2018-01-09 21:13:45 +00:00
< ? php
/**
2023-01-01 14:36:24 +00:00
* @ copyright Copyright ( C ) 2010 - 2023 , the Friendica project
2020-02-09 14:45:36 +00:00
*
* @ license GNU AGPL version 3 or any later version
*
* This program is free software : you can redistribute it and / or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation , either version 3 of the
* License , or ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU Affero General Public License for more details .
*
* You should have received a copy of the GNU Affero General Public License
* along with this program . If not , see < https :// www . gnu . org / licenses />.
*
2018-01-09 21:13:45 +00:00
*/
namespace Friendica\Model ;
2023-07-26 05:50:15 +00:00
use Friendica\Contact\LocalRelationship\Entity\LocalRelationship ;
2018-07-20 02:15:21 +00:00
use Friendica\Content\Text\BBCode ;
2018-11-07 02:12:41 +00:00
use Friendica\Content\Text\HTML ;
2018-12-26 06:06:24 +00:00
use Friendica\Core\Hook ;
2018-10-29 21:20:46 +00:00
use Friendica\Core\Logger ;
2018-08-11 20:40:44 +00:00
use Friendica\Core\Protocol ;
2018-11-07 02:12:41 +00:00
use Friendica\Core\Renderer ;
2019-10-23 19:38:51 +00:00
use Friendica\Core\System ;
2018-02-01 19:14:11 +00:00
use Friendica\Core\Worker ;
2018-07-20 12:19:26 +00:00
use Friendica\Database\DBA ;
2019-12-15 21:34:11 +00:00
use Friendica\DI ;
2023-08-28 04:05:52 +00:00
use Friendica\Model\Post\Category ;
2023-04-03 04:05:40 +00:00
use Friendica\Network\HTTPException\InternalServerErrorException ;
2019-10-23 00:05:11 +00:00
use Friendica\Protocol\Activity ;
2019-07-21 07:37:50 +00:00
use Friendica\Protocol\ActivityPub ;
2022-12-30 21:20:28 +00:00
use Friendica\Protocol\Delivery ;
2018-02-01 19:14:11 +00:00
use Friendica\Protocol\Diaspora ;
2018-01-27 02:38:34 +00:00
use Friendica\Util\DateTimeFormat ;
2018-11-07 02:12:41 +00:00
use Friendica\Util\Map ;
2019-05-29 17:57:18 +00:00
use Friendica\Util\Network ;
2021-04-28 19:05:46 +00:00
use Friendica\Util\Proxy ;
2018-11-08 13:45:46 +00:00
use Friendica\Util\Strings ;
2022-05-16 04:55:15 +00:00
use Friendica\Util\Temporal ;
2022-07-29 14:17:53 +00:00
use GuzzleHttp\Psr7\Uri ;
2020-10-03 15:42:21 +00:00
use LanguageDetection\Language ;
2018-01-09 21:13:45 +00:00
2019-12-15 22:28:01 +00:00
class Item
2018-01-09 21:13:45 +00:00
{
2018-07-19 13:52:05 +00:00
// Posting types, inspired by https://www.w3.org/TR/activitystreams-vocabulary/#object-types
const PT_ARTICLE = 0 ;
const PT_NOTE = 1 ;
const PT_PAGE = 2 ;
const PT_IMAGE = 16 ;
const PT_AUDIO = 17 ;
const PT_VIDEO = 18 ;
const PT_DOCUMENT = 19 ;
const PT_EVENT = 32 ;
2022-01-23 04:40:45 +00:00
const PT_POLL = 33 ;
2018-07-19 13:52:05 +00:00
const PT_PERSONAL_NOTE = 128 ;
2021-04-07 06:02:06 +00:00
// Posting reasons (Why had a post been stored for a user?)
const PR_NONE = 0 ;
const PR_TAG = 64 ;
const PR_TO = 65 ;
const PR_CC = 66 ;
const PR_BTO = 67 ;
const PR_BCC = 68 ;
const PR_FOLLOWER = 69 ;
const PR_ANNOUNCEMENT = 70 ;
const PR_COMMENT = 71 ;
const PR_STORED = 72 ;
const PR_GLOBAL = 73 ;
const PR_RELAY = 74 ;
const PR_FETCHED = 75 ;
2022-07-29 14:17:53 +00:00
const PR_COMPLETION = 76 ;
const PR_DIRECT = 77 ;
const PR_ACTIVITY = 78 ;
const PR_DISTRIBUTE = 79 ;
2022-07-29 21:28:22 +00:00
const PR_PUSHED = 80 ;
const PR_LOCAL = 81 ;
2023-04-14 17:21:20 +00:00
const PR_AUDIENCE = 82 ;
2021-04-07 06:02:06 +00:00
2022-02-15 20:40:18 +00:00
// system.accept_only_sharer setting values
const COMPLETION_NONE = 1 ;
const COMPLETION_COMMENT = 0 ;
const COMPLETION_LIKE = 2 ;
2018-06-17 06:27:52 +00:00
// Field list that is used to display the items
2018-12-07 05:52:14 +00:00
const DISPLAY_FIELDLIST = [
2021-01-27 10:01:42 +00:00
'uid' , 'id' , 'parent' , 'guid' , 'network' , 'gravity' ,
2022-07-23 06:52:43 +00:00
'uri-id' , 'uri' , 'thr-parent-id' , 'thr-parent' , 'parent-uri-id' , 'parent-uri' , 'conversation' ,
2018-12-07 05:52:14 +00:00
'commented' , 'created' , 'edited' , 'received' , 'verb' , 'object-type' , 'postopts' , 'plink' ,
2021-02-17 18:59:19 +00:00
'wall' , 'private' , 'starred' , 'origin' , 'parent-origin' , 'title' , 'body' , 'language' ,
2018-12-07 05:52:14 +00:00
'content-warning' , 'location' , 'coord' , 'app' , 'rendered-hash' , 'rendered-html' , 'object' ,
2022-10-10 22:39:30 +00:00
'quote-uri' , 'quote-uri-id' , 'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' , 'mention' , 'global' ,
2023-08-21 16:07:42 +00:00
'author-id' , 'author-link' , 'author-alias' , 'author-name' , 'author-avatar' , 'author-network' , 'author-updated' , 'author-gsid' , 'author-baseurl' , 'author-addr' , 'author-uri-id' ,
2023-08-12 08:11:10 +00:00
'owner-id' , 'owner-link' , 'owner-alias' , 'owner-name' , 'owner-avatar' , 'owner-network' , 'owner-contact-type' , 'owner-updated' , 'owner-gsid' ,
'causer-id' , 'causer-link' , 'causer-alias' , 'causer-name' , 'causer-avatar' , 'causer-contact-type' , 'causer-network' , 'causer-gsid' ,
2019-04-24 04:26:23 +00:00
'contact-id' , 'contact-uid' , 'contact-link' , 'contact-name' , 'contact-avatar' ,
2021-01-16 04:13:22 +00:00
'writable' , 'self' , 'cid' , 'alias' ,
2021-02-13 19:56:03 +00:00
'event-created' , 'event-edited' , 'event-start' , 'event-finish' ,
2018-12-07 05:52:14 +00:00
'event-summary' , 'event-desc' , 'event-location' , 'event-type' ,
2021-10-03 17:21:17 +00:00
'event-nofinish' , 'event-ignore' , 'event-id' ,
2022-06-18 15:45:53 +00:00
'question-id' , 'question-multiple' , 'question-voters' , 'question-end-time' ,
'has-categories' , 'has-media' ,
2020-05-31 15:48:31 +00:00
'delivery_queue_count' , 'delivery_queue_done' , 'delivery_queue_failed'
2018-12-07 05:52:14 +00:00
];
2018-06-17 06:27:52 +00:00
// Field list that is used to deliver items via the protocols
2023-06-18 16:49:38 +00:00
const DELIVER_FIELDLIST = [
'uid' , 'id' , 'parent' , 'uri-id' , 'uri' , 'thr-parent' , 'parent-uri' , 'guid' ,
'parent-guid' , 'conversation' , 'received' , 'created' , 'edited' , 'verb' , 'object-type' , 'object' , 'target' ,
'private' , 'title' , 'body' , 'raw-body' , 'location' , 'coord' , 'app' ,
'inform' , 'deleted' , 'extid' , 'post-type' , 'post-reason' , 'gravity' ,
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' ,
'author-id' , 'author-addr' , 'author-link' , 'author-name' , 'author-avatar' , 'owner-id' , 'owner-link' , 'contact-uid' ,
'signed_text' , 'network' , 'wall' , 'contact-id' , 'plink' , 'origin' ,
'thr-parent-id' , 'parent-uri-id' , 'quote-uri' , 'quote-uri-id' , 'postopts' , 'pubmail' ,
'event-created' , 'event-edited' , 'event-start' , 'event-finish' ,
'event-summary' , 'event-desc' , 'event-location' , 'event-type' ,
'event-nofinish' , 'event-ignore' , 'event-id'
];
2018-06-17 06:27:52 +00:00
2018-06-25 18:49:36 +00:00
// All fields in the item table
2023-06-18 16:49:38 +00:00
const ITEM_FIELDLIST = [
'id' , 'uid' , 'parent' , 'uri' , 'parent-uri' , 'thr-parent' ,
'guid' , 'uri-id' , 'parent-uri-id' , 'thr-parent-id' , 'conversation' , 'vid' ,
'quote-uri' , 'quote-uri-id' , 'contact-id' , 'wall' , 'gravity' , 'extid' , 'psid' ,
'created' , 'edited' , 'commented' , 'received' , 'changed' , 'verb' ,
'postopts' , 'plink' , 'resource-id' , 'event-id' , 'inform' ,
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' , 'post-type' , 'post-reason' ,
'private' , 'pubmail' , 'visible' , 'starred' ,
'unseen' , 'deleted' , 'origin' , 'mention' , 'global' , 'network' ,
'title' , 'content-warning' , 'body' , 'location' , 'coord' , 'app' ,
'rendered-hash' , 'rendered-html' , 'object-type' , 'object' , 'target-type' , 'target' ,
'author-id' , 'author-link' , 'author-name' , 'author-avatar' , 'author-network' ,
'owner-id' , 'owner-link' , 'owner-name' , 'owner-avatar' , 'causer-id'
];
2018-06-25 18:49:36 +00:00
2020-05-26 05:18:50 +00:00
// List of all verbs that don't need additional content data.
2018-07-06 06:37:33 +00:00
// Never reorder or remove entries from this list. Just add new ones at the end, if needed.
2019-10-23 22:25:43 +00:00
const ACTIVITIES = [
Activity :: LIKE , Activity :: DISLIKE ,
Activity :: ATTEND , Activity :: ATTENDNO , Activity :: ATTENDMAYBE ,
Activity :: FOLLOW ,
2023-06-18 16:49:38 +00:00
Activity :: ANNOUNCE
];
2018-07-05 22:00:38 +00:00
2022-09-14 23:23:38 +00:00
// Privacy levels
2020-03-02 07:57:23 +00:00
const PUBLIC = 0 ;
const PRIVATE = 1 ;
const UNLISTED = 2 ;
2022-09-12 21:12:11 +00:00
// Item weight for query ordering
const GRAVITY_PARENT = 0 ;
const GRAVITY_ACTIVITY = 3 ;
const GRAVITY_COMMENT = 6 ;
const GRAVITY_UNKNOWN = 9 ;
2018-01-09 21:13:45 +00:00
/**
2020-01-19 06:05:23 +00:00
* Update existing item entries
2018-01-09 21:13:45 +00:00
*
2019-01-06 21:06:53 +00:00
* @ param array $fields The fields that are to be changed
2018-01-09 21:13:45 +00:00
* @ param array $condition The condition for finding the item entries
*
2018-01-09 22:16:16 +00:00
* In the future we may have to change permissions as well .
* Then we had to add the user id as third parameter .
*
* A return value of " 0 " doesn ' t mean an error - but that 0 rows had been changed .
*
* @ return integer | boolean number of affected rows - or " false " if there was an error
2019-01-06 21:06:53 +00:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-01-09 21:13:45 +00:00
*/
public static function update ( array $fields , array $condition )
{
if ( empty ( $condition ) || empty ( $fields )) {
return false ;
}
2021-04-18 09:57:08 +00:00
if ( isset ( $fields [ 'extid' ])) {
2021-04-18 07:08:16 +00:00
$fields [ 'external-id' ] = ItemURI :: getIdByURI ( $fields [ 'extid' ]);
}
2021-01-28 22:45:54 +00:00
if ( ! empty ( $fields [ 'verb' ])) {
$fields [ 'vid' ] = Verb :: getID ( $fields [ 'verb' ]);
2018-07-07 23:03:28 +00:00
}
2021-06-26 11:31:37 +00:00
if ( ! empty ( $fields [ 'edited' ])) {
2021-06-26 11:29:58 +00:00
$previous = Post :: selectFirst ([ 'edited' ], $condition );
}
2021-01-28 22:45:54 +00:00
$rows = Post :: update ( $fields , $condition );
if ( is_bool ( $rows )) {
return $rows ;
2018-06-24 23:09:13 +00:00
}
2018-01-09 21:13:45 +00:00
2021-01-28 22:45:54 +00:00
// We only need to call the line by line update for specific fields
2023-06-18 16:49:38 +00:00
if (
empty ( $fields [ 'body' ]) && empty ( $fields [ 'file' ]) &&
empty ( $fields [ 'attach' ]) && empty ( $fields [ 'edited' ])
) {
2021-01-28 22:45:54 +00:00
return $rows ;
2018-06-30 21:15:24 +00:00
}
2021-01-28 22:45:54 +00:00
Logger :: info ( 'Updating per single row method' , [ 'fields' => $fields , 'condition' => $condition ]);
2018-01-09 21:13:45 +00:00
2022-10-29 22:11:39 +00:00
$items = Post :: select ([ 'id' , 'origin' , 'uri-id' , 'uid' , 'author-network' , 'quote-uri-id' ], $condition );
2018-01-09 22:16:16 +00:00
2019-08-03 10:36:21 +00:00
$notify_items = [];
2018-07-20 12:19:26 +00:00
while ( $item = DBA :: fetch ( $items )) {
2021-01-28 22:45:54 +00:00
if ( ! empty ( $fields [ 'body' ])) {
2022-10-29 22:11:39 +00:00
if ( ! empty ( $item [ 'quote-uri-id' ])) {
$fields [ 'body' ] = BBCode :: removeSharedData ( $fields [ 'body' ]);
if ( ! empty ( $fields [ 'raw-body' ])) {
$fields [ 'raw-body' ] = BBCode :: removeSharedData ( $fields [ 'raw-body' ]);
}
}
2022-11-20 00:10:02 +00:00
2021-01-28 22:45:54 +00:00
$content_fields = [ 'raw-body' => trim ( $fields [ 'raw-body' ] ? ? $fields [ 'body' ])];
2021-04-26 06:50:12 +00:00
2021-01-28 22:45:54 +00:00
// Remove all media attachments from the body and store them in the post-media table
2021-04-30 20:31:24 +00:00
// @todo On shared postings (Diaspora style and commented reshare) don't fetch content from the shared part
2021-01-28 22:45:54 +00:00
$content_fields [ 'raw-body' ] = Post\Media :: insertFromBody ( $item [ 'uri-id' ], $content_fields [ 'raw-body' ]);
$content_fields [ 'raw-body' ] = self :: setHashtags ( $content_fields [ 'raw-body' ]);
2021-05-30 06:13:20 +00:00
2022-12-08 05:49:25 +00:00
Post\Media :: insertFromRelevantUrl ( $item [ 'uri-id' ], $content_fields [ 'raw-body' ], $fields [ 'body' ], $item [ 'author-network' ]);
2023-02-27 07:47:31 +00:00
Post\Media :: insertFromAttachmentData ( $item [ 'uri-id' ], $fields [ 'body' ]);
$content_fields [ 'raw-body' ] = BBCode :: removeAttachment ( $content_fields [ 'raw-body' ]);
2021-05-30 06:13:20 +00:00
Post\Content :: update ( $item [ 'uri-id' ], $content_fields );
2018-07-01 19:02:29 +00:00
}
2021-01-28 22:45:54 +00:00
if ( ! empty ( $fields [ 'file' ])) {
Post\Category :: storeTextByURIId ( $item [ 'uri-id' ], $item [ 'uid' ], $fields [ 'file' ]);
2018-06-30 13:54:01 +00:00
}
2020-10-31 13:26:08 +00:00
if ( ! empty ( $fields [ 'attach' ])) {
Post\Media :: insertFromAttachment ( $item [ 'uri-id' ], $fields [ 'attach' ]);
}
2023-03-22 04:07:48 +00:00
// We only need to notify others when it is an original entry from us.
2021-06-26 11:29:58 +00:00
// Only call the notifier when the item had been edited and records had been changed.
if ( $item [ 'origin' ] && ! empty ( $fields [ 'edited' ]) && ( $previous [ 'edited' ] != $fields [ 'edited' ])) {
2019-08-03 10:36:21 +00:00
$notify_items [] = $item [ 'id' ];
2018-02-07 20:09:37 +00:00
}
2018-01-09 21:13:45 +00:00
}
2018-07-20 12:19:26 +00:00
DBA :: close ( $items );
2019-08-03 10:36:21 +00:00
foreach ( $notify_items as $notify_item ) {
2023-04-12 05:48:38 +00:00
$post = Post :: selectFirst ([], [ 'id' => $notify_item ]);
if ( $post [ 'gravity' ] != self :: GRAVITY_PARENT ) {
$signed = Diaspora :: createCommentSignature ( $post );
if ( ! empty ( $signed )) {
DBA :: replace ( 'diaspora-interaction' , [ 'uri-id' => $post [ 'uri-id' ], 'interaction' => json_encode ( $signed )]);
}
}
2022-10-17 05:49:55 +00:00
Worker :: add ( Worker :: PRIORITY_HIGH , 'Notifier' , Delivery :: POST , ( int ) $post [ 'uri-id' ], ( int ) $post [ 'uid' ]);
2019-08-03 10:36:21 +00:00
}
2018-01-09 22:16:16 +00:00
return $rows ;
2018-01-09 21:13:45 +00:00
}
2018-01-16 22:23:19 +00:00
2018-02-06 12:40:22 +00:00
/**
2020-01-19 06:05:23 +00:00
* Delete an item and notify others about it - if it was ours
2018-02-06 12:40:22 +00:00
*
2019-01-06 21:06:53 +00:00
* @ param array $condition The condition for finding the item entries
* @ param integer $priority Priority for the notification
2022-06-18 15:45:53 +00:00
* @ return void
2019-01-06 21:06:53 +00:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-02-06 12:40:22 +00:00
*/
2022-10-17 05:49:55 +00:00
public static function markForDeletion ( array $condition , int $priority = Worker :: PRIORITY_HIGH )
2018-02-06 12:40:22 +00:00
{
2021-01-16 04:13:22 +00:00
$items = Post :: select ([ 'id' ], $condition );
while ( $item = Post :: fetch ( $items )) {
2020-03-03 06:47:28 +00:00
self :: markForDeletionById ( $item [ 'id' ], $priority );
2018-02-06 12:40:22 +00:00
}
2018-07-20 12:19:26 +00:00
DBA :: close ( $items );
2018-02-06 12:40:22 +00:00
}
2018-05-29 05:22:57 +00:00
/**
2020-01-19 06:05:23 +00:00
* Delete an item for an user and notify others about it - if it was ours
2018-05-29 05:22:57 +00:00
*
2019-01-06 21:06:53 +00:00
* @ param array $condition The condition for finding the item entries
* @ param integer $uid User who wants to delete this item
2022-06-18 15:45:53 +00:00
* @ return void
2019-01-06 21:06:53 +00:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-05-29 05:22:57 +00:00
*/
2022-06-15 20:03:13 +00:00
public static function deleteForUser ( array $condition , int $uid )
2018-05-29 05:22:57 +00:00
{
if ( $uid == 0 ) {
return ;
}
2021-01-16 04:13:22 +00:00
$items = Post :: select ([ 'id' , 'uid' , 'uri-id' ], $condition );
while ( $item = Post :: fetch ( $items )) {
2021-01-22 08:16:41 +00:00
if ( in_array ( $item [ 'uid' ], [ $uid , 0 ])) {
Post\User :: update ( $item [ 'uri-id' ], $uid , [ 'hidden' => true ], true );
2021-02-09 17:04:41 +00:00
Post\ThreadUser :: update ( $item [ 'uri-id' ], $uid , [ 'hidden' => true ], true );
2021-01-22 08:16:41 +00:00
}
2020-11-17 22:33:44 +00:00
2021-01-31 23:37:34 +00:00
if ( $item [ 'uid' ] == $uid ) {
2022-10-17 05:49:55 +00:00
self :: markForDeletionById ( $item [ 'id' ], Worker :: PRIORITY_HIGH );
2021-01-31 23:37:34 +00:00
} elseif ( $item [ 'uid' ] != 0 ) {
2022-08-30 19:45:30 +00:00
Logger :: warning ( 'Wrong ownership. Not deleting item' , [ 'id' => $item [ 'id' ]]);
2018-05-29 05:22:57 +00:00
}
2018-02-06 12:40:22 +00:00
}
2018-07-20 12:19:26 +00:00
DBA :: close ( $items );
2018-02-06 12:40:22 +00:00
}
2018-01-17 23:22:01 +00:00
/**
2020-03-03 06:47:28 +00:00
* Mark an item for deletion , delete related data and notify others about it - if it was ours
2018-01-17 23:22:01 +00:00
*
2020-03-03 06:47:28 +00:00
* @ param integer $item_id
2018-02-06 12:40:22 +00:00
* @ param integer $priority Priority for the notification
2018-03-17 01:45:02 +00:00
* @ return boolean success
2019-01-06 21:06:53 +00:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-01-17 23:22:01 +00:00
*/
2022-10-17 05:49:55 +00:00
public static function markForDeletionById ( int $item_id , int $priority = Worker :: PRIORITY_HIGH ) : bool
2018-01-16 23:16:53 +00:00
{
2020-03-04 20:59:19 +00:00
Logger :: info ( 'Mark item for deletion by id' , [ 'id' => $item_id , 'callstack' => System :: callstack ()]);
2018-01-16 23:16:53 +00:00
// locate item to be deleted
2023-06-18 16:49:38 +00:00
$fields = [
'id' , 'uri' , 'uri-id' , 'uid' , 'parent' , 'parent-uri-id' , 'origin' ,
2021-01-21 07:16:41 +00:00
'deleted' , 'resource-id' , 'event-id' ,
2023-06-18 16:49:38 +00:00
'verb' , 'object-type' , 'object' , 'target' , 'contact-id' , 'psid' , 'gravity'
];
2021-01-16 04:13:22 +00:00
$item = Post :: selectFirst ( $fields , [ 'id' => $item_id ]);
2018-07-21 12:46:04 +00:00
if ( ! DBA :: isResult ( $item )) {
2020-03-04 20:59:19 +00:00
Logger :: info ( 'Item not found.' , [ 'id' => $item_id ]);
2018-01-16 23:16:53 +00:00
return false ;
}
if ( $item [ 'deleted' ]) {
2020-03-04 20:59:19 +00:00
Logger :: info ( 'Item has already been marked for deletion.' , [ 'id' => $item_id ]);
2018-01-16 23:16:53 +00:00
return false ;
}
2021-01-16 04:13:22 +00:00
$parent = Post :: selectFirst ([ 'origin' ], [ 'id' => $item [ 'parent' ]]);
2018-07-21 12:46:04 +00:00
if ( ! DBA :: isResult ( $parent )) {
2018-01-17 23:22:01 +00:00
$parent = [ 'origin' => false ];
}
2018-01-16 23:16:53 +00:00
// clean up categories and tags so they don't end up as orphans
2021-01-21 07:16:41 +00:00
Post\Category :: deleteByURIId ( $item [ 'uri-id' ], $item [ 'uid' ]);
2018-01-16 23:16:53 +00:00
2018-01-17 07:08:49 +00:00
/*
* If item is a link to a photo resource , nuke all the associated photos
* ( visitors will not have photo resources )
* This only applies to photos uploaded from the photos page . Photos inserted into a post do not
* generate a resource - id and therefore aren ' t intimately linked to the item .
