Localisation updates from https://translatewiki.net.
[mediawiki.git] / includes / upload / UploadStash.php
blob593f7576181f0b72a047bc175fd6dd9fa793d416
1 <?php
2 /**
3 * Temporary storage for uploaded files.
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
18 * http://www.gnu.org/copyleft/gpl.html
20 * @file
23 use MediaWiki\Context\RequestContext;
24 use MediaWiki\MainConfigNames;
25 use MediaWiki\MediaWikiServices;
26 use MediaWiki\User\UserIdentity;
28 /**
29 * UploadStash is intended to accomplish a few things:
30 * - Enable applications to temporarily stash files without publishing them to
31 * the wiki.
32 * - Several parts of MediaWiki do this in similar ways: UploadBase,
33 * UploadWizard, and FirefoggChunkedExtension.
34 * And there are several that reimplement stashing from scratch, in
35 * idiosyncratic ways. The idea is to unify them all here.
36 * Mostly all of them are the same except for storing some custom fields,
37 * which we subsume into the data array.
38 * - Enable applications to find said files later, as long as the db table or
39 * temp files haven't been purged.
40 * - Enable the uploading user (and *ONLY* the uploading user) to access said
41 * files, and thumbnails of said files, via a URL. We accomplish this using
42 * a database table, with ownership checking as you might expect. See
43 * SpecialUploadStash, which implements a web interface to some files stored
44 * this way.
46 * UploadStash right now is *mostly* intended to show you one user's slice of
47 * the entire stash. The user parameter is only optional because there are few
48 * cases where we clean out the stash from an automated script. In the future we
49 * might refactor this.
51 * UploadStash represents the entire stash of temporary files.
52 * UploadStashFile is a filestore for the actual physical disk files.
53 * UploadFromStash extends UploadBase, and represents a single stashed file as
54 * it is moved from the stash to the regular file repository
56 * @ingroup Upload
58 class UploadStash {
59 // Format of the key for files -- has to be suitable as a filename itself (e.g. ab12cd34ef.jpg)
60 public const KEY_FORMAT_REGEX = '/^[\w\-\.]+\.\w*$/';
61 private const MAX_US_PROPS_SIZE = 65535;
63 /**
64 * repository that this uses to store temp files
65 * public because we sometimes need to get a LocalFile within the same repo.
67 * @var LocalRepo
69 public $repo;
71 /** @var array array of initialized repo objects */
72 protected $files = [];
74 /** @var array cache of the file metadata that's stored in the database */
75 protected $fileMetadata = [];
77 /** @var array fileprops cache */
78 protected $fileProps = [];
80 /** @var UserIdentity */
81 private $user;
83 /**
84 * Represents a temporary filestore, with metadata in the database.
85 * Designed to be compatible with the session stashing code in UploadBase
86 * (should replace it eventually).
88 * @param FileRepo $repo
89 * @param UserIdentity|null $user
91 public function __construct( FileRepo $repo, ?UserIdentity $user = null ) {
92 // this might change based on wiki's configuration.
93 $this->repo = $repo;
95 // if a user was passed, use it. otherwise, attempt to use the global request context.
96 // this keeps FileRepo from breaking when it creates an UploadStash object
97 $this->user = $user ?? RequestContext::getMain()->getUser();
101 * Get a file and its metadata from the stash.
102 * The noAuth param is a bit janky but is required for automated scripts
103 * which clean out the stash.
105 * @param string $key Key under which file information is stored
106 * @param bool $noAuth (optional) Don't check authentication. Used by maintenance scripts.
107 * @throws UploadStashFileNotFoundException
108 * @throws UploadStashNotLoggedInException
109 * @throws UploadStashWrongOwnerException
110 * @throws UploadStashBadPathException
111 * @return UploadStashFile
113 public function getFile( $key, $noAuth = false ) {
114 if ( !preg_match( self::KEY_FORMAT_REGEX, $key ) ) {
115 throw new UploadStashBadPathException(
116 wfMessage( 'uploadstash-bad-path-bad-format', $key )
120 if ( !$noAuth && !$this->user->isRegistered() ) {
121 throw new UploadStashNotLoggedInException(
122 wfMessage( 'uploadstash-not-logged-in' )
126 if ( !isset( $this->fileMetadata[$key] ) ) {
127 if ( !$this->fetchFileMetadata( $key ) ) {
128 // If nothing was received, it's likely due to replication lag.
129 // Check the primary DB to see if the record is there.
