:ignore Generic.Files.LineLength
1662  $parameters = '(?>;[a-zA-Z0-9\!#$&\'*+.^_`{|}~-]+=(?>[a-zA-Z0-9\!#$&\'*+.^_`{|}~-]+|"(?>[\0-\x0c\x0e-\x21\x23-\x5b\x5d-\x7f]+|\\\\[\0-\x7f])*"))*(?:;base64)?';
1663 
1664  if ( !preg_match( "!^data:\s*image/(gif|jpeg|jpg|png)$parameters,!i", $value ) ) {
1665  wfDebug( __METHOD__ . ": Found href to unwhitelisted data: uri "
1666  . "\"<$strippedElement '$attrib'='$value'...\" in uploaded file.\n" );
1667  return [ 'uploaded-href-unsafe-target-svg', $strippedElement, $attrib, $value ];
1668  }
1669  }
1670 
1671  # Change href with animate from (http://html5sec.org/#137).
1672  if ( $stripped === 'attributename'
1673  && $strippedElement === 'animate'
1674  && $this->stripXmlNamespace( $value ) == 'href'
1675  ) {
1676  wfDebug( __METHOD__ . ": Found animate that might be changing href using from "
1677  . "\"<$strippedElement '$attrib'='$value'...\" in uploaded file.\n" );
1678 
1679  return [ 'uploaded-animate-svg', $strippedElement, $attrib, $value ];
1680  }
1681 
1682  # use set/animate to add event-handler attribute to parent
1683  if ( ( $strippedElement == 'set' || $strippedElement == 'animate' )
1684  && $stripped == 'attributename'
1685  && substr( $value, 0, 2 ) == 'on'
1686  ) {
1687  wfDebug( __METHOD__ . ": Found svg setting event-handler attribute with "
1688  . "\"<$strippedElement $stripped='$value'...\" in uploaded file.\n" );
1689 
1690  return [ 'uploaded-setting-event-handler-svg', $strippedElement, $stripped, $value ];
1691  }
1692 
1693  # use set to add href attribute to parent element
1694  if ( $strippedElement == 'set'
1695  && $stripped == 'attributename'
1696  && strpos( $value, 'href' ) !== false
1697  ) {
1698  wfDebug( __METHOD__ . ": Found svg setting href attribute '$value' in uploaded file.\n" );
1699 
1700  return [ 'uploaded-setting-href-svg' ];
1701  }
1702 
1703  # use set to add a remote / data / script target to an element
1704  if ( $strippedElement == 'set'
1705  && $stripped == 'to'
1706  && preg_match( '!(http|https|data|script):!sim', $value )
1707  ) {
1708  wfDebug( __METHOD__ . ": Found svg setting attribute to '$value' in uploaded file.\n" );
1709 
1710  return [ 'uploaded-wrong-setting-svg', $value ];
1711  }
1712 
1713  # use handler attribute with remote / data / script
1714  if ( $stripped == 'handler' && preg_match( '!(http|https|data|script):!sim', $value ) ) {
1715  wfDebug( __METHOD__ . ": Found svg setting handler with remote/data/script "
1716  . "'$attrib'='$value' in uploaded file.\n" );
1717 
1718  return [ 'uploaded-setting-handler-svg', $attrib, $value ];
1719  }
1720 
1721  # use CSS styles to bring in remote code
1722  if ( $stripped == 'style'
1723  && self::checkCssFragment( Sanitizer::normalizeCss( $value ) )
1724  ) {
1725  wfDebug( __METHOD__ . ": Found svg setting a style with "
1726  . "remote url '$attrib'='$value' in uploaded file.\n" );
1727  return [ 'uploaded-remote-url-svg', $attrib, $value ];
1728  }
1729 
1730  # Several attributes can include css, css character escaping isn't allowed
1731  $cssAttrs = [ 'font', 'clip-path', 'fill', 'filter', 'marker',
1732  'marker-end', 'marker-mid', 'marker-start', 'mask', 'stroke' ];
1733  if ( in_array( $stripped, $cssAttrs )
1734  && self::checkCssFragment( $value )
1735  ) {
1736  wfDebug( __METHOD__ . ": Found svg setting a style with "
1737  . "remote url '$attrib'='$value' in uploaded file.\n" );
1738  return [ 'uploaded-remote-url-svg', $attrib, $value ];
1739  }
1740 
1741  # image filters can pull in url, which could be svg that executes scripts
1742  # Only allow url( "#foo" ). Do not allow url( http://example.com )
1743  if ( $strippedElement == 'image'
1744  && $stripped == 'filter'
1745  && preg_match( '!url\s*\(\s*["\']?[^#]!sim', $value )
1746  ) {
1747  wfDebug( __METHOD__ . ": Found image filter with url: "
1748  . "\"<$strippedElement $stripped='$value'...\" in uploaded file.\n" );
1749 
1750  return [ 'uploaded-image-filter-svg', $strippedElement, $stripped, $value ];
1751  }
1752  }
1753 
1754  return false; // No scripts detected
1755  }
1756 
1764  private static function checkCssFragment( $value ) {
1765  # Forbid external stylesheets, for both reliability and to protect viewer's privacy
1766  if ( stripos( $value, '@import' ) !== false ) {
1767  return true;
1768  }
1769 
1770  # We allow @font-face to embed fonts with data: urls, so we snip the string
1771  # 'url' out so this case won't match when we check for urls below
1772  $pattern = '!(@font-face\s*{[^}]*src:)url(\("data:;base64,)!im';
1773  $value = preg_replace( $pattern, '$1$2', $value );
1774 
1775  # Check for remote and executable CSS. Unlike in Sanitizer::checkCss, the CSS
1776  # properties filter and accelerator don't seem to be useful for xss in SVG files.
1777  # Expression and -o-link don't seem to work either, but filtering them here in case.
1778  # Additionally, we catch remote urls like url("http:..., url('http:..., url(http:...,
1779  # but not local ones such as url("#..., url('#..., url(#....