*/
2019-01-02 15:37:55 +00:00
/// @TODO: this should first check if photo is used elsewhere
2022-11-20 00:10:02 +00:00
if ( $item [ 'resource-id' ]) {
2018-12-11 19:03:29 +00:00
Photo :: delete ([ 'resource-id' => $item [ 'resource-id' ], 'uid' => $item [ 'uid' ]]);
2018-01-16 23:16:53 +00:00
}
2018-02-06 12:40:22 +00:00
// If item is a link to an event, delete the event.
2018-01-16 23:16:53 +00:00
if ( intval ( $item [ 'event-id' ])) {
2018-03-17 01:45:02 +00:00
Event :: delete ( $item [ 'event-id' ]);
2018-01-16 23:16:53 +00:00
}
// If item has attachments, drop them
2020-11-07 08:22:59 +00:00
$attachments = Post\Media :: getByURIId ( $item [ 'uri-id' ], [ Post\Media :: DOCUMENT ]);
2023-06-18 16:49:38 +00:00
foreach ( $attachments as $attachment ) {
2022-06-18 15:45:53 +00:00
if ( preg_match ( '|attach/(\d+)|' , $attachment [ 'url' ], $matches )) {
2019-01-02 15:17:29 +00:00
Attach :: delete ([ 'id' => $matches [ 1 ], 'uid' => $item [ 'uid' ]]);
2018-07-01 18:46:45 +00:00
}
2018-01-16 23:16:53 +00:00
}
2018-01-20 22:16:43 +00:00
// Set the item to "deleted"
2018-07-29 03:54:34 +00:00
$item_fields = [ 'deleted' => true , 'edited' => DateTimeFormat :: utcNow (), 'changed' => DateTimeFormat :: utcNow ()];
2021-02-06 13:42:21 +00:00
Post :: update ( $item_fields , [ 'id' => $item [ 'id' ]]);
2018-01-20 22:16:43 +00:00
2020-11-17 22:33:44 +00:00
Post\Category :: storeTextByURIId ( $item [ 'uri-id' ], $item [ 'uid' ], '' );
2018-01-20 22:16:43 +00:00
2022-06-18 21:23:50 +00:00
if ( ! Post :: exists ([ " `uri-id` = ? AND `uid` != 0 AND NOT `deleted` " , $item [ 'uri-id' ]])) {
2021-01-27 10:01:42 +00:00
self :: markForDeletion ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => 0 , 'deleted' => false ], $priority );
2018-05-15 16:40:13 +00:00
}
2020-05-02 19:34:02 +00:00
Post\DeliveryData :: delete ( $item [ 'uri-id' ]);
2018-07-19 21:56:52 +00:00
2018-01-20 22:16:43 +00:00
// If it's the parent of a comment thread, kill all the kids
2022-09-12 21:12:11 +00:00
if ( $item [ 'gravity' ] == self :: GRAVITY_PARENT ) {
2020-03-03 06:47:28 +00:00
self :: markForDeletion ([ 'parent' => $item [ 'parent' ], 'deleted' => false ], $priority );
2018-01-20 22:16:43 +00:00
}
2018-01-16 23:16:53 +00:00
2018-05-15 15:51:58 +00:00
// Is it our comment and/or our thread?
2020-11-28 22:53:58 +00:00
if (( $item [ 'origin' ] || $parent [ 'origin' ]) && ( $item [ 'uid' ] != 0 )) {
2018-05-15 15:51:58 +00:00
// When we delete the original post we will delete all existing copies on the server as well
2021-01-27 10:01:42 +00:00
self :: markForDeletion ([ 'uri-id' => $item [ 'uri-id' ], 'deleted' => false ], $priority );
2018-05-15 15:51:58 +00:00
// send the notification upstream/downstream
2020-11-30 21:40:55 +00:00
if ( $priority ) {
2022-06-18 15:45:53 +00:00
Worker :: add ([ 'priority' => $priority , 'dont_fork' => true ], 'Notifier' , Delivery :: DELETION , ( int ) $item [ 'uri-id' ], ( int ) $item [ 'uid' ]);
2020-11-30 21:40:55 +00:00
}
2018-05-26 18:07:27 +00:00
} elseif ( $item [ 'uid' ] != 0 ) {
2020-11-17 22:33:44 +00:00
Post\User :: update ( $item [ 'uri-id' ], $item [ 'uid' ], [ 'hidden' => true ]);
2021-02-09 17:04:41 +00:00
Post\ThreadUser :: update ( $item [ 'uri-id' ], $item [ 'uid' ], [ 'hidden' => true ]);
2018-01-16 23:16:53 +00:00
}
2022-11-27 02:48:26 +00:00
DI :: notify () -> deleteForItem ( $item [ 'uri-id' ]);
DI :: notification () -> deleteForItem ( $item [ 'uri-id' ]);
2020-03-04 20:59:19 +00:00
Logger :: info ( 'Item has been marked for deletion.' , [ 'id' => $item_id ]);
2018-05-15 17:50:29 +00:00
2018-01-16 23:16:53 +00:00
return true ;
}
2022-06-18 15:45:53 +00:00
/**
* Get guid from given item record
*
* @ param array $item Item record
* @ param bool Whether to notify ( ? )
* @ return string Guid
*/
public static function guid ( array $item , bool $notify ) : string
2018-02-21 04:13:13 +00:00
{
2018-07-08 09:37:05 +00:00
if ( ! empty ( $item [ 'guid' ])) {
2021-11-05 19:59:18 +00:00
return trim ( $item [ 'guid' ]);
2018-02-21 04:13:13 +00:00
}
if ( $notify ) {
// We have to avoid duplicates. So we create the GUID in form of a hash of the plink or uri.
// We add the hash of our own host because our host is the original creator of the post.
2023-02-18 19:57:30 +00:00
$prefix_host = DI :: baseUrl () -> getHost ();
2018-02-21 04:13:13 +00:00
} else {
$prefix_host = '' ;
// We are only storing the post so we create a GUID from the original hostname.
2018-02-21 21:39:07 +00:00
if ( ! empty ( $item [ 'author-link' ])) {
$parsed = parse_url ( $item [ 'author-link' ]);
2018-02-21 04:13:13 +00:00
if ( ! empty ( $parsed [ 'host' ])) {
$prefix_host = $parsed [ 'host' ];
}
}
2018-02-21 21:39:07 +00:00
if ( empty ( $prefix_host ) && ! empty ( $item [ 'plink' ])) {
$parsed = parse_url ( $item [ 'plink' ]);
2018-02-21 04:13:13 +00:00
if ( ! empty ( $parsed [ 'host' ])) {
$prefix_host = $parsed [ 'host' ];
}
}
2018-02-21 21:39:07 +00:00
if ( empty ( $prefix_host ) && ! empty ( $item [ 'uri' ])) {
$parsed = parse_url ( $item [ 'uri' ]);
2018-02-21 04:13:13 +00:00
if ( ! empty ( $parsed [ 'host' ])) {
$prefix_host = $parsed [ 'host' ];
}
}
2018-02-26 11:48:05 +00:00
// Is it in the format data@host.tld? - Used for mail contacts
if ( empty ( $prefix_host ) && ! empty ( $item [ 'author-link' ]) && strstr ( $item [ 'author-link' ], '@' )) {
$mailparts = explode ( '@' , $item [ 'author-link' ]);
$prefix_host = array_pop ( $mailparts );
}
2018-02-21 04:13:13 +00:00
}
2018-02-21 21:39:07 +00:00
if ( ! empty ( $item [ 'plink' ])) {
$guid = self :: guidFromUri ( $item [ 'plink' ], $prefix_host );
} elseif ( ! empty ( $item [ 'uri' ])) {
$guid = self :: guidFromUri ( $item [ 'uri' ], $prefix_host );
2018-02-21 04:13:13 +00:00
} else {
2018-09-27 11:52:15 +00:00
$guid = System :: createUUID ( hash ( 'crc32' , $prefix_host ));
2018-02-21 04:13:13 +00:00
}
return $guid ;
}
2022-06-18 15:45:53 +00:00
/**
* Returns contact id from given item record
*
* @ param array $item Item record
* @ return int Contact id
*/
private static function contactId ( array $item ) : int
2018-02-21 21:08:37 +00:00
{
2022-08-18 10:13:46 +00:00
if ( $item [ 'uid' ] == 0 ) {
2023-06-18 16:49:38 +00:00
return $item [ 'owner-id' ];
2022-08-18 10:13:46 +00:00
}
2022-08-22 07:54:48 +00:00
if ( $item [ 'origin' ]) {
$owner = User :: getOwnerDataById ( $item [ 'uid' ]);
return $owner [ 'id' ];
}
2023-06-23 21:05:45 +00:00
$contact_id = 0 ;
$user_contact_id = 0 ;
foreach ([ 'group-link' , 'causer-link' , 'owner-link' , 'author-link' ] as $field ) {
if ( empty ( $item [ $field ])) {
continue ;
}
if ( ! $user_contact_id && Contact :: isSharingByURL ( $item [ $field ], $item [ 'uid' ], true )) {
$user_contact_id = Contact :: getIdForURL ( $item [ $field ], $item [ 'uid' ]);
} elseif ( ! $contact_id ) {
$contact_id = Contact :: getIdForURL ( $item [ $field ]);
}
}
if ( $user_contact_id ) {
return $user_contact_id ;
}
2022-08-18 10:13:46 +00:00
if ( ! empty ( $item [ 'causer-id' ]) && Contact :: isSharing ( $item [ 'causer-id' ], $item [ 'uid' ], true )) {
$cdata = Contact :: getPublicAndUserContactID ( $item [ 'causer-id' ], $item [ 'uid' ]);
if ( ! empty ( $cdata [ 'user' ])) {
return $cdata [ 'user' ];
}
}
2023-06-23 21:05:45 +00:00
if ( $contact_id ) {
return $contact_id ;
2018-02-21 21:08:37 +00:00
}
2022-08-18 10:13:46 +00:00
Logger :: warning ( 'contact-id could not be fetched, using self contact instead.' , [ 'uid' => $item [ 'uid' ], 'item' => $item ]);
$self = Contact :: selectFirst ([ 'id' ], [ 'self' => true , 'uid' => $item [ 'uid' ]]);
return $self [ 'id' ];
2018-02-21 21:08:37 +00:00
}
2019-07-31 16:07:50 +00:00
/**
* Write an item array into a spool file to be inserted later .
* This command is called whenever there are issues storing an item .
*
* @ param array $item The item fields that are to be inserted
* @ throws \Exception
*/
2022-06-18 15:49:57 +00:00
private static function spool ( array $item )
2019-07-31 14:09:27 +00:00
{
// Now we store the data in the spool directory
// We use "microtime" to keep the arrival order and "mt_rand" to avoid duplicates
$file = 'item-' . round ( microtime ( true ) * 10000 ) . '-' . mt_rand () . '.msg' ;
2021-11-04 20:29:59 +00:00
$spoolpath = System :: getSpoolPath ();
2022-06-18 15:45:53 +00:00
if ( $spoolpath != '' ) {
2019-07-31 14:09:27 +00:00
$spool = $spoolpath . '/' . $file ;
2022-06-18 15:49:57 +00:00
file_put_contents ( $spool , json_encode ( $item ));
2019-07-31 14:09:27 +00:00
Logger :: warning ( " Item wasn't stored - Item was spooled into file " , [ 'file' => $file ]);
}
}
2020-05-13 19:26:59 +00:00
/**
* Check if the item array is a duplicate
*
2022-06-18 15:45:53 +00:00
* @ param array $item Item record
2020-05-13 19:26:59 +00:00
* @ return boolean is it a duplicate ?
*/
2022-06-18 15:45:53 +00:00
private static function isDuplicate ( array $item ) : bool
2018-01-28 11:18:08 +00:00
{
2020-05-12 20:13:48 +00:00
// Checking if there is already an item with the same guid
$condition = [ 'guid' => $item [ 'guid' ], 'network' => $item [ 'network' ], 'uid' => $item [ 'uid' ]];
2021-01-16 04:13:22 +00:00
if ( Post :: exists ( $condition )) {
2021-07-23 12:39:37 +00:00
Logger :: notice ( 'Found already existing item' , $condition );
2020-05-12 20:13:48 +00:00
return true ;
2018-01-28 11:18:08 +00:00
}
2023-06-18 16:49:38 +00:00
$condition = [
'uri-id' => $item [ 'uri-id' ], 'uid' => $item [ 'uid' ],
'network' => [ $item [ 'network' ], Protocol :: DFRN ]
];
2021-01-16 04:13:22 +00:00
if ( Post :: exists ( $condition )) {
2021-07-23 12:39:37 +00:00
Logger :: notice ( 'duplicated item with the same uri found.' , $condition );
2020-05-12 20:13:48 +00:00
return true ;
2018-05-15 04:33:28 +00:00
}
2020-05-12 20:13:48 +00:00
// On Friendica and Diaspora the GUID is unique
if ( in_array ( $item [ 'network' ], [ Protocol :: DFRN , Protocol :: DIASPORA ])) {
$condition = [ 'guid' => $item [ 'guid' ], 'uid' => $item [ 'uid' ]];
2021-01-16 04:13:22 +00:00
if ( Post :: exists ( $condition )) {
2021-07-23 12:39:37 +00:00
Logger :: notice ( 'duplicated item with the same guid found.' , $condition );
2020-05-12 20:13:48 +00:00
return true ;
}
} elseif ( $item [ 'network' ] == Protocol :: OSTATUS ) {
// Check for an existing post with the same content. There seems to be a problem with OStatus.
2023-06-18 16:49:38 +00:00
$condition = [
" `body` = ? AND `network` = ? AND `created` = ? AND `contact-id` = ? AND `uid` = ? " ,
$item [ 'body' ], $item [ 'network' ], $item [ 'created' ], $item [ 'contact-id' ], $item [ 'uid' ]
];
2021-01-16 04:13:22 +00:00
if ( Post :: exists ( $condition )) {
2020-05-12 20:13:48 +00:00
Logger :: notice ( 'duplicated item with the same body found.' , $item );
return true ;
2018-01-28 11:18:08 +00:00
}
}
2020-05-12 20:13:48 +00:00
/*
* Check for already added items .
* There is a timing issue here that sometimes creates double postings .
* An unique index would help - but the limitations of MySQL ( maximum size of index values ) prevent this .
*/
2021-01-27 10:01:42 +00:00
if (( $item [ 'uid' ] == 0 ) && Post :: exists ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => 0 ])) {
Logger :: notice ( 'Global item already stored.' , [ 'uri-id' => $item [ 'uri-id' ], 'network' => $item [ 'network' ]]);
2020-05-12 20:13:48 +00:00
return true ;
2018-03-22 16:18:49 +00:00
}
2020-05-12 20:13:48 +00:00
return false ;
}
2019-10-23 00:05:11 +00:00
2020-05-13 19:26:59 +00:00
/**
* Check if the item array is valid
*
2022-06-18 15:45:53 +00:00
* @ param array $item Item record
2020-05-13 19:26:59 +00:00
* @ return boolean item is valid
*/
2022-06-18 15:45:53 +00:00
public static function isValid ( array $item ) : bool
2020-05-12 20:13:48 +00:00
{
// When there is no content then we don't post it
2023-03-19 03:05:49 +00:00
if (( $item [ 'body' ] . $item [ 'title' ] == '' ) && empty ( $item [ 'quote-uri-id' ]) && empty ( $item [ 'attachments' ]) && ( empty ( $item [ 'uri-id' ]) || ! Post\Media :: existsByURIId ( $item [ 'uri-id' ]))) {
2020-05-12 20:13:48 +00:00
Logger :: notice ( 'No body, no title.' );
return false ;
2018-01-28 11:18:08 +00:00
}
2020-12-15 14:41:58 +00:00
if ( ! empty ( $item [ 'uid' ])) {
$owner = User :: getOwnerDataById ( $item [ 'uid' ], false );
if ( ! $owner ) {
2022-08-30 19:45:30 +00:00
Logger :: warning ( 'Missing item user owner data' , [ 'uid' => $item [ 'uid' ]]);
2020-12-15 14:41:58 +00:00
return false ;
}
2020-12-15 19:24:42 +00:00
if ( $owner [ 'account_expired' ] || $owner [ 'account_removed' ]) {
2020-12-15 14:41:58 +00:00
Logger :: notice ( 'Item user has been deleted/expired/removed' , [ 'uid' => $item [ 'uid' ], 'deleted' => $owner [ 'deleted' ], 'account_expired' => $owner [ 'account_expired' ], 'account_removed' => $owner [ 'account_removed' ]]);
return false ;
}
}
2020-08-15 20:05:08 +00:00
if ( ! empty ( $item [ 'author-id' ]) && Contact :: isBlocked ( $item [ 'author-id' ])) {
2020-05-12 20:13:48 +00:00
Logger :: notice ( 'Author is blocked node-wide' , [ 'author-link' => $item [ 'author-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
if ( ! empty ( $item [ 'author-link' ]) && Network :: isUrlBlocked ( $item [ 'author-link' ])) {
Logger :: notice ( 'Author server is blocked' , [ 'author-link' => $item [ 'author-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
2020-08-15 20:05:08 +00:00
if ( ! empty ( $item [ 'owner-id' ]) && Contact :: isBlocked ( $item [ 'owner-id' ])) {
2020-05-12 20:13:48 +00:00
Logger :: notice ( 'Owner is blocked node-wide' , [ 'owner-link' => $item [ 'owner-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
if ( ! empty ( $item [ 'owner-link' ]) && Network :: isUrlBlocked ( $item [ 'owner-link' ])) {
Logger :: notice ( 'Owner server is blocked' , [ 'owner-link' => $item [ 'owner-link' ], 'item-uri' => $item [ 'uri' ]]);
return false ;
}
if ( $item [ 'verb' ] == Activity :: FOLLOW ) {
if ( ! $item [ 'origin' ] && ( $item [ 'author-id' ] == Contact :: getPublicIdByUserId ( $item [ 'uid' ]))) {
// Our own follow request can be relayed to us. We don't store it to avoid notification chaos.
2020-05-13 05:48:26 +00:00
Logger :: info ( " Follow: Don't store not origin follow request " , [ 'parent-uri' => $item [ 'parent-uri' ]]);
2020-05-12 20:13:48 +00:00
return false ;
}
2023-06-18 16:49:38 +00:00
$condition = [
'verb' => Activity :: FOLLOW , 'uid' => $item [ 'uid' ],
'parent-uri' => $item [ 'parent-uri' ], 'author-id' => $item [ 'author-id' ]
];
2021-01-16 04:13:22 +00:00
if ( Post :: exists ( $condition )) {
2020-05-12 20:13:48 +00:00
// It happens that we receive multiple follow requests by the same author - we only store one.
