2018-01-09 22:13:45 +01:00
< ? php
/**
2020-02-09 15:45:36 +01:00
* @ copyright Copyright ( C ) 2020 , Friendica
*
* @ license GNU AGPL version 3 or any later version
*
* This program is free software : you can redistribute it and / or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation , either version 3 of the
* License , or ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU Affero General Public License for more details .
*
* You should have received a copy of the GNU Affero General Public License
* along with this program . If not , see < https :// www . gnu . org / licenses />.
*
2018-01-09 22:13:45 +01:00
*/
namespace Friendica\Model ;
2018-07-20 04:15:21 +02:00
use Friendica\Content\Text\BBCode ;
2018-11-07 03:12:41 +01:00
use Friendica\Content\Text\HTML ;
2018-12-26 07:06:24 +01:00
use Friendica\Core\Hook ;
2018-10-29 22:20:46 +01:00
use Friendica\Core\Logger ;
2018-08-11 22:40:44 +02:00
use Friendica\Core\Protocol ;
2018-11-07 03:12:41 +01:00
use Friendica\Core\Renderer ;
2019-09-28 11:36:41 +02:00
use Friendica\Core\Session ;
2019-10-23 21:38:51 +02:00
use Friendica\Core\System ;
2018-02-01 20:14:11 +01:00
use Friendica\Core\Worker ;
2018-07-20 14:19:26 +02:00
use Friendica\Database\DBA ;
2020-07-19 03:40:40 +02:00
use Friendica\Database\DBStructure ;
2019-12-15 22:34:11 +01:00
use Friendica\DI ;
2020-05-03 17:13:40 +02:00
use Friendica\Model\Post\Category ;
2019-10-23 02:05:11 +02:00
use Friendica\Protocol\Activity ;
2019-07-21 09:37:50 +02:00
use Friendica\Protocol\ActivityPub ;
2018-02-01 20:14:11 +01:00
use Friendica\Protocol\Diaspora ;
2018-01-27 03:38:34 +01:00
use Friendica\Util\DateTimeFormat ;
2018-11-07 03:12:41 +01:00
use Friendica\Util\Map ;
2019-05-29 19:57:18 +02:00
use Friendica\Util\Network ;
2018-11-08 14:45:46 +01:00
use Friendica\Util\Strings ;
2019-06-06 06:26:02 +02:00
use Friendica\Worker\Delivery ;
2018-01-21 00:52:54 +01:00
use Text_LanguageDetect ;
2020-03-21 17:36:40 +01:00
use Friendica\Repository\PermissionSet as RepPermissionSet ;
2018-01-09 22:13:45 +01:00
2019-12-15 23:28:01 +01:00
class Item
2018-01-09 22:13:45 +01:00
{
2018-07-19 15:52:05 +02:00
// Posting types, inspired by https://www.w3.org/TR/activitystreams-vocabulary/#object-types
const PT_ARTICLE = 0 ;
const PT_NOTE = 1 ;
const PT_PAGE = 2 ;
const PT_IMAGE = 16 ;
const PT_AUDIO = 17 ;
const PT_VIDEO = 18 ;
const PT_DOCUMENT = 19 ;
const PT_EVENT = 32 ;
2020-08-23 19:48:44 +02:00
const PT_TAG = 64 ;
2020-09-12 19:45:04 +02:00
const PT_TO = 65 ;
const PT_CC = 66 ;
const PT_BTO = 67 ;
const PT_BCC = 68 ;
const PT_FOLLOWER = 69 ;
2018-07-19 15:52:05 +02:00
const PT_PERSONAL_NOTE = 128 ;
2018-06-17 08:27:52 +02:00
// Field list that is used to display the items
2018-12-07 06:52:14 +01:00
const DISPLAY_FIELDLIST = [
2020-04-26 18:15:39 +02:00
'uid' , 'id' , 'parent' , 'uri-id' , 'uri' , 'thr-parent' , 'parent-uri' , 'guid' , 'network' , 'gravity' ,
2018-12-07 06:52:14 +01:00
'commented' , 'created' , 'edited' , 'received' , 'verb' , 'object-type' , 'postopts' , 'plink' ,
'wall' , 'private' , 'starred' , 'origin' , 'title' , 'body' , 'file' , 'attach' , 'language' ,
'content-warning' , 'location' , 'coord' , 'app' , 'rendered-hash' , 'rendered-html' , 'object' ,
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' , 'item_id' ,
'author-id' , 'author-link' , 'author-name' , 'author-avatar' , 'author-network' ,
'owner-id' , 'owner-link' , 'owner-name' , 'owner-avatar' , 'owner-network' ,
2019-04-24 06:26:23 +02:00
'contact-id' , 'contact-uid' , 'contact-link' , 'contact-name' , 'contact-avatar' ,
2019-11-07 06:39:15 +01:00
'writable' , 'self' , 'cid' , 'alias' , 'pinned' ,
2018-12-07 06:52:14 +01:00
'event-id' , 'event-created' , 'event-edited' , 'event-start' , 'event-finish' ,
'event-summary' , 'event-desc' , 'event-location' , 'event-type' ,
'event-nofinish' , 'event-adjust' , 'event-ignore' , 'event-id' ,
2020-05-31 17:48:31 +02:00
'delivery_queue_count' , 'delivery_queue_done' , 'delivery_queue_failed'
2018-12-07 06:52:14 +01:00
];
2018-06-17 08:27:52 +02:00
// Field list that is used to deliver items via the protocols
2020-04-26 18:15:39 +02:00
const DELIVER_FIELDLIST = [ 'uid' , 'id' , 'parent' , 'uri-id' , 'uri' , 'thr-parent' , 'parent-uri' , 'guid' ,
2019-05-05 17:48:57 +02:00
'parent-guid' , 'created' , 'edited' , 'verb' , 'object-type' , 'object' , 'target' ,
2018-06-17 08:27:52 +02:00
'private' , 'title' , 'body' , 'location' , 'coord' , 'app' ,
2020-05-30 00:19:59 +02:00
'attach' , 'deleted' , 'extid' , 'post-type' , 'gravity' ,
2018-06-17 08:27:52 +02:00
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' ,
'author-id' , 'author-link' , 'owner-link' , 'contact-uid' ,
2018-07-08 13:46:05 +02:00
'signed_text' , 'signature' , 'signer' , 'network' ];
2018-06-17 08:27:52 +02:00
2018-06-25 20:49:36 +02:00
// Field list for "item-content" table that is mixed with the item table
2018-06-30 07:18:43 +02:00
const MIXED_CONTENT_FIELDLIST = [ 'title' , 'content-warning' , 'body' , 'location' ,
2018-06-27 21:37:13 +02:00
'coord' , 'app' , 'rendered-hash' , 'rendered-html' , 'verb' ,
2018-06-29 08:20:04 +02:00
'object-type' , 'object' , 'target-type' , 'target' , 'plink' ];
2018-06-24 23:41:49 +02:00
2018-06-30 07:18:43 +02:00
// Field list for "item-content" table that is not present in the "item" table
const CONTENT_FIELDLIST = [ 'language' ];
2018-06-25 20:49:36 +02:00
// All fields in the item table
2020-04-16 06:20:59 +02:00
const ITEM_FIELDLIST = [ 'id' , 'uid' , 'parent' , 'uri' , 'parent-uri' , 'thr-parent' ,
2020-05-19 22:32:15 +02:00
'guid' , 'uri-id' , 'parent-uri-id' , 'thr-parent-id' , 'vid' ,
2020-05-26 07:18:50 +02:00
'contact-id' , 'type' , 'wall' , 'gravity' , 'extid' , 'icid' , 'psid' ,
2018-10-18 23:35:48 +02:00
'created' , 'edited' , 'commented' , 'received' , 'changed' , 'verb' ,
2020-05-02 07:08:05 +02:00
'postopts' , 'plink' , 'resource-id' , 'event-id' , 'attach' , 'inform' ,
2019-05-29 21:40:21 +02:00
'file' , 'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' , 'post-type' ,
2018-06-25 20:49:36 +02:00
'private' , 'pubmail' , 'moderated' , 'visible' , 'starred' , 'bookmark' ,
'unseen' , 'deleted' , 'origin' , 'forum_mode' , 'mention' , 'global' , 'network' ,
'title' , 'content-warning' , 'body' , 'location' , 'coord' , 'app' ,
'rendered-hash' , 'rendered-html' , 'object-type' , 'object' , 'target-type' , 'target' ,
2019-05-29 21:48:03 +02:00
'author-id' , 'author-link' , 'author-name' , 'author-avatar' , 'author-network' ,
2018-07-18 23:26:14 +02:00
'owner-id' , 'owner-link' , 'owner-name' , 'owner-avatar' ];
2018-06-25 20:49:36 +02:00
2020-05-26 07:18:50 +02:00
// List of all verbs that don't need additional content data.
2018-07-06 08:37:33 +02:00
// Never reorder or remove entries from this list. Just add new ones at the end, if needed.
2019-10-24 00:25:43 +02:00
const ACTIVITIES = [
Activity :: LIKE , Activity :: DISLIKE ,
Activity :: ATTEND , Activity :: ATTENDNO , Activity :: ATTENDMAYBE ,
Activity :: FOLLOW ,
Activity :: ANNOUNCE ];
2018-07-06 00:00:38 +02:00
2020-03-02 08:57:23 +01:00
const PUBLIC = 0 ;
const PRIVATE = 1 ;
const UNLISTED = 2 ;
2020-07-19 03:40:40 +02:00
const TABLES = [ 'item' , 'user-item' , 'item-content' , 'post-delivery-data' , 'diaspora-interaction' ];
2018-07-15 20:36:20 +02:00
private static $legacy_mode = null ;
2020-07-19 03:40:40 +02:00
private static function getItemFields ()
{
$definition = DBStructure :: definition ( '' , false );
$postfields = [];
foreach ( self :: TABLES as $table ) {
$postfields [ $table ] = array_keys ( $definition [ $table ][ 'fields' ]);
}
return $postfields ;
}
2018-07-15 20:36:20 +02:00
public static function isLegacyMode ()
{
if ( is_null ( self :: $legacy_mode )) {
2020-01-19 21:21:13 +01:00
self :: $legacy_mode = ( DI :: config () -> get ( " system " , " post_update_version " ) < 1279 );
2018-07-15 20:36:20 +02:00
}
return self :: $legacy_mode ;
}
2019-11-07 06:39:15 +01:00
/**
* Set the pinned state of an item
2019-11-07 07:53:18 +01:00
*
2019-11-07 06:39:15 +01:00
* @ param integer $iid Item ID
* @ param integer $uid User ID
* @ param boolean $pinned Pinned state
*/
public static function setPinned ( int $iid , int $uid , bool $pinned )
{
DBA :: update ( 'user-item' , [ 'pinned' => $pinned ], [ 'iid' => $iid , 'uid' => $uid ], true );
}
/**
* Get the pinned state
2019-11-07 07:53:18 +01:00
*
2019-11-07 06:39:15 +01:00
* @ param integer $iid Item ID
* @ param integer $uid User ID
2019-11-07 07:53:18 +01:00
*
2019-11-07 06:39:15 +01:00
* @ return boolean pinned state
*/
public static function getPinned ( int $iid , int $uid )
{
$useritem = DBA :: selectFirst ( 'user-item' , [ 'pinned' ], [ 'iid' => $iid , 'uid' => $uid ]);
if ( ! DBA :: isResult ( $useritem )) {
return false ;
}
return ( bool ) $useritem [ 'pinned' ];
}
2019-11-07 08:41:54 +01:00
/**
2020-01-19 07:05:23 +01:00
* Select pinned rows from the item table for a given user
2019-11-07 08:41:54 +01:00
*
* @ param integer $uid User ID
* @ param array $selected Array of selected fields , empty for all
2019-11-08 07:52:44 +01:00
* @ param array $condition Array of fields for condition
* @ param array $params Array of several parameters
2019-11-07 08:41:54 +01:00
*
* @ return boolean | object
* @ throws \Exception
*/
2019-11-08 07:52:44 +01:00
public static function selectPinned ( int $uid , array $selected = [], array $condition = [], $params = [])
2019-11-07 07:53:18 +01:00
{
$useritems = DBA :: select ( 'user-item' , [ 'iid' ], [ 'uid' => $uid , 'pinned' => true ]);
if ( ! DBA :: isResult ( $useritems )) {
return $useritems ;
}
$pinned = [];
2020-03-29 13:16:40 +02:00
while ( $useritem = DBA :: fetch ( $useritems )) {
2019-11-07 07:53:18 +01:00
$pinned [] = $useritem [ 'iid' ];
}
DBA :: close ( $useritems );
2019-11-08 07:52:44 +01:00
if ( empty ( $pinned )) {
return [];
}
2020-09-06 22:28:08 +02:00
$condition = DBA :: mergeConditions ([ 'iid' => $pinned ], $condition );
2019-11-08 07:52:44 +01:00
return self :: selectThreadForUser ( $uid , $selected , $condition , $params );
2019-11-07 07:53:18 +01:00
}
2018-06-21 17:14:01 +02:00
/**
2020-01-19 07:05:23 +01:00
* Fetch a single item row
2018-06-21 17:14:01 +02:00
*
* @ param mixed $stmt statement object
* @ return array current row
*/
public static function fetch ( $stmt )
{
2018-07-20 14:19:26 +02:00
$row = DBA :: fetch ( $stmt );
2018-06-21 17:14:01 +02:00
2018-07-06 00:00:38 +02:00
if ( is_bool ( $row )) {
return $row ;
2018-06-24 23:41:49 +02:00
}
2018-07-06 00:00:38 +02:00
// ---------------------- Transform item structure data ----------------------
2018-06-24 12:48:29 +02:00
// We prefer the data from the user's contact over the public one
if ( ! empty ( $row [ 'author-link' ]) && ! empty ( $row [ 'contact-link' ]) &&
( $row [ 'author-link' ] == $row [ 'contact-link' ])) {
if ( isset ( $row [ 'author-avatar' ]) && ! empty ( $row [ 'contact-avatar' ])) {
$row [ 'author-avatar' ] = $row [ 'contact-avatar' ];
}
if ( isset ( $row [ 'author-name' ]) && ! empty ( $row [ 'contact-name' ])) {
$row [ 'author-name' ] = $row [ 'contact-name' ];
}
}
if ( ! empty ( $row [ 'owner-link' ]) && ! empty ( $row [ 'contact-link' ]) &&
( $row [ 'owner-link' ] == $row [ 'contact-link' ])) {
if ( isset ( $row [ 'owner-avatar' ]) && ! empty ( $row [ 'contact-avatar' ])) {
$row [ 'owner-avatar' ] = $row [ 'contact-avatar' ];
}
if ( isset ( $row [ 'owner-name' ]) && ! empty ( $row [ 'contact-name' ])) {
$row [ 'owner-name' ] = $row [ 'contact-name' ];
}
}
2018-07-06 00:00:38 +02:00
// We can always comment on posts from these networks
if ( array_key_exists ( 'writable' , $row ) &&
2019-07-01 20:00:55 +02:00
in_array ( $row [ 'internal-network' ], Protocol :: FEDERATED )) {
2018-07-06 00:00:38 +02:00
$row [ 'writable' ] = true ;
2018-06-30 15:54:01 +02:00
}
2018-07-06 00:00:38 +02:00
// ---------------------- Transform item content data ----------------------
// Fetch data from the item-content table whenever there is content there
2018-07-15 20:36:20 +02:00
if ( self :: isLegacyMode ()) {
2020-05-02 21:34:02 +02:00
$legacy_fields = array_merge ( Post\DeliveryData :: LEGACY_FIELD_LIST , self :: MIXED_CONTENT_FIELDLIST );
2018-07-19 23:56:52 +02:00
foreach ( $legacy_fields as $field ) {
2018-07-15 20:36:20 +02:00
if ( empty ( $row [ $field ]) && ! empty ( $row [ 'internal-item-' . $field ])) {
$row [ $field ] = $row [ 'internal-item-' . $field ];
}
unset ( $row [ 'internal-item-' . $field ]);
2018-07-06 00:00:38 +02:00
}
2018-07-01 09:57:59 +02:00
}
2018-06-30 23:15:24 +02:00
2020-05-18 23:34:57 +02:00
if ( array_key_exists ( 'verb' , $row )) {
if ( ! is_null ( $row [ 'internal-verb' ])) {
$row [ 'verb' ] = $row [ 'internal-verb' ];
2018-07-06 00:00:38 +02:00
}
2020-05-18 23:34:57 +02:00
if ( in_array ( $row [ 'verb' ], self :: ACTIVITIES )) {
if ( array_key_exists ( 'title' , $row )) {
$row [ 'title' ] = '' ;
}
if ( array_key_exists ( 'body' , $row )) {
$row [ 'body' ] = $row [ 'verb' ];
}
if ( array_key_exists ( 'object' , $row )) {
$row [ 'object' ] = '' ;
}
if ( array_key_exists ( 'object-type' , $row )) {
$row [ 'object-type' ] = Activity\ObjectType :: NOTE ;
}
} elseif ( in_array ( $row [ 'verb' ], [ '' , Activity :: POST , Activity :: SHARE ])) {
// Posts don't have a target - but having tags or files.
if ( array_key_exists ( 'target' , $row )) {
$row [ 'target' ] = '' ;
}
2018-07-06 00:00:38 +02:00
}
2018-07-08 06:55:45 +02:00
}
2018-07-06 00:00:38 +02:00
2020-05-31 17:48:31 +02:00
if ( array_key_exists ( 'vid' , $row ) && is_null ( $row [ 'vid' ]) && ! empty ( $row [ 'verb' ])) {
$row [ 'vid' ] = Verb :: getID ( $row [ 'verb' ]);
}
2019-10-24 00:25:43 +02:00
if ( ! array_key_exists ( 'verb' , $row ) || in_array ( $row [ 'verb' ], [ '' , Activity :: POST , Activity :: SHARE ])) {
2018-07-08 07:44:35 +02:00
// Build the file string out of the term entries
if ( array_key_exists ( 'file' , $row ) && empty ( $row [ 'file' ])) {
2020-05-03 17:13:40 +02:00
$row [ 'file' ] = Category :: getTextByURIId ( $row [ 'internal-uri-id' ], $row [ 'internal-uid' ]);
2018-07-08 07:44:35 +02:00
}
2018-06-24 12:48:29 +02:00
}
2020-03-21 17:36:40 +01:00
if ( $row [ 'internal-psid' ] == RepPermissionSet :: PUBLIC ) {
if ( array_key_exists ( 'allow_cid' , $row )) {
$row [ 'allow_cid' ] = '' ;
}
if ( array_key_exists ( 'allow_gid' , $row )) {
$row [ 'allow_gid' ] = '' ;
}
if ( array_key_exists ( 'deny_cid' , $row )) {
$row [ 'deny_cid' ] = '' ;
}
if ( array_key_exists ( 'deny_gid' , $row )) {
$row [ 'deny_gid' ] = '' ;
}
}
2018-08-08 22:32:11 +02:00
if ( array_key_exists ( 'ignored' , $row ) && array_key_exists ( 'internal-user-ignored' , $row ) && ! is_null ( $row [ 'internal-user-ignored' ])) {
$row [ 'ignored' ] = $row [ 'internal-user-ignored' ];
}
2018-07-06 00:00:38 +02:00
// Remove internal fields
unset ( $row [ 'internal-network' ]);
2020-05-03 17:13:40 +02:00
unset ( $row [ 'internal-uri-id' ]);
unset ( $row [ 'internal-uid' ]);
2020-03-21 17:36:40 +01:00
unset ( $row [ 'internal-psid' ]);
2020-05-18 23:34:57 +02:00
unset ( $row [ 'internal-verb' ]);
2018-08-08 22:32:11 +02:00
unset ( $row [ 'internal-user-ignored' ]);
2018-10-15 23:42:55 +02:00
unset ( $row [ 'interaction' ]);
2018-07-06 00:00:38 +02:00
2018-06-21 17:14:01 +02:00
return $row ;
}
/**
2020-01-19 07:05:23 +01:00
* Fills an array with data from an item query
2018-06-21 17:14:01 +02:00
*
* @ param object $stmt statement object
2019-01-06 22:06:53 +01:00
* @ param bool $do_close
2018-06-21 17:14:01 +02:00
* @ return array Data array
*/
public static function inArray ( $stmt , $do_close = true ) {
if ( is_bool ( $stmt )) {
return $stmt ;
}
$data = [];
while ( $row = self :: fetch ( $stmt )) {
$data [] = $row ;
}
if ( $do_close ) {
2018-07-20 14:19:26 +02:00
DBA :: close ( $stmt );
2018-06-21 17:14:01 +02:00
}
return $data ;
}
2018-06-27 21:37:13 +02:00
/**
2020-01-19 07:05:23 +01:00
* Check if item data exists
2018-06-27 21:37:13 +02:00
*
* @ param array $condition array of fields for condition
*
* @ return boolean Are there rows for that condition ?
