2018-01-09 22:13:45 +01:00
< ? php
/**
2020-02-09 15:45:36 +01:00
* @ copyright Copyright ( C ) 2020 , Friendica
*
* @ license GNU AGPL version 3 or any later version
*
* This program is free software : you can redistribute it and / or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation , either version 3 of the
* License , or ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU Affero General Public License for more details .
*
* You should have received a copy of the GNU Affero General Public License
* along with this program . If not , see < https :// www . gnu . org / licenses />.
*
2018-01-09 22:13:45 +01:00
*/
namespace Friendica\Model ;
2018-07-20 04:15:21 +02:00
use Friendica\Content\Text\BBCode ;
2018-11-07 03:12:41 +01:00
use Friendica\Content\Text\HTML ;
2018-12-26 07:06:24 +01:00
use Friendica\Core\Hook ;
2018-10-29 22:20:46 +01:00
use Friendica\Core\Logger ;
2018-08-11 22:40:44 +02:00
use Friendica\Core\Protocol ;
2018-11-07 03:12:41 +01:00
use Friendica\Core\Renderer ;
2019-09-28 11:36:41 +02:00
use Friendica\Core\Session ;
2019-10-23 21:38:51 +02:00
use Friendica\Core\System ;
2020-09-11 11:37:18 +02:00
use Friendica\Model\Tag ;
2018-02-01 20:14:11 +01:00
use Friendica\Core\Worker ;
2018-07-20 14:19:26 +02:00
use Friendica\Database\DBA ;
2020-07-19 03:40:40 +02:00
use Friendica\Database\DBStructure ;
2019-12-15 22:34:11 +01:00
use Friendica\DI ;
2020-11-17 23:33:44 +01:00
use Friendica\Model\Post ;
2019-10-23 02:05:11 +02:00
use Friendica\Protocol\Activity ;
2019-07-21 09:37:50 +02:00
use Friendica\Protocol\ActivityPub ;
2018-02-01 20:14:11 +01:00
use Friendica\Protocol\Diaspora ;
2018-01-27 03:38:34 +01:00
use Friendica\Util\DateTimeFormat ;
2018-11-07 03:12:41 +01:00
use Friendica\Util\Map ;
2019-05-29 19:57:18 +02:00
use Friendica\Util\Network ;
2018-11-08 14:45:46 +01:00
use Friendica\Util\Strings ;
2019-06-06 06:26:02 +02:00
use Friendica\Worker\Delivery ;
2020-10-03 17:42:21 +02:00
use LanguageDetection\Language ;
2018-01-09 22:13:45 +01:00
2019-12-15 23:28:01 +01:00
class Item
2018-01-09 22:13:45 +01:00
{
2018-07-19 15:52:05 +02:00
// Posting types, inspired by https://www.w3.org/TR/activitystreams-vocabulary/#object-types
const PT_ARTICLE = 0 ;
const PT_NOTE = 1 ;
const PT_PAGE = 2 ;
const PT_IMAGE = 16 ;
const PT_AUDIO = 17 ;
const PT_VIDEO = 18 ;
const PT_DOCUMENT = 19 ;
const PT_EVENT = 32 ;
2020-08-23 19:48:44 +02:00
const PT_TAG = 64 ;
2020-09-12 19:45:04 +02:00
const PT_TO = 65 ;
const PT_CC = 66 ;
const PT_BTO = 67 ;
const PT_BCC = 68 ;
const PT_FOLLOWER = 69 ;
2020-09-13 16:15:28 +02:00
const PT_ANNOUNCEMENT = 70 ;
const PT_COMMENT = 71 ;
const PT_STORED = 72 ;
2020-09-14 19:48:57 +02:00
const PT_GLOBAL = 73 ;
2020-09-21 14:31:20 +02:00
const PT_RELAY = 74 ;
2020-09-21 17:17:33 +02:00
const PT_FETCHED = 75 ;
2018-07-19 15:52:05 +02:00
const PT_PERSONAL_NOTE = 128 ;
2018-06-17 08:27:52 +02:00
// Field list that is used to display the items
2018-12-07 06:52:14 +01:00
const DISPLAY_FIELDLIST = [
2021-01-27 11:01:42 +01:00
'uid' , 'id' , 'parent' , 'guid' , 'network' , 'gravity' ,
'uri-id' , 'uri' , 'thr-parent-id' , 'thr-parent' , 'parent-uri-id' , 'parent-uri' ,
2018-12-07 06:52:14 +01:00
'commented' , 'created' , 'edited' , 'received' , 'verb' , 'object-type' , 'postopts' , 'plink' ,
2021-01-21 08:16:41 +01:00
'wall' , 'private' , 'starred' , 'origin' , 'title' , 'body' , 'language' ,
2018-12-07 06:52:14 +01:00
'content-warning' , 'location' , 'coord' , 'app' , 'rendered-hash' , 'rendered-html' , 'object' ,
2021-02-14 10:43:27 +01:00
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' ,
2018-12-07 06:52:14 +01:00
'author-id' , 'author-link' , 'author-name' , 'author-avatar' , 'author-network' ,
'owner-id' , 'owner-link' , 'owner-name' , 'owner-avatar' , 'owner-network' ,
2020-09-22 07:36:01 +02:00
'causer-id' , 'causer-link' , 'causer-name' , 'causer-avatar' , 'causer-contact-type' ,
2019-04-24 06:26:23 +02:00
'contact-id' , 'contact-uid' , 'contact-link' , 'contact-name' , 'contact-avatar' ,
2021-01-16 05:13:22 +01:00
'writable' , 'self' , 'cid' , 'alias' ,
2021-02-13 20:56:03 +01:00
'event-created' , 'event-edited' , 'event-start' , 'event-finish' ,
2018-12-07 06:52:14 +01:00
'event-summary' , 'event-desc' , 'event-location' , 'event-type' ,
'event-nofinish' , 'event-adjust' , 'event-ignore' , 'event-id' ,
2020-05-31 17:48:31 +02:00
'delivery_queue_count' , 'delivery_queue_done' , 'delivery_queue_failed'
2018-12-07 06:52:14 +01:00
];
2018-06-17 08:27:52 +02:00
// Field list that is used to deliver items via the protocols
2020-04-26 18:15:39 +02:00
const DELIVER_FIELDLIST = [ 'uid' , 'id' , 'parent' , 'uri-id' , 'uri' , 'thr-parent' , 'parent-uri' , 'guid' ,
2021-02-13 20:56:03 +01:00
'parent-guid' , 'received' , 'created' , 'edited' , 'verb' , 'object-type' , 'object' , 'target' ,
'private' , 'title' , 'body' , 'raw-body' , 'location' , 'coord' , 'app' ,
'inform' , 'deleted' , 'extid' , 'post-type' , 'gravity' ,
2018-06-17 08:27:52 +02:00
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' ,
2021-02-13 20:56:03 +01:00
'author-id' , 'author-link' , 'owner-id' , 'owner-link' , 'contact-uid' ,
'signed_text' , 'network' , 'wall' , 'contact-id' , 'plink' , 'forum_mode' , 'origin' ,
'thr-parent-id' , 'parent-uri-id' , 'postopts' , 'pubmail' ,
'event-created' , 'event-edited' , 'event-start' , 'event-finish' ,
'event-summary' , 'event-desc' , 'event-location' , 'event-type' ,
'event-nofinish' , 'event-adjust' , 'event-ignore' , 'event-id' ];
2018-06-17 08:27:52 +02:00
2018-06-25 20:49:36 +02:00
// All fields in the item table
2020-04-16 06:20:59 +02:00
const ITEM_FIELDLIST = [ 'id' , 'uid' , 'parent' , 'uri' , 'parent-uri' , 'thr-parent' ,
2020-05-19 22:32:15 +02:00
'guid' , 'uri-id' , 'parent-uri-id' , 'thr-parent-id' , 'vid' ,
2021-02-13 20:56:03 +01:00
'contact-id' , 'wall' , 'gravity' , 'extid' , 'psid' ,
2018-10-18 23:35:48 +02:00
'created' , 'edited' , 'commented' , 'received' , 'changed' , 'verb' ,
2020-11-07 09:22:59 +01:00
'postopts' , 'plink' , 'resource-id' , 'event-id' , 'inform' ,
2021-01-21 08:16:41 +01:00
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' , 'post-type' ,
2021-02-13 20:56:03 +01:00
'private' , 'pubmail' , 'visible' , 'starred' ,
2018-06-25 20:49:36 +02:00
'unseen' , 'deleted' , 'origin' , 'forum_mode' , 'mention' , 'global' , 'network' ,
'title' , 'content-warning' , 'body' , 'location' , 'coord' , 'app' ,
'rendered-hash' , 'rendered-html' , 'object-type' , 'object' , 'target-type' , 'target' ,
2019-05-29 21:48:03 +02:00
'author-id' , 'author-link' , 'author-name' , 'author-avatar' , 'author-network' ,
2020-09-22 07:36:01 +02:00
'owner-id' , 'owner-link' , 'owner-name' , 'owner-avatar' , 'causer-id' ];
2018-06-25 20:49:36 +02:00
2021-02-13 20:56:03 +01:00
// Item fields that still are in use
2021-02-01 08:06:01 +01:00
const USED_FIELDLIST = [ 'id' , 'parent' , 'guid' , 'uri' , 'uri-id' , 'parent-uri' , 'parent-uri-id' ,
'thr-parent' , 'thr-parent-id' , 'created' , 'edited' , 'commented' , 'received' , 'changed' ,
'gravity' , 'network' , 'owner-id' , 'author-id' , 'causer-id' , 'vid' , 'extid' , 'post-type' ,
2021-02-13 20:56:03 +01:00
'global' , 'private' , 'visible' , 'deleted' , 'uid' , 'contact-id' ,
2021-02-01 08:06:01 +01:00
'wall' , 'origin' , 'pubmail' , 'starred' , 'unseen' , 'mention' , 'forum_mode' , 'psid' ,
2021-02-13 20:56:03 +01:00
'event-id' ];
2021-02-01 08:06:01 +01:00
// Legacy item fields that aren't stored any more in the item table
const LEGACY_FIELDLIST = [ 'uri-hash' , 'iaid' , 'icid' , 'attach' ,
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' , 'postopts' ,
'resource-id' , 'inform' , 'file' , 'location' , 'coord' , 'tag' , 'plink' ,
'title' , 'content-warning' , 'body' , 'app' , 'verb' , 'object-type' , 'object' ,
'target-type' , 'target' , 'author-name' , 'author-link' , 'author-avatar' ,
'owner-name' , 'owner-link' , 'owner-avatar' , 'rendered-hash' , 'rendered-html' ];
2020-05-26 07:18:50 +02:00
// List of all verbs that don't need additional content data.
2018-07-06 08:37:33 +02:00
// Never reorder or remove entries from this list. Just add new ones at the end, if needed.
2019-10-24 00:25:43 +02:00
const ACTIVITIES = [
Activity :: LIKE , Activity :: DISLIKE ,
Activity :: ATTEND , Activity :: ATTENDNO , Activity :: ATTENDMAYBE ,
Activity :: FOLLOW ,
Activity :: ANNOUNCE ];
2018-07-06 00:00:38 +02:00
2020-03-02 08:57:23 +01:00
const PUBLIC = 0 ;
const PRIVATE = 1 ;
const UNLISTED = 2 ;
2018-01-09 22:13:45 +01:00
/**
2020-01-19 07:05:23 +01:00
* Update existing item entries
2018-01-09 22:13:45 +01:00
*
2019-01-06 22:06:53 +01:00
* @ param array $fields The fields that are to be changed
2018-01-09 22:13:45 +01:00
* @ param array $condition The condition for finding the item entries
*
2018-01-09 23:16:16 +01:00
* In the future we may have to change permissions as well .
* Then we had to add the user id as third parameter .
*
* A return value of " 0 " doesn ' t mean an error - but that 0 rows had been changed .
*
* @ return integer | boolean number of affected rows - or " false " if there was an error
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-01-09 22:13:45 +01:00
*/
public static function update ( array $fields , array $condition )
{
if ( empty ( $condition ) || empty ( $fields )) {
return false ;
}
2021-01-28 23:45:54 +01:00
if ( ! empty ( $fields [ 'verb' ])) {
$fields [ 'vid' ] = Verb :: getID ( $fields [ 'verb' ]);
2018-07-08 01:03:28 +02:00
}
2021-01-28 23:45:54 +01:00
$rows = Post :: update ( $fields , $condition );
if ( is_bool ( $rows )) {
return $rows ;
2018-06-25 01:09:13 +02:00
}
2018-01-09 22:13:45 +01:00
2021-01-28 23:45:54 +01:00
// We only need to call the line by line update for specific fields
if ( empty ( $fields [ 'body' ]) && empty ( $fields [ 'file' ]) &&
empty ( $fields [ 'attach' ]) && empty ( $fields [ 'edited' ])) {
return $rows ;
2018-06-30 23:15:24 +02:00
}
2021-01-28 23:45:54 +01:00
Logger :: info ( 'Updating per single row method' , [ 'fields' => $fields , 'condition' => $condition ]);
2018-01-09 22:13:45 +01:00
2021-01-28 23:45:54 +01:00
$items = Post :: select ([ 'id' , 'origin' , 'uri-id' , 'uid' ], $condition );
2018-01-09 23:16:16 +01:00
2019-08-03 12:36:21 +02:00
$notify_items = [];
2018-07-20 14:19:26 +02:00
while ( $item = DBA :: fetch ( $items )) {
2021-01-28 23:45:54 +01:00
if ( ! empty ( $fields [ 'body' ])) {
$content_fields = [ 'raw-body' => trim ( $fields [ 'raw-body' ] ? ? $fields [ 'body' ])];
// Remove all media attachments from the body and store them in the post-media table
$content_fields [ 'raw-body' ] = Post\Media :: insertFromBody ( $item [ 'uri-id' ], $content_fields [ 'raw-body' ]);
$content_fields [ 'raw-body' ] = self :: setHashtags ( $content_fields [ 'raw-body' ]);
2018-07-01 21:02:29 +02:00
}
2021-01-28 23:45:54 +01:00
if ( ! empty ( $fields [ 'file' ])) {
Post\Category :: storeTextByURIId ( $item [ 'uri-id' ], $item [ 'uid' ], $fields [ 'file' ]);
2018-06-30 15:54:01 +02:00
}
2020-10-31 14:26:08 +01:00
if ( ! empty ( $fields [ 'attach' ])) {
Post\Media :: insertFromAttachment ( $item [ 'uri-id' ], $fields [ 'attach' ]);
}
2018-05-17 07:49:55 +02:00
// We only need to notfiy others when it is an original entry from us.
// Only call the notifier when the item has some content relevant change.
if ( $item [ 'origin' ] && in_array ( 'edited' , array_keys ( $fields ))) {
2019-08-03 12:36:21 +02:00
$notify_items [] = $item [ 'id' ];
2018-02-07 21:09:37 +01:00
}
2018-01-09 22:13:45 +01:00
}
2018-07-20 14:19:26 +02:00
DBA :: close ( $items );
2019-08-03 12:36:21 +02:00
foreach ( $notify_items as $notify_item ) {
2021-02-14 15:24:48 +01:00
$post = Post :: selectFirst ([ 'uri-id' , 'uid' ], [ 'id' => $notify_item ]);
Worker :: add ( PRIORITY_HIGH , " Notifier " , Delivery :: POST , ( int ) $post [ 'uri-id' ], ( int ) $post [ 'uid' ]);
2019-08-03 12:36:21 +02:00
}
2018-01-09 23:16:16 +01:00
return $rows ;
2018-01-09 22:13:45 +01:00
}
2018-01-16 23:23:19 +01:00
2018-02-06 13:40:22 +01:00
/**
2020-01-19 07:05:23 +01:00
* Delete an item and notify others about it - if it was ours
2018-02-06 13:40:22 +01:00
*
2019-01-06 22:06:53 +01:00
* @ param array $condition The condition for finding the item entries
* @ param integer $priority Priority for the notification
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-02-06 13:40:22 +01:00
*/
2020-03-03 07:47:28 +01:00
public static function markForDeletion ( $condition , $priority = PRIORITY_HIGH )
2018-02-06 13:40:22 +01:00
{
2021-01-16 05:13:22 +01:00
$items = Post :: select ([ 'id' ], $condition );
while ( $item = Post :: fetch ( $items )) {
2020-03-03 07:47:28 +01:00
self :: markForDeletionById ( $item [ 'id' ], $priority );
2018-02-06 13:40:22 +01:00
}
2018-07-20 14:19:26 +02:00
DBA :: close ( $items );
2018-02-06 13:40:22 +01:00
}
2018-05-29 07:22:57 +02:00
/**
2020-01-19 07:05:23 +01:00
* Delete an item for an user and notify others about it - if it was ours
2018-05-29 07:22:57 +02:00
*
2019-01-06 22:06:53 +01:00
* @ param array $condition The condition for finding the item entries
* @ param integer $uid User who wants to delete this item
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-05-29 07:22:57 +02:00
*/
public static function deleteForUser ( $condition , $uid )
{
if ( $uid == 0 ) {
return ;
}
2021-01-16 05:13:22 +01:00
$items = Post :: select ([ 'id' , 'uid' , 'uri-id' ], $condition );
while ( $item = Post :: fetch ( $items )) {
2021-01-22 09:16:41 +01:00
if ( in_array ( $item [ 'uid' ], [ $uid , 0 ])) {
Post\User :: update ( $item [ 'uri-id' ], $uid , [ 'hidden' => true ], true );
2021-02-09 18:04:41 +01:00
Post\ThreadUser :: update ( $item [ 'uri-id' ], $uid , [ 'hidden' => true ], true );
2021-01-22 09:16:41 +01:00
}
2020-11-17 23:33:44 +01:00
2021-02-01 00:37:34 +01:00
if ( $item [ 'uid' ] == $uid ) {
2020-03-03 07:47:28 +01:00
self :: markForDeletionById ( $item [ 'id' ], PRIORITY_HIGH );
2021-02-01 00:37:34 +01:00
} elseif ( $item [ 'uid' ] != 0 ) {
2018-10-29 22:20:46 +01:00
Logger :: log ( 'Wrong ownership. Not deleting item ' . $item [ 'id' ]);
2018-05-29 07:22:57 +02:00
}
2018-02-06 13:40:22 +01:00
}
2018-07-20 14:19:26 +02:00
DBA :: close ( $items );
2018-02-06 13:40:22 +01:00
}
2018-01-18 00:22:01 +01:00
/**
2020-03-03 07:47:28 +01:00
* Mark an item for deletion , delete related data and notify others about it - if it was ours
2018-01-18 00:22:01 +01:00
*
2020-03-03 07:47:28 +01:00
* @ param integer $item_id
2018-02-06 13:40:22 +01:00
* @ param integer $priority Priority for the notification
2018-01-18 00:22:01 +01:00
*
2018-03-17 02:45:02 +01:00
* @ return boolean success
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-01-18 00:22:01 +01:00
*/
2020-03-03 07:47:28 +01:00
public static function markForDeletionById ( $item_id , $priority = PRIORITY_HIGH )
2018-01-17 00:16:53 +01:00
{
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Mark item for deletion by id' , [ 'id' => $item_id , 'callstack' => System :: callstack ()]);
2018-01-17 00:16:53 +01:00
// locate item to be deleted
2021-01-27 11:01:42 +01:00
$fields = [ 'id' , 'uri' , 'uri-id' , 'uid' , 'parent' , 'parent-uri-id' , 'origin' ,
2021-01-21 08:16:41 +01:00
'deleted' , 'resource-id' , 'event-id' ,
2021-01-20 00:26:24 +01:00
'verb' , 'object-type' , 'object' , 'target' , 'contact-id' , 'psid' , 'gravity' ];
2021-01-16 05:13:22 +01:00
$item = Post :: selectFirst ( $fields , [ 'id' => $item_id ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Item not found.' , [ 'id' => $item_id ]);
2018-01-17 00:16:53 +01:00
return false ;
}
if ( $item [ 'deleted' ]) {
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Item has already been marked for deletion.' , [ 'id' => $item_id ]);
2018-01-17 00:16:53 +01:00
return false ;
}
2021-01-16 05:13:22 +01:00
$parent = Post :: selectFirst ([ 'origin' ], [ 'id' => $item [ 'parent' ]]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $parent )) {
2018-01-18 00:22:01 +01:00
$parent = [ 'origin' => false ];
}
2018-01-17 00:16:53 +01:00
// clean up categories and tags so they don't end up as orphans
2021-01-21 08:16:41 +01:00
Post\Category :: deleteByURIId ( $item [ 'uri-id' ], $item [ 'uid' ]);
2018-01-17 00:16:53 +01:00
2018-01-17 08:08:49 +01:00
/*
* If item is a link to a photo resource , nuke all the associated photos
* ( visitors will not have photo resources )
* This only applies to photos uploaded from the photos page . Photos inserted into a post do not
* generate a resource - id and therefore aren ' t intimately linked to the item .
*/
2019-01-02 16:37:55 +01:00
/// @TODO: this should first check if photo is used elsewhere
2018-01-17 00:16:53 +01:00
if ( strlen ( $item [ 'resource-id' ])) {
2018-12-11 20:03:29 +01:00
Photo :: delete ([ 'resource-id' => $item [ 'resource-id' ], 'uid' => $item [ 'uid' ]]);
2018-01-17 00:16:53 +01:00
}
2018-02-06 13:40:22 +01:00
// If item is a link to an event, delete the event.