2020-05-13 05:48:26 +00:00
Logger :: info ( 'Follow: Found existing follow request from author' , [ 'author-id' => $item [ 'author-id' ], 'parent-uri' => $item [ 'parent-uri' ]]);
2020-05-12 20:13:48 +00:00
return false ;
}
}
return true ;
}
2020-11-30 20:32:56 +00:00
/**
* Check if the item array is too old
*
2022-06-18 15:45:53 +00:00
* @ param array $item Item record
2020-11-30 20:32:56 +00:00
* @ return boolean item is too old
*/
2022-06-18 15:45:53 +00:00
public static function isTooOld ( array $item ) : bool
2020-11-30 20:32:56 +00:00
{
// check for create date and expire time
$expire_interval = DI :: config () -> get ( 'system' , 'dbclean-expire-days' , 0 );
$user = DBA :: selectFirst ( 'user' , [ 'expire' ], [ 'uid' => $item [ 'uid' ]]);
if ( DBA :: isResult ( $user ) && ( $user [ 'expire' ] > 0 ) && (( $user [ 'expire' ] < $expire_interval ) || ( $expire_interval == 0 ))) {
$expire_interval = $user [ 'expire' ];
}
if (( $expire_interval > 0 ) && ! empty ( $item [ 'created' ])) {
$expire_date = time () - ( $expire_interval * 86400 );
$created_date = strtotime ( $item [ 'created' ]);
if ( $created_date < $expire_date ) {
Logger :: notice ( 'Item created before expiration interval.' , [
'created' => date ( 'c' , $created_date ),
'expired' => date ( 'c' , $expire_date ),
'$item' => $item
]);
return true ;
}
}
return false ;
}
2020-05-13 19:26:59 +00:00
/**
2020-05-14 03:48:26 +00:00
* Return the id of the given item array if it has been stored before
2020-05-13 19:26:59 +00:00
*
2022-06-18 15:45:53 +00:00
* @ param array $item Item record
* @ return integer Item id or zero on error
2020-05-13 19:26:59 +00:00
*/
2022-06-18 15:45:53 +00:00
private static function getDuplicateID ( array $item ) : int
2020-05-12 20:13:48 +00:00
{
2019-07-01 22:14:34 +00:00
if ( empty ( $item [ 'network' ]) || in_array ( $item [ 'network' ], Protocol :: FEDERATED )) {
2023-06-18 16:49:38 +00:00
$condition = [
'`uri-id` = ? AND `uid` = ? AND `network` IN (?, ?, ?, ?)' ,
2022-06-18 15:45:53 +00:00
$item [ 'uri-id' ],
$item [ 'uid' ],
Protocol :: ACTIVITYPUB ,
Protocol :: DIASPORA ,
Protocol :: DFRN ,
Protocol :: OSTATUS
];
2021-01-16 04:13:22 +00:00
$existing = Post :: selectFirst ([ 'id' , 'network' ], $condition );
2018-07-21 12:46:04 +00:00
if ( DBA :: isResult ( $existing )) {
2018-01-28 11:18:08 +00:00
// We only log the entries with a different user id than 0. Otherwise we would have too many false positives
2020-05-12 20:13:48 +00:00
if ( $item [ 'uid' ] != 0 ) {
2019-02-23 14:25:21 +00:00
Logger :: notice ( 'Item already existed for user' , [
2021-01-27 10:01:42 +00:00
'uri-id' => $item [ 'uri-id' ],
2020-05-12 20:13:48 +00:00
'uid' => $item [ 'uid' ],
2019-02-23 14:25:21 +00:00
'network' => $item [ 'network' ],
2022-06-18 15:45:53 +00:00
'existing_id' => $existing [ 'id' ],
'existing_network' => $existing [ 'network' ]
2019-02-23 14:25:21 +00:00
]);
2018-01-28 11:18:08 +00:00
}
2022-06-18 15:45:53 +00:00
return $existing [ 'id' ];
2018-01-28 11:18:08 +00:00
}
}
2020-05-12 20:13:48 +00:00
return 0 ;
}
2022-09-06 20:00:06 +00:00
/**
* Fetch the uri - id of the parent for the given uri - id
*
* @ param integer $uriid
* @ return integer
*/
public static function getParent ( int $uriid ) : int
{
$thread_parent = Post :: selectFirstPost ([ 'thr-parent-id' , 'gravity' ], [ 'uri-id' => $uriid ]);
if ( empty ( $thread_parent )) {
return 0 ;
}
2022-09-12 21:12:11 +00:00
if ( $thread_parent [ 'gravity' ] == Item :: GRAVITY_PARENT ) {
2022-09-06 20:00:06 +00:00
return $uriid ;
}
return self :: getParent ( $thread_parent [ 'thr-parent-id' ]);
}
2020-05-13 19:26:59 +00:00
/**
2020-11-11 07:44:43 +00:00
* Fetch top - level parent data for the given item array
2020-05-13 19:26:59 +00:00
*
* @ param array $item
* @ return array item array with parent data
2020-11-11 07:44:43 +00:00
* @ throws \Exception
2020-05-13 19:26:59 +00:00
*/
2022-06-18 15:45:53 +00:00
private static function getTopLevelParent ( array $item ) : array
2020-05-12 20:13:48 +00:00
{
2023-06-18 16:49:38 +00:00
$fields = [
'uid' , 'uri' , 'parent-uri' , 'id' , 'deleted' ,
2021-01-27 10:01:42 +00:00
'uri-id' , 'parent-uri-id' ,
2020-05-12 20:13:48 +00:00
'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' ,
2023-06-18 16:49:38 +00:00
'wall' , 'private' , 'origin' , 'author-id'
];
2022-07-23 12:50:15 +00:00
$condition = [ 'uri-id' => [ $item [ 'thr-parent-id' ], $item [ 'parent-uri-id' ]], 'uid' => $item [ 'uid' ]];
2020-05-12 20:13:48 +00:00
$params = [ 'order' => [ 'id' => false ]];
2021-01-16 22:37:27 +00:00
$parent = Post :: selectFirst ( $fields , $condition , $params );
2020-05-12 20:13:48 +00:00
2022-07-23 12:50:15 +00:00
if ( ! DBA :: isResult ( $parent ) && Post :: exists ([ 'uri-id' => [ $item [ 'thr-parent-id' ], $item [ 'parent-uri-id' ]], 'uid' => 0 ])) {
2022-07-29 14:17:53 +00:00
$stored = Item :: storeForUserByUriId ( $item [ 'thr-parent-id' ], $item [ 'uid' ], [ 'post-reason' => Item :: PR_COMPLETION ]);
2022-07-23 12:50:15 +00:00
if ( ! $stored && ( $item [ 'thr-parent-id' ] != $item [ 'parent-uri-id' ])) {
2022-07-29 14:17:53 +00:00
$stored = Item :: storeForUserByUriId ( $item [ 'parent-uri-id' ], $item [ 'uid' ], [ 'post-reason' => Item :: PR_COMPLETION ]);
2022-07-23 12:50:15 +00:00
}
if ( $stored ) {
Logger :: info ( 'Stored thread parent item for user' , [ 'uri-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ], 'stored' => $stored ]);
$parent = Post :: selectFirst ( $fields , $condition , $params );
}
2021-09-12 01:52:10 +00:00
}
2020-05-12 20:13:48 +00:00
if ( ! DBA :: isResult ( $parent )) {
2022-08-04 19:32:36 +00:00
Logger :: notice ( 'item parent was not found - ignoring item' , [ 'uri-id' => $item [ 'uri-id' ], 'thr-parent-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ], 'callstack' => System :: callstack ( 20 )]);
2020-05-12 20:13:48 +00:00
return [];
2020-11-11 07:44:43 +00:00
}
2020-05-12 20:13:48 +00:00
2021-01-27 10:01:42 +00:00
if ( $parent [ 'uri-id' ] == $parent [ 'parent-uri-id' ]) {
2020-11-11 07:44:43 +00:00
return $parent ;
}
2020-05-12 20:13:48 +00:00
2023-06-18 16:49:38 +00:00
$condition = [
'uri-id' => $parent [ 'parent-uri-id' ],
2021-01-27 10:01:42 +00:00
'parent-uri-id' => $parent [ 'parent-uri-id' ],
2023-06-18 16:49:38 +00:00
'uid' => $parent [ 'uid' ]
];
2020-11-14 04:56:19 +00:00
$params = [ 'order' => [ 'id' => false ]];
2021-01-16 22:37:27 +00:00
$toplevel_parent = Post :: selectFirst ( $fields , $condition , $params );
2021-09-12 01:52:10 +00:00
if ( ! DBA :: isResult ( $toplevel_parent ) && $item [ 'origin' ]) {
2022-07-29 14:17:53 +00:00
$stored = Item :: storeForUserByUriId ( $item [ 'parent-uri-id' ], $item [ 'uid' ], [ 'post-reason' => Item :: PR_COMPLETION ]);
2021-09-12 01:52:10 +00:00
Logger :: info ( 'Stored parent item for user' , [ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $item [ 'uid' ], 'stored' => $stored ]);
$toplevel_parent = Post :: selectFirst ( $fields , $condition , $params );
}
2020-11-11 07:44:43 +00:00
if ( ! DBA :: isResult ( $toplevel_parent )) {
2021-01-27 10:01:42 +00:00
Logger :: notice ( 'item top level parent was not found - ignoring item' , [ 'parent-uri-id' => $parent [ 'parent-uri-id' ], 'uid' => $parent [ 'uid' ]]);
2020-11-11 07:44:43 +00:00
return [];
2020-05-12 20:13:48 +00:00
}
2020-11-11 07:44:43 +00:00
return $toplevel_parent ;
2020-05-12 20:13:48 +00:00
}
2020-05-13 19:26:59 +00:00
/**
* Get the gravity for the given item array
*
* @ param array $item
* @ return integer gravity
*/
2022-06-15 20:28:33 +00:00
private static function getGravity ( array $item ) : int
2020-05-12 20:13:48 +00:00
{
$activity = DI :: activity ();
if ( isset ( $item [ 'gravity' ])) {
return intval ( $item [ 'gravity' ]);
2021-01-27 10:01:42 +00:00
} elseif ( $item [ 'parent-uri-id' ] === $item [ 'uri-id' ]) {
2022-09-12 21:12:11 +00:00
return self :: GRAVITY_PARENT ;
2020-05-12 20:13:48 +00:00
} elseif ( $activity -> match ( $item [ 'verb' ], Activity :: POST )) {
2022-09-12 21:12:11 +00:00
return self :: GRAVITY_COMMENT ;
2020-05-12 20:13:48 +00:00
} elseif ( $activity -> match ( $item [ 'verb' ], Activity :: FOLLOW )) {
2022-09-12 21:12:11 +00:00
return self :: GRAVITY_ACTIVITY ;
2020-08-09 18:42:25 +00:00
} elseif ( $activity -> match ( $item [ 'verb' ], Activity :: ANNOUNCE )) {
2022-09-12 21:12:11 +00:00
return self :: GRAVITY_ACTIVITY ;
2020-05-12 20:13:48 +00:00
}
2022-06-18 15:45:53 +00:00
2020-05-12 20:13:48 +00:00
Logger :: info ( 'Unknown gravity for verb' , [ 'verb' => $item [ 'verb' ]]);
2022-09-12 21:12:11 +00:00
return self :: GRAVITY_UNKNOWN ; // Should not happen
2020-05-12 20:13:48 +00:00
}
2022-11-23 06:27:40 +00:00
private static function prepareOriginPost ( array $item ) : array
{
2023-01-04 05:44:52 +00:00
$item = DI :: contentItem () -> initializePost ( $item );
$item = DI :: contentItem () -> finalizePost ( $item );
2022-11-23 14:00:34 +00:00
2022-11-23 06:27:40 +00:00
return $item ;
}
2022-06-18 15:45:53 +00:00
/**
* Inserts item record
*
* @ param array $item Item array to be inserted
* @ param int $notify Notification ( type ? )
* @ param bool $post_local ( ? ? ? )
* @ return int Zero means error , otherwise primary key ( id ) is being returned
*/
public static function insert ( array $item , int $notify = 0 , bool $post_local = true ) : int
2020-05-12 20:13:48 +00:00
{
$orig_item = $item ;
2022-10-17 05:49:55 +00:00
$priority = Worker :: PRIORITY_HIGH ;
2020-05-12 20:13:48 +00:00
// If it is a posting where users should get notifications, then define it as wall posting
if ( $notify ) {
2022-11-23 06:27:40 +00:00
$item = self :: prepareOriginPost ( $item );
2020-05-12 20:13:48 +00:00
2022-10-17 05:49:55 +00:00
if ( is_int ( $notify ) && in_array ( $notify , Worker :: PRIORITIES )) {
2020-05-12 20:13:48 +00:00
$priority = $notify ;
}
} else {
$item [ 'network' ] = trim (( $item [ 'network' ] ? ? '' ) ? : Protocol :: PHANTOM );
}
$uid = intval ( $item [ 'uid' ]);
$item [ 'guid' ] = self :: guid ( $item , $notify );
2022-07-09 11:32:32 +00:00
$item [ 'uri' ] = substr ( trim ( $item [ 'uri' ] ? ? '' ) ? : self :: newURI ( $item [ 'guid' ]), 0 , 255 );
2020-05-12 20:13:48 +00:00
// Store URI data
$item [ 'uri-id' ] = ItemURI :: insert ([ 'uri' => $item [ 'uri' ], 'guid' => $item [ 'guid' ]]);
2020-11-11 07:44:43 +00:00
// Backward compatibility: parent-uri used to be the direct parent uri.
// If it is provided without a thr-parent, it probably is the old behavior.
2022-07-23 06:52:43 +00:00
if ( empty ( $item [ 'thr-parent' ]) || empty ( $item [ 'parent-uri' ])) {
$item [ 'thr-parent' ] = trim ( $item [ 'thr-parent' ] ? ? $item [ 'parent-uri' ] ? ? $item [ 'uri' ]);
$item [ 'parent-uri' ] = $item [ 'thr-parent' ];
}
2020-11-11 07:44:43 +00:00
2022-07-23 06:52:43 +00:00
$item [ 'thr-parent-id' ] = ItemURI :: getIdByURI ( $item [ 'thr-parent' ]);
$item [ 'parent-uri-id' ] = ItemURI :: getIdByURI ( $item [ 'parent-uri' ]);
2021-01-27 10:01:42 +00:00
2020-05-12 20:13:48 +00:00
// Store conversation data
2022-07-27 17:39:00 +00:00
$source = $item [ 'source' ] ? ? '' ;
unset ( $item [ 'conversation-uri' ]);
unset ( $item [ 'conversation-href' ]);
unset ( $item [ 'source' ]);
2020-05-12 20:13:48 +00:00
/*
* Do we already have this item ?
* We have to check several networks since Friendica posts could be repeated
2023-03-22 03:17:28 +00:00
* via OStatus ( maybe Diaspora as well )
2020-05-12 20:13:48 +00:00
*/
$duplicate = self :: getDuplicateID ( $item );
if ( $duplicate ) {
return $duplicate ;
}
// Additional duplicate checks
/// @todo Check why the first duplication check returns the item number and the second a 0
if ( self :: isDuplicate ( $item )) {
return 0 ;
}
2018-01-28 11:18:08 +00:00
2021-04-07 06:02:06 +00:00
if ( ! isset ( $item [ 'post-type' ])) {
$item [ 'post-type' ] = empty ( $item [ 'title' ]) ? self :: PT_NOTE : self :: PT_ARTICLE ;
}
2023-03-24 20:39:11 +00:00
$defined_permissions = isset ( $item [ 'allow_cid' ]) && isset ( $item [ 'allow_gid' ]) && isset ( $item [ 'deny_cid' ]) && isset ( $item [ 'deny_gid' ]) && isset ( $item [ 'private' ]);
2019-10-16 12:35:14 +00:00
$item [ 'wall' ] = intval ( $item [ 'wall' ] ? ? 0 );
$item [ 'extid' ] = trim ( $item [ 'extid' ] ? ? '' );
$item [ 'author-name' ] = trim ( $item [ 'author-name' ] ? ? '' );
$item [ 'author-link' ] = trim ( $item [ 'author-link' ] ? ? '' );
$item [ 'author-avatar' ] = trim ( $item [ 'author-avatar' ] ? ? '' );
$item [ 'owner-name' ] = trim ( $item [ 'owner-name' ] ? ? '' );
$item [ 'owner-link' ] = trim ( $item [ 'owner-link' ] ? ? '' );
$item [ 'owner-avatar' ] = trim ( $item [ 'owner-avatar' ] ? ? '' );
2018-11-30 14:06:22 +00:00
$item [ 'received' ] = ( isset ( $item [ 'received' ]) ? DateTimeFormat :: utc ( $item [ 'received' ]) : DateTimeFormat :: utcNow ());
$item [ 'created' ] = ( isset ( $item [ 'created' ]) ? DateTimeFormat :: utc ( $item [ 'created' ]) : $item [ 'received' ]);
$item [ 'edited' ] = ( isset ( $item [ 'edited' ]) ? DateTimeFormat :: utc ( $item [ 'edited' ]) : $item [ 'created' ]);
$item [ 'changed' ] = ( isset ( $item [ 'changed' ]) ? DateTimeFormat :: utc ( $item [ 'changed' ]) : $item [ 'created' ]);
$item [ 'commented' ] = ( isset ( $item [ 'commented' ]) ? DateTimeFormat :: utc ( $item [ 'commented' ]) : $item [ 'created' ]);
2020-03-25 07:07:34 +00:00
$item [ 'title' ] = substr ( trim ( $item [ 'title' ] ? ? '' ), 0 , 255 );
2019-10-16 12:35:14 +00:00
$item [ 'location' ] = trim ( $item [ 'location' ] ? ? '' );
$item [ 'coord' ] = trim ( $item [ 'coord' ] ? ? '' );
2018-11-30 14:06:22 +00:00
$item [ 'visible' ] = ( isset ( $item [ 'visible' ]) ? intval ( $item [ 'visible' ]) : 1 );
2018-02-21 21:39:07 +00:00
$item [ 'deleted' ] = 0 ;
2019-10-16 12:35:14 +00:00
$item [ 'verb' ] = trim ( $item [ 'verb' ] ? ? '' );
$item [ 'object-type' ] = trim ( $item [ 'object-type' ] ? ? '' );
$item [ 'object' ] = trim ( $item [ 'object' ] ? ? '' );
$item [ 'target-type' ] = trim ( $item [ 'target-type' ] ? ? '' );
$item [ 'target' ] = trim ( $item [ 'target' ] ? ? '' );
2020-03-25 23:18:07 +00:00
$item [ 'plink' ] = substr ( trim ( $item [ 'plink' ] ? ? '' ), 0 , 255 );
2019-10-16 12:35:14 +00:00
$item [ 'allow_cid' ] = trim ( $item [ 'allow_cid' ] ? ? '' );
$item [ 'allow_gid' ] = trim ( $item [ 'allow_gid' ] ? ? '' );
$item [ 'deny_cid' ] = trim ( $item [ 'deny_cid' ] ? ? '' );
$item [ 'deny_gid' ] = trim ( $item [ 'deny_gid' ] ? ? '' );
2020-03-02 07:57:23 +00:00
$item [ 'private' ] = intval ( $item [ 'private' ] ? ? self :: PUBLIC );
2019-10-16 12:35:14 +00:00
$item [ 'body' ] = trim ( $item [ 'body' ] ? ? '' );
2020-10-29 05:20:26 +00:00
$item [ 'raw-body' ] = trim ( $item [ 'raw-body' ] ? ? $item [ 'body' ]);
2019-10-16 12:35:14 +00:00
$item [ 'app' ] = trim ( $item [ 'app' ] ? ? '' );
$item [ 'origin' ] = intval ( $item [ 'origin' ] ? ? 0 );
$item [ 'postopts' ] = trim ( $item [ 'postopts' ] ? ? '' );
$item [ 'resource-id' ] = trim ( $item [ 'resource-id' ] ? ? '' );
$item [ 'event-id' ] = intval ( $item [ 'event-id' ] ? ? 0 );
$item [ 'inform' ] = trim ( $item [ 'inform' ] ? ? '' );
$item [ 'file' ] = trim ( $item [ 'file' ] ? ? '' );
2018-01-28 11:18:08 +00:00
2023-03-22 04:08:09 +00:00
// Communities aren't working with the Diaspora protocol
2022-02-15 07:08:02 +00:00
if (( $uid != 0 ) && ( $item [ 'network' ] == Protocol :: DIASPORA )) {
$user = User :: getById ( $uid , [ 'account-type' ]);
2023-06-18 16:49:38 +00:00
if ( $user [ 'account-type' ] == Contact :: TYPE_COMMUNITY ) {
2022-02-15 07:08:02 +00:00
Logger :: info ( 'Community posts are not supported via Diaspora' );
return 0 ;
}
}
2018-01-28 11:18:08 +00:00
// Items cannot be stored before they happen ...
2018-02-21 21:39:07 +00:00
if ( $item [ 'created' ] > DateTimeFormat :: utcNow ()) {
$item [ 'created' ] = DateTimeFormat :: utcNow ();
2018-01-28 11:18:08 +00:00
}
// We haven't invented time travel by now.
2018-02-21 21:39:07 +00:00
if ( $item [ 'edited' ] > DateTimeFormat :: utcNow ()) {
$item [ 'edited' ] = DateTimeFormat :: utcNow ();
2018-01-28 11:18:08 +00:00
}
2019-12-30 22:00:08 +00:00
$item [ 'plink' ] = ( $item [ 'plink' ] ? ? '' ) ? : DI :: baseUrl () . '/display/' . urlencode ( $item [ 'guid' ]);
2018-01-28 11:18:08 +00:00
2020-05-12 20:13:48 +00:00
$item [ 'gravity' ] = self :: getGravity ( $item );
2023-06-18 16:49:38 +00:00
$default = [
'url' => $item [ 'author-link' ], 'name' => $item [ 'author-name' ],
'photo' => $item [ 'author-avatar' ], 'network' => $item [ 'network' ]
];
2020-07-15 21:08:42 +00:00
$item [ 'author-id' ] = ( $item [ 'author-id' ] ? ? 0 ) ? : Contact :: getIdForURL ( $item [ 'author-link' ], 0 , null , $default );
2018-01-28 11:18:08 +00:00
2023-06-18 16:49:38 +00:00
$default = [
'url' => $item [ 'owner-link' ], 'name' => $item [ 'owner-name' ],
'photo' => $item [ 'owner-avatar' ], 'network' => $item [ 'network' ]
];
2020-07-15 21:08:42 +00:00
$item [ 'owner-id' ] = ( $item [ 'owner-id' ] ? ? 0 ) ? : Contact :: getIdForURL ( $item [ 'owner-link' ], 0 , null , $default );
2019-03-10 21:19:21 +00:00
2022-08-07 19:24:50 +00:00
$item [ 'post-reason' ] = self :: getPostReason ( $item );
2022-07-29 21:28:22 +00:00
2020-07-25 11:48:52 +00:00
// Ensure that there is an avatar cache
Contact :: checkAvatarCache ( $item [ 'author-id' ]);
Contact :: checkAvatarCache ( $item [ 'owner-id' ]);
2022-08-22 07:54:48 +00:00
$item [ 'contact-id' ] = self :: contactId ( $item );
2019-08-02 17:17:51 +00:00
2023-06-18 16:49:38 +00:00
if (
! empty ( $item [ 'direction' ]) && in_array ( $item [ 'direction' ], [ Conversation :: PUSH , Conversation :: RELAY ]) &&
empty ( $item [ 'origin' ]) && self :: isTooOld ( $item )
) {
2021-01-11 20:00:51 +00:00
Logger :: info ( 'Item is too old' , [ 'item' => $item ]);
return 0 ;
}
2020-05-14 03:48:26 +00:00
if ( ! self :: isValid ( $item )) {
2019-02-10 12:21:16 +00:00
return 0 ;
}
2022-09-12 21:12:11 +00:00
if ( $item [ 'gravity' ] !== self :: GRAVITY_PARENT ) {
2020-11-11 07:44:43 +00:00
$toplevel_parent = self :: getTopLevelParent ( $item );
if ( empty ( $toplevel_parent )) {
return 0 ;
}
2020-05-13 05:48:26 +00:00
2021-01-27 10:01:42 +00:00
$parent_id = $toplevel_parent [ 'id' ];
$item [ 'parent-uri' ] = $toplevel_parent [ 'uri' ];
$item [ 'parent-uri-id' ] = $toplevel_parent [ 'uri-id' ];
$item [ 'deleted' ] = $toplevel_parent [ 'deleted' ];
2022-11-23 06:27:40 +00:00
$item [ 'wall' ] = $toplevel_parent [ 'wall' ];
2022-02-12 18:38:36 +00:00
2023-05-30 13:15:17 +00:00
// Reshares have to keep their permissions to allow groups to work
2023-03-24 20:39:11 +00:00
if ( ! $defined_permissions && ( ! $item [ 'origin' ] || ( $item [ 'verb' ] != Activity :: ANNOUNCE ))) {
2022-02-12 18:38:36 +00:00
$item [ 'allow_cid' ] = $toplevel_parent [ 'allow_cid' ];
$item [ 'allow_gid' ] = $toplevel_parent [ 'allow_gid' ];
$item [ 'deny_cid' ] = $toplevel_parent [ 'deny_cid' ];
$item [ 'deny_gid' ] = $toplevel_parent [ 'deny_gid' ];
}
2021-01-27 10:01:42 +00:00
$parent_origin = $toplevel_parent [ 'origin' ];
2020-05-13 05:48:26 +00:00
2020-11-11 07:44:43 +00:00
// Don't federate received participation messages
if ( $item [ 'verb' ] != Activity :: FOLLOW ) {
$item [ 'wall' ] = $toplevel_parent [ 'wall' ];
} else {
$item [ 'wall' ] = false ;
2021-02-21 11:59:59 +00:00
// Participations are technical messages, so they are set to "seen" automatically
$item [ 'unseen' ] = false ;
2020-11-11 07:44:43 +00:00
}
2020-05-13 05:48:26 +00:00
2020-11-11 07:44:43 +00:00
/*
* If the parent is private , force privacy for the entire conversation
* This differs from the above settings as it subtly allows comments from
* email correspondents to be private even if the overall thread is not .