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-06-27 21:37:13 +02:00
*/
public static function exists ( $condition ) {
$stmt = self :: select ([ 'id' ], $condition , [ 'limit' => 1 ]);
if ( is_bool ( $stmt )) {
$retval = $stmt ;
} else {
2018-07-21 04:05:12 +02:00
$retval = ( DBA :: numRows ( $stmt ) > 0 );
2018-06-27 21:37:13 +02:00
}
2018-07-20 14:19:26 +02:00
DBA :: close ( $stmt );
2018-06-27 21:37:13 +02:00
return $retval ;
}
2018-06-09 21:12:13 +02:00
/**
2018-06-17 19:05:17 +02:00
* Retrieve a single record from the item table for a given user and returns it in an associative array
2018-06-09 21:12:13 +02:00
*
* @ param integer $uid User ID
2019-01-06 22:06:53 +01:00
* @ param array $selected
* @ param array $condition
* @ param array $params
2018-06-09 21:12:13 +02:00
* @ return bool | array
2019-01-06 22:06:53 +01:00
* @ throws \Exception
* @ see DBA :: select
2018-06-09 21:12:13 +02:00
*/
2018-06-17 19:05:17 +02:00
public static function selectFirstForUser ( $uid , array $selected = [], array $condition = [], $params = [])
{
$params [ 'uid' ] = $uid ;
if ( empty ( $selected )) {
$selected = Item :: DISPLAY_FIELDLIST ;
}
return self :: selectFirst ( $selected , $condition , $params );
}
/**
2020-01-19 07:05:23 +01:00
* Select rows from the item table for a given user
2018-06-17 19:05:17 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param integer $uid User ID
* @ param array $selected Array of selected fields , empty for all
* @ param array $condition Array of fields for condition
* @ param array $params Array of several parameters
2018-06-17 19:05:17 +02:00
*
* @ return boolean | object
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-06-17 19:05:17 +02:00
*/
public static function selectForUser ( $uid , array $selected = [], array $condition = [], $params = [])
{
$params [ 'uid' ] = $uid ;
if ( empty ( $selected )) {
$selected = Item :: DISPLAY_FIELDLIST ;
}
return self :: select ( $selected , $condition , $params );
}
/**
* Retrieve a single record from the item table and returns it in an associative array
*
2019-01-06 22:06:53 +01:00
* @ param array $fields
* @ param array $condition
* @ param array $params
2018-06-17 19:05:17 +02:00
* @ return bool | array
2019-01-06 22:06:53 +01:00
* @ throws \Exception
* @ see DBA :: select
2018-06-17 19:05:17 +02:00
*/
public static function selectFirst ( array $fields = [], array $condition = [], $params = [])
2018-06-07 08:03:12 +02:00
{
2018-06-09 18:56:37 +02:00
$params [ 'limit' ] = 1 ;
2018-06-17 19:05:17 +02:00
$result = self :: select ( $fields , $condition , $params );
2018-06-09 18:56:37 +02:00
if ( is_bool ( $result )) {
return $result ;
} else {
2018-06-21 17:14:01 +02:00
$row = self :: fetch ( $result );
2018-07-20 14:19:26 +02:00
DBA :: close ( $result );
2018-06-09 18:56:37 +02:00
return $row ;
}
}
2018-06-07 08:03:12 +02:00
2019-07-27 16:33:17 +02:00
/**
2020-01-19 07:05:23 +01:00
* Select rows from the item table and returns them as an array
2019-07-27 16:33:17 +02:00
*
* @ param array $selected Array of selected fields , empty for all
* @ param array $condition Array of fields for condition
* @ param array $params Array of several parameters
*
* @ return array
* @ throws \Exception
*/
public static function selectToArray ( array $fields = [], array $condition = [], $params = [])
{
$result = self :: select ( $fields , $condition , $params );
if ( is_bool ( $result )) {
2019-07-28 06:03:42 +02:00
return [];
2019-07-27 16:33:17 +02:00
}
2019-07-28 06:12:49 +02:00
$data = [];
while ( $row = self :: fetch ( $result )) {
$data [] = $row ;
}
DBA :: close ( $result );
return $data ;
2019-07-27 16:33:17 +02:00
}
2018-06-09 21:12:13 +02:00
/**
2020-01-19 07:05:23 +01:00
* Select rows from the item table
2018-06-09 21:12:13 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param array $selected Array of selected fields , empty for all
* @ param array $condition Array of fields for condition
* @ param array $params Array of several parameters
2018-06-09 21:12:13 +02:00
*
* @ return boolean | object
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-06-09 21:12:13 +02:00
*/
2018-06-17 19:05:17 +02:00
public static function select ( array $selected = [], array $condition = [], $params = [])
2018-06-09 18:56:37 +02:00
{
2018-06-17 19:05:17 +02:00
$uid = 0 ;
$usermode = false ;
if ( isset ( $params [ 'uid' ])) {
$uid = $params [ 'uid' ];
$usermode = true ;
}
2018-10-17 00:30:24 +02:00
$fields = self :: fieldlist ( $usermode );
2018-06-07 08:03:12 +02:00
2018-06-09 18:56:37 +02:00
$select_fields = self :: constructSelectFields ( $fields , $selected );
2018-06-07 08:03:12 +02:00
2018-07-20 14:19:26 +02:00
$condition_string = DBA :: buildCondition ( $condition );
2018-06-07 08:03:12 +02:00
2018-06-09 18:56:37 +02:00
$condition_string = self :: addTablesToFields ( $condition_string , $fields );
2018-06-17 19:05:17 +02:00
if ( $usermode ) {
$condition_string = $condition_string . ' AND ' . self :: condition ( false );
}
2018-06-09 18:56:37 +02:00
2018-07-20 14:19:26 +02:00
$param_string = self :: addTablesToFields ( DBA :: buildParameter ( $params ), $fields );
2018-06-07 08:03:12 +02:00
2018-07-02 20:22:27 +02:00
$table = " `item` " . self :: constructJoins ( $uid , $select_fields . $condition_string . $param_string , false , $usermode );
2018-06-07 08:03:12 +02:00
2018-06-09 18:56:37 +02:00
$sql = " SELECT " . $select_fields . " FROM " . $table . $condition_string . $param_string ;
2018-06-16 00:30:49 +02:00
2018-07-20 14:19:26 +02:00
return DBA :: p ( $sql , $condition );
2018-06-09 18:56:37 +02:00
}
2018-06-19 07:39:56 +02:00
/**
2020-01-19 07:05:23 +01:00
* Select rows from the starting post in the item table
2018-06-19 07:39:56 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param integer $uid User ID
* @ param array $selected
* @ param array $condition Array of fields for condition
* @ param array $params Array of several parameters
2018-06-19 07:39:56 +02:00
*
* @ return boolean | object
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-06-19 07:39:56 +02:00
*/
public static function selectThreadForUser ( $uid , array $selected = [], array $condition = [], $params = [])
{
$params [ 'uid' ] = $uid ;
if ( empty ( $selected )) {
$selected = Item :: DISPLAY_FIELDLIST ;
}
return self :: selectThread ( $selected , $condition , $params );
}
2018-06-09 21:12:13 +02:00
/**
* Retrieve a single record from the starting post in the item table and returns it in an associative array
*
* @ param integer $uid User ID
2019-01-06 22:06:53 +01:00
* @ param array $selected
* @ param array $condition
* @ param array $params
2018-06-19 07:39:56 +02:00
* @ return bool | array
2019-01-06 22:06:53 +01:00
* @ throws \Exception
* @ see DBA :: select
2018-06-19 07:39:56 +02:00
*/
public static function selectFirstThreadForUser ( $uid , array $selected = [], array $condition = [], $params = [])
{
$params [ 'uid' ] = $uid ;
if ( empty ( $selected )) {
$selected = Item :: DISPLAY_FIELDLIST ;
}
return self :: selectFirstThread ( $selected , $condition , $params );
}
/**
* Retrieve a single record from the starting post in the item table and returns it in an associative array
*
2019-01-06 22:06:53 +01:00
* @ param array $fields
* @ param array $condition
* @ param array $params
2018-06-09 21:12:13 +02:00
* @ return bool | array
2019-01-06 22:06:53 +01:00
* @ throws \Exception
* @ see DBA :: select
2018-06-09 21:12:13 +02:00
*/
2018-06-19 07:39:56 +02:00
public static function selectFirstThread ( array $fields = [], array $condition = [], $params = [])
2018-06-09 18:56:37 +02:00
{
$params [ 'limit' ] = 1 ;
2018-06-19 07:39:56 +02:00
$result = self :: selectThread ( $fields , $condition , $params );
2018-06-09 18:56:37 +02:00
if ( is_bool ( $result )) {
return $result ;
} else {
2018-06-21 17:14:01 +02:00
$row = self :: fetch ( $result );
2018-07-20 14:19:26 +02:00
DBA :: close ( $result );
2018-06-09 18:56:37 +02:00
return $row ;
2018-06-07 08:03:12 +02:00
}
2018-06-09 18:56:37 +02:00
}
2018-06-09 21:12:13 +02:00
/**
2020-01-19 07:05:23 +01:00
* Select rows from the starting post in the item table
2018-06-09 21:12:13 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param array $selected Array of selected fields , empty for all
* @ param array $condition Array of fields for condition
* @ param array $params Array of several parameters
2018-06-09 21:12:13 +02:00
*
* @ return boolean | object
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-06-09 21:12:13 +02:00
*/
2018-06-19 07:39:56 +02:00
public static function selectThread ( array $selected = [], array $condition = [], $params = [])
2018-06-09 18:56:37 +02:00
{
2018-06-19 07:39:56 +02:00
$uid = 0 ;
$usermode = false ;
if ( isset ( $params [ 'uid' ])) {
$uid = $params [ 'uid' ];
$usermode = true ;
2018-06-17 19:05:17 +02:00
}
2018-10-17 00:30:24 +02:00
$fields = self :: fieldlist ( $usermode );
2018-08-08 22:32:11 +02:00
$fields [ 'thread' ] = [ 'mention' , 'ignored' , 'iid' ];
2018-06-09 18:56:37 +02:00
$threadfields = [ 'thread' => [ 'iid' , 'uid' , 'contact-id' , 'owner-id' , 'author-id' ,
'created' , 'edited' , 'commented' , 'received' , 'changed' , 'wall' , 'private' ,
2018-07-19 15:52:05 +02:00
'pubmail' , 'moderated' , 'visible' , 'starred' , 'ignored' , 'post-type' ,
2018-06-09 18:56:37 +02:00
'unseen' , 'deleted' , 'origin' , 'forum_mode' , 'mention' , 'network' ]];
$select_fields = self :: constructSelectFields ( $fields , $selected );
2018-07-20 14:19:26 +02:00
$condition_string = DBA :: buildCondition ( $condition );
2018-06-09 18:56:37 +02:00
$condition_string = self :: addTablesToFields ( $condition_string , $threadfields );
$condition_string = self :: addTablesToFields ( $condition_string , $fields );
2018-06-19 07:39:56 +02:00
if ( $usermode ) {
$condition_string = $condition_string . ' AND ' . self :: condition ( true );
}
2018-06-07 08:03:12 +02:00
2018-07-20 14:19:26 +02:00
$param_string = DBA :: buildParameter ( $params );
2018-06-09 18:56:37 +02:00
$param_string = self :: addTablesToFields ( $param_string , $threadfields );
$param_string = self :: addTablesToFields ( $param_string , $fields );
2018-06-07 08:03:12 +02:00
2018-07-02 20:22:27 +02:00
$table = " `thread` " . self :: constructJoins ( $uid , $select_fields . $condition_string . $param_string , true , $usermode );
2018-06-07 08:03:12 +02:00
$sql = " SELECT " . $select_fields . " FROM " . $table . $condition_string . $param_string ;
2018-07-20 14:19:26 +02:00
return DBA :: p ( $sql , $condition );
2018-06-09 18:56:37 +02:00
}
2018-06-09 21:12:13 +02:00
/**
2020-01-19 07:05:23 +01:00
* Returns a list of fields that are associated with the item table
2018-06-09 21:12:13 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param $usermode
2018-06-09 21:12:13 +02:00
* @ return array field list
*/
2018-10-17 00:30:24 +02:00
private static function fieldlist ( $usermode )
2018-06-09 18:56:37 +02:00
{
2018-06-17 19:14:52 +02:00
$fields = [];
2020-04-15 07:28:54 +02:00
$fields [ 'item' ] = [ 'id' , 'uid' , 'parent' , 'uri' , 'parent-uri' , 'thr-parent' ,
2020-05-19 22:32:15 +02:00
'guid' , 'uri-id' , 'parent-uri-id' , 'thr-parent-id' , 'vid' ,
2018-06-17 23:35:33 +02:00
'contact-id' , 'owner-id' , 'author-id' , 'type' , 'wall' , 'gravity' , 'extid' ,
2018-10-18 23:35:48 +02:00
'created' , 'edited' , 'commented' , 'received' , 'changed' , 'psid' ,
2020-05-02 07:08:05 +02:00
'resource-id' , 'event-id' , 'attach' , 'post-type' , 'file' ,
2018-06-17 23:35:33 +02:00
'private' , 'pubmail' , 'moderated' , 'visible' , 'starred' , 'bookmark' ,
2018-06-25 06:56:32 +02:00
'unseen' , 'deleted' , 'origin' , 'forum_mode' , 'mention' , 'global' ,
2020-05-26 07:18:50 +02:00
'id' => 'item_id' , 'network' , 'icid' ,
2020-05-03 17:13:40 +02:00
'uri-id' => 'internal-uri-id' , 'uid' => 'internal-uid' ,
2020-05-18 23:34:57 +02:00
'network' => 'internal-network' , 'psid' => 'internal-psid' ];
2018-07-06 00:00:38 +02:00
2018-08-08 22:32:11 +02:00
if ( $usermode ) {
2020-01-05 10:10:03 +01:00
$fields [ 'user-item' ] = [ 'pinned' , 'notification-type' , 'ignored' => 'internal-user-ignored' ];
2018-08-08 22:32:11 +02:00
}
2018-06-30 07:18:43 +02:00
$fields [ 'item-content' ] = array_merge ( self :: CONTENT_FIELDLIST , self :: MIXED_CONTENT_FIELDLIST );
2018-06-25 06:56:32 +02:00
2020-05-02 21:34:02 +02:00
$fields [ 'post-delivery-data' ] = array_merge ( Post\DeliveryData :: LEGACY_FIELD_LIST , Post\DeliveryData :: FIELD_LIST );
2018-07-19 23:56:52 +02:00
2020-05-18 23:34:57 +02:00
$fields [ 'verb' ] = [ 'name' => 'internal-verb' ];
2018-07-26 01:14:55 +02:00
$fields [ 'permissionset' ] = [ 'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' ];
2019-01-28 22:22:03 +01:00
$fields [ 'author' ] = [ 'url' => 'author-link' , 'name' => 'author-name' , 'addr' => 'author-addr' ,
2018-07-02 07:41:55 +02:00
'thumb' => 'author-avatar' , 'nick' => 'author-nick' , 'network' => 'author-network' ];
2018-06-17 19:14:52 +02:00
2019-01-28 22:22:03 +01:00
$fields [ 'owner' ] = [ 'url' => 'owner-link' , 'name' => 'owner-name' , 'addr' => 'owner-addr' ,
2018-07-02 07:41:55 +02:00
'thumb' => 'owner-avatar' , 'nick' => 'owner-nick' , 'network' => 'owner-network' ];
2018-06-17 19:14:52 +02:00
$fields [ 'contact' ] = [ 'url' => 'contact-link' , 'name' => 'contact-name' , 'thumb' => 'contact-avatar' ,
2018-06-24 12:48:29 +02:00
'writable' , 'self' , 'id' => 'cid' , 'alias' , 'uid' => 'contact-uid' ,
'photo' , 'name-date' , 'uri-date' , 'avatar-date' , 'thumb' , 'dfrn-id' ];
2018-06-09 18:56:37 +02:00
2020-09-03 20:57:18 +02:00
$fields [ 'parent-item' ] = [ 'guid' => 'parent-guid' , 'network' => 'parent-network' , 'author-id' => 'parent-author-id' ];
2018-06-17 19:14:52 +02:00
2020-06-27 14:18:36 +02:00
$fields [ 'parent-item-author' ] = [ 'url' => 'parent-author-link' , 'name' => 'parent-author-name' ,
'network' => 'parent-author-network' ];
2018-06-17 19:14:52 +02:00
$fields [ 'event' ] = [ 'created' => 'event-created' , 'edited' => 'event-edited' ,
2018-06-09 18:56:37 +02:00
'start' => 'event-start' , 'finish' => 'event-finish' ,
'summary' => 'event-summary' , 'desc' => 'event-desc' ,
'location' => 'event-location' , 'type' => 'event-type' ,
'nofinish' => 'event-nofinish' , 'adjust' => 'event-adjust' ,
'ignore' => 'event-ignore' , 'id' => 'event-id' ];
2020-04-15 07:28:54 +02:00
$fields [ 'diaspora-interaction' ] = [ 'interaction' , 'interaction' => 'signed_text' ];
2018-10-15 23:42:55 +02:00
2018-06-15 07:50:28 +02:00
return $fields ;
2018-06-09 18:56:37 +02:00
}
2018-06-09 21:12:13 +02:00
/**
2020-01-19 07:05:23 +01:00
* Returns SQL condition for the " select " functions
2018-06-09 21:12:13 +02:00
*
* @ param boolean $thread_mode Called for the items ( false ) or for the threads ( true )
*
* @ return string SQL condition
*/
private static function condition ( $thread_mode )
2018-06-09 18:56:37 +02:00
{
2018-06-09 21:12:13 +02:00
if ( $thread_mode ) {
$master_table = " `thread` " ;
} else {
$master_table = " `item` " ;
}
2018-08-25 15:48:00 +02:00
return sprintf ( " $master_table .`visible` AND NOT $master_table .`deleted` AND NOT $master_table .`moderated`
AND ( `user-item` . `hidden` IS NULL OR NOT `user-item` . `hidden` )
AND ( `user-author` . `blocked` IS NULL OR NOT `user-author` . `blocked` )
AND ( `user-author` . `ignored` IS NULL OR NOT `user-author` . `ignored` OR `item` . `gravity` != % d )
AND ( `user-owner` . `blocked` IS NULL OR NOT `user-owner` . `blocked` )
AND ( `user-owner` . `ignored` IS NULL OR NOT `user-owner` . `ignored` OR `item` . `gravity` != % d ) " ,
GRAVITY_PARENT , GRAVITY_PARENT );
2018-06-09 18:56:37 +02:00
}
2018-06-09 21:12:13 +02:00
/**
2020-01-19 07:05:23 +01:00
* Returns all needed " JOIN " commands for the " select " functions
2018-06-09 21:12:13 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param integer $uid User ID
* @ param string $sql_commands The parts of the built SQL commands in the " select " functions
* @ param boolean $thread_mode Called for the items ( false ) or for the threads ( true )
2018-06-09 21:12:13 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param $user_mode
2018-06-09 21:12:13 +02:00
* @ return string The SQL joins for the " select " functions
*/
2018-07-02 20:22:27 +02:00
private static function constructJoins ( $uid , $sql_commands , $thread_mode , $user_mode )
2018-06-09 18:56:37 +02:00
{
if ( $thread_mode ) {
$master_table = " `thread` " ;
$master_table_key = " `thread`.`iid` " ;
$joins = " STRAIGHT_JOIN `item` ON `item`.`id` = `thread`.`iid` " ;
} else {
$master_table = " `item` " ;
$master_table_key = " `item`.`id` " ;
$joins = '' ;
}
2018-07-02 20:22:27 +02:00
if ( $user_mode ) {
$joins .= sprintf ( " STRAIGHT_JOIN `contact` ON `contact`.`id` = $master_table .`contact-id`
AND NOT `contact` . `blocked`
AND (( NOT `contact` . `readonly` AND NOT `contact` . `pending` AND ( `contact` . `rel` IN ( % s , % s )))
2018-07-15 20:36:20 +02:00
OR `contact` . `self` OR `item` . `gravity` != % d OR `contact` . `uid` = 0 )
2018-07-02 20:22:27 +02:00
STRAIGHT_JOIN `contact` AS `author` ON `author` . `id` = $master_table . `author-id` AND NOT `author` . `blocked`
STRAIGHT_JOIN `contact` AS `owner` ON `owner` . `id` = $master_table . `owner-id` AND NOT `owner` . `blocked`
2018-08-25 15:48:00 +02:00
LEFT JOIN `user-item` ON `user-item` . `iid` = $master_table_key AND `user-item` . `uid` = % d
LEFT JOIN `user-contact` AS `user-author` ON `user-author` . `cid` = $master_table . `author-id` AND `user-author` . `uid` = % d
LEFT JOIN `user-contact` AS `user-owner` ON `user-owner` . `cid` = $master_table . `owner-id` AND `user-owner` . `uid` = % d " ,
Contact :: SHARING , Contact :: FRIEND , GRAVITY_PARENT , intval ( $uid ), intval ( $uid ), intval ( $uid ));
2018-07-02 20:22:27 +02:00
} else {
if ( strpos ( $sql_commands , " `contact`. " ) !== false ) {
2018-07-15 20:36:20 +02:00
$joins .= " LEFT JOIN `contact` ON `contact`.`id` = $master_table .`contact-id` " ;
2018-07-02 20:22:27 +02:00
}
if ( strpos ( $sql_commands , " `author`. " ) !== false ) {
2018-07-15 20:36:20 +02:00
$joins .= " LEFT JOIN `contact` AS `author` ON `author`.`id` = $master_table .`author-id` " ;
2018-07-02 20:22:27 +02:00
}
if ( strpos ( $sql_commands , " `owner`. " ) !== false ) {
2018-07-15 20:36:20 +02:00
$joins .= " LEFT JOIN `contact` AS `owner` ON `owner`.`id` = $master_table .`owner-id` " ;
2018-07-02 20:22:27 +02:00
}
}
2018-06-09 18:56:37 +02:00
if ( strpos ( $sql_commands , " `group_member`. " ) !== false ) {
$joins .= " STRAIGHT_JOIN `group_member` ON `group_member`.`contact-id` = $master_table .`contact-id` " ;
}
if ( strpos ( $sql_commands , " `user`. " ) !== false ) {
$joins .= " STRAIGHT_JOIN `user` ON `user`.`uid` = $master_table .`uid` " ;
}
if ( strpos ( $sql_commands , " `event`. " ) !== false ) {
$joins .= " LEFT JOIN `event` ON `event-id` = `event`.`id` " ;
}
2018-10-15 23:42:55 +02:00
if ( strpos ( $sql_commands , " `diaspora-interaction`. " ) !== false ) {
$joins .= " LEFT JOIN `diaspora-interaction` ON `diaspora-interaction`.`uri-id` = `item`.`uri-id` " ;
}
2018-06-24 23:41:49 +02:00
if ( strpos ( $sql_commands , " `item-content`. " ) !== false ) {
2018-10-17 20:34:24 +02:00
$joins .= " LEFT JOIN `item-content` ON `item-content`.`uri-id` = `item`.`uri-id` " ;
2018-06-24 23:41:49 +02:00
}
2020-05-02 21:34:02 +02:00
if ( strpos ( $sql_commands , " `post-delivery-data`. " ) !== false ) {
$joins .= " LEFT JOIN `post-delivery-data` ON `post-delivery-data`.`uri-id` = `item`.`uri-id` AND `item`.`origin` " ;
2018-07-19 23:56:52 +02:00
}
2020-05-18 23:34:57 +02:00
if ( strpos ( $sql_commands , " `verb`. " ) !== false ) {
$joins .= " LEFT JOIN `verb` ON `verb`.`id` = `item`.`vid` " ;
}
2018-07-26 01:14:55 +02:00
if ( strpos ( $sql_commands , " `permissionset`. " ) !== false ) {
$joins .= " LEFT JOIN `permissionset` ON `permissionset`.`id` = `item`.`psid` " ;
}
2020-06-30 07:49:22 +02:00
if (( strpos ( $sql_commands , " `parent-item`. " ) !== false ) || ( strpos ( $sql_commands , " `parent-item-author`. " ) !== false )) {
2018-06-15 07:50:28 +02:00
$joins .= " STRAIGHT_JOIN `item` AS `parent-item` ON `parent-item`.`id` = `item`.`parent` " ;
2020-06-30 19:51:03 +02:00
if ( strpos ( $sql_commands , " `parent-item-author`. " ) !== false ) {
$joins .= " STRAIGHT_JOIN `contact` AS `parent-item-author` ON `parent-item-author`.`id` = `parent-item`.`author-id` " ;
}
2018-06-15 07:50:28 +02:00
}
2018-06-09 18:56:37 +02:00
return $joins ;
}
2018-06-09 21:12:13 +02:00
/**
2020-01-19 07:05:23 +01:00
* Add the field list for the " select " functions
2018-06-09 21:12:13 +02:00
*
* @ param array $fields The field definition array
* @ param array $selected The array with the selected fields from the " select " functions
*
* @ return string The field list
*/
2020-03-28 23:11:57 +01:00
private static function constructSelectFields ( array $fields , array $selected )
2018-06-09 18:56:37 +02:00
{
2020-03-29 14:29:57 +02:00
if ( ! empty ( $selected )) {
2020-05-18 23:34:57 +02:00
$selected = array_merge ( $selected , [ 'internal-uri-id' , 'internal-uid' , 'internal-psid' , 'internal-network' ]);
2020-03-29 14:29:57 +02:00
}
2018-06-30 15:54:01 +02:00
2018-07-06 00:00:38 +02:00
if ( in_array ( 'verb' , $selected )) {
2020-05-26 07:18:50 +02:00
$selected = array_merge ( $selected , [ 'internal-verb' ]);
2018-07-01 09:57:59 +02:00
}
2018-06-30 23:15:24 +02:00
2018-08-08 22:32:11 +02:00
if ( in_array ( 'ignored' , $selected )) {
$selected [] = 'internal-user-ignored' ;
}
2020-05-02 21:34:02 +02:00
$legacy_fields = array_merge ( Post\DeliveryData :: LEGACY_FIELD_LIST , self :: MIXED_CONTENT_FIELDLIST );
2018-12-12 05:21:22 +01:00
2018-06-09 18:56:37 +02:00
$selection = [];
foreach ( $fields as $table => $table_fields ) {
foreach ( $table_fields as $field => $select ) {
if ( empty ( $selected ) || in_array ( $select , $selected )) {
2018-07-19 23:56:52 +02:00
if ( self :: isLegacyMode () && in_array ( $select , $legacy_fields )) {
2018-07-06 00:00:38 +02:00
$selection [] = " `item`.` " . $select . " ` AS `internal-item- " . $select . " ` " ;
2018-06-24 23:41:49 +02:00
}
2018-06-09 18:56:37 +02:00
if ( is_int ( $field )) {
2018-06-24 23:41:49 +02:00
$selection [] = " ` " . $table . " `.` " . $select . " ` " ;
2018-06-09 18:56:37 +02:00
} else {
2018-06-24 23:41:49 +02:00
$selection [] = " ` " . $table . " `.` " . $field . " ` AS ` " . $select . " ` " ;
2018-06-09 18:56:37 +02:00
}
}
}
}
return implode ( " , " , $selection );
}
2018-06-09 21:12:13 +02:00
/**
2020-01-19 07:05:23 +01:00
* add table definition to fields in an SQL query
2018-06-09 21:12:13 +02:00
*
* @ param string $query SQL query
* @ param array $fields The field definition array
*
* @ return string the changed SQL query
*/
2018-06-09 18:56:37 +02:00
private static function addTablesToFields ( $query , $fields )
{
foreach ( $fields as $table => $table_fields ) {
foreach ( $table_fields as $alias => $field ) {
if ( is_int ( $alias )) {
$replace_field = $field ;
} else {
$replace_field = $alias ;
}
$search = " /([^ \ .])` " . $field . " `/i " ;
$replace = " $ 1` " . $table . " `.` " . $replace_field . " ` " ;
$query = preg_replace ( $search , $replace , $query );
}
}
return $query ;
2018-06-07 08:03:12 +02:00
}
2018-01-09 22:13:45 +01:00
/**
2020-01-19 07:05:23 +01:00
* Update existing item entries
2018-01-09 22:13:45 +01:00
*
2019-01-06 22:06:53 +01:00
* @ param array $fields The fields that are to be changed
2018-01-09 22:13:45 +01:00
* @ param array $condition The condition for finding the item entries
*
2018-01-09 23:16:16 +01:00
* In the future we may have to change permissions as well .
* Then we had to add the user id as third parameter .
*
* A return value of " 0 " doesn ' t mean an error - but that 0 rows had been changed .
*
* @ return integer | boolean number of affected rows - or " false " if there was an error
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-01-09 22:13:45 +01:00
*/
public static function update ( array $fields , array $condition )
{
if ( empty ( $condition ) || empty ( $fields )) {
return false ;
}
2018-05-08 19:50:06 +02:00
// To ensure the data integrity we do it in an transaction
2018-07-20 14:19:26 +02:00
DBA :: transaction ();
2018-05-08 19:50:06 +02:00
// We cannot simply expand the condition to check for origin entries
// The condition needn't to be a simple array but could be a complex condition.
// And we have to execute this query before the update to ensure to fetch the same data.
2020-05-26 07:18:50 +02:00
$items = DBA :: select ( 'item' , [ 'id' , 'origin' , 'uri' , 'uri-id' , 'icid' , 'uid' , 'file' ], $condition );
2018-05-08 19:50:06 +02:00
2018-06-25 01:09:13 +02:00
$content_fields = [];
2018-06-30 07:18:43 +02:00
foreach ( array_merge ( self :: CONTENT_FIELDLIST , self :: MIXED_CONTENT_FIELDLIST ) as $field ) {
2018-06-25 01:09:13 +02:00
if ( isset ( $fields [ $field ])) {
$content_fields [ $field ] = $fields [ $field ];
2018-07-15 20:36:20 +02:00
if ( in_array ( $field , self :: CONTENT_FIELDLIST ) || ! self :: isLegacyMode ()) {
2018-07-08 01:03:28 +02:00
unset ( $fields [ $field ]);
} else {
$fields [ $field ] = null ;
}
}
}
2020-05-02 21:34:02 +02:00
$delivery_data = Post\DeliveryData :: extractFields ( $fields );
2018-12-07 06:52:14 +01:00
$clear_fields = [ 'bookmark' , 'type' , 'author-name' , 'author-avatar' , 'author-link' , 'owner-name' , 'owner-avatar' , 'owner-link' , 'postopts' , 'inform' ];
2018-07-19 15:52:05 +02:00
foreach ( $clear_fields as $field ) {
2018-07-10 14:27:56 +02:00
if ( array_key_exists ( $field , $fields )) {
2018-07-08 01:03:28 +02:00
$fields [ $field ] = null ;
2018-06-25 01:09:13 +02:00
}
}
2018-01-09 22:13:45 +01:00
2018-06-30 23:15:24 +02:00
if ( array_key_exists ( 'file' , $fields )) {
$files = $fields [ 'file' ];
2018-07-10 14:27:56 +02:00
$fields [ 'file' ] = null ;
2018-06-30 23:15:24 +02:00
} else {
2018-11-17 16:04:54 +01:00
$files = null ;
2018-06-30 23:15:24 +02:00
}
2020-05-26 07:18:50 +02:00
if ( ! empty ( $content_fields [ 'verb' ])) {
$fields [ 'vid' ] = Verb :: getID ( $content_fields [ 'verb' ]);
}
2018-06-25 01:09:13 +02:00
if ( ! empty ( $fields )) {
2018-07-20 14:19:26 +02:00
$success = DBA :: update ( 'item' , $fields , $condition );
2018-06-25 01:09:13 +02:00
if ( ! $success ) {
2018-07-20 14:19:26 +02:00
DBA :: close ( $items );
DBA :: rollback ();
2018-06-25 01:09:13 +02:00
return false ;
}
2018-01-09 22:13:45 +01:00
}
2018-06-25 01:09:13 +02:00
// When there is no content for the "old" item table, this will count the fetched items
2018-07-21 03:58:15 +02:00
$rows = DBA :: affectedRows ();
2018-01-09 23:16:16 +01:00
2019-08-03 12:36:21 +02:00
$notify_items = [];
2018-07-20 14:19:26 +02:00
while ( $item = DBA :: fetch ( $items )) {
2020-05-26 07:18:50 +02:00
if ( empty ( $content_fields [ 'verb' ]) || ! in_array ( $content_fields [ 'verb' ], self :: ACTIVITIES )) {
2018-10-18 23:35:48 +02:00
self :: updateContent ( $content_fields , [ 'uri-id' => $item [ 'uri-id' ]]);
2018-07-06 00:00:38 +02:00
if ( empty ( $item [ 'icid' ])) {
2018-10-18 23:35:48 +02:00
$item_content = DBA :: selectFirst ( 'item-content' , [], [ 'uri-id' => $item [ 'uri-id' ]]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $item_content )) {
2018-07-06 00:00:38 +02:00
$item_fields = [ 'icid' => $item_content [ 'id' ]];
// Clear all fields in the item table that have a content in the item-content table
2020-05-26 07:18:50 +02:00
if ( self :: isLegacyMode ()) {
foreach ( $item_content as $field => $content ) {
if ( in_array ( $field , self :: MIXED_CONTENT_FIELDLIST ) && ! empty ( $content )) {
2018-07-15 20:36:20 +02:00
$item_fields [ $field ] = null ;
}
2018-07-06 00:00:38 +02:00
}
2018-07-01 21:02:29 +02:00
}
2018-07-20 14:19:26 +02:00
DBA :: update ( 'item' , $item_fields , [ 'id' => $item [ 'id' ]]);
2018-07-01 21:02:29 +02:00
}
}
}
2018-11-17 12:41:00 +01:00
if ( ! is_null ( $files )) {
2020-05-03 17:13:40 +02:00
Category :: storeTextByURIId ( $item [ 'uri-id' ], $item [ 'uid' ], $files );
2018-07-08 01:03:28 +02:00
if ( ! empty ( $item [ 'file' ])) {
2018-07-20 14:19:26 +02:00
DBA :: update ( 'item' , [ 'file' => '' ], [ 'id' => $item [ 'id' ]]);
2018-07-08 01:03:28 +02:00
}
2018-06-30 15:54:01 +02:00
}
2020-05-02 21:34:02 +02:00
Post\DeliveryData :: update ( $item [ 'uri-id' ], $delivery_data );
2018-07-19 23:56:52 +02:00
2018-02-05 13:47:06 +01:00
self :: updateThread ( $item [ 'id' ]);
2018-01-09 22:13:45 +01:00
2018-05-17 07:49:55 +02:00
// We only need to notfiy others when it is an original entry from us.
