141 lines
		
	
	
		
			No EOL
		
	
	
		
			3.2 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			141 lines
		
	
	
		
			No EOL
		
	
	
		
			3.2 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
<?php
 | 
						|
 | 
						|
function photo_init(&$a) {
 | 
						|
 | 
						|
	switch($a->argc) {
 | 
						|
		case 3:
 | 
						|
			$person = $a->argv[2];
 | 
						|
			$type = $a->argv[1];
 | 
						|
			break;
 | 
						|
		case 2:
 | 
						|
			$photo = $a->argv[1];
 | 
						|
			break;
 | 
						|
		case 1:
 | 
						|
		default:
 | 
						|
			killme();
 | 
						|
			// NOTREACHED
 | 
						|
	}
 | 
						|
 | 
						|
	$default = 'images/default-profile.jpg';
 | 
						|
 | 
						|
	if(isset($type)) {
 | 
						|
		switch($type) {
 | 
						|
 | 
						|
			case 'profile':
 | 
						|
				$resolution = 4;
 | 
						|
				break;
 | 
						|
			case 'micro':
 | 
						|
				$resolution = 6;
 | 
						|
				$default = 'images/default-profile-mm.jpg';
 | 
						|
				break;
 | 
						|
			case 'avatar':
 | 
						|
			default:
 | 
						|
				$resolution = 5;
 | 
						|
				$default = 'images/default-profile-sm.jpg';
 | 
						|
				break;
 | 
						|
		}
 | 
						|
 | 
						|
		$uid = str_replace('.jpg', '', $person);
 | 
						|
 | 
						|
		$r = q("SELECT * FROM `photo` WHERE `scale` = %d AND `uid` = %d AND `profile` = 1 LIMIT 1",
 | 
						|
			intval($resolution),
 | 
						|
			intval($uid)
 | 
						|
		);
 | 
						|
		if(count($r)) {
 | 
						|
			$data = $r[0]['data'];
 | 
						|
		}
 | 
						|
		if(! isset($data)) {
 | 
						|
			$data = file_get_contents($default);
 | 
						|
		}
 | 
						|
	}
 | 
						|
	else {
 | 
						|
 | 
						|
		$resolution = 0;
 | 
						|
		$photo = str_replace('.jpg','',$photo);
 | 
						|
	
 | 
						|
		if(substr($photo,-2,1) == '-') {
 | 
						|
			$resolution = intval(substr($photo,-1,1));
 | 
						|
			$photo = substr($photo,0,-2);
 | 
						|
		}
 | 
						|
 | 
						|
		$r = q("SELECT `uid` FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d LIMIT 1",
 | 
						|
			dbesc($photo),
 | 
						|
			intval($resolution)
 | 
						|
		);
 | 
						|
		if(count($r)) {
 | 
						|
			
 | 
						|
			$owner = $r[0]['uid'];
 | 
						|
 | 
						|
			$sql_extra = " AND `allow_cid` = '' AND `allow_gid` = '' AND `deny_cid` = '' AND `deny_gid` = '' ";
 | 
						|
 | 
						|
			if(local_user() && ($owner == $_SESSION['uid'])) {
 | 
						|
 | 
						|
				// Owner can always see his/her photos
 | 
						|
				$sql_extra = ''; 
 | 
						|
 | 
						|
			}
 | 
						|
			elseif(remote_user()) {
 | 
						|
 | 
						|
				// authenticated visitor - here lie dragons
 | 
						|
 | 
						|
				$groups = init_groups_visitor($_SESSION['visitor_id']);
 | 
						|
				$gs = '<<>>'; // should be impossible to match
 | 
						|
				if(count($groups)) {
 | 
						|
					foreach($groups as $g)
 | 
						|
						$gs .= '|<' . intval($g) . '>';
 | 
						|
				} 
 | 
						|
 | 
						|
				$sql_extra = sprintf(
 | 
						|
					" AND ( `allow_cid` = '' OR `allow_cid` REGEXP '<%d>' ) 
 | 
						|
					  AND ( `deny_cid`  = '' OR  NOT `deny_cid` REGEXP '<%d>' ) 
 | 
						|
					  AND ( `allow_gid` = '' OR `allow_gid` REGEXP '%s' )
 | 
						|
					  AND ( `deny_gid`  = '' OR NOT `deny_gid` REGEXP '%s') ",
 | 
						|
 | 
						|
					intval($_SESSION['visitor_id']),
 | 
						|
					intval($_SESSION['visitor_id']),
 | 
						|
					dbesc($gs),
 | 
						|
					dbesc($gs)
 | 
						|
				);
 | 
						|
			}
 | 
						|
 | 
						|
			// Now we'll see if we can access the photo
 | 
						|
 | 
						|
			$r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d $sql_extra LIMIT 1",
 | 
						|
				dbesc($photo),
 | 
						|
				intval($resolution)
 | 
						|
			);
 | 
						|
 | 
						|
			if(count($r)) {
 | 
						|
				$data = $r[0]['data'];
 | 
						|
			}
 | 
						|
			else {
 | 
						|
 | 
						|
				// Does the picture exist? It may be a remote person with no credentials,
 | 
						|
				// but who should otherwise be able to view it. Show a default image to let 
 | 
						|
				// them know permissions was denied. It may be possible to view the image 
 | 
						|
				// through an authenticated profile visit.
 | 
						|
				// There won't be many complete unauthorised people seeing this because
 | 
						|
				// they won't have the photo link, so there's a reasonable chance that the person
 | 
						|
				// might be able to obtain permission to view it.
 | 
						|
 
 | 
						|
				$r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d LIMIT 1",
 | 
						|
					dbesc($photo),
 | 
						|
					intval($resolution)
 | 
						|
				);
 | 
						|
				if(count($r)) {
 | 
						|
					$data = file_get_contents('images/nosign.jpg');
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if(! isset($data)) {
 | 
						|
		killme();
 | 
						|
		// NOTREACHED
 | 
						|
	}
 | 
						|
 | 
						|
	header("Content-type: image/jpeg");
 | 
						|
	echo $data;
 | 
						|
	killme();
 | 
						|
	// NOTREACHED
 | 
						|
} |