Differences Between: [Versions 310 and 400] [Versions 311 and 400] [Versions 39 and 400] [Versions 400 and 401] [Versions 400 and 402] [Versions 400 and 403]
1 <?php 2 // This file is part of Moodle - http://moodle.org/ 3 // 4 // Moodle is free software: you can redistribute it and/or modify 5 // it under the terms of the GNU General Public License as published by 6 // the Free Software Foundation, either version 3 of the License, or 7 // (at your option) any later version. 8 // 9 // Moodle is distributed in the hope that it will be useful, 10 // but WITHOUT ANY WARRANTY; without even the implied warranty of 11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 12 // GNU General Public License for more details. 13 // 14 // You should have received a copy of the GNU General Public License 15 // along with Moodle. If not, see <http://www.gnu.org/licenses/>. 16 17 /** 18 * Functions for file handling. 19 * 20 * @package core_files 21 * @copyright 1999 onwards Martin Dougiamas (http://dougiamas.com) 22 * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later 23 */ 24 25 defined('MOODLE_INTERNAL') || die(); 26 27 /** 28 * BYTESERVING_BOUNDARY - string unique string constant. 29 */ 30 define('BYTESERVING_BOUNDARY', 's1k2o3d4a5k6s7'); 31 32 33 /** 34 * Do not process file merging when working with draft area files. 35 */ 36 define('IGNORE_FILE_MERGE', -1); 37 38 /** 39 * Unlimited area size constant 40 */ 41 define('FILE_AREA_MAX_BYTES_UNLIMITED', -1); 42 43 /** 44 * Capacity of the draft area bucket when using the leaking bucket technique to limit the draft upload rate. 45 */ 46 define('DRAFT_AREA_BUCKET_CAPACITY', 50); 47 48 /** 49 * Leaking rate of the draft area bucket when using the leaking bucket technique to limit the draft upload rate. 50 */ 51 define('DRAFT_AREA_BUCKET_LEAK', 0.2); 52 53 require_once("$CFG->libdir/filestorage/file_exceptions.php"); 54 require_once("$CFG->libdir/filestorage/file_storage.php"); 55 require_once("$CFG->libdir/filestorage/zip_packer.php"); 56 require_once("$CFG->libdir/filebrowser/file_browser.php"); 57 58 /** 59 * Encodes file serving url 60 * 61 * @deprecated use moodle_url factory methods instead 62 * 63 * @todo MDL-31071 deprecate this function 64 * @global stdClass $CFG 65 * @param string $urlbase 66 * @param string $path /filearea/itemid/dir/dir/file.exe 67 * @param bool $forcedownload 68 * @param bool $https https url required 69 * @return string encoded file url 70 */ 71 function file_encode_url($urlbase, $path, $forcedownload=false, $https=false) { 72 global $CFG; 73 74 //TODO: deprecate this 75 76 if ($CFG->slasharguments) { 77 $parts = explode('/', $path); 78 $parts = array_map('rawurlencode', $parts); 79 $path = implode('/', $parts); 80 $return = $urlbase.$path; 81 if ($forcedownload) { 82 $return .= '?forcedownload=1'; 83 } 84 } else { 85 $path = rawurlencode($path); 86 $return = $urlbase.'?file='.$path; 87 if ($forcedownload) { 88 $return .= '&forcedownload=1'; 89 } 90 } 91 92 if ($https) { 93 $return = str_replace('http://', 'https://', $return); 94 } 95 96 return $return; 97 } 98 99 /** 100 * Detects if area contains subdirs, 101 * this is intended for file areas that are attached to content 102 * migrated from 1.x where subdirs were allowed everywhere. 103 * 104 * @param context $context 105 * @param string $component 106 * @param string $filearea 107 * @param string $itemid 108 * @return bool 109 */ 110 function file_area_contains_subdirs(context $context, $component, $filearea, $itemid) { 111 global $DB; 112 113 if (!isset($itemid)) { 114 // Not initialised yet. 115 return false; 116 } 117 118 // Detect if any directories are already present, this is necessary for content upgraded from 1.x. 119 $select = "contextid = :contextid AND component = :component AND filearea = :filearea AND itemid = :itemid AND filepath <> '/' AND filename = '.'"; 120 $params = array('contextid'=>$context->id, 'component'=>$component, 'filearea'=>$filearea, 'itemid'=>$itemid); 121 return $DB->record_exists_select('files', $select, $params); 122 } 123 124 /** 125 * Prepares 'editor' formslib element from data in database 126 * 127 * The passed $data record must contain field foobar, foobarformat and optionally foobartrust. This 128 * function then copies the embedded files into draft area (assigning itemids automatically), 129 * creates the form element foobar_editor and rewrites the URLs so the embedded images can be 130 * displayed. 131 * In your mform definition, you must have an 'editor' element called foobar_editor. Then you call 132 * your mform's set_data() supplying the object returned by this function. 133 * 134 * @category files 135 * @param stdClass $data database field that holds the html text with embedded media 136 * @param string $field the name of the database field that holds the html text with embedded media 137 * @param array $options editor options (like maxifiles, maxbytes etc.) 138 * @param stdClass $context context of the editor 139 * @param string $component 140 * @param string $filearea file area name 141 * @param int $itemid item id, required if item exists 142 * @return stdClass modified data object 143 */ 144 function file_prepare_standard_editor($data, $field, array $options, $context=null, $component=null, $filearea=null, $itemid=null) { 145 $options = (array)$options; 146 if (!isset($options['trusttext'])) { 147 $options['trusttext'] = false; 148 } 149 if (!isset($options['forcehttps'])) { 150 $options['forcehttps'] = false; 151 } 152 if (!isset($options['subdirs'])) { 153 $options['subdirs'] = false; 154 } 155 if (!isset($options['maxfiles'])) { 156 $options['maxfiles'] = 0; // no files by default 157 } 158 if (!isset($options['noclean'])) { 159 $options['noclean'] = false; 160 } 161 162 //sanity check for passed context. This function doesn't expect $option['context'] to be set 163 //But this function is called before creating editor hence, this is one of the best places to check 164 //if context is used properly. This check notify developer that they missed passing context to editor. 165 if (isset($context) && !isset($options['context'])) { 166 //if $context is not null then make sure $option['context'] is also set. 167 debugging('Context for editor is not set in editoroptions. Hence editor will not respect editor filters', DEBUG_DEVELOPER); 168 } else if (isset($options['context']) && isset($context)) { 169 //If both are passed then they should be equal. 170 if ($options['context']->id != $context->id) { 171 $exceptionmsg = 'Editor context ['.$options['context']->id.'] is not equal to passed context ['.$context->id.']'; 172 throw new coding_exception($exceptionmsg); 173 } 174 } 175 176 if (is_null($itemid) or is_null($context)) { 177 $contextid = null; 178 $itemid = null; 179 if (!isset($data)) { 180 $data = new stdClass(); 181 } 182 if (!isset($data->{$field})) { 183 $data->{$field} = ''; 184 } 185 if (!isset($data->{$field.'format'})) { 186 $data->{$field.'format'} = editors_get_preferred_format(); 187 } 188 if (!$options['noclean']) { 189 $data->{$field} = clean_text($data->{$field}, $data->{$field.'format'}); 190 } 191 192 } else { 193 if ($options['trusttext']) { 194 // noclean ignored if trusttext enabled 195 if (!isset($data->{$field.'trust'})) { 196 $data->{$field.'trust'} = 0; 197 } 198 $data = trusttext_pre_edit($data, $field, $context); 199 } else { 200 if (!$options['noclean']) { 201 $data->{$field} = clean_text($data->{$field}, $data->{$field.'format'}); 202 } 203 } 204 $contextid = $context->id; 205 } 206 207 if ($options['maxfiles'] != 0) { 208 $draftid_editor = file_get_submitted_draft_itemid($field); 209 $currenttext = file_prepare_draft_area($draftid_editor, $contextid, $component, $filearea, $itemid, $options, $data->{$field}); 210 $data->{$field.'_editor'} = array('text'=>$currenttext, 'format'=>$data->{$field.'format'}, 'itemid'=>$draftid_editor); 211 } else { 212 $data->{$field.'_editor'} = array('text'=>$data->{$field}, 'format'=>$data->{$field.'format'}, 'itemid'=>0); 213 } 214 215 return $data; 216 } 217 218 /** 219 * Prepares the content of the 'editor' form element with embedded media files to be saved in database 220 * 221 * This function moves files from draft area to the destination area and 222 * encodes URLs to the draft files so they can be safely saved into DB. The 223 * form has to contain the 'editor' element named foobar_editor, where 'foobar' 224 * is the name of the database field to hold the wysiwyg editor content. The 225 * editor data comes as an array with text, format and itemid properties. This 226 * function automatically adds $data properties foobar, foobarformat and 227 * foobartrust, where foobar has URL to embedded files encoded. 228 * 229 * @category files 230 * @param stdClass $data raw data submitted by the form 231 * @param string $field name of the database field containing the html with embedded media files 232 * @param array $options editor options (trusttext, subdirs, maxfiles, maxbytes etc.) 233 * @param stdClass $context context, required for existing data 234 * @param string $component file component 235 * @param string $filearea file area name 236 * @param int $itemid item id, required if item exists 237 * @return stdClass modified data object 238 */ 239 function file_postupdate_standard_editor($data, $field, array $options, $context, $component=null, $filearea=null, $itemid=null) { 240 $options = (array)$options; 241 if (!isset($options['trusttext'])) { 242 $options['trusttext'] = false; 243 } 244 if (!isset($options['forcehttps'])) { 245 $options['forcehttps'] = false; 246 } 247 if (!isset($options['subdirs'])) { 248 $options['subdirs'] = false; 249 } 250 if (!isset($options['maxfiles'])) { 251 $options['maxfiles'] = 0; // no files by default 252 } 253 if (!isset($options['maxbytes'])) { 254 $options['maxbytes'] = 0; // unlimited 255 } 256 if (!isset($options['removeorphaneddrafts'])) { 257 $options['removeorphaneddrafts'] = false; // Don't remove orphaned draft files by default. 258 } 259 260 if ($options['trusttext']) { 261 $data->{$field.'trust'} = trusttext_trusted($context); 262 } else { 263 $data->{$field.'trust'} = 0; 264 } 265 266 $editor = $data->{$field.'_editor'}; 267 268 if ($options['maxfiles'] == 0 or is_null($filearea) or is_null($itemid) or empty($editor['itemid'])) { 269 $data->{$field} = $editor['text']; 270 } else { 271 // Clean the user drafts area of any files not referenced in the editor text. 272 if ($options['removeorphaneddrafts']) { 273 file_remove_editor_orphaned_files($editor); 274 } 275 $data->{$field} = file_save_draft_area_files($editor['itemid'], $context->id, $component, $filearea, $itemid, $options, $editor['text'], $options['forcehttps']); 276 } 277 $data->{$field.'format'} = $editor['format']; 278 279 return $data; 280 } 281 282 /** 283 * Saves text and files modified by Editor formslib element 284 * 285 * @category files 286 * @param stdClass $data $database entry field 287 * @param string $field name of data field 288 * @param array $options various options 289 * @param stdClass $context context - must already exist 290 * @param string $component 291 * @param string $filearea file area name 292 * @param int $itemid must already exist, usually means data is in db 293 * @return stdClass modified data obejct 294 */ 295 function file_prepare_standard_filemanager($data, $field, array $options, $context=null, $component=null, $filearea=null, $itemid=null) { 296 $options = (array)$options; 297 if (!isset($options['subdirs'])) { 298 $options['subdirs'] = false; 299 } 300 if (is_null($itemid) or is_null($context)) { 301 $itemid = null; 302 $contextid = null; 303 } else { 304 $contextid = $context->id; 305 } 306 307 $draftid_editor = file_get_submitted_draft_itemid($field.'_filemanager'); 308 file_prepare_draft_area($draftid_editor, $contextid, $component, $filearea, $itemid, $options); 309 $data->{$field.'_filemanager'} = $draftid_editor; 310 311 return $data; 312 } 313 314 /** 315 * Saves files modified by File manager formslib element 316 * 317 * @todo MDL-31073 review this function 318 * @category files 319 * @param stdClass $data $database entry field 320 * @param string $field name of data field 321 * @param array $options various options 322 * @param stdClass $context context - must already exist 323 * @param string $component 324 * @param string $filearea file area name 325 * @param int $itemid must already exist, usually means data is in db 326 * @return stdClass modified data obejct 327 */ 328 function file_postupdate_standard_filemanager($data, $field, array $options, $context, $component, $filearea, $itemid) { 329 $options = (array)$options; 330 if (!isset($options['subdirs'])) { 331 $options['subdirs'] = false; 332 } 333 if (!isset($options['maxfiles'])) { 334 $options['maxfiles'] = -1; // unlimited 335 } 336 if (!isset($options['maxbytes'])) { 337 $options['maxbytes'] = 0; // unlimited 338 } 339 340 if (empty($data->{$field.'_filemanager'})) { 341 $data->$field = ''; 342 343 } else { 344 file_save_draft_area_files($data->{$field.'_filemanager'}, $context->id, $component, $filearea, $itemid, $options); 345 $fs = get_file_storage(); 346 347 if ($fs->get_area_files($context->id, $component, $filearea, $itemid)) { 348 $data->$field = '1'; // TODO: this is an ugly hack (skodak) 349 } else { 350 $data->$field = ''; 351 } 352 } 353 354 return $data; 355 } 356 357 /** 358 * Generate a draft itemid 359 * 360 * @category files 361 * @global moodle_database $DB 362 * @global stdClass $USER 363 * @return int a random but available draft itemid that can be used to create a new draft 364 * file area. 365 */ 366 function file_get_unused_draft_itemid() { 367 global $DB, $USER; 368 369 if (isguestuser() or !isloggedin()) { 370 // guests and not-logged-in users can not be allowed to upload anything!!!!!! 371 print_error('noguest'); 372 } 373 374 $contextid = context_user::instance($USER->id)->id; 375 376 $fs = get_file_storage(); 377 $draftitemid = rand(1, 999999999); 378 while ($files = $fs->get_area_files($contextid, 'user', 'draft', $draftitemid)) { 379 $draftitemid = rand(1, 999999999); 380 } 381 382 return $draftitemid; 383 } 384 385 /** 386 * Initialise a draft file area from a real one by copying the files. A draft 387 * area will be created if one does not already exist. Normally you should 388 * get $draftitemid by calling file_get_submitted_draft_itemid('elementname'); 389 * 390 * @category files 391 * @global stdClass $CFG 392 * @global stdClass $USER 393 * @param int $draftitemid the id of the draft area to use, or 0 to create a new one, in which case this parameter is updated. 394 * @param int $contextid This parameter and the next two identify the file area to copy files from. 395 * @param string $component 396 * @param string $filearea helps indentify the file area. 397 * @param int $itemid helps identify the file area. Can be null if there are no files yet. 398 * @param array $options text and file options ('subdirs'=>false, 'forcehttps'=>false) 399 * @param string $text some html content that needs to have embedded links rewritten to point to the draft area. 400 * @return string|null returns string if $text was passed in, the rewritten $text is returned. Otherwise NULL. 401 */ 402 function file_prepare_draft_area(&$draftitemid, $contextid, $component, $filearea, $itemid, array $options=null, $text=null) { 403 global $CFG, $USER; 404 405 $options = (array)$options; 406 if (!isset($options['subdirs'])) { 407 $options['subdirs'] = false; 408 } 409 if (!isset($options['forcehttps'])) { 410 $options['forcehttps'] = false; 411 } 412 413 $usercontext = context_user::instance($USER->id); 414 $fs = get_file_storage(); 415 416 if (empty($draftitemid)) { 417 // create a new area and copy existing files into 418 $draftitemid = file_get_unused_draft_itemid(); 419 $file_record = array('contextid'=>$usercontext->id, 'component'=>'user', 'filearea'=>'draft', 'itemid'=>$draftitemid); 420 if (!is_null($itemid) and $files = $fs->get_area_files($contextid, $component, $filearea, $itemid)) { 421 foreach ($files as $file) { 422 if ($file->is_directory() and $file->get_filepath() === '/') { 423 // we need a way to mark the age of each draft area, 424 // by not copying the root dir we force it to be created automatically with current timestamp 425 continue; 426 } 427 if (!$options['subdirs'] and ($file->is_directory() or $file->get_filepath() !== '/')) { 428 continue; 429 } 430 $draftfile = $fs->create_file_from_storedfile($file_record, $file); 431 // XXX: This is a hack for file manager (MDL-28666) 432 // File manager needs to know the original file information before copying 433 // to draft area, so we append these information in mdl_files.source field 434 // {@link file_storage::search_references()} 435 // {@link file_storage::search_references_count()} 436 $sourcefield = $file->get_source(); 437 $newsourcefield = new stdClass; 438 $newsourcefield->source = $sourcefield; 439 $original = new stdClass; 440 $original->contextid = $contextid; 441 $original->component = $component; 442 $original->filearea = $filearea; 443 $original->itemid = $itemid; 444 $original->filename = $file->get_filename(); 445 $original->filepath = $file->get_filepath(); 446 $newsourcefield->original = file_storage::pack_reference($original); 447 $draftfile->set_source(serialize($newsourcefield)); 448 // End of file manager hack 449 } 450 } 451 if (!is_null($text)) { 452 // at this point there should not be any draftfile links yet, 453 // because this is a new text from database that should still contain the @@pluginfile@@ links 454 // this happens when developers forget to post process the text 455 $text = str_replace("\"$CFG->wwwroot/draftfile.php", "\"$CFG->wwwroot/brokenfile.php#", $text); 456 } 457 } else { 458 // nothing to do 459 } 460 461 if (is_null($text)) { 462 return null; 463 } 464 465 // relink embedded files - editor can not handle @@PLUGINFILE@@ ! 466 return file_rewrite_pluginfile_urls($text, 'draftfile.php', $usercontext->id, 'user', 'draft', $draftitemid, $options); 467 } 468 469 /** 470 * Convert encoded URLs in $text from the @@PLUGINFILE@@/... form to an actual URL. 471 * Passing a new option reverse = true in the $options var will make the function to convert actual URLs in $text to encoded URLs 472 * in the @@PLUGINFILE@@ form. 473 * 474 * @param string $text The content that may contain ULRs in need of rewriting. 475 * @param string $file The script that should be used to serve these files. pluginfile.php, draftfile.php, etc. 476 * @param int $contextid This parameter and the next two identify the file area to use. 477 * @param string $component 478 * @param string $filearea helps identify the file area. 479 * @param int $itemid helps identify the file area. 480 * @param array $options 481 * bool $options.forcehttps Force the user of https 482 * bool $options.reverse Reverse the behaviour of the function 483 * mixed $options.includetoken Use a token for authentication. True for current user, int value for other user id. 484 * string The processed text. 485 */ 486 function file_rewrite_pluginfile_urls($text, $file, $contextid, $component, $filearea, $itemid, array $options=null) { 487 global $CFG, $USER; 488 489 $options = (array)$options; 490 if (!isset($options['forcehttps'])) { 491 $options['forcehttps'] = false; 492 } 493 494 $baseurl = "{$CFG->wwwroot}/{$file}"; 495 if (!empty($options['includetoken'])) { 496 $userid = $options['includetoken'] === true ? $USER->id : $options['includetoken']; 497 $token = get_user_key('core_files', $userid); 498 $finalfile = basename($file); 499 $tokenfile = "token{$finalfile}"; 500 $file = substr($file, 0, strlen($file) - strlen($finalfile)) . $tokenfile; 501 $baseurl = "{$CFG->wwwroot}/{$file}"; 502 503 if (!$CFG->slasharguments) { 504 $baseurl .= "?token={$token}&file="; 505 } else { 506 $baseurl .= "/{$token}"; 507 } 508 } 509 510 $baseurl .= "/{$contextid}/{$component}/{$filearea}/"; 511 512 if ($itemid !== null) { 513 $baseurl .= "$itemid/"; 514 } 515 516 if ($options['forcehttps']) { 517 $baseurl = str_replace('http://', 'https://', $baseurl); 518 } 519 520 if (!empty($options['reverse'])) { 521 return str_replace($baseurl, '@@PLUGINFILE@@/', $text); 522 } else { 523 return str_replace('@@PLUGINFILE@@/', $baseurl, $text); 524 } 525 } 526 527 /** 528 * Returns information about files in a draft area. 529 * 530 * @global stdClass $CFG 531 * @global stdClass $USER 532 * @param int $draftitemid the draft area item id. 533 * @param string $filepath path to the directory from which the information have to be retrieved. 534 * @return array with the following entries: 535 * 'filecount' => number of files in the draft area. 536 * 'filesize' => total size of the files in the draft area. 537 * 'foldercount' => number of folders in the draft area. 538 * 'filesize_without_references' => total size of the area excluding file references. 539 * (more information will be added as needed). 540 */ 541 function file_get_draft_area_info($draftitemid, $filepath = '/') { 542 global $USER; 543 544 $usercontext = context_user::instance($USER->id); 545 return file_get_file_area_info($usercontext->id, 'user', 'draft', $draftitemid, $filepath); 546 } 547 548 /** 549 * Returns information about files in an area. 550 * 551 * @param int $contextid context id 552 * @param string $component component 553 * @param string $filearea file area name 554 * @param int $itemid item id or all files if not specified 555 * @param string $filepath path to the directory from which the information have to be retrieved. 556 * @return array with the following entries: 557 * 'filecount' => number of files in the area. 558 * 'filesize' => total size of the files in the area. 559 * 'foldercount' => number of folders in the area. 560 * 'filesize_without_references' => total size of the area excluding file references. 561 * @since Moodle 3.4 562 */ 563 function file_get_file_area_info($contextid, $component, $filearea, $itemid = 0, $filepath = '/') { 564 565 $fs = get_file_storage(); 566 567 $results = array( 568 'filecount' => 0, 569 'foldercount' => 0, 570 'filesize' => 0, 571 'filesize_without_references' => 0 572 ); 573 574 $draftfiles = $fs->get_directory_files($contextid, $component, $filearea, $itemid, $filepath, true, true); 575 576 foreach ($draftfiles as $file) { 577 if ($file->is_directory()) { 578 $results['foldercount'] += 1; 579 } else { 580 $results['filecount'] += 1; 581 } 582 583 $filesize = $file->get_filesize(); 584 $results['filesize'] += $filesize; 585 if (!$file->is_external_file()) { 586 $results['filesize_without_references'] += $filesize; 587 } 588 } 589 590 return $results; 591 } 592 593 /** 594 * Returns whether a draft area has exceeded/will exceed its size limit. 595 * 596 * Please note that the unlimited value for $areamaxbytes is -1 {@link FILE_AREA_MAX_BYTES_UNLIMITED}, not 0. 597 * 598 * @param int $draftitemid the draft area item id. 599 * @param int $areamaxbytes the maximum size allowed in this draft area. 600 * @param int $newfilesize the size that would be added to the current area. 601 * @param bool $includereferences true to include the size of the references in the area size. 602 * @return bool true if the area will/has exceeded its limit. 603 * @since Moodle 2.4 604 */ 605 function file_is_draft_area_limit_reached($draftitemid, $areamaxbytes, $newfilesize = 0, $includereferences = false) { 606 if ($areamaxbytes != FILE_AREA_MAX_BYTES_UNLIMITED) { 607 $draftinfo = file_get_draft_area_info($draftitemid); 608 $areasize = $draftinfo['filesize_without_references']; 609 if ($includereferences) { 610 $areasize = $draftinfo['filesize']; 611 } 612 if ($areasize + $newfilesize > $areamaxbytes) { 613 return true; 614 } 615 } 616 return false; 617 } 618 619 /** 620 * Returns whether a user has reached their draft area upload rate. 621 * 622 * @param int $userid The user id 623 * @return bool 624 */ 625 function file_is_draft_areas_limit_reached(int $userid): bool { 626 global $CFG; 627 628 $capacity = $CFG->draft_area_bucket_capacity ?? DRAFT_AREA_BUCKET_CAPACITY; 629 $leak = $CFG->draft_area_bucket_leak ?? DRAFT_AREA_BUCKET_LEAK; 630 631 $since = time() - floor($capacity / $leak); // The items that were in the bucket before this time are already leaked by now. 632 // We are going to be a bit generous to the user when using the leaky bucket 633 // algorithm below. We are going to assume that the bucket is empty at $since. 