// Only call the notifier when the item has some content relevant change.
if ( $item [ 'origin' ] && in_array ( 'edited' , array_keys ( $fields ))) {
2019-08-03 12:36:21 +02:00
$notify_items [] = $item [ 'id' ];
2018-02-07 21:09:37 +01:00
}
2018-01-09 22:13:45 +01:00
}
2018-07-20 14:19:26 +02:00
DBA :: close ( $items );
DBA :: commit ();
2019-08-03 12:36:21 +02:00
foreach ( $notify_items as $notify_item ) {
Worker :: add ( PRIORITY_HIGH , " Notifier " , Delivery :: POST , $notify_item );
}
2018-01-09 23:16:16 +01:00
return $rows ;
2018-01-09 22:13:45 +01:00
}
2018-01-16 23:23:19 +01:00
2018-02-06 13:40:22 +01:00
/**
2020-01-19 07:05:23 +01:00
* Delete an item and notify others about it - if it was ours
2018-02-06 13:40:22 +01:00
*
2019-01-06 22:06:53 +01:00
* @ param array $condition The condition for finding the item entries
* @ param integer $priority Priority for the notification
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-02-06 13:40:22 +01:00
*/
2020-03-03 07:47:28 +01:00
public static function markForDeletion ( $condition , $priority = PRIORITY_HIGH )
2018-02-06 13:40:22 +01:00
{
2018-08-15 06:41:49 +02:00
$items = self :: select ([ 'id' ], $condition );
while ( $item = self :: fetch ( $items )) {
2020-03-03 07:47:28 +01:00
self :: markForDeletionById ( $item [ 'id' ], $priority );
2018-02-06 13:40:22 +01:00
}
2018-07-20 14:19:26 +02:00
DBA :: close ( $items );
2018-02-06 13:40:22 +01:00
}
2018-05-29 07:22:57 +02:00
/**
2020-01-19 07:05:23 +01:00
* Delete an item for an user and notify others about it - if it was ours
2018-05-29 07:22:57 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param array $condition The condition for finding the item entries
* @ param integer $uid User who wants to delete this item
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-05-29 07:22:57 +02:00
*/
public static function deleteForUser ( $condition , $uid )
{
if ( $uid == 0 ) {
return ;
}
2018-08-15 06:41:49 +02:00
$items = self :: select ([ 'id' , 'uid' ], $condition );
while ( $item = self :: fetch ( $items )) {
2018-05-29 07:22:57 +02:00
// "Deleting" global items just means hiding them
if ( $item [ 'uid' ] == 0 ) {
2018-07-20 14:19:26 +02:00
DBA :: update ( 'user-item' , [ 'hidden' => true ], [ 'iid' => $item [ 'id' ], 'uid' => $uid ], true );
2019-12-10 07:21:18 +01:00
// Delete notifications
DBA :: delete ( 'notify' , [ 'iid' => $item [ 'id' ], 'uid' => $uid ]);
2018-05-29 07:22:57 +02:00
} elseif ( $item [ 'uid' ] == $uid ) {
2020-03-03 07:47:28 +01:00
self :: markForDeletionById ( $item [ 'id' ], PRIORITY_HIGH );
2018-05-29 07:22:57 +02:00
} else {
2018-10-29 22:20:46 +01:00
Logger :: log ( 'Wrong ownership. Not deleting item ' . $item [ 'id' ]);
2018-05-29 07:22:57 +02:00
}
2018-02-06 13:40:22 +01:00
}
2018-07-20 14:19:26 +02:00
DBA :: close ( $items );
2018-02-06 13:40:22 +01:00
}
2018-01-18 00:22:01 +01:00
/**
2020-03-03 07:47:28 +01:00
* Mark an item for deletion , delete related data and notify others about it - if it was ours
2018-01-18 00:22:01 +01:00
*
2020-03-03 07:47:28 +01:00
* @ param integer $item_id
2018-02-06 13:40:22 +01:00
* @ param integer $priority Priority for the notification
2018-01-18 00:22:01 +01:00
*
2018-03-17 02:45:02 +01:00
* @ return boolean success
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-01-18 00:22:01 +01:00
*/
2020-03-03 07:47:28 +01:00
public static function markForDeletionById ( $item_id , $priority = PRIORITY_HIGH )
2018-01-17 00:16:53 +01:00
{
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Mark item for deletion by id' , [ 'id' => $item_id , 'callstack' => System :: callstack ()]);
2018-01-17 00:16:53 +01:00
// locate item to be deleted
2020-05-03 17:13:40 +02:00
$fields = [ 'id' , 'uri' , 'uri-id' , 'uid' , 'parent' , 'parent-uri' , 'origin' ,
2018-05-15 17:51:58 +02:00
'deleted' , 'file' , 'resource-id' , 'event-id' , 'attach' ,
2018-07-29 05:54:34 +02:00
'verb' , 'object-type' , 'object' , 'target' , 'contact-id' ,
2020-05-27 14:19:06 +02:00
'icid' , 'psid' , 'gravity' ];
2018-06-30 23:15:24 +02:00
$item = self :: selectFirst ( $fields , [ 'id' => $item_id ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Item not found.' , [ 'id' => $item_id ]);
2018-01-17 00:16:53 +01:00
return false ;
}
if ( $item [ 'deleted' ]) {
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Item has already been marked for deletion.' , [ 'id' => $item_id ]);
2018-01-17 00:16:53 +01:00
return false ;
}
2018-06-30 23:15:24 +02:00
$parent = self :: selectFirst ([ 'origin' ], [ 'id' => $item [ 'parent' ]]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $parent )) {
2018-01-18 00:22:01 +01:00
$parent = [ 'origin' => false ];
}
2018-01-17 00:16:53 +01:00
// clean up categories and tags so they don't end up as orphans
2020-05-30 00:19:59 +02:00
$matches = [];
2018-01-17 00:16:53 +01:00
$cnt = preg_match_all ( '/<(.*?)>/' , $item [ 'file' ], $matches , PREG_SET_ORDER );
2018-10-30 19:51:45 +01:00
2018-11-15 07:36:06 +01:00
if ( $cnt ) {
foreach ( $matches as $mtch ) {
2018-10-30 19:51:45 +01:00
FileTag :: unsaveFile ( $item [ 'uid' ], $item [ 'id' ], $mtch [ 1 ], true );
2018-01-17 00:16:53 +01:00
}
}
2020-05-30 00:19:59 +02:00
$matches = [];
2018-01-17 00:16:53 +01:00
$cnt = preg_match_all ( '/\[(.*?)\]/' , $item [ 'file' ], $matches , PREG_SET_ORDER );
2018-10-30 19:51:45 +01:00
2018-11-15 07:36:06 +01:00
if ( $cnt ) {
foreach ( $matches as $mtch ) {
2018-10-30 19:51:45 +01:00
FileTag :: unsaveFile ( $item [ 'uid' ], $item [ 'id' ], $mtch [ 1 ], false );
2018-01-17 00:16:53 +01:00
}
}
2018-01-17 08:08:49 +01:00
/*
* If item is a link to a photo resource , nuke all the associated photos
* ( visitors will not have photo resources )
* This only applies to photos uploaded from the photos page . Photos inserted into a post do not
* generate a resource - id and therefore aren ' t intimately linked to the item .
*/
2019-01-02 16:37:55 +01:00
/// @TODO: this should first check if photo is used elsewhere
2018-01-17 00:16:53 +01:00
if ( strlen ( $item [ 'resource-id' ])) {
2018-12-11 20:03:29 +01:00
Photo :: delete ([ 'resource-id' => $item [ 'resource-id' ], 'uid' => $item [ 'uid' ]]);
2018-01-17 00:16:53 +01:00
}
2018-02-06 13:40:22 +01:00
// If item is a link to an event, delete the event.
2018-01-17 00:16:53 +01:00
if ( intval ( $item [ 'event-id' ])) {
2018-03-17 02:45:02 +01:00
Event :: delete ( $item [ 'event-id' ]);
2018-01-17 00:16:53 +01:00
}
// If item has attachments, drop them
2019-01-02 16:37:55 +01:00
/// @TODO: this should first check if attachment is used elsewhere
foreach ( explode ( " , " , $item [ 'attach' ]) as $attach ) {
2018-01-17 00:16:53 +01:00
preg_match ( " |attach/( \ d+)| " , $attach , $matches );
2018-07-01 20:46:45 +02:00
if ( is_array ( $matches ) && count ( $matches ) > 1 ) {
2019-01-02 16:17:29 +01:00
Attach :: delete ([ 'id' => $matches [ 1 ], 'uid' => $item [ 'uid' ]]);
2018-07-01 20:46:45 +02:00
}
2018-01-17 00:16:53 +01:00
}
2019-12-10 07:21:18 +01:00
// Delete notifications
DBA :: delete ( 'notify' , [ 'iid' => $item [ 'id' ], 'uid' => $item [ 'uid' ]]);
2018-01-20 23:16:43 +01:00
// Set the item to "deleted"
2018-07-29 05:54:34 +02:00
$item_fields = [ 'deleted' => true , 'edited' => DateTimeFormat :: utcNow (), 'changed' => DateTimeFormat :: utcNow ()];
2018-07-20 14:19:26 +02:00
DBA :: update ( 'item' , $item_fields , [ 'id' => $item [ 'id' ]]);
2018-01-20 23:16:43 +01:00
2020-05-03 17:13:40 +02:00
Category :: storeTextByURIId ( $item [ 'uri-id' ], $item [ 'uid' ], '' );
2018-02-05 13:47:06 +01:00
self :: deleteThread ( $item [ 'id' ], $item [ 'parent-uri' ]);
2018-01-20 23:16:43 +01:00
2018-06-27 21:37:13 +02:00
if ( ! self :: exists ([ " `uri` = ? AND `uid` != 0 AND NOT `deleted` " , $item [ 'uri' ]])) {
2020-03-03 07:47:28 +01:00
self :: markForDeletion ([ 'uri' => $item [ 'uri' ], 'uid' => 0 , 'deleted' => false ], $priority );
2018-05-15 18:40:13 +02:00
}
2020-05-02 21:34:02 +02:00
Post\DeliveryData :: delete ( $item [ 'uri-id' ]);
2018-07-19 23:56:52 +02:00
2018-08-15 06:41:49 +02:00
if ( ! empty ( $item [ 'icid' ]) && ! self :: exists ([ 'icid' => $item [ 'icid' ], 'deleted' => false ])) {
2018-08-05 06:35:11 +02:00
DBA :: delete ( 'item-content' , [ 'id' => $item [ 'icid' ]], [ 'cascade' => false ]);
2018-07-29 05:54:34 +02:00
}
// When the permission set will be used in photo and events as well,
// this query here needs to be extended.
2019-06-23 12:01:14 +02:00
// @todo Currently deactivated. We need the permission set in the deletion process.
2019-06-23 08:41:49 +02:00
// This is a reminder to add the removal somewhere else.
//if (!empty($item['psid']) && !self::exists(['psid' => $item['psid'], 'deleted' => false])) {
// DBA::delete('permissionset', ['id' => $item['psid']], ['cascade' => false]);
//}
2018-07-29 05:54:34 +02:00
2018-01-20 23:16:43 +01:00
// If it's the parent of a comment thread, kill all the kids
2020-05-27 14:19:06 +02:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
2020-03-03 07:47:28 +01:00
self :: markForDeletion ([ 'parent' => $item [ 'parent' ], 'deleted' => false ], $priority );
2018-01-20 23:16:43 +01:00
}
2018-01-17 00:16:53 +01:00
2018-05-15 17:51:58 +02:00
// Is it our comment and/or our thread?
2018-01-20 23:16:43 +01:00
if ( $item [ 'origin' ] || $parent [ 'origin' ]) {
2018-05-15 17:51:58 +02:00
// When we delete the original post we will delete all existing copies on the server as well
2020-03-03 07:47:28 +01:00
self :: markForDeletion ([ 'uri' => $item [ 'uri' ], 'deleted' => false ], $priority );
2018-05-15 17:51:58 +02:00
// send the notification upstream/downstream
2019-06-10 16:19:24 +02:00
Worker :: add ([ 'priority' => $priority , 'dont_fork' => true ], " Notifier " , Delivery :: DELETION , intval ( $item [ 'id' ]));
2018-05-26 20:07:27 +02:00
} elseif ( $item [ 'uid' ] != 0 ) {
2018-05-26 22:07:30 +02:00
// When we delete just our local user copy of an item, we have to set a marker to hide it
2018-06-30 23:15:24 +02:00
$global_item = self :: selectFirst ([ 'id' ], [ 'uri' => $item [ 'uri' ], 'uid' => 0 , 'deleted' => false ]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $global_item )) {
2018-07-20 14:19:26 +02:00
DBA :: update ( 'user-item' , [ 'hidden' => true ], [ 'iid' => $global_item [ 'id' ], 'uid' => $item [ 'uid' ]], true );
2018-05-26 20:07:27 +02:00
}
2018-01-17 00:16:53 +01:00
}
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Item has been marked for deletion.' , [ 'id' => $item_id ]);
2018-05-15 19:50:29 +02:00
2018-01-17 00:16:53 +01:00
return true ;
}
2018-02-06 13:40:22 +01:00
2018-02-21 22:39:07 +01:00
private static function guid ( $item , $notify )
2018-02-21 05:13:13 +01:00
{
2018-07-08 11:37:05 +02:00
if ( ! empty ( $item [ 'guid' ])) {
2018-11-09 19:29:42 +01:00
return Strings :: escapeTags ( trim ( $item [ 'guid' ]));
2018-02-21 05:13:13 +01:00
}
if ( $notify ) {
// We have to avoid duplicates. So we create the GUID in form of a hash of the plink or uri.
// We add the hash of our own host because our host is the original creator of the post.
2019-12-16 00:47:24 +01:00
$prefix_host = DI :: baseUrl () -> getHostname ();
2018-02-21 05:13:13 +01:00
} else {
$prefix_host = '' ;
// We are only storing the post so we create a GUID from the original hostname.
2018-02-21 22:39:07 +01:00
if ( ! empty ( $item [ 'author-link' ])) {
$parsed = parse_url ( $item [ 'author-link' ]);
2018-02-21 05:13:13 +01:00
if ( ! empty ( $parsed [ 'host' ])) {
$prefix_host = $parsed [ 'host' ];
}
}
2018-02-21 22:39:07 +01:00
if ( empty ( $prefix_host ) && ! empty ( $item [ 'plink' ])) {
$parsed = parse_url ( $item [ 'plink' ]);
2018-02-21 05:13:13 +01:00
if ( ! empty ( $parsed [ 'host' ])) {
$prefix_host = $parsed [ 'host' ];
}
}
2018-02-21 22:39:07 +01:00
if ( empty ( $prefix_host ) && ! empty ( $item [ 'uri' ])) {
$parsed = parse_url ( $item [ 'uri' ]);
2018-02-21 05:13:13 +01:00
if ( ! empty ( $parsed [ 'host' ])) {
$prefix_host = $parsed [ 'host' ];
}
}
2018-02-26 12:48:05 +01:00
// Is it in the format data@host.tld? - Used for mail contacts
if ( empty ( $prefix_host ) && ! empty ( $item [ 'author-link' ]) && strstr ( $item [ 'author-link' ], '@' )) {
$mailparts = explode ( '@' , $item [ 'author-link' ]);
$prefix_host = array_pop ( $mailparts );
}
2018-02-21 05:13:13 +01:00
}
2018-02-21 22:39:07 +01:00
if ( ! empty ( $item [ 'plink' ])) {
$guid = self :: guidFromUri ( $item [ 'plink' ], $prefix_host );
} elseif ( ! empty ( $item [ 'uri' ])) {
$guid = self :: guidFromUri ( $item [ 'uri' ], $prefix_host );
2018-02-21 05:13:13 +01:00
} else {
2018-09-27 13:52:15 +02:00
$guid = System :: createUUID ( hash ( 'crc32' , $prefix_host ));
2018-02-21 05:13:13 +01:00
}
return $guid ;
}
2018-02-21 22:39:07 +01:00
private static function contactId ( $item )
2018-02-21 22:08:37 +01:00
{
2019-08-02 18:46:26 +02:00
if ( ! empty ( $item [ 'contact-id' ]) && DBA :: exists ( 'contact' , [ 'self' => true , 'id' => $item [ 'contact-id' ]])) {
return $item [ 'contact-id' ];
2019-08-13 17:54:47 +02:00
} elseif (( $item [ 'gravity' ] == GRAVITY_PARENT ) && ! empty ( $item [ 'uid' ]) && ! empty ( $item [ 'contact-id' ]) && Contact :: isSharing ( $item [ 'contact-id' ], $item [ 'uid' ])) {
return $item [ 'contact-id' ];
2019-08-02 18:46:26 +02:00
} elseif ( ! empty ( $item [ 'uid' ]) && ! Contact :: isSharing ( $item [ 'author-id' ], $item [ 'uid' ])) {
2019-07-31 00:02:32 +02:00
return $item [ 'author-id' ];
} elseif ( ! empty ( $item [ 'contact-id' ])) {
return $item [ 'contact-id' ];
} else {
2018-02-22 08:05:56 +01:00
$contact_id = Contact :: getIdForURL ( $item [ 'author-link' ], $item [ 'uid' ]);
2019-07-31 00:02:32 +02:00
if ( ! empty ( $contact_id )) {
return $contact_id ;
2018-02-21 22:08:37 +01:00
}
}
2019-07-31 00:02:32 +02:00
return $item [ 'author-id' ];
2018-02-21 22:08:37 +01:00
}
2018-07-20 20:07:54 +02:00
// This function will finally cover most of the preparation functionality in mod/item.php
public static function prepare ( & $item )
{
2019-01-07 18:09:10 +01:00
/*
* @ TODO : Unused code triggering inspection errors
*
2018-07-20 20:07:54 +02:00
$data = BBCode :: getAttachmentData ( $item [ 'body' ]);
if (( preg_match_all ( " / \ [bookmark \ =([^ \ ]]*) \ ](.*?) \ [ \ /bookmark \ ]/ism " , $item [ 'body' ], $match , PREG_SET_ORDER ) || isset ( $data [ " type " ]))
&& ( $posttype != Item :: PT_PERSONAL_NOTE )) {
$posttype = Item :: PT_PAGE ;
$objecttype = ACTIVITY_OBJ_BOOKMARK ;
}
2019-01-07 18:09:10 +01:00
*/
2018-07-20 20:07:54 +02:00
}
2019-07-31 18:07:50 +02:00
/**
* Write an item array into a spool file to be inserted later .
* This command is called whenever there are issues storing an item .
*
* @ param array $item The item fields that are to be inserted
* @ throws \Exception
*/
2019-07-31 16:09:27 +02:00
private static function spool ( $orig_item )
{
// Now we store the data in the spool directory
// We use "microtime" to keep the arrival order and "mt_rand" to avoid duplicates
$file = 'item-' . round ( microtime ( true ) * 10000 ) . '-' . mt_rand () . '.msg' ;
$spoolpath = get_spoolpath ();
if ( $spoolpath != " " ) {
$spool = $spoolpath . '/' . $file ;
file_put_contents ( $spool , json_encode ( $orig_item ));
Logger :: warning ( " Item wasn't stored - Item was spooled into file " , [ 'file' => $file ]);
}
}
2020-05-13 21:26:59 +02:00
/**
* Check if the item array is a duplicate
*
* @ param array $item
* @ return boolean is it a duplicate ?
*/
private static function isDuplicate ( array $item )
2018-01-28 12:18:08 +01:00
{
2020-05-12 22:13:48 +02:00
// Checking if there is already an item with the same guid
$condition = [ 'guid' => $item [ 'guid' ], 'network' => $item [ 'network' ], 'uid' => $item [ 'uid' ]];
if ( self :: exists ( $condition )) {
Logger :: notice ( 'Found already existing item' , [
'guid' => $item [ 'guid' ],
'uid' => $item [ 'uid' ],
'network' => $item [ 'network' ]
]);
return true ;
2018-01-28 12:18:08 +01:00
}
2020-05-12 22:13:48 +02:00
$condition = [ " `uri` = ? AND `network` IN (?, ?) AND `uid` = ? " ,
$item [ 'uri' ], $item [ 'network' ], Protocol :: DFRN , $item [ 'uid' ]];
if ( self :: exists ( $condition )) {
Logger :: notice ( 'duplicated item with the same uri found.' , $item );
return true ;
2018-05-15 06:33:28 +02:00
}
2020-05-12 22:13:48 +02:00
// On Friendica and Diaspora the GUID is unique
if ( in_array ( $item [ 'network' ], [ Protocol :: DFRN , Protocol :: DIASPORA ])) {
$condition = [ 'guid' => $item [ 'guid' ], 'uid' => $item [ 'uid' ]];
if ( self :: exists ( $condition )) {
Logger :: notice ( 'duplicated item with the same guid found.' , $item );
return true ;
}
} elseif ( $item [ 'network' ] == Protocol :: OSTATUS ) {
// Check for an existing post with the same content. There seems to be a problem with OStatus.
$condition = [ " `body` = ? AND `network` = ? AND `created` = ? AND `contact-id` = ? AND `uid` = ? " ,
$item [ 'body' ], $item [ 'network' ], $item [ 'created' ], $item [ 'contact-id' ], $item [ 'uid' ]];
if ( self :: exists ( $condition )) {
Logger :: notice ( 'duplicated item with the same body found.' , $item );
return true ;
2018-01-28 12:18:08 +01:00
}
}
2020-05-12 22:13:48 +02:00
/*
* Check for already added items .
* There is a timing issue here that sometimes creates double postings .
* An unique index would help - but the limitations of MySQL ( maximum size of index values ) prevent this .
*/
2020-05-14 05:48:26 +02:00
if (( $item [ 'uid' ] == 0 ) && self :: exists ([ 'uri' => trim ( $item [ 'uri' ]), 'uid' => 0 ])) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Global item already stored.' , [ 'uri' => $item [ 'uri' ], 'network' => $item [ 'network' ]]);
return true ;
2018-03-22 17:18:49 +01:00
}
2020-05-12 22:13:48 +02:00
return false ;
}
2019-10-23 02:05:11 +02:00
2020-05-13 21:26:59 +02:00
/**
* Check if the item array is valid
*
* @ param array $item
* @ return boolean item is valid
*/
2020-08-15 22:05:08 +02:00
public static function isValid ( array $item )
2020-05-12 22:13:48 +02:00
{
// When there is no content then we don't post it
if ( $item [ 'body' ] . $item [ 'title' ] == '' ) {
Logger :: notice ( 'No body, no title.' );
return false ;
2018-01-28 12:18:08 +01:00
}
// check for create date and expire time
2020-01-19 21:21:13 +01:00
$expire_interval = DI :: config () -> get ( 'system' , 'dbclean-expire-days' , 0 );
2018-01-28 12:18:08 +01:00
2020-05-12 22:13:48 +02:00
$user = DBA :: selectFirst ( 'user' , [ 'expire' ], [ 'uid' => $item [ 'uid' ]]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $user ) && ( $user [ 'expire' ] > 0 ) && (( $user [ 'expire' ] < $expire_interval ) || ( $expire_interval == 0 ))) {
2018-01-28 12:18:08 +01:00
$expire_interval = $user [ 'expire' ];
}
2018-02-21 22:39:07 +01:00
if (( $expire_interval > 0 ) && ! empty ( $item [ 'created' ])) {
2018-01-28 12:18:08 +01:00
$expire_date = time () - ( $expire_interval * 86400 );
2018-02-21 22:39:07 +01:00
$created_date = strtotime ( $item [ 'created' ]);
2018-01-28 12:18:08 +01:00
if ( $created_date < $expire_date ) {
2019-02-23 15:25:21 +01:00
Logger :: notice ( 'Item created before expiration interval.' , [
'created' => date ( 'c' , $created_date ),
'expired' => date ( 'c' , $expire_date ),
'$item' => $item
]);
2020-05-12 22:13:48 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
}
2020-08-15 22:05:08 +02:00
if ( ! empty ( $item [ 'author-id' ]) && Contact :: isBlocked ( $item [ 'author-id' ])) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Author is blocked node-wide' , [ 'author-link' => $item [ 'author-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
if ( ! empty ( $item [ 'author-link' ]) && Network :: isUrlBlocked ( $item [ 'author-link' ])) {
Logger :: notice ( 'Author server is blocked' , [ 'author-link' => $item [ 'author-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
2020-08-15 22:05:08 +02:00
if ( ! empty ( $item [ 'uid' ]) && ! empty ( $item [ 'author-id' ]) && Contact\User :: isBlocked ( $item [ 'author-id' ], $item [ 'uid' ])) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Author is blocked by user' , [ 'author-link' => $item [ 'author-link' ], 'uid' => $item [ 'uid' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
2020-08-15 22:05:08 +02:00
if ( ! empty ( $item [ 'owner-id' ]) && Contact :: isBlocked ( $item [ 'owner-id' ])) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Owner is blocked node-wide' , [ 'owner-link' => $item [ 'owner-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
if ( ! empty ( $item [ 'owner-link' ]) && Network :: isUrlBlocked ( $item [ 'owner-link' ])) {
Logger :: notice ( 'Owner server is blocked' , [ 'owner-link' => $item [ 'owner-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
2020-08-15 22:05:08 +02:00
if ( ! empty ( $item [ 'uid' ]) && ! empty ( $item [ 'owner-id' ]) && Contact\User :: isBlocked ( $item [ 'owner-id' ], $item [ 'uid' ])) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Owner is blocked by user' , [ 'owner-link' => $item [ 'owner-link' ], 'uid' => $item [ 'uid' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
// The causer is set during a thread completion, for example because of a reshare. It countains the responsible actor.