130 $this->fetchFileMetadata( $key, DB_PRIMARY );
133 if ( !isset( $this->fileMetadata[$key] ) ) {
134 throw new UploadStashFileNotFoundException(
135 wfMessage( 'uploadstash-file-not-found', $key )
139 // create $this->files[$key]
140 $this->initFile( $key );
142 // fetch fileprops
143 if (
144 isset( $this->fileMetadata[$key]['us_props'] ) && strlen( $this->fileMetadata[$key]['us_props'] )
146 $this->fileProps[$key] = unserialize( $this->fileMetadata[$key]['us_props'] );
147 } else { // b/c for rows with no us_props
148 wfDebug( __METHOD__ . " fetched props for $key from file" );
149 $path = $this->fileMetadata[$key]['us_path'];
150 $this->fileProps[$key] = $this->repo->getFileProps( $path );
154 if ( !$this->files[$key]->exists() ) {
155 wfDebug( __METHOD__ . " tried to get file at $key, but it doesn't exist" );
156 // @todo Is this not an UploadStashFileNotFoundException case?
157 throw new UploadStashBadPathException(
158 wfMessage( 'uploadstash-bad-path' )
162 if ( !$noAuth && $this->fileMetadata[$key]['us_user'] != $this->user->getId() ) {
163 throw new UploadStashWrongOwnerException(
164 wfMessage( 'uploadstash-wrong-owner', $key )
168 return $this->files[$key];
172 * Getter for file metadata.
174 * @param string $key Key under which file information is stored
175 * @return array
177 public function getMetadata( $key ) {
178 $this->getFile( $key );
180 return $this->fileMetadata[$key];
184 * Getter for fileProps
186 * @param string $key Key under which file information is stored
187 * @return array
189 public function getFileProps( $key ) {
190 $this->getFile( $key );
192 return $this->fileProps[$key];
196 * Stash a file in a temp directory and record that we did this in the
197 * database, along with other metadata.
199 * @param string $path Path to file you want stashed
200 * @param string|null $sourceType The type of upload that generated this file
201 * (currently, I believe, 'file' or null)
202 * @param array|null $fileProps File props or null to regenerate
203 * @throws UploadStashBadPathException
204 * @throws UploadStashFileException
205 * @throws UploadStashNotLoggedInException
206 * @return UploadStashFile|null File, or null on failure
208 public function stashFile( $path, $sourceType = null, $fileProps = null ) {
209 if ( !is_file( $path ) ) {
210 wfDebug( __METHOD__ . " tried to stash file at '$path', but it doesn't exist" );
211 throw new UploadStashBadPathException(
212 wfMessage( 'uploadstash-bad-path' )
216 // File props is expensive to generate for large files, so reuse if possible.
217 if ( !$fileProps ) {
218 $mwProps = new MWFileProps( MediaWikiServices::getInstance()->getMimeAnalyzer() );
219 $fileProps = $mwProps->getPropsFromPath( $path, true );
221 wfDebug( __METHOD__ . " stashing file at '$path'" );
223 // we will be initializing from some tmpnam files that don't have extensions.
224 // most of MediaWiki assumes all uploaded files have good extensions. So, we fix this.
225 $extension = self::getExtensionForPath( $path );
226 if ( !preg_match( "/\\.\\Q$extension\\E$/", $path ) ) {
227 $pathWithGoodExtension = "$path.$extension";
228 } else {
229 $pathWithGoodExtension = $path;
232 // If no key was supplied, make one. a mysql insertid would be totally
233 // reasonable here, except that for historical reasons, the key is this
234 // random thing instead. At least it's not guessable.
235 // Some things that when combined will make a suitably unique key.
236 // see: http://www.jwz.org/doc/mid.html
237 [ $usec, $sec ] = explode( ' ', microtime() );
238 $usec = substr( $usec, 2 );
239 $key = Wikimedia\base_convert( $sec . $usec, 10, 36 ) . '.' .
240 Wikimedia\base_convert( (string)mt_rand(), 10, 36 ) . '.' .
241 $this->user->getId() . '.' .
242 $extension;
244 $this->fileProps[$key] = $fileProps;
246 if ( !preg_match( self::KEY_FORMAT_REGEX, $key ) ) {
247 throw new UploadStashBadPathException(
248 wfMessage( 'uploadstash-bad-path-bad-format', $key )
252 wfDebug( __METHOD__ . " key for '$path': $key" );
254 // if not already in a temporary area, put it there
255 $storeStatus = $this->repo->storeTemp( basename( $pathWithGoodExtension ), $path );
257 if ( !$storeStatus->isOK() ) {
258 // It is a convention in MediaWiki to only return one error per API
259 // exception, even if multiple errors are available.[citation needed]
260 // Pick the "first" thing that was wrong, preferring errors to warnings.
261 // This is a bit lame, as we may have more info in the
262 // $storeStatus and we're throwing it away, but to fix it means
263 // redesigning API errors significantly.
264 // $storeStatus->value just contains the virtual URL (if anything)
265 // which is probably useless to the caller.