2018-01-17 00:16:53 +01:00
if ( intval ( $item [ 'event-id' ])) {
2018-03-17 02:45:02 +01:00
Event :: delete ( $item [ 'event-id' ]);
2018-01-17 00:16:53 +01:00
}
// If item has attachments, drop them
2020-11-07 09:22:59 +01:00
$attachments = Post\Media :: getByURIId ( $item [ 'uri-id' ], [ Post\Media :: DOCUMENT ]);
foreach ( $attachments as $attachment ) {
if ( preg_match ( " |attach/( \ d+)| " , $attachment [ 'url' ], $matches )) {
2019-01-02 16:17:29 +01:00
Attach :: delete ([ 'id' => $matches [ 1 ], 'uid' => $item [ 'uid' ]]);
2018-07-01 20:46:45 +02:00
}
2018-01-17 00:16:53 +01:00
}
2018-01-20 23:16:43 +01:00
// Set the item to "deleted"
2018-07-29 05:54:34 +02:00
$item_fields = [ 'deleted' => true , 'edited' => DateTimeFormat :: utcNow (), 'changed' => DateTimeFormat :: utcNow ()];
2021-02-06 14:42:21 +01:00
Post :: update ( $item_fields , [ 'id' => $item [ 'id' ]]);
2018-01-20 23:16:43 +01:00
2020-11-17 23:33:44 +01:00
Post\Category :: storeTextByURIId ( $item [ 'uri-id' ], $item [ 'uid' ], '' );
2018-01-20 23:16:43 +01:00
2021-01-27 11:01:42 +01:00
if ( ! Post :: exists ([ " `uri-id` = ? AND `uid` != 0 AND NOT `deleted` " , $item [ 'uri-id' ]])) {
self :: markForDeletion ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => 0 , 'deleted' => false ], $priority );
2018-05-15 18:40:13 +02:00
}
2020-05-02 21:34:02 +02:00
Post\DeliveryData :: delete ( $item [ 'uri-id' ]);
2018-07-19 23:56:52 +02:00
2018-07-29 05:54:34 +02:00
// When the permission set will be used in photo and events as well,
// this query here needs to be extended.
2019-06-23 12:01:14 +02:00
// @todo Currently deactivated. We need the permission set in the deletion process.
2019-06-23 08:41:49 +02:00
// This is a reminder to add the removal somewhere else.
//if (!empty($item['psid']) && !self::exists(['psid' => $item['psid'], 'deleted' => false])) {
// DBA::delete('permissionset', ['id' => $item['psid']], ['cascade' => false]);
//}
2018-07-29 05:54:34 +02:00
2018-01-20 23:16:43 +01:00
// If it's the parent of a comment thread, kill all the kids
2020-05-27 14:19:06 +02:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
2020-03-03 07:47:28 +01:00
self :: markForDeletion ([ 'parent' => $item [ 'parent' ], 'deleted' => false ], $priority );
2018-01-20 23:16:43 +01:00
}
2018-01-17 00:16:53 +01:00
2018-05-15 17:51:58 +02:00
// Is it our comment and/or our thread?
2020-11-28 23:53:58 +01:00
if (( $item [ 'origin' ] || $parent [ 'origin' ]) && ( $item [ 'uid' ] != 0 )) {
2018-05-15 17:51:58 +02:00
// When we delete the original post we will delete all existing copies on the server as well
2021-01-27 11:01:42 +01:00
self :: markForDeletion ([ 'uri-id' => $item [ 'uri-id' ], 'deleted' => false ], $priority );
2018-05-15 17:51:58 +02:00
// send the notification upstream/downstream
2020-11-30 22:40:55 +01:00
if ( $priority ) {
2021-02-14 15:24:48 +01:00
Worker :: add ([ 'priority' => $priority , 'dont_fork' => true ], " Notifier " , Delivery :: DELETION , ( int ) $item [ 'uri-id' ], ( int ) $item [ 'uid' ]);
2020-11-30 22:40:55 +01:00
}
2018-05-26 20:07:27 +02:00
} elseif ( $item [ 'uid' ] != 0 ) {
2020-11-17 23:33:44 +01:00
Post\User :: update ( $item [ 'uri-id' ], $item [ 'uid' ], [ 'hidden' => true ]);
2021-02-09 18:04:41 +01:00
Post\ThreadUser :: update ( $item [ 'uri-id' ], $item [ 'uid' ], [ 'hidden' => true ]);
2018-01-17 00:16:53 +01:00
}
2020-03-04 21:59:19 +01:00
Logger :: info ( 'Item has been marked for deletion.' , [ 'id' => $item_id ]);
2018-05-15 19:50:29 +02:00
2018-01-17 00:16:53 +01:00
return true ;
}
2018-02-21 22:39:07 +01:00
private static function guid ( $item , $notify )
2018-02-21 05:13:13 +01:00
{
2018-07-08 11:37:05 +02:00
if ( ! empty ( $item [ 'guid' ])) {
2018-11-09 19:29:42 +01:00
return Strings :: escapeTags ( trim ( $item [ 'guid' ]));
2018-02-21 05:13:13 +01:00
}
if ( $notify ) {
// We have to avoid duplicates. So we create the GUID in form of a hash of the plink or uri.
// We add the hash of our own host because our host is the original creator of the post.
2019-12-16 00:47:24 +01:00
$prefix_host = DI :: baseUrl () -> getHostname ();
2018-02-21 05:13:13 +01:00
} else {
$prefix_host = '' ;
// We are only storing the post so we create a GUID from the original hostname.
2018-02-21 22:39:07 +01:00
if ( ! empty ( $item [ 'author-link' ])) {
$parsed = parse_url ( $item [ 'author-link' ]);
2018-02-21 05:13:13 +01:00
if ( ! empty ( $parsed [ 'host' ])) {
$prefix_host = $parsed [ 'host' ];
}
}
2018-02-21 22:39:07 +01:00
if ( empty ( $prefix_host ) && ! empty ( $item [ 'plink' ])) {
$parsed = parse_url ( $item [ 'plink' ]);
2018-02-21 05:13:13 +01:00
if ( ! empty ( $parsed [ 'host' ])) {
$prefix_host = $parsed [ 'host' ];
}
}
2018-02-21 22:39:07 +01:00
if ( empty ( $prefix_host ) && ! empty ( $item [ 'uri' ])) {
$parsed = parse_url ( $item [ 'uri' ]);
2018-02-21 05:13:13 +01:00
if ( ! empty ( $parsed [ 'host' ])) {
$prefix_host = $parsed [ 'host' ];
}
}
2018-02-26 12:48:05 +01:00
// Is it in the format data@host.tld? - Used for mail contacts
if ( empty ( $prefix_host ) && ! empty ( $item [ 'author-link' ]) && strstr ( $item [ 'author-link' ], '@' )) {
$mailparts = explode ( '@' , $item [ 'author-link' ]);
$prefix_host = array_pop ( $mailparts );
}
2018-02-21 05:13:13 +01:00
}
2018-02-21 22:39:07 +01:00
if ( ! empty ( $item [ 'plink' ])) {
$guid = self :: guidFromUri ( $item [ 'plink' ], $prefix_host );
} elseif ( ! empty ( $item [ 'uri' ])) {
$guid = self :: guidFromUri ( $item [ 'uri' ], $prefix_host );
2018-02-21 05:13:13 +01:00
} else {
2018-09-27 13:52:15 +02:00
$guid = System :: createUUID ( hash ( 'crc32' , $prefix_host ));
2018-02-21 05:13:13 +01:00
}
return $guid ;
}
2018-02-21 22:39:07 +01:00
private static function contactId ( $item )
2018-02-21 22:08:37 +01:00
{
2019-08-02 18:46:26 +02:00
if ( ! empty ( $item [ 'contact-id' ]) && DBA :: exists ( 'contact' , [ 'self' => true , 'id' => $item [ 'contact-id' ]])) {
return $item [ 'contact-id' ];
2019-08-13 17:54:47 +02:00
} elseif (( $item [ 'gravity' ] == GRAVITY_PARENT ) && ! empty ( $item [ 'uid' ]) && ! empty ( $item [ 'contact-id' ]) && Contact :: isSharing ( $item [ 'contact-id' ], $item [ 'uid' ])) {
return $item [ 'contact-id' ];
2019-08-02 18:46:26 +02:00
} elseif ( ! empty ( $item [ 'uid' ]) && ! Contact :: isSharing ( $item [ 'author-id' ], $item [ 'uid' ])) {
2019-07-31 00:02:32 +02:00
return $item [ 'author-id' ];
} elseif ( ! empty ( $item [ 'contact-id' ])) {
return $item [ 'contact-id' ];
} else {
2018-02-22 08:05:56 +01:00
$contact_id = Contact :: getIdForURL ( $item [ 'author-link' ], $item [ 'uid' ]);
2019-07-31 00:02:32 +02:00
if ( ! empty ( $contact_id )) {
return $contact_id ;
2018-02-21 22:08:37 +01:00
}
}
2019-07-31 00:02:32 +02:00
return $item [ 'author-id' ];
2018-02-21 22:08:37 +01:00
}
2019-07-31 18:07:50 +02:00
/**
* Write an item array into a spool file to be inserted later .
* This command is called whenever there are issues storing an item .
*
* @ param array $item The item fields that are to be inserted
* @ throws \Exception
*/
2019-07-31 16:09:27 +02:00
private static function spool ( $orig_item )
{
// Now we store the data in the spool directory
// We use "microtime" to keep the arrival order and "mt_rand" to avoid duplicates
$file = 'item-' . round ( microtime ( true ) * 10000 ) . '-' . mt_rand () . '.msg' ;
$spoolpath = get_spoolpath ();
if ( $spoolpath != " " ) {
$spool = $spoolpath . '/' . $file ;
file_put_contents ( $spool , json_encode ( $orig_item ));
Logger :: warning ( " Item wasn't stored - Item was spooled into file " , [ 'file' => $file ]);
}
}
2020-05-13 21:26:59 +02:00
/**
* Check if the item array is a duplicate
*
* @ param array $item
* @ return boolean is it a duplicate ?
*/
private static function isDuplicate ( array $item )
2018-01-28 12:18:08 +01:00
{
2020-05-12 22:13:48 +02:00
// Checking if there is already an item with the same guid
$condition = [ 'guid' => $item [ 'guid' ], 'network' => $item [ 'network' ], 'uid' => $item [ 'uid' ]];
2021-01-16 05:13:22 +01:00
if ( Post :: exists ( $condition )) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Found already existing item' , [
'guid' => $item [ 'guid' ],
'uid' => $item [ 'uid' ],
'network' => $item [ 'network' ]
]);
return true ;
2018-01-28 12:18:08 +01:00
}
2021-01-27 11:01:42 +01:00
$condition = [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $item [ 'uid' ],
'network' => [ $item [ 'network' ], Protocol :: DFRN ]];
2021-01-16 05:13:22 +01:00
if ( Post :: exists ( $condition )) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'duplicated item with the same uri found.' , $item );
return true ;
2018-05-15 06:33:28 +02:00
}
2020-05-12 22:13:48 +02:00
// On Friendica and Diaspora the GUID is unique
if ( in_array ( $item [ 'network' ], [ Protocol :: DFRN , Protocol :: DIASPORA ])) {
$condition = [ 'guid' => $item [ 'guid' ], 'uid' => $item [ 'uid' ]];
2021-01-16 05:13:22 +01:00
if ( Post :: exists ( $condition )) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'duplicated item with the same guid found.' , $item );
return true ;
}
} elseif ( $item [ 'network' ] == Protocol :: OSTATUS ) {
// Check for an existing post with the same content. There seems to be a problem with OStatus.
$condition = [ " `body` = ? AND `network` = ? AND `created` = ? AND `contact-id` = ? AND `uid` = ? " ,
$item [ 'body' ], $item [ 'network' ], $item [ 'created' ], $item [ 'contact-id' ], $item [ 'uid' ]];
2021-01-16 05:13:22 +01:00
if ( Post :: exists ( $condition )) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'duplicated item with the same body found.' , $item );
return true ;
2018-01-28 12:18:08 +01:00
}
}
2020-05-12 22:13:48 +02:00
/*
* Check for already added items .
* There is a timing issue here that sometimes creates double postings .
* An unique index would help - but the limitations of MySQL ( maximum size of index values ) prevent this .
*/
2021-01-27 11:01:42 +01:00
if (( $item [ 'uid' ] == 0 ) && Post :: exists ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => 0 ])) {
Logger :: notice ( 'Global item already stored.' , [ 'uri-id' => $item [ 'uri-id' ], 'network' => $item [ 'network' ]]);
2020-05-12 22:13:48 +02:00
return true ;
2018-03-22 17:18:49 +01:00
}
2020-05-12 22:13:48 +02:00
return false ;
}
2019-10-23 02:05:11 +02:00
2020-05-13 21:26:59 +02:00
/**
* Check if the item array is valid
*
* @ param array $item
* @ return boolean item is valid
*/
2020-08-15 22:05:08 +02:00
public static function isValid ( array $item )
2020-05-12 22:13:48 +02:00
{
// When there is no content then we don't post it
2020-11-11 08:44:43 +01:00
if ( $item [ 'body' ] . $item [ 'title' ] == '' ) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'No body, no title.' );
return false ;
2018-01-28 12:18:08 +01:00
}
2020-12-15 15:41:58 +01:00
if ( ! empty ( $item [ 'uid' ])) {
$owner = User :: getOwnerDataById ( $item [ 'uid' ], false );
if ( ! $owner ) {
Logger :: notice ( 'Missing item user owner data' , [ 'uid' => $item [ 'uid' ]]);
return false ;
}
2020-12-15 20:24:42 +01:00
if ( $owner [ 'account_expired' ] || $owner [ 'account_removed' ]) {
2020-12-15 15:41:58 +01:00
Logger :: notice ( 'Item user has been deleted/expired/removed' , [ 'uid' => $item [ 'uid' ], 'deleted' => $owner [ 'deleted' ], 'account_expired' => $owner [ 'account_expired' ], 'account_removed' => $owner [ 'account_removed' ]]);
return false ;
}
}
2020-08-15 22:05:08 +02:00
if ( ! empty ( $item [ 'author-id' ]) && Contact :: isBlocked ( $item [ 'author-id' ])) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Author is blocked node-wide' , [ 'author-link' => $item [ 'author-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
if ( ! empty ( $item [ 'author-link' ]) && Network :: isUrlBlocked ( $item [ 'author-link' ])) {
Logger :: notice ( 'Author server is blocked' , [ 'author-link' => $item [ 'author-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
2020-08-15 22:05:08 +02:00
if ( ! empty ( $item [ 'owner-id' ]) && Contact :: isBlocked ( $item [ 'owner-id' ])) {
2020-05-12 22:13:48 +02:00
Logger :: notice ( 'Owner is blocked node-wide' , [ 'owner-link' => $item [ 'owner-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
if ( ! empty ( $item [ 'owner-link' ]) && Network :: isUrlBlocked ( $item [ 'owner-link' ])) {
Logger :: notice ( 'Owner server is blocked' , [ 'owner-link' => $item [ 'owner-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
2020-11-11 08:50:22 +01:00
if ( ! empty ( $item [ 'uid' ]) && ! self :: isAllowedByUser ( $item , $item [ 'uid' ])) {
2020-05-12 22:13:48 +02:00
return false ;
}
if ( $item [ 'verb' ] == Activity :: FOLLOW ) {
if ( ! $item [ 'origin' ] && ( $item [ 'author-id' ] == Contact :: getPublicIdByUserId ( $item [ 'uid' ]))) {
// Our own follow request can be relayed to us. We don't store it to avoid notification chaos.
2020-05-13 07:48:26 +02:00
Logger :: info ( " Follow: Don't store not origin follow request " , [ 'parent-uri' => $item [ 'parent-uri' ]]);
2020-05-12 22:13:48 +02:00
return false ;
}
$condition = [ 'verb' => Activity :: FOLLOW , 'uid' => $item [ 'uid' ],
'parent-uri' => $item [ 'parent-uri' ], 'author-id' => $item [ 'author-id' ]];
2021-01-16 05:13:22 +01:00
if ( Post :: exists ( $condition )) {
2020-05-12 22:13:48 +02:00
// It happens that we receive multiple follow requests by the same author - we only store one.
2020-05-13 07:48:26 +02:00
Logger :: info ( 'Follow: Found existing follow request from author' , [ 'author-id' => $item [ 'author-id' ], 'parent-uri' => $item [ 'parent-uri' ]]);
2020-05-12 22:13:48 +02:00
return false ;
}
}
return true ;
}
2020-11-30 21:32:56 +01:00
/**
* Check if the item array is too old
*
* @ param array $item
* @ return boolean item is too old
*/
2020-11-30 21:59:18 +01:00
public static function isTooOld ( array $item )
2020-11-30 21:32:56 +01:00
{
// check for create date and expire time
$expire_interval = DI :: config () -> get ( 'system' , 'dbclean-expire-days' , 0 );
$user = DBA :: selectFirst ( 'user' , [ 'expire' ], [ 'uid' => $item [ 'uid' ]]);
if ( DBA :: isResult ( $user ) && ( $user [ 'expire' ] > 0 ) && (( $user [ 'expire' ] < $expire_interval ) || ( $expire_interval == 0 ))) {
$expire_interval = $user [ 'expire' ];
}
if (( $expire_interval > 0 ) && ! empty ( $item [ 'created' ])) {
$expire_date = time () - ( $expire_interval * 86400 );
$created_date = strtotime ( $item [ 'created' ]);
if ( $created_date < $expire_date ) {
Logger :: notice ( 'Item created before expiration interval.' , [
'created' => date ( 'c' , $created_date ),
'expired' => date ( 'c' , $expire_date ),
'$item' => $item
]);
return true ;
}
}
return false ;
}
2020-05-13 21:26:59 +02:00
/**
2020-05-14 05:48:26 +02:00
* Return the id of the given item array if it has been stored before
2020-05-13 21:26:59 +02:00
*
* @ param array $item
* @ return integer item id
*/
private static function getDuplicateID ( array $item )
2020-05-12 22:13:48 +02:00
{
2019-07-02 00:14:34 +02:00
if ( empty ( $item [ 'network' ]) || in_array ( $item [ 'network' ], Protocol :: FEDERATED )) {
2021-01-27 11:01:42 +01:00
$condition = [ " `uri-id` = ? AND `uid` = ? AND `network` IN (?, ?, ?, ?) " ,
$item [ 'uri-id' ], $item [ 'uid' ],
2019-09-10 06:59:12 +02:00
Protocol :: ACTIVITYPUB , Protocol :: DIASPORA , Protocol :: DFRN , Protocol :: OSTATUS ];
2021-01-16 05:13:22 +01:00
$existing = Post :: selectFirst ([ 'id' , 'network' ], $condition );
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $existing )) {
2018-01-28 12:18:08 +01:00
// We only log the entries with a different user id than 0. Otherwise we would have too many false positives
2020-05-12 22:13:48 +02:00
if ( $item [ 'uid' ] != 0 ) {
2019-02-23 15:25:21 +01:00
Logger :: notice ( 'Item already existed for user' , [
2021-01-27 11:01:42 +01:00
'uri-id' => $item [ 'uri-id' ],
2020-05-12 22:13:48 +02:00
'uid' => $item [ 'uid' ],
2019-02-23 15:25:21 +01:00
'network' => $item [ 'network' ],
'existing_id' => $existing [ " id " ],
'existing_network' => $existing [ " network " ]
]);
2018-01-28 12:18:08 +01:00
}
2018-02-21 23:55:23 +01:00
return $existing [ " id " ];
2018-01-28 12:18:08 +01:00
}
}
2020-05-12 22:13:48 +02:00
return 0 ;
}
2020-05-13 21:26:59 +02:00
/**
2020-11-11 08:44:43 +01:00
* Fetch top - level parent data for the given item array
2020-05-13 21:26:59 +02:00
*
* @ param array $item
* @ return array item array with parent data
2020-11-11 08:44:43 +01:00
* @ throws \Exception
2020-05-13 21:26:59 +02:00
*/
2020-11-11 08:44:43 +01:00
private static function getTopLevelParent ( array $item )
2020-05-12 22:13:48 +02:00
{
2020-11-11 08:44:43 +01:00
$fields = [ 'uid' , 'uri' , 'parent-uri' , 'id' , 'deleted' ,
2021-01-27 11:01:42 +01:00
'uri-id' , 'parent-uri-id' ,
2020-05-12 22:13:48 +02:00
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' ,
'wall' , 'private' , 'forum_mode' , 'origin' , 'author-id' ];
2021-01-27 11:01:42 +01:00
$condition = [ 'uri-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ]];
2020-05-12 22:13:48 +02:00
$params = [ 'order' => [ 'id' => false ]];
2021-01-16 23:37:27 +01:00
$parent = Post :: selectFirst ( $fields , $condition , $params );
2020-05-12 22:13:48 +02:00
if ( ! DBA :: isResult ( $parent )) {
2021-01-27 11:01:42 +01:00
Logger :: notice ( 'item parent was not found - ignoring item' , [ 'thr-parent-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ]]);
2020-05-12 22:13:48 +02:00
return [];
2020-11-11 08:44:43 +01:00
}
2020-05-12 22:13:48 +02:00
2021-01-27 11:01:42 +01:00
if ( $parent [ 'uri-id' ] == $parent [ 'parent-uri-id' ]) {
2020-11-11 08:44:43 +01:00
return $parent ;
}
2020-05-12 22:13:48 +02:00
2021-01-27 11:01:42 +01:00
$condition = [ 'uri-id' => $parent [ 'parent-uri-id' ],
'parent-uri-id' => $parent [ 'parent-uri-id' ],
2020-11-12 04:59:57 +01:00
'uid' => $parent [ 'uid' ]];
2020-11-14 05:56:19 +01:00
$params = [ 'order' => [ 'id' => false ]];
2021-01-16 23:37:27 +01:00
$toplevel_parent = Post :: selectFirst ( $fields , $condition , $params );
2020-11-11 08:44:43 +01:00
if ( ! DBA :: isResult ( $toplevel_parent )) {
2021-01-27 11:01:42 +01:00
Logger :: notice ( 'item top level parent was not found - ignoring item' , [ 'parent-uri-id' => $parent [ 'parent-uri-id' ], 'uid' => $parent [ 'uid' ]]);
2020-11-11 08:44:43 +01:00
return [];
2020-05-12 22:13:48 +02:00
}
2020-11-11 08:44:43 +01:00
return $toplevel_parent ;
2020-05-12 22:13:48 +02:00
}
2020-05-13 21:26:59 +02:00
/**
* Get the gravity for the given item array
*
* @ param array $item
* @ return integer gravity
*/
private static function getGravity ( array $item )
2020-05-12 22:13:48 +02:00
{
$activity = DI :: activity ();
if ( isset ( $item [ 'gravity' ])) {
return intval ( $item [ 'gravity' ]);
2021-01-27 11:01:42 +01:00
} elseif ( $item [ 'parent-uri-id' ] === $item [ 'uri-id' ]) {
2020-05-12 22:13:48 +02:00
return GRAVITY_PARENT ;
} elseif ( $activity -> match ( $item [ 'verb' ], Activity :: POST )) {
return GRAVITY_COMMENT ;
} elseif ( $activity -> match ( $item [ 'verb' ], Activity :: FOLLOW )) {
return GRAVITY_ACTIVITY ;
2020-08-09 20:42:25 +02:00
} elseif ( $activity -> match ( $item [ 'verb' ], Activity :: ANNOUNCE )) {
return GRAVITY_ACTIVITY ;
2020-05-12 22:13:48 +02:00
}
Logger :: info ( 'Unknown gravity for verb' , [ 'verb' => $item [ 'verb' ]]);
return GRAVITY_UNKNOWN ; // Should not happen
}
2020-05-12 23:49:12 +02:00
public static function insert ( $item , $notify = false , $dontcache = false )
2020-05-12 22:13:48 +02:00
{
$orig_item = $item ;
$priority = PRIORITY_HIGH ;
// If it is a posting where users should get notifications, then define it as wall posting
if ( $notify ) {
$item [ 'wall' ] = 1 ;
$item [ 'origin' ] = 1 ;
$item [ 'network' ] = Protocol :: DFRN ;
2020-11-29 10:01:51 +01:00
$item [ 'protocol' ] = Conversation :: PARCEL_DIRECT ;
2021-01-09 13:59:30 +01:00
$item [ 'direction' ] = Conversation :: PUSH ;
2020-05-12 22:13:48 +02:00
2020-12-08 22:58:32 +01:00
if ( in_array ( $notify , PRIORITIES )) {
2020-05-12 22:13:48 +02:00
$priority = $notify ;
}
} else {
$item [ 'network' ] = trim (( $item [ 'network' ] ? ? '' ) ? : Protocol :: PHANTOM );
}
$uid = intval ( $item [ 'uid' ]);
$item [ 'guid' ] = self :: guid ( $item , $notify );
2020-11-11 16:07:39 +01:00
$item [ 'uri' ] = substr ( trim ( $item [ 'uri' ] ? ? '' ) ? : self :: newURI ( $item [ 'uid' ], $item [ 'guid' ]), 0 , 255 );
2020-05-12 22:13:48 +02:00
// Store URI data
$item [ 'uri-id' ] = ItemURI :: insert ([ 'uri' => $item [ 'uri' ], 'guid' => $item [ 'guid' ]]);
2020-11-11 08:44:43 +01:00
// Backward compatibility: parent-uri used to be the direct parent uri.