2020-08-04 06:47:02 +02:00
if ( ! empty ( $item [ 'uid' ]) && ! empty ( $item [ 'causer-id' ]) && Contact\User :: isBlocked ( $item [ 'causer-id' ], $item [ 'uid' ])) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Causer is blocked by user' , [ 'causer-link' => $item [ 'causer-link' ], 'uid' => $item [ 'uid' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
2020-08-04 06:47:02 +02:00
if ( ! empty ( $item [ 'uid' ]) && ! empty ( $item [ 'causer-id' ]) && ( $item [ 'parent-uri' ] == $item [ 'uri' ]) && Contact\User :: isIgnored ( $item [ 'causer-id' ], $item [ 'uid' ])) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Causer is ignored by user' , [ 'causer-link' => $item [ 'causer-link' ], 'uid' => $item [ 'uid' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
if ( $item [ 'verb' ] == Activity :: FOLLOW ) {
if ( ! $item [ 'origin' ] && ( $item [ 'author-id' ] == Contact :: getPublicIdByUserId ( $item [ 'uid' ]))) {
// Our own follow request can be relayed to us. We don't store it to avoid notification chaos.
2020-05-13 07:48:26 +02:00
Logger :: info ( " Follow: Don't store not origin follow request " , [ 'parent-uri' => $item [ 'parent-uri' ]]);
2020-05-12 22:13:48 +02:00
return false ;
}
$condition = [ 'verb' => Activity :: FOLLOW , 'uid' => $item [ 'uid' ],
'parent-uri' => $item [ 'parent-uri' ], 'author-id' => $item [ 'author-id' ]];
if ( self :: exists ( $condition )) {
// It happens that we receive multiple follow requests by the same author - we only store one.
2020-05-13 07:48:26 +02:00
Logger :: info ( 'Follow: Found existing follow request from author' , [ 'author-id' => $item [ 'author-id' ], 'parent-uri' => $item [ 'parent-uri' ]]);
2020-05-12 22:13:48 +02:00
return false ;
}
}
return true ;
}
2020-05-13 21:26:59 +02:00
/**
2020-05-14 05:48:26 +02:00
* Return the id of the given item array if it has been stored before
2020-05-13 21:26:59 +02:00
*
* @ param array $item
* @ return integer item id
*/
private static function getDuplicateID ( array $item )
2020-05-12 22:13:48 +02:00
{
2019-07-02 00:14:34 +02:00
if ( empty ( $item [ 'network' ]) || in_array ( $item [ 'network' ], Protocol :: FEDERATED )) {
2019-09-10 06:59:12 +02:00
$condition = [ " `uri` = ? AND `uid` = ? AND `network` IN (?, ?, ?, ?) " ,
2018-02-21 22:39:07 +01:00
trim ( $item [ 'uri' ]), $item [ 'uid' ],
2019-09-10 06:59:12 +02:00
Protocol :: ACTIVITYPUB , Protocol :: DIASPORA , Protocol :: DFRN , Protocol :: OSTATUS ];
2018-06-30 23:15:24 +02:00
$existing = self :: selectFirst ([ 'id' , 'network' ], $condition );
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $existing )) {
2018-01-28 12:18:08 +01:00
// We only log the entries with a different user id than 0. Otherwise we would have too many false positives
2020-05-12 22:13:48 +02:00
if ( $item [ 'uid' ] != 0 ) {
2019-02-23 15:25:21 +01:00
Logger :: notice ( 'Item already existed for user' , [
'uri' => $item [ 'uri' ],
2020-05-12 22:13:48 +02:00
'uid' => $item [ 'uid' ],
2019-02-23 15:25:21 +01:00
'network' => $item [ 'network' ],
'existing_id' => $existing [ " id " ],
'existing_network' => $existing [ " network " ]
]);
2018-01-28 12:18:08 +01:00
}
2018-02-21 23:55:23 +01:00
return $existing [ " id " ];
2018-01-28 12:18:08 +01:00
}
}
2020-05-12 22:13:48 +02:00
return 0 ;
}
2020-05-13 21:26:59 +02:00
/**
* Fetch parent data for the given item array
*
* @ param array $item
* @ return array item array with parent data
*/
private static function getParentData ( array $item )
2020-05-12 22:13:48 +02:00
{
// find the parent and snarf the item id and ACLs
// and anything else we need to inherit
$fields = [ 'uri' , 'parent-uri' , 'id' , 'deleted' ,
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' ,
'wall' , 'private' , 'forum_mode' , 'origin' , 'author-id' ];
$condition = [ 'uri' => $item [ 'parent-uri' ], 'uid' => $item [ 'uid' ]];
$params = [ 'order' => [ 'id' => false ]];
$parent = self :: selectFirst ( $fields , $condition , $params );
if ( ! DBA :: isResult ( $parent )) {
Logger :: info ( 'item parent was not found - ignoring item' , [ 'parent-uri' => $item [ 'parent-uri' ], 'uid' => $item [ 'uid' ]]);
return [];
} else {
// is the new message multi-level threaded?
// even though we don't support it now, preserve the info
// and re-attach to the conversation parent.
if ( $parent [ 'uri' ] != $parent [ 'parent-uri' ]) {
$item [ 'parent-uri' ] = $parent [ 'parent-uri' ];
$condition = [ 'uri' => $item [ 'parent-uri' ],
'parent-uri' => $item [ 'parent-uri' ],
'uid' => $item [ 'uid' ]];
$params = [ 'order' => [ 'id' => false ]];
$toplevel_parent = self :: selectFirst ( $fields , $condition , $params );
if ( DBA :: isResult ( $toplevel_parent )) {
$parent = $toplevel_parent ;
}
}
2020-05-27 14:19:06 +02:00
$item [ 'parent' ] = $parent [ 'id' ];
2020-05-12 22:13:48 +02:00
$item [ " deleted " ] = $parent [ 'deleted' ];
$item [ " allow_cid " ] = $parent [ 'allow_cid' ];
$item [ 'allow_gid' ] = $parent [ 'allow_gid' ];
$item [ 'deny_cid' ] = $parent [ 'deny_cid' ];
$item [ 'deny_gid' ] = $parent [ 'deny_gid' ];
$item [ 'parent_origin' ] = $parent [ 'origin' ];
// Don't federate received participation messages
if ( $item [ 'verb' ] != Activity :: FOLLOW ) {
$item [ 'wall' ] = $parent [ 'wall' ];
} else {
$item [ 'wall' ] = false ;
}
/*
* If the parent is private , force privacy for the entire conversation
* This differs from the above settings as it subtly allows comments from
* email correspondents to be private even if the overall thread is not .
*/
if ( $parent [ 'private' ]) {
$item [ 'private' ] = $parent [ 'private' ];
}
/*
* Edge case . We host a public forum that was originally posted to privately .
* The original author commented , but as this is a comment , the permissions
* weren ' t fixed up so it will still show the comment as private unless we fix it here .
*/
if (( intval ( $parent [ 'forum_mode' ]) == 1 ) && ( $parent [ 'private' ] != self :: PUBLIC )) {
$item [ 'private' ] = self :: PUBLIC ;
}
// If its a post that originated here then tag the thread as "mention"
if ( $item [ 'origin' ] && $item [ 'uid' ]) {
2020-05-27 14:19:06 +02:00
DBA :: update ( 'thread' , [ 'mention' => true ], [ 'iid' => $item [ 'parent' ]]);
Logger :: info ( 'tagged thread as mention' , [ 'parent' => $item [ 'parent' ], 'uid' => $item [ 'uid' ]]);
2020-05-12 22:13:48 +02:00
}
// Update the contact relations
2020-08-03 19:10:49 +02:00
Contact\Relation :: store ( $parent [ 'author-id' ], $item [ 'author-id' ], $item [ 'created' ]);
2020-05-12 22:13:48 +02:00
}
return $item ;
}
2020-05-13 21:26:59 +02:00
/**
* Get the gravity for the given item array
*
* @ param array $item
* @ return integer gravity
*/
private static function getGravity ( array $item )
2020-05-12 22:13:48 +02:00
{
$activity = DI :: activity ();
if ( isset ( $item [ 'gravity' ])) {
return intval ( $item [ 'gravity' ]);
} elseif ( $item [ 'parent-uri' ] === $item [ 'uri' ]) {
return GRAVITY_PARENT ;
} elseif ( $activity -> match ( $item [ 'verb' ], Activity :: POST )) {
return GRAVITY_COMMENT ;
} elseif ( $activity -> match ( $item [ 'verb' ], Activity :: FOLLOW )) {
return GRAVITY_ACTIVITY ;
2020-08-09 20:42:25 +02:00
} elseif ( $activity -> match ( $item [ 'verb' ], Activity :: ANNOUNCE )) {
return GRAVITY_ACTIVITY ;
2020-05-12 22:13:48 +02:00
}
Logger :: info ( 'Unknown gravity for verb' , [ 'verb' => $item [ 'verb' ]]);
return GRAVITY_UNKNOWN ; // Should not happen
}
2020-05-12 23:49:12 +02:00
public static function insert ( $item , $notify = false , $dontcache = false )
2020-05-12 22:13:48 +02:00
{
2020-07-19 03:40:40 +02:00
$structure = self :: getItemFields ();
2020-05-12 22:13:48 +02:00
$orig_item = $item ;
$priority = PRIORITY_HIGH ;
// If it is a posting where users should get notifications, then define it as wall posting
if ( $notify ) {
$item [ 'wall' ] = 1 ;
$item [ 'origin' ] = 1 ;
$item [ 'network' ] = Protocol :: DFRN ;
$item [ 'protocol' ] = Conversation :: PARCEL_DFRN ;
if ( is_int ( $notify )) {
$priority = $notify ;
}
} else {
$item [ 'network' ] = trim (( $item [ 'network' ] ? ? '' ) ? : Protocol :: PHANTOM );
}
$uid = intval ( $item [ 'uid' ]);
$item [ 'guid' ] = self :: guid ( $item , $notify );
$item [ 'uri' ] = substr ( Strings :: escapeTags ( trim (( $item [ 'uri' ] ? ? '' ) ? : self :: newURI ( $item [ 'uid' ], $item [ 'guid' ]))), 0 , 255 );
// Store URI data
$item [ 'uri-id' ] = ItemURI :: insert ([ 'uri' => $item [ 'uri' ], 'guid' => $item [ 'guid' ]]);
// Store conversation data
$item = Conversation :: insert ( $item );
if ( ! empty ( $item [ 'thr-parent' ])) {
$item [ 'parent-uri' ] = $item [ 'thr-parent' ];
}
/*
* Do we already have this item ?
* We have to check several networks since Friendica posts could be repeated
* via OStatus ( maybe Diasporsa as well )
*/
$duplicate = self :: getDuplicateID ( $item );
if ( $duplicate ) {
return $duplicate ;
}
// Additional duplicate checks
/// @todo Check why the first duplication check returns the item number and the second a 0
if ( self :: isDuplicate ( $item )) {
return 0 ;
}
2018-01-28 12:18:08 +01:00
2019-10-16 14:35:14 +02:00
$item [ 'wall' ] = intval ( $item [ 'wall' ] ? ? 0 );
$item [ 'extid' ] = trim ( $item [ 'extid' ] ? ? '' );
$item [ 'author-name' ] = trim ( $item [ 'author-name' ] ? ? '' );
$item [ 'author-link' ] = trim ( $item [ 'author-link' ] ? ? '' );
$item [ 'author-avatar' ] = trim ( $item [ 'author-avatar' ] ? ? '' );
$item [ 'owner-name' ] = trim ( $item [ 'owner-name' ] ? ? '' );
$item [ 'owner-link' ] = trim ( $item [ 'owner-link' ] ? ? '' );
$item [ 'owner-avatar' ] = trim ( $item [ 'owner-avatar' ] ? ? '' );
2018-11-30 15:06:22 +01:00
$item [ 'received' ] = ( isset ( $item [ 'received' ]) ? DateTimeFormat :: utc ( $item [ 'received' ]) : DateTimeFormat :: utcNow ());
$item [ 'created' ] = ( isset ( $item [ 'created' ]) ? DateTimeFormat :: utc ( $item [ 'created' ]) : $item [ 'received' ]);
$item [ 'edited' ] = ( isset ( $item [ 'edited' ]) ? DateTimeFormat :: utc ( $item [ 'edited' ]) : $item [ 'created' ]);
$item [ 'changed' ] = ( isset ( $item [ 'changed' ]) ? DateTimeFormat :: utc ( $item [ 'changed' ]) : $item [ 'created' ]);
$item [ 'commented' ] = ( isset ( $item [ 'commented' ]) ? DateTimeFormat :: utc ( $item [ 'commented' ]) : $item [ 'created' ]);
2020-03-25 08:07:34 +01:00
$item [ 'title' ] = substr ( trim ( $item [ 'title' ] ? ? '' ), 0 , 255 );
2019-10-16 14:35:14 +02:00
$item [ 'location' ] = trim ( $item [ 'location' ] ? ? '' );
$item [ 'coord' ] = trim ( $item [ 'coord' ] ? ? '' );
2018-11-30 15:06:22 +01:00
$item [ 'visible' ] = ( isset ( $item [ 'visible' ]) ? intval ( $item [ 'visible' ]) : 1 );
2018-02-21 22:39:07 +01:00
$item [ 'deleted' ] = 0 ;
2019-10-16 14:35:14 +02:00
$item [ 'parent-uri' ] = trim (( $item [ 'parent-uri' ] ? ? '' ) ? : $item [ 'uri' ]);
$item [ 'post-type' ] = ( $item [ 'post-type' ] ? ? '' ) ? : self :: PT_ARTICLE ;
$item [ 'verb' ] = trim ( $item [ 'verb' ] ? ? '' );
$item [ 'object-type' ] = trim ( $item [ 'object-type' ] ? ? '' );
$item [ 'object' ] = trim ( $item [ 'object' ] ? ? '' );
$item [ 'target-type' ] = trim ( $item [ 'target-type' ] ? ? '' );
$item [ 'target' ] = trim ( $item [ 'target' ] ? ? '' );
2020-03-26 00:18:07 +01:00
$item [ 'plink' ] = substr ( trim ( $item [ 'plink' ] ? ? '' ), 0 , 255 );
2019-10-16 14:35:14 +02:00
$item [ 'allow_cid' ] = trim ( $item [ 'allow_cid' ] ? ? '' );
$item [ 'allow_gid' ] = trim ( $item [ 'allow_gid' ] ? ? '' );
$item [ 'deny_cid' ] = trim ( $item [ 'deny_cid' ] ? ? '' );
$item [ 'deny_gid' ] = trim ( $item [ 'deny_gid' ] ? ? '' );
2020-03-02 08:57:23 +01:00
$item [ 'private' ] = intval ( $item [ 'private' ] ? ? self :: PUBLIC );
2019-10-16 14:35:14 +02:00
$item [ 'body' ] = trim ( $item [ 'body' ] ? ? '' );
$item [ 'attach' ] = trim ( $item [ 'attach' ] ? ? '' );
$item [ 'app' ] = trim ( $item [ 'app' ] ? ? '' );
$item [ 'origin' ] = intval ( $item [ 'origin' ] ? ? 0 );
$item [ 'postopts' ] = trim ( $item [ 'postopts' ] ? ? '' );
$item [ 'resource-id' ] = trim ( $item [ 'resource-id' ] ? ? '' );
$item [ 'event-id' ] = intval ( $item [ 'event-id' ] ? ? 0 );
$item [ 'inform' ] = trim ( $item [ 'inform' ] ? ? '' );
$item [ 'file' ] = trim ( $item [ 'file' ] ? ? '' );
2018-01-28 12:18:08 +01:00
// Items cannot be stored before they happen ...
2018-02-21 22:39:07 +01:00
if ( $item [ 'created' ] > DateTimeFormat :: utcNow ()) {
$item [ 'created' ] = DateTimeFormat :: utcNow ();
2018-01-28 12:18:08 +01:00
}
// We haven't invented time travel by now.
2018-02-21 22:39:07 +01:00
if ( $item [ 'edited' ] > DateTimeFormat :: utcNow ()) {
$item [ 'edited' ] = DateTimeFormat :: utcNow ();
2018-01-28 12:18:08 +01:00
}
2019-12-30 23:00:08 +01:00
$item [ 'plink' ] = ( $item [ 'plink' ] ? ? '' ) ? : DI :: baseUrl () . '/display/' . urlencode ( $item [ 'guid' ]);
2018-01-28 12:18:08 +01:00
2020-05-13 20:45:31 +02:00
$item [ 'language' ] = self :: getLanguage ( $item );
2020-05-12 22:13:48 +02:00
$item [ 'gravity' ] = self :: getGravity ( $item );
2018-05-08 22:20:15 +02:00
$default = [ 'url' => $item [ 'author-link' ], 'name' => $item [ 'author-name' ],
2018-05-09 08:53:57 +02:00
'photo' => $item [ 'author-avatar' ], 'network' => $item [ 'network' ]];
2020-07-15 23:08:42 +02:00
$item [ 'author-id' ] = ( $item [ 'author-id' ] ? ? 0 ) ? : Contact :: getIdForURL ( $item [ 'author-link' ], 0 , null , $default );
2018-01-28 12:18:08 +01:00
2018-05-08 22:20:15 +02:00
$default = [ 'url' => $item [ 'owner-link' ], 'name' => $item [ 'owner-name' ],
2018-05-09 08:53:57 +02:00
'photo' => $item [ 'owner-avatar' ], 'network' => $item [ 'network' ]];
2020-07-15 23:08:42 +02:00
$item [ 'owner-id' ] = ( $item [ 'owner-id' ] ? ? 0 ) ? : Contact :: getIdForURL ( $item [ 'owner-link' ], 0 , null , $default );
2019-03-10 22:19:21 +01:00
2020-07-25 13:48:52 +02:00
// Ensure that there is an avatar cache
Contact :: checkAvatarCache ( $item [ 'author-id' ]);
Contact :: checkAvatarCache ( $item [ 'owner-id' ]);
2019-08-02 19:17:51 +02:00
// The contact-id should be set before "self::insert" was called - but there seems to be issues sometimes
$item [ " contact-id " ] = self :: contactId ( $item );
2020-05-14 05:48:26 +02:00
if ( ! self :: isValid ( $item )) {
2019-02-10 13:21:16 +01:00
return 0 ;
}
2020-05-12 22:13:48 +02:00
// We don't store the causer, we only have it here for the checks in the function above
unset ( $item [ 'causer-id' ]);
unset ( $item [ 'causer-link' ]);
2020-05-13 07:48:26 +02:00
// We don't store these fields anymore in the item table
unset ( $item [ 'author-link' ]);
unset ( $item [ 'author-name' ]);
unset ( $item [ 'author-avatar' ]);
unset ( $item [ 'author-network' ]);
unset ( $item [ 'owner-link' ]);
unset ( $item [ 'owner-name' ]);
unset ( $item [ 'owner-avatar' ]);
2020-05-12 22:13:48 +02:00
$item [ 'thr-parent' ] = $item [ 'parent-uri' ];
2019-02-10 12:28:17 +01:00
2020-05-12 22:13:48 +02:00
if ( $item [ 'parent-uri' ] != $item [ 'uri' ]) {
$item = self :: getParentData ( $item );
if ( empty ( $item )) {
2019-02-10 12:28:17 +01:00
return 0 ;
}
2018-02-21 22:08:37 +01:00
2020-05-12 22:13:48 +02:00
$parent_id = $item [ 'parent' ];
unset ( $item [ 'parent' ]);
$parent_origin = $item [ 'parent_origin' ];
unset ( $item [ 'parent_origin' ]);
2018-01-28 12:18:08 +01:00
} else {
2020-05-12 22:13:48 +02:00
$parent_id = 0 ;
$parent_origin = $item [ 'origin' ];
2019-06-06 06:26:02 +02:00
}
2018-08-05 13:09:59 +02:00
$item [ 'parent-uri-id' ] = ItemURI :: getIdByURI ( $item [ 'parent-uri' ]);
$item [ 'thr-parent-id' ] = ItemURI :: getIdByURI ( $item [ 'thr-parent' ]);
2018-06-03 11:40:32 +02:00
// Is this item available in the global items (with uid=0)?
if ( $item [ " uid " ] == 0 ) {
$item [ " global " ] = true ;
// Set the global flag on all items if this was a global item entry
2019-02-12 22:10:45 +01:00
DBA :: update ( 'item' , [ 'global' => true ], [ 'uri' => $item [ " uri " ]]);
2018-06-03 11:40:32 +02:00
} else {
2018-06-27 21:37:13 +02:00
$item [ " global " ] = self :: exists ([ 'uid' => 0 , 'uri' => $item [ " uri " ]]);
2018-06-03 11:40:32 +02:00
}
2018-01-28 12:18:08 +01:00
// ACL settings
2020-05-12 22:13:48 +02:00
if ( ! empty ( $item [ " allow_cid " ] . $item [ " allow_gid " ] . $item [ " deny_cid " ] . $item [ " deny_gid " ])) {
$item [ " private " ] = self :: PRIVATE ;
2018-01-28 12:18:08 +01:00
}
if ( $notify ) {
2018-07-10 14:27:56 +02:00
$item [ 'edit' ] = false ;
$item [ 'parent' ] = $parent_id ;
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'post_local' , $item );
2018-07-10 14:27:56 +02:00
unset ( $item [ 'edit' ]);
unset ( $item [ 'parent' ]);
2018-01-28 12:18:08 +01:00
} else {
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'post_remote' , $item );
2018-01-28 12:18:08 +01:00
}
2018-11-30 15:06:22 +01:00
if ( ! empty ( $item [ 'cancel' ])) {
2018-10-29 22:20:46 +01:00
Logger :: log ( 'post cancelled by addon.' );
2018-01-28 12:18:08 +01:00
return 0 ;
}
2020-05-12 22:13:48 +02:00
if ( empty ( $item [ 'vid' ]) && ! empty ( $item [ 'verb' ])) {
$item [ 'vid' ] = Verb :: getID ( $item [ 'verb' ]);
2018-06-30 23:15:24 +02:00
}
2018-07-26 01:14:55 +02:00
// Creates or assigns the permission set
2019-11-05 14:27:22 +01:00
$item [ 'psid' ] = PermissionSet :: getIdFromACL (
$item [ 'uid' ],
$item [ 'allow_cid' ],
$item [ 'allow_gid' ],
$item [ 'deny_cid' ],
$item [ 'deny_gid' ]
);
2020-05-12 22:13:48 +02:00
unset ( $item [ 'allow_cid' ]);
unset ( $item [ 'allow_gid' ]);
unset ( $item [ 'deny_cid' ]);
unset ( $item [ 'deny_gid' ]);
2018-07-19 15:52:05 +02:00
2020-05-12 22:13:48 +02:00
// This array field is used to trigger some automatic reactions
// It is mainly used in the "post_local" hook.
unset ( $item [ 'api_source' ]);
2020-08-13 08:09:26 +02:00
if ( $item [ 'verb' ] == Activity :: ANNOUNCE ) {
self :: setOwnerforResharedItem ( $item );
}
2020-05-13 20:45:31 +02:00
// Check for hashtags in the body and repair or add hashtag links
2020-06-05 02:56:50 +02:00
$item [ 'body' ] = self :: setHashtags ( $item [ 'body' ]);
2020-05-31 17:48:31 +02:00
2020-05-13 20:45:31 +02:00
// Fill the cache field
self :: putInCache ( $item );
if ( stristr ( $item [ 'verb' ], Activity :: POKE )) {
$notify_type = Delivery :: POKE ;
} else {
$notify_type = Delivery :: POST ;
}
2020-05-26 07:18:50 +02:00
$like_no_comment = DI :: config () -> get ( 'system' , 'like_no_comment' );
DBA :: transaction ();
if ( ! in_array ( $item [ 'verb' ], self :: ACTIVITIES )) {
2020-05-18 23:34:57 +02:00
$item [ 'icid' ] = self :: insertContent ( $item );
}
2020-05-13 20:45:31 +02:00
$body = $item [ 'body' ];
2020-05-31 17:48:31 +02:00
2020-05-18 23:34:57 +02:00
// We just remove everything that is content
foreach ( array_merge ( self :: CONTENT_FIELDLIST , self :: MIXED_CONTENT_FIELDLIST ) as $field ) {
unset ( $item [ $field ]);
2020-05-13 20:45:31 +02:00
}
2020-05-31 17:48:31 +02:00
unset ( $item [ 'activity' ]);
2020-05-12 22:13:48 +02:00
// Filling item related side tables
2020-05-13 07:48:26 +02:00
// Diaspora signature
2020-05-12 22:13:48 +02:00
if ( ! empty ( $item [ 'diaspora_signed_text' ])) {
DBA :: insert ( 'diaspora-interaction' , [ 'uri-id' => $item [ 'uri-id' ], 'interaction' => $item [ 'diaspora_signed_text' ]], true );
}
unset ( $item [ 'diaspora_signed_text' ]);
2020-05-13 07:48:26 +02:00
// Attached file links
2020-05-13 20:45:31 +02:00
if ( ! empty ( $item [ 'file' ])) {
2020-05-12 22:13:48 +02:00
Category :: storeTextByURIId ( $item [ 'uri-id' ], $item [ 'uid' ], $item [ 'file' ]);
}
unset ( $item [ 'file' ]);
2018-07-19 23:56:52 +02:00
2020-05-13 07:48:26 +02:00
// Delivery relevant data
2020-05-12 22:13:48 +02:00
$delivery_data = Post\DeliveryData :: extractFields ( $item );
2018-07-19 23:56:52 +02:00
unset ( $item [ 'postopts' ]);
unset ( $item [ 'inform' ]);
2020-05-13 20:45:31 +02:00
if ( ! empty ( $item [ 'origin' ]) || ! empty ( $item [ 'wall' ]) || ! empty ( $delivery_data [ 'postopts' ]) || ! empty ( $delivery_data [ 'inform' ])) {
Post\DeliveryData :: insert ( $item [ 'uri-id' ], $delivery_data );
}
2018-08-29 22:46:52 +02:00
2020-05-12 22:13:48 +02:00
// Store tags from the body if this hadn't been handled previously in the protocol classes
if ( ! Tag :: existsForPost ( $item [ 'uri-id' ])) {
2020-05-13 20:45:31 +02:00
Tag :: storeFromBody ( $item [ 'uri-id' ], $body );
2020-05-12 22:13:48 +02:00
}
2020-07-10 00:22:26 +02:00
2020-07-19 03:40:40 +02:00
// Remove all fields that aren't part of the item table
foreach ( $item as $field => $value ) {
if ( ! in_array ( $field , $structure [ 'item' ])) {
unset ( $item [ $field ]);
}
}
2018-07-20 14:19:26 +02:00
$ret = DBA :: insert ( 'item' , $item );
2018-01-28 12:18:08 +01:00
// When the item was successfully stored we fetch the ID of the item.
