2018-10-17 14:19:58 +02:00
|
|
|
<?php
|
2024-08-24 15:27:00 +02:00
|
|
|
|
|
|
|
// Copyright (C) 2010-2024, the Friendica project
|
|
|
|
// SPDX-FileCopyrightText: 2010-2024 the Friendica project
|
|
|
|
//
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
2018-10-17 14:19:58 +02:00
|
|
|
|
2020-09-30 11:14:01 +02:00
|
|
|
namespace Friendica\Security;
|
2018-10-17 14:19:58 +02:00
|
|
|
|
|
|
|
use Friendica\Database\DBA;
|
2022-10-20 21:22:47 +02:00
|
|
|
use Friendica\DI;
|
2018-10-17 14:19:58 +02:00
|
|
|
use Friendica\Model\Contact;
|
2023-05-13 19:54:35 -04:00
|
|
|
use Friendica\Model\Circle;
|
2019-01-06 12:37:48 -05:00
|
|
|
use Friendica\Model\User;
|
2018-10-17 14:19:58 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Secures that User is allow to do requests
|
|
|
|
*/
|
2019-12-15 23:28:01 +01:00
|
|
|
class Security
|
2018-10-17 14:19:58 +02:00
|
|
|
{
|
2018-10-17 21:30:41 +02:00
|
|
|
public static function canWriteToUserWall($owner)
|
2018-10-17 14:19:58 +02:00
|
|
|
{
|
|
|
|
static $verified = 0;
|
|
|
|
|
2022-10-20 21:22:47 +02:00
|
|
|
if (!DI::userSession()->isAuthenticated()) {
|
2018-10-17 14:19:58 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2022-10-20 21:22:47 +02:00
|
|
|
$uid = DI::userSession()->getLocalUserId();
|
2018-10-17 14:19:58 +02:00
|
|
|
if ($uid == $owner) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2022-10-20 21:22:47 +02:00
|
|
|
if (DI::userSession()->getLocalUserId() && ($owner == 0)) {
|
2018-10-17 14:19:58 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2022-10-20 21:22:47 +02:00
|
|
|
if (!empty($cid = DI::userSession()->getRemoteContactID($owner))) {
|
2018-10-17 14:19:58 +02:00
|
|
|
// use remembered decision and avoid a DB lookup for each and every display item
|
|
|
|
// DO NOT use this function if there are going to be multiple owners
|
|
|
|
// We have a contact-id for an authenticated remote user, this block determines if the contact
|
|
|
|
// belongs to this page owner, and has the necessary permissions to post content
|
|
|
|
|
|
|
|
if ($verified === 2) {
|
|
|
|
return true;
|
|
|
|
} elseif ($verified === 1) {
|
|
|
|
return false;
|
|
|
|
} else {
|
2021-10-02 11:08:12 +00:00
|
|
|
$user = User::getById($owner);
|
|
|
|
if (!$user || $user['blockwall']) {
|
|
|
|
$verified = 1;
|
2018-10-17 14:19:58 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-10-02 11:08:12 +00:00
|
|
|
$contact = Contact::getById($cid);
|
|
|
|
if ($contact || $contact['blocked'] || $contact['readonly'] || $contact['pending']) {
|
|
|
|
$verified = 1;
|
|
|
|
return false;
|
|
|
|
}
|
2023-01-01 09:36:24 -05:00
|
|
|
|
2021-10-02 11:08:12 +00:00
|
|
|
if (in_array($contact['rel'], [Contact::SHARING, Contact::FRIEND]) || ($user['page-flags'] == User::PAGE_FLAGS_COMMUNITY)) {
|
2018-10-17 14:19:58 +02:00
|
|
|
$verified = 2;
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
$verified = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-03-08 13:16:59 +00:00
|
|
|
/**
|
|
|
|
* Create a permission string for an element based on the visitor
|
|
|
|
*
|
|
|
|
* @param integer $owner_id User ID of the owner of the element
|
|
|
|
* @param boolean $accessible Should the element be accessible anyway?
