2008-04-06 10:20:13 +02:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* Manages uploads via HTML forms processed by PHP,
|
|
|
|
* uploads to Silverstripe's default upload directory,
|
|
|
|
* and either creates a new or uses an existing File-object
|
|
|
|
* for syncing with the database.
|
|
|
|
*
|
2010-10-15 05:04:27 +02:00
|
|
|
* <b>Validation</b>
|
|
|
|
*
|
|
|
|
* By default, a user can upload files without extension limitations,
|
|
|
|
* which can be a security risk if the webserver is not properly secured.
|
|
|
|
* Use {@link setAllowedExtensions()} to limit this list,
|
|
|
|
* and ensure the "assets/" directory does not execute scripts
|
|
|
|
* (see http://doc.silverstripe.org/secure-development#filesystem).
|
|
|
|
* {@link File::$allowed_extensions} provides a good start for a list of "safe" extensions.
|
|
|
|
*
|
2012-04-12 08:02:46 +02:00
|
|
|
* @package framework
|
2008-04-06 10:20:13 +02:00
|
|
|
* @subpackage filesystem
|
|
|
|
*
|
|
|
|
* @todo Allow for non-database uploads
|
|
|
|
*/
|
|
|
|
class Upload extends Controller {
|
|
|
|
|
2011-02-13 23:14:51 +01:00
|
|
|
static $allowed_actions = array(
|
|
|
|
'index',
|
|
|
|
'load'
|
|
|
|
);
|
|
|
|
|
2008-04-06 10:20:13 +02:00
|
|
|
/**
|
|
|
|
* A File object
|
|
|
|
* @var File
|
|
|
|
*/
|
|
|
|
protected $file;
|
|
|
|
|
2010-05-25 05:42:52 +02:00
|
|
|
/**
|
|
|
|
* An instance of Upload_Validator
|
|
|
|
* @var Upload_Validator
|
|
|
|
*/
|
|
|
|
protected $validator;
|
|
|
|
|
2008-04-06 10:20:13 +02:00
|
|
|
/**
|
|
|
|
* Information about the temporary file produced
|
|
|
|
* by the PHP-runtime.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $tmpFile;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Processing errors that can be evaluated,
|
|
|
|
* e.g. by Form-validation.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $errors = array();
|
|
|
|
|
|
|
|
/**
|
|
|
|
* A foldername relative to /assets,
|
|
|
|
* where all uploaded files are stored by default.
|
|
|
|
*
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
public static $uploads_folder = "Uploads";
|
|
|
|
|
2010-05-25 05:42:52 +02:00
|
|
|
public function __construct() {
|
|
|
|
parent::__construct();
|
|
|
|
$this->validator = new Upload_Validator();
|
|
|
|
}
|
|
|
|
|
2010-05-25 06:03:46 +02:00
|
|
|
/**
|
|
|
|
* Get current validator
|
|
|
|
*
|
|
|
|
* @return object $validator
|
|
|
|
*/
|
|
|
|
public function getValidator() {
|
|
|
|
return $this->validator;
|
|
|
|
}
|
|
|
|
|
2010-05-25 05:42:52 +02:00
|
|
|
/**
|
|
|
|
* Set a different instance than {@link Upload_Validator}
|
|
|
|
* for this upload session.
|
|
|
|
*
|
|
|
|
* @param object $validator
|
|
|
|
*/
|
|
|
|
public function setValidator($validator) {
|
|
|
|
$this->validator = $validator;
|
|
|
|
}
|
|
|
|
|
2008-04-06 10:20:13 +02:00
|
|
|
/**
|
|
|
|
* Save an file passed from a form post into this object.
|
2011-08-26 17:57:05 +02:00
|
|
|
* File names are filtered through {@link FileNameFilter}, see class documentation
|
|
|
|
* on how to influence this behaviour.
|
2008-04-06 10:20:13 +02:00
|
|
|
*
|
|
|
|
* @param $tmpFile array Indexed array that PHP generated for every file it uploads.
|
|
|
|
* @param $folderPath string Folder path relative to /assets
|
|
|
|
* @return Boolean|string Either success or error-message.