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $ret )) {
2018-07-20 14:19:26 +02:00
$current_post = DBA :: lastInsertId ();
2018-01-28 12:18:08 +01:00
} else {
// This can happen - for example - if there are locking timeouts.
2018-07-20 14:19:26 +02:00
DBA :: rollback ();
2018-01-28 12:18:08 +01:00
// Store the data into a spool file so that we can try again later.
2019-07-31 16:09:27 +02:00
self :: spool ( $orig_item );
2018-01-28 12:18:08 +01:00
return 0 ;
}
if ( $current_post == 0 ) {
// This is one of these error messages that never should occur.
2018-10-29 22:20:46 +01:00
Logger :: log ( " couldn't find created item - we better quit now. " );
2018-07-20 14:19:26 +02:00
DBA :: rollback ();
2018-01-28 12:18:08 +01:00
return 0 ;
}
// How much entries have we created?
// We wouldn't need this query when we could use an unique index - but MySQL has length problems with them.
2018-07-20 14:19:26 +02:00
$entries = DBA :: count ( 'item' , [ 'uri' => $item [ 'uri' ], 'uid' => $item [ 'uid' ], 'network' => $item [ 'network' ]]);
2018-01-28 12:18:08 +01:00
2018-02-21 23:55:23 +01:00
if ( $entries > 1 ) {
2018-01-28 12:18:08 +01:00
// There are duplicates. We delete our just created entry.
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Delete duplicated item' , [ 'id' => $current_post , 'uri' => $item [ 'uri' ], 'uid' => $item [ 'uid' ], 'guid' => $item [ 'guid' ]]);
2018-01-28 12:18:08 +01:00
2020-04-01 20:11:06 +02:00
// Yes, we could do a rollback here - but we possibly are still having users with MyISAM.
2018-07-20 14:19:26 +02:00
DBA :: delete ( 'item' , [ 'id' => $current_post ]);
DBA :: commit ();
2018-01-28 12:18:08 +01:00
return 0 ;
2018-02-21 23:55:23 +01:00
} elseif ( $entries == 0 ) {
2018-01-28 12:18:08 +01:00
// This really should never happen since we quit earlier if there were problems.
2018-10-29 22:20:46 +01:00
Logger :: log ( " Something is terribly wrong. We haven't found our created entry. " );
2018-07-20 14:19:26 +02:00
DBA :: rollback ();
2018-01-28 12:18:08 +01:00
return 0 ;
}
2018-10-29 22:20:46 +01:00
Logger :: log ( 'created item ' . $current_post );
2018-01-28 12:18:08 +01:00
2018-02-21 22:39:07 +01:00
if ( ! $parent_id || ( $item [ 'parent-uri' ] === $item [ 'uri' ])) {
2018-01-28 12:18:08 +01:00
$parent_id = $current_post ;
}
// Set parent id
2019-02-12 22:10:45 +01:00
DBA :: update ( 'item' , [ 'parent' => $parent_id ], [ 'id' => $current_post ]);
2018-01-28 12:18:08 +01:00
2018-02-21 22:39:07 +01:00
$item [ 'id' ] = $current_post ;
$item [ 'parent' ] = $parent_id ;
2018-01-28 12:18:08 +01:00
// update the commented timestamp on the parent
// Only update "commented" if it is really a comment
2019-08-03 12:36:21 +02:00
if (( $item [ 'gravity' ] != GRAVITY_ACTIVITY ) || ! $like_no_comment ) {
2019-02-12 22:10:45 +01:00
DBA :: update ( 'item' , [ 'commented' => DateTimeFormat :: utcNow (), 'changed' => DateTimeFormat :: utcNow ()], [ 'id' => $parent_id ]);
2018-01-28 12:18:08 +01:00
} else {
2019-02-12 22:10:45 +01:00
DBA :: update ( 'item' , [ 'changed' => DateTimeFormat :: utcNow ()], [ 'id' => $parent_id ]);
2018-01-28 12:18:08 +01:00
}
2018-02-21 22:39:07 +01:00
if ( $item [ 'parent-uri' ] === $item [ 'uri' ]) {
2018-02-05 13:47:06 +01:00
self :: addThread ( $current_post );
2018-01-28 12:18:08 +01:00
} else {
2018-02-05 13:47:06 +01:00
self :: updateThread ( $parent_id );
2018-01-28 12:18:08 +01:00
}
2018-07-20 14:19:26 +02:00
DBA :: commit ();
2018-01-28 12:18:08 +01:00
2019-08-03 12:36:21 +02:00
// In that function we check if this is a forum post. Additionally we delete the item under certain circumstances
if ( self :: tagDeliver ( $item [ 'uid' ], $current_post )) {
// Get the user information for the logging
$user = User :: getById ( $uid );
Logger :: notice ( 'Item had been deleted' , [ 'id' => $current_post , 'user' => $uid , 'account-type' => $user [ 'account-type' ]]);
return 0 ;
}
if ( ! $dontcache ) {
$posted_item = self :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $current_post ]);
if ( DBA :: isResult ( $posted_item )) {
if ( $notify ) {
Hook :: callAll ( 'post_local_end' , $posted_item );
} else {
Hook :: callAll ( 'post_remote_end' , $posted_item );
}
} else {
Logger :: log ( 'new item not found in DB, id ' . $current_post );
}
}
2018-02-21 22:39:07 +01:00
if ( $item [ 'parent-uri' ] === $item [ 'uri' ]) {
2018-01-28 12:18:08 +01:00
self :: addShadow ( $current_post );
} else {
self :: addShadowPost ( $current_post );
}
2019-08-03 12:36:21 +02:00
self :: updateContact ( $item );
2020-01-05 03:18:11 +01:00
UserItem :: setNotification ( $current_post );
2020-01-05 02:23:40 +01:00
2018-01-28 12:18:08 +01:00
check_user_notification ( $current_post );
2020-07-21 10:35:57 +02:00
// Distribute items to users who subscribed to their tags
2020-07-23 05:26:54 +02:00
self :: distributeByTags ( $item );
2020-07-21 10:35:57 +02:00
2020-05-12 22:13:48 +02:00
$transmit = $notify || ( $item [ 'visible' ] && ( $parent_origin || $item [ 'origin' ]));
2020-05-06 22:43:00 +02:00
if ( $transmit ) {
$transmit_item = Item :: selectFirst ([ 'verb' , 'origin' ], [ 'id' => $item [ 'id' ]]);
// Don't relay participation messages
2020-05-06 23:19:48 +02:00
if (( $transmit_item [ 'verb' ] == Activity :: FOLLOW ) &&
( ! $transmit_item [ 'origin' ] || ( $item [ 'author-id' ] != Contact :: getPublicIdByUserId ( $uid )))) {
2020-05-06 22:43:00 +02:00
Logger :: info ( 'Participation messages will not be relayed' , [ 'item' => $item [ 'id' ], 'uri' => $item [ 'uri' ], 'verb' => $transmit_item [ 'verb' ]]);
$transmit = false ;
}
}
if ( $transmit ) {
2018-10-27 13:09:23 +02:00
Worker :: add ([ 'priority' => $priority , 'dont_fork' => true ], 'Notifier' , $notify_type , $current_post );
2018-01-28 12:18:08 +01:00
}
return $current_post ;
}
2020-08-10 00:46:18 +02:00
/**
2020-08-23 10:39:56 +02:00
* Change the owner of a parent item if it had been shared by a forum
2020-08-10 00:46:18 +02:00
*
2020-08-11 07:23:16 +02:00
* ( public ) forum posts in the new format consist of the regular post by the author
* followed by an announce message sent from the forum account .
2020-08-13 08:09:26 +02:00
* Changing the owner helps in grouping forum posts .
*
2020-08-10 00:46:18 +02:00
* @ param array $item
* @ return void
*/
2020-08-13 08:09:26 +02:00
private static function setOwnerforResharedItem ( array $item )
2020-08-10 00:46:18 +02:00
{
2020-08-22 19:30:14 +02:00
$parent = self :: selectFirst ([ 'id' , 'owner-id' , 'author-id' , 'author-link' , 'origin' ],
[ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $item [ 'uid' ]]);
2020-08-13 08:09:26 +02:00
if ( ! DBA :: isResult ( $parent )) {
Logger :: error ( 'Parent not found' , [ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $item [ 'uid' ]]);
2020-08-10 00:46:18 +02:00
return ;
}
2020-08-13 08:09:26 +02:00
$author = Contact :: selectFirst ([ 'url' , 'contact-type' ], [ 'id' => $item [ 'author-id' ]]);
if ( ! DBA :: isResult ( $author )) {
Logger :: error ( 'Author not found' , [ 'id' => $item [ 'author-id' ]]);
2020-08-10 00:46:18 +02:00
return ;
}
2020-08-23 10:39:56 +02:00
if ( $author [ 'contact-type' ] != Contact :: TYPE_COMMUNITY ) {
logger :: info ( 'The resharer is no forum: quit' , [ 'resharer' => $item [ 'author-id' ], 'owner' => $parent [ 'owner-id' ], 'author' => $parent [ 'author-id' ], 'uid' => $item [ 'uid' ]]);
2020-08-13 08:09:26 +02:00
return ;
}
$cid = Contact :: getIdForURL ( $author [ 'url' ], $item [ 'uid' ]);
2020-08-20 04:49:02 +02:00
if ( empty ( $cid ) || ! Contact :: isSharing ( $cid , $item [ 'uid' ])) {
2020-08-22 19:30:14 +02:00
logger :: info ( 'The resharer is not a following contact: quit' , [ 'resharer' => $author [ 'url' ], 'uid' => $item [ 'uid' ]]);
2020-08-13 08:09:26 +02:00
return ;
}
Item :: update ([ 'owner-id' => $item [ 'author-id' ], 'contact-id' => $cid ], [ 'id' => $parent [ 'id' ]]);
Logger :: info ( 'Change owner of the parent' , [ 'uri-id' => $item [ 'uri-id' ], 'parent-uri-id' => $item [ 'parent-uri-id' ], 'uid' => $item [ 'uid' ], 'owner-id' => $item [ 'author-id' ], 'contact-id' => $cid ]);
2020-08-10 00:46:18 +02:00
}
2020-07-21 10:35:57 +02:00
/**
* Distribute the given item to users who subscribed to their tags
*
* @ param array $item Processed item
*/
2020-07-23 05:26:54 +02:00
private static function distributeByTags ( array $item )
2020-07-21 10:35:57 +02:00
{
if (( $item [ 'uid' ] != 0 ) || ( $item [ 'gravity' ] != GRAVITY_PARENT ) || ! in_array ( $item [ 'network' ], Protocol :: FEDERATED )) {
return ;
}
$uids = Tag :: getUIDListByURIId ( $item [ 'uri-id' ]);
foreach ( $uids as $uid ) {
2020-08-23 19:48:44 +02:00
if ( Contact :: isSharing ( $item [ 'author-id' ], $uid )) {
$fields = [];
} else {
$fields = [ 'post-type' => self :: PT_TAG ];
}
$stored = self :: storeForUserByUriId ( $item [ 'uri-id' ], $uid , $fields );
2020-08-23 19:58:22 +02:00
Logger :: info ( 'Stored item for users' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid , 'fields' => $fields , 'stored' => $stored ]);
2020-07-21 10:35:57 +02:00
}
}
2018-06-24 23:41:49 +02:00
/**
2020-01-19 07:05:23 +01:00
* Insert a new item content entry
2018-06-24 23:41:49 +02:00
*
* @ param array $item The item fields that are to be inserted
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-06-24 23:41:49 +02:00
*/
2020-05-18 23:34:57 +02:00
private static function insertContent ( array $item )
2018-06-24 23:41:49 +02:00
{
2018-10-18 23:35:48 +02:00
$fields = [ 'uri-plink-hash' => ( string ) $item [ 'uri-id' ], 'uri-id' => $item [ 'uri-id' ]];
2018-06-24 23:41:49 +02:00
2018-06-30 07:18:43 +02:00
foreach ( array_merge ( self :: CONTENT_FIELDLIST , self :: MIXED_CONTENT_FIELDLIST ) as $field ) {
2018-06-25 01:09:13 +02:00
if ( isset ( $item [ $field ])) {
$fields [ $field ] = $item [ $field ];
}
}
2018-10-18 23:35:48 +02:00
$item_content = DBA :: selectFirst ( 'item-content' , [ 'id' ], [ 'uri-id' => $item [ 'uri-id' ]]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $item_content )) {
2020-05-18 23:34:57 +02:00
$icid = $item_content [ 'id' ];
2020-05-26 07:18:50 +02:00
Logger :: info ( 'Content found' , [ 'icid' => $icid , 'uri' => $item [ 'uri' ]]);
return $icid ;
2018-06-29 08:20:04 +02:00
}
2020-05-26 07:18:50 +02:00
DBA :: insert ( 'item-content' , $fields , true );
$icid = DBA :: lastInsertId ();
if ( $icid != 0 ) {
Logger :: info ( 'Content inserted' , [ 'icid' => $icid , 'uri' => $item [ 'uri' ]]);
return $icid ;
2018-07-06 00:00:38 +02:00
}
2020-05-26 07:18:50 +02:00
// Possibly there can be timing issues. Then the same content could be inserted multiple times.
// Due to the indexes this doesn't happen, but "lastInsertId" will be empty in these situations.
// So we have to fetch the id manually. This is no bug and there is no data loss.
$item_content = DBA :: selectFirst ( 'item-content' , [ 'id' ], [ 'uri-id' => $item [ 'uri-id' ]]);
if ( DBA :: isResult ( $item_content )) {
$icid = $item_content [ 'id' ];
Logger :: notice ( 'Content inserted with empty lastInsertId' , [ 'icid' => $icid , 'uri' => $item [ 'uri' ]]);
return $icid ;
2018-07-06 00:00:38 +02:00
}
2020-05-26 07:18:50 +02:00
// This shouldn't happen.
Logger :: error ( " Content wasn't inserted " , $item );
return null ;
2018-07-06 00:00:38 +02:00
}
2018-06-24 23:41:49 +02:00
/**
2020-01-19 07:05:23 +01:00
* Update existing item content entries
2018-06-24 23:41:49 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param array $item The item fields that are to be changed
2018-06-24 23:41:49 +02:00
* @ param array $condition The condition for finding the item content entries
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-06-24 23:41:49 +02:00
*/
private static function updateContent ( $item , $condition )
{
// We have to select only the fields from the "item-content" table
$fields = [];
2018-06-30 07:18:43 +02:00
foreach ( array_merge ( self :: CONTENT_FIELDLIST , self :: MIXED_CONTENT_FIELDLIST ) as $field ) {
2018-06-24 23:41:49 +02:00
if ( isset ( $item [ $field ])) {
$fields [ $field ] = $item [ $field ];
}
}
if ( empty ( $fields )) {
2020-07-10 00:22:26 +02:00
return ;
2018-06-24 23:41:49 +02:00
}
2018-07-20 14:19:26 +02:00
DBA :: update ( 'item-content' , $fields , $condition , true );
2020-05-26 07:18:50 +02:00
Logger :: info ( 'Updated content' , [ 'condition' => $condition ]);
2018-06-24 23:41:49 +02:00
}
2018-04-24 15:21:25 +02:00
/**
2020-01-19 07:05:23 +01:00
* Distributes public items to the receivers
2018-04-24 15:21:25 +02:00
*
2018-05-15 06:33:28 +02:00
* @ param integer $itemid Item ID that should be added
* @ param string $signed_text Original text ( for Diaspora signatures ), JSON encoded .
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-04-24 15:21:25 +02:00
*/
2018-05-15 06:33:28 +02:00
public static function distribute ( $itemid , $signed_text = '' )
2018-04-24 15:21:25 +02:00
{
$condition = [ " `id` IN (SELECT `parent` FROM `item` WHERE `id` = ?) " , $itemid ];
2018-06-30 23:15:24 +02:00
$parent = self :: selectFirst ([ 'owner-id' ], $condition );
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $parent )) {
2018-04-24 15:21:25 +02:00
return ;
}
// Only distribute public items from native networks
$condition = [ 'id' => $itemid , 'uid' => 0 ,
2019-07-01 20:00:55 +02:00
'network' => array_merge ( Protocol :: FEDERATED ,[ '' ]),
2020-03-02 08:57:23 +01:00
'visible' => true , 'deleted' => false , 'moderated' => false , 'private' => [ self :: PUBLIC , self :: UNLISTED ]];
2019-01-07 19:26:54 +01:00
$item = self :: selectFirst ( self :: ITEM_FIELDLIST , $condition );
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2018-04-24 15:21:25 +02:00
return ;
}
2018-07-10 14:27:56 +02:00
$origin = $item [ 'origin' ];
2018-04-26 21:47:12 +02:00
$users = [];
2018-09-16 11:06:09 +02:00
/// @todo add a field "pcid" in the contact table that referrs to the public contact id.
2018-09-15 20:54:45 +02:00
$owner = DBA :: selectFirst ( 'contact' , [ 'url' , 'nurl' , 'alias' ], [ 'id' => $parent [ 'owner-id' ]]);
if ( ! DBA :: isResult ( $owner )) {
return ;
}
$condition = [ 'nurl' => $owner [ 'nurl' ], 'rel' => [ Contact :: SHARING , Contact :: FRIEND ]];
$contacts = DBA :: select ( 'contact' , [ 'uid' ], $condition );
while ( $contact = DBA :: fetch ( $contacts )) {
if ( $contact [ 'uid' ] == 0 ) {
continue ;
}
$users [ $contact [ 'uid' ]] = $contact [ 'uid' ];
}
DBA :: close ( $contacts );
$condition = [ 'alias' => $owner [ 'url' ], 'rel' => [ Contact :: SHARING , Contact :: FRIEND ]];
$contacts = DBA :: select ( 'contact' , [ 'uid' ], $condition );
while ( $contact = DBA :: fetch ( $contacts )) {
if ( $contact [ 'uid' ] == 0 ) {
continue ;
}
$users [ $contact [ 'uid' ]] = $contact [ 'uid' ];
}
DBA :: close ( $contacts );
if ( ! empty ( $owner [ 'alias' ])) {
2020-07-18 17:49:10 +02:00
$condition = [ 'nurl' => Strings :: normaliseLink ( $owner [ 'alias' ]), 'rel' => [ Contact :: SHARING , Contact :: FRIEND ]];
2018-09-15 20:54:45 +02:00
$contacts = DBA :: select ( 'contact' , [ 'uid' ], $condition );
while ( $contact = DBA :: fetch ( $contacts )) {
if ( $contact [ 'uid' ] == 0 ) {
continue ;
}
$users [ $contact [ 'uid' ]] = $contact [ 'uid' ];
}
DBA :: close ( $contacts );
}
2018-05-15 06:33:28 +02:00
$origin_uid = 0 ;
2018-04-26 21:47:12 +02:00
if ( $item [ 'uri' ] != $item [ 'parent-uri' ]) {
2018-06-30 23:15:24 +02:00
$parents = self :: select ([ 'uid' , 'origin' ], [ " `uri` = ? AND `uid` != 0 " , $item [ 'parent-uri' ]]);
2018-08-15 06:41:49 +02:00
while ( $parent = self :: fetch ( $parents )) {
2018-04-26 21:47:12 +02:00
$users [ $parent [ 'uid' ]] = $parent [ 'uid' ];
2018-07-10 14:27:56 +02:00
if ( $parent [ 'origin' ] && ! $origin ) {
2018-05-15 06:33:28 +02:00
$origin_uid = $parent [ 'uid' ];
}
2018-04-26 21:47:12 +02:00
}
}
foreach ( $users as $uid ) {
2018-05-15 06:33:28 +02:00
if ( $origin_uid == $uid ) {
$item [ 'diaspora_signed_text' ] = $signed_text ;
}
2020-07-21 10:35:57 +02:00
self :: storeForUser ( $item , $uid );
2018-04-24 15:21:25 +02:00
}
}
/**
2020-07-23 05:26:54 +02:00
* Store a public item defined by their URI - ID for the given users
*
* @ param integer $uri_id URI - ID of the given item
* @ param integer $uid The user that will receive the item entry
2020-08-23 19:48:44 +02:00
* @ param array $fields Additional fields to be stored
2020-07-23 05:26:54 +02:00
* @ return integer stored item id
*/
2020-08-23 19:48:44 +02:00
public static function storeForUserByUriId ( int $uri_id , int $uid , array $fields = [])
2020-07-23 05:26:54 +02:00
{
$item = self :: selectFirst ( self :: ITEM_FIELDLIST , [ 'uri-id' => $uri_id , 'uid' => 0 ]);
2020-07-28 08:42:12 +02:00
if ( ! DBA :: isResult ( $item )) {
return 0 ;
}
if (( $item [ 'private' ] == self :: PRIVATE ) || ! in_array ( $item [ 'network' ], Protocol :: FEDERATED )) {
Logger :: notice ( 'Item is private or not from a federated network. It will not be stored for the user.' , [ 'uri-id' => $uri_id , 'uid' => $uid , 'private' => $item [ 'private' ], 'network' => $item [ 'network' ]]);
2020-07-23 05:26:54 +02:00
return 0 ;
}
2020-08-23 19:48:44 +02:00
$item = array_merge ( $item , $fields );
2020-07-23 05:26:54 +02:00
$stored = self :: storeForUser ( $item , $uid );
Logger :: info ( 'Public item stored for user' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid , 'stored' => $stored ]);
return $stored ;
}
/**
* Store a public item array for the given users
2018-04-24 15:21:25 +02:00
*
2018-04-24 16:58:39 +02:00
* @ param array $item The item entry that will be stored
* @ param integer $uid The user that will receive the item entry
2020-07-21 10:35:57 +02:00
* @ return integer stored item id
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-04-24 15:21:25 +02:00
*/
2020-07-23 05:26:54 +02:00
private static function storeForUser ( array $item , int $uid )
2018-04-24 15:21:25 +02:00
{
2020-07-21 10:35:57 +02:00
if ( self :: exists ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid ])) {
Logger :: info ( 'Item already exists' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid ]);
return 0 ;
}
unset ( $item [ 'id' ]);
unset ( $item [ 'parent' ]);
unset ( $item [ 'mention' ]);
unset ( $item [ 'starred' ]);
2020-07-23 05:26:54 +02:00
unset ( $item [ 'unseen' ]);
unset ( $item [ 'psid' ]);
2020-07-21 10:35:57 +02:00
2018-04-24 16:58:39 +02:00
$item [ 'uid' ] = $uid ;
2018-04-24 15:21:25 +02:00
$item [ 'origin' ] = 0 ;
$item [ 'wall' ] = 0 ;
2020-07-21 10:35:57 +02:00
2020-07-21 21:43:07 +02:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
2020-07-21 10:35:57 +02:00
$contact = Contact :: getByURLForUser ( $item [ 'owner-link' ], $uid , false , [ 'id' ]);
2018-04-24 15:21:25 +02:00
} else {
2020-07-21 10:35:57 +02:00
$contact = Contact :: getByURLForUser ( $item [ 'author-link' ], $uid , false , [ 'id' ]);
2018-04-24 15:21:25 +02:00
}
2020-07-21 20:53:01 +02:00
if ( ! empty ( $contact [ 'id' ])) {
2020-07-21 10:35:57 +02:00
$item [ 'contact-id' ] = $contact [ 'id' ];
} else {
// Shouldn't happen at all
2020-07-21 20:30:45 +02:00
Logger :: warning ( 'contact-id could not be fetched' , [ 'uid' => $uid , 'item' => $item ]);
2018-07-20 14:19:26 +02:00
$self = DBA :: selectFirst ( 'contact' , [ 'id' ], [ 'self' => true , 'uid' => $uid ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $self )) {
2020-07-21 10:35:57 +02:00
// Shouldn't happen even less
2020-07-21 20:30:45 +02:00
Logger :: warning ( 'self contact could not be fetched' , [ 'uid' => $uid , 'item' => $item ]);
2020-07-21 10:35:57 +02:00
return 0 ;
2018-04-24 15:21:25 +02:00
}
$item [ 'contact-id' ] = $self [ 'id' ];
}
/// @todo Handling of "event-id"
2018-05-04 23:12:13 +02:00
$notify = false ;
2020-07-21 21:43:07 +02:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
2018-07-20 14:19:26 +02:00
$contact = DBA :: selectFirst ( 'contact' , [], [ 'id' => $item [ 'contact-id' ], 'self' => false ]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $contact )) {
2018-05-04 23:12:13 +02:00
$notify = self :: isRemoteSelf ( $contact , $item );
}
}
2020-05-12 23:49:12 +02:00
$distributed = self :: insert ( $item , $notify , true );
2018-04-24 15:21:25 +02:00
if ( ! $distributed ) {
2020-07-21 10:35:57 +02:00
Logger :: info ( " Distributed public item wasn't stored " , [ 'uri-id' => $item [ 'uri-id' ], 'user' => $uid ]);
2018-04-24 15:21:25 +02:00
} else {
2020-07-21 10:35:57 +02:00
Logger :: info ( 'Distributed public item was stored' , [ 'uri-id' => $item [ 'uri-id' ], 'user' => $uid , 'stored' => $distributed ]);
2018-04-24 15:21:25 +02:00
}
2020-07-21 10:35:57 +02:00
return $distributed ;
2018-04-24 15:21:25 +02:00
}
2018-01-16 23:23:19 +01:00
/**
2020-01-19 07:05:23 +01:00
* Add a shadow entry for a given item id that is a thread starter
2018-01-16 23:23:19 +01:00
*
* We store every public item entry additionally with the user id " 0 " .