*/
2023-03-24 20:39:11 +00:00
if ( ! $defined_permissions && $toplevel_parent [ 'private' ]) {
2020-11-11 07:44:43 +00:00
$item [ 'private' ] = $toplevel_parent [ 'private' ];
}
2019-02-10 11:28:17 +00:00
2020-11-11 07:44:43 +00:00
// If its a post that originated here then tag the thread as "mention"
if ( $item [ 'origin' ] && $item [ 'uid' ]) {
2021-02-04 09:46:29 +00:00
DBA :: update ( 'post-thread-user' , [ 'mention' => true ], [ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $item [ 'uid' ]]);
Logger :: info ( 'tagged thread as mention' , [ 'parent' => $parent_id , 'parent-uri-id' => $item [ 'parent-uri-id' ], 'uid' => $item [ 'uid' ]]);
2019-02-10 11:28:17 +00:00
}
2018-02-21 21:08:37 +00:00
2020-11-11 07:44:43 +00:00
// Update the contact relations
Contact\Relation :: store ( $toplevel_parent [ 'author-id' ], $item [ 'author-id' ], $item [ 'created' ]);
2018-01-28 11:18:08 +00:00
} else {
2020-05-12 20:13:48 +00:00
$parent_id = 0 ;
$parent_origin = $item [ 'origin' ];
2022-07-23 06:52:43 +00:00
if ( $item [ 'wall' ] && empty ( $item [ 'conversation' ])) {
$item [ 'conversation' ] = $item [ 'parent-uri' ] . '#context' ;
}
2019-06-06 04:26:02 +00:00
}
2023-02-07 14:18:01 +00:00
if ( $item [ 'origin' ]) {
2023-01-10 05:59:25 +00:00
if ( Photo :: setPermissionFromBody ( $item [ 'body' ], $item [ 'uid' ], $item [ 'contact-id' ], $item [ 'allow_cid' ], $item [ 'allow_gid' ], $item [ 'deny_cid' ], $item [ 'deny_gid' ])) {
$item [ 'object-type' ] = Activity\ObjectType :: IMAGE ;
}
$item = DI :: contentItem () -> moveAttachmentsFromBodyToAttach ( $item );
}
2018-08-05 11:09:59 +00:00
$item [ 'parent-uri-id' ] = ItemURI :: getIdByURI ( $item [ 'parent-uri' ]);
$item [ 'thr-parent-id' ] = ItemURI :: getIdByURI ( $item [ 'thr-parent' ]);
2022-07-23 06:52:43 +00:00
if ( ! empty ( $item [ 'conversation' ]) && empty ( $item [ 'conversation-id' ])) {
$item [ 'conversation-id' ] = ItemURI :: getIdByURI ( $item [ 'conversation' ]);
}
2018-06-03 09:40:32 +00:00
// Is this item available in the global items (with uid=0)?
2022-06-18 15:45:53 +00:00
if ( $item [ 'uid' ] == 0 ) {
$item [ 'global' ] = true ;
2018-06-03 09:40:32 +00:00
// Set the global flag on all items if this was a global item entry
2021-02-06 13:42:21 +00:00
Post :: update ([ 'global' => true ], [ 'uri-id' => $item [ 'uri-id' ]]);
2018-06-03 09:40:32 +00:00
} else {
2021-01-27 10:01:42 +00:00
$item [ 'global' ] = Post :: exists ([ 'uid' => 0 , 'uri-id' => $item [ 'uri-id' ]]);
2018-06-03 09:40:32 +00:00
}
2018-01-28 11:18:08 +00:00
// ACL settings
2023-03-24 20:39:11 +00:00
if ( ! $defined_permissions && ! empty ( $item [ 'allow_cid' ] . $item [ 'allow_gid' ] . $item [ 'deny_cid' ] . $item [ 'deny_gid' ])) {
2022-06-18 15:45:53 +00:00
$item [ 'private' ] = self :: PRIVATE ;
2018-01-28 11:18:08 +00:00
}
2021-08-06 18:49:17 +00:00
if ( $notify && $post_local ) {
2018-07-10 12:27:56 +00:00
$item [ 'edit' ] = false ;
$item [ 'parent' ] = $parent_id ;
2021-05-16 14:30:15 +00:00
// Trigger automatic reactions for addons
2021-12-20 21:16:00 +00:00
if ( ! isset ( $item [ 'api_source' ])) {
$item [ 'api_source' ] = true ;
}
2021-05-16 14:30:15 +00:00
// We have to tell the hooks who we are - this really should be improved
2022-10-20 20:14:50 +00:00
if ( ! DI :: userSession () -> getLocalUserId ()) {
2021-05-16 14:30:15 +00:00
$_SESSION [ 'authenticated' ] = true ;
$_SESSION [ 'uid' ] = $uid ;
$dummy_session = true ;
} else {
$dummy_session = false ;
}
2018-12-26 06:06:24 +00:00
Hook :: callAll ( 'post_local' , $item );
2021-05-16 14:30:15 +00:00
if ( $dummy_session ) {
unset ( $_SESSION [ 'authenticated' ]);
unset ( $_SESSION [ 'uid' ]);
}
2021-08-06 18:49:17 +00:00
} elseif ( ! $notify ) {
2018-12-26 06:06:24 +00:00
Hook :: callAll ( 'post_remote' , $item );
2018-01-28 11:18:08 +00:00
}
2018-11-30 14:06:22 +00:00
if ( ! empty ( $item [ 'cancel' ])) {
2021-10-20 18:53:52 +00:00
Logger :: notice ( 'post cancelled by addon.' );
2018-01-28 11:18:08 +00:00
return 0 ;
}
2020-05-12 20:13:48 +00:00
if ( empty ( $item [ 'vid' ]) && ! empty ( $item [ 'verb' ])) {
$item [ 'vid' ] = Verb :: getID ( $item [ 'verb' ]);
2018-06-30 21:15:24 +00:00
}
2018-07-25 23:14:55 +00:00
// Creates or assigns the permission set
2021-10-05 21:30:10 +00:00
$item [ 'psid' ] = DI :: permissionSet () -> selectOrCreate (
DI :: permissionSetFactory () -> createFromString (
$item [ 'uid' ],
$item [ 'allow_cid' ],
$item [ 'allow_gid' ],
$item [ 'deny_cid' ],
$item [ 'deny_gid' ]
2023-06-18 16:49:38 +00:00
)
) -> id ;
2019-11-05 13:27:22 +00:00
2021-02-14 09:43:27 +00:00
if ( ! empty ( $item [ 'extid' ])) {
$item [ 'external-id' ] = ItemURI :: getIdByURI ( $item [ 'extid' ]);
}
2020-08-13 06:09:26 +00:00
if ( $item [ 'verb' ] == Activity :: ANNOUNCE ) {
self :: setOwnerforResharedItem ( $item );
}
2020-05-13 18:45:31 +00:00
2021-05-01 15:48:19 +00:00
if ( isset ( $item [ 'attachments' ])) {
foreach ( $item [ 'attachments' ] as $attachment ) {
$attachment [ 'uri-id' ] = $item [ 'uri-id' ];
Post\Media :: insert ( $attachment );
}
unset ( $item [ 'attachments' ]);
}
2021-04-26 06:50:12 +00:00
2022-10-29 22:11:39 +00:00
if ( empty ( $item [ 'quote-uri-id' ])) {
$quote_id = self :: getQuoteUriId ( $item [ 'body' ]);
if ( ! empty ( $quote_id )) {
// This is one of these "should not happen" situations.
// The protocol implementations should already have done this job.
Logger :: notice ( 'Quote-uri-id detected in post' , [ 'id' => $quote_id , 'guid' => $item [ 'guid' ], 'uri-id' => $item [ 'uri-id' ], 'callstack' => System :: callstack ( 20 )]);
$item [ 'quote-uri-id' ] = $quote_id ;
}
}
if ( ! empty ( $item [ 'quote-uri-id' ])) {
$item [ 'raw-body' ] = BBCode :: removeSharedData ( $item [ 'raw-body' ]);
$item [ 'body' ] = BBCode :: removeSharedData ( $item [ 'body' ]);
}
2020-10-29 05:20:26 +00:00
// Remove all media attachments from the body and store them in the post-media table
2020-10-29 08:48:08 +00:00
$item [ 'raw-body' ] = Post\Media :: insertFromBody ( $item [ 'uri-id' ], $item [ 'raw-body' ]);
2020-10-29 05:20:26 +00:00
$item [ 'raw-body' ] = self :: setHashtags ( $item [ 'raw-body' ]);
2022-12-08 05:49:25 +00:00
$author = Contact :: getById ( $item [ 'author-id' ], [ 'network' ]);
Post\Media :: insertFromRelevantUrl ( $item [ 'uri-id' ], $item [ 'raw-body' ], $item [ 'body' ], $author [ 'network' ] ? ? '' );
2021-05-30 06:13:20 +00:00
2023-02-27 07:47:31 +00:00
Post\Media :: insertFromAttachmentData ( $item [ 'uri-id' ], $item [ 'body' ]);
$item [ 'body' ] = BBCode :: removeAttachment ( $item [ 'body' ]);
$item [ 'raw-body' ] = BBCode :: removeAttachment ( $item [ 'raw-body' ]);
2020-05-13 18:45:31 +00:00
// Check for hashtags in the body and repair or add hashtag links
2020-06-05 00:56:50 +00:00
$item [ 'body' ] = self :: setHashtags ( $item [ 'body' ]);
2020-05-31 15:48:31 +00:00
2022-09-04 07:32:46 +00:00
$item [ 'language' ] = self :: getLanguage ( $item );
2022-08-09 17:21:42 +00:00
$notify_type = Delivery :: POST ;
2020-05-13 18:45:31 +00:00
2021-02-01 07:06:01 +00:00
// Filling item related side tables
if ( ! empty ( $item [ 'attach' ])) {
Post\Media :: insertFromAttachment ( $item [ 'uri-id' ], $item [ 'attach' ]);
2020-05-18 21:34:57 +00:00
}
2021-02-13 19:56:03 +00:00
if ( empty ( $item [ 'event-id' ])) {
unset ( $item [ 'event-id' ]);
2021-05-26 09:24:37 +00:00
$ev = Event :: fromBBCode ( $item [ 'body' ]);
if (( ! empty ( $ev [ 'desc' ]) || ! empty ( $ev [ 'summary' ])) && ! empty ( $ev [ 'start' ])) {
Logger :: info ( 'Event found.' );
$ev [ 'cid' ] = $item [ 'contact-id' ];
$ev [ 'uid' ] = $item [ 'uid' ];
$ev [ 'uri' ] = $item [ 'uri' ];
$ev [ 'edited' ] = $item [ 'edited' ];
$ev [ 'private' ] = $item [ 'private' ];
$ev [ 'guid' ] = $item [ 'guid' ];
$ev [ 'plink' ] = $item [ 'plink' ];
$ev [ 'network' ] = $item [ 'network' ];
2021-07-17 20:27:18 +00:00
$ev [ 'protocol' ] = $item [ 'protocol' ] ? ? Conversation :: PARCEL_UNKNOWN ;
$ev [ 'direction' ] = $item [ 'direction' ] ? ? Conversation :: UNKNOWN ;
$ev [ 'source' ] = $item [ 'source' ] ? ? '' ;
2021-05-26 09:24:37 +00:00
$event = DBA :: selectFirst ( 'event' , [ 'id' ], [ 'uri' => $item [ 'uri' ], 'uid' => $item [ 'uid' ]]);
if ( DBA :: isResult ( $event )) {
$ev [ 'id' ] = $event [ 'id' ];
}
2021-07-18 15:05:46 +00:00
$event_id = Event :: store ( $ev );
2021-08-10 10:24:14 +00:00
$item = Event :: getItemArrayForImportedId ( $event_id , $item );
2021-07-18 15:05:46 +00:00
Logger :: info ( 'Event was stored' , [ 'id' => $event_id ]);
2021-05-26 09:24:37 +00:00
}
2021-02-13 19:56:03 +00:00
}
2021-03-01 22:19:47 +00:00
if ( empty ( $item [ 'causer-id' ])) {
unset ( $item [ 'causer-id' ]);
}
2022-03-06 11:49:55 +00:00
if ( in_array ( $item [ 'network' ], [ Protocol :: ACTIVITYPUB , Protocol :: DFRN ])) {
$content_warning = BBCode :: getAbstract ( $item [ 'body' ], Protocol :: ACTIVITYPUB );
if ( ! empty ( $content_warning ) && empty ( $item [ 'content-warning' ])) {
2022-05-15 21:04:01 +00:00
$item [ 'content-warning' ] = BBCode :: toPlaintext ( $content_warning );
2022-03-06 11:49:55 +00:00
}
}
2023-09-17 19:28:38 +00:00
$inserted = Post :: insert ( $item [ 'uri-id' ], $item );
2021-02-13 19:56:03 +00:00
2022-09-12 21:12:11 +00:00
if ( $item [ 'gravity' ] == self :: GRAVITY_PARENT ) {
2021-02-04 05:51:25 +00:00
Post\Thread :: insert ( $item [ 'uri-id' ], $item );
}
2023-02-20 13:26:23 +00:00
// The content of activities normally doesn't matter - except for likes from Misskey
2023-02-21 21:07:41 +00:00
if ( ! in_array ( $item [ 'verb' ], self :: ACTIVITIES ) || in_array ( $item [ 'verb' ], [ Activity :: LIKE , Activity :: DISLIKE ]) && ! empty ( $item [ 'body' ]) && ( mb_strlen ( $item [ 'body' ]) == 1 )) {
2021-02-01 07:06:01 +00:00
Post\Content :: insert ( $item [ 'uri-id' ], $item );
2020-05-13 18:45:31 +00:00
}
2023-01-09 15:55:35 +00:00
$item [ 'parent' ] = $parent_id ;
2021-05-31 19:39:50 +00:00
// Create Diaspora signature
2022-09-12 21:12:11 +00:00
if ( $item [ 'origin' ] && empty ( $item [ 'diaspora_signed_text' ]) && ( $item [ 'gravity' ] != self :: GRAVITY_PARENT )) {
2021-08-05 08:42:46 +00:00
$signed = Diaspora :: createCommentSignature ( $item );
2021-05-31 19:39:50 +00:00
if ( ! empty ( $signed )) {
$item [ 'diaspora_signed_text' ] = json_encode ( $signed );
}
}
2020-05-12 20:13:48 +00:00
if ( ! empty ( $item [ 'diaspora_signed_text' ])) {
2020-10-23 19:10:17 +00:00
DBA :: replace ( 'diaspora-interaction' , [ 'uri-id' => $item [ 'uri-id' ], 'interaction' => $item [ 'diaspora_signed_text' ]]);
2020-05-12 20:13:48 +00:00
}
2020-05-13 05:48:26 +00:00
// Attached file links
2020-05-13 18:45:31 +00:00
if ( ! empty ( $item [ 'file' ])) {
2020-11-17 22:33:44 +00:00
Post\Category :: storeTextByURIId ( $item [ 'uri-id' ], $item [ 'uid' ], $item [ 'file' ]);
2020-05-12 20:13:48 +00:00
}
2020-05-13 05:48:26 +00:00
// Delivery relevant data
2020-05-12 20:13:48 +00:00
$delivery_data = Post\DeliveryData :: extractFields ( $item );
2018-07-19 21:56:52 +00:00
2020-05-13 18:45:31 +00:00
if ( ! empty ( $item [ 'origin' ]) || ! empty ( $item [ 'wall' ]) || ! empty ( $delivery_data [ 'postopts' ]) || ! empty ( $delivery_data [ 'inform' ])) {
Post\DeliveryData :: insert ( $item [ 'uri-id' ], $delivery_data );
}
2018-08-29 20:46:52 +00:00
2020-05-12 20:13:48 +00:00
// Store tags from the body if this hadn't been handled previously in the protocol classes
if ( ! Tag :: existsForPost ( $item [ 'uri-id' ])) {
2021-02-01 07:06:01 +00:00
Tag :: storeFromBody ( $item [ 'uri-id' ], $item [ 'body' ]);
2020-05-12 20:13:48 +00:00
}
2020-07-09 22:22:26 +00:00
2021-02-13 19:56:03 +00:00
$condition = [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $item [ 'uid' ]];
if ( Post :: exists ( $condition )) {
Logger :: notice ( 'Item is already inserted - aborting' , $condition );
return 0 ;
}
2021-02-14 18:33:15 +00:00
$post_user_id = Post\User :: insert ( $item [ 'uri-id' ], $item [ 'uid' ], $item );
if ( ! $post_user_id ) {
2021-02-01 07:06:01 +00:00
Logger :: notice ( 'Post-User is already inserted - aborting' , [ 'uid' => $item [ 'uid' ], 'uri-id' => $item [ 'uri-id' ]]);
return 0 ;
}
2021-01-31 18:32:22 +00:00
2022-09-12 21:12:11 +00:00
if ( $item [ 'gravity' ] == self :: GRAVITY_PARENT ) {
2021-02-14 18:33:15 +00:00
$item [ 'post-user-id' ] = $post_user_id ;
2021-02-01 07:06:01 +00:00
Post\ThreadUser :: insert ( $item [ 'uri-id' ], $item [ 'uid' ], $item );
}
2018-01-28 11:18:08 +00:00
2021-02-14 20:27:31 +00:00
Logger :: notice ( 'created item' , [ 'post-id' => $post_user_id , 'uid' => $item [ 'uid' ], 'network' => $item [ 'network' ], 'uri-id' => $item [ 'uri-id' ], 'guid' => $item [ 'guid' ]]);
2018-01-28 11:18:08 +00:00
2021-02-14 18:33:15 +00:00
$posted_item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'post-user-id' => $post_user_id ]);
if ( ! DBA :: isResult ( $posted_item )) {
2021-02-14 20:27:31 +00:00
// On failure store the data into a spool file so that the "SpoolPost" worker can try again later.