634 // We have to do an assumption here unless we really want to get ALL user's draft 635 // items without any limit and put all of them in the leaking bucket. 636 // I decided to favour performance over accuracy here. 637 638 $fs = get_file_storage(); 639 $items = $fs->get_user_draft_items($userid, $since); 640 $items = array_reverse($items); // So that the items are sorted based on time in the ascending direction. 641 642 // We only need to store the time that each element in the bucket is going to leak. So $bucket is array of leaking times. 643 $bucket = []; 644 foreach ($items as $item) { 645 $now = $item->timemodified; 646 // First let's see if items can be dropped from the bucket as a result of leakage. 647 while (!empty($bucket) && ($now >= $bucket[0])) { 648 array_shift($bucket); 649 } 650 651 // Calculate the time that the new item we put into the bucket will be leaked from it, and store it into the bucket. 652 if ($bucket) { 653 $bucket[] = max($bucket[count($bucket) - 1], $now) + (1 / $leak); 654 } else { 655 $bucket[] = $now + (1 / $leak); 656 } 657 } 658 659 // Recalculate the bucket's content based on the leakage until now. 660 $now = time(); 661 while (!empty($bucket) && ($now >= $bucket[0])) { 662 array_shift($bucket); 663 } 664 665 return count($bucket) >= $capacity; 666 } 667 668 /** 669 * Get used space of files 670 * @global moodle_database $DB 671 * @global stdClass $USER 672 * @return int total bytes 673 */ 674 function file_get_user_used_space() { 675 global $DB, $USER; 676 677 $usercontext = context_user::instance($USER->id); 678 $sql = "SELECT SUM(files1.filesize) AS totalbytes FROM {files} files1 679 JOIN (SELECT contenthash, filename, MAX(id) AS id 680 FROM {files} 681 WHERE contextid = ? AND component = ? AND filearea != ? 682 GROUP BY contenthash, filename) files2 ON files1.id = files2.id"; 683 $params = array('contextid'=>$usercontext->id, 'component'=>'user', 'filearea'=>'draft'); 684 $record = $DB->get_record_sql($sql, $params); 685 return (int)$record->totalbytes; 686 } 687 688 /** 689 * Convert any string to a valid filepath 690 * @todo review this function 691 * @param string $str 692 * @return string path 693 */ 694 function file_correct_filepath($str) { //TODO: what is this? (skodak) - No idea (Fred) 695 if ($str == '/' or empty($str)) { 696 return '/'; 697 } else { 698 return '/'.trim($str, '/').'/'; 699 } 700 } 701 702 /** 703 * Generate a folder tree of draft area of current USER recursively 704 * 705 * @todo MDL-31073 use normal return value instead, this does not fit the rest of api here (skodak) 706 * @param int $draftitemid 707 * @param string $filepath 708 * @param mixed $data 709 */ 710 function file_get_drafarea_folders($draftitemid, $filepath, &$data) { 711 global $USER, $OUTPUT, $CFG; 712 $data->children = array(); 713 $context = context_user::instance($USER->id); 714 $fs = get_file_storage(); 715 if ($files = $fs->get_directory_files($context->id, 'user', 'draft', $draftitemid, $filepath, false)) { 716 foreach ($files as $file) { 717 if ($file->is_directory()) { 718 $item = new stdClass(); 719 $item->sortorder = $file->get_sortorder(); 720 $item->filepath = $file->get_filepath(); 721 722 $foldername = explode('/', trim($item->filepath, '/')); 723 $item->fullname = trim(array_pop($foldername), '/'); 724 725 $item->id = uniqid(); 726 file_get_drafarea_folders($draftitemid, $item->filepath, $item); 727 $data->children[] = $item; 728 } else { 729 continue; 730 } 731 } 732 } 733 } 734 735 /** 736 * Listing all files (including folders) in current path (draft area) 737 * used by file manager 738 * @param int $draftitemid 739 * @param string $filepath 740 * @return stdClass 741 */ 742 function file_get_drafarea_files($draftitemid, $filepath = '/') { 743 global $USER, $OUTPUT, $CFG; 744 745 $context = context_user::instance($USER->id); 746 $fs = get_file_storage(); 747 748 $data = new stdClass(); 749 $data->path = array(); 750 $data->path[] = array('name'=>get_string('files'), 'path'=>'/'); 751 752 // will be used to build breadcrumb 753 $trail = '/'; 754 if ($filepath !== '/') { 755 $filepath = file_correct_filepath($filepath); 756 $parts = explode('/', $filepath); 757 foreach ($parts as $part) { 758 if ($part != '' && $part != null) { 759 $trail .= ($part.'/'); 760 $data->path[] = array('name'=>$part, 'path'=>$trail); 761 } 762 } 763 } 764 765 $list = array(); 766 $maxlength = 12; 767 if ($files = $fs->get_directory_files($context->id, 'user', 'draft', $draftitemid, $filepath, false)) { 768 foreach ($files as $file) { 769 $item = new stdClass(); 770 $item->filename = $file->get_filename(); 771 $item->filepath = $file->get_filepath(); 772 $item->fullname = trim($item->filename, '/'); 773 $filesize = $file->get_filesize(); 774 $item->size = $filesize ? $filesize : null; 775 $item->filesize = $filesize ? display_size($filesize) : ''; 776 777 $item->sortorder = $file->get_sortorder(); 778 $item->author = $file->get_author(); 779 $item->license = $file->get_license(); 780 $item->datemodified = $file->get_timemodified(); 781 $item->datecreated = $file->get_timecreated(); 782 $item->isref = $file->is_external_file(); 783 if ($item->isref && $file->get_status() == 666) { 784 $item->originalmissing = true; 785 } 786 // find the file this draft file was created from and count all references in local 787 // system pointing to that file 788 $source = @unserialize($file->get_source()); 789 if (isset($source->original)) { 790 $item->refcount = $fs->search_references_count($source->original); 791 } 792 793 if ($file->is_directory()) { 794 $item->filesize = 0; 795 $item->icon = $OUTPUT->image_url(file_folder_icon(24))->out(false); 796 $item->type = 'folder'; 797 $foldername = explode('/', trim($item->filepath, '/')); 798 $item->fullname = trim(array_pop($foldername), '/'); 799 $item->thumbnail = $OUTPUT->image_url(file_folder_icon(90))->out(false); 800 } else { 801 // do NOT use file browser here! 802 $item->mimetype = get_mimetype_description($file); 803 if (file_extension_in_typegroup($file->get_filename(), 'archive')) { 804 $item->type = 'zip'; 805 } else { 806 $item->type = 'file'; 807 } 808 $itemurl = moodle_url::make_draftfile_url($draftitemid, $item->filepath, $item->filename); 809 $item->url = $itemurl->out(); 810 $item->icon = $OUTPUT->image_url(file_file_icon($file, 24))->out(false); 811 $item->thumbnail = $OUTPUT->image_url(file_file_icon($file, 90))->out(false); 812 813 // The call to $file->get_imageinfo() fails with an exception if the file can't be read on the file system. 814 // We still want to add such files to the list, so the owner can view and delete them if needed. So, we only call 815 // get_imageinfo() on files that can be read, and we also spoof the file status based on whether it was found. 816 // We'll use the same status types used by stored_file->get_status(), where 0 = OK. 1 = problem, as these will be 817 // used by the widget to display a warning about the problem files. 818 // The value of stored_file->get_status(), and the file record are unaffected by this. It's only superficially set. 819 $item->status = $fs->get_file_system()->is_file_readable_remotely_by_storedfile($file) ? 0 : 1; 820 if ($item->status == 0) { 821 if ($imageinfo = $file->get_imageinfo()) { 822 $item->realthumbnail = $itemurl->out(false, array('preview' => 'thumb', 823 'oid' => $file->get_timemodified())); 824 $item->realicon = $itemurl->out(false, array('preview' => 'tinyicon', 'oid' => $file->get_timemodified())); 825 $item->image_width = $imageinfo['width']; 826 $item->image_height = $imageinfo['height']; 827 } 828 } 829 } 830 $list[] = $item; 831 } 832 } 833 $data->itemid = $draftitemid; 834 $data->list = $list; 835 return $data; 836 } 837 838 /** 839 * Returns all of the files in the draftarea. 840 * 841 * @param int $draftitemid The draft item ID 842 * @param string $filepath path for the uploaded files. 843 * @return array An array of files associated with this draft item id. 844 */ 845 function file_get_all_files_in_draftarea(int $draftitemid, string $filepath = '/') : array { 846 $files = []; 847 $draftfiles = file_get_drafarea_files($draftitemid, $filepath); 848 file_get_drafarea_folders($draftitemid, $filepath, $draftfiles); 849 850 if (!empty($draftfiles)) { 851 foreach ($draftfiles->list as $draftfile) { 852 if ($draftfile->type == 'file') { 853 $files[] = $draftfile; 854 } 855 } 856 857 if (isset($draftfiles->children)) { 858 foreach ($draftfiles->children as $draftfile) { 859 $files = array_merge($files, file_get_all_files_in_draftarea($draftitemid, $draftfile->filepath)); 860 } 861 } 862 } 863 return $files; 864 } 865 866 /** 867 * Returns draft area itemid for a given element. 868 * 869 * @category files 870 * @param string $elname name of formlib editor element, or a hidden form field that stores the draft area item id, etc. 871 * @return int the itemid, or 0 if there is not one yet. 872 */ 873 function file_get_submitted_draft_itemid($elname) { 874 // this is a nasty hack, ideally all new elements should use arrays here or there should be a new parameter 875 if (!isset($_REQUEST[$elname])) { 876 return 0; 877 } 878 if (is_array($_REQUEST[$elname])) { 879 $param = optional_param_array($elname, 0, PARAM_INT); 880 if (!empty($param['itemid'])) { 881 $param = $param['itemid']; 882 } else { 883 debugging('Missing itemid, maybe caused by unset maxfiles option', DEBUG_DEVELOPER); 884 return false; 885 } 886 887 } else { 888 $param = optional_param($elname, 0, PARAM_INT); 889 } 890 891 if ($param) { 892 require_sesskey(); 893 } 894 895 return $param; 896 } 897 898 /** 899 * Restore the original source field from draft files 900 * 901 * Do not use this function because it makes field files.source inconsistent 902 * for draft area files. This function will be deprecated in 2.6 903 * 904 * @param stored_file $storedfile This only works with draft files 905 * @return stored_file 906 */ 907 function file_restore_source_field_from_draft_file($storedfile) { 908 $source = @unserialize($storedfile->get_source()); 909 if (!empty($source)) { 910 if (is_object($source)) { 911 $restoredsource = $source->source; 912 $storedfile->set_source($restoredsource); 913 } else { 914 throw new moodle_exception('invalidsourcefield', 'error'); 915 } 916 } 917 return $storedfile; 918 } 919 920 /** 921 * Removes those files from the user drafts filearea which are not referenced in the editor text. 922 * 923 * @param stdClass $editor The online text editor element from the submitted form data. 924 */ 925 function file_remove_editor_orphaned_files($editor) { 926 global $CFG, $USER; 927 928 // Find those draft files included in the text, and generate their hashes. 929 $context = context_user::instance($USER->id); 930 $baseurl = $CFG->wwwroot . '/draftfile.php/' . $context->id . '/user/draft/' . $editor['itemid'] . '/'; 931 $pattern = "/" . preg_quote($baseurl, '/') . "(.+?)[\?\"'<>\s:\\\\]/"; 932 preg_match_all($pattern, $editor['text'], $matches); 933 $usedfilehashes = []; 934 foreach ($matches[1] as $matchedfilename) { 935 $matchedfilename = urldecode($matchedfilename); 936 $usedfilehashes[] = \file_storage::get_pathname_hash($context->id, 'user', 'draft', $editor['itemid'], '/', 937 $matchedfilename); 938 } 939 940 // Now, compare the hashes of all draft files, and remove those which don't match used files. 941 $fs = get_file_storage(); 942 $files = $fs->get_area_files($context->id, 'user', 'draft', $editor['itemid'], 'id', false); 943 foreach ($files as $file) { 944 $tmphash = $file->get_pathnamehash(); 945 if (!in_array($tmphash, $usedfilehashes)) { 946 $file->delete(); 947 } 948 } 949 } 950 951 /** 952 * Finds all draft areas used in a textarea and copies the files into the primary textarea. If a user copies and pastes 953 * content from another draft area it's possible for a single textarea to reference multiple draft areas. 954 * 955 * @category files 956 * @param int $draftitemid the id of the primary draft area. 957 * When set to -1 (probably, by a WebService) it won't process file merging, keeping the original state of the file area. 958 * @param int $usercontextid the user's context id. 959 * @param string $text some html content that needs to have files copied to the correct draft area. 960 * @param bool $forcehttps force https urls. 961 * 962 * @return string $text html content modified with new draft links 963 */ 964 function file_merge_draft_areas($draftitemid, $usercontextid, $text, $forcehttps = false) { 965 if (is_null($text)) { 966 return null; 967 } 968 969 // Do not merge files, leave it as it was. 970 if ($draftitemid === IGNORE_FILE_MERGE) { 971 return null; 972 } 973 974 $urls = extract_draft_file_urls_from_text($text, $forcehttps, $usercontextid, 'user', 'draft'); 975 976 // No draft areas to rewrite. 977 if (empty($urls)) { 978 return $text; 979 } 980 981 foreach ($urls as $url) { 982 // Do not process the "home" draft area. 983 if ($url['itemid'] == $draftitemid) { 984 continue; 985 } 986 987 // Decode the filename. 988 $filename = urldecode($url['filename']); 989 990 // Copy the file. 991 file_copy_file_to_file_area($url, $filename, $draftitemid); 992 993 // Rewrite draft area. 994 $text = file_replace_file_area_in_text($url, $draftitemid, $text, $forcehttps); 995 } 996 return $text; 997 } 998 999 /** 1000 * Rewrites a file area in arbitrary text. 1001 * 1002 * @param array $file General information about the file. 1003 * @param int $newid The new file area itemid. 1004 * @param string $text The text to rewrite. 1005 * @param bool $forcehttps force https urls. 1006 * @return string The rewritten text. 1007 */ 1008 function file_replace_file_area_in_text($file, $newid, $text, $forcehttps = false) { 1009 global $CFG; 1010 1011 $wwwroot = $CFG->wwwroot; 1012 if ($forcehttps) { 1013 $wwwroot = str_replace('http://', 'https://', $wwwroot); 1014 } 1015 1016 $search = [ 1017 $wwwroot, 1018 $file['urlbase'], 1019 $file['contextid'], 1020 $file['component'], 1021 $file['filearea'], 1022 $file['itemid'], 1023 $file['filename'] 1024 ]; 1025 $replace = [ 1026 $wwwroot, 1027 $file['urlbase'], 1028 $file['contextid'], 1029 $file['component'], 1030 $file['filearea'], 1031 $newid, 1032 $file['filename'] 1033 ]; 1034 1035 $text = str_ireplace( implode('/', $search), implode('/', $replace), $text); 1036 return $text; 1037 } 1038 1039 /** 1040 * Copies a file from one file area to another. 1041 * 1042 * @param array $file Information about the file to be copied. 1043 * @param string $filename The filename. 1044 * @param int $itemid The new file area. 1045 */ 1046 function file_copy_file_to_file_area($file, $filename, $itemid) { 1047 $fs = get_file_storage(); 1048 1049 // Load the current file in the old draft area. 1050 $fileinfo = array( 1051 'component' => $file['component'], 1052 'filearea' => $file['filearea'], 1053 'itemid' => $file['itemid'], 1054 'contextid' => $file['contextid'], 1055 'filepath' => '/', 1056 'filename' => $filename 1057 ); 1058 $oldfile = $fs->get_file($fileinfo['contextid'], $fileinfo['component'], $fileinfo['filearea'], 1059 $fileinfo['itemid'], $fileinfo['filepath'], $fileinfo['filename']); 1060 $newfileinfo = array( 1061 'component' => $file['component'], 1062 'filearea' => $file['filearea'], 1063 'itemid' => $itemid, 1064 'contextid' => $file['contextid'], 1065 'filepath' => '/', 1066 'filename' => $filename 1067 ); 1068 1069 $newcontextid = $newfileinfo['contextid']; 1070 $newcomponent = $newfileinfo['component']; 1071 $newfilearea = $newfileinfo['filearea']; 1072 $newitemid = $newfileinfo['itemid']; 1073 $newfilepath = $newfileinfo['filepath']; 1074 $newfilename = $newfileinfo['filename']; 1075 1076 // Check if the file exists. 1077 if (!$fs->file_exists($newcontextid, $newcomponent, $newfilearea, $newitemid, $newfilepath, $newfilename)) { 1078 $fs->create_file_from_storedfile($newfileinfo, $oldfile); 1079 } 1080 } 1081 1082 /** 1083 * Saves files from a draft file area to a real one (merging the list of files). 1084 * Can rewrite URLs in some content at the same time if desired. 1085 * 1086 * @category files 1087 * @global stdClass $USER 1088 * @param int $draftitemid the id of the draft area to use. Normally obtained 1089 * from file_get_submitted_draft_itemid('elementname') or similar. 1090 * When set to -1 (probably, by a WebService) it won't process file merging, keeping the original state of the file area. 1091 * @param int $contextid This parameter and the next two identify the file area to save to. 1092 * @param string $component 1093 * @param string $filearea indentifies the file area. 1094 * @param int $itemid helps identifies the file area. 1095 * @param array $options area options (subdirs=>false, maxfiles=-1, maxbytes=0) 1096 * @param string $text some html content that needs to have embedded links rewritten 1097 * to the @@PLUGINFILE@@ form for saving in the database. 1098 * @param bool $forcehttps force https urls. 1099 * @return string|null if $text was passed in, the rewritten $text is returned. Otherwise NULL. 1100 */ 1101 function file_save_draft_area_files($draftitemid, $contextid, $component, $filearea, $itemid, array $options=null, $text=null, $forcehttps=false) { 1102 global $USER; 1103 1104 // Do not merge files, leave it as it was. 1105 if ($draftitemid === IGNORE_FILE_MERGE) { 1106 // Safely return $text, no need to rewrite pluginfile because this is mostly comming from an external client like the app. 1107 return $text; 1108 } 1109 1110 if ($itemid === false) { 1111 // Catch a potentially dangerous coding error. 1112 throw new coding_exception('file_save_draft_area_files was called with $itemid false. ' . 1113 "This suggests a bug, because it would wipe all ($contextid, $component, $filearea) files."); 1114 } 1115 1116 $usercontext = context_user::instance($USER->id); 1117 $fs = get_file_storage(); 1118 1119 $options = (array)$options; 1120 if (!isset($options['subdirs'])) { 1121 $options['subdirs'] = false; 1122 } 1123 if (!isset($options['maxfiles'])) { 1124 $options['maxfiles'] = -1; // unlimited 1125 } 1126 if (!isset($options['maxbytes']) || $options['maxbytes'] == USER_CAN_IGNORE_FILE_SIZE_LIMITS) { 1127 $options['maxbytes'] = 0; // unlimited 1128 } 1129 if (!isset($options['areamaxbytes'])) { 1130 $options['areamaxbytes'] = FILE_AREA_MAX_BYTES_UNLIMITED; // Unlimited. 1131 } 1132 $allowreferences = true; 1133 if (isset($options['return_types']) && !($options['return_types'] & (FILE_REFERENCE | FILE_CONTROLLED_LINK))) { 1134 // we assume that if $options['return_types'] is NOT specified, we DO allow references. 1135 // this is not exactly right. BUT there are many places in code where filemanager options 1136 // are not passed to file_save_draft_area_files() 1137 $allowreferences = false; 1138 } 1139 1140 // Check if the user has copy-pasted from other draft areas. Those files will be located in different draft 1141 // areas and need to be copied into the current draft area. 1142 $text = file_merge_draft_areas($draftitemid, $usercontext->id, $text, $forcehttps); 1143 1144 // Check if the draft area has exceeded the authorised limit. This should never happen as validation 1145 // should have taken place before, unless the user is doing something nauthly. If so, let's just not save 1146 // anything at all in the next area. 1147 if (file_is_draft_area_limit_reached($draftitemid, $options['areamaxbytes'])) { 1148 return null; 1149 } 1150 1151 $draftfiles = $fs->get_area_files($usercontext->id, 'user', 'draft', $draftitemid, 'id'); 1152 $oldfiles = $fs->get_area_files($contextid, $component, $filearea, $itemid, 'id'); 1153 1154 // One file in filearea means it is empty (it has only top-level directory '.'). 1155 if (count($draftfiles) > 1 || count($oldfiles) > 1) { 1156 // we have to merge old and new files - we want to keep file ids for files that were not changed 1157 // we change time modified for all new and changed files, we keep time created as is 1158 1159 $newhashes = array(); 1160 $filecount = 0; 1161 $context = context::instance_by_id($contextid, MUST_EXIST); 1162 foreach ($draftfiles as $file) { 1163 if (!$options['subdirs'] && $file->get_filepath() !== '/') { 1164 continue; 1165 } 1166 if (!$allowreferences && $file->is_external_file()) { 1167 continue; 1168 } 1169 if (!$file->is_directory()) { 1170 // Check to see if this file was uploaded by someone who can ignore the file size limits. 1171 $fileusermaxbytes = get_user_max_upload_file_size($context, $options['maxbytes'], 0, 0, $file->get_userid()); 1172 if ($fileusermaxbytes != USER_CAN_IGNORE_FILE_SIZE_LIMITS 1173 && ($options['maxbytes'] and $options['maxbytes'] < $file->get_filesize())) { 1174 // Oversized file. 1175 continue; 1176 } 1177 if ($options['maxfiles'] != -1 and $options['maxfiles'] <= $filecount) { 1178 // more files - should not get here at all 1179 continue; 1180 } 1181 $filecount++; 1182 } 1183 $newhash = $fs->get_pathname_hash($contextid, $component, $filearea, $itemid, $file->get_filepath(), $file->get_filename()); 1184 $newhashes[$newhash] = $file; 1185 } 1186 1187 // Loop through oldfiles and decide which we need to delete and which to update. 1188 // After this cycle the array $newhashes will only contain the files that need to be added. 1189 foreach ($oldfiles as $oldfile) { 1190 $oldhash = $oldfile->get_pathnamehash(); 1191 if (!isset($newhashes[$oldhash])) { 1192 // delete files not needed any more - deleted by user 1193 $oldfile->delete(); 1194 continue; 1195 } 1196 1197 $newfile = $newhashes[$oldhash]; 1198 // Now we know that we have $oldfile and $newfile for the same path. 1199 // Let's check if we can update this file or we need to delete and create. 1200 if ($newfile->is_directory()) { 1201 // Directories are always ok to just update. 1202 } else if (($source = @unserialize($newfile->get_source())) && isset($source->original)) { 1203 // File has the 'original' - we need to update the file (it may even have not been changed at all). 1204 $original = file_storage::unpack_reference($source->original); 1205 if ($original['filename'] !== $oldfile->get_filename() || $original['filepath'] !== $oldfile->get_filepath()) { 1206 // Very odd, original points to another file. Delete and create file. 1207 $oldfile->delete(); 1208 continue; 1209 } 1210 } else { 1211 // The same file name but absence of 'original' means that file was deteled and uploaded again. 1212 // By deleting and creating new file we properly manage all existing references. 1213 $oldfile->delete(); 1214 continue; 1215 } 1216 1217 // status changed, we delete old file, and create a new one 1218 if ($oldfile->get_status() != $newfile->get_status()) { 1219 // file was changed, use updated with new timemodified data 1220 $oldfile->delete(); 1221 // This file will be added later 1222 continue; 1223 } 1224 1225 // Updated author 1226 if ($oldfile->get_author() != $newfile->get_author()) { 1227 $oldfile->set_author($newfile->get_author()); 1228 } 1229 // Updated license 1230 if ($oldfile->get_license() != $newfile->get_license()) { 1231 $oldfile->set_license($newfile->get_license()); 1232 } 1233 1234 // Updated file source 1235 // Field files.source for draftarea files contains serialised object with source and original information. 1236 // We only store the source part of it for non-draft file area. 1237 $newsource = $newfile->get_source(); 1238 if ($source = @unserialize($newfile->get_source())) { 1239 $newsource = $source->source; 1240 } 1241 if ($oldfile->get_source() !== $newsource) { 1242 $oldfile->set_source($newsource); 1243 } 1244 1245 // Updated sort order 1246 if ($oldfile->get_sortorder() != $newfile->get_sortorder()) { 1247 $oldfile->set_sortorder($newfile->get_sortorder()); 1248 } 1249 1250 // Update file timemodified 1251 if ($oldfile->get_timemodified() != $newfile->get_timemodified()) { 1252 $oldfile->set_timemodified($newfile->get_timemodified()); 1253 } 1254 1255 // Replaced file content 1256 if (!