1780  if ( preg_match( '!expression
1781  | -o-link\s*:
1782  | -o-link-source\s*:
1783  | -o-replace\s*:!imx', $value ) ) {
1784  return true;
1785  }
1786 
1787  if ( preg_match_all(
1788  "!(\s*(url|image|image-set)\s*\(\s*[\"']?\s*[^#]+.*?\))!sim",
1789  $value,
1790  $matches
1791  ) !== 0
1792  ) {
1793  # TODO: redo this in one regex. Until then, url("#whatever") matches the first
1794  foreach ( $matches[1] as $match ) {
1795  if ( !preg_match( "!\s*(url|image|image-set)\s*\(\s*(#|'#|\"#)!im", $match ) ) {
1796  return true;
1797  }
1798  }
1799  }
1800 
1801  if ( preg_match( '/[\000-\010\013\016-\037\177]/', $value ) ) {
1802  return true;
1803  }
1804 
1805  return false;
1806  }
1807 
1813  private static function splitXmlNamespace( $element ) {
1814  // 'http://www.w3.org/2000/svg:script' -> [ 'http://www.w3.org/2000/svg', 'script' ]
1815  $parts = explode( ':', strtolower( $element ) );
1816  $name = array_pop( $parts );
1817  $ns = implode( ':', $parts );
1818 
1819  return [ $ns, $name ];
1820  }
1821 
1826  private function stripXmlNamespace( $name ) {
1827  // 'http://www.w3.org/2000/svg:script' -> 'script'
1828  $parts = explode( ':', strtolower( $name ) );
1829 
1830  return array_pop( $parts );
1831  }
1832 
1843  public static function detectVirus( $file ) {
1845 
1846  if ( !$wgAntivirus ) {
1847  wfDebug( __METHOD__ . ": virus scanner disabled\n" );
1848 
1849  return null;
1850  }
1851 
1852  if ( !$wgAntivirusSetup[$wgAntivirus] ) {
1853  wfDebug( __METHOD__ . ": unknown virus scanner: $wgAntivirus\n" );
1854  $wgOut->wrapWikiMsg( "<div class=\"error\">\n$1\n</div>",
1855  [ 'virus-badscanner', $wgAntivirus ] );
1856 
1857  return wfMessage( 'virus-unknownscanner' )->text() . " $wgAntivirus";
1858  }
1859 
1860  # look up scanner configuration
1861  $command = $wgAntivirusSetup[$wgAntivirus]['command'];
1862  $exitCodeMap = $wgAntivirusSetup[$wgAntivirus]['codemap'];
1863  $msgPattern = $wgAntivirusSetup[$wgAntivirus]['messagepattern'] ?? null;
1864 
1865  if ( strpos( $command, "%f" ) === false ) {
1866  # simple pattern: append file to scan
1867  $command .= " " . Shell::escape( $file );
1868  } else {
1869  # complex pattern: replace "%f" with file to scan
1870  $command = str_replace( "%f", Shell::escape( $file ), $command );
1871  }
1872 
1873  wfDebug( __METHOD__ . ": running virus scan: $command \n" );
1874 
1875  # execute virus scanner
1876  $exitCode = false;
1877 
1878  # NOTE: there's a 50 line workaround to make stderr redirection work on windows, too.
1879  # that does not seem to be worth the pain.
1880  # Ask me (Duesentrieb) about it if it's ever needed.
1881  $output = wfShellExecWithStderr( $command, $exitCode );
1882 
1883  # map exit code to AV_xxx constants.
1884  $mappedCode = $exitCode;
1885  if ( $exitCodeMap ) {
1886  if ( isset( $exitCodeMap[$exitCode] ) ) {
1887  $mappedCode = $exitCodeMap[$exitCode];
1888  } elseif ( isset( $exitCodeMap["*"] ) ) {
1889  $mappedCode = $exitCodeMap["*"];
1890  }
1891  }
1892 
1893  /* NB: AV_NO_VIRUS is 0 but AV_SCAN_FAILED is false,
1894  * so we need the strict equalities === and thus can't use a switch here
1895  */
1896  if ( $mappedCode === AV_SCAN_FAILED ) {
1897  # scan failed (code was mapped to false by $exitCodeMap)
1898  wfDebug( __METHOD__ . ": failed to scan $file (code $exitCode).\n" );
1899 
1900  $output = $wgAntivirusRequired
1901  ? wfMessage( 'virus-scanfailed', [ $exitCode ] )->text()
1902  : null;
1903  } elseif ( $mappedCode === AV_SCAN_ABORTED ) {
1904  # scan failed because filetype is unknown (probably imune)
1905  wfDebug( __METHOD__ . ": unsupported file type $file (code $exitCode).\n" );
1906  $output = null;
1907  } elseif ( $mappedCode === AV_NO_VIRUS ) {
1908  # no virus found
1909  wfDebug( __METHOD__ . ": file passed virus scan.\n" );
1910  $output = false;
1911  } else {
1912  $output = trim( $output );
1913 
1914  if ( !$output ) {
1915  $output = true; # if there's no output, return true
1916  } elseif ( $msgPattern ) {
1917  $groups = [];
1918  if ( preg_match( $msgPattern, $output, $groups ) && $groups[1] ) {
1919  $output = $groups[1];
1920  }
1921  }
1922 
1923  wfDebug( __METHOD__ . ": FOUND VIRUS! scanner feedback: $output \n" );
1924  }
1925 
1926  return $output;
1927  }
1928 
1937  private function checkOverwrite( $user ) {
1938  // First check whether the local file can be overwritten
1939  $file = $this->getLocalFile();
1940  $file->load( File::READ_LATEST );
1941  if ( $file->exists() ) {
1942  if ( !self::userCanReUpload( $user, $file ) ) {
1943  return [ 'fileexists-forbidden', $file->getName() ];
1944  } else {
1945  return true;
1946  }
1947  }
1948 
1949  /* Check shared conflicts: if the local file does not exist, but
1950  * wfFindFile finds a file, it exists in a shared repository.
1951  */
1952  $file = wfFindFile( $this->getTitle(), [ 'latest' => true ] );
1953  if ( $file && !$user->isAllowed( 'reupload-shared' ) ) {
1954  return [ 'fileexists-shared-forbidden', $file->getName() ];
1955  }
1956 
1957  return true;
1958  }
1959 
1967  public static function userCanReUpload( User $user, File $img ) {
1968  if ( $user->isAllowed( 'reupload' ) ) {
1969  return true; // non-conditional
1970  } elseif ( !$user->isAllowed( 'reupload-own' ) ) {
1971  return false;
1972  }
1973 
1974  if ( !( $img instanceof LocalFile ) ) {
1975  return false;
1976  }
1977 
1978  $img->load();
1979 
1980  return $user->getId() == $img->getUser( 'id' );
1981  }
1982 
1994  public static function getExistsWarning( $file ) {
1995  if ( $file->exists() ) {
1996  return [ 'warning' => 'exists', 'file' => $file ];
1997  }
1998 
1999  if ( $file->getTitle()->getArticleID() ) {
2000  return [ 'warning' => 'page-exists', 'file' => $file ];
2001  }
2002 
2003  if ( strpos( $file->getName(), '.' ) == false ) {
2004  $partname = $file->getName();
2005  $extension = '';
2006  } else {
2007  $n = strrpos( $file->getName(), '.' );
2008  $extension = substr( $file->getName(), $n + 1 );
2009  $partname = substr( $file->getName(), 0, $n );
2010  }
2011  $normalizedExtension = File::normalizeExtension( $extension );
2012 
2013  if ( $normalizedExtension != $extension ) {
2014  // We're not using the normalized form of the extension.
2015  // Normal form is lowercase, using most common of alternate
2016  // extensions (eg 'jpg' rather than 'JPEG').
2017 
2018  // Check for another file using the normalized form...