// If it is provided without a thr-parent, it probably is the old behavior.
$item [ 'thr-parent' ] = trim ( $item [ 'thr-parent' ] ? ? $item [ 'parent-uri' ] ? ? $item [ 'uri' ]);
$item [ 'parent-uri' ] = $item [ 'thr-parent' ];
2021-01-27 11:01:42 +01:00
$item [ 'thr-parent-id' ] = $item [ 'parent-uri-id' ] = ItemURI :: getIdByURI ( $item [ 'thr-parent' ]);
2020-05-12 22:13:48 +02:00
// Store conversation data
$item = Conversation :: insert ( $item );
/*
* Do we already have this item ?
* We have to check several networks since Friendica posts could be repeated
* via OStatus ( maybe Diasporsa as well )
*/
$duplicate = self :: getDuplicateID ( $item );
if ( $duplicate ) {
return $duplicate ;
}
// Additional duplicate checks
/// @todo Check why the first duplication check returns the item number and the second a 0
if ( self :: isDuplicate ( $item )) {
return 0 ;
}
2018-01-28 12:18:08 +01:00
2019-10-16 14:35:14 +02:00
$item [ 'wall' ] = intval ( $item [ 'wall' ] ? ? 0 );
$item [ 'extid' ] = trim ( $item [ 'extid' ] ? ? '' );
$item [ 'author-name' ] = trim ( $item [ 'author-name' ] ? ? '' );
$item [ 'author-link' ] = trim ( $item [ 'author-link' ] ? ? '' );
$item [ 'author-avatar' ] = trim ( $item [ 'author-avatar' ] ? ? '' );
$item [ 'owner-name' ] = trim ( $item [ 'owner-name' ] ? ? '' );
$item [ 'owner-link' ] = trim ( $item [ 'owner-link' ] ? ? '' );
$item [ 'owner-avatar' ] = trim ( $item [ 'owner-avatar' ] ? ? '' );
2018-11-30 15:06:22 +01:00
$item [ 'received' ] = ( isset ( $item [ 'received' ]) ? DateTimeFormat :: utc ( $item [ 'received' ]) : DateTimeFormat :: utcNow ());
$item [ 'created' ] = ( isset ( $item [ 'created' ]) ? DateTimeFormat :: utc ( $item [ 'created' ]) : $item [ 'received' ]);
$item [ 'edited' ] = ( isset ( $item [ 'edited' ]) ? DateTimeFormat :: utc ( $item [ 'edited' ]) : $item [ 'created' ]);
$item [ 'changed' ] = ( isset ( $item [ 'changed' ]) ? DateTimeFormat :: utc ( $item [ 'changed' ]) : $item [ 'created' ]);
$item [ 'commented' ] = ( isset ( $item [ 'commented' ]) ? DateTimeFormat :: utc ( $item [ 'commented' ]) : $item [ 'created' ]);
2020-03-25 08:07:34 +01:00
$item [ 'title' ] = substr ( trim ( $item [ 'title' ] ? ? '' ), 0 , 255 );
2019-10-16 14:35:14 +02:00
$item [ 'location' ] = trim ( $item [ 'location' ] ? ? '' );
$item [ 'coord' ] = trim ( $item [ 'coord' ] ? ? '' );
2018-11-30 15:06:22 +01:00
$item [ 'visible' ] = ( isset ( $item [ 'visible' ]) ? intval ( $item [ 'visible' ]) : 1 );
2018-02-21 22:39:07 +01:00
$item [ 'deleted' ] = 0 ;
2019-10-16 14:35:14 +02:00
$item [ 'post-type' ] = ( $item [ 'post-type' ] ? ? '' ) ? : self :: PT_ARTICLE ;
$item [ 'verb' ] = trim ( $item [ 'verb' ] ? ? '' );
$item [ 'object-type' ] = trim ( $item [ 'object-type' ] ? ? '' );
$item [ 'object' ] = trim ( $item [ 'object' ] ? ? '' );
$item [ 'target-type' ] = trim ( $item [ 'target-type' ] ? ? '' );
$item [ 'target' ] = trim ( $item [ 'target' ] ? ? '' );
2020-03-26 00:18:07 +01:00
$item [ 'plink' ] = substr ( trim ( $item [ 'plink' ] ? ? '' ), 0 , 255 );
2019-10-16 14:35:14 +02:00
$item [ 'allow_cid' ] = trim ( $item [ 'allow_cid' ] ? ? '' );
$item [ 'allow_gid' ] = trim ( $item [ 'allow_gid' ] ? ? '' );
$item [ 'deny_cid' ] = trim ( $item [ 'deny_cid' ] ? ? '' );
$item [ 'deny_gid' ] = trim ( $item [ 'deny_gid' ] ? ? '' );
2020-03-02 08:57:23 +01:00
$item [ 'private' ] = intval ( $item [ 'private' ] ? ? self :: PUBLIC );
2019-10-16 14:35:14 +02:00
$item [ 'body' ] = trim ( $item [ 'body' ] ? ? '' );
2020-10-29 06:20:26 +01:00
$item [ 'raw-body' ] = trim ( $item [ 'raw-body' ] ? ? $item [ 'body' ]);
2019-10-16 14:35:14 +02:00
$item [ 'app' ] = trim ( $item [ 'app' ] ? ? '' );
$item [ 'origin' ] = intval ( $item [ 'origin' ] ? ? 0 );
$item [ 'postopts' ] = trim ( $item [ 'postopts' ] ? ? '' );
$item [ 'resource-id' ] = trim ( $item [ 'resource-id' ] ? ? '' );
$item [ 'event-id' ] = intval ( $item [ 'event-id' ] ? ? 0 );
$item [ 'inform' ] = trim ( $item [ 'inform' ] ? ? '' );
$item [ 'file' ] = trim ( $item [ 'file' ] ? ? '' );
2018-01-28 12:18:08 +01:00
// Items cannot be stored before they happen ...
2018-02-21 22:39:07 +01:00
if ( $item [ 'created' ] > DateTimeFormat :: utcNow ()) {
$item [ 'created' ] = DateTimeFormat :: utcNow ();
2018-01-28 12:18:08 +01:00
}
// We haven't invented time travel by now.
2018-02-21 22:39:07 +01:00
if ( $item [ 'edited' ] > DateTimeFormat :: utcNow ()) {
$item [ 'edited' ] = DateTimeFormat :: utcNow ();
2018-01-28 12:18:08 +01:00
}
2019-12-30 23:00:08 +01:00
$item [ 'plink' ] = ( $item [ 'plink' ] ? ? '' ) ? : DI :: baseUrl () . '/display/' . urlencode ( $item [ 'guid' ]);
2018-01-28 12:18:08 +01:00
2020-05-12 22:13:48 +02:00
$item [ 'gravity' ] = self :: getGravity ( $item );
2020-10-03 17:42:21 +02:00
$item [ 'language' ] = self :: getLanguage ( $item );
2018-05-08 22:20:15 +02:00
$default = [ 'url' => $item [ 'author-link' ], 'name' => $item [ 'author-name' ],
2018-05-09 08:53:57 +02:00
'photo' => $item [ 'author-avatar' ], 'network' => $item [ 'network' ]];
2020-07-15 23:08:42 +02:00
$item [ 'author-id' ] = ( $item [ 'author-id' ] ? ? 0 ) ? : Contact :: getIdForURL ( $item [ 'author-link' ], 0 , null , $default );
2018-01-28 12:18:08 +01:00
2018-05-08 22:20:15 +02:00
$default = [ 'url' => $item [ 'owner-link' ], 'name' => $item [ 'owner-name' ],
2018-05-09 08:53:57 +02:00
'photo' => $item [ 'owner-avatar' ], 'network' => $item [ 'network' ]];
2020-07-15 23:08:42 +02:00
$item [ 'owner-id' ] = ( $item [ 'owner-id' ] ? ? 0 ) ? : Contact :: getIdForURL ( $item [ 'owner-link' ], 0 , null , $default );
2019-03-10 22:19:21 +01:00
2020-09-13 16:15:28 +02:00
$actor = ( $item [ 'gravity' ] == GRAVITY_PARENT ) ? $item [ 'owner-id' ] : $item [ 'author-id' ];
2020-09-25 08:47:07 +02:00
if ( ! $item [ 'origin' ] && ( $item [ 'uid' ] != 0 ) && Contact :: isSharing ( $actor , $item [ 'uid' ])) {
2020-09-13 16:15:28 +02:00
$item [ 'post-type' ] = self :: PT_FOLLOWER ;
}
2020-07-25 13:48:52 +02:00
// Ensure that there is an avatar cache
Contact :: checkAvatarCache ( $item [ 'author-id' ]);
Contact :: checkAvatarCache ( $item [ 'owner-id' ]);
2019-08-02 19:17:51 +02:00
// The contact-id should be set before "self::insert" was called - but there seems to be issues sometimes
$item [ " contact-id " ] = self :: contactId ( $item );
2021-01-11 21:00:51 +01:00
if ( ! empty ( $item [ 'direction' ]) && in_array ( $item [ 'direction' ], [ Conversation :: PUSH , Conversation :: RELAY ]) &&
self :: isTooOld ( $item )) {
Logger :: info ( 'Item is too old' , [ 'item' => $item ]);
return 0 ;
}
2020-05-14 05:48:26 +02:00
if ( ! self :: isValid ( $item )) {
2019-02-10 13:21:16 +01:00
return 0 ;
}
2020-11-11 16:07:39 +01:00
if ( $item [ 'gravity' ] !== GRAVITY_PARENT ) {
2020-11-11 08:44:43 +01:00
$toplevel_parent = self :: getTopLevelParent ( $item );
if ( empty ( $toplevel_parent )) {
return 0 ;
}
2020-05-13 07:48:26 +02:00
2020-11-14 13:41:01 +01:00
// If the thread originated from this node, we check the permission against the thread starter
2021-01-27 11:01:42 +01:00
$condition = [ 'uri-id' => $toplevel_parent [ 'uri-id' ], 'wall' => true ];
2021-01-16 05:13:22 +01:00
$localTopLevelParent = Post :: selectFirst ([ 'uid' ], $condition );
2020-11-14 13:41:01 +01:00
if ( ! empty ( $localTopLevelParent [ 'uid' ]) && ! self :: isAllowedByUser ( $item , $localTopLevelParent [ 'uid' ])) {
return 0 ;
}
2021-01-27 11:01:42 +01:00
$parent_id = $toplevel_parent [ 'id' ];
$item [ 'parent-uri' ] = $toplevel_parent [ 'uri' ];
$item [ 'parent-uri-id' ] = $toplevel_parent [ 'uri-id' ];
$item [ 'deleted' ] = $toplevel_parent [ 'deleted' ];
$item [ 'allow_cid' ] = $toplevel_parent [ 'allow_cid' ];
$item [ 'allow_gid' ] = $toplevel_parent [ 'allow_gid' ];
$item [ 'deny_cid' ] = $toplevel_parent [ 'deny_cid' ];
$item [ 'deny_gid' ] = $toplevel_parent [ 'deny_gid' ];
$parent_origin = $toplevel_parent [ 'origin' ];
2020-05-13 07:48:26 +02:00
2020-11-11 08:44:43 +01:00
// Don't federate received participation messages
if ( $item [ 'verb' ] != Activity :: FOLLOW ) {
$item [ 'wall' ] = $toplevel_parent [ 'wall' ];
} else {
$item [ 'wall' ] = false ;
}
2020-05-13 07:48:26 +02:00
2020-11-11 08:44:43 +01:00
/*
* If the parent is private , force privacy for the entire conversation
* This differs from the above settings as it subtly allows comments from
* email correspondents to be private even if the overall thread is not .
*/
if ( $toplevel_parent [ 'private' ]) {
$item [ 'private' ] = $toplevel_parent [ 'private' ];
}
2019-02-10 12:28:17 +01:00
2020-11-11 08:44:43 +01:00
/*
* Edge case . We host a public forum that was originally posted to privately .
* The original author commented , but as this is a comment , the permissions
* weren ' t fixed up so it will still show the comment as private unless we fix it here .
*/
if (( intval ( $toplevel_parent [ 'forum_mode' ]) == 1 ) && ( $toplevel_parent [ 'private' ] != self :: PUBLIC )) {
$item [ 'private' ] = self :: PUBLIC ;
}
// If its a post that originated here then tag the thread as "mention"
if ( $item [ 'origin' ] && $item [ 'uid' ]) {
2021-02-04 10:46:29 +01:00
DBA :: update ( 'post-thread-user' , [ 'mention' => true ], [ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $item [ 'uid' ]]);
Logger :: info ( 'tagged thread as mention' , [ 'parent' => $parent_id , 'parent-uri-id' => $item [ 'parent-uri-id' ], 'uid' => $item [ 'uid' ]]);
2019-02-10 12:28:17 +01:00
}
2018-02-21 22:08:37 +01:00
2020-11-11 08:44:43 +01:00
// Update the contact relations
Contact\Relation :: store ( $toplevel_parent [ 'author-id' ], $item [ 'author-id' ], $item [ 'created' ]);
2018-01-28 12:18:08 +01:00
} else {
2020-05-12 22:13:48 +02:00
$parent_id = 0 ;
$parent_origin = $item [ 'origin' ];
2019-06-06 06:26:02 +02:00
}
2018-08-05 13:09:59 +02:00
$item [ 'parent-uri-id' ] = ItemURI :: getIdByURI ( $item [ 'parent-uri' ]);
$item [ 'thr-parent-id' ] = ItemURI :: getIdByURI ( $item [ 'thr-parent' ]);
2018-06-03 11:40:32 +02:00
// Is this item available in the global items (with uid=0)?
if ( $item [ " uid " ] == 0 ) {
$item [ " global " ] = true ;
// Set the global flag on all items if this was a global item entry
2021-02-06 14:42:21 +01:00
Post :: update ([ 'global' => true ], [ 'uri-id' => $item [ 'uri-id' ]]);
2018-06-03 11:40:32 +02:00
} else {
2021-01-27 11:01:42 +01:00
$item [ 'global' ] = Post :: exists ([ 'uid' => 0 , 'uri-id' => $item [ 'uri-id' ]]);
2018-06-03 11:40:32 +02:00
}
2018-01-28 12:18:08 +01:00
// ACL settings
2020-05-12 22:13:48 +02:00
if ( ! empty ( $item [ " allow_cid " ] . $item [ " allow_gid " ] . $item [ " deny_cid " ] . $item [ " deny_gid " ])) {
$item [ " private " ] = self :: PRIVATE ;
2018-01-28 12:18:08 +01:00
}
if ( $notify ) {
2018-07-10 14:27:56 +02:00
$item [ 'edit' ] = false ;
$item [ 'parent' ] = $parent_id ;
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'post_local' , $item );
2018-01-28 12:18:08 +01:00
} else {
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'post_remote' , $item );
2018-01-28 12:18:08 +01:00
}
2018-11-30 15:06:22 +01:00
if ( ! empty ( $item [ 'cancel' ])) {
2018-10-29 22:20:46 +01:00
Logger :: log ( 'post cancelled by addon.' );
2018-01-28 12:18:08 +01:00
return 0 ;
}
2020-05-12 22:13:48 +02:00
if ( empty ( $item [ 'vid' ]) && ! empty ( $item [ 'verb' ])) {
$item [ 'vid' ] = Verb :: getID ( $item [ 'verb' ]);
2018-06-30 23:15:24 +02:00
}
2018-07-26 01:14:55 +02:00
// Creates or assigns the permission set
2019-11-05 14:27:22 +01:00
$item [ 'psid' ] = PermissionSet :: getIdFromACL (
$item [ 'uid' ],
$item [ 'allow_cid' ],
$item [ 'allow_gid' ],
$item [ 'deny_cid' ],
$item [ 'deny_gid' ]
);
2021-02-14 10:43:27 +01:00
if ( ! empty ( $item [ 'extid' ])) {
$item [ 'external-id' ] = ItemURI :: getIdByURI ( $item [ 'extid' ]);
}
2020-08-13 08:09:26 +02:00
if ( $item [ 'verb' ] == Activity :: ANNOUNCE ) {
self :: setOwnerforResharedItem ( $item );
}
2020-05-13 20:45:31 +02:00
2020-10-29 06:20:26 +01:00
// Remove all media attachments from the body and store them in the post-media table
2020-10-29 09:48:08 +01:00
$item [ 'raw-body' ] = Post\Media :: insertFromBody ( $item [ 'uri-id' ], $item [ 'raw-body' ]);
2020-10-29 06:20:26 +01:00
$item [ 'raw-body' ] = self :: setHashtags ( $item [ 'raw-body' ]);
2020-05-13 20:45:31 +02:00
// Check for hashtags in the body and repair or add hashtag links
2020-06-05 02:56:50 +02:00
$item [ 'body' ] = self :: setHashtags ( $item [ 'body' ]);
2020-05-31 17:48:31 +02:00
2020-05-13 20:45:31 +02:00
// Fill the cache field
self :: putInCache ( $item );
if ( stristr ( $item [ 'verb' ], Activity :: POKE )) {
$notify_type = Delivery :: POKE ;
} else {
$notify_type = Delivery :: POST ;
}
2021-02-01 08:06:01 +01:00
// Filling item related side tables
if ( ! empty ( $item [ 'attach' ])) {
Post\Media :: insertFromAttachment ( $item [ 'uri-id' ], $item [ 'attach' ]);
2020-05-18 23:34:57 +02:00
}
2021-02-13 20:56:03 +01:00
if ( empty ( $item [ 'event-id' ])) {
unset ( $item [ 'event-id' ]);
}
Post :: insert ( $item [ 'uri-id' ], $item );
2021-02-04 06:51:25 +01:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
Post\Thread :: insert ( $item [ 'uri-id' ], $item );
}
2021-02-01 08:06:01 +01:00
if ( ! in_array ( $item [ 'verb' ], self :: ACTIVITIES )) {
Post\Content :: insert ( $item [ 'uri-id' ], $item );
2020-05-13 20:45:31 +02:00
}
2020-05-13 07:48:26 +02:00
// Diaspora signature
2020-05-12 22:13:48 +02:00
if ( ! empty ( $item [ 'diaspora_signed_text' ])) {
2020-10-23 21:10:17 +02:00
DBA :: replace ( 'diaspora-interaction' , [ 'uri-id' => $item [ 'uri-id' ], 'interaction' => $item [ 'diaspora_signed_text' ]]);
2020-05-12 22:13:48 +02:00
}
2020-05-13 07:48:26 +02:00
// Attached file links
2020-05-13 20:45:31 +02:00
if ( ! empty ( $item [ 'file' ])) {
2020-11-17 23:33:44 +01:00
Post\Category :: storeTextByURIId ( $item [ 'uri-id' ], $item [ 'uid' ], $item [ 'file' ]);
2020-05-12 22:13:48 +02:00
}
2020-05-13 07:48:26 +02:00
// Delivery relevant data
2020-05-12 22:13:48 +02:00
$delivery_data = Post\DeliveryData :: extractFields ( $item );
2018-07-19 23:56:52 +02:00
2020-05-13 20:45:31 +02:00
if ( ! empty ( $item [ 'origin' ]) || ! empty ( $item [ 'wall' ]) || ! empty ( $delivery_data [ 'postopts' ]) || ! empty ( $delivery_data [ 'inform' ])) {
Post\DeliveryData :: insert ( $item [ 'uri-id' ], $delivery_data );
}
2018-08-29 22:46:52 +02:00
2020-05-12 22:13:48 +02:00
// Store tags from the body if this hadn't been handled previously in the protocol classes
if ( ! Tag :: existsForPost ( $item [ 'uri-id' ])) {
2021-02-01 08:06:01 +01:00
Tag :: storeFromBody ( $item [ 'uri-id' ], $item [ 'body' ]);
2020-05-12 22:13:48 +02:00
}
2020-07-10 00:22:26 +02:00
2021-02-13 20:56:03 +01:00
$condition = [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $item [ 'uid' ]];
if ( Post :: exists ( $condition )) {
Logger :: notice ( 'Item is already inserted - aborting' , $condition );
return 0 ;
}
2021-02-14 19:33:15 +01:00
$post_user_id = Post\User :: insert ( $item [ 'uri-id' ], $item [ 'uid' ], $item );
if ( ! $post_user_id ) {
2021-02-01 08:06:01 +01:00
Logger :: notice ( 'Post-User is already inserted - aborting' , [ 'uid' => $item [ 'uid' ], 'uri-id' => $item [ 'uri-id' ]]);
return 0 ;
}
2021-01-31 19:32:22 +01:00
2021-02-01 08:06:01 +01:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
2021-02-14 19:33:15 +01:00
$item [ 'post-user-id' ] = $post_user_id ;
2021-02-01 08:06:01 +01:00
Post\ThreadUser :: insert ( $item [ 'uri-id' ], $item [ 'uid' ], $item );
}
2018-01-28 12:18:08 +01:00
2021-02-14 21:27:31 +01:00
Logger :: notice ( 'created item' , [ 'post-id' => $post_user_id , 'uid' => $item [ 'uid' ], 'network' => $item [ 'network' ], 'uri-id' => $item [ 'uri-id' ], 'guid' => $item [ 'guid' ]]);
2018-01-28 12:18:08 +01:00
2021-02-14 19:33:15 +01:00
$posted_item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'post-user-id' => $post_user_id ]);
if ( ! DBA :: isResult ( $posted_item )) {
2021-02-14 21:27:31 +01:00
// On failure store the data into a spool file so that the "SpoolPost" worker can try again later.