$oldfile->is_directory() && 1257 ($oldfile->get_contenthash() != $newfile->get_contenthash() || 1258 $oldfile->get_filesize() != $newfile->get_filesize() || 1259 $oldfile->get_referencefileid() != $newfile->get_referencefileid() || 1260 $oldfile->get_userid() != $newfile->get_userid())) { 1261 $oldfile->replace_file_with($newfile); 1262 } 1263 1264 // unchanged file or directory - we keep it as is 1265 unset($newhashes[$oldhash]); 1266 } 1267 1268 // Add fresh file or the file which has changed status 1269 // the size and subdirectory tests are extra safety only, the UI should prevent it 1270 foreach ($newhashes as $file) { 1271 $file_record = array('contextid'=>$contextid, 'component'=>$component, 'filearea'=>$filearea, 'itemid'=>$itemid, 'timemodified'=>time()); 1272 if ($source = @unserialize($file->get_source())) { 1273 // Field files.source for draftarea files contains serialised object with source and original information. 1274 // We only store the source part of it for non-draft file area. 1275 $file_record['source'] = $source->source; 1276 } 1277 1278 if ($file->is_external_file()) { 1279 $repoid = $file->get_repository_id(); 1280 if (!empty($repoid)) { 1281 $context = context::instance_by_id($contextid, MUST_EXIST); 1282 $repo = repository::get_repository_by_id($repoid, $context); 1283 if (!empty($options)) { 1284 $repo->options = $options; 1285 } 1286 $file_record['repositoryid'] = $repoid; 1287 // This hook gives the repo a place to do some house cleaning, and update the $reference before it's saved 1288 // to the file store. E.g. transfer ownership of the file to a system account etc. 1289 $reference = $repo->reference_file_selected($file->get_reference(), $context, $component, $filearea, $itemid); 1290 1291 $file_record['reference'] = $reference; 1292 } 1293 } 1294 1295 $fs->create_file_from_storedfile($file_record, $file); 1296 } 1297 } 1298 1299 // note: do not purge the draft area - we clean up areas later in cron, 1300 // the reason is that user might press submit twice and they would loose the files, 1301 // also sometimes we might want to use hacks that save files into two different areas 1302 1303 if (is_null($text)) { 1304 return null; 1305 } else { 1306 return file_rewrite_urls_to_pluginfile($text, $draftitemid, $forcehttps); 1307 } 1308 } 1309 1310 /** 1311 * Convert the draft file area URLs in some content to @@PLUGINFILE@@ tokens 1312 * ready to be saved in the database. Normally, this is done automatically by 1313 * {@link file_save_draft_area_files()}. 1314 * 1315 * @category files 1316 * @param string $text the content to process. 1317 * @param int $draftitemid the draft file area the content was using. 1318 * @param bool $forcehttps whether the content contains https URLs. Default false. 1319 * @return string the processed content. 1320 */ 1321 function file_rewrite_urls_to_pluginfile($text, $draftitemid, $forcehttps = false) { 1322 global $CFG, $USER; 1323 1324 $usercontext = context_user::instance($USER->id); 1325 1326 $wwwroot = $CFG->wwwroot; 1327 if ($forcehttps) { 1328 $wwwroot = str_replace('http://', 'https://', $wwwroot); 1329 } 1330 1331 // relink embedded files if text submitted - no absolute links allowed in database! 1332 $text = str_ireplace("$wwwroot/draftfile.php/$usercontext->id/user/draft/$draftitemid/", '@@PLUGINFILE@@/', $text); 1333 1334 if (strpos($text, 'draftfile.php?file=') !== false) { 1335 $matches = array(); 1336 preg_match_all("!$wwwroot/draftfile.php\?file=%2F{$usercontext->id}%2Fuser%2Fdraft%2F{$draftitemid}%2F[^'\",&<>|`\s:\\\\]+!iu", $text, $matches); 1337 if ($matches) { 1338 foreach ($matches[0] as $match) { 1339 $replace = str_ireplace('%2F', '/', $match); 1340 $text = str_replace($match, $replace, $text); 1341 } 1342 } 1343 $text = str_ireplace("$wwwroot/draftfile.php?file=/$usercontext->id/user/draft/$draftitemid/", '@@PLUGINFILE@@/', $text); 1344 } 1345 1346 return $text; 1347 } 1348 1349 /** 1350 * Set file sort order 1351 * 1352 * @global moodle_database $DB 1353 * @param int $contextid the context id 1354 * @param string $component file component 1355 * @param string $filearea file area. 1356 * @param int $itemid itemid. 1357 * @param string $filepath file path. 1358 * @param string $filename file name. 1359 * @param int $sortorder the sort order of file. 1360 * @return bool 1361 */ 1362 function file_set_sortorder($contextid, $component, $filearea, $itemid, $filepath, $filename, $sortorder) { 1363 global $DB; 1364 $conditions = array('contextid'=>$contextid, 'component'=>$component, 'filearea'=>$filearea, 'itemid'=>$itemid, 'filepath'=>$filepath, 'filename'=>$filename); 1365 if ($file_record = $DB->get_record('files', $conditions)) { 1366 $sortorder = (int)$sortorder; 1367 $file_record->sortorder = $sortorder; 1368 $DB->update_record('files', $file_record); 1369 return true; 1370 } 1371 return false; 1372 } 1373 1374 /** 1375 * reset file sort order number to 0 1376 * @global moodle_database $DB 1377 * @param int $contextid the context id 1378 * @param string $component 1379 * @param string $filearea file area. 1380 * @param int|bool $itemid itemid. 1381 * @return bool 1382 */ 1383 function file_reset_sortorder($contextid, $component, $filearea, $itemid=false) { 1384 global $DB; 1385 1386 $conditions = array('contextid'=>$contextid, 'component'=>$component, 'filearea'=>$filearea); 1387 if ($itemid !== false) { 1388 $conditions['itemid'] = $itemid; 1389 } 1390 1391 $file_records = $DB->get_records('files', $conditions); 1392 foreach ($file_records as $file_record) { 1393 $file_record->sortorder = 0; 1394 $DB->update_record('files', $file_record); 1395 } 1396 return true; 1397 } 1398 1399 /** 1400 * Returns description of upload error 1401 * 1402 * @param int $errorcode found in $_FILES['filename.ext']['error'] 1403 * @return string error description string, '' if ok 1404 */ 1405 function file_get_upload_error($errorcode) { 1406 1407 switch ($errorcode) { 1408 case 0: // UPLOAD_ERR_OK - no error 1409 $errmessage = ''; 1410 break; 1411 1412 case 1: // UPLOAD_ERR_INI_SIZE 1413 $errmessage = get_string('uploadserverlimit'); 1414 break; 1415 1416 case 2: // UPLOAD_ERR_FORM_SIZE 1417 $errmessage = get_string('uploadformlimit'); 1418 break; 1419 1420 case 3: // UPLOAD_ERR_PARTIAL 1421 $errmessage = get_string('uploadpartialfile'); 1422 break; 1423 1424 case 4: // UPLOAD_ERR_NO_FILE 1425 $errmessage = get_string('uploadnofilefound'); 1426 break; 1427 1428 // Note: there is no error with a value of 5 1429 1430 case 6: // UPLOAD_ERR_NO_TMP_DIR 1431 $errmessage = get_string('uploadnotempdir'); 1432 break; 1433 1434 case 7: // UPLOAD_ERR_CANT_WRITE 1435 $errmessage = get_string('uploadcantwrite'); 1436 break; 1437 1438 case 8: // UPLOAD_ERR_EXTENSION 1439 $errmessage = get_string('uploadextension'); 1440 break; 1441 1442 default: 1443 $errmessage = get_string('uploadproblem'); 1444 } 1445 1446 return $errmessage; 1447 } 1448 1449 /** 1450 * Recursive function formating an array in POST parameter 1451 * @param array $arraydata - the array that we are going to format and add into &$data array 1452 * @param string $currentdata - a row of the final postdata array at instant T 1453 * when finish, it's assign to $data under this format: name[keyname][][]...[]='value' 1454 * @param array $data - the final data array containing all POST parameters : 1 row = 1 parameter 1455 */ 1456 function format_array_postdata_for_curlcall($arraydata, $currentdata, &$data) { 1457 foreach ($arraydata as $k=>$v) { 1458 $newcurrentdata = $currentdata; 1459 if (is_array($v)) { //the value is an array, call the function recursively 1460 $newcurrentdata = $newcurrentdata.'['.urlencode($k).']'; 1461 format_array_postdata_for_curlcall($v, $newcurrentdata, $data); 1462 } else { //add the POST parameter to the $data array 1463 $data[] = $newcurrentdata.'['.urlencode($k).']='.urlencode($v); 1464 } 1465 } 1466 } 1467 1468 /** 1469 * Transform a PHP array into POST parameter 1470 * (see the recursive function format_array_postdata_for_curlcall) 1471 * @param array $postdata 1472 * @return array containing all POST parameters (1 row = 1 POST parameter) 1473 */ 1474 function format_postdata_for_curlcall($postdata) { 1475 $data = array(); 1476 foreach ($postdata as $k=>$v) { 1477 if (is_array($v)) { 1478 $currentdata = urlencode($k); 1479 format_array_postdata_for_curlcall($v, $currentdata, $data); 1480 } else { 1481 $data[] = urlencode($k).'='.urlencode($v); 1482 } 1483 } 1484 $convertedpostdata = implode('&', $data); 1485 return $convertedpostdata; 1486 } 1487 1488 /** 1489 * Fetches content of file from Internet (using proxy if defined). Uses cURL extension if present. 1490 * Due to security concerns only downloads from http(s) sources are supported. 1491 * 1492 * @category files 1493 * @param string $url file url starting with http(s):// 1494 * @param array $headers http headers, null if none. If set, should be an 1495 * associative array of header name => value pairs. 1496 * @param array $postdata array means use POST request with given parameters 1497 * @param bool $fullresponse return headers, responses, etc in a similar way snoopy does 1498 * (if false, just returns content) 1499 * @param int $timeout timeout for complete download process including all file transfer 1500 * (default 5 minutes) 1501 * @param int $connecttimeout timeout for connection to server; this is the timeout that 1502 * usually happens if the remote server is completely down (default 20 seconds); 1503 * may not work when using proxy 1504 * @param bool $skipcertverify If true, the peer's SSL certificate will not be checked. 1505 * Only use this when already in a trusted location. 1506 * @param string $tofile store the downloaded content to file instead of returning it. 1507 * @param bool $calctimeout false by default, true enables an extra head request to try and determine 1508 * filesize and appropriately larger timeout based on $CFG->curltimeoutkbitrate 1509 * @return stdClass|string|bool stdClass object if $fullresponse is true, false if request failed, true 1510 * if file downloaded into $tofile successfully or the file content as a string. 1511 */ 1512 function download_file_content($url, $headers=null, $postdata=null, $fullresponse=false, $timeout=300, $connecttimeout=20, $skipcertverify=false, $tofile=NULL, $calctimeout=false) { 1513 global $CFG; 1514 1515 // Only http and https links supported. 1516 if (!preg_match('|^https?://|i', $url)) { 1517 if ($fullresponse) { 1518 $response = new stdClass(); 1519 $response->status = 0; 1520 $response->headers = array(); 1521 $response->response_code = 'Invalid protocol specified in url'; 1522 $response->results = ''; 1523 $response->error = 'Invalid protocol specified in url'; 1524 return $response; 1525 } else { 1526 return false; 1527 } 1528 } 1529 1530 $options = array(); 1531 1532 $headers2 = array(); 1533 if (is_array($headers)) { 1534 foreach ($headers as $key => $value) { 1535 if (is_numeric($key)) { 1536 $headers2[] = $value; 1537 } else { 1538 $headers2[] = "$key: $value"; 1539 } 1540 } 1541 } 1542 1543 if ($skipcertverify) { 1544 $options['CURLOPT_SSL_VERIFYPEER'] = false; 1545 } else { 1546 $options['CURLOPT_SSL_VERIFYPEER'] = true; 1547 } 1548 1549 $options['CURLOPT_CONNECTTIMEOUT'] = $connecttimeout; 1550 1551 $options['CURLOPT_FOLLOWLOCATION'] = 1; 1552 $options['CURLOPT_MAXREDIRS'] = 5; 1553 1554 // Use POST if requested. 1555 if (is_array($postdata)) { 1556 $postdata = format_postdata_for_curlcall($postdata); 1557 } else if (empty($postdata)) { 1558 $postdata = null; 1559 } 1560 1561 // Optionally attempt to get more correct timeout by fetching the file size. 1562 if (!isset($CFG->curltimeoutkbitrate)) { 1563 // Use very slow rate of 56kbps as a timeout speed when not set. 1564 $bitrate = 56; 1565 } else { 1566 $bitrate = $CFG->curltimeoutkbitrate; 1567 } 1568 if ($calctimeout and !isset($postdata)) { 1569 $curl = new curl(); 1570 $curl->setHeader($headers2); 1571 1572 $curl->head($url, $postdata, $options); 1573 1574 $info = $curl->get_info(); 1575 $error_no = $curl->get_errno(); 1576 if (!$error_no && $info['download_content_length'] > 0) { 1577 // No curl errors - adjust for large files only - take max timeout. 1578 $timeout = max($timeout, ceil($info['download_content_length'] * 8 / ($bitrate * 1024))); 1579 } 1580 } 1581 1582 $curl = new curl(); 1583 $curl->setHeader($headers2); 1584 1585 $options['CURLOPT_RETURNTRANSFER'] = true; 1586 $options['CURLOPT_NOBODY'] = false; 1587 $options['CURLOPT_TIMEOUT'] = $timeout; 1588 1589 if ($tofile) { 1590 $fh = fopen($tofile, 'w'); 1591 if (!$fh) { 1592 if ($fullresponse) { 1593 $response = new stdClass(); 1594 $response->status = 0; 1595 $response->headers = array(); 1596 $response->response_code = 'Can not write to file'; 1597 $response->results = false; 1598 $response->error = 'Can not write to file'; 1599 return $response; 1600 } else { 1601 return false; 1602 } 1603 } 1604 $options['CURLOPT_FILE'] = $fh; 1605 } 1606 1607 if (isset($postdata)) { 1608 $content = $curl->post($url, $postdata, $options); 1609 } else { 1610 $content = $curl->get($url, null, $options); 1611 } 1612 1613 if ($tofile) { 1614 fclose($fh); 1615 @chmod($tofile, $CFG->filepermissions); 1616 } 1617 1618 /* 1619 // Try to detect encoding problems. 1620 if ((curl_errno($ch) == 23 or curl_errno($ch) == 61) and defined('CURLOPT_ENCODING')) { 1621 curl_setopt($ch, CURLOPT_ENCODING, 'none'); 1622 $result = curl_exec($ch); 1623 } 1624 */ 1625 1626 $info = $curl->get_info(); 1627 $error_no = $curl->get_errno(); 1628 $rawheaders = $curl->get_raw_response(); 1629 1630 if ($error_no) { 1631 $error = $content; 1632 if (!$fullresponse) { 1633 debugging("cURL request for \"$url\" failed with: $error ($error_no)", DEBUG_ALL); 1634 return false; 1635 } 1636 1637 $response = new stdClass(); 1638 if ($error_no == 28) { 1639 $response->status = '-100'; // Mimic snoopy. 1640 } else { 1641 $response->status = '0'; 1642 } 1643 $response->headers = array(); 1644 $response->response_code = $error; 1645 $response->results = false; 1646 $response->error = $error; 1647 return $response; 1648 } 1649 1650 if ($tofile) { 1651 $content = true; 1652 } 1653 1654 if (empty($info['http_code'])) { 1655 // For security reasons we support only true http connections (Location: file:// exploit prevention). 1656 $response = new stdClass(); 1657 $response->status = '0'; 1658 $response->headers = array(); 1659 $response->response_code = 'Unknown cURL error'; 1660 $response->results = false; // do NOT change this, we really want to ignore the result! 1661 $response->error = 'Unknown cURL error'; 1662 1663 } else { 1664 $response = new stdClass(); 1665 $response->status = (string)$info['http_code']; 1666 $response->headers = $rawheaders; 1667 $response->results = $content; 1668 $response->error = ''; 1669 1670 // There might be multiple headers on redirect, find the status of the last one. 1671 $firstline = true; 1672 foreach ($rawheaders as $line) { 1673 if ($firstline) { 1674 $response->response_code = $line; 1675 $firstline = false; 1676 } 1677 if (trim($line, "\r\n") === '') { 1678 $firstline = true; 1679 } 1680 } 1681 } 1682 1683 if ($fullresponse) { 1684 return $response; 1685 } 1686 1687 if ($info['http_code'] != 200) { 1688 debugging("cURL request for \"$url\" failed, HTTP response code: ".$response->response_code, DEBUG_ALL); 1689 return false; 1690 } 1691 return $response->results; 1692 } 1693 1694 /** 1695 * Returns a list of information about file types based on extensions. 1696 * 1697 * The following elements expected in value array for each extension: 1698 * 'type' - mimetype 1699 * 'icon' - location of the icon file. If value is FILENAME, then either pix/f/FILENAME.gif 1700 * or pix/f/FILENAME.png must be present in moodle and contain 16x16 filetype icon; 1701 * also files with bigger sizes under names 1702 * FILENAME-24, FILENAME-32, FILENAME-64, FILENAME-128, FILENAME-256 are recommended. 1703 * 'groups' (optional) - array of filetype groups this filetype extension is part of; 1704 * commonly used in moodle the following groups: 1705 * - web_image - image that can be included as <img> in HTML 1706 * - image - image that we can parse using GD to find it's dimensions, also used for portfolio format 1707 * - optimised_image - image that will be processed and optimised 1708 * - video - file that can be imported as video in text editor 1709 * - audio - file that can be imported as audio in text editor 1710 * - archive - we can extract files from this archive 1711 * - spreadsheet - used for portfolio format 1712 * - document - used for portfolio format 1713 * - presentation - used for portfolio format 1714 * 'string' (optional) - the name of the string from lang/en/mimetypes.php that displays 1715 * human-readable description for this filetype; 1716 * Function {@link get_mimetype_description()} first looks at the presence of string for 1717 * particular mimetype (value of 'type'), if not found looks for string specified in 'string' 1718 * attribute, if not found returns the value of 'type'; 1719 * 'defaulticon' (boolean, optional) - used by function {@link file_mimetype_icon()} to find 1720 * an icon for mimetype. If an entry with 'defaulticon' is not found for a particular mimetype, 1721 * this function will return first found icon; Especially usefull for types such as 'text/plain' 1722 * 1723 * @category files 1724 * @return array List of information about file types based on extensions. 1725 * Associative array of extension (lower-case) to associative array 1726 * from 'element name' to data. Current element names are 'type' and 'icon'. 1727 * Unknown types should use the 'xxx' entry which includes defaults. 1728 */ 1729 function &get_mimetypes_array() { 1730 // Get types from the core_filetypes function, which includes caching. 1731 return core_filetypes::get_types(); 1732 } 1733 1734 /** 1735 * Determine a file's MIME type based on the given filename using the function mimeinfo. 1736 * 1737 * This function retrieves a file's MIME type for a file that will be sent to the user. 1738 * This should only be used for file-sending purposes just like in send_stored_file, send_file, and send_temp_file. 1739 * Should the file's MIME type cannot be determined by mimeinfo, it will return 'application/octet-stream' as a default 1740 * MIME type which should tell the browser "I don't know what type of file this is, so just download it.". 1741 * 1742 * @param string $filename The file's filename. 1743 * @return string The file's MIME type or 'application/octet-stream' if it cannot be determined. 1744 */ 1745 function get_mimetype_for_sending($filename = '') { 1746 // Guess the file's MIME type using mimeinfo. 1747 $mimetype = mimeinfo('type', $filename); 1748 1749 // Use octet-stream as fallback if MIME type cannot be determined by mimeinfo. 1750 if (!$mimetype || $mimetype === 'document/unknown') { 1751 $mimetype = 'application/octet-stream'; 1752 } 1753 1754 return $mimetype; 1755 } 1756 1757 /** 1758 * Obtains information about a filetype based on its extension. Will 1759 * use a default if no information is present about that particular 1760 * extension. 1761 * 1762 * @category files 1763 * @param string $element Desired information (usually 'icon' 1764 * for icon filename or 'type' for MIME type. Can also be 1765 * 'icon24', ...32, 48, 64, 72, 80, 96, 128, 256) 1766 * @param string $filename Filename we're looking up 1767 * @return string Requested piece of information from array 1768 */ 1769 function mimeinfo($element, $filename) { 1770 global $CFG; 1771 $mimeinfo = & get_mimetypes_array(); 1772 static $iconpostfixes = array(256=>'-256', 128=>'-128', 96=>'-96', 80=>'-80', 72=>'-72', 64=>'-64', 48=>'-48', 32=>'-32', 24=>'-24', 16=>''); 1773 1774 $filetype = strtolower(pathinfo($filename, PATHINFO_EXTENSION)); 1775 if (empty($filetype)) { 1776 $filetype = 'xxx'; // file without extension 1777 } 1778 if (preg_match('/^icon(\d*)$/', $element, $iconsizematch)) { 1779 $iconsize = max(array(16, (int)$iconsizematch[1])); 1780 $filenames = array($mimeinfo['xxx']['icon']); 1781 if ($filetype != 'xxx' && isset($mimeinfo[$filetype]['icon'])) { 1782 array_unshift($filenames, $mimeinfo[$filetype]['icon']); 1783 } 1784 // find the file with the closest size, first search for specific icon then for default icon 1785 foreach ($filenames as $filename) { 1786 foreach ($iconpostfixes as $size => $postfix) { 1787 $fullname = $CFG->dirroot.'/pix/f/'.$filename.$postfix; 1788 if ($iconsize >= $size && 1789 (file_exists($fullname.'.svg') || file_exists($fullname.'.png') || file_exists($fullname.'.gif'))) { 1790 return $filename.$postfix; 1791 } 1792 } 1793 } 1794 } else if (isset($mimeinfo[$filetype][$element])) { 1795 return $mimeinfo[$filetype][$element]; 1796 } else if (isset($mimeinfo['xxx'][$element])) { 1797 return $mimeinfo['xxx'][$element]; // By default 1798 } else { 1799 return null; 1800 } 1801 } 1802 1803 /** 1804 * Obtains information about a filetype based on the MIME type rather than 1805 * the other way around. 1806 * 1807 * @category files 1808 * @param string $element Desired information ('extension', 'icon', 'icon-24', etc.) 1809 * @param string $mimetype MIME type we're looking up 1810 * @return string Requested piece of information from array 1811 */ 1812 function mimeinfo_from_type($element, $mimetype) { 1813 /* array of cached mimetype->extension associations */ 1814 static $cached = array(); 1815 $mimeinfo = & get_mimetypes_array(); 1816 1817 if (!array_key_exists($mimetype, $cached)) { 1818 $cached[$mimetype] = null; 1819 foreach($mimeinfo as $filetype => $values) { 1820 if ($values['type'] == $mimetype) { 1821 if ($cached[$mimetype] === null) { 1822 $cached[$mimetype] = '.'.$filetype; 1823 } 1824 if (!empty($values['defaulticon'])) { 1825 $cached[$mimetype] = '.'.$filetype; 1826 break; 1827 } 1828 } 1829 } 1830 if (empty($cached[$mimetype])) { 1831 $cached[$mimetype] = '.xxx'; 1832 } 1833 } 1834 if ($element === 'extension') { 1835 return $cached[$mimetype]; 1836 } else { 1837 return mimeinfo($element, $cached[$mimetype]); 1838 } 1839 } 1840 1841 /** 1842 * Return the relative icon path for a given file 1843 * 1844 * Usage: 1845 * <code> 1846 * // $file - instance of stored_file or file_info 1847 * $icon = $OUTPUT->image_url(file_file_icon($file))->out(); 1848 * echo html_writer::empty_tag('img', array('src' => $icon, 'alt' => get_mimetype_description($file))); 1849 * </code> 1850 * or 1851 * <code> 1852 * echo $OUTPUT->pix_icon(file_file_icon($file), get_mimetype_description($file)); 1853 * </code> 1854 * 1855 * @param stored_file|file_info|stdClass|array $file (in case of object attributes $file->filename 1856 * and $file->mimetype are expected) 1857 * @param int $size The size of the icon. Defaults to 16 can also be 24, 32, 64, 128, 256 1858 * @return string 1859 */ 1860 function file_file_icon($file, $size = null) { 1861 if (!is_object($file)) { 1862 $file = (object)$file; 1863 } 1864 if (isset($file->filename)) { 1865 $filename = $file->filename; 1866 } else if (method_exists($file, 'get_filename')) { 1867 $filename = $file->get_filename(); 1868 } else if (method_exists($file, 'get_visible_name')) { 1869 $filename = $file->get_visible_name(); 1870 } else { 1871 $filename = ''; 1872 } 1873 if (isset($file->mimetype)) { 1874 $mimetype = $file->mimetype; 1875 } else if (method_exists($file, 'get_mimetype')) { 1876 $mimetype = $file->get_mimetype(); 1877 } else { 1878 $mimetype = ''; 1879 } 1880 $mimetypes = &get_mimetypes_array(); 1881 if ($filename) { 1882 $extension = strtolower(pathinfo($filename, PATHINFO_EXTENSION)); 1883 if ($extension && !empty($mimetypes[$extension])) { 1884 // if file name has known extension, return icon for this extension 1885 return file_extension_icon($filename, $size); 1886 } 1887 } 1888 return file_mimetype_icon($mimetype, $size); 1889 } 1890 1891 /** 1892 * Return the relative icon path for a folder image 1893 * 1894 * Usage: 1895 * <code> 1896 * $icon = $OUTPUT->image_url(file_folder_icon())->out(); 1897 * echo html_writer::empty_tag('img', array('src' => $icon)); 1898 * </code> 1899 * or 1900 * <code> 1901 * echo $OUTPUT->pix_icon(file_folder_icon(32), ''); 1902 * </code> 1903 * 1904 * @param int $iconsize The size of the icon. Defaults to 16 can also be 24, 32, 48, 64, 72, 80, 96, 128, 256 1905 * @return string 1906 */ 1907 function file_folder_icon($iconsize = null) { 1908 global $CFG; 1909 static $iconpostfixes = array(256=>'-256', 128=>'-128', 96=>'-96', 80=>'-80', 72=>'-72', 64=>'-64', 48=>'-48', 32=>'-32', 24=>'-24', 16=>''); 1910 static $cached = array(); 1911 $iconsize = max(array(16, (int)$iconsize)); 1912 if (!array_key_exists($iconsize, $cached)) { 1913 foreach ($iconpostfixes as $size => $postfix) { 1914 $fullname = $CFG->dirroot.'