2019  $nt_lc = Title::makeTitle( NS_FILE, "{$partname}.{$normalizedExtension}" );
2020  $file_lc = wfLocalFile( $nt_lc );
2021 
2022  if ( $file_lc->exists() ) {
2023  return [
2024  'warning' => 'exists-normalized',
2025  'file' => $file,
2026  'normalizedFile' => $file_lc
2027  ];
2028  }
2029  }
2030 
2031  // Check for files with the same name but a different extension
2032  $similarFiles = RepoGroup::singleton()->getLocalRepo()->findFilesByPrefix(
2033  "{$partname}.", 1 );
2034  if ( count( $similarFiles ) ) {
2035  return [
2036  'warning' => 'exists-normalized',
2037  'file' => $file,
2038  'normalizedFile' => $similarFiles[0],
2039  ];
2040  }
2041 
2042  if ( self::isThumbName( $file->getName() ) ) {
2043  # Check for filenames like 50px- or 180px-, these are mostly thumbnails
2044  $nt_thb = Title::newFromText(
2045  substr( $partname, strpos( $partname, '-' ) + 1 ) . '.' . $extension,
2046  NS_FILE
2047  );
2048  $file_thb = wfLocalFile( $nt_thb );
2049  if ( $file_thb->exists() ) {
2050  return [
2051  'warning' => 'thumb',
2052  'file' => $file,
2053  'thumbFile' => $file_thb
2054  ];
2055  } else {
2056  // File does not exist, but we just don't like the name
2057  return [
2058  'warning' => 'thumb-name',
2059  'file' => $file,
2060  'thumbFile' => $file_thb
2061  ];
2062  }
2063  }
2064 
2065  foreach ( self::getFilenamePrefixBlacklist() as $prefix ) {
2066  if ( substr( $partname, 0, strlen( $prefix ) ) == $prefix ) {
2067  return [
2068  'warning' => 'bad-prefix',
2069  'file' => $file,
2070  'prefix' => $prefix
2071  ];
2072  }
2073  }
2074 
2075  return false;
2076  }
2077 
2083  public static function isThumbName( $filename ) {
2084  $n = strrpos( $filename, '.' );
2085  $partname = $n ? substr( $filename, 0, $n ) : $filename;
2086 
2087  return (
2088  substr( $partname, 3, 3 ) == 'px-' ||
2089  substr( $partname, 2, 3 ) == 'px-'
2090  ) &&
2091  preg_match( "/[0-9]{2}/", substr( $partname, 0, 2 ) );
2092  }
2093 
2099  public static function getFilenamePrefixBlacklist() {
2100  $blacklist = [];
2101  $message = wfMessage( 'filename-prefix-blacklist' )->inContentLanguage();
2102  if ( !$message->isDisabled() ) {
2103  $lines = explode( "\n", $message->plain() );
2104  foreach ( $lines as $line ) {
2105  // Remove comment lines
2106  $comment = substr( trim( $line ), 0, 1 );
2107  if ( $comment == '#' || $comment == '' ) {
2108  continue;
2109  }
2110  // Remove additional comments after a prefix
2111  $comment = strpos( $line, '#' );
2112  if ( $comment > 0 ) {
2113  $line = substr( $line, 0, $comment - 1 );
2114  }
2115  $blacklist[] = trim( $line );
2116  }
2117  }
2118 
2119  return $blacklist;
2120  }
2121 
2133  public function getImageInfo( $result ) {
2134  $localFile = $this->getLocalFile();
2135  $stashFile = $this->getStashFile();
2136  // Calling a different API module depending on whether the file was stashed is less than optimal.
2137  // In fact, calling API modules here at all is less than optimal. Maybe it should be refactored.
2138  if ( $stashFile ) {
2140  $info = ApiQueryStashImageInfo::getInfo( $stashFile, array_flip( $imParam ), $result );
2141  } else {
2143  $info = ApiQueryImageInfo::getInfo( $localFile, array_flip( $imParam ), $result );
2144  }
2145 
2146  return $info;
2147  }
2148 
2153  public function convertVerifyErrorToStatus( $error ) {
2154  $code = $error['status'];
2155  unset( $code['status'] );
2156 
2157  return Status::newFatal( $this->getVerificationErrorCode( $code ), $error );
2158  }
2159 
2167  public static function getMaxUploadSize( $forType = null ) {
2168  global $wgMaxUploadSize;
2169 
2170  if ( is_array( $wgMaxUploadSize ) ) {
2171  if ( !is_null( $forType ) && isset( $wgMaxUploadSize[$forType] ) ) {
2172  return $wgMaxUploadSize[$forType];
2173  } else {
2174  return $wgMaxUploadSize['*'];
2175  }
2176  } else {
2177  return intval( $wgMaxUploadSize );
2178  }
2179  }
2180 
2188  public static function getMaxPhpUploadSize() {
2189  $phpMaxFileSize = wfShorthandToInteger(
2190  ini_get( 'upload_max_filesize' ) ?: ini_get( 'hhvm.server.upload.upload_max_file_size' ),
2191  PHP_INT_MAX
2192  );
2193  $phpMaxPostSize = wfShorthandToInteger(
2194  ini_get( 'post_max_size' ) ?: ini_get( 'hhvm.server.max_post_size' ),
2195  PHP_INT_MAX
2196  ) ?: PHP_INT_MAX;
2197  return min( $phpMaxFileSize, $phpMaxPostSize );
2198  }
2199 
2209  public static function getSessionStatus( User $user, $statusKey ) {
2210  $cache = MediaWikiServices::getInstance()->getMainObjectStash();
2211  $key = $cache->makeKey( 'uploadstatus', $user->getId() ?: md5( $user->getName() ), $statusKey );
2212 
2213  return $cache->get( $key );
2214  }
2215 
2226  public static function setSessionStatus( User $user, $statusKey, $value ) {
2227  $cache = MediaWikiServices::getInstance()->getMainObjectStash();
2228  $key = $cache->makeKey( 'uploadstatus', $user->getId() ?: md5( $user->getName() ), $statusKey );
2229 
2230  if ( $value === false ) {
2231  $cache->delete( $key );
2232  } else {
2233  $cache->set( $key, $value, $cache::TTL_DAY );
2234  }
2235  }
2236 }
$wgStrictFileExtensions
If this is turned off, users may override the warning for files not covered by $wgFileExtensions.
checkOverwrite( $user)
Check if there&#39;s an overwrite conflict and, if so, if restrictions forbid this user from performing t...
detectScriptInSvg( $filename, $partial)
null means default in associative array form
Definition: hooks.txt:1982
exists()
canRender inherited
Definition: LocalFile.php:976
deferred txt A few of the database updates required by various functions here can be deferred until after the result page is displayed to the user For updating the view updating the linked to tables after a etc PHP does not yet have any way to tell the server to actually return and disconnect while still running these but it might have such a feature in the future We handle these by creating a deferred update object and putting those objects on a global list
Definition: deferred.txt:11
const FILENAME_TOO_LONG
Definition: UploadBase.php:82
$data
Utility to generate mapping file used in mw.Title (phpCharToUpper.json)
$wgSVGMetadataCutoff
Don&#39;t read SVG metadata beyond this point.
