Was occassionally failing due to race condition caused by mt_rand behaviour:
[mediawiki.git] / includes / upload / UploadFromStash.php
blob22f8e9b26b46f0ac82c073c1feb6bb24f5bb9992
1 <?php
3 class UploadFromStash extends UploadBase {
5 static function isValidSessionKey( $key, $sessionData ) {
6 return !empty( $key ) &&
7 is_array( $sessionData ) &&
8 isset( $sessionData[$key] ) &&
9 isset( $sessionData[$key]['version'] ) &&
10 $sessionData[$key]['version'] == self::SESSION_VERSION;
13 static function isValidRequest( $request ) {
14 $sessionData = $request->getSessionData( 'wsUploadData' );
15 return self::isValidSessionKey(
16 $request->getInt( 'wpSessionKey' ),
17 $sessionData
21 * some $na vars for uploadBase method compatibility.
23 function initialize( $name, $sessionData, $na, $na2=false ) {
24 /**
25 * Confirming a temporarily stashed upload.
26 * We don't want path names to be forged, so we keep
27 * them in the session on the server and just give
28 * an opaque key to the user agent.
30 parent::initialize( $name,
31 $sessionData['mTempPath'],
32 $sessionData['mFileSize'],
33 false
36 $this->mFileProps = $sessionData['mFileProps'];
39 function initializeFromRequest( &$request ) {
40 $sessionKey = $request->getInt( 'wpSessionKey' );
41 $sessionData = $request->getSessionData('wsUploadData');
43 $desiredDestName = $request->getText( 'wpDestFile' );
44 if( !$desiredDestName )
45 $desiredDestName = $request->getText( 'wpUploadFile' );
46 return $this->initialize( $desiredDestName, $sessionData[$sessionKey], false );
49 /**
50 * File has been previously verified so no need to do so again.
52 protected function verifyFile( $tmpfile ) {
53 return true;
56 /**
57 * We're here from "ignore warnings anyway" so return just OK
59 function checkWarnings() {
60 return array();