/pix/f/folder'.$postfix; 1915 if ($iconsize >= $size && 1916 (file_exists($fullname.'.svg') || file_exists($fullname.'.png') || file_exists($fullname.'.gif'))) { 1917 $cached[$iconsize] = 'f/folder'.$postfix; 1918 break; 1919 } 1920 } 1921 } 1922 return $cached[$iconsize]; 1923 } 1924 1925 /** 1926 * Returns the relative icon path for a given mime type 1927 * 1928 * This function should be used in conjunction with $OUTPUT->image_url to produce 1929 * a return the full path to an icon. 1930 * 1931 * <code> 1932 * $mimetype = 'image/jpg'; 1933 * $icon = $OUTPUT->image_url(file_mimetype_icon($mimetype))->out(); 1934 * echo html_writer::empty_tag('img', array('src' => $icon, 'alt' => get_mimetype_description($mimetype))); 1935 * </code> 1936 * 1937 * @category files 1938 * @todo MDL-31074 When an $OUTPUT->icon method is available this function should be altered 1939 * to conform with that. 1940 * @param string $mimetype The mimetype to fetch an icon for 1941 * @param int $size The size of the icon. Defaults to 16 can also be 24, 32, 64, 128, 256 1942 * @return string The relative path to the icon 1943 */ 1944 function file_mimetype_icon($mimetype, $size = NULL) { 1945 return 'f/'.mimeinfo_from_type('icon'.$size, $mimetype); 1946 } 1947 1948 /** 1949 * Returns the relative icon path for a given file name 1950 * 1951 * This function should be used in conjunction with $OUTPUT->image_url to produce 1952 * a return the full path to an icon. 1953 * 1954 * <code> 1955 * $filename = '.jpg'; 1956 * $icon = $OUTPUT->image_url(file_extension_icon($filename))->out(); 1957 * echo html_writer::empty_tag('img', array('src' => $icon, 'alt' => '...')); 1958 * </code> 1959 * 1960 * @todo MDL-31074 When an $OUTPUT->icon method is available this function should be altered 1961 * to conform with that. 1962 * @todo MDL-31074 Implement $size 1963 * @category files 1964 * @param string $filename The filename to get the icon for 1965 * @param int $size The size of the icon. Defaults to 16 can also be 24, 32, 64, 128, 256 1966 * @return string 1967 */ 1968 function file_extension_icon($filename, $size = NULL) { 1969 return 'f/'.mimeinfo('icon'.$size, $filename); 1970 } 1971 1972 /** 1973 * Obtains descriptions for file types (e.g. 'Microsoft Word document') from the 1974 * mimetypes.php language file. 1975 * 1976 * @param mixed $obj - instance of stored_file or file_info or array/stdClass with field 1977 * 'filename' and 'mimetype', or just a string with mimetype (though it is recommended to 1978 * have filename); In case of array/stdClass the field 'mimetype' is optional. 1979 * @param bool $capitalise If true, capitalises first character of result 1980 * @return string Text description 1981 */ 1982 function get_mimetype_description($obj, $capitalise=false) { 1983 $filename = $mimetype = ''; 1984 if (is_object($obj) && method_exists($obj, 'get_filename') && method_exists($obj, 'get_mimetype')) { 1985 // this is an instance of stored_file 1986 $mimetype = $obj->get_mimetype(); 1987 $filename = $obj->get_filename(); 1988 } else if (is_object($obj) && method_exists($obj, 'get_visible_name') && method_exists($obj, 'get_mimetype')) { 1989 // this is an instance of file_info 1990 $mimetype = $obj->get_mimetype(); 1991 $filename = $obj->get_visible_name(); 1992 } else if (is_array($obj) || is_object ($obj)) { 1993 $obj = (array)$obj; 1994 if (!empty($obj['filename'])) { 1995 $filename = $obj['filename']; 1996 } 1997 if (!empty($obj['mimetype'])) { 1998 $mimetype = $obj['mimetype']; 1999 } 2000 } else { 2001 $mimetype = $obj; 2002 } 2003 $mimetypefromext = mimeinfo('type', $filename); 2004 if (empty($mimetype) || $mimetypefromext !== 'document/unknown') { 2005 // if file has a known extension, overwrite the specified mimetype 2006 $mimetype = $mimetypefromext; 2007 } 2008 $extension = strtolower(pathinfo($filename, PATHINFO_EXTENSION)); 2009 if (empty($extension)) { 2010 $mimetypestr = mimeinfo_from_type('string', $mimetype); 2011 $extension = str_replace('.', '', mimeinfo_from_type('extension', $mimetype)); 2012 } else { 2013 $mimetypestr = mimeinfo('string', $filename); 2014 } 2015 $chunks = explode('/', $mimetype, 2); 2016 $chunks[] = ''; 2017 $attr = array( 2018 'mimetype' => $mimetype, 2019 'ext' => $extension, 2020 'mimetype1' => $chunks[0], 2021 'mimetype2' => $chunks[1], 2022 ); 2023 $a = array(); 2024 foreach ($attr as $key => $value) { 2025 $a[$key] = $value; 2026 $a[strtoupper($key)] = strtoupper($value); 2027 $a[ucfirst($key)] = ucfirst($value); 2028 } 2029 2030 // MIME types may include + symbol but this is not permitted in string ids. 2031 $safemimetype = str_replace('+', '_', $mimetype); 2032 $safemimetypestr = str_replace('+', '_', $mimetypestr); 2033 $customdescription = mimeinfo('customdescription', $filename); 2034 if ($customdescription) { 2035 // Call format_string on the custom description so that multilang 2036 // filter can be used (if enabled on system context). We use system 2037 // context because it is possible that the page context might not have 2038 // been defined yet. 2039 $result = format_string($customdescription, true, 2040 array('context' => context_system::instance())); 2041 } else if (get_string_manager()->string_exists($safemimetype, 'mimetypes')) { 2042 $result = get_string($safemimetype, 'mimetypes', (object)$a); 2043 } else if (get_string_manager()->string_exists($safemimetypestr, 'mimetypes')) { 2044 $result = get_string($safemimetypestr, 'mimetypes', (object)$a); 2045 } else if (get_string_manager()->string_exists('default', 'mimetypes')) { 2046 $result = get_string('default', 'mimetypes', (object)$a); 2047 } else { 2048 $result = $mimetype; 2049 } 2050 if ($capitalise) { 2051 $result=ucfirst($result); 2052 } 2053 return $result; 2054 } 2055 2056 /** 2057 * Returns array of elements of type $element in type group(s) 2058 * 2059 * @param string $element name of the element we are interested in, usually 'type' or 'extension' 2060 * @param string|array $groups one group or array of groups/extensions/mimetypes 2061 * @return array 2062 */ 2063 function file_get_typegroup($element, $groups) { 2064 static $cached = array(); 2065 if (!is_array($groups)) { 2066 $groups = array($groups); 2067 } 2068 if (!array_key_exists($element, $cached)) { 2069 $cached[$element] = array(); 2070 } 2071 $result = array(); 2072 foreach ($groups as $group) { 2073 if (!array_key_exists($group, $cached[$element])) { 2074 // retrieive and cache all elements of type $element for group $group 2075 $mimeinfo = & get_mimetypes_array(); 2076 $cached[$element][$group] = array(); 2077 foreach ($mimeinfo as $extension => $value) { 2078 $value['extension'] = '.'.$extension; 2079 if (empty($value[$element])) { 2080 continue; 2081 } 2082 if (($group === '.'.$extension || $group === $value['type'] || 2083 (!empty($value['groups']) && in_array($group, $value['groups']))) && 2084 !in_array($value[$element], $cached[$element][$group])) { 2085 $cached[$element][$group][] = $value[$element]; 2086 } 2087 } 2088 } 2089 $result = array_merge($result, $cached[$element][$group]); 2090 } 2091 return array_values(array_unique($result)); 2092 } 2093 2094 /** 2095 * Checks if file with name $filename has one of the extensions in groups $groups 2096 * 2097 * @see get_mimetypes_array() 2098 * @param string $filename name of the file to check 2099 * @param string|array $groups one group or array of groups to check 2100 * @param bool $checktype if true and extension check fails, find the mimetype and check if 2101 * file mimetype is in mimetypes in groups $groups 2102 * @return bool 2103 */ 2104 function file_extension_in_typegroup($filename, $groups, $checktype = false) { 2105 $extension = pathinfo($filename, PATHINFO_EXTENSION); 2106 if (!empty($extension) && in_array('.'.strtolower($extension), file_get_typegroup('extension', $groups))) { 2107 return true; 2108 } 2109 return $checktype && file_mimetype_in_typegroup(mimeinfo('type', $filename), $groups); 2110 } 2111 2112 /** 2113 * Checks if mimetype $mimetype belongs to one of the groups $groups 2114 * 2115 * @see get_mimetypes_array() 2116 * @param string $mimetype 2117 * @param string|array $groups one group or array of groups to check 2118 * @return bool 2119 */ 2120 function file_mimetype_in_typegroup($mimetype, $groups) { 2121 return !empty($mimetype) && in_array($mimetype, file_get_typegroup('type', $groups)); 2122 } 2123 2124 /** 2125 * Requested file is not found or not accessible, does not return, terminates script 2126 * 2127 * @global stdClass $CFG 2128 * @global stdClass $COURSE 2129 */ 2130 function send_file_not_found() { 2131 global $CFG, $COURSE; 2132 2133 // Allow cross-origin requests only for Web Services. 2134 // This allow to receive requests done by Web Workers or webapps in different domains. 2135 if (WS_SERVER) { 2136 header('Access-Control-Allow-Origin: *'); 2137 } 2138 2139 send_header_404(); 2140 print_error('filenotfound', 'error', $CFG->wwwroot.'/course/view.php?id='.$COURSE->id); //this is not displayed on IIS?? 2141 } 2142 /** 2143 * Helper function to send correct 404 for server. 2144 */ 2145 function send_header_404() { 2146 if (substr(php_sapi_name(), 0, 3) == 'cgi') { 2147 header("Status: 404 Not Found"); 2148 } else { 2149 header('HTTP/1.0 404 not found'); 2150 } 2151 } 2152 2153 /** 2154 * The readfile function can fail when files are larger than 2GB (even on 64-bit 2155 * platforms). This wrapper uses readfile for small files and custom code for 2156 * large ones. 2157 * 2158 * @param string $path Path to file 2159 * @param int $filesize Size of file (if left out, will get it automatically) 2160 * @return int|bool Size read (will always be $filesize) or false if failed 2161 */ 2162 function readfile_allow_large($path, $filesize = -1) { 2163 // Automatically get size if not specified. 2164 if ($filesize === -1) { 2165 $filesize = filesize($path); 2166 } 2167 if ($filesize <= 2147483647) { 2168 // If the file is up to 2^31 - 1, send it normally using readfile. 2169 return readfile($path); 2170 } else { 2171 // For large files, read and output in 64KB chunks. 2172 $handle = fopen($path, 'r'); 2173 if ($handle === false) { 2174 return false; 2175 } 2176 $left = $filesize; 2177 while ($left > 0) { 2178 $size = min($left, 65536); 2179 $buffer = fread($handle, $size); 2180 if ($buffer === false) { 2181 return false; 2182 } 2183 echo $buffer; 2184 $left -= $size; 2185 } 2186 return $filesize; 2187 } 2188 } 2189 2190 /** 2191 * Enhanced readfile() with optional acceleration. 2192 * @param string|stored_file $file 2193 * @param string $mimetype 2194 * @param bool $accelerate 2195 * @return void 2196 */ 2197 function readfile_accel($file, $mimetype, $accelerate) { 2198 global $CFG; 2199 2200 if ($mimetype === 'text/plain') { 2201 // there is no encoding specified in text files, we need something consistent 2202 header('Content-Type: text/plain; charset=utf-8'); 2203 } else { 2204 header('Content-Type: '.$mimetype); 2205 } 2206 2207 $lastmodified = is_object($file) ? $file->get_timemodified() : filemtime($file); 2208 header('Last-Modified: '. gmdate('D, d M Y H:i:s', $lastmodified) .' GMT'); 2209 2210 if (is_object($file)) { 2211 header('Etag: "' . $file->get_contenthash() . '"'); 2212 if (isset($_SERVER['HTTP_IF_NONE_MATCH']) and trim($_SERVER['HTTP_IF_NONE_MATCH'], '"') === $file->get_contenthash()) { 2213 header('HTTP/1.1 304 Not Modified'); 2214 return; 2215 } 2216 } 2217 2218 // if etag present for stored file rely on it exclusively 2219 if (!empty($_SERVER['HTTP_IF_MODIFIED_SINCE']) and (empty($_SERVER['HTTP_IF_NONE_MATCH']) or !is_object($file))) { 2220 // get unixtime of request header; clip extra junk off first 2221 $since = strtotime(preg_replace('/;.*$/', '', $_SERVER["HTTP_IF_MODIFIED_SINCE"])); 2222 if ($since && $since >= $lastmodified) { 2223 header('HTTP/1.1 304 Not Modified'); 2224 return; 2225 } 2226 } 2227 2228 if ($accelerate and empty($CFG->disablebyteserving) and $mimetype !== 'text/plain') { 2229 header('Accept-Ranges: bytes'); 2230 } else { 2231 header('Accept-Ranges: none'); 2232 } 2233 2234 if ($accelerate) { 2235 if (is_object($file)) { 2236 $fs = get_file_storage(); 2237 if ($fs->supports_xsendfile()) { 2238 if ($fs->xsendfile_file($file)) { 2239 return; 2240 } 2241 } 2242 } else { 2243 if (!empty($CFG->xsendfile)) { 2244 require_once("$CFG->libdir/xsendfilelib.php"); 2245 if (xsendfile($file)) { 2246 return; 2247 } 2248 } 2249 } 2250 } 2251 2252 $filesize = is_object($file) ? $file->get_filesize() : filesize($file); 2253 2254 header('Last-Modified: '. gmdate('D, d M Y H:i:s', $lastmodified) .' GMT'); 2255 2256 if ($accelerate and empty($CFG->disablebyteserving) and $mimetype !== 'text/plain') { 2257 2258 if (!empty($_SERVER['HTTP_RANGE']) and strpos($_SERVER['HTTP_RANGE'],'bytes=') !== FALSE) { 2259 // byteserving stuff - for acrobat reader and download accelerators 2260 // see: http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.35 2261 // inspired by: http://www.coneural.org/florian/papers/04_byteserving.php 2262 $ranges = false; 2263 if (preg_match_all('/(\d*)-(\d*)/', $_SERVER['HTTP_RANGE'], $ranges, PREG_SET_ORDER)) { 2264 foreach ($ranges as $key=>$value) { 2265 if ($ranges[$key][1] == '') { 2266 //suffix case 2267 $ranges[$key][1] = $filesize - $ranges[$key][2]; 2268 $ranges[$key][2] = $filesize - 1; 2269 } else if ($ranges[$key][2] == '' || $ranges[$key][2] > $filesize - 1) { 2270 //fix range length 2271 $ranges[$key][2] = $filesize - 1; 2272 } 2273 if ($ranges[$key][2] != '' && $ranges[$key][2] < $ranges[$key][1]) { 2274 //invalid byte-range ==> ignore header 2275 $ranges = false; 2276 break; 2277 } 2278 //prepare multipart header 2279 $ranges[$key][0] = "\r\n--".BYTESERVING_BOUNDARY."\r\nContent-Type: $mimetype\r\n"; 2280 $ranges[$key][0] .= "Content-Range: bytes {$ranges[$key][1]}-{$ranges[$key][2]}/$filesize\r\n\r\n"; 2281 } 2282 } else { 2283 $ranges = false; 2284 } 2285 if ($ranges) { 2286 if (is_object($file)) { 2287 $handle = $file->get_content_file_handle(); 2288 if ($handle === false) { 2289 throw new file_exception('storedfilecannotreadfile', $file->get_filename()); 2290 } 2291 } else { 2292 $handle = fopen($file, 'rb'); 2293 if ($handle === false) { 2294 throw new file_exception('cannotopenfile', $file); 2295 } 2296 } 2297 byteserving_send_file($handle, $mimetype, $ranges, $filesize); 2298 } 2299 } 2300 } 2301 2302 header('Content-Length: ' . $filesize); 2303 2304 if (!empty($_SERVER['REQUEST_METHOD']) and $_SERVER['REQUEST_METHOD'] === 'HEAD') { 2305 exit; 2306 } 2307 2308 while (ob_get_level()) { 2309 $handlerstack = ob_list_handlers(); 2310 $activehandler = array_pop($handlerstack); 2311 if ($activehandler === 'default output handler') { 2312 // We do not expect any content in the buffer when we are serving files. 2313 $buffercontents = ob_get_clean(); 2314 if ($buffercontents !== '') { 2315 error_log('Non-empty default output handler buffer detected while serving the file ' . $file); 2316 } 2317 } else { 2318 // Some handlers such as zlib output compression may have file signature buffered - flush it. 2319 ob_end_flush(); 2320 } 2321 } 2322 2323 // send the whole file content 2324 if (is_object($file)) { 2325 $file->readfile(); 2326 } else { 2327 if (readfile_allow_large($file, $filesize) === false) { 2328 throw new file_exception('cannotopenfile', $file); 2329 } 2330 } 2331 } 2332 2333 /** 2334 * Similar to readfile_accel() but designed for strings. 2335 * @param string $string 2336 * @param string $mimetype 2337 * @param bool $accelerate Ignored 2338 * @return void 2339 */ 2340 function readstring_accel($string, $mimetype, $accelerate = false) { 2341 global $CFG; 2342 2343 if ($mimetype === 'text/plain') { 2344 // there is no encoding specified in text files, we need something consistent 2345 header('Content-Type: text/plain; charset=utf-8'); 2346 } else { 2347 header('Content-Type: '.$mimetype); 2348 } 2349 header('Last-Modified: '. gmdate('D, d M Y H:i:s', time()) .' GMT'); 2350 header('Accept-Ranges: none'); 2351 header('Content-Length: '.strlen($string)); 2352 echo $string; 2353 } 2354 2355 /** 2356 * Handles the sending of temporary file to user, download is forced. 2357 * File is deleted after abort or successful sending, does not return, script terminated 2358 * 2359 * @param string $path path to file, preferably from moodledata/temp/something; or content of file itself 2360 * @param string $filename proposed file name when saving file 2361 * @param bool $pathisstring If the path is string 2362 */ 2363 function send_temp_file($path, $filename, $pathisstring=false) { 2364 global $CFG; 2365 2366 // Guess the file's MIME type. 2367 $mimetype = get_mimetype_for_sending($filename); 2368 2369 // close session - not needed anymore 2370 \core\session\manager::write_close(); 2371 2372 if (!$pathisstring) { 2373 if (!file_exists($path)) { 2374 send_header_404(); 2375 print_error('filenotfound', 'error', $CFG->wwwroot.'/'); 2376 } 2377 // executed after normal finish or abort 2378 core_shutdown_manager::register_function('send_temp_file_finished', array($path)); 2379 } 2380 2381 // if user is using IE, urlencode the filename so that multibyte file name will show up correctly on popup 2382 if (core_useragent::is_ie() || core_useragent::is_edge()) { 2383 $filename = urlencode($filename); 2384 } 2385 2386 // If this file was requested from a form, then mark download as complete. 2387 \core_form\util::form_download_complete(); 2388 2389 header('Content-Disposition: attachment; filename="'.$filename.'"'); 2390 if (is_https()) { // HTTPS sites - watch out for IE! KB812935 and KB316431. 2391 header('Cache-Control: private, max-age=10, no-transform'); 2392 header('Expires: '. gmdate('D, d M Y H:i:s', 0) .' GMT'); 2393 header('Pragma: '); 2394 } else { //normal http - prevent caching at all cost 2395 header('Cache-Control: private, must-revalidate, pre-check=0, post-check=0, max-age=0, no-transform'); 2396 header('Expires: '. gmdate('D, d M Y H:i:s', 0) .' GMT'); 2397 header('Pragma: no-cache'); 2398 } 2399 2400 // send the contents - we can not accelerate this because the file will be deleted asap 2401 if ($pathisstring) { 2402 readstring_accel($path, $mimetype); 2403 } else { 2404 readfile_accel($path, $mimetype, false); 2405 @unlink($path); 2406 } 2407 2408 die; //no more chars to output 2409 } 2410 2411 /** 2412 * Internal callback function used by send_temp_file() 2413 * 2414 * @param string $path 2415 */ 2416 function send_temp_file_finished($path) { 2417 if (file_exists($path)) { 2418 @unlink($path); 2419 } 2420 } 2421 2422 /** 2423 * Serve content which is not meant to be cached. 2424 * 2425 * This is only intended to be used for volatile public files, for instance 2426 * when development is enabled, or when caching is not required on a public resource. 2427 * 2428 * @param string $content Raw content. 2429 * @param string $filename The file name. 2430 * @return void 2431 */ 2432 function send_content_uncached($content, $filename) { 2433 $mimetype = mimeinfo('type', $filename); 2434 $charset = strpos($mimetype, 'text/') === 0 ? '; charset=utf-8' : ''; 2435 2436 header('Content-Disposition: inline; filename="' . $filename . '"'); 2437 header('Last-Modified: ' . gmdate('D, d M Y H:i:s', time()) . ' GMT'); 2438 header('Expires: ' . gmdate('D, d M Y H:i:s', time() + 2) . ' GMT'); 2439 header('Pragma: '); 2440 header('Accept-Ranges: none'); 2441 header('Content-Type: ' . $mimetype . $charset); 2442 header('Content-Length: ' . strlen($content)); 2443 2444 echo $content; 2445 die(); 2446 } 2447 2448 /** 2449 * Safely save content to a certain path. 2450 * 2451 * This function tries hard to be atomic by first copying the content 2452 * to a separate file, and then moving the file across. It also prevents 2453 * the user to abort a request to prevent half-safed files. 2454 * 2455 * This function is intended to be used when saving some content to cache like 2456 * $CFG->localcachedir. If you're not caching a file you should use the File API. 2457 * 2458 * @param string $content The file content. 2459 * @param string $destination The absolute path of the final file. 2460 * @return void 2461 */ 2462 function file_safe_save_content($content, $destination) { 2463 global $CFG; 2464 2465 clearstatcache(); 2466 if (!file_exists(dirname($destination))) { 2467 @mkdir(dirname($destination), $CFG->directorypermissions, true); 2468 } 2469 2470 // Prevent serving of incomplete file from concurrent request, 2471 // the rename() should be more atomic than fwrite(). 2472 ignore_user_abort(true); 2473 if ($fp = fopen($destination . '.tmp', 'xb')) { 2474 fwrite($fp, $content); 2475 fclose($fp); 2476 rename($destination . '.tmp', $destination); 2477 @chmod($destination, $CFG->filepermissions); 2478 @unlink($destination . '.tmp'); // Just in case anything fails. 2479 } 2480 ignore_user_abort(false); 2481 if (connection_aborted()) { 2482 die(); 2483 } 2484 } 2485 2486 /** 2487 * Handles the sending of file data to the user's browser, including support for 2488 * byteranges etc. 2489 * 2490 * @category files 2491 * @param string|stored_file $path Path of file on disk (including real filename), 2492 * or actual content of file as string, 2493 * or stored_file object 2494 * @param string $filename Filename to send 2495 * @param int $lifetime Number of seconds before the file should expire from caches (null means $CFG->filelifetime) 2496 * @param int $filter 0 (default)=no filtering, 1=all files, 2=html files only 2497 * @param bool $pathisstring If true (default false), $path is the content to send and not the pathname. 2498 * Forced to false when $path is a stored_file object. 2499 * @param bool $forcedownload If true (default false), forces download of file rather than view in browser/plugin 2500 * @param string $mimetype Include to specify the MIME type; leave blank to have it guess the type from $filename 2501 * @param bool $dontdie - return control to caller afterwards. this is not recommended and only used for cleanup tasks. 2502 * if this is passed as true, ignore_user_abort is called. if you don't want your processing to continue on cancel, 2503 * you must detect this case when control is returned using connection_aborted. Please not that session is closed 2504 * and should not be reopened. 2505 * @param array $options An array of options, currently accepts: 2506 * - (string) cacheability: public, or private. 2507 * - (string|null) immutable 2508 * - (bool) dontforcesvgdownload: true if force download should be disabled on SVGs. 2509 * Note: This overrides a security feature, so should only be applied to "trusted" content 2510 * (eg module content that is created using an XSS risk flagged capability, such as SCORM). 2511 * @return null script execution stopped unless $dontdie is true 2512 */ 2513 function send_file($path, $filename, $lifetime = null , $filter=0, $pathisstring=false, $forcedownload=false, $mimetype='', 2514 $dontdie=false, array $options = array()) { 2515 global $CFG, $COURSE; 2516 2517 if ($dontdie) { 2518 ignore_user_abort(true); 2519 } 2520 2521 if ($lifetime === 'default' or is_null($lifetime)) { 2522 $lifetime = $CFG->filelifetime; 2523 } 2524 2525 if (is_object($path)) { 2526 $pathisstring = false; 2527 } 2528 2529 \core\session\manager::write_close(); // Unlock session during file serving. 