$wgDisableUploadScriptChecks
Setting this to true will disable the upload system&#39;s checks for HTML/JavaScript. ...
static splitXmlNamespace( $element)
Divide the element name passed by the xml parser to the callback into URI and prifix.
static getPropertyNames( $filter=[])
Returns all possible parameters to iiprop.
tryStashFile(User $user, $isPartial=false)
Like stashFile(), but respects extensions&#39; wishes to prevent the stashing.
wfIsHHVM()
Check if we are running under HHVM.
const SUCCESS
Definition: UploadBase.php:70
static createFromRequest(&$request, $type=null)
Create a form of UploadBase depending on wpSourceType and initializes it.
Definition: UploadBase.php:159
processing should stop and the error should be shown to the user * false
Definition: hooks.txt:187
convertVerifyErrorToStatus( $error)
Apache License January AND DISTRIBUTION Definitions License shall mean the terms and conditions for use
if(PHP_SAPI !='cli-server') if(!isset( $_SERVER['SCRIPT_FILENAME'])) $file
Definition: router.php:42
div flags Integer display flags(NO_ACTION_LINK, NO_EXTRA_USER_LINKS) 'LogException' returning false will NOT prevent logging $e
Definition: hooks.txt:2159
$command
Definition: cdb.php:65
globals txt Globals are evil The original MediaWiki code relied on globals for processing context far too often MediaWiki development since then has been a story of slowly moving context out of global variables and into objects Storing processing context in object member variables allows those objects to be reused in a much more flexible way Consider the elegance of
database rows
Definition: globals.txt:10
const DELETE_SOURCE
Definition: File.php:67
static getSessionStatus(User $user, $statusKey)
Get the current status of a chunked upload (used for polling)
const OVERWRITE_EXISTING_FILE
Definition: UploadBase.php:75
static $safeXmlEncodings
Definition: UploadBase.php:53
This class is used to hold the location and do limited manipulation of files stored temporarily (this...
Definition: TempFSFile.php:30
you don t have to do a grep find to see where the $wgReverseTitle variable is used
Definition: hooks.txt:115
null for the local wiki Added in
Definition: hooks.txt:1585
has been added to your &Future changes to this page and its associated Talk page will be listed there
$value
initializePathInfo( $name, $tempPath, $fileSize, $removeTempFile=false)
Initialize the path information.
Definition: UploadBase.php:228
static normalizeCss( $value)
Normalize CSS into a format we can easily search for hostile input.
Definition: Sanitizer.php:951
wfStripIllegalFilenameChars( $name)
Replace all invalid characters with &#39;-&#39;.
const AV_NO_VIRUS
Definition: Defines.php:111
checkLocalFileExists(LocalFile $localFile, $hash)
Definition: UploadBase.php:762
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency MediaWikiServices
Definition: injection.txt:23
static splitExtensions( $filename)
Split a file into a base name and all dot-delimited &#39;extensions&#39; on the end.
static detectScript( $file, $mime, $extension)
Heuristic for detecting files that could contain JavaScript instructions or things that may look like...
checkUnwantedFileExtensions( $fileExtension)
Definition: UploadBase.php:718
A helper class for throttling authentication attempts.
const ILLEGAL_FILENAME
Definition: UploadBase.php:74
isEmptyFile()
Return true if the file is empty.
Definition: UploadBase.php:274
const AV_SCAN_FAILED
Definition: Defines.php:114
string $mTempPath
Local file system path to the file to upload (or a local copy)
Definition: UploadBase.php:42
target page
static getMaxUploadSize( $forType=null)
Get the MediaWiki maximum uploaded file size for given type of upload, based on $wgMaxUploadSize.
static isStoragePath( $path)
Check if a given path is a "mwstore://" path.
static getInstance()
Returns the global default instance of the top level service locator.
wfLocalFile( $title)
Get an object referring to a locally registered file.
$wgAllowJavaUploads
Allow Java archive uploads.
getName()
Get the user name, or the IP of an anonymous user.
Definition: User.php:2454
const AV_SCAN_ABORTED
Definition: Defines.php:113
const DELETED_FILE
Definition: File.php:54
static configuration should be added through ResourceLoaderGetConfigVars instead can be used to get the real title e g db for database replication lag or jobqueue for job queue size converted to pseudo seconds It is possible to add more fields and they will be returned to the user in the API response after the basic globals have been set but before ordinary actions take place $output
Definition: hooks.txt:2217
The index of the header message $result[1]=The index of the body text message $result[2 through n]=Parameters passed to body text message. Please note the header message cannot receive/use parameters. 'ImportHandleLogItemXMLTag':When parsing a XML tag in a log item. Return false to stop further processing of the tag $reader:XMLReader object $logInfo:Array of information 'ImportHandlePageXMLTag':When parsing a XML tag in a page. Return false to stop further processing of the tag $reader:XMLReader object & $pageInfo:Array of information 'ImportHandleRevisionXMLTag':When parsing a XML tag in a page revision. Return false to stop further processing of the tag $reader:XMLReader object $pageInfo:Array of page information $revisionInfo:Array of revision information 'ImportHandleToplevelXMLTag':When parsing a top level XML tag. Return false to stop further processing of the tag $reader:XMLReader object 'ImportHandleUnknownUser':When a user doesn 't exist locally, this hook is called to give extensions an opportunity to auto-create it. If the auto-creation is successful, return false. $name:User name 'ImportHandleUploadXMLTag':When parsing a XML tag in a file upload. Return false to stop further processing of the tag $reader:XMLReader object $revisionInfo:Array of information 'ImportLogInterwikiLink':Hook to change the interwiki link used in log entries and edit summaries for transwiki imports. & $fullInterwikiPrefix:Interwiki prefix, may contain colons. & $pageTitle:String that contains page title. 'ImportSources':Called when reading from the $wgImportSources configuration variable. Can be used to lazy-load the import sources list. & $importSources:The value of $wgImportSources. Modify as necessary. See the comment in DefaultSettings.php for the detail of how to structure this array. 'InfoAction':When building information to display on the action=info page. $context:IContextSource object & $pageInfo:Array of information 'InitializeArticleMaybeRedirect':MediaWiki check to see if title is a redirect. & $title:Title object for the current page & $request:WebRequest & $ignoreRedirect:boolean to skip redirect check & $target:Title/string of redirect target & $article:Article object 'InternalParseBeforeLinks':during Parser 's internalParse method before links but after nowiki/noinclude/includeonly/onlyinclude and other processings. & $parser:Parser object & $text:string containing partially parsed text & $stripState:Parser 's internal StripState object 'InternalParseBeforeSanitize':during Parser 's internalParse method just before the parser removes unwanted/dangerous HTML tags and after nowiki/noinclude/includeonly/onlyinclude and other processings. Ideal for syntax-extensions after template/parser function execution which respect nowiki and HTML-comments. & $parser:Parser object & $text:string containing partially parsed text & $stripState:Parser 's internal StripState object 'InterwikiLoadPrefix':When resolving if a given prefix is an interwiki or not. Return true without providing an interwiki to continue interwiki search. $prefix:interwiki prefix we are looking for. & $iwData:output array describing the interwiki with keys iw_url, iw_local, iw_trans and optionally iw_api and iw_wikiid. 