* This is used for the community page and for the search .
* It is planned that in the future we will store public item entries only once .
*
* @ param integer $itemid Item ID that should be added
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-01-16 23:23:19 +01:00
*/
2018-01-16 23:46:20 +01:00
public static function addShadow ( $itemid )
{
2018-07-01 09:57:59 +02:00
$fields = [ 'uid' , 'private' , 'moderated' , 'visible' , 'deleted' , 'network' , 'uri' ];
2018-04-23 13:14:25 +02:00
$condition = [ 'id' => $itemid , 'parent' => [ 0 , $itemid ]];
2018-06-30 23:15:24 +02:00
$item = self :: selectFirst ( $fields , $condition );
2018-01-16 23:23:19 +01:00
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2018-01-16 23:23:19 +01:00
return ;
}
// is it already a copy?
if (( $itemid == 0 ) || ( $item [ 'uid' ] == 0 )) {
return ;
}
// Is it a visible public post?
2020-03-02 08:57:23 +01:00
if ( ! $item [ " visible " ] || $item [ " deleted " ] || $item [ " moderated " ] || ( $item [ " private " ] == Item :: PRIVATE )) {
2018-01-16 23:23:19 +01:00
return ;
}
// is it an entry from a connector? Only add an entry for natively connected networks
2019-07-01 20:00:55 +02:00
if ( ! in_array ( $item [ " network " ], array_merge ( Protocol :: FEDERATED ,[ '' ]))) {
2018-01-16 23:23:19 +01:00
return ;
}
2018-07-01 09:57:59 +02:00
if ( self :: exists ([ 'uri' => $item [ 'uri' ], 'uid' => 0 ])) {
return ;
}
2018-06-25 20:49:36 +02:00
$item = self :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $itemid ]);
2018-06-25 18:11:27 +02:00
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $item )) {
2018-07-01 09:57:59 +02:00
// Preparing public shadow (removing user specific data)
$item [ 'uid' ] = 0 ;
unset ( $item [ 'id' ]);
unset ( $item [ 'parent' ]);
unset ( $item [ 'wall' ]);
unset ( $item [ 'mention' ]);
unset ( $item [ 'origin' ]);
unset ( $item [ 'starred' ]);
2018-07-19 23:56:52 +02:00
unset ( $item [ 'postopts' ]);
unset ( $item [ 'inform' ]);
2018-07-01 09:57:59 +02:00
if ( $item [ 'uri' ] == $item [ 'parent-uri' ]) {
$item [ 'contact-id' ] = $item [ 'owner-id' ];
} else {
$item [ 'contact-id' ] = $item [ 'author-id' ];
}
2018-01-16 23:23:19 +01:00
2020-05-12 23:49:12 +02:00
$public_shadow = self :: insert ( $item , false , true );
2018-01-16 23:23:19 +01:00
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Stored public shadow' , [ 'thread' => $itemid , 'id' => $public_shadow ]);
2018-01-16 23:23:19 +01:00
}
}
/**
2020-01-19 07:05:23 +01:00
* Add a shadow entry for a given item id that is a comment
2018-01-16 23:23:19 +01:00
*
* This function does the same like the function above - but for comments
*
* @ param integer $itemid Item ID that should be added
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-01-16 23:23:19 +01:00
*/
2018-01-28 15:06:02 +01:00
public static function addShadowPost ( $itemid )
2018-01-16 23:46:20 +01:00
{
2018-06-25 22:38:32 +02:00
$item = self :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $itemid ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2018-01-16 23:23:19 +01:00
return ;
}
// Is it a toplevel post?
2020-05-27 14:19:06 +02:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
2018-01-16 23:23:19 +01:00
self :: addShadow ( $itemid );
return ;
}
// Is this a shadow entry?
2018-05-10 14:48:27 +02:00
if ( $item [ 'uid' ] == 0 ) {
2018-01-16 23:23:19 +01:00
return ;
2018-05-10 14:48:27 +02:00
}
2018-01-16 23:23:19 +01:00
// Is there a shadow parent?
2018-06-27 21:37:13 +02:00
if ( ! self :: exists ([ 'uri' => $item [ 'parent-uri' ], 'uid' => 0 ])) {
2018-01-16 23:23:19 +01:00
return ;
}
// Is there already a shadow entry?
2018-06-27 21:37:13 +02:00
if ( self :: exists ([ 'uri' => $item [ 'uri' ], 'uid' => 0 ])) {
2018-01-16 23:23:19 +01:00
return ;
}
2018-04-27 06:11:33 +02:00
// Save "origin" and "parent" state
$origin = $item [ 'origin' ];
$parent = $item [ 'parent' ];
2018-01-16 23:23:19 +01:00
// Preparing public shadow (removing user specific data)
$item [ 'uid' ] = 0 ;
2018-04-27 06:11:33 +02:00
unset ( $item [ 'id' ]);
unset ( $item [ 'parent' ]);
unset ( $item [ 'wall' ]);
unset ( $item [ 'mention' ]);
unset ( $item [ 'origin' ]);
unset ( $item [ 'starred' ]);
2018-07-19 23:56:52 +02:00
unset ( $item [ 'postopts' ]);
unset ( $item [ 'inform' ]);
2018-03-02 01:53:47 +01:00
$item [ 'contact-id' ] = Contact :: getIdForURL ( $item [ 'author-link' ]);
2018-01-16 23:23:19 +01:00
2020-05-12 23:49:12 +02:00
$public_shadow = self :: insert ( $item , false , true );
2018-01-16 23:23:19 +01:00
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Stored public shadow' , [ 'uri' => $item [ 'uri' ], 'id' => $public_shadow ]);
2018-04-27 06:11:33 +02:00
// If this was a comment to a Diaspora post we don't get our comment back.
// This means that we have to distribute the comment by ourselves.
2018-08-11 22:40:44 +02:00
if ( $origin && self :: exists ([ 'id' => $parent , 'network' => Protocol :: DIASPORA ])) {
2018-05-10 14:48:27 +02:00
self :: distribute ( $public_shadow );
2018-04-27 06:11:33 +02:00
}
2018-01-16 23:23:19 +01:00
}
2018-01-21 00:52:54 +01:00
2019-01-06 22:06:53 +01:00
/**
2018-06-30 07:18:43 +02:00
* Adds a language specification in a " language " element of given $arr .
2018-01-21 00:52:54 +01:00
* Expects " body " element to exist in $arr .
2019-01-06 22:06:53 +01:00
*
2020-05-13 20:45:31 +02:00
* @ param array $item
* @ return string detected language
2019-01-06 22:06:53 +01:00
* @ throws \Text_LanguageDetect_Exception
2018-01-21 00:52:54 +01:00
*/
2020-05-13 20:45:31 +02:00
private static function getLanguage ( array $item )
2018-01-21 00:52:54 +01:00
{
2018-07-20 04:15:21 +02:00
$naked_body = BBCode :: toPlaintext ( $item [ 'body' ], false );
2018-01-21 00:52:54 +01:00
2018-06-30 07:18:43 +02:00
$ld = new Text_LanguageDetect ();
$ld -> setNameMode ( 2 );
$languages = $ld -> detect ( $naked_body , 3 );
if ( is_array ( $languages )) {
2020-05-13 20:45:31 +02:00
return json_encode ( $languages );
2018-01-21 00:52:54 +01:00
}
2020-05-13 20:45:31 +02:00
return '' ;
2018-01-21 00:52:54 +01:00
}
/**
2020-01-19 07:05:23 +01:00
* Creates an unique guid out of a given uri
2018-01-21 00:52:54 +01:00
*
* @ param string $uri uri of an item entry
2018-02-21 05:13:13 +01:00
* @ param string $host hostname for the GUID prefix
2018-01-21 00:52:54 +01:00
* @ return string unique guid
*/
2018-02-21 05:13:13 +01:00
public static function guidFromUri ( $uri , $host )
2018-01-21 00:52:54 +01:00
{
// Our regular guid routine is using this kind of prefix as well
// We have to avoid that different routines could accidentally create the same value
$parsed = parse_url ( $uri );
// We use a hash of the hostname as prefix for the guid
$guid_prefix = hash ( " crc32 " , $host );
// Remove the scheme to make sure that "https" and "http" doesn't make a difference
unset ( $parsed [ " scheme " ]);
// Glue it together to be able to make a hash from it
$host_id = implode ( " / " , $parsed );
// We could use any hash algorithm since it isn't a security issue
$host_hash = hash ( " ripemd128 " , $host_id );
return $guid_prefix . $host_hash ;
}
2018-06-16 08:44:19 +02:00
/**
* generate an unique URI
*
2019-01-06 22:06:53 +01:00
* @ param integer $uid User id
* @ param string $guid An existing GUID ( Otherwise it will be generated )
2018-06-16 08:44:19 +02:00
*
* @ return string
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-06-16 08:44:19 +02:00
*/
public static function newURI ( $uid , $guid = " " )
{
if ( $guid == " " ) {
2018-09-27 13:52:15 +02:00
$guid = System :: createUUID ();
2018-06-16 08:44:19 +02:00
}
2019-12-16 01:05:15 +01:00
return DI :: baseUrl () -> get () . '/objects/' . $guid ;
2018-06-16 08:44:19 +02:00
}
2018-01-21 00:52:54 +01:00
/**
2020-01-19 07:05:23 +01:00
* Set " success_update " and " last-item " to the date of the last time we heard from this contact
2018-01-21 00:52:54 +01:00
*
* This can be used to filter for inactive contacts .
* Only do this for public postings to avoid privacy problems , since poco data is public .
* Don 't set this value if it isn' t from the owner ( could be an author that we don ' t know )
*
* @ param array $arr Contains the just posted item record
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-01-21 00:52:54 +01:00
*/
2018-01-28 17:28:59 +01:00
private static function updateContact ( $arr )
{
2018-01-21 00:52:54 +01:00
// Unarchive the author
2018-07-20 14:19:26 +02:00
$contact = DBA :: selectFirst ( 'contact' , [], [ 'id' => $arr [ " author-id " ]]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $contact )) {
2018-02-14 22:18:16 +01:00
Contact :: unmarkForArchival ( $contact );
2018-01-21 00:52:54 +01:00
}
2018-02-14 22:18:16 +01:00
// Unarchive the contact if it's not our own contact
2018-07-20 14:19:26 +02:00
$contact = DBA :: selectFirst ( 'contact' , [], [ 'id' => $arr [ " contact-id " ], 'self' => false ]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $contact )) {
2018-02-14 22:18:16 +01:00
Contact :: unmarkForArchival ( $contact );
2018-01-21 00:52:54 +01:00
}
2020-04-24 17:18:34 +02:00
/// @todo On private posts we could obfuscate the date
2020-07-19 12:03:33 +02:00
$update = ( $arr [ 'private' ] != self :: PRIVATE ) || in_array ( $arr [ 'network' ], Protocol :: FEDERATED );
2018-01-21 00:52:54 +01:00
// Is it a forum? Then we don't care about the rules from above
2019-01-16 22:39:56 +01:00
if ( ! $update && in_array ( $arr [ " network " ], [ Protocol :: ACTIVITYPUB , Protocol :: DFRN ]) && ( $arr [ " parent-uri " ] === $arr [ " uri " ])) {
2018-07-20 14:19:26 +02:00
if ( DBA :: exists ( 'contact' , [ 'id' => $arr [ 'contact-id' ], 'forum' => true ])) {
2018-01-21 00:52:54 +01:00
$update = true ;
}
}
if ( $update ) {
2020-04-24 17:18:34 +02:00
// The "self" contact id is used (for example in the connectors) when the contact is unknown
// So we have to ensure to only update the last item when it had been our own post,
// or it had been done by a "regular" contact.
if ( ! empty ( $arr [ 'wall' ])) {
$condition = [ 'id' => $arr [ 'contact-id' ]];
} else {
$condition = [ 'id' => $arr [ 'contact-id' ], 'self' => false ];
}
2020-07-19 12:03:33 +02:00
DBA :: update ( 'contact' , [ 'failed' => false , 'success_update' => $arr [ 'received' ], 'last-item' => $arr [ 'received' ]], $condition );
2018-01-21 00:52:54 +01:00
}
// Now do the same for the system wide contacts with uid=0
2020-03-02 08:57:23 +01:00
if ( $arr [ 'private' ] != self :: PRIVATE ) {
2020-07-19 12:03:33 +02:00
DBA :: update ( 'contact' , [ 'failed' => false , 'success_update' => $arr [ 'received' ], 'last-item' => $arr [ 'received' ]],
2018-01-21 00:52:54 +01:00
[ 'id' => $arr [ 'owner-id' ]]);
if ( $arr [ 'owner-id' ] != $arr [ 'author-id' ]) {
2020-07-19 12:03:33 +02:00
DBA :: update ( 'contact' , [ 'failed' => false , 'success_update' => $arr [ 'received' ], 'last-item' => $arr [ 'received' ]],
2018-01-21 00:52:54 +01:00
[ 'id' => $arr [ 'author-id' ]]);
}
}
}
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
public static function setHashtags ( $body )
2018-01-28 17:28:59 +01:00
{
2020-06-05 02:56:50 +02:00
$body = BBCode :: performWithEscapedTags ( $body , [ 'noparse' , 'pre' , 'code' ], function ( $body ) {
$tags = BBCode :: getTags ( $body );
2019-01-30 02:25:51 +01:00
2020-06-05 02:56:50 +02:00
// No hashtags?
if ( ! count ( $tags )) {
return $body ;
}
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
// This sorting is important when there are hashtags that are part of other hashtags
// Otherwise there could be problems with hashtags like #test and #test2
// Because of this we are sorting from the longest to the shortest tag.
usort ( $tags , function ( $a , $b ) {
return strlen ( $b ) <=> strlen ( $a );
});
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$URLSearchString = " ^ \ [ \ ] " ;
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
// All hashtags should point to the home server if "local_tags" is activated
if ( DI :: config () -> get ( 'system' , 'local_tags' )) {
$body = preg_replace ( " /# \ [url \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /url \ ]/ism " ,
" #[url= " . DI :: baseUrl () . " /search?tag= $ 2] $ 2[/url] " , $body );
}
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
// mask hashtags inside of url, bookmarks and attachments to avoid urls in urls
$body = preg_replace_callback ( " / \ [url \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /url \ ]/ism " ,
function ( $match ) {
return ( " [url= " . str_replace ( " # " , " # " , $match [ 1 ]) . " ] " . str_replace ( " # " , " # " , $match [ 2 ]) . " [/url] " );
}, $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$body = preg_replace_callback ( " / \ [bookmark \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /bookmark \ ]/ism " ,
function ( $match ) {
return ( " [bookmark= " . str_replace ( " # " , " # " , $match [ 1 ]) . " ] " . str_replace ( " # " , " # " , $match [ 2 ]) . " [/bookmark] " );
}, $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$body = preg_replace_callback ( " / \ [attachment (.*) \ ](.*?) \ [ \ /attachment \ ]/ism " ,
function ( $match ) {
return ( " [attachment " . str_replace ( " # " , " # " , $match [ 1 ]) . " ] " . $match [ 2 ] . " [/attachment] " );
}, $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
// Repair recursive urls
$body = preg_replace ( " /# \ [url \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /url \ ]/ism " ,
" # $ 2 " , $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
foreach ( $tags as $tag ) {
if (( strpos ( $tag , '#' ) !== 0 ) || strpos ( $tag , '[url=' ) || strlen ( $tag ) < 2 || $tag [ 1 ] == '#' ) {
continue ;
}
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$basetag = str_replace ( '_' , ' ' , substr ( $tag , 1 ));
$newtag = '#[url=' . DI :: baseUrl () . '/search?tag=' . $basetag . ']' . $basetag . '[/url]' ;
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$body = str_replace ( $tag , $newtag , $body );
}
// Convert back the masked hashtags
$body = str_replace ( " # " , " # " , $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
return $body ;
});
2019-01-29 21:17:11 +01:00
2020-06-05 02:56:50 +02:00
return $body ;
2018-01-28 12:18:08 +01:00
}
/**
* look for mention tags and setup a second delivery chain for forum / community posts if appropriate
2019-01-06 22:06:53 +01:00
*
2018-01-28 12:18:08 +01:00
* @ param int $uid
* @ param int $item_id
2019-07-31 16:09:27 +02:00
* @ return boolean true if item was deleted , else false
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
2018-01-28 12:18:08 +01:00
*/
private static function tagDeliver ( $uid , $item_id )
{
$mention = false ;
2018-07-20 14:19:26 +02:00
$user = DBA :: selectFirst ( 'user' , [], [ 'uid' => $uid ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $user )) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2019-01-06 18:37:48 +01:00
$community_page = (( $user [ 'page-flags' ] == User :: PAGE_FLAGS_COMMUNITY ) ? true : false );
$prvgroup = (( $user [ 'page-flags' ] == User :: PAGE_FLAGS_PRVGROUP ) ? true : false );
2018-01-28 12:18:08 +01:00
2018-06-30 23:15:24 +02:00
$item = self :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $item_id ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2019-12-30 23:00:08 +01:00
$link = Strings :: normaliseLink ( DI :: baseUrl () . '/profile/' . $user [ 'nickname' ]);
2018-01-28 12:18:08 +01:00
/*
* Diaspora uses their own hardwired link URL in @- tags
* instead of the one we supply with webfinger
*/
2019-12-30 23:00:08 +01:00
$dlink = Strings :: normaliseLink ( DI :: baseUrl () . '/u/' . $user [ 'nickname' ]);
2018-01-28 12:18:08 +01:00
$cnt = preg_match_all ( '/[\@\!]\[url\=(.*?)\](.*?)\[\/url\]/ism' , $item [ 'body' ], $matches , PREG_SET_ORDER );
if ( $cnt ) {
foreach ( $matches as $mtch ) {
2018-11-08 16:46:50 +01:00
if ( Strings :: compareLink ( $link , $mtch [ 1 ]) || Strings :: compareLink ( $dlink , $mtch [ 1 ])) {
2018-01-28 12:18:08 +01:00
$mention = true ;
2018-10-29 22:20:46 +01:00
Logger :: log ( 'mention found: ' . $mtch [ 2 ]);
2018-01-28 12:18:08 +01:00
}
}
}
if ( ! $mention ) {
if (( $community_page || $prvgroup ) &&
2020-05-27 14:19:06 +02:00
! $item [ 'wall' ] && ! $item [ 'origin' ] && ( $item [ 'gravity' ] == GRAVITY_PARENT )) {
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Delete private group/communiy top-level item without mention' , [ 'id' => $item_id , 'guid' => $item [ 'guid' ]]);
2018-07-20 14:19:26 +02:00
DBA :: delete ( 'item' , [ 'id' => $item_id ]);
2018-01-28 12:18:08 +01:00
return true ;
}
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2018-02-22 07:52:58 +01:00
$arr = [ 'item' => $item , 'user' => $user ];
2018-01-28 12:18:08 +01:00
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'tagged' , $arr );
2018-01-28 12:18:08 +01:00
if ( ! $community_page && ! $prvgroup ) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
/*
* tgroup delivery - setup a second delivery chain
* prevent delivery looping - only proceed
* if the message originated elsewhere and is a top - level post
*/
if ( $item [ 'wall' ] || $item [ 'origin' ] || ( $item [ 'id' ] != $item [ 'parent' ])) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
// now change this copy of the post to a forum head message and deliver to all the tgroup members
2018-07-20 14:19:26 +02:00
$self = DBA :: selectFirst ( 'contact' , [ 'id' , 'name' , 'url' , 'thumb' ], [ 'uid' => $uid , 'self' => true ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $self )) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2018-03-11 19:12:38 +01:00
$owner_id = Contact :: getIdForURL ( $self [ 'url' ]);
2018-01-28 12:18:08 +01:00
// also reset all the privacy bits to the forum default permissions
2020-03-02 08:57:23 +01:00
$private = ( $user [ 'allow_cid' ] || $user [ 'allow_gid' ] || $user [ 'deny_cid' ] || $user [ 'deny_gid' ]) ? self :: PRIVATE : self :: PUBLIC ;
2018-01-28 12:18:08 +01:00
2019-11-05 14:27:22 +01:00
$psid = PermissionSet :: getIdFromACL (
$user [ 'uid' ],
$user [ 'allow_cid' ],
$user [ 'allow_gid' ],
$user [ 'deny_cid' ],
$user [ 'deny_gid' ]
);
2018-08-15 22:13:10 +02:00
2018-02-22 07:52:58 +01:00
$forum_mode = ( $prvgroup ? 2 : 1 );
2018-01-28 12:18:08 +01:00
2018-03-11 19:12:38 +01:00
$fields = [ 'wall' => true , 'origin' => true , 'forum_mode' => $forum_mode , 'contact-id' => $self [ 'id' ],
2018-08-15 22:13:10 +02:00
'owner-id' => $owner_id , 'private' => $private , 'psid' => $psid ];
2018-08-15 06:41:49 +02:00
self :: update ( $fields , [ 'id' => $item_id ]);
2018-02-21 22:08:37 +01:00
2019-06-10 16:19:24 +02:00
Worker :: add ([ 'priority' => PRIORITY_HIGH , 'dont_fork' => true ], 'Notifier' , Delivery :: POST , $item_id );
2019-07-31 16:09:27 +02:00
2020-08-23 13:26:43 +02:00
Item :: performActivity ( $item_id , 'announce' , $uid );
2020-08-09 20:42:25 +02:00
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2018-01-28 17:28:59 +01:00
public static function isRemoteSelf ( $contact , & $datarray )
{
2018-01-28 12:18:08 +01:00
if ( ! $contact [ 'remote_self' ]) {
return false ;
}
// Prevent the forwarding of posts that are forwarded
2018-08-11 22:40:44 +02:00
if ( ! empty ( $datarray [ " extid " ]) && ( $datarray [ " extid " ] == Protocol :: DFRN )) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Already forwarded' );
2018-01-28 12:18:08 +01:00
return false ;
}
// Prevent to forward already forwarded posts
2019-12-16 00:47:24 +01:00
if ( $datarray [ " app " ] == DI :: baseUrl () -> getHostname ()) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Already forwarded (second test)' );
2018-01-28 12:18:08 +01:00
return false ;
}
// Only forward posts
2019-10-24 00:25:43 +02:00
if ( $datarray [ " verb " ] != Activity :: POST ) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'No post' );
2018-01-28 12:18:08 +01:00
return false ;
}
2020-03-02 08:57:23 +01:00
if (( $contact [ 'network' ] != Protocol :: FEED ) && ( $datarray [ 'private' ] == self :: PRIVATE )) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Not public' );
2018-01-28 12:18:08 +01:00
return false ;
}
$datarray2 = $datarray ;
2020-06-28 20:22:29 +02:00
Logger :: info ( 'remote-self start' , [ 'contact' => $contact [ 'url' ], 'remote_self' => $contact [ 'remote_self' ], 'item' => $datarray ]);
2018-01-28 12:18:08 +01:00
if ( $contact [ 'remote_self' ] == 2 ) {
2018-07-20 14:19:26 +02:00
$self = DBA :: selectFirst ( 'contact' , [ 'id' , 'name' , 'url' , 'thumb' ],
2018-02-22 07:52:58 +01:00
[ 'uid' => $contact [ 'uid' ], 'self' => true ]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $self )) {
2018-02-22 07:52:58 +01:00
$datarray [ 'contact-id' ] = $self [ " id " ];
2018-01-28 12:18:08 +01:00
2018-02-22 07:52:58 +01:00
$datarray [ 'owner-name' ] = $self [ " name " ];
$datarray [ 'owner-link' ] = $self [ " url " ];
$datarray [ 'owner-avatar' ] = $self [ " thumb " ];
2018-01-28 12:18:08 +01:00
$datarray [ 'author-name' ] = $datarray [ 'owner-name' ];
$datarray [ 'author-link' ] = $datarray [ 'owner-link' ];
$datarray [ 'author-avatar' ] = $datarray [ 'owner-avatar' ];
unset ( $datarray [ 'edited' ]);
2018-05-04 23:12:13 +02:00
unset ( $datarray [ 'network' ]);
unset ( $datarray [ 'owner-id' ]);
unset ( $datarray [ 'author-id' ]);
2018-01-28 12:18:08 +01:00
}
2018-08-11 22:40:44 +02:00
if ( $contact [ 'network' ] != Protocol :: FEED ) {
2018-09-27 13:52:15 +02:00
$datarray [ " guid " ] = System :: createUUID ();
2018-01-28 12:18:08 +01:00
unset ( $datarray [ " plink " ]);
2018-06-16 08:44:19 +02:00
$datarray [ " uri " ] = self :: newURI ( $contact [ 'uid' ], $datarray [ " guid " ]);
2018-01-28 12:18:08 +01:00
$datarray [ " parent-uri " ] = $datarray [ " uri " ];
2018-05-04 23:12:13 +02:00
$datarray [ " thr-parent " ] = $datarray [ " uri " ];
2018-08-11 22:40:44 +02:00
$datarray [ " extid " ] = Protocol :: DFRN ;
2018-01-28 12:18:08 +01:00
$urlpart = parse_url ( $datarray2 [ 'author-link' ]);
$datarray [ " app " ] = $urlpart [ " host " ];
} else {
2020-03-02 08:57:23 +01:00
$datarray [ 'private' ] = self :: PUBLIC ;
2018-01-28 12:18:08 +01:00
}
}
2018-08-11 22:40:44 +02:00
if ( $contact [ 'network' ] != Protocol :: FEED ) {
2018-01-28 12:18:08 +01:00
// Store the original post
2020-05-12 23:49:12 +02:00
$result = self :: insert ( $datarray2 );
2020-06-28 20:22:29 +02:00
Logger :: info ( 'remote-self post original item' , [ 'contact' => $contact [ 'url' ], 'result' => $result , 'item' => $datarray2 ]);
2018-01-28 12:18:08 +01:00
} else {
$datarray [ " app " ] = " Feed " ;
2018-05-04 23:12:13 +02:00
$result = true ;
2018-01-28 12:18:08 +01:00
}
// Trigger automatic reactions for addons
$datarray [ 'api_source' ] = true ;
// We have to tell the hooks who we are - this really should be improved
$_SESSION [ " authenticated " ] = true ;
$_SESSION [ " uid " ] = $contact [ 'uid' ];
2018-05-04 23:12:13 +02:00
return $result ;
2018-01-28 12:18:08 +01:00
}
/**
*
* @ param string $s
* @ param int $uid
* @ param array $item
* @ param int $cid
* @ return string
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
2018-01-28 12:18:08 +01:00
*/
public static function fixPrivatePhotos ( $s , $uid , $item = null , $cid = 0 )
{
2020-01-19 21:21:13 +01:00
if ( DI :: config () -> get ( 'system' , 'disable_embedded' )) {
2018-01-28 12:18:08 +01:00
return $s ;
}
2020-06-28 20:22:29 +02:00
Logger :: info ( 'check for photos' );
2019-12-30 23:00:08 +01:00
$site = substr ( DI :: baseUrl (), strpos ( DI :: baseUrl (), '://' ));
2018-01-28 12:18:08 +01:00
$orig_body = $s ;
$new_body = '' ;
$img_start = strpos ( $orig_body , '[img' );
$img_st_close = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start ), ']' ) : false );
$img_len = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start + $img_st_close + 1 ), '[/img]' ) : false );
while (( $img_st_close !== false ) && ( $img_len !== false )) {
$img_st_close ++ ; // make it point to AFTER the closing bracket
$image = substr ( $orig_body , $img_start + $img_st_close , $img_len );
2020-06-28 20:22:29 +02:00
Logger :: info ( 'found photo' , [ 'image' => $image ]);
2018-01-28 12:18:08 +01:00
if ( stristr ( $image , $site . '/photo/' )) {
// Only embed locally hosted photos
$replace = false ;
$i = basename ( $image );
$i = str_replace ([ '.jpg' , '.png' , '.gif' ], [ '' , '' , '' ], $i );
$x = strpos ( $i , '-' );
if ( $x ) {
$res = substr ( $i , $x + 1 );
$i = substr ( $i , 0 , $x );
2018-12-11 20:03:29 +01:00
$photo = Photo :: getPhotoForUser ( $uid , $i , $res );
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $photo )) {
2018-01-28 12:18:08 +01:00
/*
* Check to see if we should replace this photo link with an embedded image
* 1. No need to do so if the photo is public
* 2. If there 's a contact-id provided, see if they' re in the access list
* for the photo . If so , embed it .