2530 2531 // Use given MIME type if specified, otherwise guess it. 2532 if (!$mimetype || $mimetype === 'document/unknown') { 2533 $mimetype = get_mimetype_for_sending($filename); 2534 } 2535 2536 // if user is using IE, urlencode the filename so that multibyte file name will show up correctly on popup 2537 if (core_useragent::is_ie() || core_useragent::is_edge()) { 2538 $filename = rawurlencode($filename); 2539 } 2540 2541 // Make sure we force download of SVG files, unless the module explicitly allows them (eg within SCORM content). 2542 // This is for security reasons (https://digi.ninja/blog/svg_xss.php). 2543 if (file_is_svg_image_from_mimetype($mimetype) && empty($options['dontforcesvgdownload'])) { 2544 $forcedownload = true; 2545 } 2546 2547 if ($forcedownload) { 2548 header('Content-Disposition: attachment; filename="'.$filename.'"'); 2549 2550 // If this file was requested from a form, then mark download as complete. 2551 \core_form\util::form_download_complete(); 2552 } else if ($mimetype !== 'application/x-shockwave-flash') { 2553 // If this is an swf don't pass content-disposition with filename as this makes the flash player treat the file 2554 // as an upload and enforces security that may prevent the file from being loaded. 2555 2556 header('Content-Disposition: inline; filename="'.$filename.'"'); 2557 } 2558 2559 if ($lifetime > 0) { 2560 $immutable = ''; 2561 if (!empty($options['immutable'])) { 2562 $immutable = ', immutable'; 2563 // Overwrite lifetime accordingly: 2564 // 90 days only - based on Moodle point release cadence being every 3 months. 2565 $lifetimemin = 60 * 60 * 24 * 90; 2566 $lifetime = max($lifetime, $lifetimemin); 2567 } 2568 $cacheability = ' public,'; 2569 if (!empty($options['cacheability']) && ($options['cacheability'] === 'public')) { 2570 // This file must be cache-able by both browsers and proxies. 2571 $cacheability = ' public,'; 2572 } else if (!empty($options['cacheability']) && ($options['cacheability'] === 'private')) { 2573 // This file must be cache-able only by browsers. 2574 $cacheability = ' private,'; 2575 } else if (isloggedin() and !isguestuser()) { 2576 // By default, under the conditions above, this file must be cache-able only by browsers. 2577 $cacheability = ' private,'; 2578 } 2579 $nobyteserving = false; 2580 header('Cache-Control:'.$cacheability.' max-age='.$lifetime.', no-transform'.$immutable); 2581 header('Expires: '. gmdate('D, d M Y H:i:s', time() + $lifetime) .' GMT'); 2582 header('Pragma: '); 2583 2584 } else { // Do not cache files in proxies and browsers 2585 $nobyteserving = true; 2586 if (is_https()) { // HTTPS sites - watch out for IE! KB812935 and KB316431. 2587 header('Cache-Control: private, max-age=10, no-transform'); 2588 header('Expires: '. gmdate('D, d M Y H:i:s', 0) .' GMT'); 2589 header('Pragma: '); 2590 } else { //normal http - prevent caching at all cost 2591 header('Cache-Control: private, must-revalidate, pre-check=0, post-check=0, max-age=0, no-transform'); 2592 header('Expires: '. gmdate('D, d M Y H:i:s', 0) .' GMT'); 2593 header('Pragma: no-cache'); 2594 } 2595 } 2596 2597 if (empty($filter)) { 2598 // send the contents 2599 if ($pathisstring) { 2600 readstring_accel($path, $mimetype); 2601 } else { 2602 readfile_accel($path, $mimetype, !$dontdie); 2603 } 2604 2605 } else { 2606 // Try to put the file through filters 2607 if ($mimetype == 'text/html' || $mimetype == 'application/xhtml+xml' || file_is_svg_image_from_mimetype($mimetype)) { 2608 $options = new stdClass(); 2609 $options->noclean = true; 2610 $options->nocache = true; // temporary workaround for MDL-5136 2611 if (is_object($path)) { 2612 $text = $path->get_content(); 2613 } else if ($pathisstring) { 2614 $text = $path; 2615 } else { 2616 $text = implode('', file($path)); 2617 } 2618 $output = format_text($text, FORMAT_HTML, $options, $COURSE->id); 2619 2620 readstring_accel($output, $mimetype); 2621 2622 } else if (($mimetype == 'text/plain') and ($filter == 1)) { 2623 // only filter text if filter all files is selected 2624 $options = new stdClass(); 2625 $options->newlines = false; 2626 $options->noclean = true; 2627 if (is_object($path)) { 2628 $text = htmlentities($path->get_content(), ENT_QUOTES, 'UTF-8'); 2629 } else if ($pathisstring) { 2630 $text = htmlentities($path, ENT_QUOTES, 'UTF-8'); 2631 } else { 2632 $text = htmlentities(implode('', file($path)), ENT_QUOTES, 'UTF-8'); 2633 } 2634 $output = '<pre>'. format_text($text, FORMAT_MOODLE, $options, $COURSE->id) .'</pre>'; 2635 2636 readstring_accel($output, $mimetype); 2637 2638 } else { 2639 // send the contents 2640 if ($pathisstring) { 2641 readstring_accel($path, $mimetype); 2642 } else { 2643 readfile_accel($path, $mimetype, !$dontdie); 2644 } 2645 } 2646 } 2647 if ($dontdie) { 2648 return; 2649 } 2650 die; //no more chars to output!!! 2651 } 2652 2653 /** 2654 * Handles the sending of file data to the user's browser, including support for 2655 * byteranges etc. 2656 * 2657 * The $options parameter supports the following keys: 2658 * (string|null) preview - send the preview of the file (e.g. "thumb" for a thumbnail) 2659 * (string|null) filename - overrides the implicit filename 2660 * (bool) dontdie - return control to caller afterwards. this is not recommended and only used for cleanup tasks. 2661 * if this is passed as true, ignore_user_abort is called. if you don't want your processing to continue on cancel, 2662 * you must detect this case when control is returned using connection_aborted. Please not that session is closed 2663 * and should not be reopened 2664 * (string|null) cacheability - force the cacheability setting of the HTTP response, "private" or "public", 2665 * when $lifetime is greater than 0. Cacheability defaults to "private" when logged in as other than guest; otherwise, 2666 * defaults to "public". 2667 * (string|null) immutable - set the immutable cache setting in the HTTP response, when served under HTTPS. 2668 * Note: it's up to the consumer to set it properly i.e. when serving a "versioned" URL. 2669 * 2670 * @category files 2671 * @param stored_file $stored_file local file object 2672 * @param int $lifetime Number of seconds before the file should expire from caches (null means $CFG->filelifetime) 2673 * @param int $filter 0 (default)=no filtering, 1=all files, 2=html files only 2674 * @param bool $forcedownload If true (default false), forces download of file rather than view in browser/plugin 2675 * @param array $options additional options affecting the file serving 2676 * @return null script execution stopped unless $options['dontdie'] is true 2677 */ 2678 function send_stored_file($stored_file, $lifetime=null, $filter=0, $forcedownload=false, array $options=array()) { 2679 global $CFG, $COURSE; 2680 2681 static $recursion = 0; 2682 2683 if (empty($options['filename'])) { 2684 $filename = null; 2685 } else { 2686 $filename = $options['filename']; 2687 } 2688 2689 if (empty($options['dontdie'])) { 2690 $dontdie = false; 2691 } else { 2692 $dontdie = true; 2693 } 2694 2695 if ($lifetime === 'default' or is_null($lifetime)) { 2696 $lifetime = $CFG->filelifetime; 2697 } 2698 2699 if (!empty($options['preview'])) { 2700 // replace the file with its preview 2701 $fs = get_file_storage(); 2702 $preview_file = $fs->get_file_preview($stored_file, $options['preview']); 2703 if (!$preview_file) { 2704 // unable to create a preview of the file, send its default mime icon instead 2705 if ($options['preview'] === 'tinyicon') { 2706 $size = 24; 2707 } else if ($options['preview'] === 'thumb') { 2708 $size = 90; 2709 } else { 2710 $size = 256; 2711 } 2712 $fileicon = file_file_icon($stored_file, $size); 2713 send_file($CFG->dirroot.'/pix/'.$fileicon.'.png', basename($fileicon).'.png'); 2714 } else { 2715 // preview images have fixed cache lifetime and they ignore forced download 2716 // (they are generated by GD and therefore they are considered reasonably safe). 2717 $stored_file = $preview_file; 2718 $lifetime = DAYSECS; 2719 $filter = 0; 2720 $forcedownload = false; 2721 } 2722 } 2723 2724 // handle external resource 2725 if ($stored_file && $stored_file->is_external_file() && !isset($options['sendcachedexternalfile'])) { 2726 2727 // Have we been here before? 2728 $recursion++; 2729 if ($recursion > 10) { 2730 throw new coding_exception('Recursive file serving detected'); 2731 } 2732 2733 $stored_file->send_file($lifetime, $filter, $forcedownload, $options); 2734 die; 2735 } 2736 2737 if (!$stored_file or $stored_file->is_directory()) { 2738 // nothing to serve 2739 if ($dontdie) { 2740 return; 2741 } 2742 die; 2743 } 2744 2745 $filename = is_null($filename) ? $stored_file->get_filename() : $filename; 2746 2747 // Use given MIME type if specified. 2748 $mimetype = $stored_file->get_mimetype(); 2749 2750 // Allow cross-origin requests only for Web Services. 2751 // This allow to receive requests done by Web Workers or webapps in different domains. 2752 if (WS_SERVER) { 2753 header('Access-Control-Allow-Origin: *'); 2754 } 2755 2756 send_file($stored_file, $filename, $lifetime, $filter, false, $forcedownload, $mimetype, $dontdie, $options); 2757 } 2758 2759 /** 2760 * Recursively delete the file or folder with path $location. That is, 2761 * if it is a file delete it. If it is a folder, delete all its content 2762 * then delete it. If $location does not exist to start, that is not 2763 * considered an error. 2764 * 2765 * @param string $location the path to remove. 2766 * @return bool 2767 */ 2768 function fulldelete($location) { 2769 if (empty($location)) { 2770 // extra safety against wrong param 2771 return false; 2772 } 2773 if (is_dir($location)) { 2774 if (!$currdir = opendir($location)) { 2775 return false; 2776 } 2777 while (false !== ($file = readdir($currdir))) { 2778 if ($file <> ".." && $file <> ".") { 2779 $fullfile = $location."/".$file; 2780 if (is_dir($fullfile)) { 2781 if (!fulldelete($fullfile)) { 2782 return false; 2783 } 2784 } else { 2785 if (!unlink($fullfile)) { 2786 return false; 2787 } 2788 } 2789 } 2790 } 2791 closedir($currdir); 2792 if (! rmdir($location)) { 2793 return false; 2794 } 2795 2796 } else if (file_exists($location)) { 2797 if (!unlink($location)) { 2798 return false; 2799 } 2800 } 2801 return true; 2802 } 2803 2804 /** 2805 * Send requested byterange of file. 2806 * 2807 * @param resource $handle A file handle 2808 * @param string $mimetype The mimetype for the output 2809 * @param array $ranges An array of ranges to send 2810 * @param string $filesize The size of the content if only one range is used 2811 */ 2812 function byteserving_send_file($handle, $mimetype, $ranges, $filesize) { 2813 // better turn off any kind of compression and buffering 2814 ini_set('zlib.output_compression', 'Off'); 2815 2816 $chunksize = 1*(1024*1024); // 1MB chunks - must be less than 2MB! 2817 if ($handle === false) { 2818 die; 2819 } 2820 if (count($ranges) == 1) { //only one range requested 2821 $length = $ranges[0][2] - $ranges[0][1] + 1; 2822 header('HTTP/1.1 206 Partial content'); 2823 header('Content-Length: '.$length); 2824 header('Content-Range: bytes '.$ranges[0][1].'-'.$ranges[0][2].'/'.$filesize); 2825 header('Content-Type: '.$mimetype); 2826 2827 while(@ob_get_level()) { 2828 if (!@ob_end_flush()) { 2829 break; 2830 } 2831 } 2832 2833 fseek($handle, $ranges[0][1]); 2834 while (!feof($handle) && $length > 0) { 2835 core_php_time_limit::raise(60*60); //reset time limit to 60 min - should be enough for 1 MB chunk 2836 $buffer = fread($handle, ($chunksize < $length ? $chunksize : $length)); 2837 echo $buffer; 2838 flush(); 2839 $length -= strlen($buffer); 2840 } 2841 fclose($handle); 2842 die; 2843 } else { // multiple ranges requested - not tested much 2844 $totallength = 0; 2845 foreach($ranges as $range) { 2846 $totallength += strlen($range[0]) + $range[2] - $range[1] + 1; 2847 } 2848 $totallength += strlen("\r\n--".BYTESERVING_BOUNDARY."--\r\n"); 2849 header('HTTP/1.1 206 Partial content'); 2850 header('Content-Length: '.$totallength); 2851 header('Content-Type: multipart/byteranges; boundary='.BYTESERVING_BOUNDARY); 2852 2853 while(@ob_get_level()) { 2854 if (!@ob_end_flush()) { 2855 break; 2856 } 2857 } 2858 2859 foreach($ranges as $range) { 2860 $length = $range[2] - $range[1] + 1; 2861 echo $range[0]; 2862 fseek($handle, $range[1]); 2863 while (!feof($handle) && $length > 0) { 2864 core_php_time_limit::raise(60*60); //reset time limit to 60 min - should be enough for 1 MB chunk 2865 $buffer = fread($handle, ($chunksize < $length ? $chunksize : $length)); 2866 echo $buffer; 2867 flush(); 2868 $length -= strlen($buffer); 2869 } 2870 } 2871 echo "\r\n--".BYTESERVING_BOUNDARY."--\r\n"; 2872 fclose($handle); 2873 die; 2874 } 2875 } 2876 2877 /** 2878 * Tells whether the filename is executable. 2879 * 2880 * @link http://php.net/manual/en/function.is-executable.php 2881 * @link https://bugs.php.net/bug.php?id=41062 2882 * @param string $filename Path to the file. 2883 * @return bool True if the filename exists and is executable; otherwise, false. 2884 */ 2885 function file_is_executable($filename) { 2886 if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') { 2887 if (is_executable($filename)) { 2888 return true; 2889 } else { 2890 $fileext = strrchr($filename, '.'); 2891 // If we have an extension we can check if it is listed as executable. 2892 if ($fileext && file_exists($filename) && !is_dir($filename)) { 2893 $winpathext = strtolower(getenv('PATHEXT')); 2894 $winpathexts = explode(';', $winpathext); 2895 2896 return in_array(strtolower($fileext), $winpathexts); 2897 } 2898 2899 return false; 2900 } 2901 } else { 2902 return is_executable($filename); 2903 } 2904 } 2905 2906 /** 2907 * Overwrite an existing file in a draft area. 2908 * 2909 * @param stored_file $newfile the new file with the new content and meta-data 2910 * @param stored_file $existingfile the file that will be overwritten 2911 * @throws moodle_exception 2912 * @since Moodle 3.2 2913 */ 2914 function file_overwrite_existing_draftfile(stored_file $newfile, stored_file $existingfile) { 2915 if ($existingfile->get_component() != 'user' or $existingfile->get_filearea() != 'draft') { 2916 throw new coding_exception('The file to overwrite is not in a draft area.'); 2917 } 2918 2919 $fs = get_file_storage(); 2920 // Remember original file source field. 2921 $source = @unserialize($existingfile->get_source()); 2922 // Remember the original sortorder. 2923 $sortorder = $existingfile->get_sortorder(); 2924 if ($newfile->is_external_file()) { 2925 // New file is a reference. Check that existing file does not have any other files referencing to it 2926 if (isset($source->original) && $fs->search_references_count($source->original)) { 2927 throw new moodle_exception('errordoublereference', 'repository'); 2928 } 2929 } 2930 2931 // Delete existing file to release filename. 2932 $newfilerecord = array( 2933 'contextid' => $existingfile->get_contextid(), 2934 'component' => 'user', 2935 'filearea' => 'draft', 2936 'itemid' => $existingfile->get_itemid(), 2937 'timemodified' => time() 2938 ); 2939 $existingfile->delete(); 2940 2941 // Create new file. 2942 $newfile = $fs->create_file_from_storedfile($newfilerecord, $newfile); 2943 // Preserve original file location (stored in source field) for handling references. 2944 if (isset($source->original)) { 2945 if (!($newfilesource = @unserialize($newfile->get_source()))) { 2946 $newfilesource = new stdClass(); 2947 } 2948 $newfilesource->original = $source->original; 2949 $newfile->set_source(serialize($newfilesource)); 2950 } 2951 $newfile->set_sortorder($sortorder); 2952 } 2953 2954 /** 2955 * Add files from a draft area into a final area. 2956 * 2957 * Most of the time you do not want to use this. It is intended to be used 2958 * by asynchronous services which cannot direcly manipulate a final 2959 * area through a draft area. Instead they add files to a new draft 2960 * area and merge that new draft into the final area when ready. 2961 * 2962 * @param int $draftitemid the id of the draft area to use. 2963 * @param int $contextid this parameter and the next two identify the file area to save to. 2964 * @param string $component component name 2965 * @param string $filearea indentifies the file area 2966 * @param int $itemid identifies the item id or false for all items in the file area 2967 * @param array $options area options (subdirs=false, maxfiles=-1, maxbytes=0, areamaxbytes=FILE_AREA_MAX_BYTES_UNLIMITED) 2968 * @see file_save_draft_area_files 2969 * @since Moodle 3.2 2970 */ 2971 function file_merge_files_from_draft_area_into_filearea($draftitemid, $contextid, $component, $filearea, $itemid, 2972 array $options = null) { 2973 // We use 0 here so file_prepare_draft_area creates a new one, finaldraftid will be updated with the new draft id. 2974 $finaldraftid = 0; 2975 file_prepare_draft_area($finaldraftid, $contextid, $component, $filearea, $itemid, $options); 2976 file_merge_draft_area_into_draft_area($draftitemid, $finaldraftid); 2977 file_save_draft_area_files($finaldraftid, $contextid, $component, $filearea, $itemid, $options); 2978 } 2979 2980 /** 2981 * Merge files from two draftarea areas. 2982 * 2983 * This does not handle conflict resolution, files in the destination area which appear 2984 * to be more recent will be kept disregarding the intended ones. 2985 * 2986 * @param int $getfromdraftid the id of the draft area where are the files to merge. 2987 * @param int $mergeintodraftid the id of the draft area where new files will be merged. 2988 * @throws coding_exception 2989 * @since Moodle 3.2 2990 */ 2991 function file_merge_draft_area_into_draft_area($getfromdraftid, $mergeintodraftid) { 2992 global $USER; 2993 2994 $fs = get_file_storage(); 2995 $contextid = context_user::instance($USER->id)->id; 2996 2997 if (!$filestomerge = $fs->get_area_files($contextid, 'user', 'draft', $getfromdraftid)) { 2998 throw new coding_exception('Nothing to merge or area does not belong to current user'); 2999 } 3000 3001 $currentfiles = $fs->get_area_files($contextid, 'user', 'draft', $mergeintodraftid); 3002 3003 // Get hashes of the files to merge. 3004 $newhashes = array(); 3005 foreach ($filestomerge as $filetomerge) { 3006 $filepath = $filetomerge->get_filepath(); 3007 $filename = $filetomerge->get_filename(); 3008 3009 $newhash = $fs->get_pathname_hash($contextid, 'user', 'draft', $mergeintodraftid, $filepath, $filename); 3010 $newhashes[$newhash] = $filetomerge; 3011 } 3012 3013 // Calculate wich files must be added. 3014 foreach ($currentfiles as $file) { 3015 $filehash = $file->get_pathnamehash(); 3016 // One file to be merged already exists. 3017 if (isset($newhashes[$filehash])) { 3018 $updatedfile = $newhashes[$filehash]; 3019 3020 // Avoid race conditions. 3021 if ($file->get_timemodified() > $updatedfile->get_timemodified()) { 3022 // The existing file is more recent, do not copy the suposedly "new" one. 3023 unset($newhashes[$filehash]); 3024 continue; 3025 } 3026 // Update existing file (not only content, meta-data too). 3027 file_overwrite_existing_draftfile($updatedfile, $file); 3028 unset($newhashes[$filehash]); 3029 } 3030 } 3031 3032 foreach ($newhashes as $newfile) { 3033 $newfilerecord = array( 3034 'contextid' => $contextid, 3035 'component' => 'user', 3036 'filearea' => 'draft', 3037 'itemid' => $mergeintodraftid, 3038 'timemodified' => time() 3039 ); 3040 3041 $fs->create_file_from_storedfile($newfilerecord, $newfile); 3042 } 3043 } 3044 3045 /** 3046 * Attempt to determine whether the specified mime-type is an SVG image or not. 3047 * 3048 * @param string $mimetype Mime-type 3049 * @return bool True if it is an SVG file 3050 */ 3051 function file_is_svg_image_from_mimetype(string $mimetype): bool { 3052 return preg_match('|^image/svg|', $mimetype); 3053 } 3054 3055 /** 3056 * RESTful cURL class 3057 * 3058 * This is a wrapper class for curl, it is quite easy to use: 3059 * <code> 3060 * $c = new curl; 3061 * // enable cache 3062 * $c = new curl(array('cache'=>true)); 3063 * // enable cookie 3064 * $c = new curl(array('cookie'=>true)); 3065 * // enable proxy 3066 * $c = new curl(array('proxy'=>true)); 3067 * 3068 * // HTTP GET Method 3069 * $html = $c->get('http://example.com'); 3070 * // HTTP POST Method 3071 * $html = $c->post('http://example.com/', array('q'=>'words', 'name'=>'moodle')); 3072 * // HTTP PUT Method 3073 * $html = $c->put('http://example.com/', array('file'=>'/var/www/test.txt'); 3074 * </code> 3075 * 3076 * @package core_files 3077 * @category files 3078 * @copyright Dongsheng Cai <dongsheng@moodle.com> 3079 * @license http://www.gnu.org/copyleft/gpl.html GNU Public License 3080 */ 3081 class curl { 3082 /** @var bool Caches http request contents */ 3083 public $cache = false; 3084 /** @var bool Uses proxy, null means automatic based on URL */ 3085 public $proxy = null; 3086 /** @var string library version */ 3087 public $version = '0.4 dev'; 3088 /** @var array http's response */ 3089 public $response = array(); 3090 /** @var array Raw response headers, needed for BC in download_file_content(). */ 3091 public $rawresponse = array(); 3092 /** @var array http header */ 3093 public $header = array(); 3094 /** @var string cURL information */ 3095 public $info; 3096 /** @var string error */ 3097 public $error; 3098 /** @var int error code */ 3099 public $errno; 3100 /** @var bool Perform redirects at PHP level instead of relying on native cURL functionality. Always true now. */ 3101 public $emulateredirects = null; 3102 3103 /** @var array cURL options */ 3104 private $options; 3105 3106 /** @var string Proxy host */ 3107 private $proxy_host = ''; 3108 /** @var string Proxy auth */ 3109 private $proxy_auth = ''; 3110 /** @var string Proxy type */ 3111 private $proxy_type = ''; 3112 /** @var bool Debug mode on */ 3113 private $debug = false; 3114 /** @var bool|string Path to cookie file */ 3115 private $cookie = false; 3116 /** @var bool tracks multiple headers in response - redirect detection */ 3117 private $responsefinished = false; 3118 /** @var security helper class, responsible for checking host/ports against allowed/blocked entries.*/ 3119 private $securityhelper; 3120 /** @var bool ignoresecurity a flag which can be supplied to the constructor, allowing security to be bypassed. */ 3121 private $ignoresecurity; 3122 /** @var array $mockresponses For unit testing only - return the head of this list instead of making the next request. */ 3123 private static $mockresponses = []; 3124 3125 /** 3126 * Curl constructor. 3127 * 3128 * Allowed settings are: 3129 * proxy: (bool) use proxy server, null means autodetect non-local from url 3130 * debug: (bool) use debug output 3131 * cookie: (string) path to cookie file, false if none 3132 * cache: (bool) use cache 3133 * module_cache: (string) type of cache 3134 * securityhelper: (\core\files\curl_security_helper_base) helper object providing URL checking for requests. 3135 * ignoresecurity: (bool) set true to override and ignore the security helper when making requests. 3136 * 3137 * @param array $settings 3138 */ 3139 public function __construct($settings = array()) { 3140 global $CFG; 3141 if (!function_exists('curl_init')) { 3142 $this->error = 'cURL module must be enabled!'; 3143 trigger_error($this->error, E_USER_ERROR); 3144 return false; 3145 } 3146 3147 // All settings of this class should be init here. 3148 $this->resetopt(); 3149 if (!empty($settings['debug'])) { 3150 $this->debug = true; 3151 } 3152 if (!empty($settings['cookie'])) { 3153 if($settings['cookie'] === true) { 3154 $this->cookie = $CFG->dataroot.'/curl_cookie.txt'; 3155 } else { 3156 $this->cookie = $settings['cookie']; 3157 } 3158 } 3159 if (!empty($settings['cache'])) { 3160 if (class_exists('curl_cache')) { 3161 if (!empty($settings['module_cache'])) { 3162 $this->cache = new curl_cache($settings['module_cache']); 3163 } else { 3164 $this->cache = new curl_cache('misc'); 3165 } 3166 } 3167 } 3168 if (!empty($CFG->proxyhost)) { 3169 if (empty($CFG->proxyport)) { 3170 $this->proxy_host = $CFG->proxyhost; 3171 } else { 3172 $this->proxy_host = $CFG->proxyhost.':'.