Logger :: warning ( 'Could not store item. it will be spooled' , [ 'id' => $post_user_id ]);
self :: spool ( $orig_item );
2021-02-14 18:33:15 +00:00
return 0 ;
}
2018-01-28 11:18:08 +00:00
// update the commented timestamp on the parent
2020-10-05 17:57:24 +00:00
if ( DI :: config () -> get ( 'system' , 'like_no_comment' )) {
// Update when it is a comment
2022-09-12 21:12:11 +00:00
$update_commented = in_array ( $posted_item [ 'gravity' ], [ self :: GRAVITY_PARENT , self :: GRAVITY_COMMENT ]);
2020-10-05 17:57:24 +00:00
} else {
// Update when it isn't a follow or tag verb
2021-02-14 18:33:15 +00:00
$update_commented = ! in_array ( $posted_item [ 'verb' ], [ Activity :: FOLLOW , Activity :: TAG ]);
2020-10-05 17:57:24 +00:00
}
if ( $update_commented ) {
2021-02-15 11:03:22 +00:00
$fields = [ 'commented' => DateTimeFormat :: utcNow (), 'changed' => DateTimeFormat :: utcNow ()];
2018-01-28 11:18:08 +00:00
} else {
2021-02-15 11:03:22 +00:00
$fields = [ 'changed' => DateTimeFormat :: utcNow ()];
2018-01-28 11:18:08 +00:00
}
2021-02-15 11:03:22 +00:00
Post :: update ( $fields , [ 'uri-id' => $posted_item [ 'parent-uri-id' ], 'uid' => $posted_item [ 'uid' ]]);
2023-05-30 13:15:17 +00:00
// In that function we check if this is a group post. Additionally we delete the item under certain circumstances
2021-02-14 18:33:15 +00:00
if ( self :: tagDeliver ( $posted_item [ 'uid' ], $post_user_id )) {
2019-08-03 10:36:21 +00:00
// Get the user information for the logging
$user = User :: getById ( $uid );
2021-02-14 18:33:15 +00:00
Logger :: notice ( 'Item had been deleted' , [ 'id' => $post_user_id , 'user' => $uid , 'account-type' => $user [ 'account-type' ]]);
2019-08-03 10:36:21 +00:00
return 0 ;
}
2021-08-06 18:49:17 +00:00
if ( $notify ) {
2023-01-04 06:52:40 +00:00
DI :: contentItem () -> postProcessPost ( $posted_item );
2021-08-06 18:49:17 +00:00
} else {
Hook :: callAll ( 'post_remote_end' , $posted_item );
2019-08-03 10:36:21 +00:00
}
2022-09-12 21:12:11 +00:00
if ( $posted_item [ 'gravity' ] === self :: GRAVITY_PARENT ) {
2021-02-14 18:33:15 +00:00
self :: addShadow ( $post_user_id );
2018-01-28 11:18:08 +00:00
} else {
2021-02-14 18:33:15 +00:00
self :: addShadowPost ( $post_user_id );
2018-01-28 11:18:08 +00:00
}
2021-02-14 18:33:15 +00:00
self :: updateContact ( $posted_item );
2019-08-03 10:36:21 +00:00
2021-02-14 18:33:15 +00:00
Post\UserNotification :: setNotification ( $posted_item [ 'uri-id' ], $posted_item [ 'uid' ]);
2020-01-05 01:23:40 +00:00
2020-07-21 08:35:57 +00:00
// Distribute items to users who subscribed to their tags
2021-02-14 18:33:15 +00:00
self :: distributeByTags ( $posted_item );
2020-07-21 08:35:57 +00:00
2020-11-28 22:53:58 +00:00
// Automatically reshare the item if the "remote_self" option is selected
2021-02-14 18:33:15 +00:00
self :: autoReshare ( $posted_item );
2020-11-28 22:53:58 +00:00
2021-02-14 18:33:15 +00:00
$transmit = $notify || ( $posted_item [ 'visible' ] && ( $parent_origin || $posted_item [ 'origin' ]));
2020-05-06 20:43:00 +00:00
if ( $transmit ) {
2023-01-09 16:23:39 +00:00
if ( $posted_item [ 'uid' ] && Contact\User :: isBlocked ( $posted_item [ 'author-id' ], $posted_item [ 'uid' ])) {
Logger :: info ( 'Message from blocked author will not be relayed' , [ 'item' => $posted_item [ 'id' ], 'uri' => $posted_item [ 'uri' ], 'cid' => $posted_item [ 'author-id' ]]);
$transmit = false ;
}
if ( $transmit && $posted_item [ 'uid' ] && Contact\User :: isBlocked ( $posted_item [ 'owner-id' ], $posted_item [ 'uid' ])) {
Logger :: info ( 'Message from blocked owner will not be relayed' , [ 'item' => $posted_item [ 'id' ], 'uri' => $posted_item [ 'uri' ], 'cid' => $posted_item [ 'owner-id' ]]);
$transmit = false ;
}
if ( $transmit && ! empty ( $posted_item [ 'causer-id' ]) && $posted_item [ 'uid' ] && Contact\User :: isBlocked ( $posted_item [ 'causer-id' ], $posted_item [ 'uid' ])) {
Logger :: info ( 'Message from blocked causer will not be relayed' , [ 'item' => $posted_item [ 'id' ], 'uri' => $posted_item [ 'uri' ], 'cid' => $posted_item [ 'causer-id' ]]);
$transmit = false ;
}
2020-05-06 20:43:00 +00:00
// Don't relay participation messages
2021-04-26 06:50:12 +00:00
if (( $posted_item [ 'verb' ] == Activity :: FOLLOW ) &&
2023-06-18 16:49:38 +00:00
( ! $posted_item [ 'origin' ] || ( $posted_item [ 'author-id' ] != Contact :: getPublicIdByUserId ( $uid )))
) {
2021-02-14 18:33:15 +00:00
Logger :: info ( 'Participation messages will not be relayed' , [ 'item' => $posted_item [ 'id' ], 'uri' => $posted_item [ 'uri' ], 'verb' => $posted_item [ 'verb' ]]);
2020-05-06 20:43:00 +00:00
$transmit = false ;
}
}
2022-11-08 06:40:22 +00:00
if ( ! empty ( $source ) && ( $transmit || DI :: config () -> get ( 'debug' , 'store_source' ))) {
Post\Activity :: insert ( $item [ 'uri-id' ], $source );
}
2020-05-06 20:43:00 +00:00
if ( $transmit ) {
2021-02-14 18:33:15 +00:00
Worker :: add ([ 'priority' => $priority , 'dont_fork' => true ], 'Notifier' , $notify_type , ( int ) $posted_item [ 'uri-id' ], ( int ) $posted_item [ 'uid' ]);
2018-01-28 11:18:08 +00:00
}
2022-05-04 06:17:34 +00:00
// Fill the cache with the rendered content.
2022-09-12 21:12:11 +00:00
if ( in_array ( $posted_item [ 'gravity' ], [ self :: GRAVITY_PARENT , self :: GRAVITY_COMMENT ]) && ( $posted_item [ 'uid' ] == 0 )) {
2022-05-04 06:17:34 +00:00
self :: updateDisplayCache ( $posted_item [ 'uri-id' ]);
}
2023-09-17 19:28:38 +00:00
if ( $inserted ) {
Post\Engagement :: storeFromItem ( $posted_item );
}
2023-09-01 21:56:59 +00:00
2021-02-14 18:33:15 +00:00
return $post_user_id ;
2018-01-28 11:18:08 +00:00
}
2022-08-07 19:24:50 +00:00
/**
* Fetch the post reason for a given item array
*
* @ param array $item
*
* @ return integer
*/
public static function getPostReason ( array $item ) : int
{
2022-09-12 21:12:11 +00:00
$actor = ( $item [ 'gravity' ] == self :: GRAVITY_PARENT ) ? $item [ 'owner-id' ] : $item [ 'author-id' ];
2022-08-07 19:24:50 +00:00
if ( empty ( $item [ 'origin' ]) && ( $item [ 'uid' ] != 0 ) && Contact :: isSharing ( $actor , $item [ 'uid' ])) {
return self :: PR_FOLLOWER ;
}
if ( ! empty ( $item [ 'origin' ]) && empty ( $item [ 'post-reason' ])) {
return self :: PR_LOCAL ;
}
return $item [ 'post-reason' ] ? ? self :: PR_NONE ;
}
2022-05-04 06:17:34 +00:00
/**
* Update the display cache
*
* @ param integer $uri_id
* @ return void
2023-04-03 04:05:40 +00:00
* @ throws InternalServerErrorException
* @ throws \ImagickException
2022-05-04 06:17:34 +00:00
*/
public static function updateDisplayCache ( int $uri_id )
{
$item = Post :: selectFirst ( self :: DISPLAY_FIELDLIST , [ 'uri-id' => $uri_id ]);
2023-04-03 04:05:40 +00:00
if ( ! $item ) {
return ;
}
2022-05-04 06:17:34 +00:00
self :: prepareBody ( $item , false , false , true );
}
2020-08-09 22:46:18 +00:00
/**
2023-05-30 13:15:17 +00:00
* Change the owner of a parent item if it had been shared by a group
2020-08-09 22:46:18 +00:00
*
2023-05-30 13:15:17 +00:00
* ( public ) group posts in the new format consist of the regular post by the author
* followed by an announce message sent from the group account .
* Changing the owner helps in grouping group posts .
2020-08-13 06:09:26 +00:00
*
2020-08-09 22:46:18 +00:00
* @ param array $item
* @ return void
*/
2020-08-13 06:09:26 +00:00
private static function setOwnerforResharedItem ( array $item )
2020-08-09 22:46:18 +00:00
{
2023-06-18 16:49:38 +00:00
$parent = Post :: selectFirst (
[ 'id' , 'causer-id' , 'owner-id' , 'author-id' , 'author-link' , 'origin' , 'post-reason' ],
[ 'uri-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ]]
);
2020-08-13 06:09:26 +00:00
if ( ! DBA :: isResult ( $parent )) {
2020-09-13 14:15:28 +00:00
Logger :: error ( 'Parent not found' , [ 'uri-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ]]);
2020-08-09 22:46:18 +00:00
return ;
}
2021-02-14 20:27:31 +00:00
$author = Contact :: selectFirst ([ 'url' , 'contact-type' , 'network' ], [ 'id' => $item [ 'author-id' ]]);
2020-08-13 06:09:26 +00:00
if ( ! DBA :: isResult ( $author )) {
Logger :: error ( 'Author not found' , [ 'id' => $item [ 'author-id' ]]);
2020-08-09 22:46:18 +00:00
return ;
}
2022-02-18 06:12:02 +00:00
$self_contact = Contact :: selectFirst ([ 'id' ], [ 'uid' => $item [ 'uid' ], 'self' => true ]);
$self = ! empty ( $self_contact ) ? $self_contact [ 'id' ] : 0 ;
2022-03-06 11:49:55 +00:00
2020-08-13 06:09:26 +00:00
$cid = Contact :: getIdForURL ( $author [ 'url' ], $item [ 'uid' ]);
2022-02-18 06:12:02 +00:00
if ( empty ( $cid ) || ( ! Contact :: isSharing ( $cid , $item [ 'uid' ]) && ( $cid != $self ))) {
2021-02-14 20:27:31 +00:00
Logger :: info ( 'The resharer is not a following contact: quit' , [ 'resharer' => $author [ 'url' ], 'uid' => $item [ 'uid' ], 'cid' => $cid ]);
2020-08-13 06:09:26 +00:00
return ;
}
2020-09-13 14:15:28 +00:00
if ( $author [ 'contact-type' ] != Contact :: TYPE_COMMUNITY ) {
2021-04-07 06:02:06 +00:00
if ( $parent [ 'post-reason' ] == self :: PR_ANNOUNCEMENT ) {
2020-10-11 17:37:04 +00:00
Logger :: info ( 'The parent is already marked as announced: quit' , [ 'causer' => $parent [ 'causer-id' ], 'owner' => $parent [ 'owner-id' ], 'author' => $parent [ 'author-id' ], 'uid' => $item [ 'uid' ]]);
return ;
}
2020-09-25 06:47:07 +00:00
if ( Contact :: isSharing ( $parent [ 'owner-id' ], $item [ 'uid' ])) {
2023-05-30 13:15:17 +00:00
Logger :: info ( 'The resharer is no group: quit' , [ 'resharer' => $item [ 'author-id' ], 'owner' => $parent [ 'owner-id' ], 'author' => $parent [ 'author-id' ], 'uid' => $item [ 'uid' ]]);
2020-09-13 14:15:28 +00:00
return ;
}
2020-08-13 06:09:26 +00:00
}
2021-06-05 06:13:10 +00:00
self :: update ([ 'post-reason' => self :: PR_ANNOUNCEMENT , 'causer-id' => $item [ 'author-id' ]], [ 'id' => $parent [ 'id' ]]);
Logger :: info ( 'Set announcement post-reason' , [ 'uri-id' => $item [ 'uri-id' ], 'thr-parent-id' => $item [ 'thr-parent-id' ], 'uid' => $item [ 'uid' ]]);
2020-08-09 22:46:18 +00:00
}
2020-07-21 08:35:57 +00:00
/**
* Distribute the given item to users who subscribed to their tags
*
* @ param array $item Processed item
*/
2020-07-23 03:26:54 +00:00
private static function distributeByTags ( array $item )
2020-07-21 08:35:57 +00:00
{
2022-09-12 21:12:11 +00:00
if (( $item [ 'uid' ] != 0 ) || ( $item [ 'gravity' ] != self :: GRAVITY_PARENT ) || ! in_array ( $item [ 'network' ], Protocol :: FEDERATED )) {
2020-07-21 08:35:57 +00:00
return ;
}
2023-08-28 04:05:52 +00:00
foreach ( Tag :: getUIDListByURIId ( $item [ 'uri-id' ]) as $uid => $tags ) {
2022-07-29 14:17:53 +00:00
$stored = self :: storeForUserByUriId ( $item [ 'uri-id' ], $uid , [ 'post-reason' => self :: PR_TAG ]);
Logger :: info ( 'Stored item for users' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid , 'stored' => $stored ]);
2023-08-28 04:05:52 +00:00
foreach ( $tags as $tag ) {
$stored = Category :: storeFileByURIId ( $item [ 'uri-id' ], $uid , Category :: SUBCRIPTION , $tag );
Logger :: debug ( 'Stored tag subscription for user' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid , $tag , 'stored' => $stored ]);
}
2020-07-21 08:35:57 +00:00
}
}
2018-04-24 13:21:25 +00:00
/**
2020-01-19 06:05:23 +00:00
* Distributes public items to the receivers
2018-04-24 13:21:25 +00:00
*
2018-05-15 04:33:28 +00:00
* @ param integer $itemid Item ID that should be added
* @ param string $signed_text Original text ( for Diaspora signatures ), JSON encoded .
2019-01-06 21:06:53 +00:00
* @ throws \Exception
2018-04-24 13:21:25 +00:00
*/
2022-06-15 20:03:13 +00:00
public static function distribute ( int $itemid , string $signed_text = '' )
2018-04-24 13:21:25 +00:00
{
2021-02-22 19:47:08 +00:00
$condition = [ " `id` IN (SELECT `parent` FROM `post-user-view` WHERE `id` = ?) " , $itemid ];
2021-01-16 04:13:22 +00:00
$parent = Post :: selectFirst ([ 'owner-id' ], $condition );
2018-07-21 12:46:04 +00:00
if ( ! DBA :: isResult ( $parent )) {
2021-02-14 18:33:15 +00:00
Logger :: warning ( 'Item not found' , [ 'condition' => $condition ]);
2018-04-24 13:21:25 +00:00
return ;
}
// Only distribute public items from native networks
2023-06-18 16:49:38 +00:00
$condition = [
'id' => $itemid , 'uid' => 0 ,
'network' => array_merge ( Protocol :: FEDERATED , [ '' ]),
'visible' => true , 'deleted' => false , 'private' => [ self :: PUBLIC , self :: UNLISTED ]
];
2022-07-31 15:54:35 +00:00
$item = Post :: selectFirst ( array_merge ( self :: ITEM_FIELDLIST , [ 'protocol' ]), $condition );
2018-07-21 12:46:04 +00:00
if ( ! DBA :: isResult ( $item )) {
2021-02-14 18:33:15 +00:00
Logger :: warning ( 'Item not found' , [ 'condition' => $condition ]);
2018-04-24 13:21:25 +00:00
return ;
}
2018-07-10 12:27:56 +00:00
$origin = $item [ 'origin' ];
2018-04-26 19:47:12 +00:00
$users = [];
2023-03-22 04:08:13 +00:00
/// @todo add a field "pcid" in the contact table that refers to the public contact id.
2018-09-15 18:54:45 +00:00
$owner = DBA :: selectFirst ( 'contact' , [ 'url' , 'nurl' , 'alias' ], [ 'id' => $parent [ 'owner-id' ]]);
if ( ! DBA :: isResult ( $owner )) {
return ;
}
$condition = [ 'nurl' => $owner [ 'nurl' ], 'rel' => [ Contact :: SHARING , Contact :: FRIEND ]];
$contacts = DBA :: select ( 'contact' , [ 'uid' ], $condition );
while ( $contact = DBA :: fetch ( $contacts )) {
if ( $contact [ 'uid' ] == 0 ) {
continue ;
}
$users [ $contact [ 'uid' ]] = $contact [ 'uid' ];
}
DBA :: close ( $contacts );
$condition = [ 'alias' => $owner [ 'url' ], 'rel' => [ Contact :: SHARING , Contact :: FRIEND ]];
$contacts = DBA :: select ( 'contact' , [ 'uid' ], $condition );
while ( $contact = DBA :: fetch ( $contacts )) {
if ( $contact [ 'uid' ] == 0 ) {
continue ;
}
$users [ $contact [ 'uid' ]] = $contact [ 'uid' ];
}
DBA :: close ( $contacts );
if ( ! empty ( $owner [ 'alias' ])) {
2020-07-18 15:49:10 +00:00
$condition = [ 'nurl' => Strings :: normaliseLink ( $owner [ 'alias' ]), 'rel' => [ Contact :: SHARING , Contact :: FRIEND ]];
2018-09-15 18:54:45 +00:00
$contacts = DBA :: select ( 'contact' , [ 'uid' ], $condition );
while ( $contact = DBA :: fetch ( $contacts )) {
if ( $contact [ 'uid' ] == 0 ) {
continue ;
}
$users [ $contact [ 'uid' ]] = $contact [ 'uid' ];
}
DBA :: close ( $contacts );
}
2018-05-15 04:33:28 +00:00
$origin_uid = 0 ;
2021-01-27 10:01:42 +00:00
if ( $item [ 'uri-id' ] != $item [ 'parent-uri-id' ]) {
$parents = Post :: select ([ 'uid' , 'origin' ], [ " `uri-id` = ? AND `uid` != 0 " , $item [ 'parent-uri-id' ]]);
2021-01-16 04:13:22 +00:00
while ( $parent = Post :: fetch ( $parents )) {
2018-04-26 19:47:12 +00:00
$users [ $parent [ 'uid' ]] = $parent [ 'uid' ];
2018-07-10 12:27:56 +00:00
if ( $parent [ 'origin' ] && ! $origin ) {
2018-05-15 04:33:28 +00:00
$origin_uid = $parent [ 'uid' ];
}
2018-04-26 19:47:12 +00:00
}
2021-01-16 04:13:22 +00:00
DBA :: close ( $parents );
2018-04-26 19:47:12 +00:00
}
foreach ( $users as $uid ) {
2018-05-15 04:33:28 +00:00
if ( $origin_uid == $uid ) {
$item [ 'diaspora_signed_text' ] = $signed_text ;
}
2022-07-29 14:17:53 +00:00
$item [ 'post-reason' ] = self :: PR_DISTRIBUTE ;
2020-07-21 08:35:57 +00:00
self :: storeForUser ( $item , $uid );
2018-04-24 13:21:25 +00:00
}
}
/**
2020-07-23 03:26:54 +00:00
* Store a public item defined by their URI - ID for the given users
*
2021-05-26 09:24:37 +00:00
* @ param integer $uri_id URI - ID of the given item
* @ param integer $uid The user that will receive the item entry
* @ param array $fields Additional fields to be stored
* @ param integer $source_uid User id of the source post
2020-07-23 03:26:54 +00:00
* @ return integer stored item id
*/
2022-06-15 20:28:33 +00:00
public static function storeForUserByUriId ( int $uri_id , int $uid , array $fields = [], int $source_uid = 0 ) : int
2020-07-23 03:26:54 +00:00
{
2021-05-26 09:24:37 +00:00
if ( $uid == $source_uid ) {
2021-05-26 18:15:07 +00:00
Logger :: warning ( 'target UID must not be be equal to the source UID' , [ 'uri-id' => $uri_id , 'uid' => $uid ]);
2021-05-26 09:24:37 +00:00
return 0 ;
}
2022-07-31 15:54:35 +00:00
$item = Post :: selectFirst ( array_merge ( self :: ITEM_FIELDLIST , [ 'protocol' ]), [ 'uri-id' => $uri_id , 'uid' => $source_uid ]);
2020-07-28 06:42:12 +00:00
if ( ! DBA :: isResult ( $item )) {
2021-05-26 09:24:37 +00:00
Logger :: warning ( 'Item could not be fetched' , [ 'uri-id' => $uri_id , 'uid' => $source_uid ]);
2020-07-28 06:42:12 +00:00
return 0 ;
}
2022-09-12 21:12:11 +00:00
if (( $uid != 0 ) && ( $item [ 'gravity' ] == self :: GRAVITY_PARENT )) {
2022-08-17 05:28:24 +00:00
$owner = User :: getOwnerDataById ( $uid );
if (( $owner [ 'contact-type' ] == User :: ACCOUNT_TYPE_COMMUNITY ) && ! Tag :: isMentioned ( $uri_id , $owner [ 'url' ])) {
2023-05-30 13:15:17 +00:00
Logger :: info ( 'Target user is a group but is not mentioned here, thread will not be stored' , [ 'uid' => $uid , 'uri-id' => $uri_id ]);
2022-08-17 05:28:24 +00:00
return 0 ;
}
}
2021-05-26 09:24:37 +00:00
if (( $source_uid == 0 ) && (( $item [ 'private' ] == self :: PRIVATE ) || ! in_array ( $item [ 'network' ], Protocol :: FEDERATED ))) {
2020-07-28 06:42:12 +00:00
Logger :: notice ( 'Item is private or not from a federated network. It will not be stored for the user.' , [ 'uri-id' => $uri_id , 'uid' => $uid , 'private' => $item [ 'private' ], 'network' => $item [ 'network' ]]);
2020-07-23 03:26:54 +00:00
return 0 ;
}
2020-08-23 17:48:44 +00:00
2021-04-07 06:02:06 +00:00
$item [ 'post-reason' ] = self :: PR_STORED ;
2020-09-13 14:15:28 +00:00
2020-08-23 17:48:44 +00:00
$item = array_merge ( $item , $fields );
2020-07-23 03:26:54 +00:00
2022-09-12 21:12:11 +00:00
if (( $uid != 0 ) && Contact :: isSharing (( $item [ 'gravity' ] == Item :: GRAVITY_PARENT ) ? $item [ 'owner-id' ] : $item [ 'author-id' ], $uid )) {
2022-09-27 15:58:16 +00:00
$item [ 'post-reason' ] = self :: PR_FOLLOWER ;
}
2022-08-07 19:24:50 +00:00
2022-09-12 21:12:11 +00:00
$is_reshare = ( $item [ 'gravity' ] == self :: GRAVITY_ACTIVITY ) && ( $item [ 'verb' ] == Activity :: ANNOUNCE );
2021-05-26 09:24:37 +00:00
2022-09-12 21:12:11 +00:00
if (( $uid != 0 ) && (( $item [ 'gravity' ] == self :: GRAVITY_PARENT ) || $is_reshare ) &&
2022-02-18 14:32:30 +00:00
DI :: pConfig () -> get ( $uid , 'system' , 'accept_only_sharer' ) == self :: COMPLETION_NONE &&
2023-06-18 16:49:38 +00:00
! in_array ( $item [ 'post-reason' ], [ self :: PR_FOLLOWER , self :: PR_TAG , self :: PR_TO , self :: PR_CC , self :: PR_ACTIVITY , self :: PR_AUDIENCE ])
) {
2022-09-27 15:58:16 +00:00
Logger :: info ( 'Contact is not a follower, thread will not be stored' , [ 'author' => $item [ 'author-link' ], 'uid' => $uid , 'uri-id' => $uri_id , 'post-reason' => $item [ 'post-reason' ]]);
2021-05-26 09:24:37 +00:00
return 0 ;
}
2022-08-17 05:28:24 +00:00
$causer = $item [ 'causer-id' ] ? : $item [ 'author-id' ];
2022-09-12 21:12:11 +00:00
if (( $uri_id != $item [ 'parent-uri-id' ]) && ( $item [ 'gravity' ] == self :: GRAVITY_COMMENT ) && ! Post :: exists ([ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $uid ])) {
2022-08-17 05:28:24 +00:00
if ( ! self :: fetchParent ( $item [ 'parent-uri-id' ], $uid , $causer )) {
Logger :: info ( 'Parent post had not been added' , [ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $uid , 'causer' => $causer ]);
2022-02-14 22:04:33 +00:00
return 0 ;
}
2022-08-17 05:28:24 +00:00
Logger :: info ( 'Fetched parent post' , [ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $uid , 'causer' => $causer ]);
2022-08-17 19:39:20 +00:00
} elseif (( $uri_id != $item [ 'thr-parent-id' ]) && $is_reshare && ! Post :: exists ([ 'uri-id' => $item [ 'thr-parent-id' ], 'uid' => $uid ])) {
if ( ! self :: fetchParent ( $item [ 'thr-parent-id' ], $uid , $causer )) {
Logger :: info ( 'Thread parent had not been added' , [ 'uri-id' => $item [ 'thr-parent-id' ], 'uid' => $uid , 'causer' => $causer ]);
2022-08-17 05:28:24 +00:00
return 0 ;
}
2022-08-17 19:39:20 +00:00
Logger :: info ( 'Fetched thread parent' , [ 'uri-id' => $item [ 'thr-parent-id' ], 'uid' => $uid , 'causer' => $causer ]);
2021-05-26 09:24:37 +00:00
}
2020-07-23 03:26:54 +00:00
$stored = self :: storeForUser ( $item , $uid );
2022-08-17 05:28:24 +00:00
Logger :: info ( 'Item stored for user' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid , 'causer' => $causer , 'source-uid' => $source_uid , 'stored' => $stored ]);
2020-07-23 03:26:54 +00:00
return $stored ;
}
2022-08-17 05:28:24 +00:00
/**
* Fetch the parent with the given uri - id
*
* @ param integer $uri_id
* @ param integer $uid
* @ param integer $causer
*
* @ return integer
*/
private static function fetchParent ( int $uri_id , int $uid , int $causer ) : int
{
// Fetch the origin user for the post
$origin_uid = self :: GetOriginUidForUriId ( $uri_id , $uid );
if ( is_null ( $origin_uid )) {
Logger :: info ( 'Origin item was not found' , [ 'uid' => $uid , 'uri-id' => $uri_id ]);
return 0 ;
}
return self :: storeForUserByUriId ( $uri_id , $uid , [ 'causer-id' => $causer , 'post-reason' => self :: PR_FETCHED ], $origin_uid );
}
2022-02-14 22:04:33 +00:00
/**
* Returns the origin uid of a post if the given user is allowed to see it .
