2018-10-17 12:19:58 +00:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @file /src/Util/Security.php
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace Friendica\Util;
|
|
|
|
|
|
|
|
use Friendica\BaseObject;
|
|
|
|
use Friendica\Database\DBA;
|
|
|
|
use Friendica\Model\Contact;
|
|
|
|
use Friendica\Model\Group;
|
2019-01-06 17:37:48 +00:00
|
|
|
use Friendica\Model\User;
|
2018-10-17 12:19:58 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Secures that User is allow to do requests
|
|
|
|
*/
|
|
|
|
class Security extends BaseObject
|
|
|
|
{
|
2018-10-17 19:30:41 +00:00
|
|
|
public static function canWriteToUserWall($owner)
|
2018-10-17 12:19:58 +00:00
|
|
|
{
|
|
|
|
static $verified = 0;
|
|
|
|
|
|
|
|
if (!local_user() && !remote_user()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$uid = local_user();
|
|
|
|
if ($uid == $owner) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (local_user() && ($owner == 0)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-09-23 22:13:20 +00:00
|
|
|
if (remote_user($owner)) {
|
2018-10-17 12:19:58 +00:00
|
|
|
// use remembered decision and avoid a DB lookup for each and every display item
|
|
|
|
// DO NOT use this function if there are going to be multiple owners
|
|
|
|
// We have a contact-id for an authenticated remote user, this block determines if the contact
|
|
|
|
// belongs to this page owner, and has the necessary permissions to post content
|
|
|
|
|
|
|
|
if ($verified === 2) {
|
|
|
|
return true;
|
|
|
|
} elseif ($verified === 1) {
|
|
|
|
return false;
|
|
|
|
} else {
|
2019-09-23 22:13:20 +00:00
|
|
|
$cid = remote_user($owner);
|
2018-10-17 12:19:58 +00:00
|
|
|
if (!$cid) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$r = q("SELECT `contact`.*, `user`.`page-flags` FROM `contact` INNER JOIN `user` on `user`.`uid` = `contact`.`uid`
|
|
|
|
WHERE `contact`.`uid` = %d AND `contact`.`id` = %d AND `contact`.`blocked` = 0 AND `contact`.`pending` = 0
|
2019-09-27 05:49:23 +00:00
|
|
|
AND `user`.`blockwall` = 0 AND `readonly` = 0 AND (`contact`.`rel` IN (%d , %d) OR `user`.`page-flags` = %d) LIMIT 1",
|
2018-10-17 12:19:58 +00:00
|
|
|
intval($owner),
|
|
|
|
intval($cid),
|
|
|
|
intval(Contact::SHARING),
|
|
|
|
intval(Contact::FRIEND),
|
2019-01-06 17:37:48 +00:00
|
|
|
intval(User::PAGE_FLAGS_COMMUNITY)
|
2018-10-17 12:19:58 +00:00
|
|
|
);
|
|
|
|
|
|
|
|
if (DBA::isResult($r)) {
|
|
|
|
$verified = 2;
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
$verified = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/// @TODO $groups should be array
|
2018-10-17 19:30:41 +00:00
|
|
|
public static function getPermissionsSQLByUserId($owner_id, $remote_verified = false, $groups = null)
|
2018-10-17 12:19:58 +00:00
|
|
|
{
|
|
|
|
$local_user = local_user();
|
2019-09-27 05:49:23 +00:00
|
|
|
$remote_user = remote_user($owner_id);
|
2018-10-17 12:19:58 +00:00
|
|
|
|
2018-10-17 19:30:41 +00:00
|
|
|
/*
|
2018-10-17 12:19:58 +00:00
|
|
|
* Construct permissions
|
|
|
|
*
|
|
|
|
* default permissions - anonymous user
|
|
|
|
*/
|
|
|
|
$sql = " AND allow_cid = ''
|
2019-09-27 05:49:23 +00:00
|
|
|
AND allow_gid = ''
|
|
|
|
AND deny_cid = ''
|
|
|
|
AND deny_gid = '' ";
|
2018-10-17 12:19:58 +00:00
|
|
|
|
2018-10-17 19:30:41 +00:00
|
|
|
/*
|
2018-10-17 12:19:58 +00:00
|
|
|
* Profile owner - everything is visible
|
|
|
|
*/
|
|
|
|
if ($local_user && $local_user == $owner_id) {
|
|
|
|
$sql = '';
|
2018-10-17 19:30:41 +00:00
|
|
|
/*
|
2018-10-17 12:19:58 +00:00
|
|
|
* Authenticated visitor. Unless pre-verified,
|
|
|
|
* check that the contact belongs to this $owner_id
|
|
|
|
* and load the groups the visitor belongs to.
|
|
|
|
* If pre-verified, the caller is expected to have already
|
|
|
|
* done this and passed the groups into this function.
|
|
|
|
*/
|
|
|
|
} elseif ($remote_user) {
|
2019-09-27 05:49:23 +00:00
|
|
|
$cid = \Friendica\Core\Session::getVisitorContactIDForUserID($owner_id);
|
|
|
|
|
2018-10-17 12:19:58 +00:00
|
|
|
/*
|
|
|
|
* Authenticated visitor. Unless pre-verified,
|
|
|
|
* check that the contact belongs to this $owner_id
|
|
|
|
* and load the groups the visitor belongs to.
|
|
|
|
* If pre-verified, the caller is expected to have already
|
|
|
|
* done this and passed the groups into this function.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!$remote_verified) {
|
2019-06-08 15:11:02 +00:00
|
|
|
if ($cid && DBA::exists('contact', ['id' => $cid, 'uid' => $owner_id, 'blocked' => false])) {
|
2018-10-17 12:19:58 +00:00
|
|
|
$remote_verified = true;
|
2019-06-08 15:11:02 +00:00
|
|
|
$groups = Group::getIdsByContactId($cid);
|
2018-10-17 12:19:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($remote_verified) {
|
|
|
|
$gs = '<<>>'; // should be impossible to match
|
|
|
|
|
|
|
|
if (is_array($groups)) {
|
|
|
|
foreach ($groups as $g) {
|
|
|
|
$gs .= '|<' . intval($g) . '>';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$sql = sprintf(
|
2019-09-27 05:49:23 +00:00
|
|
|
" AND (NOT (deny_cid REGEXP '<%d>' OR deny_gid REGEXP '%s')
|
|
|
|
AND (allow_cid REGEXP '<%d>' OR allow_gid REGEXP '%s' OR (allow_cid = '' AND allow_gid = ''))) ",
|
2019-06-08 15:11:02 +00:00
|
|
|
intval($cid),
|
2018-10-17 12:19:58 +00:00
|
|
|
DBA::escape($gs),
|
2019-06-08 15:11:02 +00:00
|
|
|
intval($cid),
|
2018-10-17 12:19:58 +00:00
|
|
|
DBA::escape($gs)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $sql;
|
|
|
|
}
|
|
|
|
}
|