$CFG->proxyport; 3173 } 3174 if (!empty($CFG->proxyuser) and !empty($CFG->proxypassword)) { 3175 $this->proxy_auth = $CFG->proxyuser.':'.$CFG->proxypassword; 3176 $this->setopt(array( 3177 'proxyauth'=> CURLAUTH_BASIC | CURLAUTH_NTLM, 3178 'proxyuserpwd'=>$this->proxy_auth)); 3179 } 3180 if (!empty($CFG->proxytype)) { 3181 if ($CFG->proxytype == 'SOCKS5') { 3182 $this->proxy_type = CURLPROXY_SOCKS5; 3183 } else { 3184 $this->proxy_type = CURLPROXY_HTTP; 3185 $this->setopt([ 3186 'httpproxytunnel' => false, 3187 ]); 3188 if (defined('CURLOPT_SUPPRESS_CONNECT_HEADERS')) { 3189 $this->setopt([ 3190 'suppress_connect_headers' => true, 3191 ]); 3192 } 3193 } 3194 $this->setopt(array('proxytype'=>$this->proxy_type)); 3195 } 3196 3197 if (isset($settings['proxy'])) { 3198 $this->proxy = $settings['proxy']; 3199 } 3200 } else { 3201 $this->proxy = false; 3202 } 3203 3204 // All redirects are performed at PHP level now and each one is checked against blocked URLs rules. We do not 3205 // want to let cURL naively follow the redirect chain and visit every URL for security reasons. Even when the 3206 // caller explicitly wants to ignore the security checks, we would need to fall back to the original 3207 // implementation and use emulated redirects if open_basedir is in effect to avoid the PHP warning 3208 // "CURLOPT_FOLLOWLOCATION cannot be activated when in safe_mode or an open_basedir". So it is better to simply 3209 // ignore this property and always handle redirects at this PHP wrapper level and not inside the native cURL. 3210 $this->emulateredirects = true; 3211 3212 // Curl security setup. Allow injection of a security helper, but if not found, default to the core helper. 3213 if (isset($settings['securityhelper']) && $settings['securityhelper'] instanceof \core\files\curl_security_helper_base) { 3214 $this->set_security($settings['securityhelper']); 3215 } else { 3216 $this->set_security(new \core\files\curl_security_helper()); 3217 } 3218 $this->ignoresecurity = isset($settings['ignoresecurity']) ? $settings['ignoresecurity'] : false; 3219 } 3220 3221 /** 3222 * Resets the CURL options that have already been set 3223 */ 3224 public function resetopt() { 3225 $this->options = array(); 3226 $this->options['CURLOPT_USERAGENT'] = \core_useragent::get_moodlebot_useragent(); 3227 // True to include the header in the output 3228 $this->options['CURLOPT_HEADER'] = 0; 3229 // True to Exclude the body from the output 3230 $this->options['CURLOPT_NOBODY'] = 0; 3231 // Redirect ny default. 3232 $this->options['CURLOPT_FOLLOWLOCATION'] = 1; 3233 $this->options['CURLOPT_MAXREDIRS'] = 10; 3234 $this->options['CURLOPT_ENCODING'] = ''; 3235 // TRUE to return the transfer as a string of the return 3236 // value of curl_exec() instead of outputting it out directly. 3237 $this->options['CURLOPT_RETURNTRANSFER'] = 1; 3238 $this->options['CURLOPT_SSL_VERIFYPEER'] = 0; 3239 $this->options['CURLOPT_SSL_VERIFYHOST'] = 2; 3240 $this->options['CURLOPT_CONNECTTIMEOUT'] = 30; 3241 3242 if ($cacert = self::get_cacert()) { 3243 $this->options['CURLOPT_CAINFO'] = $cacert; 3244 } 3245 } 3246 3247 /** 3248 * Get the location of ca certificates. 3249 * @return string absolute file path or empty if default used 3250 */ 3251 public static function get_cacert() { 3252 global $CFG; 3253 3254 // Bundle in dataroot always wins. 3255 if (is_readable("$CFG->dataroot/moodleorgca.crt")) { 3256 return realpath("$CFG->dataroot/moodleorgca.crt"); 3257 } 3258 3259 // Next comes the default from php.ini 3260 $cacert = ini_get('curl.cainfo'); 3261 if (!empty($cacert) and is_readable($cacert)) { 3262 return realpath($cacert); 3263 } 3264 3265 // Windows PHP does not have any certs, we need to use something. 3266 if ($CFG->ostype === 'WINDOWS') { 3267 if (is_readable("$CFG->libdir/cacert.pem")) { 3268 return realpath("$CFG->libdir/cacert.pem"); 3269 } 3270 } 3271 3272 // Use default, this should work fine on all properly configured *nix systems. 3273 return null; 3274 } 3275 3276 /** 3277 * Reset Cookie 3278 */ 3279 public function resetcookie() { 3280 if (!empty($this->cookie)) { 3281 if (is_file($this->cookie)) { 3282 $fp = fopen($this->cookie, 'w'); 3283 if (!empty($fp)) { 3284 fwrite($fp, ''); 3285 fclose($fp); 3286 } 3287 } 3288 } 3289 } 3290 3291 /** 3292 * Set curl options. 3293 * 3294 * Do not use the curl constants to define the options, pass a string 3295 * corresponding to that constant. Ie. to set CURLOPT_MAXREDIRS, pass 3296 * array('CURLOPT_MAXREDIRS' => 10) or array('maxredirs' => 10) to this method. 3297 * 3298 * @param array $options If array is null, this function will reset the options to default value. 3299 * @return void 3300 * @throws coding_exception If an option uses constant value instead of option name. 3301 */ 3302 public function setopt($options = array()) { 3303 if (is_array($options)) { 3304 foreach ($options as $name => $val) { 3305 if (!is_string($name)) { 3306 throw new coding_exception('Curl options should be defined using strings, not constant values.'); 3307 } 3308 if (stripos($name, 'CURLOPT_') === false) { 3309 // Only prefix with CURLOPT_ if the option doesn't contain CURLINFO_, 3310 // which is a valid prefix for at least one option CURLINFO_HEADER_OUT. 3311 if (stripos($name, 'CURLINFO_') === false) { 3312 $name = strtoupper('CURLOPT_'.$name); 3313 } 3314 } else { 3315 $name = strtoupper($name); 3316 } 3317 $this->options[$name] = $val; 3318 } 3319 } 3320 } 3321 3322 /** 3323 * Reset http method 3324 */ 3325 public function cleanopt() { 3326 unset($this->options['CURLOPT_HTTPGET']); 3327 unset($this->options['CURLOPT_POST']); 3328 unset($this->options['CURLOPT_POSTFIELDS']); 3329 unset($this->options['CURLOPT_PUT']); 3330 unset($this->options['CURLOPT_INFILE']); 3331 unset($this->options['CURLOPT_INFILESIZE']); 3332 unset($this->options['CURLOPT_CUSTOMREQUEST']); 3333 unset($this->options['CURLOPT_FILE']); 3334 } 3335 3336 /** 3337 * Resets the HTTP Request headers (to prepare for the new request) 3338 */ 3339 public function resetHeader() { 3340 $this->header = array(); 3341 } 3342 3343 /** 3344 * Set HTTP Request Header 3345 * 3346 * @param array $header 3347 */ 3348 public function setHeader($header) { 3349 if (is_array($header)) { 3350 foreach ($header as $v) { 3351 $this->setHeader($v); 3352 } 3353 } else { 3354 // Remove newlines, they are not allowed in headers. 3355 $newvalue = preg_replace('/[\r\n]/', '', $header); 3356 if (!in_array($newvalue, $this->header)) { 3357 $this->header[] = $newvalue; 3358 } 3359 } 3360 } 3361 3362 /** 3363 * Get HTTP Response Headers 3364 * @return array of arrays 3365 */ 3366 public function getResponse() { 3367 return $this->response; 3368 } 3369 3370 /** 3371 * Get raw HTTP Response Headers 3372 * @return array of strings 3373 */ 3374 public function get_raw_response() { 3375 return $this->rawresponse; 3376 } 3377 3378 /** 3379 * private callback function 3380 * Formatting HTTP Response Header 3381 * 3382 * We only keep the last headers returned. For example during a redirect the 3383 * redirect headers will not appear in {@link self::getResponse()}, if you need 3384 * to use those headers, refer to {@link self::get_raw_response()}. 3385 * 3386 * @param resource $ch Apparently not used 3387 * @param string $header 3388 * @return int The strlen of the header 3389 */ 3390 private function formatHeader($ch, $header) { 3391 $this->rawresponse[] = $header; 3392 3393 if (trim($header, "\r\n") === '') { 3394 // This must be the last header. 3395 $this->responsefinished = true; 3396 } 3397 3398 if (strlen($header) > 2) { 3399 if ($this->responsefinished) { 3400 // We still have headers after the supposedly last header, we must be 3401 // in a redirect so let's empty the response to keep the last headers. 3402 $this->responsefinished = false; 3403 $this->response = array(); 3404 } 3405 $parts = explode(" ", rtrim($header, "\r\n"), 2); 3406 $key = rtrim($parts[0], ':'); 3407 $value = isset($parts[1]) ? $parts[1] : null; 3408 if (!empty($this->response[$key])) { 3409 if (is_array($this->response[$key])) { 3410 $this->response[$key][] = $value; 3411 } else { 3412 $tmp = $this->response[$key]; 3413 $this->response[$key] = array(); 3414 $this->response[$key][] = $tmp; 3415 $this->response[$key][] = $value; 3416 3417 } 3418 } else { 3419 $this->response[$key] = $value; 3420 } 3421 } 3422 return strlen($header); 3423 } 3424 3425 /** 3426 * Set options for individual curl instance 3427 * 3428 * @param resource $curl A curl handle 3429 * @param array $options 3430 * @return resource The curl handle 3431 */ 3432 private function apply_opt($curl, $options) { 3433 // Clean up 3434 $this->cleanopt(); 3435 // set cookie 3436 if (!empty($this->cookie) || !empty($options['cookie'])) { 3437 $this->setopt(array('cookiejar'=>$this->cookie, 3438 'cookiefile'=>$this->cookie 3439 )); 3440 } 3441 3442 // Bypass proxy if required. 3443 if ($this->proxy === null) { 3444 if (!empty($this->options['CURLOPT_URL']) and is_proxybypass($this->options['CURLOPT_URL'])) { 3445 $proxy = false; 3446 } else { 3447 $proxy = true; 3448 } 3449 } else { 3450 $proxy = (bool)$this->proxy; 3451 } 3452 3453 // Set proxy. 3454 if ($proxy) { 3455 $options['CURLOPT_PROXY'] = $this->proxy_host; 3456 } else { 3457 unset($this->options['CURLOPT_PROXY']); 3458 } 3459 3460 $this->setopt($options); 3461 3462 // Reset before set options. 3463 curl_setopt($curl, CURLOPT_HEADERFUNCTION, array(&$this,'formatHeader')); 3464 3465 // Setting the User-Agent based on options provided. 3466 $useragent = ''; 3467 3468 if (!empty($options['CURLOPT_USERAGENT'])) { 3469 $useragent = $options['CURLOPT_USERAGENT']; 3470 } else if (!empty($this->options['CURLOPT_USERAGENT'])) { 3471 $useragent = $this->options['CURLOPT_USERAGENT']; 3472 } else { 3473 $useragent = \core_useragent::get_moodlebot_useragent(); 3474 } 3475 3476 // Set headers. 3477 if (empty($this->header)) { 3478 $this->setHeader(array( 3479 'User-Agent: ' . $useragent, 3480 'Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7', 3481 'Connection: keep-alive' 3482 )); 3483 } else if (!in_array('User-Agent: ' . $useragent, $this->header)) { 3484 // Remove old User-Agent if one existed. 3485 // We have to partial search since we don't know what the original User-Agent is. 3486 if ($match = preg_grep('/User-Agent.*/', $this->header)) { 3487 $key = array_keys($match)[0]; 3488 unset($this->header[$key]); 3489 } 3490 $this->setHeader(array('User-Agent: ' . $useragent)); 3491 } 3492 curl_setopt($curl, CURLOPT_HTTPHEADER, $this->header); 3493 3494 if ($this->debug) { 3495 echo '<h1>Options</h1>'; 3496 var_dump($this->options); 3497 echo '<h1>Header</h1>'; 3498 var_dump($this->header); 3499 } 3500 3501 // Do not allow infinite redirects. 3502 if (!isset($this->options['CURLOPT_MAXREDIRS'])) { 3503 $this->options['CURLOPT_MAXREDIRS'] = 0; 3504 } else if ($this->options['CURLOPT_MAXREDIRS'] > 100) { 3505 $this->options['CURLOPT_MAXREDIRS'] = 100; 3506 } else { 3507 $this->options['CURLOPT_MAXREDIRS'] = (int)$this->options['CURLOPT_MAXREDIRS']; 3508 } 3509 3510 // Make sure we always know if redirects expected. 3511 if (!isset($this->options['CURLOPT_FOLLOWLOCATION'])) { 3512 $this->options['CURLOPT_FOLLOWLOCATION'] = 0; 3513 } 3514 3515 // Limit the protocols to HTTP and HTTPS. 3516 if (defined('CURLOPT_PROTOCOLS')) { 3517 $this->options['CURLOPT_PROTOCOLS'] = (CURLPROTO_HTTP | CURLPROTO_HTTPS); 3518 $this->options['CURLOPT_REDIR_PROTOCOLS'] = (CURLPROTO_HTTP | CURLPROTO_HTTPS); 3519 } 3520 3521 // Set options. 3522 foreach($this->options as $name => $val) { 3523 if ($name === 'CURLOPT_FOLLOWLOCATION') { 3524 // All the redirects are emulated at PHP level. 3525 curl_setopt($curl, CURLOPT_FOLLOWLOCATION, 0); 3526 continue; 3527 } 3528 $name = constant($name); 3529 curl_setopt($curl, $name, $val); 3530 } 3531 3532 return $curl; 3533 } 3534 3535 /** 3536 * Download multiple files in parallel 3537 * 3538 * Calls {@link multi()} with specific download headers 3539 * 3540 * <code> 3541 * $c = new curl(); 3542 * $file1 = fopen('a', 'wb'); 3543 * $file2 = fopen('b', 'wb'); 3544 * $c->download(array( 3545 * array('url'=>'http://localhost/', 'file'=>$file1), 3546 * array('url'=>'http://localhost/20/', 'file'=>$file2) 3547 * )); 3548 * fclose($file1); 3549 * fclose($file2); 3550 * </code> 3551 * 3552 * or 3553 * 3554 * <code> 3555 * $c = new curl(); 3556 * $c->download(array( 3557 * array('url'=>'http://localhost/', 'filepath'=>'/tmp/file1.tmp'), 3558 * array('url'=>'http://localhost/20/', 'filepath'=>'/tmp/file2.tmp') 3559 * )); 3560 * </code> 3561 * 3562 * @param array $requests An array of files to request { 3563 * url => url to download the file [required] 3564 * file => file handler, or 3565 * filepath => file path 3566 * } 3567 * If 'file' and 'filepath' parameters are both specified in one request, the 3568 * open file handle in the 'file' parameter will take precedence and 'filepath' 3569 * will be ignored. 3570 * 3571 * @param array $options An array of options to set 3572 * @return array An array of results 3573 */ 3574 public function download($requests, $options = array()) { 3575 $options['RETURNTRANSFER'] = false; 3576 return $this->multi($requests, $options); 3577 } 3578 3579 /** 3580 * Returns the current curl security helper. 3581 * 3582 * @return \core\files\curl_security_helper instance. 3583 */ 3584 public function get_security() { 3585 return $this->securityhelper; 3586 } 3587 3588 /** 3589 * Sets the curl security helper. 3590 * 3591 * @param \core\files\curl_security_helper $securityobject instance/subclass of the base curl_security_helper class. 3592 * @return bool true if the security helper could be set, false otherwise. 3593 */ 3594 public function set_security($securityobject) { 3595 if ($securityobject instanceof \core\files\curl_security_helper) { 3596 $this->securityhelper = $securityobject; 3597 return true; 3598 } 3599 return false; 3600 } 3601 3602 /** 3603 * Multi HTTP Requests 3604 * This function could run multi-requests in parallel. 3605 * 3606 * @param array $requests An array of files to request 3607 * @param array $options An array of options to set 3608 * @return array An array of results 3609 */ 3610 protected function multi($requests, $options = array()) { 3611 $count = count($requests); 3612 $handles = array(); 3613 $results = array(); 3614 $main = curl_multi_init(); 3615 for ($i = 0; $i < $count; $i++) { 3616 if (!empty($requests[$i]['filepath']) and empty($requests[$i]['file'])) { 3617 // open file 3618 $requests[$i]['file'] = fopen($requests[$i]['filepath'], 'w'); 3619 $requests[$i]['auto-handle'] = true; 3620 } 3621 foreach($requests[$i] as $n=>$v) { 3622 $options[$n] = $v; 3623 } 3624 $handles[$i] = curl_init($requests[$i]['url']); 3625 $this->apply_opt($handles[$i], $options); 3626 curl_multi_add_handle($main, $handles[$i]); 3627 } 3628 $running = 0; 3629 do { 3630 curl_multi_exec($main, $running); 3631 } while($running > 0); 3632 for ($i = 0; $i < $count; $i++) { 3633 if (!empty($options['CURLOPT_RETURNTRANSFER'])) { 3634 $results[] = true; 3635 } else { 3636 $results[] = curl_multi_getcontent($handles[$i]); 3637 } 3638 curl_multi_remove_handle($main, $handles[$i]); 3639 } 3640 curl_multi_close($main); 3641 3642 for ($i = 0; $i < $count; $i++) { 3643 if (!empty($requests[$i]['filepath']) and !empty($requests[$i]['auto-handle'])) { 3644 // close file handler if file is opened in this function 3645 fclose($requests[$i]['file']); 3646 } 3647 } 3648 return $results; 3649 } 3650 3651 /** 3652 * Helper function to reset the request state vars. 3653 * 3654 * @return void. 3655 */ 3656 protected function reset_request_state_vars() { 3657 $this->info = array(); 3658 $this->error = ''; 3659 $this->errno = 0; 3660 $this->response = array(); 3661 $this->rawresponse = array(); 3662 $this->responsefinished = false; 3663 } 3664 3665 /** 3666 * For use only in unit tests - we can pre-set the next curl response. 3667 * This is useful for unit testing APIs that call external systems. 3668 * @param string $response 3669 */ 3670 public static function mock_response($response) { 3671 if ((defined('PHPUNIT_TEST') && PHPUNIT_TEST)) { 3672 array_push(self::$mockresponses, $response); 3673 } else { 3674 throw new coding_exception('mock_response function is only available for unit tests.'); 3675 } 3676 } 3677 3678 /** 3679 * check_securityhelper_blocklist. 3680 * Checks whether the given URL is blocked by checking both plugin's security helpers 3681 * and core curl security helper or any curl security helper that passed to curl class constructor. 3682 * If ignoresecurity is set to true, skip checking and consider the url is not blocked. 3683 * This augments all installed plugin's security helpers if there is any. 3684 * 3685 * @param string $url the url to check. 3686 * @return string - an error message if URL is blocked or null if URL is not blocked. 3687 */ 3688 protected function check_securityhelper_blocklist(string $url): ?string { 3689 3690 // If curl security is not enabled, do not proceed. 3691 if ($this->ignoresecurity) { 3692 return null; 3693 } 3694 3695 // Augment all installed plugin's security helpers if there is any. 3696 // The plugin's function has to be defined as plugintype_pluginname_curl_security_helper in pluginname/lib.php. 3697 $plugintypes = get_plugins_with_function('curl_security_helper'); 3698 3699 // If any of the security helper's function returns true, treat as URL is blocked. 3700 foreach ($plugintypes as $plugins) { 3701 foreach ($plugins as $pluginfunction) { 3702 // Get curl security helper object from plugin lib.php. 3703 $pluginsecurityhelper = $pluginfunction(); 3704 if ($pluginsecurityhelper instanceof \core\files\curl_security_helper_base) { 3705 if ($pluginsecurityhelper->url_is_blocked($url)) { 3706 $this->error = $pluginsecurityhelper->get_blocked_url_string(); 3707 return $this->error; 3708 } 3709 } 3710 } 3711 } 3712 3713 // Check if the URL is blocked in core curl_security_helper or 3714 // curl security helper that passed to curl class constructor. 3715 if ($this->securityhelper->url_is_blocked($url)) { 3716 $this->error = $this->securityhelper->get_blocked_url_string(); 3717 return $this->error; 3718 } 3719 3720 return null; 3721 } 3722 3723 /** 3724 * Single HTTP Request 3725 * 3726 * @param string $url The URL to request 3727 * @param array $options 3728 * @return bool 3729 */ 3730 protected function request($url, $options = array()) { 3731 // Reset here so that the data is valid when result returned from cache, or if we return due to a blocked URL hit. 3732 $this->reset_request_state_vars(); 3733 3734 if ((defined('PHPUNIT_TEST') && PHPUNIT_TEST)) { 3735 $mockresponse = array_pop(self::$mockresponses); 3736 if ($mockresponse !== null) { 3737 $this->info = [ 'http_code' => 200 ]; 3738 return $mockresponse; 3739 } 3740 } 3741 3742 if (empty($this->emulateredirects)) { 3743 // Just in case someone had tried to explicitly disable emulated redirects in legacy code. 3744 debugging('Attempting to disable emulated redirects has no effect any more!', DEBUG_DEVELOPER); 3745 } 3746 3747 $urlisblocked = $this->check_securityhelper_blocklist($url); 3748 if (!is_null($urlisblocked)) { 3749 return $urlisblocked; 3750 } 3751 3752 // Set the URL as a curl option. 3753 $this->setopt(array('CURLOPT_URL' => $url)); 3754 3755 // Create curl instance. 3756 $curl = curl_init(); 3757 3758 $this->apply_opt($curl, $options); 3759 if ($this->cache && $ret = $this->cache->get($this->options)) { 3760 return $ret; 3761 } 3762 3763 $ret = curl_exec($curl); 3764 $this->info = curl_getinfo($curl); 3765 $this->error = curl_error($curl); 3766 $this->errno = curl_errno($curl); 3767 // Note: $this->response and $this->rawresponse are filled by $hits->formatHeader callback. 3768 3769 if (intval($this->info['redirect_count']) > 0) { 3770 // For security reasons we do not allow the cURL handle to follow redirects on its own. 3771 // See setting CURLOPT_FOLLOWLOCATION in {@see self::apply_opt()} method. 3772 throw new coding_exception('Internal cURL handle should never follow redirects on its own!', 3773 'Reported number of redirects: ' . $this->info['redirect_count']); 3774 } 3775 3776 if ($this->options['CURLOPT_FOLLOWLOCATION'] && $this->info['http_code'] != 200) { 3777 $redirects = 0; 3778 3779 while($redirects <= $this->options['CURLOPT_MAXREDIRS']) { 3780 3781 if ($this->info['http_code'] == 301) { 3782 // Moved Permanently - repeat the same request on new URL. 3783 3784 } else if ($this->info['http_code'] == 302) { 3785 // Found - the standard redirect - repeat the same request on new URL. 3786 3787 } else if ($this->info['http_code'] == 303) { 3788 // 303 See Other - repeat only if GET, do not bother with POSTs. 3789 if (empty($this->options['CURLOPT_HTTPGET'])) { 3790 break; 3791 } 3792 3793 } else if ($this->info['http_code'] == 307) { 3794 // Temporary Redirect - must repeat using the same request type. 3795 3796 } else if ($this->info['http_code'] == 308) { 3797 // Permanent Redirect - must repeat using the same request type. 3798 3799 } else { 3800 // Some other http code means do not retry! 3801 break; 3802 } 3803 3804 $redirects++; 3805 3806 $redirecturl = null; 3807 if (isset($this->info['redirect_url'])) { 3808 if (preg_match('|^https?://|i', $this->info['redirect_url'])) { 3809 $redirecturl = $this->info['redirect_url']; 3810 } else { 3811 // Emulate CURLOPT_REDIR_PROTOCOLS behaviour which we have set to (CURLPROTO_HTTP | CURLPROTO_HTTPS) only. 3812 $this->errno = CURLE_UNSUPPORTED_PROTOCOL; 3813 $this->error = 'Redirect to a URL with unsuported protocol: ' . $this->info['redirect_url']; 3814 curl_close($curl); 3815 return $this->error; 3816 } 3817 } 3818 if (!$redirecturl) { 3819 foreach ($this->response as $k => $v) { 3820 if (strtolower($k) === 'location') { 3821 $redirecturl = $v; 3822 break; 3823 } 3824 } 3825 if (preg_match('|^https?://|i', $redirecturl)) { 3826 // Great, this is the correct location format! 3827 3828 } else if ($redirecturl) { 3829 $current = curl_getinfo($curl, CURLINFO_EFFECTIVE_URL); 3830 if (strpos($redirecturl, '/') === 0) { 3831 // Relative to server root - just guess. 3832 $pos = strpos('/', $current, 8); 3833 if ($pos === false) { 3834 $redirecturl = $current.$redirecturl; 3835 } else { 3836 $redirecturl = substr($current, 0, $pos).$redirecturl; 3837 } 3838 } else { 3839 // Relative to current script. 3840 $redirecturl = dirname($current).'/'.$redirecturl; 3841 } 3842 } 3843 } 3844 3845 $urlisblocked = $this->check_securityhelper_blocklist($redirecturl); 3846 if (!is_null($urlisblocked)) { 3847 $this->reset_request_state_vars(); 3848 curl_close($curl); 3849 return $urlisblocked; 3850 } 3851 3852 // If the response body is written to a seekable stream resource, reset the stream pointer to avoid 3853 // appending multiple response bodies to the same resource. 3854 if (!empty($this->options['CURLOPT_FILE'])) { 3855 $streammetadata = stream_get_meta_data($this->options['CURLOPT_FILE']); 3856 if ($streammetadata['seekable']) { 3857 ftruncate($this->options['CURLOPT_FILE'], 0); 3858 rewind($this->options['CURLOPT_FILE']); 3859 } 3860 } 3861 3862 curl_setopt($curl, CURLOPT_URL, $redirecturl); 3863 $ret = curl_exec($curl); 3864 3865 $this->info = curl_getinfo($curl); 3866 $this->error = curl_error($curl); 3867 $this->errno = curl_errno($curl); 3868 3869 $this->info['redirect_count'] = $redirects; 3870 3871 if ($this->info['http_code'] === 200) { 3872 // Finally this is what we wanted. 3873 break; 3874 } 3875 if ($this->errno != CURLE_OK) { 3876 // Something wrong is going on. 3877 break; 3878 } 3879 } 3880 if ($redirects > $this->options['CURLOPT_MAXREDIRS']) { 3881 $this->errno = CURLE_TOO_MANY_REDIRECTS; 3882 $this->error = 'Maximum ('.