|
|
|
|
*/
|
|
|
|
function load($tmpFile, $folderPath = false) {
|
|
|
|
$this->clearErrors();
|
|
|
|
|
|
|
|
if(!$folderPath) $folderPath = self::$uploads_folder;
|
|
|
|
|
2011-08-22 13:04:15 +02:00
|
|
|
if(!$this->file) {
|
|
|
|
$fileClass = File::get_class_for_file_extension(pathinfo($tmpFile['name'], PATHINFO_EXTENSION));
|
|
|
|
$this->file = new $fileClass();
|
|
|
|
}
|
2008-04-06 10:20:13 +02:00
|
|
|
|
|
|
|
if(!is_array($tmpFile)) {
|
2010-05-25 06:04:20 +02:00
|
|
|
user_error("Upload::load() Not passed an array. Most likely, the form hasn't got the right enctype", E_USER_ERROR);
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if(!$tmpFile['size']) {
|
|
|
|
$this->errors[] = _t('File.NOFILESIZE', 'Filesize is zero bytes.');
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$valid = $this->validate($tmpFile);
|
|
|
|
if(!$valid) return false;
|
|
|
|
|
|
|
|
// @TODO This puts a HUGE limitation on files especially when lots
|
|
|
|
// have been uploaded.
|
|
|
|
$base = Director::baseFolder();
|
2011-12-06 01:56:24 +01:00
|
|
|
$parentFolder = Folder::find_or_make($folderPath);
|
2008-04-06 10:20:13 +02:00
|
|
|
|
|
|
|
// Create a folder for uploading.
|
ENHANCEMENT Introduced constants for system paths like /sapphire in preparation for a more flexible directory reorganisation. Instead of hardcoding your path, please use the following constants: BASE_PATH, BASE_URL, SAPPHIRE_DIR, SAPPHIRE_PATH, CMS_DIR, CMS_PATH, THIRDPARTY_DIR, THIRDPARTY_PATH, ASSETS_DIR, ASSETS_PATH, THEMES_DIR, THEMES_PATH
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@63154 467b73ca-7a2a-4603-9d3b-597d59a354a9
2008-09-27 18:02:38 +02:00
|
|
|
if(!file_exists(ASSETS_PATH)){
|
|
|
|
mkdir(ASSETS_PATH, Filesystem::$folder_create_mask);
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
ENHANCEMENT Introduced constants for system paths like /sapphire in preparation for a more flexible directory reorganisation. Instead of hardcoding your path, please use the following constants: BASE_PATH, BASE_URL, SAPPHIRE_DIR, SAPPHIRE_PATH, CMS_DIR, CMS_PATH, THIRDPARTY_DIR, THIRDPARTY_PATH, ASSETS_DIR, ASSETS_PATH, THEMES_DIR, THEMES_PATH
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@63154 467b73ca-7a2a-4603-9d3b-597d59a354a9
2008-09-27 18:02:38 +02:00
|
|
|
if(!file_exists(ASSETS_PATH . "/" . $folderPath)){
|
|
|
|
mkdir(ASSETS_PATH . "/" . $folderPath, Filesystem::$folder_create_mask);
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Generate default filename
|
2012-04-04 16:59:30 +02:00
|
|
|
$nameFilter = FileNameFilter::create();
|
2011-08-26 17:57:05 +02:00
|
|
|
$file = $nameFilter->filter($tmpFile['name']);
|
|
|
|
$fileName = basename($file);
|
2008-04-06 10:20:13 +02:00
|
|
|
|
ENHANCEMENT Introduced constants for system paths like /sapphire in preparation for a more flexible directory reorganisation. Instead of hardcoding your path, please use the following constants: BASE_PATH, BASE_URL, SAPPHIRE_DIR, SAPPHIRE_PATH, CMS_DIR, CMS_PATH, THIRDPARTY_DIR, THIRDPARTY_PATH, ASSETS_DIR, ASSETS_PATH, THEMES_DIR, THEMES_PATH
git-svn-id: svn://svn.silverstripe.com/silverstripe/open/modules/sapphire/trunk@63154 467b73ca-7a2a-4603-9d3b-597d59a354a9
2008-09-27 18:02:38 +02:00
|
|
|
$relativeFilePath = ASSETS_DIR . "/" . $folderPath . "/$fileName";
|
2008-04-06 10:20:13 +02:00
|
|
|
|
|
|
|
// if filename already exists, version the filename (e.g. test.gif to test1.gif)
|
|
|
|
