friendica_2021.01_tupambae_.../mod/photo.php

143 lines
3 KiB
PHP
Raw Normal View History

2010-07-02 01:48:07 +02:00
<?php
require_once('include/security.php');
2010-07-02 01:48:07 +02:00
function photo_init(&$a) {
switch($a->argc) {
case 4:
$person = $a->argv[3];
$customres = intval($a->argv[2]);
$type = $a->argv[1];
break;
case 3:
$person = $a->argv[2];
$type = $a->argv[1];
break;
case 2:
$photo = $a->argv[1];
break;
case 1:
default:
killme();
2010-11-08 00:46:49 +01:00
// NOTREACHED
}
2010-11-05 07:50:32 +01:00
$default = 'images/default-profile.jpg';
2010-11-01 00:38:22 +01:00
if(isset($type)) {
/**
* Profile photos
*/
switch($type) {
case 'profile':
case 'custom':
$resolution = 4;
break;
2010-11-05 07:50:32 +01:00
case 'micro':
$resolution = 6;
$default = 'images/default-profile-mm.jpg';
break;
case 'avatar':
default:
$resolution = 5;
2010-11-05 07:50:32 +01:00
$default = 'images/default-profile-sm.jpg';
break;
}
$uid = str_replace('.jpg', '', $person);
$r = q("SELECT * FROM `photo` WHERE `scale` = %d AND `uid` = %d AND `profile` = 1 LIMIT 1",
intval($resolution),
intval($uid)
);
if(count($r)) {
$data = $r[0]['data'];
}
2010-11-01 00:38:22 +01:00
if(! isset($data)) {
2010-11-05 07:50:32 +01:00
$data = file_get_contents($default);
}
2010-07-02 01:48:07 +02:00
}
else {
2010-08-05 05:03:38 +02:00
/**
* Other photos
*/
$resolution = 0;
$photo = str_replace('.jpg','',$photo);
if(substr($photo,-2,1) == '-') {
$resolution = intval(substr($photo,-1,1));
$photo = substr($photo,0,-2);
}
2010-08-05 05:03:38 +02:00
$r = q("SELECT `uid` FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d LIMIT 1",
dbesc($photo),
intval($resolution)
);
if(count($r)) {
2010-08-05 05:03:38 +02:00
$sql_extra = permissions_sql($r[0]['uid']);
2010-08-05 05:03:38 +02:00
// Now we'll see if we can access the photo
$r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d $sql_extra LIMIT 1",
dbesc($photo),
intval($resolution)
);
if(count($r)) {
$data = $r[0]['data'];
}
else {
// Does the picture exist? It may be a remote person with no credentials,
// but who should otherwise be able to view it. Show a default image to let
// them know permissions was denied. It may be possible to view the image
// through an authenticated profile visit.
// There won't be many completely unauthorised people seeing this because
// they won't have the photo link, so there's a reasonable chance that the person
// might be able to obtain permission to view it.
$r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d LIMIT 1",
dbesc($photo),
intval($resolution)
);
if(count($r)) {
$data = file_get_contents('images/nosign.jpg');
}
}
}
2010-07-02 01:48:07 +02:00
}
2010-11-08 00:46:49 +01:00
if(! isset($data)) {
2010-07-02 01:48:07 +02:00
killme();
2010-11-08 00:46:49 +01:00
// NOTREACHED
2010-07-02 01:48:07 +02:00
}
if(intval($customres) && $customres > 0 && $customres < 500) {
require_once('include/Photo.php');
$ph = new Photo($data);
if($ph->is_valid()) {
$ph->scaleImageSquare($customres);
$data = $ph->imageString();
}
}
2011-10-01 11:22:48 +02:00
if(function_exists('header_remove')) {
header_remove('Pragma');
header_remove('pragma');
}
2010-11-08 00:46:49 +01:00
header("Content-type: image/jpeg");
2011-10-01 03:00:32 +02:00
header("Expires: " . gmdate("D, d M Y H:i:s", time() + (3600*24)) . " GMT");
2011-10-01 02:47:33 +02:00
header("Cache-Control: max-age=" . (3600*24));
2010-11-08 00:46:49 +01:00
echo $data;
killme();
2010-11-08 00:46:49 +01:00
// NOTREACHED
}