$this->options['CURLOPT_MAXREDIRS'].') redirects followed'; 3883 } 3884 } 3885 3886 if ($this->cache) { 3887 $this->cache->set($this->options, $ret); 3888 } 3889 3890 if ($this->debug) { 3891 echo '<h1>Return Data</h1>'; 3892 var_dump($ret); 3893 echo '<h1>Info</h1>'; 3894 var_dump($this->info); 3895 echo '<h1>Error</h1>'; 3896 var_dump($this->error); 3897 } 3898 3899 curl_close($curl); 3900 3901 if (empty($this->error)) { 3902 return $ret; 3903 } else { 3904 return $this->error; 3905 // exception is not ajax friendly 3906 //throw new moodle_exception($this->error, 'curl'); 3907 } 3908 } 3909 3910 /** 3911 * HTTP HEAD method 3912 * 3913 * @see request() 3914 * 3915 * @param string $url 3916 * @param array $options 3917 * @return bool 3918 */ 3919 public function head($url, $options = array()) { 3920 $options['CURLOPT_HTTPGET'] = 0; 3921 $options['CURLOPT_HEADER'] = 1; 3922 $options['CURLOPT_NOBODY'] = 1; 3923 return $this->request($url, $options); 3924 } 3925 3926 /** 3927 * HTTP PATCH method 3928 * 3929 * @param string $url 3930 * @param array|string $params 3931 * @param array $options 3932 * @return bool 3933 */ 3934 public function patch($url, $params = '', $options = array()) { 3935 $options['CURLOPT_CUSTOMREQUEST'] = 'PATCH'; 3936 if (is_array($params)) { 3937 $this->_tmp_file_post_params = array(); 3938 foreach ($params as $key => $value) { 3939 if ($value instanceof stored_file) { 3940 $value->add_to_curl_request($this, $key); 3941 } else { 3942 $this->_tmp_file_post_params[$key] = $value; 3943 } 3944 } 3945 $options['CURLOPT_POSTFIELDS'] = $this->_tmp_file_post_params; 3946 unset($this->_tmp_file_post_params); 3947 } else { 3948 // The variable $params is the raw post data. 3949 $options['CURLOPT_POSTFIELDS'] = $params; 3950 } 3951 return $this->request($url, $options); 3952 } 3953 3954 /** 3955 * HTTP POST method 3956 * 3957 * @param string $url 3958 * @param array|string $params 3959 * @param array $options 3960 * @return bool 3961 */ 3962 public function post($url, $params = '', $options = array()) { 3963 $options['CURLOPT_POST'] = 1; 3964 if (is_array($params)) { 3965 $this->_tmp_file_post_params = array(); 3966 foreach ($params as $key => $value) { 3967 if ($value instanceof stored_file) { 3968 $value->add_to_curl_request($this, $key); 3969 } else { 3970 $this->_tmp_file_post_params[$key] = $value; 3971 } 3972 } 3973 $options['CURLOPT_POSTFIELDS'] = $this->_tmp_file_post_params; 3974 unset($this->_tmp_file_post_params); 3975 } else { 3976 // $params is the raw post data 3977 $options['CURLOPT_POSTFIELDS'] = $params; 3978 } 3979 return $this->request($url, $options); 3980 } 3981 3982 /** 3983 * HTTP GET method 3984 * 3985 * @param string $url 3986 * @param array $params 3987 * @param array $options 3988 * @return bool 3989 */ 3990 public function get($url, $params = array(), $options = array()) { 3991 $options['CURLOPT_HTTPGET'] = 1; 3992 3993 if (!empty($params)) { 3994 $url .= (stripos($url, '?') !== false) ? '&' : '?'; 3995 $url .= http_build_query($params, '', '&'); 3996 } 3997 return $this->request($url, $options); 3998 } 3999 4000 /** 4001 * Downloads one file and writes it to the specified file handler 4002 * 4003 * <code> 4004 * $c = new curl(); 4005 * $file = fopen('savepath', 'w'); 4006 * $result = $c->download_one('http://localhost/', null, 4007 * array('file' => $file, 'timeout' => 5, 'followlocation' => true, 'maxredirs' => 3)); 4008 * fclose($file); 4009 * $download_info = $c->get_info(); 4010 * if ($result === true) { 4011 * // file downloaded successfully 4012 * } else { 4013 * $error_text = $result; 4014 * $error_code = $c->get_errno(); 4015 * } 4016 * </code> 4017 * 4018 * <code> 4019 * $c = new curl(); 4020 * $result = $c->download_one('http://localhost/', null, 4021 * array('filepath' => 'savepath', 'timeout' => 5, 'followlocation' => true, 'maxredirs' => 3)); 4022 * // ... see above, no need to close handle and remove file if unsuccessful 4023 * </code> 4024 * 4025 * @param string $url 4026 * @param array|null $params key-value pairs to be added to $url as query string 4027 * @param array $options request options. Must include either 'file' or 'filepath' 4028 * @return bool|string true on success or error string on failure 4029 */ 4030 public function download_one($url, $params, $options = array()) { 4031 $options['CURLOPT_HTTPGET'] = 1; 4032 if (!empty($params)) { 4033 $url .= (stripos($url, '?') !== false) ? '&' : '?'; 4034 $url .= http_build_query($params, '', '&'); 4035 } 4036 if (!empty($options['filepath']) && empty($options['file'])) { 4037 // open file 4038 if (!($options['file'] = fopen($options['filepath'], 'w'))) { 4039 $this->errno = 100; 4040 return get_string('cannotwritefile', 'error', $options['filepath']); 4041 } 4042 $filepath = $options['filepath']; 4043 } 4044 unset($options['filepath']); 4045 $result = $this->request($url, $options); 4046 if (isset($filepath)) { 4047 fclose($options['file']); 4048 if ($result !== true) { 4049 unlink($filepath); 4050 } 4051 } 4052 return $result; 4053 } 4054 4055 /** 4056 * HTTP PUT method 4057 * 4058 * @param string $url 4059 * @param array $params 4060 * @param array $options 4061 * @return bool 4062 */ 4063 public function put($url, $params = array(), $options = array()) { 4064 $file = ''; 4065 $fp = false; 4066 if (isset($params['file'])) { 4067 $file = $params['file']; 4068 if (is_file($file)) { 4069 $fp = fopen($file, 'r'); 4070 $size = filesize($file); 4071 $options['CURLOPT_PUT'] = 1; 4072 $options['CURLOPT_INFILESIZE'] = $size; 4073 $options['CURLOPT_INFILE'] = $fp; 4074 } else { 4075 return null; 4076 } 4077 if (!isset($this->options['CURLOPT_USERPWD'])) { 4078 $this->setopt(array('CURLOPT_USERPWD' => 'anonymous: noreply@moodle.org')); 4079 } 4080 } else { 4081 $options['CURLOPT_CUSTOMREQUEST'] = 'PUT'; 4082 $options['CURLOPT_POSTFIELDS'] = $params; 4083 } 4084 4085 $ret = $this->request($url, $options); 4086 if ($fp !== false) { 4087 fclose($fp); 4088 } 4089 return $ret; 4090 } 4091 4092 /** 4093 * HTTP DELETE method 4094 * 4095 * @param string $url 4096 * @param array $param 4097 * @param array $options 4098 * @return bool 4099 */ 4100 public function delete($url, $param = array(), $options = array()) { 4101 $options['CURLOPT_CUSTOMREQUEST'] = 'DELETE'; 4102 if (!isset($options['CURLOPT_USERPWD'])) { 4103 $options['CURLOPT_USERPWD'] = 'anonymous: noreply@moodle.org'; 4104 } 4105 $ret = $this->request($url, $options); 4106 return $ret; 4107 } 4108 4109 /** 4110 * HTTP TRACE method 4111 * 4112 * @param string $url 4113 * @param array $options 4114 * @return bool 4115 */ 4116 public function trace($url, $options = array()) { 4117 $options['CURLOPT_CUSTOMREQUEST'] = 'TRACE'; 4118 $ret = $this->request($url, $options); 4119 return $ret; 4120 } 4121 4122 /** 4123 * HTTP OPTIONS method 4124 * 4125 * @param string $url 4126 * @param array $options 4127 * @return bool 4128 */ 4129 public function options($url, $options = array()) { 4130 $options['CURLOPT_CUSTOMREQUEST'] = 'OPTIONS'; 4131 $ret = $this->request($url, $options); 4132 return $ret; 4133 } 4134 4135 /** 4136 * Get curl information 4137 * 4138 * @return string 4139 */ 4140 public function get_info() { 4141 return $this->info; 4142 } 4143 4144 /** 4145 * Get curl error code 4146 * 4147 * @return int 4148 */ 4149 public function get_errno() { 4150 return $this->errno; 4151 } 4152 4153 /** 4154 * When using a proxy, an additional HTTP response code may appear at 4155 * the start of the header. For example, when using https over a proxy 4156 * there may be 'HTTP/1.0 200 Connection Established'. Other codes are 4157 * also possible and some may come with their own headers. 4158 * 4159 * If using the return value containing all headers, this function can be 4160 * called to remove unwanted doubles. 4161 * 4162 * Note that it is not possible to distinguish this situation from valid 4163 * data unless you know the actual response part (below the headers) 4164 * will not be included in this string, or else will not 'look like' HTTP 4165 * headers. As a result it is not safe to call this function for general 4166 * data. 4167 * 4168 * @param string $input Input HTTP response 4169 * @return string HTTP response with additional headers stripped if any 4170 */ 4171 public static function strip_double_headers($input) { 4172 // I have tried to make this regular expression as specific as possible 4173 // to avoid any case where it does weird stuff if you happen to put 4174 // HTTP/1.1 200 at the start of any line in your RSS file. This should 4175 // also make it faster because it can abandon regex processing as soon 4176 // as it hits something that doesn't look like an http header. The 4177 // header definition is taken from RFC 822, except I didn't support 4178 // folding which is never used in practice. 4179 $crlf = "\r\n"; 4180 return preg_replace( 4181 // HTTP version and status code (ignore value of code). 4182 '~^HTTP/[1-9](\.[0-9])?.*' . $crlf . 4183 // Header name: character between 33 and 126 decimal, except colon. 4184 // Colon. Header value: any character except \r and \n. CRLF. 4185 '(?:[\x21-\x39\x3b-\x7e]+:[^' . $crlf . ']+' . $crlf . ')*' . 4186 // Headers are terminated by another CRLF (blank line). 4187 $crlf . 4188 // Second HTTP status code, this time must be 200. 4189 '(HTTP/[1-9](\.[0-9])? 200)~', '$2', $input); 4190 } 4191 } 4192 4193 /** 4194 * This class is used by cURL class, use case: 4195 * 4196 * <code> 4197 * $CFG->repositorycacheexpire = 120; 4198 * $CFG->curlcache = 120; 4199 * 4200 * $c = new curl(array('cache'=>true), 'module_cache'=>'repository'); 4201 * $ret = $c->get('http://www.google.com'); 4202 * </code> 4203 * 4204 * @package core_files 4205 * @copyright Dongsheng Cai <dongsheng@moodle.com> 4206 * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later 4207 */ 4208 class curl_cache { 4209 /** @var string Path to cache directory */ 4210 public $dir = ''; 4211 4212 /** 4213 * Constructor 4214 * 4215 * @global stdClass $CFG 4216 * @param string $module which module is using curl_cache 4217 */ 4218 public function __construct($module = 'repository') { 4219 global $CFG; 4220 if (!empty($module)) { 4221 $this->dir = $CFG->cachedir.'/'.$module.'/'; 4222 } else { 4223 $this->dir = $CFG->cachedir.'/misc/'; 4224 } 4225 if (!file_exists($this->dir)) { 4226 mkdir($this->dir, $CFG->directorypermissions, true); 4227 } 4228 if ($module == 'repository') { 4229 if (empty($CFG->repositorycacheexpire)) { 4230 $CFG->repositorycacheexpire = 120; 4231 } 4232 $this->ttl = $CFG->repositorycacheexpire; 4233 } else { 4234 if (empty($CFG->curlcache)) { 4235 $CFG->curlcache = 120; 4236 } 4237 $this->ttl = $CFG->curlcache; 4238 } 4239 } 4240 4241 /** 4242 * Get cached value 4243 * 4244 * @global stdClass $CFG 4245 * @global stdClass $USER 4246 * @param mixed $param 4247 * @return bool|string 4248 */ 4249 public function get($param) { 4250 global $CFG, $USER; 4251 $this->cleanup($this->ttl); 4252 $filename = 'u'.$USER->id.'_'.md5(serialize($param)); 4253 if(file_exists($this->dir.$filename)) { 4254 $lasttime = filemtime($this->dir.$filename); 4255 if (time()-$lasttime > $this->ttl) { 4256 return false; 4257 } else { 4258 $fp = fopen($this->dir.$filename, 'r'); 4259 $size = filesize($this->dir.$filename); 4260 $content = fread($fp, $size); 4261 return unserialize($content); 4262 } 4263 } 4264 return false; 4265 } 4266 4267 /** 4268 * Set cache value 4269 * 4270 * @global object $CFG 4271 * @global object $USER 4272 * @param mixed $param 4273 * @param mixed $val 4274 */ 4275 public function set($param, $val) { 4276 global $CFG, $USER; 4277 $filename = 'u'.$USER->id.'_'.md5(serialize($param)); 4278 $fp = fopen($this->dir.$filename, 'w'); 4279 fwrite($fp, serialize($val)); 4280 fclose($fp); 4281 @chmod($this->dir.$filename, $CFG->filepermissions); 4282 } 4283 4284 /** 4285 * Remove cache files 4286 * 4287 * @param int $expire The number of seconds before expiry 4288 */ 4289 public function cleanup($expire) { 4290 if ($dir = opendir($this->dir)) { 4291 while (false !== ($file = readdir($dir))) { 4292 if(!is_dir($file) && $file != '.' && $file != '..') { 4293 $lasttime = @filemtime($this->dir.$file); 4294 if (time() - $lasttime > $expire) { 4295 @unlink($this->dir.$file); 4296 } 4297 } 4298 } 4299 closedir($dir); 4300 } 4301 } 4302 /** 4303 * delete current user's cache file 4304 * 4305 * @global object $CFG 4306 * @global object $USER 4307 */ 4308 public function refresh() { 4309 global $CFG, $USER; 4310 if ($dir = opendir($this->dir)) { 4311 while (false !== ($file = readdir($dir))) { 4312 if (!is_dir($file) && $file != '.' && $file != '..') { 4313 if (strpos($file, 'u'.$USER->id.'_') !== false) { 4314 @unlink($this->dir.$file); 4315 } 4316 } 4317 } 4318 } 4319 } 4320 } 4321 4322 /** 4323 * This function delegates file serving to individual plugins 4324 * 4325 * @param string $relativepath 4326 * @param bool $forcedownload 4327 * @param null|string $preview the preview mode, defaults to serving the original file 4328 * @param boolean $offline If offline is requested - don't serve a redirect to an external file, return a file suitable for viewing 4329 * offline (e.g. mobile app). 4330 * @param bool $embed Whether this file will be served embed into an iframe. 4331 * @todo MDL-31088 file serving improments 4332 */ 4333 function file_pluginfile($relativepath, $forcedownload, $preview = null, $offline = false, $embed = false) { 4334 global $DB, $CFG, $USER; 4335 // relative path must start with '/' 4336 if (!$relativepath) { 4337 print_error('invalidargorconf'); 4338 } else if ($relativepath[0] != '/') { 4339 print_error('pathdoesnotstartslash'); 4340 } 4341 4342 // extract relative path components 4343 $args = explode('/', ltrim($relativepath, '/')); 4344 4345 if (count($args) < 3) { // always at least context, component and filearea 4346 print_error('invalidarguments'); 4347 } 4348 4349 $contextid = (int)array_shift($args); 4350 $component = clean_param(array_shift($args), PARAM_COMPONENT); 4351 $filearea = clean_param(array_shift($args), PARAM_AREA); 4352 4353 list($context, $course, $cm) = get_context_info_array($contextid); 4354 4355 $fs = get_file_storage(); 4356 4357 $sendfileoptions = ['preview' => $preview, 'offline' => $offline, 'embed' => $embed]; 4358 4359 // ======================================================================================================================== 4360 if ($component === 'blog') { 4361 // Blog file serving 4362 if ($context->contextlevel != CONTEXT_SYSTEM) { 4363 send_file_not_found(); 4364 } 4365 if ($filearea !== 'attachment' and $filearea !== 'post') { 4366 send_file_not_found(); 4367 } 4368 4369 if (empty($CFG->enableblogs)) { 4370 print_error('siteblogdisable', 'blog'); 4371 } 4372 4373 $entryid = (int)array_shift($args); 4374 if (!$entry = $DB->get_record('post', array('module'=>'blog', 'id'=>$entryid))) { 4375 send_file_not_found(); 4376 } 4377 if ($CFG->bloglevel < BLOG_GLOBAL_LEVEL) { 4378 require_login(); 4379 if (isguestuser()) { 4380 print_error('noguest'); 4381 } 4382 if ($CFG->bloglevel == BLOG_USER_LEVEL) { 4383 if ($USER->id != $entry->userid) { 4384 send_file_not_found(); 4385 } 4386 } 4387 } 4388 4389 if ($entry->publishstate === 'public') { 4390 if ($CFG->forcelogin) { 4391 require_login(); 4392 } 4393 4394 } else if ($entry->publishstate === 'site') { 4395 require_login(); 4396 //ok 4397 } else if ($entry->publishstate === 'draft') { 4398 require_login(); 4399 if ($USER->id != $entry->userid) { 4400 send_file_not_found(); 4401 } 4402 } 4403 4404 $filename = array_pop($args); 4405 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4406 4407 if (!$file = $fs->get_file($context->id, $component, $filearea, $entryid, $filepath, $filename) or $file->is_directory()) { 4408 send_file_not_found(); 4409 } 4410 4411 send_stored_file($file, 10*60, 0, true, $sendfileoptions); // download MUST be forced - security! 4412 4413 // ======================================================================================================================== 4414 } else if ($component === 'grade') { 4415 4416 require_once($CFG->libdir . '/grade/constants.php'); 4417 4418 if (($filearea === 'outcome' or $filearea === 'scale') and $context->contextlevel == CONTEXT_SYSTEM) { 4419 // Global gradebook files 4420 if ($CFG->forcelogin) { 4421 require_login(); 4422 } 4423 4424 $fullpath = "/$context->id/$component/$filearea/".implode('/', $args); 4425 4426 if (!$file = $fs->get_file_by_hash(sha1($fullpath)) or $file->is_directory()) { 4427 send_file_not_found(); 4428 } 4429 4430 \core\session\manager::write_close(); // Unlock session during file serving. 4431 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4432 4433 } else if ($filearea == GRADE_FEEDBACK_FILEAREA || $filearea == GRADE_HISTORY_FEEDBACK_FILEAREA) { 4434 if ($context->contextlevel != CONTEXT_MODULE) { 4435 send_file_not_found(); 4436 } 4437 4438 require_login($course, false); 4439 4440 $gradeid = (int) array_shift($args); 4441 $filename = array_pop($args); 4442 if ($filearea == GRADE_HISTORY_FEEDBACK_FILEAREA) { 4443 $grade = $DB->get_record('grade_grades_history', ['id' => $gradeid]); 4444 } else { 4445 $grade = $DB->get_record('grade_grades', ['id' => $gradeid]); 4446 } 4447 4448 if (!$grade) { 4449 send_file_not_found(); 4450 } 4451 4452 $iscurrentuser = $USER->id == $grade->userid; 4453 4454 if (!$iscurrentuser) { 4455 $coursecontext = context_course::instance($course->id); 4456 if (!has_capability('moodle/grade:viewall', $coursecontext)) { 4457 send_file_not_found(); 4458 } 4459 } 4460 4461 $fullpath = "/$context->id/$component/$filearea/$gradeid/$filename"; 4462 4463 if (!$file = $fs->get_file_by_hash(sha1($fullpath)) or $file->is_directory()) { 4464 send_file_not_found(); 4465 } 4466 4467 \core\session\manager::write_close(); // Unlock session during file serving. 4468 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4469 } else { 4470 send_file_not_found(); 4471 } 4472 4473 // ======================================================================================================================== 4474 } else if ($component === 'tag') { 4475 if ($filearea === 'description' and $context->contextlevel == CONTEXT_SYSTEM) { 4476 4477 // All tag descriptions are going to be public but we still need to respect forcelogin 4478 if ($CFG->forcelogin) { 4479 require_login(); 4480 } 4481 4482 $fullpath = "/$context->id/tag/description/".implode('/', $args); 4483 4484 if (!$file = $fs->get_file_by_hash(sha1($fullpath)) or $file->is_directory()) { 4485 send_file_not_found(); 4486 } 4487 4488 \core\session\manager::write_close(); // Unlock session during file serving. 4489 send_stored_file($file, 60*60, 0, true, $sendfileoptions); 4490 4491 } else { 4492 send_file_not_found(); 4493 } 4494 // ======================================================================================================================== 4495 } else if ($component === 'badges') { 4496 require_once($CFG->libdir . '/badgeslib.php'); 4497 4498 $badgeid = (int)array_shift($args); 4499 $badge = new badge($badgeid); 4500 $filename = array_pop($args); 4501 4502 if ($filearea === 'badgeimage') { 4503 if ($filename !== 'f1' && $filename !== 'f2' && $filename !== 'f3') { 4504 send_file_not_found(); 4505 } 4506 if (!$file = $fs->get_file($context->id, 'badges', 'badgeimage', $badge->id, '/', $filename.'.png')) { 4507 send_file_not_found(); 4508 } 4509 4510 \core\session\manager::write_close(); 4511 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4512 } else if ($filearea === 'userbadge' and $context->contextlevel == CONTEXT_USER) { 4513 if (!$file = $fs->get_file($context->id, 'badges', 'userbadge', $badge->id, '/', $filename.'.png')) { 4514 send_file_not_found(); 4515 } 4516 4517 \core\session\manager::write_close(); 4518 send_stored_file($file, 60*60, 0, true, $sendfileoptions); 4519 } 4520 // ======================================================================================================================== 4521 } else if ($component === 'calendar') { 4522 if ($filearea === 'event_description' and $context->contextlevel == CONTEXT_SYSTEM) { 4523 4524 // All events here are public the one requirement is that we respect forcelogin 4525 if ($CFG->forcelogin) { 4526 require_login(); 4527 } 4528 4529 // Get the event if from the args array 4530 $eventid = array_shift($args); 4531 4532 // Load the event from the database 4533 if (!$event = $DB->get_record('event', array('id'=>(int)$eventid, 'eventtype'=>'site'))) { 4534 send_file_not_found(); 4535 } 4536 4537 // Get the file and serve if successful 4538 $filename = array_pop($args); 4539 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4540 if (!$file = $fs->get_file($context->id, $component, $filearea, $eventid, $filepath, $filename) or $file->is_directory()) { 4541 send_file_not_found(); 4542 } 4543 4544 \core\session\manager::write_close(); // Unlock session during file serving. 4545 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4546 4547 } else if ($filearea === 'event_description' and $context->contextlevel == CONTEXT_USER) { 4548 4549 // Must be logged in, if they are not then they obviously can't be this user 4550 require_login(); 4551 4552 // Don't want guests here, potentially saves a DB call 4553 if (isguestuser()) { 4554 send_file_not_found(); 4555 } 4556 4557 // Get the event if from the args array 4558 $eventid = array_shift($args); 4559 4560 // Load the event from the database - user id must match 4561 if (!$event = $DB->get_record('event', array('id'=>(int)$eventid, 'userid'=>$USER->id, 'eventtype'=>'user'))) { 4562 send_file_not_found(); 4563 } 4564 4565 // Get the file and serve if successful 4566 $filename = array_pop($args); 4567 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4568 if (!$file = $fs->get_file($context->id, $component, $filearea, $eventid, $filepath, $filename) or $file->is_directory()) { 4569 send_file_not_found(); 4570 } 4571 4572 \core\session\manager::write_close(); // Unlock session during file serving. 4573 send_stored_file($file, 0, 0, true, $sendfileoptions); 4574 4575 } else if ($filearea === 'event_description' and $context->contextlevel == CONTEXT_COURSECAT) { 4576 if ($CFG->forcelogin) { 4577 require_login(); 4578 } 4579 4580 // Get category, this will also validate access. 4581 $category = core_course_category::get($context->instanceid); 4582 4583 // Get the event ID from the args array, load event. 4584 $eventid = array_shift($args); 4585 $event = $DB->get_record('event', [ 4586 'id' => (int) $eventid, 4587 'eventtype' => 'category', 4588 'categoryid' => $category->id, 4589 ]); 4590 4591 if (!$event) { 4592 send_file_not_found(); 4593 } 4594 4595 // Retrieve file from storage, and serve. 4596 $filename = array_pop($args); 4597 $filepath = $args ? '/' . implode('/', $args) .'/' : '/'; 4598 $file = $fs->get_file($context->id, $component, $filearea, $eventid, $filepath, $filename); 4599 if (!$file || $file->is_directory()) { 4600 send_file_not_found(); 4601 } 4602 4603 // Unlock session during file serving. 4604 \core\session\manager::write_close(); 4605 send_stored_file($file, HOURSECS, 0, $forcedownload, $sendfileoptions); 4606 } else if ($filearea === 'event_description' and $context->contextlevel == CONTEXT_COURSE) { 4607 4608 // Respect forcelogin and require login unless this is the site.... it probably 4609 // should NEVER be the site 4610 if ($CFG->forcelogin || $course->id != SITEID) { 4611 require_login($course); 4612 } 4613 4614 // Must be able to at least view the course. This does not apply to the front page. 4615 if ($course->id != SITEID && (!is_enrolled($context)) && (!is_viewing($context))) { 4616 //TODO: hmm, do we really want to block guests here? 4617 send_file_not_found(); 4618 } 4619 4620 // Get the event id 4621 $eventid = array_shift($args); 4622 4623 // Load the event from the database we need to check whether it is 4624 // a) valid course event 4625 // b) a group event 4626 // Group events use the course context (there is no group context) 4627 if (!