Logger :: warning ( 'Could not store item. it will be spooled' , [ 'id' => $post_user_id ]);
self :: spool ( $orig_item );
2021-02-14 19:33:15 +01:00
return 0 ;
}
2018-01-28 12:18:08 +01:00
// update the commented timestamp on the parent
2020-10-05 19:57:24 +02:00
if ( DI :: config () -> get ( 'system' , 'like_no_comment' )) {
// Update when it is a comment
2021-02-14 19:33:15 +01:00
$update_commented = in_array ( $posted_item [ 'gravity' ], [ GRAVITY_PARENT , GRAVITY_COMMENT ]);
2020-10-05 19:57:24 +02:00
} else {
// Update when it isn't a follow or tag verb
2021-02-14 19:33:15 +01:00
$update_commented = ! in_array ( $posted_item [ 'verb' ], [ Activity :: FOLLOW , Activity :: TAG ]);
2020-10-05 19:57:24 +02:00
}
if ( $update_commented ) {
2021-02-14 19:33:15 +01:00
Post :: update ([ 'commented' => DateTimeFormat :: utcNow (), 'changed' => DateTimeFormat :: utcNow ()], [ 'id' => $post_user_id ]);
2018-01-28 12:18:08 +01:00
} else {
2021-02-14 19:33:15 +01:00
Post :: update ([ 'changed' => DateTimeFormat :: utcNow ()], [ 'uri-id' => $posted_item [ 'parent-uri-id' ], 'uid' => $posted_item [ 'uid' ]]);
2018-01-28 12:18:08 +01:00
}
2019-08-03 12:36:21 +02:00
// In that function we check if this is a forum post. Additionally we delete the item under certain circumstances
2021-02-14 19:33:15 +01:00
if ( self :: tagDeliver ( $posted_item [ 'uid' ], $post_user_id )) {
2019-08-03 12:36:21 +02:00
// Get the user information for the logging
$user = User :: getById ( $uid );
2021-02-14 19:33:15 +01:00
Logger :: notice ( 'Item had been deleted' , [ 'id' => $post_user_id , 'user' => $uid , 'account-type' => $user [ 'account-type' ]]);
2019-08-03 12:36:21 +02:00
return 0 ;
}
if ( ! $dontcache ) {
2021-02-14 19:33:15 +01:00
if ( $notify ) {
Hook :: callAll ( 'post_local_end' , $posted_item );
2019-08-03 12:36:21 +02:00
} else {
2021-02-14 19:33:15 +01:00
Hook :: callAll ( 'post_remote_end' , $posted_item );
}
2019-08-03 12:36:21 +02:00
}
2021-02-14 19:33:15 +01:00
if ( $posted_item [ 'gravity' ] === GRAVITY_PARENT ) {
self :: addShadow ( $post_user_id );
2018-01-28 12:18:08 +01:00
} else {
2021-02-14 19:33:15 +01:00
self :: addShadowPost ( $post_user_id );
2018-01-28 12:18:08 +01:00
}
2021-02-14 19:33:15 +01:00
self :: updateContact ( $posted_item );
2019-08-03 12:36:21 +02:00
2021-02-14 19:33:15 +01:00
Post\UserNotification :: setNotification ( $posted_item [ 'uri-id' ], $posted_item [ 'uid' ]);
2020-01-05 02:23:40 +01:00
2021-02-14 19:33:15 +01:00
check_user_notification ( $posted_item [ 'uri-id' ], $posted_item [ 'uid' ]);
2018-01-28 12:18:08 +01:00
2020-07-21 10:35:57 +02:00
// Distribute items to users who subscribed to their tags
2021-02-14 19:33:15 +01:00
self :: distributeByTags ( $posted_item );
2020-07-21 10:35:57 +02:00
2020-11-28 23:53:58 +01:00
// Automatically reshare the item if the "remote_self" option is selected
2021-02-14 19:33:15 +01:00
self :: autoReshare ( $posted_item );
2020-11-28 23:53:58 +01:00
2021-02-14 19:33:15 +01:00
$transmit = $notify || ( $posted_item [ 'visible' ] && ( $parent_origin || $posted_item [ 'origin' ]));
2020-05-06 22:43:00 +02:00
if ( $transmit ) {
// Don't relay participation messages
2021-02-14 19:33:15 +01:00
if (( $posted_item [ 'verb' ] == Activity :: FOLLOW ) &&
( ! $posted_item [ 'origin' ] || ( $posted_item [ 'author-id' ] != Contact :: getPublicIdByUserId ( $uid )))) {
Logger :: info ( 'Participation messages will not be relayed' , [ 'item' => $posted_item [ 'id' ], 'uri' => $posted_item [ 'uri' ], 'verb' => $posted_item [ 'verb' ]]);
2020-05-06 22:43:00 +02:00
$transmit = false ;
}
}
if ( $transmit ) {
2021-02-14 19:33:15 +01:00
Worker :: add ([ 'priority' => $priority , 'dont_fork' => true ], 'Notifier' , $notify_type , ( int ) $posted_item [ 'uri-id' ], ( int ) $posted_item [ 'uid' ]);
2018-01-28 12:18:08 +01:00
}
2021-02-14 19:33:15 +01:00
return $post_user_id ;
2018-01-28 12:18:08 +01:00
}
2020-08-10 00:46:18 +02:00
/**
2020-08-23 10:39:56 +02:00
* Change the owner of a parent item if it had been shared by a forum
2020-08-10 00:46:18 +02:00
*
2020-08-11 07:23:16 +02:00
* ( public ) forum posts in the new format consist of the regular post by the author
* followed by an announce message sent from the forum account .
2020-08-13 08:09:26 +02:00
* Changing the owner helps in grouping forum posts .
*
2020-08-10 00:46:18 +02:00
* @ param array $item
* @ return void
*/
2020-08-13 08:09:26 +02:00
private static function setOwnerforResharedItem ( array $item )
2020-08-10 00:46:18 +02:00
{
2021-01-16 05:13:22 +01:00
$parent = Post :: selectFirst ([ 'id' , 'causer-id' , 'owner-id' , 'author-id' , 'author-link' , 'origin' , 'post-type' ],
2020-09-13 16:15:28 +02:00
[ 'uri-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ]]);
2020-08-13 08:09:26 +02:00
if ( ! DBA :: isResult ( $parent )) {
2020-09-13 16:15:28 +02:00
Logger :: error ( 'Parent not found' , [ 'uri-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ]]);
2020-08-10 00:46:18 +02:00
return ;
}
2021-02-14 21:27:31 +01:00
$author = Contact :: selectFirst ([ 'url' , 'contact-type' , 'network' ], [ 'id' => $item [ 'author-id' ]]);
2020-08-13 08:09:26 +02:00
if ( ! DBA :: isResult ( $author )) {
Logger :: error ( 'Author not found' , [ 'id' => $item [ 'author-id' ]]);
2020-08-10 00:46:18 +02:00
return ;
}
2020-08-13 08:09:26 +02:00
$cid = Contact :: getIdForURL ( $author [ 'url' ], $item [ 'uid' ]);
2021-02-14 21:27:31 +01:00
if ( empty ( $cid ) || ( ! Contact :: isSharing ( $cid , $item [ 'uid' ] && in_array ( $author [ 'network' ], Protocol :: FEDERATED )))) {
Logger :: info ( 'The resharer is not a following contact: quit' , [ 'resharer' => $author [ 'url' ], 'uid' => $item [ 'uid' ], 'cid' => $cid ]);
2020-08-13 08:09:26 +02:00
return ;
}
2020-09-13 16:15:28 +02:00
if ( $author [ 'contact-type' ] != Contact :: TYPE_COMMUNITY ) {
2020-10-11 19:37:04 +02:00
if ( $parent [ 'post-type' ] == self :: PT_ANNOUNCEMENT ) {
Logger :: info ( 'The parent is already marked as announced: quit' , [ 'causer' => $parent [ 'causer-id' ], 'owner' => $parent [ 'owner-id' ], 'author' => $parent [ 'author-id' ], 'uid' => $item [ 'uid' ]]);
return ;
}
2020-09-25 08:47:07 +02:00
if ( Contact :: isSharing ( $parent [ 'owner-id' ], $item [ 'uid' ])) {
2020-09-13 23:00:54 +02:00
Logger :: info ( 'The resharer is no forum: quit' , [ 'resharer' => $item [ 'author-id' ], 'owner' => $parent [ 'owner-id' ], 'author' => $parent [ 'author-id' ], 'uid' => $item [ 'uid' ]]);
2020-09-13 16:15:28 +02:00
return ;
}
2020-09-22 07:36:01 +02:00
self :: update ([ 'post-type' => self :: PT_ANNOUNCEMENT , 'causer-id' => $item [ 'author-id' ]], [ 'id' => $parent [ 'id' ]]);
2020-09-13 16:15:28 +02:00
Logger :: info ( 'Set announcement post-type' , [ 'uri-id' => $item [ 'uri-id' ], 'thr-parent-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ]]);
2020-08-13 08:09:26 +02:00
return ;
}
2020-09-13 16:15:28 +02:00
self :: update ([ 'owner-id' => $item [ 'author-id' ], 'contact-id' => $cid ], [ 'id' => $parent [ 'id' ]]);
Logger :: info ( 'Change owner of the parent' , [ 'uri-id' => $item [ 'uri-id' ], 'thr-parent-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ], 'owner-id' => $item [ 'author-id' ], 'contact-id' => $cid ]);
2020-08-10 00:46:18 +02:00
}
2020-07-21 10:35:57 +02:00
/**
* Distribute the given item to users who subscribed to their tags
*
* @ param array $item Processed item
*/
2020-07-23 05:26:54 +02:00
private static function distributeByTags ( array $item )
2020-07-21 10:35:57 +02:00
{
if (( $item [ 'uid' ] != 0 ) || ( $item [ 'gravity' ] != GRAVITY_PARENT ) || ! in_array ( $item [ 'network' ], Protocol :: FEDERATED )) {
return ;
}
$uids = Tag :: getUIDListByURIId ( $item [ 'uri-id' ]);
foreach ( $uids as $uid ) {
2020-08-23 19:48:44 +02:00
if ( Contact :: isSharing ( $item [ 'author-id' ], $uid )) {
$fields = [];
} else {
$fields = [ 'post-type' => self :: PT_TAG ];
}
$stored = self :: storeForUserByUriId ( $item [ 'uri-id' ], $uid , $fields );
2020-08-23 19:58:22 +02:00
Logger :: info ( 'Stored item for users' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid , 'fields' => $fields , 'stored' => $stored ]);
2020-07-21 10:35:57 +02:00
}
}
2018-04-24 15:21:25 +02:00
/**
2020-01-19 07:05:23 +01:00
* Distributes public items to the receivers
2018-04-24 15:21:25 +02:00
*
2018-05-15 06:33:28 +02:00
* @ param integer $itemid Item ID that should be added
* @ param string $signed_text Original text ( for Diaspora signatures ), JSON encoded .
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-04-24 15:21:25 +02:00
*/
2018-05-15 06:33:28 +02:00
public static function distribute ( $itemid , $signed_text = '' )
2018-04-24 15:21:25 +02:00
{
2021-01-20 00:26:24 +01:00
$condition = [ " `id` IN (SELECT `parent` FROM `post-view` WHERE `id` = ?) " , $itemid ];
2021-01-16 05:13:22 +01:00
$parent = Post :: selectFirst ([ 'owner-id' ], $condition );
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $parent )) {
2021-02-14 19:33:15 +01:00
Logger :: warning ( 'Item not found' , [ 'condition' => $condition ]);
2018-04-24 15:21:25 +02:00
return ;
}
// Only distribute public items from native networks
$condition = [ 'id' => $itemid , 'uid' => 0 ,
2019-07-01 20:00:55 +02:00
'network' => array_merge ( Protocol :: FEDERATED ,[ '' ]),
2021-02-13 20:56:03 +01:00
'visible' => true , 'deleted' => false , 'private' => [ self :: PUBLIC , self :: UNLISTED ]];
2021-01-16 05:13:22 +01:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , $condition );
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2021-02-14 19:33:15 +01:00
Logger :: warning ( 'Item not found' , [ 'condition' => $condition ]);
2018-04-24 15:21:25 +02:00
return ;
}
2018-07-10 14:27:56 +02:00
$origin = $item [ 'origin' ];
2018-04-26 21:47:12 +02:00
$users = [];
2018-09-16 11:06:09 +02:00
/// @todo add a field "pcid" in the contact table that referrs to the public contact id.
2018-09-15 20:54:45 +02:00
$owner = DBA :: selectFirst ( 'contact' , [ 'url' , 'nurl' , 'alias' ], [ 'id' => $parent [ 'owner-id' ]]);
if ( ! DBA :: isResult ( $owner )) {
return ;
}
$condition = [ 'nurl' => $owner [ 'nurl' ], 'rel' => [ Contact :: SHARING , Contact :: FRIEND ]];
$contacts = DBA :: select ( 'contact' , [ 'uid' ], $condition );
while ( $contact = DBA :: fetch ( $contacts )) {
if ( $contact [ 'uid' ] == 0 ) {
continue ;
}
$users [ $contact [ 'uid' ]] = $contact [ 'uid' ];
}
DBA :: close ( $contacts );
$condition = [ 'alias' => $owner [ 'url' ], 'rel' => [ Contact :: SHARING , Contact :: FRIEND ]];
$contacts = DBA :: select ( 'contact' , [ 'uid' ], $condition );
while ( $contact = DBA :: fetch ( $contacts )) {
if ( $contact [ 'uid' ] == 0 ) {
continue ;
}
$users [ $contact [ 'uid' ]] = $contact [ 'uid' ];
}
DBA :: close ( $contacts );
if ( ! empty ( $owner [ 'alias' ])) {
2020-07-18 17:49:10 +02:00
$condition = [ 'nurl' => Strings :: normaliseLink ( $owner [ 'alias' ]), 'rel' => [ Contact :: SHARING , Contact :: FRIEND ]];
2018-09-15 20:54:45 +02:00
$contacts = DBA :: select ( 'contact' , [ 'uid' ], $condition );
while ( $contact = DBA :: fetch ( $contacts )) {
if ( $contact [ 'uid' ] == 0 ) {
continue ;
}
$users [ $contact [ 'uid' ]] = $contact [ 'uid' ];
}
DBA :: close ( $contacts );
}
2018-05-15 06:33:28 +02:00
$origin_uid = 0 ;
2021-01-27 11:01:42 +01:00
if ( $item [ 'uri-id' ] != $item [ 'parent-uri-id' ]) {
$parents = Post :: select ([ 'uid' , 'origin' ], [ " `uri-id` = ? AND `uid` != 0 " , $item [ 'parent-uri-id' ]]);
2021-01-16 05:13:22 +01:00
while ( $parent = Post :: fetch ( $parents )) {
2018-04-26 21:47:12 +02:00
$users [ $parent [ 'uid' ]] = $parent [ 'uid' ];
2018-07-10 14:27:56 +02:00
if ( $parent [ 'origin' ] && ! $origin ) {
2018-05-15 06:33:28 +02:00
$origin_uid = $parent [ 'uid' ];
}
2018-04-26 21:47:12 +02:00
}
2021-01-16 05:13:22 +01:00
DBA :: close ( $parents );
2018-04-26 21:47:12 +02:00
}
foreach ( $users as $uid ) {
2018-05-15 06:33:28 +02:00
if ( $origin_uid == $uid ) {
$item [ 'diaspora_signed_text' ] = $signed_text ;
}
2020-07-21 10:35:57 +02:00
self :: storeForUser ( $item , $uid );
2018-04-24 15:21:25 +02:00
}
}
/**
2020-07-23 05:26:54 +02:00
* Store a public item defined by their URI - ID for the given users
*
* @ param integer $uri_id URI - ID of the given item
* @ param integer $uid The user that will receive the item entry
2020-08-23 19:48:44 +02:00
* @ param array $fields Additional fields to be stored
2020-07-23 05:26:54 +02:00
* @ return integer stored item id
*/
2020-08-23 19:48:44 +02:00
public static function storeForUserByUriId ( int $uri_id , int $uid , array $fields = [])
2020-07-23 05:26:54 +02:00
{
2021-01-16 05:13:22 +01:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'uri-id' => $uri_id , 'uid' => 0 ]);
2020-07-28 08:42:12 +02:00
if ( ! DBA :: isResult ( $item )) {
return 0 ;
}
if (( $item [ 'private' ] == self :: PRIVATE ) || ! in_array ( $item [ 'network' ], Protocol :: FEDERATED )) {
Logger :: notice ( 'Item is private or not from a federated network. It will not be stored for the user.' , [ 'uri-id' => $uri_id , 'uid' => $uid , 'private' => $item [ 'private' ], 'network' => $item [ 'network' ]]);
2020-07-23 05:26:54 +02:00
return 0 ;
}
2020-08-23 19:48:44 +02:00
2020-09-13 16:15:28 +02:00
$item [ 'post-type' ] = self :: PT_STORED ;
2020-08-23 19:48:44 +02:00
$item = array_merge ( $item , $fields );
2020-07-23 05:26:54 +02:00
$stored = self :: storeForUser ( $item , $uid );
Logger :: info ( 'Public item stored for user' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid , 'stored' => $stored ]);
return $stored ;
}
/**
* Store a public item array for the given users
2018-04-24 15:21:25 +02:00
*
2018-04-24 16:58:39 +02:00
* @ param array $item The item entry that will be stored
* @ param integer $uid The user that will receive the item entry
2020-07-21 10:35:57 +02:00
* @ return integer stored item id
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-04-24 15:21:25 +02:00
*/
2020-07-23 05:26:54 +02:00
private static function storeForUser ( array $item , int $uid )
2018-04-24 15:21:25 +02:00
{
2021-01-16 05:13:22 +01:00
if ( Post :: exists ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid ])) {
2020-07-21 10:35:57 +02:00
Logger :: info ( 'Item already exists' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid ]);
return 0 ;
}
unset ( $item [ 'id' ]);
unset ( $item [ 'parent' ]);
unset ( $item [ 'mention' ]);
unset ( $item [ 'starred' ]);
2020-07-23 05:26:54 +02:00
unset ( $item [ 'unseen' ]);
unset ( $item [ 'psid' ]);
2020-07-21 10:35:57 +02:00
2018-04-24 16:58:39 +02:00
$item [ 'uid' ] = $uid ;
2018-04-24 15:21:25 +02:00
$item [ 'origin' ] = 0 ;
$item [ 'wall' ] = 0 ;
2020-07-21 10:35:57 +02:00
2020-07-21 21:43:07 +02:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
2020-07-21 10:35:57 +02:00
$contact = Contact :: getByURLForUser ( $item [ 'owner-link' ], $uid , false , [ 'id' ]);
2018-04-24 15:21:25 +02:00
} else {
2020-07-21 10:35:57 +02:00
$contact = Contact :: getByURLForUser ( $item [ 'author-link' ], $uid , false , [ 'id' ]);
2018-04-24 15:21:25 +02:00
}
2020-07-21 20:53:01 +02:00
if ( ! empty ( $contact [ 'id' ])) {
2020-07-21 10:35:57 +02:00
$item [ 'contact-id' ] = $contact [ 'id' ];
} else {
// Shouldn't happen at all
2020-07-21 20:30:45 +02:00
Logger :: warning ( 'contact-id could not be fetched' , [ 'uid' => $uid , 'item' => $item ]);
2018-07-20 14:19:26 +02:00
$self = DBA :: selectFirst ( 'contact' , [ 'id' ], [ 'self' => true , 'uid' => $uid ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $self )) {
2020-07-21 10:35:57 +02:00
// Shouldn't happen even less
2020-07-21 20:30:45 +02:00
Logger :: warning ( 'self contact could not be fetched' , [ 'uid' => $uid , 'item' => $item ]);
2020-07-21 10:35:57 +02:00
return 0 ;
2018-04-24 15:21:25 +02:00
}
$item [ 'contact-id' ] = $self [ 'id' ];
}
/// @todo Handling of "event-id"
2018-05-04 23:12:13 +02:00
$notify = false ;
2020-07-21 21:43:07 +02:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
2018-07-20 14:19:26 +02:00
$contact = DBA :: selectFirst ( 'contact' , [], [ 'id' => $item [ 'contact-id' ], 'self' => false ]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $contact )) {
2018-05-04 23:12:13 +02:00
$notify = self :: isRemoteSelf ( $contact , $item );
}
}
2020-05-12 23:49:12 +02:00
$distributed = self :: insert ( $item , $notify , true );
2018-04-24 15:21:25 +02:00
if ( ! $distributed ) {
2020-07-21 10:35:57 +02:00
Logger :: info ( " Distributed public item wasn't stored " , [ 'uri-id' => $item [ 'uri-id' ], 'user' => $uid ]);
2018-04-24 15:21:25 +02:00
} else {
2020-07-21 10:35:57 +02:00
Logger :: info ( 'Distributed public item was stored' , [ 'uri-id' => $item [ 'uri-id' ], 'user' => $uid , 'stored' => $distributed ]);
2018-04-24 15:21:25 +02:00
}
2020-07-21 10:35:57 +02:00
return $distributed ;
2018-04-24 15:21:25 +02:00
}
2018-01-16 23:23:19 +01:00
/**
2020-01-19 07:05:23 +01:00
* Add a shadow entry for a given item id that is a thread starter
2018-01-16 23:23:19 +01:00
*
* We store every public item entry additionally with the user id " 0 " .