266 foreach ( $storeStatus->getMessages( 'error' ) as $msg ) {
267 throw new UploadStashFileException( $msg );
269 foreach ( $storeStatus->getMessages( 'warning' ) as $msg ) {
270 throw new UploadStashFileException( $msg );
272 // XXX: This isn't a real message, hopefully this case is unreachable
273 throw new UploadStashFileException( [ 'unknown', 'no error recorded' ] );
275 $stashPath = $storeStatus->value;
277 // fetch the current user ID
278 if ( !$this->user->isRegistered() ) {
279 throw new UploadStashNotLoggedInException(
280 wfMessage( 'uploadstash-not-logged-in' )
284 // insert the file metadata into the db.
285 wfDebug( __METHOD__ . " inserting $stashPath under $key" );
286 $dbw = $this->repo->getPrimaryDB();
288 $serializedFileProps = serialize( $fileProps );
289 if ( strlen( $serializedFileProps ) > self::MAX_US_PROPS_SIZE ) {
290 // Database is going to truncate this and make the field invalid.
291 // Prioritize important metadata over file handler metadata.
292 // File handler should be prepared to regenerate invalid metadata if needed.
293 $fileProps['metadata'] = [];
294 $serializedFileProps = serialize( $fileProps );
297 $insertRow = [
298 'us_user' => $this->user->getId(),
299 'us_key' => $key,
300 'us_orig_path' => $path,
301 'us_path' => $stashPath, // virtual URL
302 'us_props' => $dbw->encodeBlob( $serializedFileProps ),
303 'us_size' => $fileProps['size'],
304 'us_sha1' => $fileProps['sha1'],
305 'us_mime' => $fileProps['mime'],
306 'us_media_type' => $fileProps['media_type'],
307 'us_image_width' => $fileProps['width'],
308 'us_image_height' => $fileProps['height'],
309 'us_image_bits' => $fileProps['bits'],
310 'us_source_type' => $sourceType,
311 'us_timestamp' => $dbw->timestamp(),
312 'us_status' => 'finished'
315 $dbw->newInsertQueryBuilder()
316 ->insertInto( 'uploadstash' )
317 ->row( $insertRow )
318 ->caller( __METHOD__ )->execute();
320 // store the insertid in the class variable so immediate retrieval
321 // (possibly laggy) isn't necessary.
322 $insertRow['us_id'] = $dbw->insertId();
324 $this->fileMetadata[$key] = $insertRow;
326 # create the UploadStashFile object for this file.
327 $this->initFile( $key );
329 return $this->getFile( $key );
333 * Remove all files from the stash.
334 * Does not clean up files in the repo, just the record of them.
336 * @throws UploadStashNotLoggedInException
337 * @return bool Success
339 public function clear() {
340 if ( !$this->user->isRegistered() ) {
341 throw new UploadStashNotLoggedInException(
342 wfMessage( 'uploadstash-not-logged-in' )
346 wfDebug( __METHOD__ . ' clearing all rows for user ' . $this->user->getId() );
347 $dbw = $this->repo->getPrimaryDB();
348 $dbw->newDeleteQueryBuilder()
349 ->deleteFrom( 'uploadstash' )
350 ->where( [ 'us_user' => $this->user->getId() ] )
351 ->caller( __METHOD__ )->execute();
353 # destroy objects.
354 $this->files = [];
355 $this->fileMetadata = [];
357 return true;
361 * Remove a particular file from the stash. Also removes it from the repo.
363 * @param string $key
364 * @throws UploadStashNoSuchKeyException|UploadStashNotLoggedInException
365 * @throws UploadStashWrongOwnerException
366 * @return bool Success
368 public function removeFile( $key ) {
369 if ( !$this->user->isRegistered() ) {
370 throw new UploadStashNotLoggedInException(
371 wfMessage( 'uploadstash-not-logged-in' )
375 $dbw = $this->repo->getPrimaryDB();
377 // this is a cheap query. it runs on the primary DB so that this function
378 // still works when there's lag. It won't be called all that often.
379 $row = $dbw->newSelectQueryBuilder()
380 ->select( 'us_user' )
381 ->from( 'uploadstash' )
382 ->where( [ 'us_key' => $key ] )
383 ->caller( __METHOD__ )->fetchRow();
385 if ( !$row ) {
386 throw new UploadStashNoSuchKeyException(
387 wfMessage( 'uploadstash-no-such-key', $key )
391 if ( $row->us_user != $this->user->getId() ) {
392 throw new UploadStashWrongOwnerException(
393 wfMessage( 'uploadstash-wrong-owner', $key )
397 return $this->removeFileNoAuth( $key );
401 * Remove a file (see removeFile), but doesn't check ownership first.