|
|
|
|
* @return string SQL permissions
|
|
|
|
*/
|
|
|
|
public static function getPermissionsSQLByUserId(int $owner_id, bool $accessible = false)
|
2018-10-17 14:19:58 +02:00
|
|
|
{
|
2022-10-20 21:22:47 +02:00
|
|
|
$local_user = DI::userSession()->getLocalUserId();
|
|
|
|
$remote_contact = DI::userSession()->getRemoteContactID($owner_id);
|
2020-03-08 13:16:59 +00:00
|
|
|
$acc_sql = '';
|
|
|
|
|
|
|
|
if ($accessible) {
|
|
|
|
$acc_sql = ' OR `accessible`';
|
|
|
|
}
|
2018-10-17 14:19:58 +02:00
|
|
|
|
2018-10-17 21:30:41 +02:00
|
|
|
/*
|
2018-10-17 14:19:58 +02:00
|
|
|
* Construct permissions
|
|
|
|
*
|
|
|
|
* default permissions - anonymous user
|
|
|
|
*/
|
2020-03-08 13:16:59 +00:00
|
|
|
$sql = " AND (allow_cid = ''
|
2019-09-27 05:49:23 +00:00
|
|
|
AND allow_gid = ''
|
|
|
|
AND deny_cid = ''
|
2020-03-08 13:16:59 +00:00
|
|
|
AND deny_gid = ''" . $acc_sql . ") ";
|
2018-10-17 14:19:58 +02:00
|
|
|
|
2018-10-17 21:30:41 +02:00
|
|
|
/*
|
2018-10-17 14:19:58 +02:00
|
|
|
* Profile owner - everything is visible
|
|
|
|
*/
|
|
|
|
if ($local_user && $local_user == $owner_id) {
|
|
|
|
$sql = '';
|
2018-10-17 21:30:41 +02:00
|
|
|
/*
|
2023-05-13 19:54:35 -04:00
|
|
|
* Authenticated visitor. Load the circles the visitor belongs to.
|
2018-10-17 14:19:58 +02:00
|
|
|
*/
|
2019-09-28 09:36:41 +00:00
|
|
|
} elseif ($remote_contact) {
|
2023-05-13 19:54:35 -04:00
|
|
|
$circleIds = '<<>>'; // should be impossible to match
|
2018-10-17 14:19:58 +02:00
|
|
|
|
2023-05-13 19:54:35 -04:00
|
|
|
foreach (Circle::getIdsByContactId($remote_contact) as $circleId) {
|
|
|
|
$circleIds .= '|<' . intval($circleId) . '>';
|
2018-10-17 14:19:58 +02:00
|
|
|
}
|
2019-09-28 09:36:41 +00:00
|
|
|
|
|
|
|
$sql = sprintf(
|
|
|
|
" AND (NOT (deny_cid REGEXP '<%d>' OR deny_gid REGEXP '%s')
|
2020-03-08 13:16:59 +00:00
|
|
|
AND (allow_cid REGEXP '<%d>' OR allow_gid REGEXP '%s'
|
|
|
|
OR (allow_cid = '' AND allow_gid = ''))" . $acc_sql . ") ",
|
2019-09-28 09:36:41 +00:00
|
|
|
intval($remote_contact),
|
2023-05-13 19:54:35 -04:00
|
|
|
DBA::escape($circleIds),
|
2019-09-28 09:36:41 +00:00
|
|
|
intval($remote_contact),
|
2023-05-13 19:54:35 -04:00
|
|
|
DBA::escape($circleIds)
|
2019-09-28 09:36:41 +00:00
|
|
|
);
|
2018-10-17 14:19:58 +02:00
|
|
|
}
|
|
|
|
return $sql;
|
|
|
|
}
|
|
|
|
}
|