* This is used for the community page and for the search .
* It is planned that in the future we will store public item entries only once .
*
* @ param integer $itemid Item ID that should be added
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-01-16 23:23:19 +01:00
*/
2020-10-24 10:05:03 +02:00
private static function addShadow ( $itemid )
2018-01-16 23:46:20 +01:00
{
2021-02-13 20:56:03 +01:00
$fields = [ 'uid' , 'private' , 'visible' , 'deleted' , 'network' , 'uri-id' ];
2021-02-14 19:33:15 +01:00
$condition = [ 'id' => $itemid , 'gravity' => GRAVITY_PARENT ];
2021-01-16 05:13:22 +01:00
$item = Post :: selectFirst ( $fields , $condition );
2018-01-16 23:23:19 +01:00
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2018-01-16 23:23:19 +01:00
return ;
}
// is it already a copy?
if (( $itemid == 0 ) || ( $item [ 'uid' ] == 0 )) {
return ;
}
// Is it a visible public post?
2021-02-13 20:56:03 +01:00
if ( ! $item [ " visible " ] || $item [ " deleted " ] || ( $item [ " private " ] == self :: PRIVATE )) {
2018-01-16 23:23:19 +01:00
return ;
}
// is it an entry from a connector? Only add an entry for natively connected networks
2019-07-01 20:00:55 +02:00
if ( ! in_array ( $item [ " network " ], array_merge ( Protocol :: FEDERATED ,[ '' ]))) {
2018-01-16 23:23:19 +01:00
return ;
}
2021-01-27 11:01:42 +01:00
if ( Post :: exists ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => 0 ])) {
2018-07-01 09:57:59 +02:00
return ;
}
2021-01-16 05:13:22 +01:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $itemid ]);
2018-06-25 18:11:27 +02:00
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $item )) {
2018-07-01 09:57:59 +02:00
// Preparing public shadow (removing user specific data)
$item [ 'uid' ] = 0 ;
unset ( $item [ 'id' ]);
unset ( $item [ 'parent' ]);
unset ( $item [ 'wall' ]);
unset ( $item [ 'mention' ]);
unset ( $item [ 'origin' ]);
unset ( $item [ 'starred' ]);
2018-07-19 23:56:52 +02:00
unset ( $item [ 'postopts' ]);
unset ( $item [ 'inform' ]);
2020-09-25 08:47:07 +02:00
unset ( $item [ 'post-type' ]);
2021-01-27 11:01:42 +01:00
if ( $item [ 'uri-id' ] == $item [ 'parent-uri-id' ]) {
2018-07-01 09:57:59 +02:00
$item [ 'contact-id' ] = $item [ 'owner-id' ];
} else {
$item [ 'contact-id' ] = $item [ 'author-id' ];
}
2018-01-16 23:23:19 +01:00
2020-05-12 23:49:12 +02:00
$public_shadow = self :: insert ( $item , false , true );
2018-01-16 23:23:19 +01:00
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Stored public shadow' , [ 'thread' => $itemid , 'id' => $public_shadow ]);
2018-01-16 23:23:19 +01:00
}
}
/**
2020-01-19 07:05:23 +01:00
* Add a shadow entry for a given item id that is a comment
2018-01-16 23:23:19 +01:00
*
* This function does the same like the function above - but for comments
*
* @ param integer $itemid Item ID that should be added
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-01-16 23:23:19 +01:00
*/
2020-10-24 10:05:03 +02:00
private static function addShadowPost ( $itemid )
2018-01-16 23:46:20 +01:00
{
2021-01-16 05:13:22 +01:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $itemid ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2018-01-16 23:23:19 +01:00
return ;
}
// Is it a toplevel post?
2020-05-27 14:19:06 +02:00
if ( $item [ 'gravity' ] == GRAVITY_PARENT ) {
2018-01-16 23:23:19 +01:00
self :: addShadow ( $itemid );
return ;
}
// Is this a shadow entry?
2018-05-10 14:48:27 +02:00
if ( $item [ 'uid' ] == 0 ) {
2018-01-16 23:23:19 +01:00
return ;
2018-05-10 14:48:27 +02:00
}
2018-01-16 23:23:19 +01:00
// Is there a shadow parent?
2021-01-27 11:01:42 +01:00
if ( ! Post :: exists ([ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => 0 ])) {
2018-01-16 23:23:19 +01:00
return ;
}
// Is there already a shadow entry?
2021-01-27 11:01:42 +01:00
if ( Post :: exists ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => 0 ])) {
2018-01-16 23:23:19 +01:00
return ;
}
2018-04-27 06:11:33 +02:00
// Save "origin" and "parent" state
$origin = $item [ 'origin' ];
$parent = $item [ 'parent' ];
2018-01-16 23:23:19 +01:00
// Preparing public shadow (removing user specific data)
$item [ 'uid' ] = 0 ;
2018-04-27 06:11:33 +02:00
unset ( $item [ 'id' ]);
unset ( $item [ 'parent' ]);
unset ( $item [ 'wall' ]);
unset ( $item [ 'mention' ]);
unset ( $item [ 'origin' ]);
unset ( $item [ 'starred' ]);
2018-07-19 23:56:52 +02:00
unset ( $item [ 'postopts' ]);
unset ( $item [ 'inform' ]);
2020-09-25 08:47:07 +02:00
unset ( $item [ 'post-type' ]);
2018-03-02 01:53:47 +01:00
$item [ 'contact-id' ] = Contact :: getIdForURL ( $item [ 'author-link' ]);
2018-01-16 23:23:19 +01:00
2020-05-12 23:49:12 +02:00
$public_shadow = self :: insert ( $item , false , true );
2018-01-16 23:23:19 +01:00
2021-01-27 11:01:42 +01:00
Logger :: info ( 'Stored public shadow' , [ 'uri-id' => $item [ 'uri-id' ], 'id' => $public_shadow ]);
2018-04-27 06:11:33 +02:00
// If this was a comment to a Diaspora post we don't get our comment back.
// This means that we have to distribute the comment by ourselves.
2021-01-16 05:13:22 +01:00
if ( $origin && Post :: exists ([ 'id' => $parent , 'network' => Protocol :: DIASPORA ])) {
2018-05-10 14:48:27 +02:00
self :: distribute ( $public_shadow );
2018-04-27 06:11:33 +02:00
}
2018-01-16 23:23:19 +01:00
}
2018-01-21 00:52:54 +01:00
2019-01-06 22:06:53 +01:00
/**
2018-06-30 07:18:43 +02:00
* Adds a language specification in a " language " element of given $arr .
2018-01-21 00:52:54 +01:00
* Expects " body " element to exist in $arr .
2019-01-06 22:06:53 +01:00
*
2020-05-13 20:45:31 +02:00
* @ param array $item
* @ return string detected language
2019-01-06 22:06:53 +01:00
* @ throws \Text_LanguageDetect_Exception
2018-01-21 00:52:54 +01:00
*/
2020-05-13 20:45:31 +02:00
private static function getLanguage ( array $item )
2018-01-21 00:52:54 +01:00
{
2020-11-12 17:52:55 +01:00
if ( ! in_array ( $item [ 'gravity' ], [ GRAVITY_PARENT , GRAVITY_COMMENT ]) || empty ( $item [ 'body' ])) {
2020-10-03 17:42:21 +02:00
return '' ;
}
2020-10-05 14:50:18 +02:00
// Convert attachments to links
$naked_body = BBCode :: removeAttachment ( $item [ 'body' ]);
2020-11-12 17:52:55 +01:00
if ( empty ( $naked_body )) {
return '' ;
}
2020-10-05 14:50:18 +02:00
// Remove links and pictures
$naked_body = BBCode :: removeLinks ( $naked_body );
// Convert the title and the body to plain text
$naked_body = trim ( $item [ 'title' ] . " \n " . BBCode :: toPlaintext ( $naked_body ));
// Remove possibly remaining links
$naked_body = preg_replace ( Strings :: autoLinkRegEx (), '' , $naked_body );
2018-01-21 00:52:54 +01:00
2020-10-24 10:05:03 +02:00
if ( empty ( $naked_body )) {
return '' ;
}
2020-10-07 06:15:02 +02:00
$ld = new Language ( DI :: l10n () -> getAvailableLanguages ());
2020-10-03 17:42:21 +02:00
$languages = $ld -> detect ( $naked_body ) -> limit ( 0 , 3 ) -> close ();
2018-06-30 07:18:43 +02:00
if ( is_array ( $languages )) {
2020-05-13 20:45:31 +02:00
return json_encode ( $languages );
2018-01-21 00:52:54 +01:00
}
2020-05-13 20:45:31 +02:00
return '' ;
2018-01-21 00:52:54 +01:00
}
2020-10-04 20:52:28 +02:00
public static function getLanguageMessage ( array $item )
{
2020-10-07 06:15:02 +02:00
$iso639 = new \Matriphe\ISO639\ISO639 ;
2020-10-04 20:52:28 +02:00
$used_languages = '' ;
foreach ( json_decode ( $item [ 'language' ], true ) as $language => $reliability ) {
2020-10-07 06:15:02 +02:00
$used_languages .= $iso639 -> languageByCode1 ( $language ) . ' (' . $language . " ): " . number_format ( $reliability , 5 ) . '\n' ;
2020-10-04 20:52:28 +02:00
}
2020-10-07 06:15:02 +02:00
$used_languages = DI :: l10n () -> t ( 'Detected languages in this post:\n%s' , $used_languages );
2020-10-04 20:52:28 +02:00
return $used_languages ;
}
2018-01-21 00:52:54 +01:00
/**
2020-01-19 07:05:23 +01:00
* Creates an unique guid out of a given uri
2018-01-21 00:52:54 +01:00
*
* @ param string $uri uri of an item entry
2018-02-21 05:13:13 +01:00
* @ param string $host hostname for the GUID prefix
2018-01-21 00:52:54 +01:00
* @ return string unique guid
*/
2018-02-21 05:13:13 +01:00
public static function guidFromUri ( $uri , $host )
2018-01-21 00:52:54 +01:00
{
// Our regular guid routine is using this kind of prefix as well
// We have to avoid that different routines could accidentally create the same value
$parsed = parse_url ( $uri );
// We use a hash of the hostname as prefix for the guid
$guid_prefix = hash ( " crc32 " , $host );
// Remove the scheme to make sure that "https" and "http" doesn't make a difference
unset ( $parsed [ " scheme " ]);
// Glue it together to be able to make a hash from it
$host_id = implode ( " / " , $parsed );
// We could use any hash algorithm since it isn't a security issue
$host_hash = hash ( " ripemd128 " , $host_id );
return $guid_prefix . $host_hash ;
}
2018-06-16 08:44:19 +02:00
/**
* generate an unique URI
*
2019-01-06 22:06:53 +01:00
* @ param integer $uid User id
* @ param string $guid An existing GUID ( Otherwise it will be generated )
2018-06-16 08:44:19 +02:00
*
* @ return string
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-06-16 08:44:19 +02:00
*/
public static function newURI ( $uid , $guid = " " )
{
if ( $guid == " " ) {
2018-09-27 13:52:15 +02:00
$guid = System :: createUUID ();
2018-06-16 08:44:19 +02:00
}
2019-12-16 01:05:15 +01:00
return DI :: baseUrl () -> get () . '/objects/' . $guid ;
2018-06-16 08:44:19 +02:00
}
2018-01-21 00:52:54 +01:00
/**
2020-01-19 07:05:23 +01:00
* Set " success_update " and " last-item " to the date of the last time we heard from this contact
2018-01-21 00:52:54 +01:00
*
* This can be used to filter for inactive contacts .
* Only do this for public postings to avoid privacy problems , since poco data is public .
* Don 't set this value if it isn' t from the owner ( could be an author that we don ' t know )
*
* @ param array $arr Contains the just posted item record
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-01-21 00:52:54 +01:00
*/
2018-01-28 17:28:59 +01:00
private static function updateContact ( $arr )
{
2018-01-21 00:52:54 +01:00
// Unarchive the author
2018-07-20 14:19:26 +02:00
$contact = DBA :: selectFirst ( 'contact' , [], [ 'id' => $arr [ " author-id " ]]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $contact )) {
2018-02-14 22:18:16 +01:00
Contact :: unmarkForArchival ( $contact );
2018-01-21 00:52:54 +01:00
}
2018-02-14 22:18:16 +01:00
// Unarchive the contact if it's not our own contact
2018-07-20 14:19:26 +02:00
$contact = DBA :: selectFirst ( 'contact' , [], [ 'id' => $arr [ " contact-id " ], 'self' => false ]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $contact )) {
2018-02-14 22:18:16 +01:00
Contact :: unmarkForArchival ( $contact );
2018-01-21 00:52:54 +01:00
}
2020-04-24 17:18:34 +02:00
/// @todo On private posts we could obfuscate the date
2020-07-19 12:03:33 +02:00
$update = ( $arr [ 'private' ] != self :: PRIVATE ) || in_array ( $arr [ 'network' ], Protocol :: FEDERATED );
2018-01-21 00:52:54 +01:00
// Is it a forum? Then we don't care about the rules from above
2021-01-27 11:01:42 +01:00
if ( ! $update && in_array ( $arr [ " network " ], [ Protocol :: ACTIVITYPUB , Protocol :: DFRN ]) && ( $arr [ " parent-uri-id " ] === $arr [ " uri-id " ])) {
2018-07-20 14:19:26 +02:00
if ( DBA :: exists ( 'contact' , [ 'id' => $arr [ 'contact-id' ], 'forum' => true ])) {
2018-01-21 00:52:54 +01:00
$update = true ;
}
}
if ( $update ) {
2020-04-24 17:18:34 +02:00
// The "self" contact id is used (for example in the connectors) when the contact is unknown
// So we have to ensure to only update the last item when it had been our own post,
// or it had been done by a "regular" contact.
if ( ! empty ( $arr [ 'wall' ])) {
$condition = [ 'id' => $arr [ 'contact-id' ]];
} else {
$condition = [ 'id' => $arr [ 'contact-id' ], 'self' => false ];
}
2020-07-19 12:03:33 +02:00
DBA :: update ( 'contact' , [ 'failed' => false , 'success_update' => $arr [ 'received' ], 'last-item' => $arr [ 'received' ]], $condition );
2018-01-21 00:52:54 +01:00
}
// Now do the same for the system wide contacts with uid=0
2020-03-02 08:57:23 +01:00
if ( $arr [ 'private' ] != self :: PRIVATE ) {
2020-07-19 12:03:33 +02:00
DBA :: update ( 'contact' , [ 'failed' => false , 'success_update' => $arr [ 'received' ], 'last-item' => $arr [ 'received' ]],
2018-01-21 00:52:54 +01:00
[ 'id' => $arr [ 'owner-id' ]]);
if ( $arr [ 'owner-id' ] != $arr [ 'author-id' ]) {
2020-07-19 12:03:33 +02:00
DBA :: update ( 'contact' , [ 'failed' => false , 'success_update' => $arr [ 'received' ], 'last-item' => $arr [ 'received' ]],
2018-01-21 00:52:54 +01:00
[ 'id' => $arr [ 'author-id' ]]);
}
}
}
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
public static function setHashtags ( $body )
2018-01-28 17:28:59 +01:00
{
2021-01-22 23:45:28 +01:00
$body = BBCode :: performWithEscapedTags ( $body , [ 'noparse' , 'pre' , 'code' , 'img' ], function ( $body ) {
2020-06-05 02:56:50 +02:00
$tags = BBCode :: getTags ( $body );
2019-01-30 02:25:51 +01:00
2020-06-05 02:56:50 +02:00
// No hashtags?
if ( ! count ( $tags )) {
return $body ;
}
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
// This sorting is important when there are hashtags that are part of other hashtags
// Otherwise there could be problems with hashtags like #test and #test2
// Because of this we are sorting from the longest to the shortest tag.