*
* @ param int $uriid
* @ param int $uid
* @ return int
*/
private static function GetOriginUidForUriId ( int $uriid , int $uid )
{
if ( Post :: exists ([ 'uri-id' => $uriid , 'uid' => $uid ])) {
return $uid ;
}
$post = Post :: selectFirst ([ 'uid' , 'allow_cid' , 'allow_gid' , 'deny_cid' , 'deny_gid' , 'private' ], [ 'uri-id' => $uriid , 'origin' => true ]);
2022-02-15 23:51:13 +00:00
if ( ! empty ( $post )) {
if ( in_array ( $post [ 'private' ], [ Item :: PUBLIC , Item :: UNLISTED ])) {
return $post [ 'uid' ];
}
$pcid = Contact :: getPublicIdByUserId ( $uid );
if ( empty ( $pcid )) {
2022-02-14 22:04:33 +00:00
return null ;
}
2022-02-15 23:51:13 +00:00
foreach ( Item :: enumeratePermissions ( $post , true ) as $receiver ) {
if ( $receiver == $pcid ) {
return $post [ 'uid' ];
}
}
2022-02-14 22:04:33 +00:00
return null ;
}
2022-02-15 23:51:13 +00:00
if ( Post :: exists ([ 'uri-id' => $uriid , 'uid' => 0 ])) {
return 0 ;
}
2023-05-30 13:15:17 +00:00
// When the post belongs to a a group then all group users are allowed to access it
2022-02-18 09:12:33 +00:00
foreach ( Tag :: getByURIId ( $uriid , [ Tag :: MENTION , Tag :: EXCLUSIVE_MENTION ]) as $tag ) {
2022-02-15 23:51:13 +00:00
if ( DBA :: exists ( 'contact' , [ 'uid' => $uid , 'nurl' => Strings :: normaliseLink ( $tag [ 'url' ]), 'contact-type' => Contact :: TYPE_COMMUNITY ])) {
$target_uid = User :: getIdForURL ( $tag [ 'url' ]);
if ( ! empty ( $target_uid )) {
return $target_uid ;
}
2022-02-14 22:04:33 +00:00
}
}
return null ;
}
2020-07-23 03:26:54 +00:00
/**
* Store a public item array for the given users
2018-04-24 13:21:25 +00:00
*
2018-04-24 14:58:39 +00:00
* @ param array $item The item entry that will be stored
* @ param integer $uid The user that will receive the item entry
2020-07-21 08:35:57 +00:00
* @ return integer stored item id
2019-01-06 21:06:53 +00:00
* @ throws \Exception
2018-04-24 13:21:25 +00:00
*/
2022-06-15 20:28:33 +00:00
private static function storeForUser ( array $item , int $uid ) : int
2018-04-24 13:21:25 +00:00
{
2022-08-17 05:28:24 +00:00
$post = Post :: selectFirst ([ 'id' ], [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid ]);
if ( ! empty ( $post [ 'id' ])) {
2022-02-05 11:16:50 +00:00
if ( ! empty ( $item [ 'event-id' ])) {
2022-08-27 11:43:46 +00:00
$event_post = Post :: selectFirst ([ 'event-id' ], [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid ]);
if ( ! empty ( $event_post [ 'event-id' ])) {
2023-02-20 13:26:23 +00:00
$event = DBA :: selectFirst ( 'event' , [ 'edited' , 'start' , 'finish' , 'summary' , 'desc' , 'location' , 'nofinish' ], [ 'id' => $item [ 'event-id' ]]);
2022-02-05 11:16:50 +00:00
if ( ! empty ( $event )) {
2022-02-05 16:49:21 +00:00
// We aren't using "Event::store" here, since we don't want to trigger any further action
2022-08-27 11:43:46 +00:00
$ret = DBA :: update ( 'event' , $event , [ 'id' => $event_post [ 'event-id' ]]);
Logger :: info ( 'Event updated' , [ 'uid' => $uid , 'source-event' => $item [ 'event-id' ], 'target-event' => $event_post [ 'event-id' ], 'ret' => $ret ]);
2022-02-05 11:16:50 +00:00
}
}
}
2022-08-17 05:28:24 +00:00
Logger :: info ( 'Item already exists' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $uid , 'id' => $post [ 'id' ]]);
return $post [ 'id' ];
2020-07-21 08:35:57 +00:00
}
2022-02-15 06:21:46 +00:00
// Data from the "post-user" table
2020-07-21 08:35:57 +00:00
unset ( $item [ 'id' ]);
unset ( $item [ 'mention' ]);
unset ( $item [ 'starred' ]);
2020-07-23 03:26:54 +00:00
unset ( $item [ 'unseen' ]);
unset ( $item [ 'psid' ]);
2021-05-26 09:24:37 +00:00
unset ( $item [ 'pinned' ]);
unset ( $item [ 'ignored' ]);
unset ( $item [ 'pubmail' ]);
unset ( $item [ 'event-id' ]);
unset ( $item [ 'hidden' ]);
unset ( $item [ 'notification-type' ]);
2022-02-15 06:21:46 +00:00
// Data from the "post-delivery-data" table
unset ( $item [ 'postopts' ]);
unset ( $item [ 'inform' ]);
2020-07-21 08:35:57 +00:00
2018-04-24 14:58:39 +00:00
$item [ 'uid' ] = $uid ;
2018-04-24 13:21:25 +00:00
$item [ 'origin' ] = 0 ;
$item [ 'wall' ] = 0 ;
2020-07-21 08:35:57 +00:00
2018-05-04 21:12:13 +00:00
$notify = false ;
2022-09-12 21:12:11 +00:00
if ( $item [ 'gravity' ] == self :: GRAVITY_PARENT ) {
2018-07-20 12:19:26 +00:00
$contact = DBA :: selectFirst ( 'contact' , [], [ 'id' => $item [ 'contact-id' ], 'self' => false ]);
2018-07-21 12:46:04 +00:00
if ( DBA :: isResult ( $contact )) {
2018-05-04 21:12:13 +00:00
$notify = self :: isRemoteSelf ( $contact , $item );
2023-01-09 15:55:35 +00:00
$item [ 'wall' ] = ( bool ) $notify ;
2018-05-04 21:12:13 +00:00
}
}
2023-01-09 15:55:35 +00:00
$item [ 'contact-id' ] = self :: contactId ( $item );
2021-08-06 18:49:17 +00:00
$distributed = self :: insert ( $item , $notify );
2018-04-24 13:21:25 +00:00
if ( ! $distributed ) {
2021-05-26 09:24:37 +00:00
Logger :: info ( " Distributed item wasn't stored " , [ 'uri-id' => $item [ 'uri-id' ], 'user' => $uid ]);
2018-04-24 13:21:25 +00:00
} else {
2021-05-26 09:24:37 +00:00
Logger :: info ( 'Distributed item was stored' , [ 'uri-id' => $item [ 'uri-id' ], 'user' => $uid , 'stored' => $distributed ]);
2018-04-24 13:21:25 +00:00
}
2020-07-21 08:35:57 +00:00
return $distributed ;
2018-04-24 13:21:25 +00:00
}
2018-01-16 22:23:19 +00:00
/**
2020-01-19 06:05:23 +00:00
* Add a shadow entry for a given item id that is a thread starter
2018-01-16 22:23:19 +00:00
*
* We store every public item entry additionally with the user id " 0 " .
* This is used for the community page and for the search .
* It is planned that in the future we will store public item entries only once .
*
* @ param integer $itemid Item ID that should be added
2019-01-06 21:06:53 +00:00
* @ throws \Exception
2018-01-16 22:23:19 +00:00
*/
2022-06-15 20:03:13 +00:00
private static function addShadow ( int $itemid )
2018-01-16 22:46:20 +00:00
{
2021-02-13 19:56:03 +00:00
$fields = [ 'uid' , 'private' , 'visible' , 'deleted' , 'network' , 'uri-id' ];
2022-09-12 21:12:11 +00:00
$condition = [ 'id' => $itemid , 'gravity' => self :: GRAVITY_PARENT ];
2021-01-16 04:13:22 +00:00
$item = Post :: selectFirst ( $fields , $condition );
2018-01-16 22:23:19 +00:00
2018-07-21 12:46:04 +00:00
if ( ! DBA :: isResult ( $item )) {
2018-01-16 22:23:19 +00:00
return ;
}
// is it already a copy?
if (( $itemid == 0 ) || ( $item [ 'uid' ] == 0 )) {
return ;
}
// Is it a visible public post?
2021-02-13 19:56:03 +00:00
if ( ! $item [ " visible " ] || $item [ " deleted " ] || ( $item [ " private " ] == self :: PRIVATE )) {
2018-01-16 22:23:19 +00:00
return ;
}
// is it an entry from a connector? Only add an entry for natively connected networks
2023-06-18 16:49:38 +00:00
if ( ! in_array ( $item [ " network " ], array_merge ( Protocol :: FEDERATED , [ '' ]))) {
2018-01-16 22:23:19 +00:00
return ;
}
2021-01-27 10:01:42 +00:00
if ( Post :: exists ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => 0 ])) {
2018-07-01 07:57:59 +00:00
return ;
}
2022-07-31 15:54:35 +00:00
$item = Post :: selectFirst ( array_merge ( self :: ITEM_FIELDLIST , [ 'protocol' ]), [ 'id' => $itemid ]);
2018-06-25 16:11:27 +00:00
2018-07-21 12:46:04 +00:00
if ( DBA :: isResult ( $item )) {
2018-07-01 07:57:59 +00:00
// Preparing public shadow (removing user specific data)
$item [ 'uid' ] = 0 ;
unset ( $item [ 'id' ]);
unset ( $item [ 'parent' ]);
unset ( $item [ 'wall' ]);
unset ( $item [ 'mention' ]);
unset ( $item [ 'origin' ]);
unset ( $item [ 'starred' ]);
2018-07-19 21:56:52 +00:00
unset ( $item [ 'postopts' ]);
unset ( $item [ 'inform' ]);
2021-04-07 06:02:06 +00:00
unset ( $item [ 'post-reason' ]);
2021-01-27 10:01:42 +00:00
if ( $item [ 'uri-id' ] == $item [ 'parent-uri-id' ]) {
2018-07-01 07:57:59 +00:00
$item [ 'contact-id' ] = $item [ 'owner-id' ];
} else {
$item [ 'contact-id' ] = $item [ 'author-id' ];
}
2018-01-16 22:23:19 +00:00
2021-08-06 18:49:17 +00:00
$public_shadow = self :: insert ( $item );
2018-01-16 22:23:19 +00:00
2020-06-28 18:22:29 +00:00
Logger :: info ( 'Stored public shadow' , [ 'thread' => $itemid , 'id' => $public_shadow ]);
2018-01-16 22:23:19 +00:00
}
}
/**
2020-01-19 06:05:23 +00:00
* Add a shadow entry for a given item id that is a comment
2018-01-16 22:23:19 +00:00
*
* This function does the same like the function above - but for comments
*
* @ param integer $itemid Item ID that should be added
2019-01-06 21:06:53 +00:00
* @ throws \Exception
2018-01-16 22:23:19 +00:00
*/
2022-06-15 20:03:13 +00:00
private static function addShadowPost ( int $itemid )
2018-01-16 22:46:20 +00:00
{
2022-07-31 15:54:35 +00:00
$item = Post :: selectFirst ( array_merge ( self :: ITEM_FIELDLIST , [ 'protocol' ]), [ 'id' => $itemid ]);
2018-07-21 12:46:04 +00:00
if ( ! DBA :: isResult ( $item )) {
2018-01-16 22:23:19 +00:00
return ;
}
// Is it a toplevel post?
2022-09-12 21:12:11 +00:00
if ( $item [ 'gravity' ] == self :: GRAVITY_PARENT ) {
2018-01-16 22:23:19 +00:00
self :: addShadow ( $itemid );
return ;
}
// Is this a shadow entry?
2018-05-10 12:48:27 +00:00
if ( $item [ 'uid' ] == 0 ) {
2018-01-16 22:23:19 +00:00
return ;
2018-05-10 12:48:27 +00:00
}
2018-01-16 22:23:19 +00:00
// Is there a shadow parent?
2021-01-27 10:01:42 +00:00
if ( ! Post :: exists ([ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => 0 ])) {
2018-01-16 22:23:19 +00:00
return ;
}
// Is there already a shadow entry?
2021-01-27 10:01:42 +00:00
if ( Post :: exists ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => 0 ])) {
2018-01-16 22:23:19 +00:00
return ;
}
2018-04-27 04:11:33 +00:00
// Save "origin" and "parent" state
$origin = $item [ 'origin' ];
$parent = $item [ 'parent' ];
2018-01-16 22:23:19 +00:00
// Preparing public shadow (removing user specific data)
$item [ 'uid' ] = 0 ;
2018-04-27 04:11:33 +00:00
unset ( $item [ 'id' ]);
unset ( $item [ 'parent' ]);
unset ( $item [ 'wall' ]);
unset ( $item [ 'mention' ]);
unset ( $item [ 'origin' ]);
unset ( $item [ 'starred' ]);
2018-07-19 21:56:52 +00:00
unset ( $item [ 'postopts' ]);
unset ( $item [ 'inform' ]);
2021-04-07 06:02:06 +00:00
unset ( $item [ 'post-reason' ]);
2018-03-02 00:53:47 +00:00
$item [ 'contact-id' ] = Contact :: getIdForURL ( $item [ 'author-link' ]);
2018-01-16 22:23:19 +00:00
2021-08-06 18:49:17 +00:00
$public_shadow = self :: insert ( $item );
2018-01-16 22:23:19 +00:00
2021-01-27 10:01:42 +00:00
Logger :: info ( 'Stored public shadow' , [ 'uri-id' => $item [ 'uri-id' ], 'id' => $public_shadow ]);
2018-04-27 04:11:33 +00:00
// If this was a comment to a Diaspora post we don't get our comment back.
// This means that we have to distribute the comment by ourselves.
2021-01-16 04:13:22 +00:00
if ( $origin && Post :: exists ([ 'id' => $parent , 'network' => Protocol :: DIASPORA ])) {
2018-05-10 12:48:27 +00:00
self :: distribute ( $public_shadow );
2018-04-27 04:11:33 +00:00
}
2018-01-16 22:23:19 +00:00
}
2018-01-20 23:52:54 +00:00
2019-01-06 21:06:53 +00:00
/**
2018-06-30 05:18:43 +00:00
* Adds a language specification in a " language " element of given $arr .
2018-01-20 23:52:54 +00:00
* Expects " body " element to exist in $arr .
2019-01-06 21:06:53 +00:00
*
2020-05-13 18:45:31 +00:00
* @ param array $item
* @ return string detected language
2019-01-06 21:06:53 +00:00
* @ throws \Text_LanguageDetect_Exception
2018-01-20 23:52:54 +00:00
*/
2022-06-15 20:28:33 +00:00
private static function getLanguage ( array $item ) : string
2018-01-20 23:52:54 +00:00
{
2021-03-06 08:43:25 +00:00
if ( ! empty ( $item [ 'language' ])) {
return $item [ 'language' ];
}
2022-09-12 21:12:11 +00:00
if ( ! in_array ( $item [ 'gravity' ], [ self :: GRAVITY_PARENT , self :: GRAVITY_COMMENT ]) || empty ( $item [ 'body' ])) {
2020-10-03 15:42:21 +00:00
return '' ;
}
2022-09-19 10:46:28 +00:00
$languages = self :: getLanguageArray ( trim ( $item [ 'title' ] . " \n " . $item [ 'body' ]), 3 );
2022-09-19 10:36:12 +00:00
if ( empty ( $languages )) {
return '' ;
}
return json_encode ( $languages );
}
2022-09-19 10:49:37 +00:00
/**
* Get a language array from a given text
*
* @ param string $body
* @ param integer $count
* @ return array
*/
2022-09-19 10:46:28 +00:00
public static function getLanguageArray ( string $body , int $count ) : array
2022-09-19 10:36:12 +00:00
{
2020-10-05 12:50:18 +00:00
// Convert attachments to links
2022-09-19 10:36:12 +00:00
$naked_body = BBCode :: removeAttachment ( $body );
2020-11-12 16:52:55 +00:00
if ( empty ( $naked_body )) {
2022-09-19 10:36:12 +00:00
return [];
2020-11-12 16:52:55 +00:00
}
2020-10-05 12:50:18 +00:00
// Remove links and pictures
$naked_body = BBCode :: removeLinks ( $naked_body );
// Convert the title and the body to plain text
2022-09-19 10:36:12 +00:00
$naked_body = BBCode :: toPlaintext ( $naked_body );
2020-10-05 12:50:18 +00:00
// Remove possibly remaining links
$naked_body = preg_replace ( Strings :: autoLinkRegEx (), '' , $naked_body );
2018-01-20 23:52:54 +00:00
2020-10-24 08:05:03 +00:00
if ( empty ( $naked_body )) {
2022-09-19 10:36:12 +00:00
return [];
2020-10-24 08:05:03 +00:00
}
2022-09-04 07:32:46 +00:00
$naked_body = self :: getDominantLanguage ( $naked_body );
2023-09-03 16:42:17 +00:00
$availableLanguages = DI :: l10n () -> getAvailableLanguages ( true );
$availableLanguages = DI :: l10n () -> convertForLanguageDetection ( $availableLanguages );
2021-07-19 18:00:31 +00:00
2022-04-19 06:16:44 +00:00
$ld = new Language ( array_keys ( $availableLanguages ));
2022-09-19 10:46:28 +00:00
return $ld -> detect ( $naked_body ) -> limit ( 0 , $count ) -> close () ? : [];
2018-01-20 23:52:54 +00:00
}
2022-09-04 07:32:46 +00:00
/**
* Check if latin or non latin are dominant in the body and only return the dominant one
*
* @ param string $body
* @ return string
*/
private static function getDominantLanguage ( string $body ) : string
{
$latin = '' ;
$non_latin = '' ;
2022-10-07 07:57:20 +00:00
for ( $i = 0 ; $i < mb_strlen ( $body ); $i ++ ) {
2022-09-04 07:32:46 +00:00
$character = mb_substr ( $body , $i , 1 );
$ord = mb_ord ( $character );
// We add the most common characters to both strings.
if (( $ord <= 64 ) || ( $ord >= 91 && $ord <= 96 ) || ( $ord >= 123 && $ord <= 191 ) || in_array ( $ord , [ 215 , 247 ]) || ( $ord >= 697 && $ord <= 735 ) || ( $ord > 65535 )) {
$latin .= $character ;
$non_latin .= $character ;
} elseif ( $ord < 768 ) {
$latin .= $character ;
} else {
$non_latin .= $character ;
}
}
return ( mb_strlen ( $latin ) > mb_strlen ( $non_latin )) ? $latin : $non_latin ;
}
2022-06-15 20:28:33 +00:00
public static function getLanguageMessage ( array $item ) : string
2020-10-04 18:52:28 +00:00
{
2020-10-07 04:15:02 +00:00
$iso639 = new \Matriphe\ISO639\ISO639 ;
2020-10-04 18:52:28 +00:00
$used_languages = '' ;
foreach ( json_decode ( $item [ 'language' ], true ) as $language => $reliability ) {
2020-10-07 04:15:02 +00:00
$used_languages .= $iso639 -> languageByCode1 ( $language ) . ' (' . $language . " ): " . number_format ( $reliability , 5 ) . '\n' ;
2020-10-04 18:52:28 +00:00
}
2020-10-07 04:15:02 +00:00
$used_languages = DI :: l10n () -> t ( 'Detected languages in this post:\n%s' , $used_languages );
2020-10-04 18:52:28 +00:00
return $used_languages ;
}
2018-01-20 23:52:54 +00:00
/**
2022-03-17 14:05:06 +00:00
* Creates an unique guid out of a given uri .