403 * @param string $key
404 * @return bool Success
406 public function removeFileNoAuth( $key ) {
407 wfDebug( __METHOD__ . " clearing row $key" );
409 // Ensure we have the UploadStashFile loaded for this key
410 $this->getFile( $key, true );
412 $dbw = $this->repo->getPrimaryDB();
414 $dbw->newDeleteQueryBuilder()
415 ->deleteFrom( 'uploadstash' )
416 ->where( [ 'us_key' => $key ] )
417 ->caller( __METHOD__ )->execute();
419 /** @todo Look into UnregisteredLocalFile and find out why the rv here is
420 * sometimes wrong (false when file was removed). For now, ignore.
422 $this->files[$key]->remove();
424 unset( $this->files[$key] );
425 unset( $this->fileMetadata[$key] );
427 return true;
431 * List all files in the stash.
433 * @throws UploadStashNotLoggedInException
434 * @return array|false
436 public function listFiles() {
437 if ( !$this->user->isRegistered() ) {
438 throw new UploadStashNotLoggedInException(
439 wfMessage( 'uploadstash-not-logged-in' )
443 $res = $this->repo->getReplicaDB()->newSelectQueryBuilder()
444 ->select( 'us_key' )
445 ->from( 'uploadstash' )
446 ->where( [ 'us_user' => $this->user->getId() ] )
447 ->caller( __METHOD__ )->fetchResultSet();
449 if ( $res->numRows() == 0 ) {
450 // nothing to do.
451 return false;
454 // finish the read before starting writes.
455 $keys = [];
456 foreach ( $res as $row ) {
457 $keys[] = $row->us_key;
460 return $keys;
464 * Find or guess extension -- ensuring that our extension matches our MIME type.
465 * Since these files are constructed from php tempnames they may not start off
466 * with an extension.
467 * XXX this is somewhat redundant with the checks that ApiUpload.php does with incoming
468 * uploads versus the desired filename. Maybe we can get that passed to us...
469 * @param string $path
470 * @return string
472 public static function getExtensionForPath( $path ) {
473 $prohibitedFileExtensions = MediaWikiServices::getInstance()
474 ->getMainConfig()->get( MainConfigNames::ProhibitedFileExtensions );
475 // Does this have an extension?
476 $n = strrpos( $path, '.' );
478 if ( $n !== false ) {
479 $extension = $n ? substr( $path, $n + 1 ) : '';
480 } else {
481 // If not, assume that it should be related to the MIME type of the original file.
482 $magic = MediaWikiServices::getInstance()->getMimeAnalyzer();
483 $mimeType = $magic->guessMimeType( $path );
484 $extension = $magic->getExtensionFromMimeTypeOrNull( $mimeType ) ?? '';
487 $extension = File::normalizeExtension( $extension );
488 if ( in_array( $extension, $prohibitedFileExtensions ) ) {
489 // The file should already be checked for being evil.
490 // However, if somehow we got here, we definitely
491 // don't want to give it an extension of .php and
492 // put it in a web accessible directory.
493 return '';
496 return $extension;
500 * Helper function: do the actual database query to fetch file metadata.
502 * @param string $key
503 * @param int $readFromDB Constant (default: DB_REPLICA)
504 * @return bool
506 protected function fetchFileMetadata( $key, $readFromDB = DB_REPLICA ) {
507 // populate $fileMetadata[$key]
508 if ( $readFromDB === DB_PRIMARY ) {
509 // sometimes reading from the primary DB is necessary, if there's replication lag.
510 $dbr = $this->repo->getPrimaryDB();
511 } else {
512 $dbr = $this->repo->getReplicaDB();
515 $row = $dbr->newSelectQueryBuilder()
516 ->select( [
517 'us_user', 'us_key', 'us_orig_path', 'us_path', 'us_props',
518 'us_size', 'us_sha1', 'us_mime', 'us_media_type',
519 'us_image_width', 'us_image_height', 'us_image_bits',
520 'us_source_type', 'us_timestamp', 'us_status',
522 ->from( 'uploadstash' )
523 ->where( [ 'us_key' => $key ] )
524 ->caller( __METHOD__ )->fetchRow();
526 if ( !is_object( $row ) ) {
527 // key wasn't present in the database. this will happen sometimes.
528 return false;
531 $this->fileMetadata[$key] = (array)$row;
532 $this->fileMetadata[$key]['us_props'] = $dbr->decodeBlob( $row->us_props );
534 return true;
538 * Helper function: Initialize the UploadStashFile for a given file.
540 * @param string $key Key under which to store the object
541 * @throws UploadStashZeroLengthFileException
542 * @return bool
544 protected function initFile( $key ) {
545 $file = new UploadStashFile(
546 $this->repo,
547 $this->fileMetadata[$key]['us_path'],
548 $key,
549 $this->fileMetadata[$key]['us_sha1']
551 if ( $file->getSize() === 0 ) {
552 throw new UploadStashZeroLengthFileException(
553 wfMessage( 'uploadstash-zero-length' )
556 $this->files[$key] = $file;
558 return true;