* 3. Otherwise , if we have an item , see if the item permissions match the photo
* permissions , regardless of order but first check to see if they ' re an exact
* match to save some processing overhead .
*/
2018-02-22 07:52:58 +01:00
if ( self :: hasPermissions ( $photo )) {
2018-01-28 12:18:08 +01:00
if ( $cid ) {
2018-02-22 07:52:58 +01:00
$recips = self :: enumeratePermissions ( $photo );
2018-01-28 12:18:08 +01:00
if ( in_array ( $cid , $recips )) {
$replace = true ;
}
} elseif ( $item ) {
2019-07-15 03:48:35 +02:00
if ( self :: samePermissions ( $uid , $item , $photo )) {
2018-01-28 12:18:08 +01:00
$replace = true ;
}
}
}
if ( $replace ) {
2018-12-11 20:03:29 +01:00
$photo_img = Photo :: getImageForPhoto ( $photo );
2018-01-28 12:18:08 +01:00
// If a custom width and height were specified, apply before embedding
if ( preg_match ( " / \ [img \ =([0-9]*)x([0-9]*) \ ]/is " , substr ( $orig_body , $img_start , $img_st_close ), $match )) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'scaling photo' );
2018-01-28 12:18:08 +01:00
$width = intval ( $match [ 1 ]);
$height = intval ( $match [ 2 ]);
2018-12-11 20:03:29 +01:00
$photo_img -> scaleDown ( max ( $width , $height ));
2018-01-28 12:18:08 +01:00
}
2018-12-11 20:03:29 +01:00
$data = $photo_img -> asString ();
$type = $photo_img -> getType ();
2020-06-28 20:22:29 +02:00
Logger :: info ( 'replacing photo' );
2018-01-28 12:18:08 +01:00
$image = 'data:' . $type . ';base64,' . base64_encode ( $data );
2020-06-28 20:22:29 +02:00
Logger :: debug ( 'replaced' , [ 'image' => $image ]);
2018-01-28 12:18:08 +01:00
}
}
}
}
$new_body = $new_body . substr ( $orig_body , 0 , $img_start + $img_st_close ) . $image . '[/img]' ;
$orig_body = substr ( $orig_body , $img_start + $img_st_close + $img_len + strlen ( '[/img]' ));
if ( $orig_body === false ) {
$orig_body = '' ;
}
$img_start = strpos ( $orig_body , '[img' );
$img_st_close = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start ), ']' ) : false );
$img_len = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start + $img_st_close + 1 ), '[/img]' ) : false );
}
$new_body = $new_body . $orig_body ;
return $new_body ;
}
2018-01-28 17:28:59 +01:00
private static function hasPermissions ( $obj )
{
2018-07-01 09:57:59 +02:00
return ! empty ( $obj [ 'allow_cid' ]) || ! empty ( $obj [ 'allow_gid' ]) ||
! empty ( $obj [ 'deny_cid' ]) || ! empty ( $obj [ 'deny_gid' ]);
2018-01-28 12:18:08 +01:00
}
2019-07-15 03:48:35 +02:00
private static function samePermissions ( $uid , $obj1 , $obj2 )
2018-01-28 17:28:59 +01:00
{
2018-01-28 12:18:08 +01:00
// first part is easy. Check that these are exactly the same.
if (( $obj1 [ 'allow_cid' ] == $obj2 [ 'allow_cid' ])
&& ( $obj1 [ 'allow_gid' ] == $obj2 [ 'allow_gid' ])
&& ( $obj1 [ 'deny_cid' ] == $obj2 [ 'deny_cid' ])
&& ( $obj1 [ 'deny_gid' ] == $obj2 [ 'deny_gid' ])) {
return true ;
}
// This is harder. Parse all the permissions and compare the resulting set.
$recipients1 = self :: enumeratePermissions ( $obj1 );
$recipients2 = self :: enumeratePermissions ( $obj2 );
sort ( $recipients1 );
sort ( $recipients2 );
/// @TODO Comparison of arrays, maybe use array_diff_assoc() here?
return ( $recipients1 == $recipients2 );
}
2019-08-17 05:59:48 +02:00
/**
* Returns an array of contact - ids that are allowed to see this object
*
* @ param array $obj Item array with at least uid , allow_cid , allow_gid , deny_cid and deny_gid
* @ param bool $check_dead Prunes unavailable contacts from the result
* @ return array
* @ throws \Exception
*/
public static function enumeratePermissions ( array $obj , bool $check_dead = false )
2018-01-28 17:28:59 +01:00
{
2019-12-15 23:28:01 +01:00
$aclFormater = DI :: aclFormatter ();
2019-10-23 00:40:14 +02:00
2019-11-01 14:13:29 +01:00
$allow_people = $aclFormater -> expand ( $obj [ 'allow_cid' ]);
$allow_groups = Group :: expand ( $obj [ 'uid' ], $aclFormater -> expand ( $obj [ 'allow_gid' ]), $check_dead );
$deny_people = $aclFormater -> expand ( $obj [ 'deny_cid' ]);
$deny_groups = Group :: expand ( $obj [ 'uid' ], $aclFormater -> expand ( $obj [ 'deny_gid' ]), $check_dead );
2018-01-28 12:18:08 +01:00
$recipients = array_unique ( array_merge ( $allow_people , $allow_groups ));
$deny = array_unique ( array_merge ( $deny_people , $deny_groups ));
$recipients = array_diff ( $recipients , $deny );
return $recipients ;
}
2018-01-28 17:28:59 +01:00
public static function expire ( $uid , $days , $network = " " , $force = false )
{
2018-01-28 12:18:08 +01:00
if ( ! $uid || ( $days < 1 )) {
return ;
}
2020-05-27 14:19:06 +02:00
$condition = [ " `uid` = ? AND NOT `deleted` AND `gravity` = ? " ,
2018-07-01 09:57:59 +02:00
$uid , GRAVITY_PARENT ];
2018-01-28 12:18:08 +01:00
/*
* $expire_network_only = save your own wall posts
* and just expire conversations started by others
*/
2020-01-18 16:50:57 +01:00
$expire_network_only = DI :: pConfig () -> get ( $uid , 'expire' , 'network_only' , false );
2018-07-01 09:57:59 +02:00
if ( $expire_network_only ) {
$condition [ 0 ] .= " AND NOT `wall` " ;
}
2018-01-28 12:18:08 +01:00
if ( $network != " " ) {
2018-07-01 09:57:59 +02:00
$condition [ 0 ] .= " AND `network` = ? " ;
$condition [] = $network ;
2018-01-28 12:18:08 +01:00
}
2019-07-07 23:30:33 +02:00
$condition [ 0 ] .= " AND `received` < UTC_TIMESTAMP() - INTERVAL ? DAY " ;
$condition [] = $days ;
2018-07-31 04:23:48 +02:00
$items = self :: select ([ 'file' , 'resource-id' , 'starred' , 'type' , 'id' , 'post-type' ], $condition );
2018-01-28 12:18:08 +01:00
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $items )) {
2018-01-28 12:18:08 +01:00
return ;
}
2020-01-18 16:50:57 +01:00
$expire_items = DI :: pConfig () -> get ( $uid , 'expire' , 'items' , true );
2018-01-28 12:18:08 +01:00
// Forcing expiring of items - but not notes and marked items
if ( $force ) {
$expire_items = true ;
}
2020-01-18 16:50:57 +01:00
$expire_notes = DI :: pConfig () -> get ( $uid , 'expire' , 'notes' , true );
$expire_starred = DI :: pConfig () -> get ( $uid , 'expire' , 'starred' , true );
$expire_photos = DI :: pConfig () -> get ( $uid , 'expire' , 'photos' , false );
2018-01-28 12:18:08 +01:00
2018-07-01 11:08:58 +02:00
$expired = 0 ;
2018-01-28 12:18:08 +01:00
2018-07-01 09:57:59 +02:00
while ( $item = Item :: fetch ( $items )) {
2018-01-28 12:18:08 +01:00
// don't expire filed items
2018-07-01 09:57:59 +02:00
if ( strpos ( $item [ 'file' ], '[' ) !== false ) {
2018-01-28 12:18:08 +01:00
continue ;
}
// Only expire posts, not photos and photo comments
2018-07-01 09:57:59 +02:00
if ( ! $expire_photos && strlen ( $item [ 'resource-id' ])) {
2018-01-28 12:18:08 +01:00
continue ;
2018-07-01 09:57:59 +02:00
} elseif ( ! $expire_starred && intval ( $item [ 'starred' ])) {
2018-01-28 12:18:08 +01:00
continue ;
2018-07-31 04:23:48 +02:00
} elseif ( ! $expire_notes && (( $item [ 'type' ] == 'note' ) || ( $item [ 'post-type' ] == Item :: PT_PERSONAL_NOTE ))) {
2018-01-28 12:18:08 +01:00
continue ;
2018-07-31 04:23:48 +02:00
} elseif ( ! $expire_items && ( $item [ 'type' ] != 'note' ) && ( $item [ 'post-type' ] != Item :: PT_PERSONAL_NOTE )) {
2018-01-28 12:18:08 +01:00
continue ;
}
2020-03-03 07:47:28 +01:00
self :: markForDeletionById ( $item [ 'id' ], PRIORITY_LOW );
2018-07-01 11:08:58 +02:00
++ $expired ;
2018-01-28 12:18:08 +01:00
}
2018-07-20 14:19:26 +02:00
DBA :: close ( $items );
2018-10-29 22:20:46 +01:00
Logger :: log ( 'User ' . $uid . " : expired $expired items; expire items: $expire_items , expire notes: $expire_notes , expire starred: $expire_starred , expire photos: $expire_photos " );
2018-01-28 12:18:08 +01:00
}
2018-01-28 17:28:59 +01:00
public static function firstPostDate ( $uid , $wall = false )
{
2018-02-22 07:52:58 +01:00
$condition = [ 'uid' => $uid , 'wall' => $wall , 'deleted' => false , 'visible' => true , 'moderated' => false ];
2019-07-07 23:30:33 +02:00
$params = [ 'order' => [ 'received' => false ]];
$thread = DBA :: selectFirst ( 'thread' , [ 'received' ], $condition , $params );
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $thread )) {
2019-07-07 23:30:33 +02:00
return substr ( DateTimeFormat :: local ( $thread [ 'received' ]), 0 , 10 );
2018-01-28 12:18:08 +01:00
}
return false ;
}
2018-02-01 20:14:11 +01:00
/**
2020-01-19 07:05:23 +01:00
* add / remove activity to an item
2018-02-01 20:14:11 +01:00
*
* Toggle activities as like , dislike , attend of an item
*
2020-08-09 20:42:25 +02:00
* @ param int $item_id
2018-02-01 20:14:11 +01:00
* @ param string $verb
2019-01-06 22:06:53 +01:00
* Activity verb . One of
* like , unlike , dislike , undislike , attendyes , unattendyes ,
2020-08-09 20:42:25 +02:00
* attendno , unattendno , attendmaybe , unattendmaybe ,
* announce , unannouce
2019-01-06 22:06:53 +01:00
* @ return bool
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
* @ hook 'post_local_end'
* array $arr
* 'post_id' => ID of posted item
2018-02-01 20:14:11 +01:00
*/
2020-08-09 20:42:25 +02:00
public static function performActivity ( int $item_id , string $verb , int $uid )
2018-02-01 20:14:11 +01:00
{
2020-08-09 20:42:25 +02:00
if ( empty ( $uid )) {
2018-02-01 20:14:11 +01:00
return false ;
}
2020-08-09 20:42:25 +02:00
Logger :: notice ( 'Start create activity' , [ 'verb' => $verb , 'item' => $item_id , 'user' => $uid ]);
2018-02-01 20:14:11 +01:00
2020-08-09 20:42:25 +02:00
$item = self :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $item_id ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2018-10-29 22:20:46 +01:00
Logger :: log ( 'like: unknown item ' . $item_id );
2018-02-01 20:14:11 +01:00
return false ;
}
2018-07-07 12:43:43 +02:00
$item_uri = $item [ 'uri' ];
2020-08-09 20:42:25 +02:00
if ( ! in_array ( $item [ 'uid' ], [ 0 , $uid ])) {
2018-02-01 20:14:11 +01:00
return false ;
}
2020-07-22 07:16:57 +02:00
if ( ! Item :: exists ([ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $uid ])) {
2020-07-23 05:26:54 +02:00
$stored = self :: storeForUserByUriId ( $item [ 'parent-uri-id' ], $uid );
2020-08-09 20:42:25 +02:00
if (( $item [ 'parent-uri-id' ] == $item [ 'uri-id' ]) && ! empty ( $stored )) {
$item = self :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $stored ]);
if ( ! DBA :: isResult ( $item )) {
Logger :: info ( 'Could not fetch just created item - should not happen' , [ 'stored' => $stored , 'uid' => $uid , 'item-uri' => $item_uri ]);
return false ;
}
}
2020-07-22 07:16:57 +02:00
}
2018-02-01 20:14:11 +01:00
// Retrieves the local post owner
2020-08-09 20:42:25 +02:00
$owner = User :: getOwnerDataById ( $uid );
if ( empty ( $owner )) {
Logger :: info ( 'Empty owner for user' , [ 'uid' => $uid ]);
2018-02-01 20:14:11 +01:00
return false ;
}
// Retrieve the current logged in user's public contact
2020-08-09 20:42:25 +02:00
$author_id = Contact :: getIdForURL ( $owner [ 'url' ]);
if ( empty ( $author_id )) {
Logger :: info ( 'Empty public contact' );
2018-02-01 20:14:11 +01:00
return false ;
}
2020-05-29 15:01:37 +02:00
$activity = null ;
2020-05-27 14:40:00 +02:00
switch ( $verb ) {
case 'like' :
case 'unlike' :
$activity = Activity :: LIKE ;
break ;
case 'dislike' :
case 'undislike' :
$activity = Activity :: DISLIKE ;
break ;
case 'attendyes' :
case 'unattendyes' :
$activity = Activity :: ATTEND ;
break ;
case 'attendno' :
case 'unattendno' :
$activity = Activity :: ATTENDNO ;
break ;
case 'attendmaybe' :
case 'unattendmaybe' :
$activity = Activity :: ATTENDMAYBE ;
break ;
case 'follow' :
case 'unfollow' :
$activity = Activity :: FOLLOW ;
break ;
2020-08-09 20:42:25 +02:00
case 'announce' :
case 'unannounce' :
$activity = Activity :: ANNOUNCE ;
break ;
2020-05-27 14:40:00 +02:00
default :
2020-08-09 20:42:25 +02:00
Logger :: notice ( 'unknown verb' , [ 'verb' => $verb , 'item' => $item_id ]);
2020-05-27 14:40:00 +02:00
return false ;
}
$mode = Strings :: startsWith ( $verb , 'un' ) ? 'delete' : 'create' ;
// Enable activity toggling instead of on/off
$event_verb_flag = $activity === Activity :: ATTEND || $activity === Activity :: ATTENDNO || $activity === Activity :: ATTENDMAYBE ;
2018-02-01 20:14:11 +01:00
// Look for an existing verb row
2020-05-27 14:40:00 +02:00
// Event participation activities are mutually exclusive, only one of them can exist at all times.
2018-02-01 20:14:11 +01:00
if ( $event_verb_flag ) {
2019-10-24 00:25:43 +02:00
$verbs = [ Activity :: ATTEND , Activity :: ATTENDNO , Activity :: ATTENDMAYBE ];
2018-07-07 12:43:43 +02:00
// Translate to the index based activity index
2020-05-26 07:18:50 +02:00
$vids = [];
2018-07-07 12:43:43 +02:00
foreach ( $verbs as $verb ) {
2020-05-26 07:18:50 +02:00
$vids [] = Verb :: getID ( $verb );
2018-07-07 12:43:43 +02:00
}
2018-02-01 20:14:11 +01:00
} else {
2020-05-26 07:18:50 +02:00
$vids = Verb :: getID ( $activity );
2018-06-27 21:37:13 +02:00
}
2018-02-01 20:14:11 +01:00
2020-05-26 07:18:50 +02:00
$condition = [ 'vid' => $vids , 'deleted' => false , 'gravity' => GRAVITY_ACTIVITY ,
2018-07-07 12:43:43 +02:00
'author-id' => $author_id , 'uid' => $item [ 'uid' ], 'thr-parent' => $item_uri ];
2018-06-27 21:37:13 +02:00
$like_item = self :: selectFirst ([ 'id' , 'guid' , 'verb' ], $condition );
2018-02-01 20:14:11 +01:00
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $like_item )) {
2020-05-27 14:40:00 +02:00
/**
* Truth table for existing activities
*
* | Inputs || Outputs |
* |----------------------------||-------------------|
* | Mode | Event | Same verb || Delete ? | Return ? |
* |--------|-------|-----------||---------|---------|
* | create | Yes | Yes || No | Yes |
* | create | Yes | No || Yes | No |
* | create | No | Yes || No | Yes |
* | create | No | No || N / A† |
* | delete | Yes | Yes || Yes | N / A‡ |
* | delete | Yes | No || No | N / A‡ |
* | delete | No | Yes || Yes | N / A‡ |
* | delete | No | No || N / A† |
* |--------|-------|-----------||---------|---------|
* | A | B | C || A xor C | ! B or C |
*
* † Can 't happen: It' s impossible to find an existing non - event activity without
* the same verb because we are only looking for this single verb .
*
* ‡ The " mode = delete " is returning early whether an existing activity was found or not .
*/
if ( $mode == 'create' xor $like_item [ 'verb' ] == $activity ) {
self :: markForDeletionById ( $like_item [ 'id' ]);
}
2018-02-01 20:14:11 +01:00
if ( ! $event_verb_flag || $like_item [ 'verb' ] == $activity ) {
return true ;
}
}
2020-05-27 14:40:00 +02:00
// No need to go further if we aren't creating anything
if ( $mode == 'delete' ) {
2018-02-01 20:14:11 +01:00
return true ;
}
2019-10-25 00:10:20 +02:00
$objtype = $item [ 'resource-id' ] ? Activity\ObjectType :: IMAGE : Activity\ObjectType :: NOTE ;
2018-02-01 20:14:11 +01:00
$new_item = [
2018-09-27 13:52:15 +02:00
'guid' => System :: createUUID (),
2018-06-16 08:44:19 +02:00
'uri' => self :: newURI ( $item [ 'uid' ]),
2018-02-01 20:14:11 +01:00
'uid' => $item [ 'uid' ],
2020-08-09 20:42:25 +02:00
'contact-id' => $owner [ 'id' ],
2018-02-01 20:14:11 +01:00
'wall' => $item [ 'wall' ],
'origin' => 1 ,
2018-08-11 22:40:44 +02:00
'network' => Protocol :: DFRN ,
2018-06-27 20:09:33 +02:00
'gravity' => GRAVITY_ACTIVITY ,
2018-02-01 20:14:11 +01:00
'parent' => $item [ 'id' ],
'parent-uri' => $item [ 'uri' ],
'thr-parent' => $item [ 'uri' ],
2018-10-06 10:51:52 +02:00
'owner-id' => $author_id ,
2018-07-07 12:43:43 +02:00
'author-id' => $author_id ,
'body' => $activity ,
2018-02-01 20:14:11 +01:00
'verb' => $activity ,
'object-type' => $objtype ,
'allow_cid' => $item [ 'allow_cid' ],
'allow_gid' => $item [ 'allow_gid' ],
'deny_cid' => $item [ 'deny_cid' ],
'deny_gid' => $item [ 'deny_gid' ],
'visible' => 1 ,
'unseen' => 1 ,
];
2018-10-29 22:15:37 +01:00
$signed = Diaspora :: createLikeSignature ( $uid , $new_item );
2018-10-27 13:09:23 +02:00
if ( ! empty ( $signed )) {
2018-10-27 16:35:22 +02:00
$new_item [ 'diaspora_signed_text' ] = json_encode ( $signed );
2018-10-27 13:09:23 +02:00
}
2018-02-06 13:40:22 +01:00
$new_item_id = self :: insert ( $new_item );
2018-02-01 20:14:11 +01:00
2018-02-06 13:40:22 +01:00
// If the parent item isn't visible then set it to visible
if ( ! $item [ 'visible' ]) {
self :: update ([ 'visible' => true ], [ 'id' => $item [ 'id' ]]);
2018-02-01 20:14:11 +01:00
}
$new_item [ 'id' ] = $new_item_id ;
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'post_local_end' , $new_item );
2018-02-01 20:14:11 +01:00
return true ;
}
2018-02-05 13:37:32 +01:00
2018-02-05 14:09:39 +01:00
private static function addThread ( $itemid , $onlyshadow = false )
{
2018-02-22 07:52:58 +01:00
$fields = [ 'uid' , 'created' , 'edited' , 'commented' , 'received' , 'changed' , 'wall' , 'private' , 'pubmail' ,
2020-05-28 23:44:55 +02:00
'moderated' , 'visible' , 'starred' , 'contact-id' , 'post-type' , 'uri-id' ,
2018-02-22 07:52:58 +01:00
'deleted' , 'origin' , 'forum_mode' , 'mention' , 'network' , 'author-id' , 'owner-id' ];
$condition = [ " `id` = ? AND (`parent` = ? OR `parent` = 0) " , $itemid , $itemid ];
2018-06-30 23:15:24 +02:00
$item = self :: selectFirst ( $fields , $condition );
2018-02-06 13:40:22 +01:00
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2018-02-05 13:37:32 +01:00
return ;
2018-02-05 14:09:39 +01:00
}
2018-02-06 13:40:22 +01:00
2018-02-05 13:37:32 +01:00
$item [ 'iid' ] = $itemid ;
2018-02-06 13:40:22 +01:00
2018-02-05 13:37:32 +01:00
if ( ! $onlyshadow ) {
2018-07-20 14:19:26 +02:00
$result = DBA :: insert ( 'thread' , $item );
2018-02-05 13:37:32 +01:00
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Add thread' , [ 'item' => $itemid , 'result' => $result ]);
2018-02-05 13:37:32 +01:00
}
}
2018-02-06 13:40:22 +01:00
private static function updateThread ( $itemid , $setmention = false )
2018-02-05 14:09:39 +01:00
{
2018-07-19 15:52:05 +02:00
$fields = [ 'uid' , 'guid' , 'created' , 'edited' , 'commented' , 'received' , 'changed' , 'post-type' ,
2020-05-28 23:44:55 +02:00
'wall' , 'private' , 'pubmail' , 'moderated' , 'visible' , 'starred' , 'contact-id' , 'uri-id' ,
2018-06-25 08:33:12 +02:00
'deleted' , 'origin' , 'forum_mode' , 'network' , 'author-id' , 'owner-id' ];
2018-02-06 13:40:22 +01:00
2020-08-16 13:57:56 +02:00
$item = self :: selectFirst ( $fields , [ 'id' => $itemid , 'gravity' => GRAVITY_PARENT ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2018-02-05 13:37:32 +01:00
return ;
}
2018-02-06 13:40:22 +01:00
2018-02-05 13:37:32 +01:00
if ( $setmention ) {
$item [ " mention " ] = 1 ;
}
2018-02-06 13:40:22 +01:00
2018-02-21 22:08:37 +01:00
$fields = [];
2018-02-06 13:40:22 +01:00
2018-02-21 22:08:37 +01:00
foreach ( $item as $field => $data ) {
2018-06-25 08:33:12 +02:00
if ( ! in_array ( $field , [ " guid " ])) {
2018-02-21 22:08:37 +01:00
$fields [ $field ] = $data ;
2018-02-05 13:37:32 +01:00
}
2018-02-21 22:08:37 +01:00
}
2018-02-06 13:40:22 +01:00
2018-07-20 14:19:26 +02:00
$result = DBA :: update ( 'thread' , $fields , [ 'iid' => $itemid ]);
2018-02-06 13:40:22 +01:00
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Update thread' , [ 'item' => $itemid , 'guid' => $item [ " guid " ], 'result' => $result ]);
2018-02-05 13:37:32 +01:00
}
2018-02-06 13:40:22 +01:00
private static function deleteThread ( $itemid , $itemuri = " " )
2018-02-05 14:09:39 +01:00
{
2018-07-20 14:19:26 +02:00
$item = DBA :: selectFirst ( 'thread' , [ 'uid' ], [ 'iid' => $itemid ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'No thread found' , [ 'id' => $itemid ]);
2018-02-05 13:37:32 +01:00
return ;
}
2018-02-06 13:40:22 +01:00
2018-08-19 14:46:11 +02:00
$result = DBA :: delete ( 'thread' , [ 'iid' => $itemid ], [ 'cascade' => false ]);
2018-02-06 13:40:22 +01:00
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Deleted thread' , [ 'item' => $itemid , 'result' => $result ]);
2018-02-06 13:40:22 +01:00
2018-02-05 13:37:32 +01:00
if ( $itemuri != " " ) {
2018-02-22 07:52:58 +01:00
$condition = [ " `uri` = ? AND NOT `deleted` AND NOT (`uid` IN (?, 0)) " , $itemuri , $item [ " uid " ]];
2018-06-27 21:37:13 +02:00
if ( ! self :: exists ( $condition )) {
2018-07-20 14:19:26 +02:00
DBA :: delete ( 'item' , [ 'uri' => $itemuri , 'uid' => 0 ]);
2020-03-01 16:36:54 +01:00
Logger :: debug ( 'Deleted shadow item' , [ 'id' => $itemid , 'uri' => $itemuri ]);
2018-02-05 13:37:32 +01:00
}
}
}
2018-10-17 21:30:41 +02:00
2019-09-28 07:37:24 +02:00
public static function getPermissionsSQLByUserId ( $owner_id )
2018-10-17 21:30:41 +02:00
{
$local_user = local_user ();
2019-09-28 11:36:41 +02:00
$remote_user = Session :: getRemoteContactID ( $owner_id );
2019-09-27 07:49:23 +02:00
2018-10-17 21:30:41 +02:00
/*
* Construct permissions
*
* default permissions - anonymous user
*/
2020-03-02 08:57:23 +01:00
$sql = sprintf ( " AND `item`.`private` != %d " , self :: PRIVATE );
2018-10-17 21:30:41 +02:00
// Profile owner - everything is visible
if ( $local_user && ( $local_user == $owner_id )) {
$sql = '' ;
} elseif ( $remote_user ) {
/*
* Authenticated visitor . Unless pre - verified ,
* check that the contact belongs to this $owner_id
* and load the groups the visitor belongs to .