'InvalidateEmailComplete':Called after a user 's email has been invalidated successfully. $user:user(object) whose email is being invalidated 'IRCLineURL':When constructing the URL to use in an IRC notification. Callee may modify $url and $query, URL will be constructed as $url . $query & $url:URL to index.php & $query:Query string $rc:RecentChange object that triggered url generation 'IsFileCacheable':Override the result of Article::isFileCacheable()(if true) & $article:article(object) being checked 'IsTrustedProxy':Override the result of IP::isTrustedProxy() & $ip:IP being check & $result:Change this value to override the result of IP::isTrustedProxy() 'IsUploadAllowedFromUrl':Override the result of UploadFromUrl::isAllowedUrl() $url:URL used to upload from & $allowed:Boolean indicating if uploading is allowed for given URL 'isValidEmailAddr':Override the result of Sanitizer::validateEmail(), for instance to return false if the domain name doesn 't match your organization. $addr:The e-mail address entered by the user & $result:Set this and return false to override the internal checks 'isValidPassword':Override the result of User::isValidPassword() $password:The password entered by the user & $result:Set this and return false to override the internal checks $user:User the password is being validated for 'Language::getMessagesFileName':$code:The language code or the language we 're looking for a messages file for & $file:The messages file path, you can override this to change the location. 'LanguageGetNamespaces':Provide custom ordering for namespaces or remove namespaces. Do not use this hook to add namespaces. Use CanonicalNamespaces for that. & $namespaces:Array of namespaces indexed by their numbers 'LanguageGetTranslatedLanguageNames':Provide translated language names. & $names:array of language code=> language name $code:language of the preferred translations 'LanguageLinks':Manipulate a page 's language links. This is called in various places to allow extensions to define the effective language links for a page. $title:The page 's Title. & $links:Array with elements of the form "language:title" in the order that they will be output. & $linkFlags:Associative array mapping prefixed links to arrays of flags. Currently unused, but planned to provide support for marking individual language links in the UI, e.g. for featured articles. 'LanguageSelector':Hook to change the language selector available on a page. $out:The output page. $cssClassName:CSS class name of the language selector. 'LinkBegin':DEPRECATED since 1.28! Use HtmlPageLinkRendererBegin instead. Used when generating internal and interwiki links in Linker::link(), before processing starts. Return false to skip default processing and return $ret. See documentation for Linker::link() for details on the expected meanings of parameters. $skin:the Skin object $target:the Title that the link is pointing to & $html:the contents that the< a > tag should have(raw HTML) $result
Definition: hooks.txt:1980
checkAgainstArchiveDupes( $hash)
Definition: UploadBase.php:818
verifyPartialFile()
A verification routine suitable for partial files.
Definition: UploadBase.php:499
$wgCheckFileExtensions
This is a flag to determine whether or not to check file extensions on upload.
The User object encapsulates all of the user-specific settings (user_id, name, rights, email address, options, last login time).
Definition: User.php:48
this hook is for auditing only or null if authentication failed before getting that far or null if we can t even determine that When $user is not it can be in the form of< username >< more info > e g for bot passwords intended to be added to log contexts Fields it might only if the login was with a bot password it is not rendered in wiki pages or galleries in category pages allow injecting custom HTML after the section Any uses of the hook need to handle escaping see BaseTemplate::getToolbox and BaseTemplate::makeListItem for details on the format of individual items inside of this array or by returning and letting standard HTTP rendering take place modifiable or by returning false and taking over the output modifiable modifiable after all normalizations have been except for the $wgMaxImageArea check set to true or false to override the $wgMaxImageArea check result gives extension the possibility to transform it themselves $handler
Definition: hooks.txt:780
$wgEnableUploads
Allow users to upload files.
static checkCssFragment( $value)
Check a block of CSS or CSS fragment for anything that looks like it is bringing in remote code...
static newFatal( $message)
Factory function for fatal errors.
Definition: StatusValue.php:68
Status::newGood()` to allow deletion, and then `return false` from the hook function. Ensure you consume the 'ChangeTagAfterDelete' hook to carry out custom deletion actions. $tag:name of the tag $user:user initiating the action & $status:Status object. See above. 'ChangeTagsListActive':Allows you to nominate which of the tags your extension uses are in active use. & $tags:list of all active tags. Append to this array. 'ChangeTagsAfterUpdateTags':Called after tags have been updated with the ChangeTags::updateTags function. Params:$addedTags:tags effectively added in the update $removedTags:tags effectively removed in the update $prevTags:tags that were present prior to the update $rc_id:recentchanges table id $rev_id:revision table id $log_id:logging table id $params:tag params $rc:RecentChange being tagged when the tagging accompanies the action, or null $user:User who performed the tagging when the tagging is subsequent to the action, or null 'ChangeTagsAllowedAdd':Called when checking if a user can add tags to a change. & $allowedTags:List of all the tags the user is allowed to add. Any tags the user wants to add( $addTags) that are not in this array will cause it to fail. You may add or remove tags to this array as required. $addTags:List of tags user intends to add. $user:User who is adding the tags. 'ChangeUserGroups':Called before user groups are changed. $performer:The User who will perform the change $user:The User whose groups will be changed & $add:The groups that will be added & $remove:The groups that will be removed 'Collation::factory':Called if $wgCategoryCollation is an unknown collation. $collationName:Name of the collation in question & $collationObject:Null. Replace with a subclass of the Collation class that implements the collation given in $collationName. 'ConfirmEmailComplete':Called after a user 's email has been confirmed successfully. $user:user(object) whose email is being confirmed 'ContentAlterParserOutput':Modify parser output for a given content object. Called by Content::getParserOutput after parsing has finished. Can be used for changes that depend on the result of the parsing but have to be done before LinksUpdate is called(such as adding tracking categories based on the rendered HTML). $content:The Content to render $title:Title of the page, as context $parserOutput:ParserOutput to manipulate 'ContentGetParserOutput':Customize parser output for a given content object, called by AbstractContent::getParserOutput. May be used to override the normal model-specific rendering of page content. $content:The Content to render $title:Title of the page, as context $revId:The revision ID, as context $options:ParserOptions for rendering. To avoid confusing the parser cache, the output can only depend on parameters provided to this hook function, not on global state. $generateHtml:boolean, indicating whether full HTML should be generated. If false, generation of HTML may be skipped, but other information should still be present in the ParserOutput object. & $output:ParserOutput, to manipulate or replace 'ContentHandlerDefaultModelFor':Called when the default content model is determined for a given title. May be used to assign a different model for that title. $title:the Title in question & $model:the model name. Use with CONTENT_MODEL_XXX constants. 'ContentHandlerForModelID':Called when a ContentHandler is requested for a given content model name, but no entry for that model exists in $wgContentHandlers. Note:if your extension implements additional models via this hook, please use GetContentModels hook to make them known to core. $modeName:the requested content model name & $handler:set this to a ContentHandler object, if desired. 