* This function is used for messages outside the fediverse ( Connector posts , feeds , Mails , ... )
* Posts that are created on this system are using System :: createUUID .
* Received ActivityPub posts are using Processor :: getGUIDByURL .
2018-01-20 23:52:54 +00:00
*
2022-12-08 03:21:23 +00:00
* @ param string $uri uri of an item entry
2022-06-24 01:14:22 +00:00
* @ param string | null $host hostname for the GUID prefix
* @ return string Unique guid
2022-12-08 03:21:23 +00:00
* @ throws \Exception
2018-01-20 23:52:54 +00:00
*/
2022-06-24 01:14:22 +00:00
public static function guidFromUri ( string $uri , string $host = null ) : string
2018-01-20 23:52:54 +00:00
{
// Our regular guid routine is using this kind of prefix as well
// We have to avoid that different routines could accidentally create the same value
$parsed = parse_url ( $uri );
// Remove the scheme to make sure that "https" and "http" doesn't make a difference
2022-06-20 17:04:01 +00:00
unset ( $parsed [ 'scheme' ]);
2018-01-20 23:52:54 +00:00
2023-06-05 04:34:06 +00:00
$hostPart = $host ? : $parsed [ 'host' ] ? ? '' ;
2022-12-08 03:21:23 +00:00
if ( ! $hostPart ) {
Logger :: warning ( 'Empty host GUID part' , [ 'uri' => $uri , 'host' => $host , 'parsed' => $parsed , 'callstack' => System :: callstack ( 10 )]);
}
2018-01-20 23:52:54 +00:00
// Glue it together to be able to make a hash from it
2023-05-24 05:55:36 +00:00
if ( ! empty ( $parsed )) {
$host_id = implode ( '/' , $parsed );
} else {
$host_id = $uri ;
}
2018-01-20 23:52:54 +00:00
2022-03-14 23:15:24 +00:00
// Use a mixture of several hashes to provide some GUID like experience
2022-12-08 03:21:23 +00:00
return hash ( 'crc32' , $hostPart ) . '-' . hash ( 'joaat' , $host_id ) . '-' . hash ( 'fnv164' , $host_id );
2018-01-20 23:52:54 +00:00
}
2018-06-16 06:44:19 +00:00
/**
* generate an unique URI
*
2022-07-09 11:32:32 +00:00
* @ param string $guid An existing GUID ( Otherwise it will be generated )
2018-06-16 06:44:19 +00:00
*
* @ return string
2019-01-06 21:06:53 +00:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-06-16 06:44:19 +00:00
*/
2022-07-09 11:32:32 +00:00
public static function newURI ( string $guid = '' ) : string
2018-06-16 06:44:19 +00:00
{
2022-06-20 17:04:01 +00:00
if ( $guid == '' ) {
2018-09-27 11:52:15 +00:00
$guid = System :: createUUID ();
2018-06-16 06:44:19 +00:00
}
2023-02-18 19:57:30 +00:00
return DI :: baseUrl () . '/objects/' . $guid ;
2018-06-16 06:44:19 +00:00
}
2018-01-20 23:52:54 +00:00
/**
2020-01-19 06:05:23 +00:00
* Set " success_update " and " last-item " to the date of the last time we heard from this contact
2018-01-20 23:52:54 +00:00
*
* This can be used to filter for inactive contacts .
* Only do this for public postings to avoid privacy problems , since poco data is public .
* Don 't set this value if it isn' t from the owner ( could be an author that we don ' t know )
*
* @ param array $arr Contains the just posted item record
2019-01-06 21:06:53 +00:00
* @ throws \Exception
2018-01-20 23:52:54 +00:00
*/
2022-06-15 20:28:33 +00:00
private static function updateContact ( array $arr )
2018-01-28 16:28:59 +00:00
{
2018-01-20 23:52:54 +00:00
// Unarchive the author
2018-07-20 12:19:26 +00:00
$contact = DBA :: selectFirst ( 'contact' , [], [ 'id' => $arr [ " author-id " ]]);
2018-07-21 12:46:04 +00:00
if ( DBA :: isResult ( $contact )) {
2018-02-14 21:18:16 +00:00
Contact :: unmarkForArchival ( $contact );
2018-01-20 23:52:54 +00:00
}
2018-02-14 21:18:16 +00:00
// Unarchive the contact if it's not our own contact
2018-07-20 12:19:26 +00:00
$contact = DBA :: selectFirst ( 'contact' , [], [ 'id' => $arr [ " contact-id " ], 'self' => false ]);
2018-07-21 12:46:04 +00:00
if ( DBA :: isResult ( $contact )) {
2018-02-14 21:18:16 +00:00
Contact :: unmarkForArchival ( $contact );
2018-01-20 23:52:54 +00:00
}
2020-04-24 15:18:34 +00:00
/// @todo On private posts we could obfuscate the date
2020-07-19 10:03:33 +00:00
$update = ( $arr [ 'private' ] != self :: PRIVATE ) || in_array ( $arr [ 'network' ], Protocol :: FEDERATED );
2018-01-20 23:52:54 +00:00
2023-05-30 13:15:17 +00:00
// Is it a group? Then we don't care about the rules from above
2021-01-27 10:01:42 +00:00
if ( ! $update && in_array ( $arr [ " network " ], [ Protocol :: ACTIVITYPUB , Protocol :: DFRN ]) && ( $arr [ " parent-uri-id " ] === $arr [ " uri-id " ])) {
2018-07-20 12:19:26 +00:00
if ( DBA :: exists ( 'contact' , [ 'id' => $arr [ 'contact-id' ], 'forum' => true ])) {
2018-01-20 23:52:54 +00:00
$update = true ;
}
}
if ( $update ) {
2020-04-24 15:18:34 +00:00
// The "self" contact id is used (for example in the connectors) when the contact is unknown
// So we have to ensure to only update the last item when it had been our own post,
// or it had been done by a "regular" contact.
if ( ! empty ( $arr [ 'wall' ])) {
$condition = [ 'id' => $arr [ 'contact-id' ]];
2021-04-26 06:50:12 +00:00
} else {
2020-04-24 15:18:34 +00:00
$condition = [ 'id' => $arr [ 'contact-id' ], 'self' => false ];
}
2022-08-13 09:01:48 +00:00
Contact :: update ([ 'failed' => false , 'local-data' => true , 'success_update' => $arr [ 'received' ], 'last-item' => $arr [ 'received' ]], $condition );
2018-01-20 23:52:54 +00:00
}
// Now do the same for the system wide contacts with uid=0
2020-03-02 07:57:23 +00:00
if ( $arr [ 'private' ] != self :: PRIVATE ) {
2023-06-18 16:49:38 +00:00
Contact :: update (
[ 'failed' => false , 'local-data' => true , 'success_update' => $arr [ 'received' ], 'last-item' => $arr [ 'received' ]],
[ 'id' => $arr [ 'owner-id' ]]
);
2018-01-20 23:52:54 +00:00
if ( $arr [ 'owner-id' ] != $arr [ 'author-id' ]) {
2023-06-18 16:49:38 +00:00
Contact :: update (
[ 'failed' => false , 'local-data' => true , 'success_update' => $arr [ 'received' ], 'last-item' => $arr [ 'received' ]],
[ 'id' => $arr [ 'author-id' ]]
);
2018-01-20 23:52:54 +00:00
}
}
}
2018-01-28 11:18:08 +00:00
2022-06-15 20:28:33 +00:00
public static function setHashtags ( string $body ) : string
2018-01-28 16:28:59 +00:00
{
2021-01-22 22:45:28 +00:00
$body = BBCode :: performWithEscapedTags ( $body , [ 'noparse' , 'pre' , 'code' , 'img' ], function ( $body ) {
2020-06-05 00:56:50 +00:00
$tags = BBCode :: getTags ( $body );
2019-01-30 01:25:51 +00:00
2020-06-05 00:56:50 +00:00
// No hashtags?
if ( ! count ( $tags )) {
return $body ;
}
2018-01-28 11:18:08 +00:00
2020-06-05 00:56:50 +00:00
// This sorting is important when there are hashtags that are part of other hashtags
// Otherwise there could be problems with hashtags like #test and #test2
// Because of this we are sorting from the longest to the shortest tag.
usort ( $tags , function ( $a , $b ) {
return strlen ( $b ) <=> strlen ( $a );
});
2018-01-28 11:18:08 +00:00
2020-06-05 00:56:50 +00:00
$URLSearchString = " ^ \ [ \ ] " ;
2018-01-28 11:18:08 +00:00
2020-06-05 00:56:50 +00:00
// All hashtags should point to the home server if "local_tags" is activated
if ( DI :: config () -> get ( 'system' , 'local_tags' )) {
2023-06-18 16:49:38 +00:00
$body = preg_replace (
" /# \ [url \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /url \ ]/ism " ,
" #[url= " . DI :: baseUrl () . " /search?tag= $ 2] $ 2[/url] " ,
$body
);
2020-06-05 00:56:50 +00:00
}
2018-01-28 11:18:08 +00:00
2020-06-05 00:56:50 +00:00
// mask hashtags inside of url, bookmarks and attachments to avoid urls in urls
2023-06-18 16:49:38 +00:00
$body = preg_replace_callback (
" / \ [url \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /url \ ]/ism " ,
2020-06-05 00:56:50 +00:00
function ( $match ) {
return ( " [url= " . str_replace ( " # " , " # " , $match [ 1 ]) . " ] " . str_replace ( " # " , " # " , $match [ 2 ]) . " [/url] " );
2023-06-18 16:49:38 +00:00
},
$body
);
2018-01-28 11:18:08 +00:00
2023-06-18 16:49:38 +00:00
$body = preg_replace_callback (
" / \ [bookmark \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /bookmark \ ]/ism " ,
2020-06-05 00:56:50 +00:00
function ( $match ) {
return ( " [bookmark= " . str_replace ( " # " , " # " , $match [ 1 ]) . " ] " . str_replace ( " # " , " # " , $match [ 2 ]) . " [/bookmark] " );
2023-06-18 16:49:38 +00:00
},
$body
);
2018-01-28 11:18:08 +00:00
2023-06-18 16:49:38 +00:00
$body = preg_replace_callback (
" / \ [attachment (.*?) \ ](.*?) \ [ \ /attachment \ ]/ism " ,
2020-06-05 00:56:50 +00:00
function ( $match ) {
return ( " [attachment " . str_replace ( " # " , " # " , $match [ 1 ]) . " ] " . $match [ 2 ] . " [/attachment] " );
2023-06-18 16:49:38 +00:00
},
$body
);
2018-01-28 11:18:08 +00:00
2020-06-05 00:56:50 +00:00
// Repair recursive urls
2023-06-18 16:49:38 +00:00
$body = preg_replace (
" /# \ [url \ =([ $URLSearchString ]*) \ ](.*?) \ [ \ /url \ ]/ism " ,
" # $ 2 " ,
$body
);
2018-01-28 11:18:08 +00:00
2020-06-05 00:56:50 +00:00
foreach ( $tags as $tag ) {
if (( strpos ( $tag , '#' ) !== 0 ) || strpos ( $tag , '[url=' ) || strlen ( $tag ) < 2 || $tag [ 1 ] == '#' ) {
continue ;
}
2018-01-28 11:18:08 +00:00
2020-06-05 00:56:50 +00:00
$basetag = str_replace ( '_' , ' ' , substr ( $tag , 1 ));
$newtag = '#[url=' . DI :: baseUrl () . '/search?tag=' . $basetag . ']' . $basetag . '[/url]' ;
2018-01-28 11:18:08 +00:00
2020-06-05 00:56:50 +00:00
$body = str_replace ( $tag , $newtag , $body );
}
// Convert back the masked hashtags
$body = str_replace ( " # " , " # " , $body );
2018-01-28 11:18:08 +00:00
2020-06-05 00:56:50 +00:00
return $body ;
});
2019-01-29 20:17:11 +00:00
2020-06-05 00:56:50 +00:00
return $body ;
2018-01-28 11:18:08 +00:00
}
/**
2023-05-30 13:15:17 +00:00
* look for mention tags and setup a second delivery chain for group / community posts if appropriate
2019-01-06 21:06:53 +00:00
*
2018-01-28 11:18:08 +00:00
* @ param int $uid
* @ param int $item_id
2019-07-31 14:09:27 +00:00
* @ return boolean true if item was deleted , else false
2019-01-06 21:06:53 +00:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
2018-01-28 11:18:08 +00:00
*/
2022-06-15 20:28:33 +00:00
private static function tagDeliver ( int $uid , int $item_id ) : bool
2018-01-28 11:18:08 +00:00
{
2022-01-29 19:09:18 +00:00
$owner = User :: getOwnerDataById ( $uid );
if ( ! DBA :: isResult ( $owner )) {
2022-02-17 21:44:59 +00:00
Logger :: warning ( 'User not found, quitting here.' , [ 'uid' => $uid ]);
2019-07-31 14:09:27 +00:00
return false ;
2018-01-28 11:18:08 +00:00
}
2022-01-29 19:09:18 +00:00
if ( $owner [ 'contact-type' ] != User :: ACCOUNT_TYPE_COMMUNITY ) {
Logger :: debug ( 'Owner is no community, quitting here.' , [ 'uid' => $uid , 'id' => $item_id ]);
return false ;
}
2018-01-28 11:18:08 +00:00
2022-09-12 21:12:11 +00:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $item_id , 'gravity' => [ self :: GRAVITY_PARENT , self :: GRAVITY_COMMENT ], 'origin' => false ]);
2018-07-21 12:46:04 +00:00
if ( ! DBA :: isResult ( $item )) {
2022-02-17 21:44:59 +00:00
Logger :: debug ( 'Post is an activity or origin or not found at all, quitting here.' , [ 'id' => $item_id ]);
2019-07-31 14:09:27 +00:00
return false ;
2018-01-28 11:18:08 +00:00
}
2022-09-12 21:12:11 +00:00
if ( $item [ 'gravity' ] == self :: GRAVITY_PARENT ) {
2022-08-17 05:28:24 +00:00
if ( Tag :: isMentioned ( $item [ 'uri-id' ], $owner [ 'url' ])) {
Logger :: info ( 'Mention found in tag.' , [ 'uri' => $item [ 'uri' ], 'uid' => $uid , 'id' => $item_id , 'uri-id' => $item [ 'uri-id' ], 'guid' => $item [ 'guid' ]]);
} else {
2022-02-17 21:44:59 +00:00
Logger :: info ( 'Top-level post without mention is deleted.' , [ 'uri' => $item [ 'uri' ], $uid , 'id' => $item_id , 'uri-id' => $item [ 'uri-id' ], 'guid' => $item [ 'guid' ]]);
Post\User :: delete ([ 'uri-id' => $item [ 'uri-id' ], 'uid' => $item [ 'uid' ]]);
return true ;
2018-01-28 11:18:08 +00:00
}
2022-02-17 21:44:59 +00:00
$arr = [ 'item' => $item , 'user' => $owner ];
Hook :: callAll ( 'tagged' , $arr );
} else {
2022-08-17 05:28:24 +00:00
if ( Tag :: isMentioned ( $item [ 'parent-uri-id' ], $owner [ 'url' ])) {
Logger :: info ( 'Mention found in parent tag.' , [ 'uri' => $item [ 'uri' ], 'uid' => $uid , 'id' => $item_id , 'uri-id' => $item [ 'uri-id' ], 'guid' => $item [ 'guid' ]]);
} else {
2022-02-17 21:44:59 +00:00
Logger :: debug ( 'No mentions found in parent, quitting here.' , [ 'id' => $item_id , 'uri-id' => $item [ 'uri-id' ], 'guid' => $item [ 'guid' ]]);
return false ;
}
2018-01-28 11:18:08 +00:00
}
2022-01-29 19:09:18 +00:00
Logger :: info ( 'Community post will be distributed' , [ 'uri' => $item [ 'uri' ], 'uid' => $uid , 'id' => $item_id , 'uri-id' => $item [ 'uri-id' ], 'guid' => $item [ 'guid' ]]);
2018-01-28 11:18:08 +00:00
2022-02-12 18:38:36 +00:00
if ( $owner [ 'page-flags' ] == User :: PAGE_FLAGS_PRVGROUP ) {
2022-02-16 22:56:55 +00:00
$allow_cid = '' ;
2023-05-13 23:54:35 +00:00
$allow_gid = '<' . Circle :: FOLLOWERS . '>' ;
2022-02-14 22:04:33 +00:00
$deny_cid = '' ;
2022-02-12 18:38:36 +00:00
$deny_gid = '' ;
self :: performActivity ( $item [ 'id' ], 'announce' , $uid , $allow_cid , $allow_gid , $deny_cid , $deny_gid );
2021-06-06 09:19:29 +00:00
} else {
2022-02-12 18:38:36 +00:00
self :: performActivity ( $item [ 'id' ], 'announce' , $uid );
2021-06-06 09:19:29 +00:00
}
2018-01-28 11:18:08 +00:00
2022-01-29 19:09:18 +00:00
Logger :: info ( 'Community post had been distributed' , [ 'uri' => $item [ 'uri' ], 'uid' => $uid , 'id' => $item_id , 'uri-id' => $item [ 'uri-id' ], 'guid' => $item [ 'guid' ]]);
2019-07-31 14:09:27 +00:00
return false ;
2018-01-28 11:18:08 +00:00
}
2020-11-28 22:53:58 +00:00
/**
* Automatically reshare the item if the " remote_self " option is selected
*
* @ param array $item
* @ return void
*/
private static function autoReshare ( array $item )
{
2022-09-12 21:12:11 +00:00
if ( $item [ 'gravity' ] != self :: GRAVITY_PARENT ) {
2020-11-28 22:53:58 +00:00
return ;
}
2022-11-30 09:28:27 +00:00
$cdata = Contact :: getPublicAndUserContactID ( $item [ 'author-id' ], $item [ 'uid' ]);
if ( empty ( $cdata [ 'user' ]) || ( $cdata [ 'user' ] != $item [ 'contact-id' ])) {
return ;
}
2023-07-26 05:50:15 +00:00
if ( ! DBA :: exists ( 'contact' , [ 'id' => $cdata [ 'user' ], 'remote_self' => LocalRelationship :: MIRROR_NATIVE_RESHARE ])) {
2022-12-11 10:21:02 +00:00
return ;
}
2023-07-26 05:50:15 +00:00
if ( ! in_array ( $item [ 'network' ], [ Protocol :: ACTIVITYPUB , Protocol :: DFRN ])) {
2020-11-28 22:53:58 +00:00
return ;
}
2023-07-26 05:50:15 +00:00
if ( User :: getById ( $item [ 'uid' ], [ 'blocked' ])[ 'blocked' ] ? ? false ) {
2020-11-29 00:05:46 +00:00
return ;
}
2020-11-28 22:53:58 +00:00
Logger :: info ( 'Automatically reshare item' , [ 'uid' => $item [ 'uid' ], 'id' => $item [ 'id' ], 'guid' => $item [ 'guid' ], 'uri-id' => $item [ 'uri-id' ]]);
2021-01-16 04:13:22 +00:00
self :: performActivity ( $item [ 'id' ], 'announce' , $item [ 'uid' ]);
2020-11-28 22:53:58 +00:00
}
2022-06-15 20:28:33 +00:00
public static function isRemoteSelf ( array $contact , array & $datarray ) : bool
2018-01-28 16:28:59 +00:00
{
2023-07-26 05:50:15 +00:00
if ( $contact [ 'remote_self' ] != LocalRelationship :: MIRROR_OWN_POST ) {
2018-01-28 11:18:08 +00:00
return false ;
}
// Prevent the forwarding of posts that are forwarded
2022-12-03 07:15:29 +00:00
if ( ! empty ( $datarray [ 'extid' ]) && ( $datarray [ 'extid' ] == Protocol :: DFRN )) {
2020-06-28 18:22:29 +00:00
Logger :: info ( 'Already forwarded' );
2018-01-28 11:18:08 +00:00
return false ;
}
// Prevent to forward already forwarded posts
2023-02-18 19:57:30 +00:00
if ( $datarray [ 'app' ] == DI :: baseUrl () -> getHost ()) {
2020-06-28 18:22:29 +00:00
Logger :: info ( 'Already forwarded (second test)' );
2018-01-28 11:18:08 +00:00
return false ;
}
// Only forward posts
2022-12-03 07:15:29 +00:00
if ( $datarray [ 'verb' ] != Activity :: POST ) {
2020-06-28 18:22:29 +00:00
Logger :: info ( 'No post' );
2018-01-28 11:18:08 +00:00
return false ;
}
2020-03-02 07:57:23 +00:00
if (( $contact [ 'network' ] != Protocol :: FEED ) && ( $datarray [ 'private' ] == self :: PRIVATE )) {
2020-06-28 18:22:29 +00:00
Logger :: info ( 'Not public' );
2018-01-28 11:18:08 +00:00
return false ;
}
2023-07-26 05:50:15 +00:00
if ( User :: getById ( $contact [ 'uid' ], [ 'blocked' ])[ 'blocked' ] ? ? false ) {
Logger :: info ( 'User is blocked' , [ 'contact' => $contact ]);
return false ;
}
2018-01-28 11:18:08 +00:00
$datarray2 = $datarray ;
2023-06-18 16:49:38 +00:00
Logger :: info ( 'remote-self start' , [ 'contact' => $contact [ 'url' ], 'remote_self' => $contact [ 'remote_self' ], 'item' => $datarray ]);
2020-11-09 16:13:18 +00:00
2023-06-18 16:49:38 +00:00
$self = DBA :: selectFirst (
'contact' ,
[ 'id' , 'name' , 'url' , 'thumb' ],
[ 'uid' => $contact [ 'uid' ], 'self' => true ]
);
2022-12-03 07:15:29 +00:00
if ( ! DBA :: isResult ( $self )) {
Logger :: error ( 'Self contact not found' , [ 'uid' => $contact [ 'uid' ]]);
return false ;
2018-01-28 11:18:08 +00:00
}
2022-12-03 07:15:29 +00:00
$datarray [ 'contact-id' ] = $self [ 'id' ];
$datarray [ 'author-name' ] = $datarray [ 'owner-name' ] = $self [ 'name' ];
$datarray [ 'author-link' ] = $datarray [ 'owner-link' ] = $self [ 'url' ];
$datarray [ 'author-avatar' ] = $datarray [ 'owner-avatar' ] = $self [ 'thumb' ];
unset ( $datarray [ 'edited' ]);
unset ( $datarray [ 'network' ]);
unset ( $datarray [ 'owner-id' ]);
unset ( $datarray [ 'author-id' ]);
2018-08-11 20:40:44 +00:00
if ( $contact [ 'network' ] != Protocol :: FEED ) {
2022-12-03 07:15:29 +00:00
$old_uri_id = $datarray [ 'uri-id' ] ? ? 0 ;
$datarray [ 'guid' ] = System :: createUUID ();
unset ( $datarray [ 'plink' ]);
$datarray [ 'uri' ] = self :: newURI ( $datarray [ 'guid' ]);
$datarray [ 'uri-id' ] = ItemURI :: getIdByURI ( $datarray [ 'uri' ]);
$datarray [ 'extid' ] = Protocol :: DFRN ;
$urlpart = parse_url ( $datarray2 [ 'author-link' ]);
$datarray [ 'app' ] = $urlpart [ 'host' ];
if ( ! empty ( $old_uri_id )) {
Post\Media :: copy ( $old_uri_id , $datarray [ 'uri-id' ]);
}
unset ( $datarray [ 'parent-uri' ]);
unset ( $datarray [ 'thr-parent' ]);
2018-01-28 11:18:08 +00:00
// Store the original post
2020-05-12 21:49:12 +00:00
$result = self :: insert ( $datarray2 );
2023-06-18 16:49:38 +00:00
Logger :: info ( 'remote-self post original item' , [ 'contact' => $contact [ 'url' ], 'result' => $result , 'item' => $datarray2 ]);
2018-01-28 11:18:08 +00:00
} else {
2022-12-03 07:15:29 +00:00
$datarray [ 'private' ] = self :: PUBLIC ;
$datarray [ 'app' ] = 'Feed' ;
$result = true ;
2018-01-28 11:18:08 +00:00
}
2020-12-08 21:58:32 +00:00
return ( bool ) $result ;
2018-01-28 11:18:08 +00:00
}
/**
*
* @ param string $s
* @ param int $uid
* @ param array $item
* @ param int $cid
* @ return string
2019-01-06 21:06:53 +00:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
2018-01-28 11:18:08 +00:00
*/
2022-06-15 20:28:33 +00:00
public static function fixPrivatePhotos ( string $s , int $uid , array $item = null , int $cid = 0 ) : string
2018-01-28 11:18:08 +00:00
{
2020-01-19 20:21:13 +00:00
if ( DI :: config () -> get ( 'system' , 'disable_embedded' )) {
2018-01-28 11:18:08 +00:00
return $s ;
}
2020-06-28 18:22:29 +00:00
Logger :: info ( 'check for photos' );
2019-12-30 22:00:08 +00:00
$site = substr ( DI :: baseUrl (), strpos ( DI :: baseUrl (), '://' ));
2018-01-28 11:18:08 +00:00
$orig_body = $s ;
$new_body = '' ;
$img_start = strpos ( $orig_body , '[img' );
$img_st_close = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start ), ']' ) : false );
$img_len = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start + $img_st_close + 1 ), '[/img]' ) : false );
while (( $img_st_close !== false ) && ( $img_len !== false )) {
$img_st_close ++ ; // make it point to AFTER the closing bracket
$image = substr ( $orig_body , $img_start + $img_st_close , $img_len );
2020-06-28 18:22:29 +00:00
Logger :: info ( 'found photo' , [ 'image' => $image ]);
2018-01-28 11:18:08 +00:00
if ( stristr ( $image , $site . '/photo/' )) {
// Only embed locally hosted photos
$replace = false ;
$i = basename ( $image );
$i = str_replace ([ '.jpg' , '.png' , '.gif' ], [ '' , '' , '' ], $i );
$x = strpos ( $i , '-' );
if ( $x ) {
$res = substr ( $i , $x + 1 );
$i = substr ( $i , 0 , $x );
2018-12-11 19:03:29 +00:00
$photo = Photo :: getPhotoForUser ( $uid , $i , $res );
2018-07-21 12:46:04 +00:00
if ( DBA :: isResult ( $photo )) {
2018-01-28 11:18:08 +00:00
/*
* Check to see if we should replace this photo link with an embedded image
* 1. No need to do so if the photo is public
* 2. If there 's a contact-id provided, see if they' re in the access list
* for the photo . If so , embed it .