while(file_exists("$base/$relativeFilePath")) {
|
|
|
|
$i = isset($i) ? ($i+1) : 2;
|
|
|
|
$oldFilePath = $relativeFilePath;
|
|
|
|
// make sure archives retain valid extensions
|
|
|
|
if(substr($relativeFilePath, strlen($relativeFilePath) - strlen('.tar.gz')) == '.tar.gz' ||
|
|
|
|
substr($relativeFilePath, strlen($relativeFilePath) - strlen('.tar.bz2')) == '.tar.bz2') {
|
2012-02-27 22:14:02 +01:00
|
|
|
$relativeFilePath = preg_replace('/[0-9]*(\.tar\.[^.]+$)/', $i . '\\1', $relativeFilePath);
|
2010-10-04 06:42:13 +02:00
|
|
|
} else if (strpos($relativeFilePath, '.') !== false) {
|
2012-02-27 22:14:02 +01:00
|
|
|
$relativeFilePath = preg_replace('/[0-9]*(\.[^.]+$)/', $i . '\\1', $relativeFilePath);
|
2010-10-04 06:42:13 +02:00
|
|
|
} else if (strpos($relativeFilePath, '_') !== false) {
|
2012-02-27 22:14:02 +01:00
|
|
|
$relativeFilePath = preg_replace('/_([^_]+$)/', '_'.$i, $relativeFilePath);
|
2010-10-04 06:42:13 +02:00
|
|
|
} else {
|
2012-02-27 22:14:02 +01:00
|
|
|
$relativeFilePath .= '_'.$i;
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
if($oldFilePath == $relativeFilePath && $i > 2) user_error("Couldn't fix $relativeFilePath with $i tries", E_USER_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(file_exists($tmpFile['tmp_name']) && copy($tmpFile['tmp_name'], "$base/$relativeFilePath")) {
|
|
|
|
$this->file->ParentID = $parentFolder->ID;
|
|
|
|
// This is to prevent it from trying to rename the file
|
|
|
|
$this->file->Name = basename($relativeFilePath);
|
|
|
|
$this->file->write();
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
$this->errors[] = _t('File.NOFILESIZE', 'Filesize is zero bytes.');
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Load temporary PHP-upload into File-object.
|
|
|
|
*
|
|
|
|
* @param array $tmpFile
|
|
|
|
* @param File $file
|
|
|
|
* @return Boolean
|
|
|
|
*/
|
2008-11-05 04:56:22 +01:00
|
|
|
public function loadIntoFile($tmpFile, $file, $folderPath = false) {
|
2008-04-06 10:20:13 +02:00
|
|
|
$this->file = $file;
|
2008-11-05 04:56:22 +01:00
|
|
|
return $this->load($tmpFile, $folderPath);
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Container for all validation on the file
|
|
|
|
* (e.g. size and extension restrictions).
|
|
|
|
* Is NOT connected to the {Validator} classes,
|
|
|
|
* please have a look at {FileField->validate()}
|
|
|
|
* for an example implementation of external validation.
|
|
|
|
*
|
|
|
|
* @param array $tmpFile
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function validate($tmpFile) {
|
2010-05-25 05:42:52 +02:00
|
|
|
$validator = $this->validator;
|
|
|
|
$validator->setTmpFile($tmpFile);
|
|
|
|
$isValid = $validator->validate();
|
|
|
|
if($validator->getErrors()) {
|
|
|
|
$this->errors = array_merge($this->errors, $validator->getErrors());
|
2009-03-17 23:26:33 +01:00
|
|
|
}
|
2010-05-25 05:42:52 +02:00
|
|
|
return $isValid;
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get file-object, either generated from {load()},
|
|
|
|
* or manually set.
|
|
|
|
*
|
|
|
|
* @return File
|
|
|
|
*/
|
|
|
|
public function getFile() {
|
|
|
|
return $this->file;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set a file-object (similiar to {loadIntoFile()})
|
|
|
|
*
|
|
|
|
* @param File $file
|
|
|
|
*/
|
|
|
|
public function setFile($file) {
|
|
|
|
$this->file = $file;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get maximum file size for all or specified file extension.