'ContentModelCanBeUsedOn':Called to determine whether that content model can be used on a given page. This is especially useful to prevent some content models to be used in some special location. $contentModel:ID of the content model in question $title:the Title in question. & $ok:Output parameter, whether it is OK to use $contentModel on $title. Handler functions that modify $ok should generally return false to prevent further hooks from further modifying $ok. 'ContribsPager::getQueryInfo':Before the contributions query is about to run & $pager:Pager object for contributions & $queryInfo:The query for the contribs Pager 'ContribsPager::reallyDoQuery':Called before really executing the query for My Contributions & $data:an array of results of all contribs queries $pager:The ContribsPager object hooked into $offset:Index offset, inclusive $limit:Exact query limit $descending:Query direction, false for ascending, true for descending 'ContributionsLineEnding':Called before a contributions HTML line is finished $page:SpecialPage object for contributions & $ret:the HTML line $row:the DB row for this line & $classes:the classes to add to the surrounding< li > & $attribs:associative array of other HTML attributes for the< li > element. Currently only data attributes reserved to MediaWiki are allowed(see Sanitizer::isReservedDataAttribute). 'ContributionsToolLinks':Change tool links above Special:Contributions $id:User identifier $title:User page title & $tools:Array of tool links $specialPage:SpecialPage instance for context and services. Can be either SpecialContributions or DeletedContributionsPage. Extensions should type hint against a generic SpecialPage though. 'ConvertContent':Called by AbstractContent::convert when a conversion to another content model is requested. Handler functions that modify $result should generally return false to disable further attempts at conversion. $content:The Content object to be converted. $toModel:The ID of the content model to convert to. $lossy:boolean indicating whether lossy conversion is allowed. & $result:Output parameter, in case the handler function wants to provide a converted Content object. Note that $result->getContentModel() must return $toModel. 'ContentSecurityPolicyDefaultSource':Modify the allowed CSP load sources. This affects all directives except for the script directive. If you want to add a script source, see ContentSecurityPolicyScriptSource hook. & $defaultSrc:Array of Content-Security-Policy allowed sources $policyConfig:Current configuration for the Content-Security-Policy header $mode:ContentSecurityPolicy::REPORT_ONLY_MODE or ContentSecurityPolicy::FULL_MODE depending on type of header 'ContentSecurityPolicyDirectives':Modify the content security policy directives. Use this only if ContentSecurityPolicyDefaultSource and ContentSecurityPolicyScriptSource do not meet your needs. & $directives:Array of CSP directives $policyConfig:Current configuration for the CSP header $mode:ContentSecurityPolicy::REPORT_ONLY_MODE or ContentSecurityPolicy::FULL_MODE depending on type of header 'ContentSecurityPolicyScriptSource':Modify the allowed CSP script sources. Note that you also have to use ContentSecurityPolicyDefaultSource if you want non-script sources to be loaded from whatever you add. & $scriptSrc:Array of CSP directives $policyConfig:Current configuration for the CSP header $mode:ContentSecurityPolicy::REPORT_ONLY_MODE or ContentSecurityPolicy::FULL_MODE depending on type of header 'CustomEditor':When invoking the page editor Return true to allow the normal editor to be used, or false if implementing a custom editor, e.g. for a special namespace, etc. $article:Article being edited $user:User performing the edit 'DeletedContribsPager::reallyDoQuery':Called before really executing the query for Special:DeletedContributions Similar to ContribsPager::reallyDoQuery & $data:an array of results of all contribs queries $pager:The DeletedContribsPager object hooked into $offset:Index offset, inclusive $limit:Exact query limit $descending:Query direction, false for ascending, true for descending 'DeletedContributionsLineEnding':Called before a DeletedContributions HTML line is finished. Similar to ContributionsLineEnding $page:SpecialPage object for DeletedContributions & $ret:the HTML line $row:the DB row for this line & $classes:the classes to add to the surrounding< li > & $attribs:associative array of other HTML attributes for the< li > element. Currently only data attributes reserved to MediaWiki are allowed(see Sanitizer::isReservedDataAttribute). 'DeleteUnknownPreferences':Called by the cleanupPreferences.php maintenance script to build a WHERE clause with which to delete preferences that are not known about. This hook is used by extensions that have dynamically-named preferences that should not be deleted in the usual cleanup process. For example, the Gadgets extension creates preferences prefixed with 'gadget-', and so anything with that prefix is excluded from the deletion. &where:An array that will be passed as the $cond parameter to IDatabase::select() to determine what will be deleted from the user_properties table. $db:The IDatabase object, useful for accessing $db->buildLike() etc. 'DifferenceEngineAfterLoadNewText':called in DifferenceEngine::loadNewText() after the new revision 's content has been loaded into the class member variable $differenceEngine->mNewContent but before returning true from this function. $differenceEngine:DifferenceEngine object 'DifferenceEngineLoadTextAfterNewContentIsLoaded':called in DifferenceEngine::loadText() after the new revision 's content has been loaded into the class member variable $differenceEngine->mNewContent but before checking if the variable 's value is null. This hook can be used to inject content into said class member variable. $differenceEngine:DifferenceEngine object 'DifferenceEngineMarkPatrolledLink':Allows extensions to change the "mark as patrolled" link which is shown both on the diff header as well as on the bottom of a page, usually wrapped in a span element which has class="patrollink". $differenceEngine:DifferenceEngine object & $markAsPatrolledLink:The "mark as patrolled" link HTML(string) $rcid:Recent change ID(rc_id) for this change(int) 'DifferenceEngineMarkPatrolledRCID':Allows extensions to possibly change the rcid parameter. For example the rcid might be set to zero due to the user being the same as the performer of the change but an extension might still want to show it under certain conditions. & $rcid:rc_id(int) of the change or 0 $differenceEngine:DifferenceEngine object $change:RecentChange object $user:User object representing the current user 'DifferenceEngineNewHeader':Allows extensions to change the $newHeader variable, which contains information about the new revision, such as the revision 's author, whether the revision was marked as a minor edit or not, etc. $differenceEngine:DifferenceEngine object & $newHeader:The string containing the various #mw-diff-otitle[1-5] divs, which include things like revision author info, revision comment, RevisionDelete link and more $formattedRevisionTools:Array containing revision tools, some of which may have been injected with the DiffRevisionTools hook $nextlink:String containing the link to the next revision(if any) $status
Definition: hooks.txt:1263
Class representing a row of the &#39;filearchive&#39; table.
getHistory( $limit=null, $start=null, $end=null, $inc=true)
purgeDescription inherited
Definition: LocalFile.php:1173
wasDeleted()
Was this file ever deleted from the wiki?
Definition: File.php:1905
$wgLang
Definition: Setup.php:875
either a unescaped string or a HtmlArmor object after in associative array form externallinks including delete and has completed for all link tables whether this was an auto creation use $formDescriptor instead default is conds Array Extra conditions for the No matching items in log is displayed if loglist is empty msgKey Array If you want a nice box with a set this to the key of the message First element is the message additional optional elements are parameters for the key that are processed with wfMessage() -> params() ->parseAsBlock() - offset Set to overwrite offset parameter in $wgRequest set to '' to unset offset - wrap String Wrap the message in html(usually something like "&lt
$wgAntivirusRequired
Determines if a failed virus scan (AV_SCAN_FAILED) will cause the file to be rejected.