$event = $DB->get_record('event', array('id'=>(int)$eventid, 'courseid'=>$course->id))) { 4628 send_file_not_found(); 4629 } 4630 4631 // If its a group event require either membership of view all groups capability 4632 if ($event->eventtype === 'group') { 4633 if (!has_capability('moodle/site:accessallgroups', $context) && !groups_is_member($event->groupid, $USER->id)) { 4634 send_file_not_found(); 4635 } 4636 } else if ($event->eventtype === 'course' || $event->eventtype === 'site') { 4637 // Ok. Please note that the event type 'site' still uses a course context. 4638 } else { 4639 // Some other type. 4640 send_file_not_found(); 4641 } 4642 4643 // If we get this far we can serve the file 4644 $filename = array_pop($args); 4645 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4646 if (!$file = $fs->get_file($context->id, $component, $filearea, $eventid, $filepath, $filename) or $file->is_directory()) { 4647 send_file_not_found(); 4648 } 4649 4650 \core\session\manager::write_close(); // Unlock session during file serving. 4651 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4652 4653 } else { 4654 send_file_not_found(); 4655 } 4656 4657 // ======================================================================================================================== 4658 } else if ($component === 'user') { 4659 if ($filearea === 'icon' and $context->contextlevel == CONTEXT_USER) { 4660 if (count($args) == 1) { 4661 $themename = theme_config::DEFAULT_THEME; 4662 $filename = array_shift($args); 4663 } else { 4664 $themename = array_shift($args); 4665 $filename = array_shift($args); 4666 } 4667 4668 // fix file name automatically 4669 if ($filename !== 'f1' and $filename !== 'f2' and $filename !== 'f3') { 4670 $filename = 'f1'; 4671 } 4672 4673 if ((!empty($CFG->forcelogin) and !isloggedin()) || 4674 (!empty($CFG->forceloginforprofileimage) && (!isloggedin() || isguestuser()))) { 4675 // protect images if login required and not logged in; 4676 // also if login is required for profile images and is not logged in or guest 4677 // do not use require_login() because it is expensive and not suitable here anyway 4678 $theme = theme_config::load($themename); 4679 redirect($theme->image_url('u/'.$filename, 'moodle')); // intentionally not cached 4680 } 4681 4682 if (!$file = $fs->get_file($context->id, 'user', 'icon', 0, '/', $filename.'.png')) { 4683 if (!$file = $fs->get_file($context->id, 'user', 'icon', 0, '/', $filename.'.jpg')) { 4684 if ($filename === 'f3') { 4685 // f3 512x512px was introduced in 2.3, there might be only the smaller version. 4686 if (!$file = $fs->get_file($context->id, 'user', 'icon', 0, '/', 'f1.png')) { 4687 $file = $fs->get_file($context->id, 'user', 'icon', 0, '/', 'f1.jpg'); 4688 } 4689 } 4690 } 4691 } 4692 if (!$file) { 4693 // bad reference - try to prevent future retries as hard as possible! 4694 if ($user = $DB->get_record('user', array('id'=>$context->instanceid), 'id, picture')) { 4695 if ($user->picture > 0) { 4696 $DB->set_field('user', 'picture', 0, array('id'=>$user->id)); 4697 } 4698 } 4699 // no redirect here because it is not cached 4700 $theme = theme_config::load($themename); 4701 $imagefile = $theme->resolve_image_location('u/'.$filename, 'moodle', null); 4702 send_file($imagefile, basename($imagefile), 60*60*24*14); 4703 } 4704 4705 $options = $sendfileoptions; 4706 if (empty($CFG->forcelogin) && empty($CFG->forceloginforprofileimage)) { 4707 // Profile images should be cache-able by both browsers and proxies according 4708 // to $CFG->forcelogin and $CFG->forceloginforprofileimage. 4709 $options['cacheability'] = 'public'; 4710 } 4711 send_stored_file($file, 60*60*24*365, 0, false, $options); // enable long caching, there are many images on each page 4712 4713 } else if ($filearea === 'private' and $context->contextlevel == CONTEXT_USER) { 4714 require_login(); 4715 4716 if (isguestuser()) { 4717 send_file_not_found(); 4718 } 4719 4720 if ($USER->id !== $context->instanceid) { 4721 send_file_not_found(); 4722 } 4723 4724 $filename = array_pop($args); 4725 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4726 if (!$file = $fs->get_file($context->id, $component, $filearea, 0, $filepath, $filename) or $file->is_directory()) { 4727 send_file_not_found(); 4728 } 4729 4730 \core\session\manager::write_close(); // Unlock session during file serving. 4731 send_stored_file($file, 0, 0, true, $sendfileoptions); // must force download - security! 4732 4733 } else if ($filearea === 'profile' and $context->contextlevel == CONTEXT_USER) { 4734 4735 if ($CFG->forcelogin) { 4736 require_login(); 4737 } 4738 4739 $userid = $context->instanceid; 4740 4741 if (!empty($CFG->forceloginforprofiles)) { 4742 require_once("{$CFG->dirroot}/user/lib.php"); 4743 4744 require_login(); 4745 4746 // Verify the current user is able to view the profile of the supplied user anywhere. 4747 $user = core_user::get_user($userid); 4748 if (!user_can_view_profile($user, null, $context)) { 4749 send_file_not_found(); 4750 } 4751 } 4752 4753 $filename = array_pop($args); 4754 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4755 if (!$file = $fs->get_file($context->id, $component, $filearea, 0, $filepath, $filename) or $file->is_directory()) { 4756 send_file_not_found(); 4757 } 4758 4759 \core\session\manager::write_close(); // Unlock session during file serving. 4760 send_stored_file($file, 0, 0, true, $sendfileoptions); // must force download - security! 4761 4762 } else if ($filearea === 'profile' and $context->contextlevel == CONTEXT_COURSE) { 4763 $userid = (int)array_shift($args); 4764 $usercontext = context_user::instance($userid); 4765 4766 if ($CFG->forcelogin) { 4767 require_login(); 4768 } 4769 4770 if (!empty($CFG->forceloginforprofiles)) { 4771 require_once("{$CFG->dirroot}/user/lib.php"); 4772 4773 require_login(); 4774 4775 // Verify the current user is able to view the profile of the supplied user in current course. 4776 $user = core_user::get_user($userid); 4777 if (!user_can_view_profile($user, $course, $usercontext)) { 4778 send_file_not_found(); 4779 } 4780 } 4781 4782 $filename = array_pop($args); 4783 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4784 if (!$file = $fs->get_file($usercontext->id, 'user', 'profile', 0, $filepath, $filename) or $file->is_directory()) { 4785 send_file_not_found(); 4786 } 4787 4788 \core\session\manager::write_close(); // Unlock session during file serving. 4789 send_stored_file($file, 0, 0, true, $sendfileoptions); // must force download - security! 4790 4791 } else if ($filearea === 'backup' and $context->contextlevel == CONTEXT_USER) { 4792 require_login(); 4793 4794 if (isguestuser()) { 4795 send_file_not_found(); 4796 } 4797 $userid = $context->instanceid; 4798 4799 if ($USER->id != $userid) { 4800 send_file_not_found(); 4801 } 4802 4803 $filename = array_pop($args); 4804 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4805 if (!$file = $fs->get_file($context->id, 'user', 'backup', 0, $filepath, $filename) or $file->is_directory()) { 4806 send_file_not_found(); 4807 } 4808 4809 \core\session\manager::write_close(); // Unlock session during file serving. 4810 send_stored_file($file, 0, 0, true, $sendfileoptions); // must force download - security! 4811 4812 } else { 4813 send_file_not_found(); 4814 } 4815 4816 // ======================================================================================================================== 4817 } else if ($component === 'coursecat') { 4818 if ($context->contextlevel != CONTEXT_COURSECAT) { 4819 send_file_not_found(); 4820 } 4821 4822 if ($filearea === 'description') { 4823 if ($CFG->forcelogin) { 4824 // no login necessary - unless login forced everywhere 4825 require_login(); 4826 } 4827 4828 // Check if user can view this category. 4829 if (!core_course_category::get($context->instanceid, IGNORE_MISSING)) { 4830 send_file_not_found(); 4831 } 4832 4833 $filename = array_pop($args); 4834 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4835 if (!$file = $fs->get_file($context->id, 'coursecat', 'description', 0, $filepath, $filename) or $file->is_directory()) { 4836 send_file_not_found(); 4837 } 4838 4839 \core\session\manager::write_close(); // Unlock session during file serving. 4840 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4841 } else { 4842 send_file_not_found(); 4843 } 4844 4845 // ======================================================================================================================== 4846 } else if ($component === 'course') { 4847 if ($context->contextlevel != CONTEXT_COURSE) { 4848 send_file_not_found(); 4849 } 4850 4851 if ($filearea === 'summary' || $filearea === 'overviewfiles') { 4852 if ($CFG->forcelogin) { 4853 require_login(); 4854 } 4855 4856 $filename = array_pop($args); 4857 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4858 if (!$file = $fs->get_file($context->id, 'course', $filearea, 0, $filepath, $filename) or $file->is_directory()) { 4859 send_file_not_found(); 4860 } 4861 4862 \core\session\manager::write_close(); // Unlock session during file serving. 4863 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4864 4865 } else if ($filearea === 'section') { 4866 if ($CFG->forcelogin) { 4867 require_login($course); 4868 } else if ($course->id != SITEID) { 4869 require_login($course); 4870 } 4871 4872 $sectionid = (int)array_shift($args); 4873 4874 if (!$section = $DB->get_record('course_sections', array('id'=>$sectionid, 'course'=>$course->id))) { 4875 send_file_not_found(); 4876 } 4877 4878 $filename = array_pop($args); 4879 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4880 if (!$file = $fs->get_file($context->id, 'course', 'section', $sectionid, $filepath, $filename) or $file->is_directory()) { 4881 send_file_not_found(); 4882 } 4883 4884 \core\session\manager::write_close(); // Unlock session during file serving. 4885 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4886 4887 } else { 4888 send_file_not_found(); 4889 } 4890 4891 } else if ($component === 'cohort') { 4892 4893 $cohortid = (int)array_shift($args); 4894 $cohort = $DB->get_record('cohort', array('id' => $cohortid), '*', MUST_EXIST); 4895 $cohortcontext = context::instance_by_id($cohort->contextid); 4896 4897 // The context in the file URL must be either cohort context or context of the course underneath the cohort's context. 4898 if ($context->id != $cohort->contextid && 4899 ($context->contextlevel != CONTEXT_COURSE || !in_array($cohort->contextid, $context->get_parent_context_ids()))) { 4900 send_file_not_found(); 4901 } 4902 4903 // User is able to access cohort if they have view cap on cohort level or 4904 // the cohort is visible and they have view cap on course level. 4905 $canview = has_capability('moodle/cohort:view', $cohortcontext) || 4906 ($cohort->visible && has_capability('moodle/cohort:view', $context)); 4907 4908 if ($filearea === 'description' && $canview) { 4909 $filename = array_pop($args); 4910 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4911 if (($file = $fs->get_file($cohortcontext->id, 'cohort', 'description', $cohort->id, $filepath, $filename)) 4912 && !$file->is_directory()) { 4913 \core\session\manager::write_close(); // Unlock session during file serving. 4914 send_stored_file($file, 60 * 60, 0, $forcedownload, $sendfileoptions); 4915 } 4916 } 4917 4918 send_file_not_found(); 4919 4920 } else if ($component === 'group') { 4921 if ($context->contextlevel != CONTEXT_COURSE) { 4922 send_file_not_found(); 4923 } 4924 4925 require_course_login($course, true, null, false); 4926 4927 $groupid = (int)array_shift($args); 4928 4929 $group = $DB->get_record('groups', array('id'=>$groupid, 'courseid'=>$course->id), '*', MUST_EXIST); 4930 if (($course->groupmodeforce and $course->groupmode == SEPARATEGROUPS) and !has_capability('moodle/site:accessallgroups', $context) and !groups_is_member($group->id, $USER->id)) { 4931 // do not allow access to separate group info if not member or teacher 4932 send_file_not_found(); 4933 } 4934 4935 if ($filearea === 'description') { 4936 4937 require_login($course); 4938 4939 $filename = array_pop($args); 4940 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4941 if (!$file = $fs->get_file($context->id, 'group', 'description', $group->id, $filepath, $filename) or $file->is_directory()) { 4942 send_file_not_found(); 4943 } 4944 4945 \core\session\manager::write_close(); // Unlock session during file serving. 4946 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4947 4948 } else if ($filearea === 'icon') { 4949 $filename = array_pop($args); 4950 4951 if ($filename !== 'f1' and $filename !== 'f2') { 4952 send_file_not_found(); 4953 } 4954 if (!$file = $fs->get_file($context->id, 'group', 'icon', $group->id, '/', $filename.'.png')) { 4955 if (!$file = $fs->get_file($context->id, 'group', 'icon', $group->id, '/', $filename.'.jpg')) { 4956 send_file_not_found(); 4957 } 4958 } 4959 4960 \core\session\manager::write_close(); // Unlock session during file serving. 4961 send_stored_file($file, 60*60, 0, false, $sendfileoptions); 4962 4963 } else { 4964 send_file_not_found(); 4965 } 4966 4967 } else if ($component === 'grouping') { 4968 if ($context->contextlevel != CONTEXT_COURSE) { 4969 send_file_not_found(); 4970 } 4971 4972 require_login($course); 4973 4974 $groupingid = (int)array_shift($args); 4975 4976 // note: everybody has access to grouping desc images for now 4977 if ($filearea === 'description') { 4978 4979 $filename = array_pop($args); 4980 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 4981 if (!$file = $fs->get_file($context->id, 'grouping', 'description', $groupingid, $filepath, $filename) or $file->is_directory()) { 4982 send_file_not_found(); 4983 } 4984 4985 \core\session\manager::write_close(); // Unlock session during file serving. 4986 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 4987 4988 } else { 4989 send_file_not_found(); 4990 } 4991 4992 // ======================================================================================================================== 4993 } else if ($component === 'backup') { 4994 if ($filearea === 'course' and $context->contextlevel == CONTEXT_COURSE) { 4995 require_login($course); 4996 require_capability('moodle/backup:downloadfile', $context); 4997 4998 $filename = array_pop($args); 4999 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 5000 if (!$file = $fs->get_file($context->id, 'backup', 'course', 0, $filepath, $filename) or $file->is_directory()) { 5001 send_file_not_found(); 5002 } 5003 5004 \core\session\manager::write_close(); // Unlock session during file serving. 5005 send_stored_file($file, 0, 0, $forcedownload, $sendfileoptions); 5006 5007 } else if ($filearea === 'section' and $context->contextlevel == CONTEXT_COURSE) { 5008 require_login($course); 5009 require_capability('moodle/backup:downloadfile', $context); 5010 5011 $sectionid = (int)array_shift($args); 5012 5013 $filename = array_pop($args); 5014 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 5015 if (!$file = $fs->get_file($context->id, 'backup', 'section', $sectionid, $filepath, $filename) or $file->is_directory()) { 5016 send_file_not_found(); 5017 } 5018 5019 \core\session\manager::write_close(); 5020 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 5021 5022 } else if ($filearea === 'activity' and $context->contextlevel == CONTEXT_MODULE) { 5023 require_login($course, false, $cm); 5024 require_capability('moodle/backup:downloadfile', $context); 5025 5026 $filename = array_pop($args); 5027 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 5028 if (!$file = $fs->get_file($context->id, 'backup', 'activity', 0, $filepath, $filename) or $file->is_directory()) { 5029 send_file_not_found(); 5030 } 5031 5032 \core\session\manager::write_close(); 5033 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 5034 5035 } else if ($filearea === 'automated' and $context->contextlevel == CONTEXT_COURSE) { 5036 // Backup files that were generated by the automated backup systems. 5037 5038 require_login($course); 5039 require_capability('moodle/backup:downloadfile', $context); 5040 require_capability('moodle/restore:userinfo', $context); 5041 5042 $filename = array_pop($args); 5043 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 5044 if (!$file = $fs->get_file($context->id, 'backup', 'automated', 0, $filepath, $filename) or $file->is_directory()) { 5045 send_file_not_found(); 5046 } 5047 5048 \core\session\manager::write_close(); // Unlock session during file serving. 5049 send_stored_file($file, 0, 0, $forcedownload, $sendfileoptions); 5050 5051 } else { 5052 send_file_not_found(); 5053 } 5054 5055 // ======================================================================================================================== 5056 } else if ($component === 'question') { 5057 require_once($CFG->libdir . '/questionlib.php'); 5058 question_pluginfile($course, $context, 'question', $filearea, $args, $forcedownload, $sendfileoptions); 5059 send_file_not_found(); 5060 5061 // ======================================================================================================================== 5062 } else if ($component === 'grading') { 5063 if ($filearea === 'description') { 5064 // files embedded into the form definition description 5065 5066 if ($context->contextlevel == CONTEXT_SYSTEM) { 5067 require_login(); 5068 5069 } else if ($context->contextlevel >= CONTEXT_COURSE) { 5070 require_login($course, false, $cm); 5071 5072 } else { 5073 send_file_not_found(); 5074 } 5075 5076 $formid = (int)array_shift($args); 5077 5078 $sql = "SELECT ga.id 5079 FROM {grading_areas} ga 5080 JOIN {grading_definitions} gd ON (gd.areaid = ga.id) 5081 WHERE gd.id = ? AND ga.contextid = ?"; 5082 $areaid = $DB->get_field_sql($sql, array($formid, $context->id), IGNORE_MISSING); 5083 5084 if (!$areaid) { 5085 send_file_not_found(); 5086 } 5087 5088 $fullpath = "/$context->id/$component/$filearea/$formid/".implode('/', $args); 5089 5090 if (!$file = $fs->get_file_by_hash(sha1($fullpath)) or $file->is_directory()) { 5091 send_file_not_found(); 5092 } 5093 5094 \core\session\manager::write_close(); // Unlock session during file serving. 5095 send_stored_file($file, 60*60, 0, $forcedownload, $sendfileoptions); 5096 } 5097 } else if ($component === 'contentbank') { 5098 if ($filearea != 'public' || isguestuser()) { 5099 send_file_not_found(); 5100 } 5101 5102 if ($context->contextlevel == CONTEXT_SYSTEM || $context->contextlevel == CONTEXT_COURSECAT) { 5103 require_login(); 5104 } else if ($context->contextlevel == CONTEXT_COURSE) { 5105 require_login($course); 5106 } else { 5107 send_file_not_found(); 5108 } 5109 5110 $itemid = (int)array_shift($args); 5111 $filename = array_pop($args); 5112 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 5113 if (!$file = $fs->get_file($context->id, $component, $filearea, $itemid, $filepath, $filename) or 5114 $file->is_directory()) { 5115 send_file_not_found(); 5116 } 5117 5118 \core\session\manager::write_close(); // Unlock session during file serving. 5119 send_stored_file($file, 0, 0, true, $sendfileoptions); // must force download - security! 5120 } else if (strpos($component, 'mod_') === 0) { 5121 $modname = substr($component, 4); 5122 if (!file_exists("$CFG->dirroot/mod/$modname/lib.php")) { 5123 send_file_not_found(); 5124 } 5125 require_once("$CFG->dirroot/mod/$modname/lib.php"); 5126 5127 if ($context->contextlevel == CONTEXT_MODULE) { 5128 if ($cm->modname !== $modname) { 5129 // somebody tries to gain illegal access, cm type must match the component! 5130 send_file_not_found(); 5131 } 5132 } 5133 5134 if ($filearea === 'intro') { 5135 if (!plugin_supports('mod', $modname, FEATURE_MOD_INTRO, true)) { 5136 send_file_not_found(); 5137 } 5138 5139 // Require login to the course first (without login to the module). 5140 require_course_login($course, true); 5141 5142 // Now check if module is available OR it is restricted but the intro is shown on the course page. 5143 $cminfo = cm_info::create($cm); 5144 if (!$cminfo->uservisible) { 5145 if (!$cm->showdescription || !$cminfo->is_visible_on_course_page()) { 5146 // Module intro is not visible on the course page and module is not available, show access error. 5147 require_course_login($course, true, $cminfo); 5148 } 5149 } 5150 5151 // all users may access it 5152 $filename = array_pop($args); 5153 $filepath = $args ? '/'.implode('/', $args).'/' : '/'; 5154 if (!$file = $fs->get_file($context->id, 'mod_'.$modname, 'intro', 0, $filepath, $filename) or $file->is_directory()) { 5155 send_file_not_found(); 5156 } 5157 5158 // finally send the file 5159 send_stored_file($file, null, 0, false, $sendfileoptions); 5160 } 5161 5162 $filefunction = $component.'_pluginfile'; 5163 $filefunctionold = $modname.'_pluginfile'; 5164 if (function_exists($filefunction)) { 5165 // if the function exists, it must send the file and terminate. Whatever it returns leads to "not found" 5166 $filefunction($course, $cm, $context, $filearea, $args, $forcedownload, $sendfileoptions); 5167 } else if (function_exists($filefunctionold)) { 5168 // if the function exists, it must send the file and terminate. Whatever it returns leads to "not found" 5169 $filefunctionold($course, $cm, $context, $filearea, $args, $forcedownload, $sendfileoptions); 5170 } 5171 5172 send_file_not_found(); 5173 5174 // ======================================================================================================================== 5175 } else if (strpos($component, 'block_') === 0) { 5176 $blockname = substr($component, 6); 5177 // note: no more class methods in blocks please, that is .... 5178 if (!file_exists("$CFG->dirroot/blocks/$blockname/lib.php")) { 5179 send_file_not_found(); 5180 } 5181 require_once("$CFG->dirroot/blocks/$blockname/lib.php"); 5182 5183 if ($context->contextlevel == CONTEXT_BLOCK) { 5184 $birecord = $DB->get_record('block_instances', array('id'=>$context->instanceid), '*',MUST_EXIST); 5185 if ($birecord->blockname !== $blockname) { 5186 // somebody tries to gain illegal access, cm type must match the component! 5187 send_file_not_found(); 5188 } 5189 5190 if ($context->get_course_context(false)) { 5191 // If block is in course context, then check if user has capability to access course. 5192 require_course_login($course); 5193 } else if ($CFG->forcelogin) { 5194 // If user is logged out, bp record will not be visible, even if the user would have access if logged in. 5195 require_login(); 5196 } 5197 5198 $bprecord = $DB->get_record('block_positions', array('contextid' => $context->id, 'blockinstanceid' => $context->instanceid)); 5199 // User can't access file, if block is hidden or doesn't have block:view capability 5200 if (($bprecord && !$bprecord->visible) || !has_capability('moodle/block:view', $context)) { 5201 send_file_not_found(); 5202 } 5203 } else { 5204 $birecord = null; 5205 } 5206 5207 $filefunction = $component.'_pluginfile'; 5208 if (function_exists($filefunction)) { 5209 // if the function exists, it must send the file and terminate. Whatever it returns leads to "not found" 5210 $filefunction($course, $birecord, $context, $filearea, $args, $forcedownload, $sendfileoptions); 5211 } 5212 5213 send_file_not_found(); 5214 5215 // ======================================================================================================================== 5216 } else if (strpos($component, '_') === false) { 5217 // all core subsystems have to be specified above, no more guessing here! 5218 send_file_not_found(); 5219 5220 } else { 5221 // try to serve general plugin file in arbitrary context 5222 $dir = core_component::get_component_directory($component); 5223 if (!file_exists("$dir/lib.php")) { 5224 send_file_not_found(); 5225 } 5226 include_once("$dir/lib.php"); 5227 5228 $filefunction = $component.'_pluginfile'; 5229 if (function_exists($filefunction)) { 5230 // if the function exists, it must send the file and terminate. Whatever it returns leads to "not found" 5231 $filefunction($course, $cm, $context, $filearea, $args, $forcedownload, $sendfileoptions); 5232 } 5233 5234 send_file_not_found(); 5235 } 5236 5237 }
title
Description
Body
title
Description
Body
title
Description
Body
title
Body