* If pre - verified , the caller is expected to have already
* done this and passed the groups into this function .
*/
2019-09-28 07:37:24 +02:00
$set = PermissionSet :: get ( $owner_id , $remote_user );
2018-10-17 21:30:41 +02:00
if ( ! empty ( $set )) {
2020-03-02 08:57:23 +01:00
$sql_set = sprintf ( " OR (`item`.`private` = %d AND `item`.`wall` AND `item`.`psid` IN ( " , self :: PRIVATE ) . implode ( ',' , $set ) . " )) " ;
2018-10-17 21:30:41 +02:00
} else {
$sql_set = '' ;
}
2020-03-02 08:57:23 +01:00
$sql = sprintf ( " AND (`item`.`private` != %d " , self :: PRIVATE ) . $sql_set . " ) " ;
2018-10-17 21:30:41 +02:00
}
return $sql ;
}
2018-11-07 03:12:41 +01:00
/**
* get translated item type
*
2019-01-06 22:06:53 +01:00
* @ param $item
2018-11-07 03:12:41 +01:00
* @ return string
*/
public static function postType ( $item )
{
if ( ! empty ( $item [ 'event-id' ])) {
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'event' );
2018-11-07 03:12:41 +01:00
} elseif ( ! empty ( $item [ 'resource-id' ])) {
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'photo' );
2020-05-27 14:19:06 +02:00
} elseif ( $item [ 'gravity' ] == GRAVITY_ACTIVITY ) {
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'activity' );
2020-05-27 14:19:06 +02:00
} elseif ( $item [ 'gravity' ] == GRAVITY_COMMENT ) {
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'comment' );
2018-11-07 03:12:41 +01:00
}
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'post' );
2018-11-07 03:12:41 +01:00
}
/**
* Sets the " rendered-html " field of the provided item
*
* Body is preserved to avoid side - effects as we modify it just - in - time for spoilers and private image links
*
* @ param array $item
* @ param bool $update
*
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-11-07 03:12:41 +01:00
* @ todo Remove reference , simply return " rendered-html " and " rendered-hash "
*/
public static function putInCache ( & $item , $update = false )
{
$body = $item [ " body " ];
2019-10-16 14:35:14 +02:00
$rendered_hash = $item [ 'rendered-hash' ] ? ? '' ;
$rendered_html = $item [ 'rendered-html' ] ? ? '' ;
2018-11-07 03:12:41 +01:00
if ( $rendered_hash == ''
|| $rendered_html == " "
|| $rendered_hash != hash ( " md5 " , $item [ " body " ])
2020-01-19 21:21:13 +01:00
|| DI :: config () -> get ( " system " , " ignore_cache " )
2018-11-07 03:12:41 +01:00
) {
2019-10-23 21:38:51 +02:00
self :: addRedirToImageTags ( $item );
2018-11-07 03:12:41 +01:00
2019-10-23 00:58:13 +02:00
$item [ " rendered-html " ] = BBCode :: convert ( $item [ " body " ]);
2018-11-07 03:12:41 +01:00
$item [ " rendered-hash " ] = hash ( " md5 " , $item [ " body " ]);
$hook_data = [ 'item' => $item , 'rendered-html' => $item [ 'rendered-html' ], 'rendered-hash' => $item [ 'rendered-hash' ]];
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'put_item_in_cache' , $hook_data );
2018-11-07 03:12:41 +01:00
$item [ 'rendered-html' ] = $hook_data [ 'rendered-html' ];
$item [ 'rendered-hash' ] = $hook_data [ 'rendered-hash' ];
unset ( $hook_data );
// Force an update if the generated values differ from the existing ones
if ( $rendered_hash != $item [ " rendered-hash " ]) {
$update = true ;
}
// Only compare the HTML when we forcefully ignore the cache
2020-01-19 21:21:13 +01:00
if ( DI :: config () -> get ( " system " , " ignore_cache " ) && ( $rendered_html != $item [ " rendered-html " ])) {
2018-11-07 03:12:41 +01:00
$update = true ;
}
if ( $update && ! empty ( $item [ " id " ])) {
self :: update (
[
'rendered-html' => $item [ " rendered-html " ],
'rendered-hash' => $item [ " rendered-hash " ]
],
[ 'id' => $item [ " id " ]]
);
}
}
$item [ " body " ] = $body ;
}
2019-10-23 00:20:44 +02:00
/**
2020-01-19 07:05:23 +01:00
* Find any non - embedded images in private items and add redir links to them
2019-10-23 00:20:44 +02:00
*
* @ param array & $item The field array of an item row
*/
2019-10-23 21:38:51 +02:00
private static function addRedirToImageTags ( array & $item )
2019-10-23 00:20:44 +02:00
{
2019-12-15 22:34:11 +01:00
$app = DI :: app ();
2019-10-23 00:20:44 +02:00
$matches = [];
$cnt = preg_match_all ( '|\[img\](http[^\[]*?/photo/[a-fA-F0-9]+?(-[0-9]\.[\w]+?)?)\[\/img\]|' , $item [ 'body' ], $matches , PREG_SET_ORDER );
if ( $cnt ) {
foreach ( $matches as $mtch ) {
if ( strpos ( $mtch [ 1 ], '/redir' ) !== false ) {
continue ;
}
2020-03-02 08:57:23 +01:00
if (( local_user () == $item [ 'uid' ]) && ( $item [ 'private' ] == self :: PRIVATE ) && ( $item [ 'contact-id' ] != $app -> contact [ 'id' ]) && ( $item [ 'network' ] == Protocol :: DFRN )) {
2019-10-23 00:20:44 +02:00
$img_url = 'redir/' . $item [ 'contact-id' ] . '?url=' . urlencode ( $mtch [ 1 ]);
$item [ 'body' ] = str_replace ( $mtch [ 0 ], '[img]' . $img_url . '[/img]' , $item [ 'body' ]);
}
}
}
}
2018-11-07 03:12:41 +01:00
/**
2020-01-19 07:05:23 +01:00
* Given an item array , convert the body element from bbcode to html and add smilie icons .
2018-11-07 03:12:41 +01:00
* If attach is true , also add icons for item attachments .
*
* @ param array $item
* @ param boolean $attach
* @ param boolean $is_preview
* @ return string item body html
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
* @ hook prepare_body_init item array before any work
* @ hook prepare_body_content_filter ( 'item' => item array , 'filter_reasons' => string array ) before first bbcode to html
* @ hook prepare_body ( 'item' => item array , 'html' => body string , 'is_preview' => boolean , 'filter_reasons' => string array ) after first bbcode to html
* @ hook prepare_body_final ( 'item' => item array , 'html' => body string ) after attach icons and blockquote special case handling ( spoiler , author )
2018-11-07 03:12:41 +01:00
*/
public static function prepareBody ( array & $item , $attach = false , $is_preview = false )
{
2019-12-15 22:34:11 +01:00
$a = DI :: app ();
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'prepare_body_init' , $item );
2018-11-07 03:12:41 +01:00
// In order to provide theme developers more possibilities, event items
// are treated differently.
2019-10-25 00:10:20 +02:00
if ( $item [ 'object-type' ] === Activity\ObjectType :: EVENT && isset ( $item [ 'event-id' ])) {
2018-11-07 03:12:41 +01:00
$ev = Event :: getItemHTML ( $item );
return $ev ;
}
2020-05-01 08:01:22 +02:00
$tags = Tag :: populateFromItem ( $item );
2018-11-07 03:12:41 +01:00
$item [ 'tags' ] = $tags [ 'tags' ];
$item [ 'hashtags' ] = $tags [ 'hashtags' ];
$item [ 'mentions' ] = $tags [ 'mentions' ];
// Compile eventual content filter reasons
$filter_reasons = [];
if ( ! $is_preview && public_contact () != $item [ 'author-id' ]) {
2020-01-18 16:50:57 +01:00
if ( ! empty ( $item [ 'content-warning' ]) && ( ! local_user () || ! DI :: pConfig () -> get ( local_user (), 'system' , 'disable_cw' , false ))) {
2020-01-18 20:52:34 +01:00
$filter_reasons [] = DI :: l10n () -> t ( 'Content warning: %s' , $item [ 'content-warning' ]);
2018-11-07 03:12:41 +01:00
}
$hook_data = [
'item' => $item ,
'filter_reasons' => $filter_reasons
];
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'prepare_body_content_filter' , $hook_data );
2018-11-07 03:12:41 +01:00
$filter_reasons = $hook_data [ 'filter_reasons' ];
unset ( $hook_data );
}
// Update the cached values if there is no "zrl=..." on the links.
2019-09-28 20:09:11 +02:00
$update = ( ! Session :: isAuthenticated () && ( $item [ " uid " ] == 0 ));
2018-11-07 03:12:41 +01:00
// Or update it if the current viewer is the intented viewer.
if (( $item [ " uid " ] == local_user ()) && ( $item [ " uid " ] != 0 )) {
$update = true ;
}
self :: putInCache ( $item , $update );
$s = $item [ " rendered-html " ];
$hook_data = [
'item' => $item ,
'html' => $s ,
'preview' => $is_preview ,
'filter_reasons' => $filter_reasons
];
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'prepare_body' , $hook_data );
2018-11-07 03:12:41 +01:00
$s = $hook_data [ 'html' ];
unset ( $hook_data );
if ( ! $attach ) {
// Replace the blockquotes with quotes that are used in mails.
$mailquote = '<blockquote type="cite" class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">' ;
$s = str_replace ([ '<blockquote>' , '<blockquote class="spoiler">' , '<blockquote class="author">' ], [ $mailquote , $mailquote , $mailquote ], $s );
return $s ;
}
$as = '' ;
$vhead = false ;
$matches = [];
preg_match_all ( '|\[attach\]href=\"(.*?)\" length=\"(.*?)\" type=\"(.*?)\"(?: title=\"(.*?)\")?|' , $item [ 'attach' ], $matches , PREG_SET_ORDER );
foreach ( $matches as $mtch ) {
$mime = $mtch [ 3 ];
$the_url = Contact :: magicLinkById ( $item [ 'author-id' ], $mtch [ 1 ]);
if ( strpos ( $mime , 'video' ) !== false ) {
if ( ! $vhead ) {
$vhead = true ;
2019-12-30 20:02:09 +01:00
DI :: page ()[ 'htmlhead' ] .= Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'videos_head.tpl' ));
2018-11-07 03:12:41 +01:00
}
$url_parts = explode ( '/' , $the_url );
$id = end ( $url_parts );
$as .= Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'video_top.tpl' ), [
'$video' => [
'id' => $id ,
2020-01-18 20:52:34 +01:00
'title' => DI :: l10n () -> t ( 'View Video' ),
2018-11-07 03:12:41 +01:00
'src' => $the_url ,
'mime' => $mime ,
],
]);
}
$filetype = strtolower ( substr ( $mime , 0 , strpos ( $mime , '/' )));
if ( $filetype ) {
$filesubtype = strtolower ( substr ( $mime , strpos ( $mime , '/' ) + 1 ));
$filesubtype = str_replace ( '.' , '-' , $filesubtype );
} else {
$filetype = 'unkn' ;
$filesubtype = 'unkn' ;
}
2019-10-16 14:35:14 +02:00
$title = Strings :: escapeHtml ( trim (( $mtch [ 4 ] ? ? '' ) ? : $mtch [ 1 ]));
2020-01-18 20:52:34 +01:00
$title .= ' ' . $mtch [ 2 ] . ' ' . DI :: l10n () -> t ( 'bytes' );
2018-11-07 03:12:41 +01:00
$icon = '<div class="attachtype icon s22 type-' . $filetype . ' subtype-' . $filesubtype . '"></div>' ;
2020-02-25 02:07:34 +01:00
$as .= '<a href="' . strip_tags ( $the_url ) . '" title="' . $title . '" class="attachlink" target="_blank" rel="noopener noreferrer" >' . $icon . '</a>' ;
2018-11-07 03:12:41 +01:00
}
if ( $as != '' ) {
$s .= '<div class="body-attach">' . $as . '<div class="clear"></div></div>' ;
}
// Map.
2018-11-30 15:06:22 +01:00
if ( strpos ( $s , '<div class="map">' ) !== false && ! empty ( $item [ 'coord' ])) {
2018-11-07 03:12:41 +01:00
$x = Map :: byCoordinates ( trim ( $item [ 'coord' ]));
if ( $x ) {
$s = preg_replace ( '/\<div class\=\"map\"\>/' , '$0' . $x , $s );
}
}
// Replace friendica image url size with theme preference.
2018-11-07 20:16:59 +01:00
if ( ! empty ( $a -> theme_info [ 'item_image_size' ])) {
2018-11-07 03:12:41 +01:00
$ps = $a -> theme_info [ 'item_image_size' ];
$s = preg_replace ( '|(<img[^>]+src="[^"]+/photo/[0-9a-f]+)-[0-9]|' , " $ 1- " . $ps , $s );
}
$s = HTML :: applyContentFilter ( $s , $filter_reasons );
$hook_data = [ 'item' => $item , 'html' => $s ];
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'prepare_body_final' , $hook_data );
2018-11-07 03:12:41 +01:00
return $hook_data [ 'html' ];
}
2018-11-07 13:19:39 +01:00
/**
* get private link for item
2019-01-06 22:06:53 +01:00
*
2018-11-07 13:19:39 +01:00
* @ param array $item
* @ return boolean | array False if item has not plink , otherwise array ( 'href' => plink url , 'title' => translated title )
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-11-07 13:19:39 +01:00
*/
public static function getPlink ( $item )
{
2020-06-19 13:05:58 +02:00
if ( local_user ()) {
2018-11-07 13:19:39 +01:00
$ret = [
2018-11-07 20:16:59 +01:00
'href' => " display/ " . $item [ 'guid' ],
'orig' => " display/ " . $item [ 'guid' ],
2020-01-18 20:52:34 +01:00
'title' => DI :: l10n () -> t ( 'View on separate page' ),
'orig_title' => DI :: l10n () -> t ( 'view on separate page' ),
2018-11-07 20:16:59 +01:00
];
2018-11-07 13:19:39 +01:00
2018-11-07 20:16:59 +01:00
if ( ! empty ( $item [ 'plink' ])) {
2019-12-16 00:36:31 +01:00
$ret [ " href " ] = DI :: baseUrl () -> remove ( $item [ 'plink' ]);
2020-01-18 20:52:34 +01:00
$ret [ " title " ] = DI :: l10n () -> t ( 'link to source' );
2018-11-07 13:19:39 +01:00
}
2020-03-02 08:57:23 +01:00
} elseif ( ! empty ( $item [ 'plink' ]) && ( $item [ 'private' ] != self :: PRIVATE )) {
2018-11-07 13:19:39 +01:00
$ret = [
2018-11-07 20:16:59 +01:00
'href' => $item [ 'plink' ],
'orig' => $item [ 'plink' ],
2020-01-18 20:52:34 +01:00
'title' => DI :: l10n () -> t ( 'link to source' ),
2018-11-07 20:16:59 +01:00
];
2018-11-07 13:19:39 +01:00
} else {
$ret = [];
}
return $ret ;
}
2019-03-14 19:44:41 +01:00
/**
* Is the given item array a post that is sent as starting post to a forum ?
*
* @ param array $item
* @ param array $owner
*
* @ return boolean " true " when it is a forum post
*/
public static function isForumPost ( array $item , array $owner = [])
{
if ( empty ( $owner )) {
$owner = User :: getOwnerDataById ( $item [ 'uid' ]);
if ( empty ( $owner )) {
return false ;
}
}
if (( $item [ 'author-id' ] == $item [ 'owner-id' ]) ||
( $owner [ 'id' ] == $item [ 'contact-id' ]) ||
( $item [ 'uri' ] != $item [ 'parent-uri' ]) ||
$item [ 'origin' ]) {
return false ;
}
return Contact :: isForum ( $item [ 'contact-id' ]);
}
2019-07-18 08:11:02 +02:00
/**
* Search item id for given URI or plink
*
* @ param string $uri
* @ param integer $uid
*
* @ return integer item id
*/
public static function searchByLink ( $uri , $uid = 0 )
{
$ssl_uri = str_replace ( 'http://' , 'https://' , $uri );
$uris = [ $uri , $ssl_uri , Strings :: normaliseLink ( $uri )];
$item = DBA :: selectFirst ( 'item' , [ 'id' ], [ 'uri' => $uris , 'uid' => $uid ]);
if ( DBA :: isResult ( $item )) {
return $item [ 'id' ];
}
$itemcontent = DBA :: selectFirst ( 'item-content' , [ 'uri-id' ], [ 'plink' => $uris ]);
if ( ! DBA :: isResult ( $itemcontent )) {
return 0 ;
}
$itemuri = DBA :: selectFirst ( 'item-uri' , [ 'uri' ], [ 'id' => $itemcontent [ 'uri-id' ]]);
if ( ! DBA :: isResult ( $itemuri )) {
return 0 ;
}
$item = DBA :: selectFirst ( 'item' , [ 'id' ], [ 'uri' => $itemuri [ 'uri' ], 'uid' => $uid ]);
if ( DBA :: isResult ( $item )) {
return $item [ 'id' ];
}
return 0 ;
}
2020-02-02 20:59:14 +01:00
/**
* Return the URI for a link to the post
*
* @ param string $uri URI or link to post
*
* @ return string URI
*/
public static function getURIByLink ( string $uri )
{
$ssl_uri = str_replace ( 'http://' , 'https://' , $uri );
$uris = [ $uri , $ssl_uri , Strings :: normaliseLink ( $uri )];
$item = DBA :: selectFirst ( 'item' , [ 'uri' ], [ 'uri' => $uris ]);
if ( DBA :: isResult ( $item )) {
return $item [ 'uri' ];
}
$itemcontent = DBA :: selectFirst ( 'item-content' , [ 'uri-id' ], [ 'plink' => $uris ]);
if ( ! DBA :: isResult ( $itemcontent )) {
return '' ;
}
$itemuri = DBA :: selectFirst ( 'item-uri' , [ 'uri' ], [ 'id' => $itemcontent [ 'uri-id' ]]);
if ( DBA :: isResult ( $itemuri )) {
return $itemuri [ 'uri' ];
}
return '' ;
}
2019-07-18 08:11:02 +02:00
/**
* Fetches item for given URI or plink
*
* @ param string $uri
* @ param integer $uid
*
* @ return integer item id
*/
2020-03-07 13:39:09 +01:00
public static function fetchByLink ( string $uri , int $uid = 0 )
2019-07-18 08:11:02 +02:00
{
2020-07-29 07:12:16 +02:00
Logger :: info ( 'Trying to fetch link' , [ 'uid' => $uid , 'uri' => $uri ]);
2019-07-18 08:11:02 +02:00
$item_id = self :: searchByLink ( $uri , $uid );
if ( ! empty ( $item_id )) {
2020-07-29 07:12:16 +02:00
Logger :: info ( 'Link found' , [ 'uid' => $uid , 'uri' => $uri , 'id' => $item_id ]);
2019-07-18 08:11:02 +02:00
return $item_id ;
}
2020-01-20 23:30:34 +01:00
if ( $fetched_uri = ActivityPub\Processor :: fetchMissingActivity ( $uri )) {
$item_id = self :: searchByLink ( $fetched_uri , $uid );
2019-07-21 09:37:50 +02:00
} else {
$item_id = Diaspora :: fetchByURL ( $uri );
}
2019-07-18 08:20:54 +02:00
2019-07-18 08:11:02 +02:00
if ( ! empty ( $item_id )) {
2020-07-29 07:12:16 +02:00
Logger :: info ( 'Link fetched' , [ 'uid' => $uid , 'uri' => $uri , 'id' => $item_id ]);
2019-07-18 08:11:02 +02:00
return $item_id ;
}
2020-07-29 07:12:16 +02:00
Logger :: info ( 'Link not found' , [ 'uid' => $uid , 'uri' => $uri ]);
2019-07-18 08:11:02 +02:00
return 0 ;
}
2019-12-04 23:57:09 +01:00
/**
* Return share data from an item array ( if the item is shared item )
* We are providing the complete Item array , because at some time in the future
* we hopefully will define these values not in the body anymore but in some item fields .
* This function is meant to replace all similar functions in the system .
*
* @ param array $item
*
* @ return array with share information
*/
public static function getShareArray ( $item )
{
if ( ! preg_match ( " /(.*?) \ [share(.*?) \ ] \ s?(.*?) \ s? \ [ \ /share \ ] \ s?/ism " , $item [ 'body' ], $matches )) {
return [];
}
$attribute_string = $matches [ 2 ];
$attributes = [ 'comment' => trim ( $matches [ 1 ]), 'shared' => trim ( $matches [ 3 ])];
2019-12-05 06:28:28 +01:00
foreach ([ 'author' , 'profile' , 'avatar' , 'guid' , 'posted' , 'link' ] as $field ) {
if ( preg_match ( " / $field =([' \" ])(.+?) \\ 1/ism " , $attribute_string , $matches )) {
$attributes [ $field ] = trim ( html_entity_decode ( $matches [ 2 ] ? ? '' , ENT_QUOTES , 'UTF-8' ));
}
2019-12-04 23:57:09 +01:00
}
return $attributes ;
}
/**
* Fetch item information for shared items from the original items and adds it .
*
* @ param array $item
*
* @ return array item array with data from the original item
*/
2020-03-07 13:39:09 +01:00
public static function addShareDataFromOriginal ( array $item )
2019-12-04 23:57:09 +01:00
{
$shared = self :: getShareArray ( $item );
if ( empty ( $shared )) {
return $item ;
}
// Real reshares always have got a GUID.
if ( empty ( $shared [ 'guid' ])) {
return $item ;
}
$uid = $item [ 'uid' ] ? ? 0 ;
// first try to fetch the item via the GUID. This will work for all reshares that had been created on this system
$shared_item = self :: selectFirst ([ 'title' , 'body' , 'attach' ], [ 'guid' => $shared [ 'guid' ], 'uid' => [ 0 , $uid ]]);
if ( ! DBA :: isResult ( $shared_item )) {
2020-03-07 02:49:43 +01:00
if ( empty ( $shared [ 'link' ])) {
return $item ;
}
2019-12-04 23:57:09 +01:00
// Otherwhise try to find (and possibly fetch) the item via the link. This should work for Diaspora and ActivityPub posts
2020-03-07 13:39:09 +01:00
$id = self :: fetchByLink ( $shared [ 'link' ] ? ? '' , $uid );
2019-12-04 23:57:09 +01:00
if ( empty ( $id )) {
2020-03-07 13:39:09 +01:00
Logger :: info ( 'Original item not found' , [ 'url' => $shared [ 'link' ] ? ? '' , 'callstack' => System :: callstack ()]);
2019-12-04 23:57:09 +01:00
return $item ;
}
$shared_item = self :: selectFirst ([ 'title' , 'body' , 'attach' ], [ 'id' => $id ]);
if ( ! DBA :: isResult ( $shared_item )) {
return $item ;
}
2019-12-05 06:28:28 +01:00
Logger :: info ( 'Got shared data from url' , [ 'url' => $shared [ 'link' ], 'callstack' => System :: callstack ()]);
} else {
Logger :: info ( 'Got shared data from guid' , [ 'guid' => $shared [ 'guid' ], 'callstack' => System :: callstack ()]);
2019-12-04 23:57:09 +01:00
}
2019-12-05 00:49:07 +01:00
if ( ! empty ( $shared_item [ 'title' ])) {
$body = '[h3]' . $shared_item [ 'title' ] . " [/h3] \n " . $shared_item [ 'body' ];
unset ( $shared_item [ 'title' ]);
} else {
$body = $shared_item [ 'body' ];
}
2019-12-07 22:05:14 +01:00
$item [ 'body' ] = preg_replace ( " / \ [share ([^ \ [ \ ]]*) \ ].* \ [ \ /share \ ]/ism " , '[share $1]' . $body . '[/share]' , $item [ 'body' ]);
2019-12-04 23:57:09 +01:00
unset ( $shared_item [ 'body' ]);
return array_merge ( $item , $shared_item );
}
2018-01-09 22:13:45 +01:00
}