Using a hook running we can avoid having all this option specific stuff in our mainline code Using the function We ve cleaned up the code here by removing clumps of infrequently used code and moving them off somewhere else It s much easier for someone working with this code to see what s _really_ going and make changes or fix bugs In we can take all the code that deals with the little used title reversing we can concentrate it all in an extension file
Definition: hooks.txt:91
getTempFileSha1Base36()
Get the base 36 SHA1 of the file.
Definition: UploadBase.php:290
stashFileGetKey()
Stash a file in a temporary directory, returning a key which can be used to find the file again...
UploadBase and subclasses are the backend of MediaWiki&#39;s file uploads.
Definition: UploadBase.php:40
static getInfo( $file, $prop, $result, $thumbParams=null, $opts=false)
Get result information for an image revision.
static checkSvgPICallback( $target, $data)
Callback to filter SVG Processing Instructions.
static singleton()
Get a RepoGroup instance.
Definition: RepoGroup.php:61
fetchFile()
Fetch the file.
Definition: UploadBase.php:266
static newGood( $value=null)
Factory function for good results.
Definition: StatusValue.php:81
wfDebug( $text, $dest='all', array $context=[])
Sends a line to the debug log if enabled or, optionally, to a comment in output.
stashSession()
alias for stashFileGetKey, for backwards compatibility
postProcessUpload()
Perform extra steps after a successful upload.
Definition: UploadBase.php:891
static isVirtualUrl( $url)
Determine if a string is an mwrepo:// URL.
Definition: FileRepo.php:254
$cache
Definition: mcc.php:33
const IGNORE_USER_RIGHTS
Definition: User.php:80
static doWatch(Title $title, User $user, $checkRights=User::CHECK_USER_RIGHTS)
Watch a page.
getTitle()
Returns the title of the file to be uploaded.
Definition: UploadBase.php:900
null means default in associative array with keys and values unescaped Should be merged with default with a value of false meaning to suppress the attribute in associative array with keys and values unescaped noclasses just before the function returns a value If you return an< a > element with HTML attributes $attribs and contents $html will be returned If you return $ret will be returned and may include noclasses after processing & $attribs
Definition: hooks.txt:1982
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency which acts as the top level factory for services in MediaWiki which can be used to gain access to default instances of various services MediaWikiServices however also allows new services to be defined and default services to be redefined Services are defined or redefined by providing a callback function
Definition: injection.txt:30
cleanupTempFile()
If we&#39;ve modified the upload file we need to manually remove it on exit to clean up.
this hook is for auditing only or null if authentication failed before getting that far or null if we can t even determine that When $user is not null
Definition: hooks.txt:780
getSourceType()
Returns the upload type.
Definition: UploadBase.php:216
static checkSvgExternalDTD( $type, $publicId, $systemId)
Verify that DTD urls referenced are only the standard dtds.
const FILE_TOO_LARGE
Definition: UploadBase.php:80
checkBadFileName( $filename, $desiredFileName)
Check whether the resulting filename is different from the desired one, but ignore things like ucfirs...
Definition: UploadBase.php:699
namespace and then decline to actually register it file or subcat img or subcat $title
Definition: hooks.txt:925
checkWarnings()
Check for non fatal problems with the file.
Definition: UploadBase.php:642
initializeFromRequest(&$request)
Initialize from a WebRequest.
verifyUpload()
Verify whether the upload is sane.
Definition: UploadBase.php:320
const MIN_LENGTH_PARTNAME
Definition: UploadBase.php:73
getFileSize()
Return the file size.
Definition: UploadBase.php:282
const NS_FILE
Definition: Defines.php:70
Apache License January AND DISTRIBUTION Definitions License shall mean the terms and conditions for and distribution as defined by Sections through of this document Licensor shall mean the copyright owner or entity authorized by the copyright owner that is granting the License Legal Entity shall mean the union of the acting entity and all other entities that control are controlled by or are under common control with that entity For the purposes of this definition control direct or to cause the direction or management of such whether by contract or including but not limited to software source documentation and configuration files Object form shall mean any form resulting from mechanical transformation or translation of a Source including but not limited to compiled object generated and conversions to other media types Work shall mean the work of whether in Source or Object made available under the as indicated by a copyright notice that is included in or attached to the whether in Source or Object that is based or other modifications as a an original work of authorship For the purposes of this Derivative Works shall not include works that remain separable or merely the Work and Derivative Works thereof Contribution shall mean any work of including the original version of the Work and any modifications or additions to that Work or Derivative Works that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner For the purposes of this submitted means any form of or written communication sent to the Licensor or its including but not limited to communication on electronic mailing source code control and issue tracking systems that are managed by
const VERIFICATION_ERROR
Definition: UploadBase.php:78
static getSha1Base36FromPath( $path)
Get a SHA-1 hash of a file in the local filesystem, in base-36 lower case encoding, zero padded to 31 digits.
Definition: FSFile.php:218
this hook is for auditing only or null if authentication failed before getting that far or null if we can t even determine that When $user is not it can be in the form of< username >< more info > e g for bot passwords intended to be added to log contexts Fields it might only if the login was with a bot password it is not rendered in wiki pages or galleries in category pages allow injecting custom HTML after the section Any uses of the hook need to handle escaping see BaseTemplate::getToolbox and BaseTemplate::makeListItem for details on the format of individual items inside of this array or by returning and letting standard HTTP rendering take place modifiable or by returning false and taking over the output modifiable & $code
Definition: hooks.txt:780
This document is intended to provide useful advice for parties seeking to redistribute MediaWiki to end users It s targeted particularly at maintainers for Linux since it s been observed that distribution packages of MediaWiki often break We ve consistently had to recommend that users seeking support use official tarballs instead of their distribution s and this often solves whatever problem the user is having It would be nice if this could such as
Definition: distributors.txt:9
static isEnabled()
Returns true if uploads are enabled.
Definition: UploadBase.php:110
doStashFile(User $user=null)
Implementation for stashFile() and tryStashFile().
validateName()
Verify that the name is valid and, if necessary, that we can overwrite.
Definition: UploadBase.php:376
static isThrottled( $user)
Returns true if the user has surpassed the upload rate limit, false otherwise.
Definition: UploadBase.php:145
static checkXMLEncodingMissmatch( $file)
Check a whitelist of xml encodings that are known not to be interpreted differently by the server&#39;s x...
const FILETYPE_BADTYPE
Definition: UploadBase.php:77
$wgMaxUploadSize
Max size for uploads, in bytes.
getLocalFile()
Return the local file and initializes if necessary.
$wgAntivirusSetup
Configuration for different virus scanners.
const FILETYPE_MISSING
Definition: UploadBase.php:76
getRealPath( $srcPath)
Definition: UploadBase.php:298
static makeTitleSafe( $ns, $title, $fragment='', $interwiki='')
Create a new Title from a namespace index and a DB key.
