1
1
Fork 0
friendica_2019-12_sharedHos.../mod/photo.php

150 lines
3.3 KiB
PHP
Raw Normal View History

2010-07-02 01:48:07 +02:00
<?php
function photo_init(&$a) {
switch($a->argc) {
case 3:
$person = $a->argv[2];
$type = $a->argv[1];
break;
case 2:
$photo = $a->argv[1];
break;
case 1:
default:
killme();
2010-11-08 00:46:49 +01:00
// NOTREACHED
}
2010-11-05 07:50:32 +01:00
$default = 'images/default-profile.jpg';
2010-11-01 00:38:22 +01:00
if(isset($type)) {
/**
* Profile photos
*/
switch($type) {
case 'profile':
$resolution = 4;
break;
2010-11-05 07:50:32 +01:00
case 'micro':
$resolution = 6;
$default = 'images/default-profile-mm.jpg';
break;
case 'avatar':
default:
$resolution = 5;
2010-11-05 07:50:32 +01:00
$default = 'images/default-profile-sm.jpg';
break;
}
$uid = str_replace('.jpg', '', $person);
$r = q("SELECT * FROM `photo` WHERE `scale` = %d AND `uid` = %d AND `profile` = 1 LIMIT 1",
intval($resolution),
intval($uid)
);
if(count($r)) {
$data = $r[0]['data'];
}
2010-11-01 00:38:22 +01:00
if(! isset($data)) {
2010-11-05 07:50:32 +01:00
$data = file_get_contents($default);
}
2010-07-02 01:48:07 +02:00
}
else {
2010-08-05 05:03:38 +02:00
/**
* Other photos
*/
$resolution = 0;
$photo = str_replace('.jpg','',$photo);
if(substr($photo,-2,1) == '-') {
$resolution = intval(substr($photo,-1,1));
$photo = substr($photo,0,-2);
}
2010-08-05 05:03:38 +02:00
$r = q("SELECT `uid` FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d LIMIT 1",
dbesc($photo),
intval($resolution)
);
if(count($r)) {
2010-08-05 05:03:38 +02:00
$owner = $r[0]['uid'];
$sql_extra = " AND `allow_cid` = '' AND `allow_gid` = '' AND `deny_cid` = '' AND `deny_gid` = '' ";
if(local_user() && ($owner == $_SESSION['uid'])) {
// Owner can always see his/her photos
$sql_extra = '';
}
elseif(remote_user()) {
// authenticated visitor - here lie dragons
$groups = init_groups_visitor($_SESSION['visitor_id']);
$gs = '<<>>'; // should be impossible to match
if(count($groups)) {
foreach($groups as $g)
$gs .= '|<' . intval($g) . '>';
}
$sql_extra = sprintf(
" AND ( `allow_cid` = '' OR `allow_cid` REGEXP '<%d>' )
AND ( `deny_cid` = '' OR NOT `deny_cid` REGEXP '<%d>' )
AND ( `allow_gid` = '' OR `allow_gid` REGEXP '%s' )
AND ( `deny_gid` = '' OR NOT `deny_gid` REGEXP '%s') ",
intval($_SESSION['visitor_id']),
intval($_SESSION['visitor_id']),
dbesc($gs),
dbesc($gs)
);
}
// Now we'll see if we can access the photo
$r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d $sql_extra LIMIT 1",
dbesc($photo),
intval($resolution)
);
if(count($r)) {
$data = $r[0]['data'];
}
else {
// Does the picture exist? It may be a remote person with no credentials,
// but who should otherwise be able to view it. Show a default image to let
// them know permissions was denied. It may be possible to view the image
// through an authenticated profile visit.
// There won't be many completely unauthorised people seeing this because
// they won't have the photo link, so there's a reasonable chance that the person
// might be able to obtain permission to view it.
$r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d LIMIT 1",
dbesc($photo),
intval($resolution)
);
if(count($r)) {
$data = file_get_contents('images/nosign.jpg');
}
}
}
2010-07-02 01:48:07 +02:00
}
2010-11-08 00:46:49 +01:00
if(! isset($data)) {
2010-07-02 01:48:07 +02:00
killme();
2010-11-08 00:46:49 +01:00
// NOTREACHED
2010-07-02 01:48:07 +02:00
}
2010-11-08 00:46:49 +01:00
header("Content-type: image/jpeg");
echo $data;
killme();
2010-11-08 00:46:49 +01:00
// NOTREACHED
2010-07-02 01:48:07 +02:00
}