|
2010-05-25 05:42:52 +02:00
|
|
|
*
|
|
|
|
* @deprecated 2.5 Please use Upload_Validator::getAllowedMaxFileSize() instead
|
|
|
|
*
|
2008-04-06 10:20:13 +02:00
|
|
|
* @param string $ext
|
|
|
|
* @return int Filesize in bytes
|
|
|
|
*/
|
|
|
|
public function getAllowedMaxFileSize($ext = null) {
|
2011-10-29 01:02:11 +02:00
|
|
|
Deprecation::notice('2.5', 'Use Upload_Validator::getAllowedMaxFileSize() instead.');
|
2010-05-25 05:42:52 +02:00
|
|
|
return $this->validator->getAllowedMaxFileSize($ext);
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set filesize maximums (in bytes).
|
|
|
|
* Automatically converts extensions to lowercase
|
|
|
|
* for easier matching.
|
|
|
|
*
|
|
|
|
* Example:
|
|
|
|
* <code>
|
|
|
|
* array('*' => 200, 'jpg' => 1000)
|
|
|
|
* </code>
|
|
|
|
*
|
2010-05-25 05:42:52 +02:00
|
|
|
* @deprecated 2.5 Please use Upload_Validator::setAllowedMaxFileSize() instead
|
|
|
|
*
|
2008-04-06 10:20:13 +02:00
|
|
|
* @param array|int $rules
|
|
|
|
*/
|
|
|
|
public function setAllowedMaxFileSize($rules) {
|
2011-10-29 01:02:11 +02:00
|
|
|
Deprecation::notice('2.5', 'Use Upload_Validator::setAllowedMaxFileSize() instead.');
|
2010-05-25 05:42:52 +02:00
|
|
|
$this->validator->setAllowedMaxFileSize($rules);
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2010-05-25 05:42:52 +02:00
|
|
|
* @deprecated 2.5 Please use Upload_Validator::getAllowedExtensions() instead
|
2008-04-06 10:20:13 +02:00
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function getAllowedExtensions() {
|
2011-10-29 01:02:11 +02:00
|
|
|
Deprecation::notice('2.5', 'Use Upload_Validator::getAllowedExtensions() instead.');
|
2010-05-25 05:42:52 +02:00
|
|
|
return $this->validator->getAllowedExtensions();
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2010-05-25 05:42:52 +02:00
|
|
|
* @deprecated 2.5 Please use Upload_Validator::setAllowedExtensions() instead
|
2008-04-06 10:20:13 +02:00
|
|
|
* @param array $rules
|
|
|
|
*/
|
|
|
|
public function setAllowedExtensions($rules) {
|
2011-10-29 01:02:11 +02:00
|
|
|
Deprecation::notice('2.5', 'Use Upload_Validator::setAllowedExtensions() instead.');
|
2010-05-25 05:42:52 +02:00
|
|
|
$this->validator->setAllowedExtensions($rules);
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determines if the bytesize of an uploaded
|
|
|
|
* file is valid - can be defined on an
|
|
|
|
* extension-by-extension basis in {$allowedMaxFileSize}
|
2010-05-25 05:42:52 +02:00
|
|
|
*
|
|
|
|
* @deprecated 2.5 Please use Upload_Validator::isValidExtension() instead
|
2008-04-06 10:20:13 +02:00
|
|
|
*
|
|
|
|
* @param array $tmpFile
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function isValidSize($tmpFile) {
|
2011-10-29 01:02:11 +02:00
|
|
|
Deprecation::notice('2.5', 'Use Upload_Validator::isValidSize() instead.');
|
2010-05-25 05:42:52 +02:00
|
|
|
$validator = new Upload_Validator();
|
|
|
|
$validator->setTmpFile($tmpFile);
|
|
|
|
return $validator->isValidSize();
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determines if the temporary file has a valid extension
|
2010-05-25 05:42:52 +02:00
|
|
|
*
|
|
|
|
* @deprecated 2.5 Please use Upload_Validator::isValidExtension() instead
|
|
|
|
*
|
2008-04-06 10:20:13 +02:00
|
|
|
* @param array $tmpFile
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function isValidExtension($tmpFile) {
|
2011-10-29 01:02:11 +02:00
|
|
|
Deprecation::notice('2.5', 'Use Upload_Validator::isValidExtension() instead.');
|
2010-05-25 05:42:52 +02:00
|
|
|
$validator = new Upload_Validator();
|
|
|
|
$validator->setTmpFile($tmpFile);
|
|
|
|
return $validator->isValidExtension();
|
2008-04-06 10:20:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Clear out all errors (mostly set by {loadUploaded()})
|
|
|
|
*/
|
|
|
|
public function clearErrors() {
|
|
|
|
$this->errors = array();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determines wether previous operations caused an error.