Definition: Title.php:617
static makeTitle( $ns, $title, $fragment='', $interwiki='')
Create a new Title from a namespace index and a DB key.
Definition: Title.php:589
verifyPermissions( $user)
Alias for verifyTitlePermissions.
Definition: UploadBase.php:589
$wgFileExtensions
This is the list of preferred extensions for uploading files.
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency which acts as the top level factory for services in MediaWiki which can be used to gain access to default instances of various services MediaWikiServices however also allows new services to be defined and default services to be redefined Services are defined or redefined by providing a callback the instantiator that will return a new instance of the service When it will create an instance of MediaWikiServices and populate it with the services defined in the files listed by thereby bootstrapping the DI framework Per $wgServiceWiringFiles lists includes ServiceWiring php
Definition: injection.txt:35
verifyTitlePermissions( $user)
Check whether the user can edit, upload and create the image.
Definition: UploadBase.php:604
static getFilenamePrefixBlacklist()
Get a list of blacklisted filename prefixes from [[MediaWiki:Filename-prefix-blacklist]].
$wgUploadSizeWarning
Warn if uploaded files are larger than this (in bytes), or false to disable.
this hook is for auditing only RecentChangesLinked and Watchlist Do not use this to implement individual filters if they are compatible with the ChangesListFilter and ChangesListFilterGroup structure use sub classes of those in conjunction with the ChangesListSpecialPageStructuredFilters hook This hook can be used to implement filters that do not implement that or custom behavior that is not an individual filter e g Watchlist and Watchlist you will want to construct new ChangesListBooleanFilter or ChangesListStringOptionsFilter objects When constructing you specify which group they belong to You can reuse existing or create your own(ChangesListBooleanFilterGroup or ChangesListStringOptionsFilterGroup). If you create new groups
$lines
Definition: router.php:61
const HOOK_ABORTED
Definition: UploadBase.php:79
stashFile(User $user=null)
If the user does not supply all necessary information in the first upload form submission (either by ...
getId()
Get the user&#39;s ID.
Definition: User.php:2427
static isThumbName( $filename)
Helper function that checks whether the filename looks like a thumbnail.
static capitalize( $text, $ns=NS_MAIN)
Capitalize a text string for a title if it belongs to a namespace that capitalizes.
Definition: Title.php:3141
performUpload( $comment, $pageText, $watch, $user, $tags=[])
Really perform the upload.
Definition: UploadBase.php:844
wfDeprecated( $function, $version=false, $component=false, $callerOffset=2)
Throws a warning that $function is deprecated.
$line
Definition: cdb.php:59
static $uploadHandlers
Definition: UploadBase.php:150
static decodeCharReferences( $text)
Decode any character references, numeric or named entities, in the text and return a UTF-8 string...
Definition: Sanitizer.php:1661
wfShellExecWithStderr( $cmd, &$retval=null, $environ=[], $limits=[])
Execute a shell command, returning both stdout and stderr.
checkFileSize( $fileSize)
Definition: UploadBase.php:740
const WINDOWS_NONASCII_FILENAME
Definition: UploadBase.php:81
if(!is_readable( $file)) $ext
Definition: router.php:48
checkAgainstExistingDupes( $hash, $ignoreLocalDupes)
Definition: UploadBase.php:796
Class to represent a local file in the wiki&#39;s own database.
Definition: LocalFile.php:46
MimeMagic helper wrapper.
Definition: MWFileProps.php:28
$wgAllowTitlesInSVG
Disallow <title> element in SVG files.
stripXmlNamespace( $name)
static checkFileExtensionList( $ext, $list)
Perform case-insensitive match against a list of file extensions.
Allows to change the fields on the form that will be generated $name
Definition: hooks.txt:271
static getMaxPhpUploadSize()
Get the PHP maximum uploaded file size, based on ini settings.
$wgOut
Definition: Setup.php:880
static detectVirus( $file)
Generic wrapper function for a virus scanner program.
static verifyExtension( $mime, $extension)
Checks if the MIME type of the uploaded file matches the file extension.
static setSessionStatus(User $user, $statusKey, $value)
Set the current status of a chunked upload (used for polling)
wfArrayDiff2( $a, $b)
Like array_diff( $a, $b ) except that it works with two-dimensional arrays.
setTempFile( $tempPath, $fileSize=null)
Definition: UploadBase.php:249
$mBlackListedExtensions
Definition: UploadBase.php:50
verifyMimeType( $mime)
Verify the MIME type.
Definition: UploadBase.php:406
TempFSFile null $tempFileObj
Wrapper to handle deleting the temp file.
Definition: UploadBase.php:44
$wgMimeTypeBlacklist
Files with these MIME types will never be allowed as uploads if $wgVerifyMimeType is enabled...
wfIniGetBool( $setting)
Safety wrapper around ini_get() for boolean settings.
getVerificationErrorCode( $error)
Definition: UploadBase.php:88
getImageInfo( $result)
Gets image info about the file just uploaded.
verifyFile()
Verifies that it&#39;s ok to include the uploaded file.
Definition: UploadBase.php:438
const OK
Definition: UploadBase.php:71
$wgVerifyMimeType
Determines if the MIME type of uploaded files should be checked.
static getHandler( $type)
Get a MediaHandler for a given MIME type from the instance cache.
static checkFileExtension( $ext, $list)
Perform case-insensitive match against a list of file extensions.
$wgFileBlacklist
Files with these extensions will never be allowed as uploads.
static read( $fileName, $callback, $options=[])
Read a ZIP file and call a function for each file discovered in it.
static isValidRequest( $request)
Check whether a request if valid for this handler.
Definition: UploadBase.php:203
do that in ParserLimitReportFormat instead use this to modify the parameters of the image all existing parser cache entries will be invalid To avoid you ll need to handle that somehow(e.g. with the RejectParserCacheValue hook) because MediaWiki won 't do it for you. & $defaults also a ContextSource after deleting those rows but within the same transaction you ll probably need to make sure the header is varied on $request
Definition: hooks.txt:2633
const EMPTY_FILE
Definition: UploadBase.php:72
zipEntryCallback( $entry)
Callback for ZipDirectoryReader to detect Java class files.
Definition: UploadBase.php:560
wfShorthandToInteger( $string='', $default=-1)
Converts shorthand byte notation to integer form.
return true to allow those checks to and false if checking is done & $user
Definition: hooks.txt:1473
checkLocalFileWasDeleted(LocalFile $localFile)
Definition: UploadBase.php:786
static run( $event, array $args=[], $deprecatedVersion=null)
Call hook functions defined in Hooks::register and $wgHooks.
Definition: Hooks.php:200
static isAllowed( $user)
Returns true if the user can use this upload module or else a string identifying the missing permissi...
Definition: UploadBase.php:129
$wgAntivirus
Internal name of virus scanner.
$matches
runUploadStashFileHook(User $user)
checkSvgScriptCallback( $element, $attribs, $data=null)
static newFromText( $text, $defaultNamespace=NS_MAIN)
Create a new Title from text, such as what one would find in a link.
Definition: Title.php:319