usort ( $tags , function ( $a , $b ) {
return strlen ( $b ) <=> strlen ( $a );
});
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$URLSearchString = " ^ \ [ \ ] " ;
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
// All hashtags should point to the home server if "local_tags" is activated
if ( DI :: config () -> get ( 'system' , 'local_tags' )) {
$body = preg_replace ( " /# \ [url \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /url \ ]/ism " ,
" #[url= " . DI :: baseUrl () . " /search?tag= $ 2] $ 2[/url] " , $body );
}
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
// mask hashtags inside of url, bookmarks and attachments to avoid urls in urls
$body = preg_replace_callback ( " / \ [url \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /url \ ]/ism " ,
function ( $match ) {
return ( " [url= " . str_replace ( " # " , " # " , $match [ 1 ]) . " ] " . str_replace ( " # " , " # " , $match [ 2 ]) . " [/url] " );
}, $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$body = preg_replace_callback ( " / \ [bookmark \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /bookmark \ ]/ism " ,
function ( $match ) {
return ( " [bookmark= " . str_replace ( " # " , " # " , $match [ 1 ]) . " ] " . str_replace ( " # " , " # " , $match [ 2 ]) . " [/bookmark] " );
}, $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$body = preg_replace_callback ( " / \ [attachment (.*) \ ](.*?) \ [ \ /attachment \ ]/ism " ,
function ( $match ) {
return ( " [attachment " . str_replace ( " # " , " # " , $match [ 1 ]) . " ] " . $match [ 2 ] . " [/attachment] " );
}, $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
// Repair recursive urls
$body = preg_replace ( " /# \ [url \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /url \ ]/ism " ,
" # $ 2 " , $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
foreach ( $tags as $tag ) {
if (( strpos ( $tag , '#' ) !== 0 ) || strpos ( $tag , '[url=' ) || strlen ( $tag ) < 2 || $tag [ 1 ] == '#' ) {
continue ;
}
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$basetag = str_replace ( '_' , ' ' , substr ( $tag , 1 ));
$newtag = '#[url=' . DI :: baseUrl () . '/search?tag=' . $basetag . ']' . $basetag . '[/url]' ;
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
$body = str_replace ( $tag , $newtag , $body );
}
// Convert back the masked hashtags
$body = str_replace ( " # " , " # " , $body );
2018-01-28 12:18:08 +01:00
2020-06-05 02:56:50 +02:00
return $body ;
});
2019-01-29 21:17:11 +01:00
2020-06-05 02:56:50 +02:00
return $body ;
2018-01-28 12:18:08 +01:00
}
/**
* look for mention tags and setup a second delivery chain for forum / community posts if appropriate
2019-01-06 22:06:53 +01:00
*
2018-01-28 12:18:08 +01:00
* @ param int $uid
* @ param int $item_id
2019-07-31 16:09:27 +02:00
* @ return boolean true if item was deleted , else false
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
2018-01-28 12:18:08 +01:00
*/
private static function tagDeliver ( $uid , $item_id )
{
$mention = false ;
2018-07-20 14:19:26 +02:00
$user = DBA :: selectFirst ( 'user' , [], [ 'uid' => $uid ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $user )) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2019-01-06 18:37:48 +01:00
$community_page = (( $user [ 'page-flags' ] == User :: PAGE_FLAGS_COMMUNITY ) ? true : false );
$prvgroup = (( $user [ 'page-flags' ] == User :: PAGE_FLAGS_PRVGROUP ) ? true : false );
2018-01-28 12:18:08 +01:00
2021-01-16 05:13:22 +01:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $item_id ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2019-12-30 23:00:08 +01:00
$link = Strings :: normaliseLink ( DI :: baseUrl () . '/profile/' . $user [ 'nickname' ]);
2018-01-28 12:18:08 +01:00
/*
* Diaspora uses their own hardwired link URL in @- tags
* instead of the one we supply with webfinger
*/
2019-12-30 23:00:08 +01:00
$dlink = Strings :: normaliseLink ( DI :: baseUrl () . '/u/' . $user [ 'nickname' ]);
2018-01-28 12:18:08 +01:00
$cnt = preg_match_all ( '/[\@\!]\[url\=(.*?)\](.*?)\[\/url\]/ism' , $item [ 'body' ], $matches , PREG_SET_ORDER );
if ( $cnt ) {
foreach ( $matches as $mtch ) {
2018-11-08 16:46:50 +01:00
if ( Strings :: compareLink ( $link , $mtch [ 1 ]) || Strings :: compareLink ( $dlink , $mtch [ 1 ])) {
2018-01-28 12:18:08 +01:00
$mention = true ;
2018-10-29 22:20:46 +01:00
Logger :: log ( 'mention found: ' . $mtch [ 2 ]);
2018-01-28 12:18:08 +01:00
}
}
}
2020-09-11 11:12:09 +02:00
if ( ! $mention ) {
2020-09-12 17:43:02 +02:00
$tags = Tag :: getByURIId ( $item [ 'uri-id' ], [ Tag :: MENTION , Tag :: EXCLUSIVE_MENTION ]);
2020-09-11 11:29:13 +02:00
foreach ( $tags as $tag ) {
2020-09-11 11:12:09 +02:00
if ( Strings :: compareLink ( $link , $tag [ 'url' ]) || Strings :: compareLink ( $dlink , $tag [ 'url' ])) {
$mention = true ;
2020-09-11 14:06:30 +02:00
DI :: logger () -> info ( 'mention found in tag.' , [ 'url' => $tag [ 'url' ]]);
2020-09-11 11:12:09 +02:00
}
}
}
2018-01-28 12:18:08 +01:00
if ( ! $mention ) {
if (( $community_page || $prvgroup ) &&
2020-05-27 14:19:06 +02:00
! $item [ 'wall' ] && ! $item [ 'origin' ] && ( $item [ 'gravity' ] == GRAVITY_PARENT )) {
2021-02-14 19:33:15 +01:00
Logger :: info ( 'Delete private group/communiy top-level item without mention' , [ 'id' => $item [ 'id' ], 'guid' => $item [ 'guid' ]]);
2021-01-28 23:45:54 +01:00
Post\User :: delete ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => $item [ 'uid' ]]);
2018-01-28 12:18:08 +01:00
return true ;
}
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2018-02-22 07:52:58 +01:00
$arr = [ 'item' => $item , 'user' => $user ];
2018-01-28 12:18:08 +01:00
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'tagged' , $arr );
2018-01-28 12:18:08 +01:00
if ( ! $community_page && ! $prvgroup ) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
/*
* tgroup delivery - setup a second delivery chain
* prevent delivery looping - only proceed
* if the message originated elsewhere and is a top - level post
*/
if ( $item [ 'wall' ] || $item [ 'origin' ] || ( $item [ 'id' ] != $item [ 'parent' ])) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
// now change this copy of the post to a forum head message and deliver to all the tgroup members
2018-07-20 14:19:26 +02:00
$self = DBA :: selectFirst ( 'contact' , [ 'id' , 'name' , 'url' , 'thumb' ], [ 'uid' => $uid , 'self' => true ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $self )) {
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2018-03-11 19:12:38 +01:00
$owner_id = Contact :: getIdForURL ( $self [ 'url' ]);
2018-01-28 12:18:08 +01:00
// also reset all the privacy bits to the forum default permissions
2020-03-02 08:57:23 +01:00
$private = ( $user [ 'allow_cid' ] || $user [ 'allow_gid' ] || $user [ 'deny_cid' ] || $user [ 'deny_gid' ]) ? self :: PRIVATE : self :: PUBLIC ;
2018-01-28 12:18:08 +01:00
2019-11-05 14:27:22 +01:00
$psid = PermissionSet :: getIdFromACL (
$user [ 'uid' ],
$user [ 'allow_cid' ],
$user [ 'allow_gid' ],
$user [ 'deny_cid' ],
$user [ 'deny_gid' ]
);
2018-08-15 22:13:10 +02:00
2018-02-22 07:52:58 +01:00
$forum_mode = ( $prvgroup ? 2 : 1 );
2018-01-28 12:18:08 +01:00
2018-03-11 19:12:38 +01:00
$fields = [ 'wall' => true , 'origin' => true , 'forum_mode' => $forum_mode , 'contact-id' => $self [ 'id' ],
2018-08-15 22:13:10 +02:00
'owner-id' => $owner_id , 'private' => $private , 'psid' => $psid ];
2021-02-14 19:33:15 +01:00
self :: update ( $fields , [ 'id' => $item [ 'id' ]]);
2018-02-21 22:08:37 +01:00
2021-02-14 15:24:48 +01:00
Worker :: add ([ 'priority' => PRIORITY_HIGH , 'dont_fork' => true ], 'Notifier' , Delivery :: POST , ( int ) $item [ 'uri-id' ], ( int ) $item [ 'uid' ]);
2019-07-31 16:09:27 +02:00
2021-02-14 19:33:15 +01:00
self :: performActivity ( $item [ 'id' ], 'announce' , $uid );
2020-08-09 20:42:25 +02:00
2019-07-31 16:09:27 +02:00
return false ;
2018-01-28 12:18:08 +01:00
}
2020-11-28 23:53:58 +01:00
/**
* Automatically reshare the item if the " remote_self " option is selected
*
* @ param array $item
* @ return void
*/
private static function autoReshare ( array $item )
{
if ( $item [ 'gravity' ] != GRAVITY_PARENT ) {
return ;
}
if ( ! DBA :: exists ( 'contact' , [ 'id' => $item [ 'contact-id' ], 'remote_self' => Contact :: MIRROR_NATIVE_RESHARE ])) {
return ;
}
2020-11-29 01:05:46 +01:00
if ( ! in_array ( $item [ 'network' ], [ Protocol :: ACTIVITYPUB , Protocol :: DFRN ])) {
return ;
}
2020-11-28 23:53:58 +01:00
Logger :: info ( 'Automatically reshare item' , [ 'uid' => $item [ 'uid' ], 'id' => $item [ 'id' ], 'guid' => $item [ 'guid' ], 'uri-id' => $item [ 'uri-id' ]]);
2021-01-16 05:13:22 +01:00
self :: performActivity ( $item [ 'id' ], 'announce' , $item [ 'uid' ]);
2020-11-28 23:53:58 +01:00
}
2018-01-28 17:28:59 +01:00
public static function isRemoteSelf ( $contact , & $datarray )
{
2018-01-28 12:18:08 +01:00
if ( ! $contact [ 'remote_self' ]) {
return false ;
}
// Prevent the forwarding of posts that are forwarded
2018-08-11 22:40:44 +02:00
if ( ! empty ( $datarray [ " extid " ]) && ( $datarray [ " extid " ] == Protocol :: DFRN )) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Already forwarded' );
2018-01-28 12:18:08 +01:00
return false ;
}
// Prevent to forward already forwarded posts
2019-12-16 00:47:24 +01:00
if ( $datarray [ " app " ] == DI :: baseUrl () -> getHostname ()) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Already forwarded (second test)' );
2018-01-28 12:18:08 +01:00
return false ;
}
// Only forward posts
2019-10-24 00:25:43 +02:00
if ( $datarray [ " verb " ] != Activity :: POST ) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'No post' );
2018-01-28 12:18:08 +01:00
return false ;
}
2020-03-02 08:57:23 +01:00
if (( $contact [ 'network' ] != Protocol :: FEED ) && ( $datarray [ 'private' ] == self :: PRIVATE )) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'Not public' );
2018-01-28 12:18:08 +01:00
return false ;
}
$datarray2 = $datarray ;
2020-06-28 20:22:29 +02:00
Logger :: info ( 'remote-self start' , [ 'contact' => $contact [ 'url' ], 'remote_self' => $contact [ 'remote_self' ], 'item' => $datarray ]);
2020-11-28 23:53:58 +01:00
if ( $contact [ 'remote_self' ] == Contact :: MIRROR_OWN_POST ) {
2018-07-20 14:19:26 +02:00
$self = DBA :: selectFirst ( 'contact' , [ 'id' , 'name' , 'url' , 'thumb' ],
2018-02-22 07:52:58 +01:00
[ 'uid' => $contact [ 'uid' ], 'self' => true ]);
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $self )) {
2018-02-22 07:52:58 +01:00
$datarray [ 'contact-id' ] = $self [ " id " ];
2018-01-28 12:18:08 +01:00
2018-02-22 07:52:58 +01:00
$datarray [ 'owner-name' ] = $self [ " name " ];
$datarray [ 'owner-link' ] = $self [ " url " ];
$datarray [ 'owner-avatar' ] = $self [ " thumb " ];
2018-01-28 12:18:08 +01:00
$datarray [ 'author-name' ] = $datarray [ 'owner-name' ];
$datarray [ 'author-link' ] = $datarray [ 'owner-link' ];
$datarray [ 'author-avatar' ] = $datarray [ 'owner-avatar' ];
unset ( $datarray [ 'edited' ]);
2018-05-04 23:12:13 +02:00
unset ( $datarray [ 'network' ]);
unset ( $datarray [ 'owner-id' ]);
unset ( $datarray [ 'author-id' ]);
2018-01-28 12:18:08 +01:00
}
2018-08-11 22:40:44 +02:00
if ( $contact [ 'network' ] != Protocol :: FEED ) {
2020-11-07 09:22:59 +01:00
$old_uri_id = $datarray [ " uri-id " ] ? ? 0 ;
2018-09-27 13:52:15 +02:00
$datarray [ " guid " ] = System :: createUUID ();
2018-01-28 12:18:08 +01:00
unset ( $datarray [ " plink " ]);
2018-06-16 08:44:19 +02:00
$datarray [ " uri " ] = self :: newURI ( $contact [ 'uid' ], $datarray [ " guid " ]);
2020-11-07 09:22:59 +01:00
$datarray [ " uri-id " ] = ItemURI :: getIdByURI ( $datarray [ " uri " ]);
2018-08-11 22:40:44 +02:00
$datarray [ " extid " ] = Protocol :: DFRN ;
2018-01-28 12:18:08 +01:00
$urlpart = parse_url ( $datarray2 [ 'author-link' ]);
$datarray [ " app " ] = $urlpart [ " host " ];
2020-11-07 09:22:59 +01:00
if ( ! empty ( $old_uri_id )) {
Post\Media :: copy ( $old_uri_id , $datarray [ " uri-id " ]);
}
2020-11-09 17:13:18 +01:00
unset ( $datarray [ " parent-uri " ]);
unset ( $datarray [ " thr-parent " ]);
2018-01-28 12:18:08 +01:00
} else {
2020-03-02 08:57:23 +01:00
$datarray [ 'private' ] = self :: PUBLIC ;
2018-01-28 12:18:08 +01:00
}
}
2018-08-11 22:40:44 +02:00
if ( $contact [ 'network' ] != Protocol :: FEED ) {
2018-01-28 12:18:08 +01:00
// Store the original post
2020-05-12 23:49:12 +02:00
$result = self :: insert ( $datarray2 );
2020-06-28 20:22:29 +02:00
Logger :: info ( 'remote-self post original item' , [ 'contact' => $contact [ 'url' ], 'result' => $result , 'item' => $datarray2 ]);
2018-01-28 12:18:08 +01:00
} else {
$datarray [ " app " ] = " Feed " ;
2018-05-04 23:12:13 +02:00
$result = true ;
2018-01-28 12:18:08 +01:00
}
// Trigger automatic reactions for addons
$datarray [ 'api_source' ] = true ;
// We have to tell the hooks who we are - this really should be improved
2020-12-13 13:47:49 +01:00
$_SESSION [ 'authenticated' ] = true ;
$_SESSION [ 'uid' ] = $contact [ 'uid' ];
2018-01-28 12:18:08 +01:00
2020-12-08 22:58:32 +01:00
return ( bool ) $result ;
2018-01-28 12:18:08 +01:00
}
/**
*
* @ param string $s
* @ param int $uid
* @ param array $item
* @ param int $cid
* @ return string
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
2018-01-28 12:18:08 +01:00
*/
public static function fixPrivatePhotos ( $s , $uid , $item = null , $cid = 0 )
{
2020-01-19 21:21:13 +01:00
if ( DI :: config () -> get ( 'system' , 'disable_embedded' )) {
2018-01-28 12:18:08 +01:00
return $s ;
}
2020-06-28 20:22:29 +02:00
Logger :: info ( 'check for photos' );
2019-12-30 23:00:08 +01:00
$site = substr ( DI :: baseUrl (), strpos ( DI :: baseUrl (), '://' ));
2018-01-28 12:18:08 +01:00
$orig_body = $s ;
$new_body = '' ;
$img_start = strpos ( $orig_body , '[img' );
$img_st_close = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start ), ']' ) : false );
$img_len = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start + $img_st_close + 1 ), '[/img]' ) : false );
while (( $img_st_close !== false ) && ( $img_len !== false )) {
$img_st_close ++ ; // make it point to AFTER the closing bracket
$image = substr ( $orig_body , $img_start + $img_st_close , $img_len );
2020-06-28 20:22:29 +02:00
Logger :: info ( 'found photo' , [ 'image' => $image ]);
2018-01-28 12:18:08 +01:00
if ( stristr ( $image , $site . '/photo/' )) {
// Only embed locally hosted photos
$replace = false ;
$i = basename ( $image );
$i = str_replace ([ '.jpg' , '.png' , '.gif' ], [ '' , '' , '' ], $i );
$x = strpos ( $i , '-' );
if ( $x ) {
$res = substr ( $i , $x + 1 );
$i = substr ( $i , 0 , $x );
2018-12-11 20:03:29 +01:00
$photo = Photo :: getPhotoForUser ( $uid , $i , $res );
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $photo )) {
2018-01-28 12:18:08 +01:00
/*
* Check to see if we should replace this photo link with an embedded image
* 1. No need to do so if the photo is public
* 2. If there 's a contact-id provided, see if they' re in the access list
* for the photo . If so , embed it .
* 3. Otherwise , if we have an item , see if the item permissions match the photo
* permissions , regardless of order but first check to see if they ' re an exact
* match to save some processing overhead .
*/
2018-02-22 07:52:58 +01:00
if ( self :: hasPermissions ( $photo )) {
2018-01-28 12:18:08 +01:00
if ( $cid ) {
2018-02-22 07:52:58 +01:00
$recips = self :: enumeratePermissions ( $photo );
2018-01-28 12:18:08 +01:00
if ( in_array ( $cid , $recips )) {
$replace = true ;
}
} elseif ( $item ) {
2019-07-15 03:48:35 +02:00
if ( self :: samePermissions ( $uid , $item , $photo )) {
2018-01-28 12:18:08 +01:00
$replace = true ;
}
}
}
if ( $replace ) {
2018-12-11 20:03:29 +01:00
$photo_img = Photo :: getImageForPhoto ( $photo );
2018-01-28 12:18:08 +01:00
// If a custom width and height were specified, apply before embedding
if ( preg_match ( " / \ [img \ =([0-9]*)x([0-9]*) \ ]/is " , substr ( $orig_body , $img_start , $img_st_close ), $match )) {
2020-06-28 20:22:29 +02:00
Logger :: info ( 'scaling photo' );
2018-01-28 12:18:08 +01:00
$width = intval ( $match [ 1 ]);
$height = intval ( $match [ 2 ]);
2018-12-11 20:03:29 +01:00
$photo_img -> scaleDown ( max ( $width , $height ));
2018-01-28 12:18:08 +01:00
}
2018-12-11 20:03:29 +01:00
$data = $photo_img -> asString ();
$type = $photo_img -> getType ();
2020-06-28 20:22:29 +02:00
Logger :: info ( 'replacing photo' );
2018-01-28 12:18:08 +01:00
$image = 'data:' . $type . ';base64,' . base64_encode ( $data );
2020-06-28 20:22:29 +02:00
Logger :: debug ( 'replaced' , [ 'image' => $image ]);
2018-01-28 12:18:08 +01:00
}
}
}
}
$new_body = $new_body . substr ( $orig_body , 0 , $img_start + $img_st_close ) . $image . '[/img]' ;
$orig_body = substr ( $orig_body , $img_start + $img_st_close + $img_len + strlen ( '[/img]' ));
if ( $orig_body === false ) {
$orig_body = '' ;
}
$img_start = strpos ( $orig_body , '[img' );
$img_st_close = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start ), ']' ) : false );
$img_len = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start + $img_st_close + 1 ), '[/img]' ) : false );
}
$new_body = $new_body . $orig_body ;
return $new_body ;
}
2018-01-28 17:28:59 +01:00
private static function hasPermissions ( $obj )
{
2018-07-01 09:57:59 +02:00
return ! empty ( $obj [ 'allow_cid' ]) || ! empty ( $obj [ 'allow_gid' ]) ||
! empty ( $obj [ 'deny_cid' ]) || ! empty ( $obj [ 'deny_gid' ]);
2018-01-28 12:18:08 +01:00
}
2019-07-15 03:48:35 +02:00
private static function samePermissions ( $uid , $obj1 , $obj2 )
2018-01-28 17:28:59 +01:00
{
2018-01-28 12:18:08 +01:00
// first part is easy. Check that these are exactly the same.
if (( $obj1 [ 'allow_cid' ] == $obj2 [ 'allow_cid' ])
&& ( $obj1 [ 'allow_gid' ] == $obj2 [ 'allow_gid' ])
&& ( $obj1 [ 'deny_cid' ] == $obj2 [ 'deny_cid' ])
&& ( $obj1 [ 'deny_gid' ] == $obj2 [ 'deny_gid' ])) {
return true ;
}
// This is harder. Parse all the permissions and compare the resulting set.
$recipients1 = self :: enumeratePermissions ( $obj1 );
$recipients2 = self :: enumeratePermissions ( $obj2 );
sort ( $recipients1 );
sort ( $recipients2 );
/// @TODO Comparison of arrays, maybe use array_diff_assoc() here?