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function isError() {
|
|
|
|
return (count($this->errors));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Return all errors that occurred while processing so far
|
|
|
|
* (mostly set by {loadUploaded()})
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function getErrors() {
|
|
|
|
return $this->errors;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2010-10-13 05:53:12 +02:00
|
|
|
|
|
|
|
/**
|
2012-04-12 08:02:46 +02:00
|
|
|
* @package framework
|
2010-10-13 05:53:12 +02:00
|
|
|
* @subpackage filesystem
|
|
|
|
*/
|
2010-05-25 05:42:52 +02:00
|
|
|
class Upload_Validator {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Information about the temporary file produced
|
|
|
|
* by the PHP-runtime.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $tmpFile;
|
|
|
|
|
|
|
|
protected $errors = array();
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Restrict filesize for either all filetypes
|
|
|
|
* or a specific extension, with extension-name
|
|
|
|
* as array-key and the size-restriction in bytes as array-value.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
public $allowedMaxFileSize = array();
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @var array Collection of extensions.
|
|
|
|
* Extension-names are treated case-insensitive.
|
|
|
|
*
|
|
|
|
* Example:
|
|
|
|
* <code>
|
|
|
|
* array("jpg","GIF")
|
|
|
|
* </code>
|
|
|
|
*/
|
|
|
|
public $allowedExtensions = array();
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Return all errors that occurred while validating
|
|
|
|
* the temporary file.
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function getErrors() {
|
|
|
|
return $this->errors;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set information about temporary file produced by PHP.
|
|
|
|
* @param array $tmpFile
|
|
|
|
*/
|
|
|
|
public function setTmpFile($tmpFile) {
|
|
|
|
$this->tmpFile = $tmpFile;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get maximum file size for all or specified file extension.
|
|
|
|
*
|
|
|
|
* @param string $ext
|
|
|
|
* @return int Filesize in bytes
|
|
|
|
*/
|
|
|
|
public function getAllowedMaxFileSize($ext = null) {
|
|
|
|
$ext = strtolower($ext);
|
|
|
|
if(isset($ext) && isset($this->allowedMaxFileSize[$ext])) {
|
|
|
|
return $this->allowedMaxFileSize[$ext];
|
|
|
|
} else {
|
|
|
|
return (isset($this->allowedMaxFileSize['*'])) ? $this->allowedMaxFileSize['*'] : false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set filesize maximums (in bytes).
|
|
|
|
* Automatically converts extensions to lowercase
|
|
|
|
* for easier matching.
|
|
|
|
*
|
|
|
|
* Example:
|
|
|
|
* <code>
|
|
|
|
* array('*' => 200, 'jpg' => 1000)
|
|
|
|
* </code>
|
|
|
|
*
|
|
|
|
* @param array|int $rules
|
|
|
|
*/
|
|
|
|
public function setAllowedMaxFileSize($rules) {
|
|
|
|
if(is_array($rules) && count($rules)) {
|
|
|
|
// make sure all extensions are lowercase
|
|
|
|
$rules = array_change_key_case($rules, CASE_LOWER);
|
|
|
|
$this->allowedMaxFileSize = $rules;
|
|
|
|
} elseif((int) $rules > 0) {
|
|
|
|
$this->allowedMaxFileSize['*'] = (int)$rules;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function getAllowedExtensions() {
|
|
|
|
return $this->allowedExtensions;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2010-10-15 05:04:27 +02:00
|
|
|
* Limit allowed file extensions. Empty by default, allowing all extensions.
|
|
|
|
* To allow files without an extension, use an empty string.
|
|
|
|
* See {@link File::$allowed_extensions} to get a good standard set of
|
|
|
|
* extensions that are typically not harmful in a webserver context.
|
|
|
|
* See {@link setAllowedMaxFileSize()} to limit file size by extension.