return ( $recipients1 == $recipients2 );
}
2019-08-17 05:59:48 +02:00
/**
* Returns an array of contact - ids that are allowed to see this object
*
* @ param array $obj Item array with at least uid , allow_cid , allow_gid , deny_cid and deny_gid
* @ param bool $check_dead Prunes unavailable contacts from the result
* @ return array
* @ throws \Exception
*/
public static function enumeratePermissions ( array $obj , bool $check_dead = false )
2018-01-28 17:28:59 +01:00
{
2019-12-15 23:28:01 +01:00
$aclFormater = DI :: aclFormatter ();
2019-10-23 00:40:14 +02:00
2019-11-01 14:13:29 +01:00
$allow_people = $aclFormater -> expand ( $obj [ 'allow_cid' ]);
$allow_groups = Group :: expand ( $obj [ 'uid' ], $aclFormater -> expand ( $obj [ 'allow_gid' ]), $check_dead );
$deny_people = $aclFormater -> expand ( $obj [ 'deny_cid' ]);
$deny_groups = Group :: expand ( $obj [ 'uid' ], $aclFormater -> expand ( $obj [ 'deny_gid' ]), $check_dead );
2018-01-28 12:18:08 +01:00
$recipients = array_unique ( array_merge ( $allow_people , $allow_groups ));
$deny = array_unique ( array_merge ( $deny_people , $deny_groups ));
$recipients = array_diff ( $recipients , $deny );
return $recipients ;
}
2020-11-27 12:24:31 +01:00
public static function expire ( int $uid , int $days , string $network = " " , bool $force = false )
2018-01-28 17:28:59 +01:00
{
2018-01-28 12:18:08 +01:00
if ( ! $uid || ( $days < 1 )) {
return ;
}
2020-05-27 14:19:06 +02:00
$condition = [ " `uid` = ? AND NOT `deleted` AND `gravity` = ? " ,
2018-07-01 09:57:59 +02:00
$uid , GRAVITY_PARENT ];
2018-01-28 12:18:08 +01:00
/*
* $expire_network_only = save your own wall posts
* and just expire conversations started by others
*/
2020-01-18 16:50:57 +01:00
$expire_network_only = DI :: pConfig () -> get ( $uid , 'expire' , 'network_only' , false );
2018-07-01 09:57:59 +02:00
if ( $expire_network_only ) {
$condition [ 0 ] .= " AND NOT `wall` " ;
}
2018-01-28 12:18:08 +01:00
if ( $network != " " ) {
2018-07-01 09:57:59 +02:00
$condition [ 0 ] .= " AND `network` = ? " ;
$condition [] = $network ;
2018-01-28 12:18:08 +01:00
}
2019-07-07 23:30:33 +02:00
$condition [ 0 ] .= " AND `received` < UTC_TIMESTAMP() - INTERVAL ? DAY " ;
$condition [] = $days ;
2021-02-13 20:56:03 +01:00
$items = Post :: select ([ 'resource-id' , 'starred' , 'id' , 'post-type' , 'uid' , 'uri-id' ], $condition );
2018-01-28 12:18:08 +01:00
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $items )) {
2018-01-28 12:18:08 +01:00
return ;
}
2020-01-18 16:50:57 +01:00
$expire_items = DI :: pConfig () -> get ( $uid , 'expire' , 'items' , true );
2018-01-28 12:18:08 +01:00
// Forcing expiring of items - but not notes and marked items
if ( $force ) {
$expire_items = true ;
}
2020-01-18 16:50:57 +01:00
$expire_notes = DI :: pConfig () -> get ( $uid , 'expire' , 'notes' , true );
$expire_starred = DI :: pConfig () -> get ( $uid , 'expire' , 'starred' , true );
$expire_photos = DI :: pConfig () -> get ( $uid , 'expire' , 'photos' , false );
2018-01-28 12:18:08 +01:00
2018-07-01 11:08:58 +02:00
$expired = 0 ;
2018-01-28 12:18:08 +01:00
2020-11-30 22:40:55 +01:00
$priority = DI :: config () -> get ( 'system' , 'expire-notify-priority' );
2021-01-16 05:13:22 +01:00
while ( $item = Post :: fetch ( $items )) {
2018-01-28 12:18:08 +01:00
// don't expire filed items
2021-01-21 08:16:41 +01:00
if ( DBA :: exists ( 'post-category' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $item [ 'uid' ], 'type' => Post\Category :: FILE ])) {
2018-01-28 12:18:08 +01:00
continue ;
}
// Only expire posts, not photos and photo comments
2018-07-01 09:57:59 +02:00
if ( ! $expire_photos && strlen ( $item [ 'resource-id' ])) {
2018-01-28 12:18:08 +01:00
continue ;
2018-07-01 09:57:59 +02:00
} elseif ( ! $expire_starred && intval ( $item [ 'starred' ])) {
2018-01-28 12:18:08 +01:00
continue ;
2021-02-13 20:56:03 +01:00
} elseif ( ! $expire_notes && ( $item [ 'post-type' ] == self :: PT_PERSONAL_NOTE )) {
2018-01-28 12:18:08 +01:00
continue ;
2021-02-13 20:56:03 +01:00
} elseif ( ! $expire_items && ( $item [ 'post-type' ] != self :: PT_PERSONAL_NOTE )) {
2018-01-28 12:18:08 +01:00
continue ;
}
2020-11-30 22:40:55 +01:00
self :: markForDeletionById ( $item [ 'id' ], $priority );
2018-07-01 11:08:58 +02:00
++ $expired ;
2018-01-28 12:18:08 +01:00
}
2018-07-20 14:19:26 +02:00
DBA :: close ( $items );
2018-10-29 22:20:46 +01:00
Logger :: log ( 'User ' . $uid . " : expired $expired items; expire items: $expire_items , expire notes: $expire_notes , expire starred: $expire_starred , expire photos: $expire_photos " );
2018-01-28 12:18:08 +01:00
}
2018-01-28 17:28:59 +01:00
public static function firstPostDate ( $uid , $wall = false )
{
2021-02-13 20:56:03 +01:00
$condition = [ 'gravity' => GRAVITY_PARENT , 'uid' => $uid , 'wall' => $wall , 'deleted' => false , 'visible' => true ];
2019-07-07 23:30:33 +02:00
$params = [ 'order' => [ 'received' => false ]];
2021-02-04 06:51:25 +01:00
$thread = Post :: selectFirst ([ 'received' ], $condition , $params );
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $thread )) {
2019-07-07 23:30:33 +02:00
return substr ( DateTimeFormat :: local ( $thread [ 'received' ]), 0 , 10 );
2018-01-28 12:18:08 +01:00
}
return false ;
}
2018-02-01 20:14:11 +01:00
/**
2020-01-19 07:05:23 +01:00
* add / remove activity to an item
2018-02-01 20:14:11 +01:00
*
* Toggle activities as like , dislike , attend of an item
*
2020-08-09 20:42:25 +02:00
* @ param int $item_id
2018-02-01 20:14:11 +01:00
* @ param string $verb
2019-01-06 22:06:53 +01:00
* Activity verb . One of
* like , unlike , dislike , undislike , attendyes , unattendyes ,
2020-08-09 20:42:25 +02:00
* attendno , unattendno , attendmaybe , unattendmaybe ,
* announce , unannouce
2019-01-06 22:06:53 +01:00
* @ return bool
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
* @ hook 'post_local_end'
* array $arr
* 'post_id' => ID of posted item
2018-02-01 20:14:11 +01:00
*/
2020-08-09 20:42:25 +02:00
public static function performActivity ( int $item_id , string $verb , int $uid )
2018-02-01 20:14:11 +01:00
{
2020-08-09 20:42:25 +02:00
if ( empty ( $uid )) {
2018-02-01 20:14:11 +01:00
return false ;
}
2020-08-09 20:42:25 +02:00
Logger :: notice ( 'Start create activity' , [ 'verb' => $verb , 'item' => $item_id , 'user' => $uid ]);
2018-02-01 20:14:11 +01:00
2021-01-16 05:13:22 +01:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $item_id ]);
2018-07-21 14:46:04 +02:00
if ( ! DBA :: isResult ( $item )) {
2018-10-29 22:20:46 +01:00
Logger :: log ( 'like: unknown item ' . $item_id );
2018-02-01 20:14:11 +01:00
return false ;
}
2021-01-27 11:01:42 +01:00
$uri_id = $item [ 'uri-id' ];
2018-07-07 12:43:43 +02:00
2020-08-09 20:42:25 +02:00
if ( ! in_array ( $item [ 'uid' ], [ 0 , $uid ])) {
2018-02-01 20:14:11 +01:00
return false ;
}
2021-01-16 05:13:22 +01:00
if ( ! Post :: exists ([ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $uid ])) {
2020-07-23 05:26:54 +02:00
$stored = self :: storeForUserByUriId ( $item [ 'parent-uri-id' ], $uid );
2020-08-09 20:42:25 +02:00
if (( $item [ 'parent-uri-id' ] == $item [ 'uri-id' ]) && ! empty ( $stored )) {
2021-01-16 05:13:22 +01:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $stored ]);
2020-08-09 20:42:25 +02:00
if ( ! DBA :: isResult ( $item )) {
2021-01-27 11:01:42 +01:00
Logger :: info ( 'Could not fetch just created item - should not happen' , [ 'stored' => $stored , 'uid' => $uid , 'uri-id' => $uri_id ]);
2020-08-09 20:42:25 +02:00
return false ;
}
}
2020-07-22 07:16:57 +02:00
}
2018-02-01 20:14:11 +01:00
// Retrieves the local post owner
2020-08-09 20:42:25 +02:00
$owner = User :: getOwnerDataById ( $uid );
if ( empty ( $owner )) {
Logger :: info ( 'Empty owner for user' , [ 'uid' => $uid ]);
2018-02-01 20:14:11 +01:00
return false ;
}
// Retrieve the current logged in user's public contact
2020-08-09 20:42:25 +02:00
$author_id = Contact :: getIdForURL ( $owner [ 'url' ]);
if ( empty ( $author_id )) {
Logger :: info ( 'Empty public contact' );
2018-02-01 20:14:11 +01:00
return false ;
}
2020-05-29 15:01:37 +02:00
$activity = null ;
2020-05-27 14:40:00 +02:00
switch ( $verb ) {
case 'like' :
case 'unlike' :
$activity = Activity :: LIKE ;
break ;
case 'dislike' :
case 'undislike' :
$activity = Activity :: DISLIKE ;
break ;
case 'attendyes' :
case 'unattendyes' :
$activity = Activity :: ATTEND ;
break ;
case 'attendno' :
case 'unattendno' :
$activity = Activity :: ATTENDNO ;
break ;
case 'attendmaybe' :
case 'unattendmaybe' :
$activity = Activity :: ATTENDMAYBE ;
break ;
case 'follow' :
case 'unfollow' :
$activity = Activity :: FOLLOW ;
break ;
2020-08-09 20:42:25 +02:00
case 'announce' :
case 'unannounce' :
$activity = Activity :: ANNOUNCE ;
break ;
2020-05-27 14:40:00 +02:00
default :
2020-08-09 20:42:25 +02:00
Logger :: notice ( 'unknown verb' , [ 'verb' => $verb , 'item' => $item_id ]);
2020-05-27 14:40:00 +02:00
return false ;
}
$mode = Strings :: startsWith ( $verb , 'un' ) ? 'delete' : 'create' ;
// Enable activity toggling instead of on/off
$event_verb_flag = $activity === Activity :: ATTEND || $activity === Activity :: ATTENDNO || $activity === Activity :: ATTENDMAYBE ;
2018-02-01 20:14:11 +01:00
// Look for an existing verb row
2020-05-27 14:40:00 +02:00
// Event participation activities are mutually exclusive, only one of them can exist at all times.
2018-02-01 20:14:11 +01:00
if ( $event_verb_flag ) {
2019-10-24 00:25:43 +02:00
$verbs = [ Activity :: ATTEND , Activity :: ATTENDNO , Activity :: ATTENDMAYBE ];
2018-07-07 12:43:43 +02:00
// Translate to the index based activity index
2020-05-26 07:18:50 +02:00
$vids = [];
2018-07-07 12:43:43 +02:00
foreach ( $verbs as $verb ) {
2020-05-26 07:18:50 +02:00
$vids [] = Verb :: getID ( $verb );
2018-07-07 12:43:43 +02:00
}
2018-02-01 20:14:11 +01:00
} else {
2020-05-26 07:18:50 +02:00
$vids = Verb :: getID ( $activity );
2018-06-27 21:37:13 +02:00
}
2018-02-01 20:14:11 +01:00
2020-05-26 07:18:50 +02:00
$condition = [ 'vid' => $vids , 'deleted' => false , 'gravity' => GRAVITY_ACTIVITY ,
2021-01-27 11:01:42 +01:00
'author-id' => $author_id , 'uid' => $item [ 'uid' ], 'thr-parent-id' => $uri_id ];
2021-01-16 05:13:22 +01:00
$like_item = Post :: selectFirst ([ 'id' , 'guid' , 'verb' ], $condition );
2018-02-01 20:14:11 +01:00
2018-07-21 14:46:04 +02:00
if ( DBA :: isResult ( $like_item )) {
2020-05-27 14:40:00 +02:00
/**
* Truth table for existing activities
*
* | Inputs || Outputs |
* |----------------------------||-------------------|
* | Mode | Event | Same verb || Delete ? | Return ? |
* |--------|-------|-----------||---------|---------|
* | create | Yes | Yes || No | Yes |
* | create | Yes | No || Yes | No |
* | create | No | Yes || No | Yes |
* | create | No | No || N / A† |
* | delete | Yes | Yes || Yes | N / A‡ |
* | delete | Yes | No || No | N / A‡ |
* | delete | No | Yes || Yes | N / A‡ |
* | delete | No | No || N / A† |
* |--------|-------|-----------||---------|---------|
* | A | B | C || A xor C | ! B or C |
*
* † Can 't happen: It' s impossible to find an existing non - event activity without
* the same verb because we are only looking for this single verb .
*
* ‡ The " mode = delete " is returning early whether an existing activity was found or not .
*/
if ( $mode == 'create' xor $like_item [ 'verb' ] == $activity ) {
self :: markForDeletionById ( $like_item [ 'id' ]);
}
2018-02-01 20:14:11 +01:00
if ( ! $event_verb_flag || $like_item [ 'verb' ] == $activity ) {
return true ;
}
}
2020-05-27 14:40:00 +02:00
// No need to go further if we aren't creating anything
if ( $mode == 'delete' ) {
2018-02-01 20:14:11 +01:00
return true ;
}
2019-10-25 00:10:20 +02:00
$objtype = $item [ 'resource-id' ] ? Activity\ObjectType :: IMAGE : Activity\ObjectType :: NOTE ;
2018-02-01 20:14:11 +01:00
$new_item = [
2018-09-27 13:52:15 +02:00
'guid' => System :: createUUID (),
2018-06-16 08:44:19 +02:00
'uri' => self :: newURI ( $item [ 'uid' ]),
2018-02-01 20:14:11 +01:00
'uid' => $item [ 'uid' ],
2020-08-09 20:42:25 +02:00
'contact-id' => $owner [ 'id' ],
2018-02-01 20:14:11 +01:00
'wall' => $item [ 'wall' ],
'origin' => 1 ,
2018-08-11 22:40:44 +02:00
'network' => Protocol :: DFRN ,
2021-01-09 13:59:30 +01:00
'protocol' => Conversation :: PARCEL_DIRECT ,
'direction' => Conversation :: PUSH ,
2018-06-27 20:09:33 +02:00
'gravity' => GRAVITY_ACTIVITY ,
2018-02-01 20:14:11 +01:00
'parent' => $item [ 'id' ],
'thr-parent' => $item [ 'uri' ],
2018-10-06 10:51:52 +02:00
'owner-id' => $author_id ,
2018-07-07 12:43:43 +02:00
'author-id' => $author_id ,
'body' => $activity ,
2018-02-01 20:14:11 +01:00
'verb' => $activity ,
'object-type' => $objtype ,
'allow_cid' => $item [ 'allow_cid' ],
'allow_gid' => $item [ 'allow_gid' ],
'deny_cid' => $item [ 'deny_cid' ],
'deny_gid' => $item [ 'deny_gid' ],
'visible' => 1 ,
'unseen' => 1 ,
];
2018-10-29 22:15:37 +01:00
$signed = Diaspora :: createLikeSignature ( $uid , $new_item );
2018-10-27 13:09:23 +02:00
if ( ! empty ( $signed )) {
2018-10-27 16:35:22 +02:00
$new_item [ 'diaspora_signed_text' ] = json_encode ( $signed );
2018-10-27 13:09:23 +02:00
}
2018-02-06 13:40:22 +01:00
$new_item_id = self :: insert ( $new_item );
2018-02-01 20:14:11 +01:00
2018-02-06 13:40:22 +01:00
// If the parent item isn't visible then set it to visible
if ( ! $item [ 'visible' ]) {
self :: update ([ 'visible' => true ], [ 'id' => $item [ 'id' ]]);
2018-02-01 20:14:11 +01:00
}
$new_item [ 'id' ] = $new_item_id ;
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'post_local_end' , $new_item );
2018-02-01 20:14:11 +01:00
return true ;
}
2018-02-05 13:37:32 +01:00
2020-11-03 20:24:47 +01:00
/**
* Fetch the SQL condition for the given user id
*
* @ param integer $owner_id User ID for which the permissions should be fetched
* @ return array condition
*/
public static function getPermissionsConditionArrayByUserId ( int $owner_id )
{
$local_user = local_user ();
$remote_user = Session :: getRemoteContactID ( $owner_id );
// default permissions - anonymous user
$condition = [ " `private` != ? " , self :: PRIVATE ];
if ( $local_user && ( $local_user == $owner_id )) {
// Profile owner - everything is visible
$condition = [];
} elseif ( $remote_user ) {
// Authenticated visitor - fetch the matching permissionsets
$set = PermissionSet :: get ( $owner_id , $remote_user );
if ( ! empty ( $set )) {
2020-11-03 21:30:59 +01:00
$condition = [ " (`private` != ? OR (`private` = ? AND `wall`
AND `psid` IN ( " . implode(', ', array_fill(0, count( $set ), '?')) . " ))) " ,
2021-01-16 05:13:22 +01:00
self :: PRIVATE , self :: PRIVATE ];
2020-11-03 20:24:47 +01:00
$condition = array_merge ( $condition , $set );
}
}
return $condition ;
}
2021-01-18 21:19:13 +01:00
/**
* Get a permission SQL string for the given user
*
* @ param int $owner_id
* @ param string $table
* @ return string
*/
public static function getPermissionsSQLByUserId ( int $owner_id , string $table = '' )
2018-10-17 21:30:41 +02:00
{
$local_user = local_user ();
2019-09-28 11:36:41 +02:00
$remote_user = Session :: getRemoteContactID ( $owner_id );
2019-09-27 07:49:23 +02:00
2021-01-18 21:19:13 +01:00
if ( ! empty ( $table )) {
$table = DBA :: quoteIdentifier ( $table ) . '.' ;
}
2018-10-17 21:30:41 +02:00
/*
* Construct permissions
*
* default permissions - anonymous user
*/
2021-01-18 21:19:13 +01:00
$sql = sprintf ( " AND " . $table . " `private` != %d " , self :: PRIVATE );
2018-10-17 21:30:41 +02:00
// Profile owner - everything is visible
if ( $local_user && ( $local_user == $owner_id )) {
$sql = '' ;
} elseif ( $remote_user ) {
/*
* Authenticated visitor . Unless pre - verified ,
* check that the contact belongs to this $owner_id
* and load the groups the visitor belongs to .
* If pre - verified , the caller is expected to have already
* done this and passed the groups into this function .
*/
2019-09-28 07:37:24 +02:00
$set = PermissionSet :: get ( $owner_id , $remote_user );
2018-10-17 21:30:41 +02:00
if ( ! empty ( $set )) {
2021-01-18 21:19:13 +01:00
$sql_set = sprintf ( " OR ( " . $table . " `private` = %d AND " . $table . " `wall` AND " . $table . " `psid` IN ( " , self :: PRIVATE ) . implode ( ',' , $set ) . " )) " ;
2018-10-17 21:30:41 +02:00
} else {
$sql_set = '' ;
}
2021-01-18 21:19:13 +01:00
$sql = sprintf ( " AND ( " . $table . " `private` != %d " , self :: PRIVATE ) . $sql_set . " ) " ;
2018-10-17 21:30:41 +02:00
}
return $sql ;
}
2018-11-07 03:12:41 +01:00
/**
* get translated item type
*
2019-01-06 22:06:53 +01:00
* @ param $item
2018-11-07 03:12:41 +01:00
* @ return string
*/
public static function postType ( $item )
{
if ( ! empty ( $item [ 'event-id' ])) {
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'event' );
2018-11-07 03:12:41 +01:00
} elseif ( ! empty ( $item [ 'resource-id' ])) {
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'photo' );
2020-05-27 14:19:06 +02:00
} elseif ( $item [ 'gravity' ] == GRAVITY_ACTIVITY ) {
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'activity' );
2020-05-27 14:19:06 +02:00
} elseif ( $item [ 'gravity' ] == GRAVITY_COMMENT ) {
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'comment' );
2018-11-07 03:12:41 +01:00
}
2020-01-18 20:52:34 +01:00
return DI :: l10n () -> t ( 'post' );
2018-11-07 03:12:41 +01:00
}
/**
* Sets the " rendered-html " field of the provided item
*
* Body is preserved to avoid side - effects as we modify it just - in - time for spoilers and private image links
*
* @ param array $item
* @ param bool $update
*
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-11-07 03:12:41 +01:00
* @ todo Remove reference , simply return " rendered-html " and " rendered-hash "
*/
public static function putInCache ( & $item , $update = false )
{
2020-12-04 13:29:08 +01:00
// Save original body to prevent addons to modify it
$body = $item [ 'body' ];
2018-11-07 03:12:41 +01:00
2019-10-16 14:35:14 +02:00
$rendered_hash = $item [ 'rendered-hash' ] ? ? '' ;
$rendered_html = $item [ 'rendered-html' ] ? ? '' ;
2018-11-07 03:12:41 +01:00
if ( $rendered_hash == ''
2020-12-04 13:29:08 +01:00
|| $rendered_html == ''
2020-12-04 13:55:48 +01:00
|| $rendered_hash != hash ( 'md5' , BBCode :: VERSION . '::' . $body )
2020-12-04 13:29:08 +01:00
|| DI :: config () -> get ( 'system' , 'ignore_cache' )
2018-11-07 03:12:41 +01:00
) {
2019-10-23 21:38:51 +02:00
self :: addRedirToImageTags ( $item );
2018-11-07 03:12:41 +01:00
2020-12-04 13:29:08 +01:00
$item [ 'rendered-html' ] = BBCode :: convert ( $item [ 'body' ]);
2020-12-04 13:55:48 +01:00
$item [ 'rendered-hash' ] = hash ( 'md5' , BBCode :: VERSION . '::' . $body );
2018-11-07 03:12:41 +01:00
$hook_data = [ 'item' => $item , 'rendered-html' => $item [ 'rendered-html' ], 'rendered-hash' => $item [ 'rendered-hash' ]];
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'put_item_in_cache' , $hook_data );
2018-11-07 03:12:41 +01:00
$item [ 'rendered-html' ] = $hook_data [ 'rendered-html' ];
2020-12-04 13:55:48 +01:00
$item [ 'rendered-hash' ] = $hook_data [ 'rendered-hash' ];
2018-11-07 03:12:41 +01:00
unset ( $hook_data );
// Force an update if the generated values differ from the existing ones
2020-12-04 13:29:08 +01:00
if ( $rendered_hash != $item [ 'rendered-hash' ]) {
2018-11-07 03:12:41 +01:00
$update = true ;
}
// Only compare the HTML when we forcefully ignore the cache
2020-12-04 13:29:08 +01:00
if ( DI :: config () -> get ( 'system' , 'ignore_cache' ) && ( $rendered_html != $item [ 'rendered-html' ])) {
2018-11-07 03:12:41 +01:00
$update = true ;
}
2020-12-04 13:29:08 +01:00
if ( $update && ! empty ( $item [ 'id' ])) {
2018-11-07 03:12:41 +01:00
self :: update (
[
2020-12-04 13:29:08 +01:00
'rendered-html' => $item [ 'rendered-html' ],
'rendered-hash' => $item [ 'rendered-hash' ]
2018-11-07 03:12:41 +01:00
],
2020-12-04 13:29:08 +01:00
[ 'id' => $item [ 'id' ]]
2018-11-07 03:12:41 +01:00
);
}
}
2020-12-04 13:29:08 +01:00
$item [ 'body' ] = $body ;
2018-11-07 03:12:41 +01:00
}
2019-10-23 00:20:44 +02:00
/**
2020-01-19 07:05:23 +01:00
* Find any non - embedded images in private items and add redir links to them
2019-10-23 00:20:44 +02:00
*
* @ param array & $item The field array of an item row
*/
2019-10-23 21:38:51 +02:00
private static function addRedirToImageTags ( array & $item )
2019-10-23 00:20:44 +02:00
{
2019-12-15 22:34:11 +01:00
$app = DI :: app ();
2019-10-23 00:20:44 +02:00
$matches = [];
$cnt = preg_match_all ( '|\[img\](http[^\[]*?/photo/[a-fA-F0-9]+?(-[0-9]\.[\w]+?)?)\[\/img\]|' , $item [ 'body' ], $matches , PREG_SET_ORDER );
if ( $cnt ) {
foreach ( $matches as $mtch ) {
if ( strpos ( $mtch [ 1 ], '/redir' ) !== false ) {
continue ;
}
2020-03-02 08:57:23 +01:00
if (( local_user () == $item [ 'uid' ]) && ( $item [ 'private' ] == self :: PRIVATE ) && ( $item [ 'contact-id' ] != $app -> contact [ 'id' ]) && ( $item [ 'network' ] == Protocol :: DFRN )) {
2019-10-23 00:20:44 +02:00
$img_url = 'redir/' . $item [ 'contact-id' ] . '?url=' . urlencode ( $mtch [ 1 ]);
$item [ 'body' ] = str_replace ( $mtch [ 0 ], '[img]' . $img_url . '[/img]' , $item [ 'body' ]);
}
}
}
}
2018-11-07 03:12:41 +01:00
/**
2020-01-19 07:05:23 +01:00
* Given an item array , convert the body element from bbcode to html and add smilie icons .