|
|
|
|
*
|
|
|
|
* @param array $rules List of extensions
|
2010-05-25 05:42:52 +02:00
|
|
|
*/
|
|
|
|
public function setAllowedExtensions($rules) {
|
|
|
|
if(!is_array($rules)) return false;
|
|
|
|
|
|
|
|
// make sure all rules are lowercase
|
|
|
|
foreach($rules as &$rule) $rule = strtolower($rule);
|
|
|
|
|
|
|
|
$this->allowedExtensions = $rules;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determines if the bytesize of an uploaded
|
|
|
|
* file is valid - can be defined on an
|
2010-10-15 05:04:27 +02:00
|
|
|
* extension-by-extension basis in {@link $allowedMaxFileSize}
|
2010-05-25 05:42:52 +02:00
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function isValidSize() {
|
|
|
|
$pathInfo = pathinfo($this->tmpFile['name']);
|
|
|
|
$extension = isset($pathInfo['extension']) ? strtolower($pathInfo['extension']) : null;
|
|
|
|
$maxSize = $this->getAllowedMaxFileSize($extension);
|
|
|
|
return (!$this->tmpFile['size'] || !$maxSize || (int) $this->tmpFile['size'] < $maxSize);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Determines if the temporary file has a valid extension
|
2010-10-04 06:42:54 +02:00
|
|
|
* An empty string in the validation map indicates files without an extension.
|
2010-05-25 05:42:52 +02:00
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function isValidExtension() {
|
|
|
|
$pathInfo = pathinfo($this->tmpFile['name']);
|
2010-10-04 06:42:13 +02:00
|
|
|
|
2010-10-04 06:42:39 +02:00
|
|
|
// Special case for filenames without an extension
|
2010-10-04 06:42:13 +02:00
|
|
|
if(!isset($pathInfo['extension'])) {
|
2010-10-04 06:43:28 +02:00
|
|
|
return in_array('', $this->allowedExtensions, true);
|
2010-10-04 06:42:13 +02:00
|
|
|
} else {
|
|
|
|
return (!count($this->allowedExtensions) || in_array(strtolower($pathInfo['extension']), $this->allowedExtensions));
|
|
|
|
}
|
2010-05-25 05:42:52 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Run through the rules for this validator checking against
|
|
|
|
* the temporary file set by {@link setTmpFile()} to see if
|
|
|
|
* the file is deemed valid or not.
|
|
|
|
*
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function validate() {
|
|
|
|
// we don't validate for empty upload fields yet
|
|
|
|
if(!isset($this->tmpFile['name']) || empty($this->tmpFile['name'])) return true;
|
|
|
|
|
2010-11-30 06:13:09 +01:00
|
|
|
$isRunningTests = (class_exists('SapphireTest', false) && SapphireTest::is_running_test());
|
|
|
|
if(isset($this->tmpFile['tmp_name']) && !is_uploaded_file($this->tmpFile['tmp_name']) && !$isRunningTests) {
|
2010-05-25 05:42:52 +02:00
|
|
|
$this->errors[] = _t('File.NOVALIDUPLOAD', 'File is not a valid upload');
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$pathInfo = pathinfo($this->tmpFile['name']);
|
|
|
|
// filesize validation
|
|
|
|
if(!$this->isValidSize()) {
|
2010-10-04 06:44:03 +02:00
|
|
|
$ext = (isset($pathInfo['extension'])) ? $pathInfo['extension'] : '';
|
|
|
|
$arg = File::format_size($this->getAllowedMaxFileSize($ext));
|
2010-05-25 05:42:52 +02:00
|
|
|
$this->errors[] = sprintf(
|
|
|
|
_t(
|
|
|
|
'File.TOOLARGE',
|
|
|
|
'Filesize is too large, maximum %s allowed.',
|
|
|
|
PR_MEDIUM,
|
|
|
|
'Argument 1: Filesize (e.g. 1MB)'
|
|
|
|
),
|
2010-10-04 06:44:03 +02:00
|
|
|
$arg
|
2010-05-25 05:42:52 +02:00
|
|
|
);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// extension validation
|
|
|
|
if(!$this->isValidExtension()) {
|
|
|
|
$this->errors[] = sprintf(
|
|
|
|
_t(
|
|
|
|
'File.INVALIDEXTENSION',
|
|
|
|
'Extension is not allowed (valid: %s)',
|
|
|
|
PR_MEDIUM,
|
|
|
|
'Argument 1: Comma-separated list of valid extensions'
|
|
|
|
),
|
2010-10-15 05:21:04 +02:00
|
|
|
wordwrap(implode(', ', $this->allowedExtensions))
|
2010-05-25 05:42:52 +02:00
|
|
|
);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-02-27 22:14:02 +01:00
|
|
|
}
|