2018-11-07 03:12:41 +01:00
* If attach is true , also add icons for item attachments .
*
* @ param array $item
* @ param boolean $attach
* @ param boolean $is_preview
* @ return string item body html
2019-01-06 22:06:53 +01:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
* @ hook prepare_body_init item array before any work
* @ hook prepare_body_content_filter ( 'item' => item array , 'filter_reasons' => string array ) before first bbcode to html
* @ hook prepare_body ( 'item' => item array , 'html' => body string , 'is_preview' => boolean , 'filter_reasons' => string array ) after first bbcode to html
* @ hook prepare_body_final ( 'item' => item array , 'html' => body string ) after attach icons and blockquote special case handling ( spoiler , author )
2018-11-07 03:12:41 +01:00
*/
public static function prepareBody ( array & $item , $attach = false , $is_preview = false )
{
2019-12-15 22:34:11 +01:00
$a = DI :: app ();
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'prepare_body_init' , $item );
2018-11-07 03:12:41 +01:00
// In order to provide theme developers more possibilities, event items
// are treated differently.
2019-10-25 00:10:20 +02:00
if ( $item [ 'object-type' ] === Activity\ObjectType :: EVENT && isset ( $item [ 'event-id' ])) {
2018-11-07 03:12:41 +01:00
$ev = Event :: getItemHTML ( $item );
return $ev ;
}
2020-05-01 08:01:22 +02:00
$tags = Tag :: populateFromItem ( $item );
2018-11-07 03:12:41 +01:00
$item [ 'tags' ] = $tags [ 'tags' ];
$item [ 'hashtags' ] = $tags [ 'hashtags' ];
$item [ 'mentions' ] = $tags [ 'mentions' ];
// Compile eventual content filter reasons
$filter_reasons = [];
if ( ! $is_preview && public_contact () != $item [ 'author-id' ]) {
2020-01-18 16:50:57 +01:00
if ( ! empty ( $item [ 'content-warning' ]) && ( ! local_user () || ! DI :: pConfig () -> get ( local_user (), 'system' , 'disable_cw' , false ))) {
2020-01-18 20:52:34 +01:00
$filter_reasons [] = DI :: l10n () -> t ( 'Content warning: %s' , $item [ 'content-warning' ]);
2018-11-07 03:12:41 +01:00
}
$hook_data = [
'item' => $item ,
'filter_reasons' => $filter_reasons
];
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'prepare_body_content_filter' , $hook_data );
2018-11-07 03:12:41 +01:00
$filter_reasons = $hook_data [ 'filter_reasons' ];
unset ( $hook_data );
}
// Update the cached values if there is no "zrl=..." on the links.
2019-09-28 20:09:11 +02:00
$update = ( ! Session :: isAuthenticated () && ( $item [ " uid " ] == 0 ));
2018-11-07 03:12:41 +01:00
// Or update it if the current viewer is the intented viewer.
if (( $item [ " uid " ] == local_user ()) && ( $item [ " uid " ] != 0 )) {
$update = true ;
}
self :: putInCache ( $item , $update );
$s = $item [ " rendered-html " ];
$hook_data = [
'item' => $item ,
'html' => $s ,
'preview' => $is_preview ,
'filter_reasons' => $filter_reasons
];
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'prepare_body' , $hook_data );
2018-11-07 03:12:41 +01:00
$s = $hook_data [ 'html' ];
unset ( $hook_data );
if ( ! $attach ) {
// Replace the blockquotes with quotes that are used in mails.
$mailquote = '<blockquote type="cite" class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">' ;
$s = str_replace ([ '<blockquote>' , '<blockquote class="spoiler">' , '<blockquote class="author">' ], [ $mailquote , $mailquote , $mailquote ], $s );
return $s ;
}
$as = '' ;
$vhead = false ;
2020-11-06 05:14:29 +01:00
foreach ( Post\Media :: getByURIId ( $item [ 'uri-id' ], [ Post\Media :: DOCUMENT , Post\Media :: TORRENT , Post\Media :: UNKNOWN ]) as $attachment ) {
$mime = $attachment [ 'mimetype' ];
2018-11-07 03:12:41 +01:00
2020-11-06 05:14:29 +01:00
$the_url = Contact :: magicLinkById ( $item [ 'author-id' ], $attachment [ 'url' ]);
2018-11-07 03:12:41 +01:00
if ( strpos ( $mime , 'video' ) !== false ) {
if ( ! $vhead ) {
$vhead = true ;
2019-12-30 20:02:09 +01:00
DI :: page ()[ 'htmlhead' ] .= Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'videos_head.tpl' ));
2018-11-07 03:12:41 +01:00
}
$as .= Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'video_top.tpl' ), [
'$video' => [
2020-09-30 19:30:26 +02:00
'id' => $item [ 'author-id' ],
2020-01-18 20:52:34 +01:00
'title' => DI :: l10n () -> t ( 'View Video' ),
2018-11-07 03:12:41 +01:00
'src' => $the_url ,
'mime' => $mime ,
],
]);
}
$filetype = strtolower ( substr ( $mime , 0 , strpos ( $mime , '/' )));
if ( $filetype ) {
$filesubtype = strtolower ( substr ( $mime , strpos ( $mime , '/' ) + 1 ));
$filesubtype = str_replace ( '.' , '-' , $filesubtype );
} else {
$filetype = 'unkn' ;
$filesubtype = 'unkn' ;
}
2020-11-06 05:14:29 +01:00
$title = Strings :: escapeHtml ( trim (( $attachment [ 'description' ] ? ? '' ) ? : $attachment [ 'url' ]));
$title .= ' ' . ( $attachment [ 'size' ] ? ? 0 ) . ' ' . DI :: l10n () -> t ( 'bytes' );
2018-11-07 03:12:41 +01:00
$icon = '<div class="attachtype icon s22 type-' . $filetype . ' subtype-' . $filesubtype . '"></div>' ;
2020-02-25 02:07:34 +01:00
$as .= '<a href="' . strip_tags ( $the_url ) . '" title="' . $title . '" class="attachlink" target="_blank" rel="noopener noreferrer" >' . $icon . '</a>' ;
2018-11-07 03:12:41 +01:00
}
if ( $as != '' ) {
$s .= '<div class="body-attach">' . $as . '<div class="clear"></div></div>' ;
}
// Map.
2018-11-30 15:06:22 +01:00
if ( strpos ( $s , '<div class="map">' ) !== false && ! empty ( $item [ 'coord' ])) {
2018-11-07 03:12:41 +01:00
$x = Map :: byCoordinates ( trim ( $item [ 'coord' ]));
if ( $x ) {
$s = preg_replace ( '/\<div class\=\"map\"\>/' , '$0' . $x , $s );
}
}
// Replace friendica image url size with theme preference.
2018-11-07 20:16:59 +01:00
if ( ! empty ( $a -> theme_info [ 'item_image_size' ])) {
2018-11-07 03:12:41 +01:00
$ps = $a -> theme_info [ 'item_image_size' ];
$s = preg_replace ( '|(<img[^>]+src="[^"]+/photo/[0-9a-f]+)-[0-9]|' , " $ 1- " . $ps , $s );
}
$s = HTML :: applyContentFilter ( $s , $filter_reasons );
$hook_data = [ 'item' => $item , 'html' => $s ];
2018-12-26 07:06:24 +01:00
Hook :: callAll ( 'prepare_body_final' , $hook_data );
2018-11-07 03:12:41 +01:00
return $hook_data [ 'html' ];
}
2018-11-07 13:19:39 +01:00
/**
* get private link for item
2019-01-06 22:06:53 +01:00
*
2018-11-07 13:19:39 +01:00
* @ param array $item
* @ return boolean | array False if item has not plink , otherwise array ( 'href' => plink url , 'title' => translated title )
2019-01-06 22:06:53 +01:00
* @ throws \Exception
2018-11-07 13:19:39 +01:00
*/
public static function getPlink ( $item )
{
2020-06-19 13:05:58 +02:00
if ( local_user ()) {
2018-11-07 13:19:39 +01:00
$ret = [
2018-11-07 20:16:59 +01:00
'href' => " display/ " . $item [ 'guid' ],
'orig' => " display/ " . $item [ 'guid' ],
2020-01-18 20:52:34 +01:00
'title' => DI :: l10n () -> t ( 'View on separate page' ),
'orig_title' => DI :: l10n () -> t ( 'view on separate page' ),
2018-11-07 20:16:59 +01:00
];
2018-11-07 13:19:39 +01:00
2018-11-07 20:16:59 +01:00
if ( ! empty ( $item [ 'plink' ])) {
2019-12-16 00:36:31 +01:00
$ret [ " href " ] = DI :: baseUrl () -> remove ( $item [ 'plink' ]);
2020-01-18 20:52:34 +01:00
$ret [ " title " ] = DI :: l10n () -> t ( 'link to source' );
2018-11-07 13:19:39 +01:00
}
2020-03-02 08:57:23 +01:00
} elseif ( ! empty ( $item [ 'plink' ]) && ( $item [ 'private' ] != self :: PRIVATE )) {
2018-11-07 13:19:39 +01:00
$ret = [
2018-11-07 20:16:59 +01:00
'href' => $item [ 'plink' ],
'orig' => $item [ 'plink' ],
2020-01-18 20:52:34 +01:00
'title' => DI :: l10n () -> t ( 'link to source' ),
2018-11-07 20:16:59 +01:00
];
2018-11-07 13:19:39 +01:00
} else {
$ret = [];
}
return $ret ;
}
2019-03-14 19:44:41 +01:00
/**
* Is the given item array a post that is sent as starting post to a forum ?
*
* @ param array $item
* @ param array $owner
*
* @ return boolean " true " when it is a forum post
*/
public static function isForumPost ( array $item , array $owner = [])
{
if ( empty ( $owner )) {
$owner = User :: getOwnerDataById ( $item [ 'uid' ]);
if ( empty ( $owner )) {
return false ;
}
}
if (( $item [ 'author-id' ] == $item [ 'owner-id' ]) ||
( $owner [ 'id' ] == $item [ 'contact-id' ]) ||
2021-01-27 11:01:42 +01:00
( $item [ 'uri-id' ] != $item [ 'parent-uri-id' ]) ||
2019-03-14 19:44:41 +01:00
$item [ 'origin' ]) {
return false ;
}
return Contact :: isForum ( $item [ 'contact-id' ]);
}
2019-07-18 08:11:02 +02:00
/**
* Search item id for given URI or plink
*
* @ param string $uri
* @ param integer $uid
*
* @ return integer item id
*/
public static function searchByLink ( $uri , $uid = 0 )
{
$ssl_uri = str_replace ( 'http://' , 'https://' , $uri );
$uris = [ $uri , $ssl_uri , Strings :: normaliseLink ( $uri )];
2021-01-27 11:01:42 +01:00
$item = Post :: selectFirst ([ 'id' ], [ 'uri' => $uris , 'uid' => $uid ]);
2019-07-18 08:11:02 +02:00
if ( DBA :: isResult ( $item )) {
return $item [ 'id' ];
}
2021-01-27 11:01:42 +01:00
$item = Post :: selectFirst ([ 'id' ], [ 'plink' => $uris , 'uid' => $uid ]);
2019-07-18 08:11:02 +02:00
if ( DBA :: isResult ( $item )) {
return $item [ 'id' ];
}
return 0 ;
}
2020-02-02 20:59:14 +01:00
/**
* Return the URI for a link to the post
*
* @ param string $uri URI or link to post
*
* @ return string URI
*/
public static function getURIByLink ( string $uri )
{
$ssl_uri = str_replace ( 'http://' , 'https://' , $uri );
$uris = [ $uri , $ssl_uri , Strings :: normaliseLink ( $uri )];
2021-01-27 11:01:42 +01:00
$item = Post :: selectFirst ([ 'uri' ], [ 'uri' => $uris ]);
2020-02-02 20:59:14 +01:00
if ( DBA :: isResult ( $item )) {
return $item [ 'uri' ];
}
2021-01-27 11:01:42 +01:00
$item = Post :: selectFirst ([ 'uri' ], [ 'plink' => $uris ]);
if ( DBA :: isResult ( $item )) {
return $item [ 'uri' ];
2020-02-02 20:59:14 +01:00
}
return '' ;
}
2019-07-18 08:11:02 +02:00
/**
* Fetches item for given URI or plink
*
* @ param string $uri
* @ param integer $uid
*
* @ return integer item id
*/
2020-03-07 13:39:09 +01:00
public static function fetchByLink ( string $uri , int $uid = 0 )
2019-07-18 08:11:02 +02:00
{
2020-07-29 07:12:16 +02:00
Logger :: info ( 'Trying to fetch link' , [ 'uid' => $uid , 'uri' => $uri ]);
2019-07-18 08:11:02 +02:00
$item_id = self :: searchByLink ( $uri , $uid );
if ( ! empty ( $item_id )) {
2020-07-29 07:12:16 +02:00
Logger :: info ( 'Link found' , [ 'uid' => $uid , 'uri' => $uri , 'id' => $item_id ]);
2019-07-18 08:11:02 +02:00
return $item_id ;
}
2020-01-20 23:30:34 +01:00
if ( $fetched_uri = ActivityPub\Processor :: fetchMissingActivity ( $uri )) {
$item_id = self :: searchByLink ( $fetched_uri , $uid );
2019-07-21 09:37:50 +02:00
} else {
$item_id = Diaspora :: fetchByURL ( $uri );
}
2019-07-18 08:20:54 +02:00
2019-07-18 08:11:02 +02:00
if ( ! empty ( $item_id )) {
2020-07-29 07:12:16 +02:00
Logger :: info ( 'Link fetched' , [ 'uid' => $uid , 'uri' => $uri , 'id' => $item_id ]);
2019-07-18 08:11:02 +02:00
return $item_id ;
}
2020-07-29 07:12:16 +02:00
Logger :: info ( 'Link not found' , [ 'uid' => $uid , 'uri' => $uri ]);
2019-07-18 08:11:02 +02:00
return 0 ;
}
2019-12-04 23:57:09 +01:00
/**
* Return share data from an item array ( if the item is shared item )
* We are providing the complete Item array , because at some time in the future
* we hopefully will define these values not in the body anymore but in some item fields .
* This function is meant to replace all similar functions in the system .
*
* @ param array $item
*
* @ return array with share information
*/
public static function getShareArray ( $item )
{
if ( ! preg_match ( " /(.*?) \ [share(.*?) \ ] \ s?(.*?) \ s? \ [ \ /share \ ] \ s?/ism " , $item [ 'body' ], $matches )) {
return [];
}
$attribute_string = $matches [ 2 ];
$attributes = [ 'comment' => trim ( $matches [ 1 ]), 'shared' => trim ( $matches [ 3 ])];
2019-12-05 06:28:28 +01:00
foreach ([ 'author' , 'profile' , 'avatar' , 'guid' , 'posted' , 'link' ] as $field ) {
if ( preg_match ( " / $field =([' \" ])(.+?) \\ 1/ism " , $attribute_string , $matches )) {
$attributes [ $field ] = trim ( html_entity_decode ( $matches [ 2 ] ? ? '' , ENT_QUOTES , 'UTF-8' ));
}
2019-12-04 23:57:09 +01:00
}
return $attributes ;
}
/**
* Fetch item information for shared items from the original items and adds it .
*
* @ param array $item
*
* @ return array item array with data from the original item
*/
2020-03-07 13:39:09 +01:00
public static function addShareDataFromOriginal ( array $item )
2019-12-04 23:57:09 +01:00
{
$shared = self :: getShareArray ( $item );
if ( empty ( $shared )) {
return $item ;
}
// Real reshares always have got a GUID.
if ( empty ( $shared [ 'guid' ])) {
return $item ;
}
$uid = $item [ 'uid' ] ? ? 0 ;
// first try to fetch the item via the GUID. This will work for all reshares that had been created on this system
2021-01-16 05:13:22 +01:00
$shared_item = Post :: selectFirst ([ 'title' , 'body' ], [ 'guid' => $shared [ 'guid' ], 'uid' => [ 0 , $uid ]]);
2019-12-04 23:57:09 +01:00
if ( ! DBA :: isResult ( $shared_item )) {
2020-03-07 02:49:43 +01:00
if ( empty ( $shared [ 'link' ])) {
return $item ;
}
2019-12-04 23:57:09 +01:00
// Otherwhise try to find (and possibly fetch) the item via the link. This should work for Diaspora and ActivityPub posts
2020-03-07 13:39:09 +01:00
$id = self :: fetchByLink ( $shared [ 'link' ] ? ? '' , $uid );
2019-12-04 23:57:09 +01:00
if ( empty ( $id )) {
2020-03-07 13:39:09 +01:00
Logger :: info ( 'Original item not found' , [ 'url' => $shared [ 'link' ] ? ? '' , 'callstack' => System :: callstack ()]);
2019-12-04 23:57:09 +01:00
return $item ;
}
2021-01-16 05:13:22 +01:00
$shared_item = Post :: selectFirst ([ 'title' , 'body' ], [ 'id' => $id ]);
2019-12-04 23:57:09 +01:00
if ( ! DBA :: isResult ( $shared_item )) {
return $item ;
}
2019-12-05 06:28:28 +01:00
Logger :: info ( 'Got shared data from url' , [ 'url' => $shared [ 'link' ], 'callstack' => System :: callstack ()]);
} else {
Logger :: info ( 'Got shared data from guid' , [ 'guid' => $shared [ 'guid' ], 'callstack' => System :: callstack ()]);
2019-12-04 23:57:09 +01:00
}
2019-12-05 00:49:07 +01:00
if ( ! empty ( $shared_item [ 'title' ])) {
$body = '[h3]' . $shared_item [ 'title' ] . " [/h3] \n " . $shared_item [ 'body' ];
unset ( $shared_item [ 'title' ]);
} else {
$body = $shared_item [ 'body' ];
}
2019-12-07 22:05:14 +01:00
$item [ 'body' ] = preg_replace ( " / \ [share ([^ \ [ \ ]]*) \ ].* \ [ \ /share \ ]/ism " , '[share $1]' . $body . '[/share]' , $item [ 'body' ]);
2019-12-04 23:57:09 +01:00
unset ( $shared_item [ 'body' ]);
return array_merge ( $item , $shared_item );
}
2020-11-11 08:50:22 +01:00
/**
* Check a prospective item array against user - level permissions
*
* @ param array $item Expected keys : uri , gravity , and
* author - link if is author - id is set ,
* owner - link if is owner - id is set ,
* causer - link if is causer - id is set .
* @ param int $user_id Local user ID
* @ return bool
* @ throws \Exception
*/
protected static function isAllowedByUser ( array $item , int $user_id )
{
if ( ! empty ( $item [ 'author-id' ]) && Contact\User :: isBlocked ( $item [ 'author-id' ], $user_id )) {
Logger :: notice ( 'Author is blocked by user' , [ 'author-link' => $item [ 'author-link' ], 'uid' => $user_id , 'item-uri' => $item [ 'uri' ]]);
return false ;
}
if ( ! empty ( $item [ 'owner-id' ]) && Contact\User :: isBlocked ( $item [ 'owner-id' ], $user_id )) {
Logger :: notice ( 'Owner is blocked by user' , [ 'owner-link' => $item [ 'owner-link' ], 'uid' => $user_id , 'item-uri' => $item [ 'uri' ]]);
return false ;
}
// The causer is set during a thread completion, for example because of a reshare. It countains the responsible actor.
if ( ! empty ( $item [ 'causer-id' ]) && Contact\User :: isBlocked ( $item [ 'causer-id' ], $user_id )) {
2020-11-18 00:06:16 +01:00
Logger :: notice ( 'Causer is blocked by user' , [ 'causer-link' => $item [ 'causer-link' ] ? ? $item [ 'causer-id' ], 'uid' => $user_id , 'item-uri' => $item [ 'uri' ]]);
2020-11-11 08:50:22 +01:00
return false ;
}
if ( ! empty ( $item [ 'causer-id' ]) && ( $item [ 'gravity' ] === GRAVITY_PARENT ) && Contact\User :: isIgnored ( $item [ 'causer-id' ], $user_id )) {
2020-11-18 00:06:16 +01:00
Logger :: notice ( 'Causer is ignored by user' , [ 'causer-link' => $item [ 'causer-link' ] ? ? $item [ 'causer-id' ], 'uid' => $user_id , 'item-uri' => $item [ 'uri' ]]);
2020-11-11 08:50:22 +01:00
return false ;
}
return true ;
}
2018-01-09 22:13:45 +01:00
}