* 3. Otherwise , if we have an item , see if the item permissions match the photo
* permissions , regardless of order but first check to see if they ' re an exact
* match to save some processing overhead .
*/
2018-02-22 06:52:58 +00:00
if ( self :: hasPermissions ( $photo )) {
2018-01-28 11:18:08 +00:00
if ( $cid ) {
2018-02-22 06:52:58 +00:00
$recips = self :: enumeratePermissions ( $photo );
2018-01-28 11:18:08 +00:00
if ( in_array ( $cid , $recips )) {
$replace = true ;
}
} elseif ( $item ) {
2019-07-15 01:48:35 +00:00
if ( self :: samePermissions ( $uid , $item , $photo )) {
2018-01-28 11:18:08 +00:00
$replace = true ;
}
}
}
if ( $replace ) {
2018-12-11 19:03:29 +00:00
$photo_img = Photo :: getImageForPhoto ( $photo );
2018-01-28 11:18:08 +00:00
// If a custom width and height were specified, apply before embedding
if ( preg_match ( " / \ [img \ =([0-9]*)x([0-9]*) \ ]/is " , substr ( $orig_body , $img_start , $img_st_close ), $match )) {
2020-06-28 18:22:29 +00:00
Logger :: info ( 'scaling photo' );
2018-01-28 11:18:08 +00:00
$width = intval ( $match [ 1 ]);
$height = intval ( $match [ 2 ]);
2018-12-11 19:03:29 +00:00
$photo_img -> scaleDown ( max ( $width , $height ));
2018-01-28 11:18:08 +00:00
}
2018-12-11 19:03:29 +00:00
$data = $photo_img -> asString ();
$type = $photo_img -> getType ();
2020-06-28 18:22:29 +00:00
Logger :: info ( 'replacing photo' );
2018-01-28 11:18:08 +00:00
$image = 'data:' . $type . ';base64,' . base64_encode ( $data );
2020-06-28 18:22:29 +00:00
Logger :: debug ( 'replaced' , [ 'image' => $image ]);
2018-01-28 11:18:08 +00:00
}
}
}
}
$new_body = $new_body . substr ( $orig_body , 0 , $img_start + $img_st_close ) . $image . '[/img]' ;
$orig_body = substr ( $orig_body , $img_start + $img_st_close + $img_len + strlen ( '[/img]' ));
if ( $orig_body === false ) {
$orig_body = '' ;
}
$img_start = strpos ( $orig_body , '[img' );
$img_st_close = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start ), ']' ) : false );
$img_len = ( $img_start !== false ? strpos ( substr ( $orig_body , $img_start + $img_st_close + 1 ), '[/img]' ) : false );
}
$new_body = $new_body . $orig_body ;
return $new_body ;
}
2022-06-15 20:03:13 +00:00
private static function hasPermissions ( array $obj )
2018-01-28 16:28:59 +00:00
{
2018-07-01 07:57:59 +00:00
return ! empty ( $obj [ 'allow_cid' ]) || ! empty ( $obj [ 'allow_gid' ]) ||
! empty ( $obj [ 'deny_cid' ]) || ! empty ( $obj [ 'deny_gid' ]);
2018-01-28 11:18:08 +00:00
}
2022-06-15 20:28:33 +00:00
// @TODO $uid is unused parameter
private static function samePermissions ( $uid , array $obj1 , array $obj2 ) : bool
2018-01-28 16:28:59 +00:00
{
2018-01-28 11:18:08 +00:00
// first part is easy. Check that these are exactly the same.
if (( $obj1 [ 'allow_cid' ] == $obj2 [ 'allow_cid' ])
&& ( $obj1 [ 'allow_gid' ] == $obj2 [ 'allow_gid' ])
&& ( $obj1 [ 'deny_cid' ] == $obj2 [ 'deny_cid' ])
2023-06-18 16:49:38 +00:00
&& ( $obj1 [ 'deny_gid' ] == $obj2 [ 'deny_gid' ])
) {
2018-01-28 11:18:08 +00:00
return true ;
}
// This is harder. Parse all the permissions and compare the resulting set.
$recipients1 = self :: enumeratePermissions ( $obj1 );
$recipients2 = self :: enumeratePermissions ( $obj2 );
sort ( $recipients1 );
sort ( $recipients2 );
/// @TODO Comparison of arrays, maybe use array_diff_assoc() here?
return ( $recipients1 == $recipients2 );
}
2019-08-17 03:59:48 +00:00
/**
* Returns an array of contact - ids that are allowed to see this object
*
2023-04-28 05:13:23 +00:00
* @ param array $obj Item array with at least uid , allow_cid , allow_gid , deny_cid and deny_gid
* @ param bool $check_dead Prunes unavailable contacts from the result
* @ param bool $expand_followers Expand the list of followers
2019-08-17 03:59:48 +00:00
* @ return array
* @ throws \Exception
*/
2023-04-28 05:13:23 +00:00
public static function enumeratePermissions ( array $obj , bool $check_dead = false , bool $expand_followers = true ) : array
2018-01-28 16:28:59 +00:00
{
2023-03-22 03:17:51 +00:00
$aclFormatter = DI :: aclFormatter ();
2019-10-22 22:40:14 +00:00
2023-04-28 05:13:23 +00:00
if ( ! $expand_followers && ( ! empty ( $obj [ 'deny_cid' ]) || ! empty ( $obj [ 'deny_gid' ]))) {
$expand_followers = true ;
}
2023-05-13 23:54:35 +00:00
$allow_people = $aclFormatter -> expand ( $obj [ 'allow_cid' ]);
$allow_circles = Circle :: expand ( $obj [ 'uid' ], $aclFormatter -> expand ( $obj [ 'allow_gid' ]), $check_dead , $expand_followers );
$deny_people = $aclFormatter -> expand ( $obj [ 'deny_cid' ]);
$deny_circles = Circle :: expand ( $obj [ 'uid' ], $aclFormatter -> expand ( $obj [ 'deny_gid' ]), $check_dead );
$recipients = array_unique ( array_merge ( $allow_people , $allow_circles ));
$deny = array_unique ( array_merge ( $deny_people , $deny_circles ));
$recipients = array_diff ( $recipients , $deny );
2018-01-28 11:18:08 +00:00
return $recipients ;
}
2020-11-27 11:24:31 +00:00
public static function expire ( int $uid , int $days , string $network = " " , bool $force = false )
2018-01-28 16:28:59 +00:00
{
2018-01-28 11:18:08 +00:00
if ( ! $uid || ( $days < 1 )) {
return ;
}
2023-06-18 16:49:38 +00:00
$condition = [
" `uid` = ? AND NOT `deleted` AND `gravity` = ? " ,
$uid , self :: GRAVITY_PARENT
];
2018-07-01 07:57:59 +00:00
2018-01-28 11:18:08 +00:00
/*
* $expire_network_only = save your own wall posts
* and just expire conversations started by others
*/
2020-01-18 15:50:57 +00:00
$expire_network_only = DI :: pConfig () -> get ( $uid , 'expire' , 'network_only' , false );
2018-07-01 07:57:59 +00:00
if ( $expire_network_only ) {
$condition [ 0 ] .= " AND NOT `wall` " ;
}
2018-01-28 11:18:08 +00:00
if ( $network != " " ) {
2018-07-01 07:57:59 +00:00
$condition [ 0 ] .= " AND `network` = ? " ;
$condition [] = $network ;
2018-01-28 11:18:08 +00:00
}
2021-12-02 14:19:01 +00:00
$condition [ 0 ] .= " AND `received` < ? " ;
$condition [] = DateTimeFormat :: utc ( 'now - ' . $days . ' day' );
2019-07-07 21:30:33 +00:00
2021-02-13 19:56:03 +00:00
$items = Post :: select ([ 'resource-id' , 'starred' , 'id' , 'post-type' , 'uid' , 'uri-id' ], $condition );
2018-01-28 11:18:08 +00:00
2018-07-21 12:46:04 +00:00
if ( ! DBA :: isResult ( $items )) {
2018-01-28 11:18:08 +00:00
return ;
}
2022-09-16 05:00:06 +00:00
$expire_items = ( bool ) DI :: pConfig () -> get ( $uid , 'expire' , 'items' , true );
2018-01-28 11:18:08 +00:00
// Forcing expiring of items - but not notes and marked items
if ( $force ) {
$expire_items = true ;
}
2022-09-16 05:00:06 +00:00
$expire_notes = ( bool ) DI :: pConfig () -> get ( $uid , 'expire' , 'notes' , true );
$expire_starred = ( bool ) DI :: pConfig () -> get ( $uid , 'expire' , 'starred' , true );
$expire_photos = ( bool ) DI :: pConfig () -> get ( $uid , 'expire' , 'photos' , false );
2018-01-28 11:18:08 +00:00
2018-07-01 09:08:58 +00:00
$expired = 0 ;
2018-01-28 11:18:08 +00:00
2020-11-30 21:40:55 +00:00
$priority = DI :: config () -> get ( 'system' , 'expire-notify-priority' );
2021-01-16 04:13:22 +00:00
while ( $item = Post :: fetch ( $items )) {
2018-01-28 11:18:08 +00:00
// don't expire filed items
2021-01-21 07:16:41 +00:00
if ( DBA :: exists ( 'post-category' , [ 'uri-id' => $item [ 'uri-id' ], 'uid' => $item [ 'uid' ], 'type' => Post\Category :: FILE ])) {
2018-01-28 11:18:08 +00:00
continue ;
}
// Only expire posts, not photos and photo comments
2021-04-07 06:02:06 +00:00
if ( ! $expire_photos && ! empty ( $item [ 'resource-id' ])) {
2018-01-28 11:18:08 +00:00
continue ;
2018-07-01 07:57:59 +00:00
} elseif ( ! $expire_starred && intval ( $item [ 'starred' ])) {
2018-01-28 11:18:08 +00:00
continue ;
2021-02-13 19:56:03 +00:00
} elseif ( ! $expire_notes && ( $item [ 'post-type' ] == self :: PT_PERSONAL_NOTE )) {
2018-01-28 11:18:08 +00:00
continue ;
2021-02-13 19:56:03 +00:00
} elseif ( ! $expire_items && ( $item [ 'post-type' ] != self :: PT_PERSONAL_NOTE )) {
2018-01-28 11:18:08 +00:00
continue ;
}
2020-11-30 21:40:55 +00:00
self :: markForDeletionById ( $item [ 'id' ], $priority );
2018-07-01 09:08:58 +00:00
++ $expired ;
2018-01-28 11:18:08 +00:00
}
2018-07-20 12:19:26 +00:00
DBA :: close ( $items );
2022-09-16 05:00:06 +00:00
Logger :: notice ( 'Expired' , [ 'user' => $uid , 'days' => $days , 'network' => $network , 'force' => $force , 'expired' => $expired , 'expire items' => $expire_items , 'expire notes' => $expire_notes , 'expire starred' => $expire_starred , 'expire photos' => $expire_photos , 'condition' => $condition ]);
2018-01-28 11:18:08 +00:00
}
2022-06-15 20:28:33 +00:00
public static function firstPostDate ( int $uid , bool $wall = false )
2018-01-28 16:28:59 +00:00
{
2021-03-07 10:46:46 +00:00
$user = User :: getById ( $uid , [ 'register_date' ]);
if ( empty ( $user )) {
return false ;
}
2023-06-18 16:49:38 +00:00
$condition = [
" `uid` = ? AND `wall` = ? AND NOT `deleted` AND `visible` AND `received` >= ? " ,
$uid , $wall , $user [ 'register_date' ]
];
2019-07-07 21:30:33 +00:00
$params = [ 'order' => [ 'received' => false ]];
2021-03-07 10:46:46 +00:00
$thread = Post :: selectFirstThread ([ 'received' ], $condition , $params );
2018-07-21 12:46:04 +00:00
if ( DBA :: isResult ( $thread )) {
2021-02-17 18:59:19 +00:00
$postdate = substr ( DateTimeFormat :: local ( $thread [ 'received' ]), 0 , 10 );
return $postdate ;
2018-01-28 11:18:08 +00:00
}
return false ;
}
2018-02-01 19:14:11 +00:00
/**
2020-01-19 06:05:23 +00:00
* add / remove activity to an item
2018-02-01 19:14:11 +00:00
*
* Toggle activities as like , dislike , attend of an item
*
2022-02-12 18:38:36 +00:00
* @ param int $item_id
2018-02-01 19:14:11 +00:00
* @ param string $verb
2019-01-06 21:06:53 +00:00
* Activity verb . One of
* like , unlike , dislike , undislike , attendyes , unattendyes ,
2020-08-09 18:42:25 +00:00
* attendno , unattendno , attendmaybe , unattendmaybe ,
2023-03-22 04:08:45 +00:00
* announce , unannounce
2022-02-12 18:38:36 +00:00
* @ param int $uid
* @ param string $allow_cid
* @ param string $allow_gid
* @ param string $deny_cid
* @ param string $deny_gid
2019-01-06 21:06:53 +00:00
* @ return bool
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
* @ hook 'post_local_end'
* array $arr
* 'post_id' => ID of posted item
2018-02-01 19:14:11 +00:00
*/
2022-06-15 20:28:33 +00:00
public static function performActivity ( int $item_id , string $verb , int $uid , string $allow_cid = null , string $allow_gid = null , string $deny_cid = null , string $deny_gid = null ) : bool
2018-02-01 19:14:11 +00:00
{
2020-08-09 18:42:25 +00:00
if ( empty ( $uid )) {
2018-02-01 19:14:11 +00:00
return false ;
}
2020-08-09 18:42:25 +00:00
Logger :: notice ( 'Start create activity' , [ 'verb' => $verb , 'item' => $item_id , 'user' => $uid ]);
2018-02-01 19:14:11 +00:00
2021-01-16 04:13:22 +00:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $item_id ]);
2018-07-21 12:46:04 +00:00
if ( ! DBA :: isResult ( $item )) {
2022-08-30 19:45:30 +00:00
Logger :: warning ( 'Post had not been fetched' , [ 'id' => $item_id ]);
2018-02-01 19:14:11 +00:00
return false ;
}
2021-01-27 10:01:42 +00:00
$uri_id = $item [ 'uri-id' ];
2018-07-07 10:43:43 +00:00
2020-08-09 18:42:25 +00:00
if ( ! in_array ( $item [ 'uid' ], [ 0 , $uid ])) {
2018-02-01 19:14:11 +00:00
return false ;
}
2021-01-16 04:13:22 +00:00
if ( ! Post :: exists ([ 'uri-id' => $item [ 'parent-uri-id' ], 'uid' => $uid ])) {
2022-07-29 14:17:53 +00:00
$stored = self :: storeForUserByUriId ( $item [ 'parent-uri-id' ], $uid , [ 'post-reason' => Item :: PR_ACTIVITY ]);
2020-08-09 18:42:25 +00:00
if (( $item [ 'parent-uri-id' ] == $item [ 'uri-id' ]) && ! empty ( $stored )) {
2021-01-16 04:13:22 +00:00
$item = Post :: selectFirst ( self :: ITEM_FIELDLIST , [ 'id' => $stored ]);
2020-08-09 18:42:25 +00:00
if ( ! DBA :: isResult ( $item )) {
2021-01-27 10:01:42 +00:00
Logger :: info ( 'Could not fetch just created item - should not happen' , [ 'stored' => $stored , 'uid' => $uid , 'uri-id' => $uri_id ]);
2020-08-09 18:42:25 +00:00
return false ;
}
}
2020-07-22 05:16:57 +00:00
}
2018-02-01 19:14:11 +00:00
// Retrieves the local post owner
2020-08-09 18:42:25 +00:00
$owner = User :: getOwnerDataById ( $uid );
if ( empty ( $owner )) {
Logger :: info ( 'Empty owner for user' , [ 'uid' => $uid ]);
2018-02-01 19:14:11 +00:00
return false ;
}
// Retrieve the current logged in user's public contact
2022-08-27 21:22:49 +00:00
$author_id = Contact :: getPublicIdByUserId ( $uid );
2020-08-09 18:42:25 +00:00
if ( empty ( $author_id )) {
Logger :: info ( 'Empty public contact' );
2018-02-01 19:14:11 +00:00
return false ;
}
2020-05-29 13:01:37 +00:00
$activity = null ;
2020-05-27 12:40:00 +00:00
switch ( $verb ) {
case 'like' :
case 'unlike' :
$activity = Activity :: LIKE ;
break ;
case 'dislike' :
case 'undislike' :
$activity = Activity :: DISLIKE ;
break ;
case 'attendyes' :
case 'unattendyes' :
$activity = Activity :: ATTEND ;
break ;
case 'attendno' :
case 'unattendno' :
$activity = Activity :: ATTENDNO ;
break ;
case 'attendmaybe' :
case 'unattendmaybe' :
$activity = Activity :: ATTENDMAYBE ;
break ;
case 'follow' :
case 'unfollow' :
$activity = Activity :: FOLLOW ;
break ;
2020-08-09 18:42:25 +00:00
case 'announce' :
case 'unannounce' :
$activity = Activity :: ANNOUNCE ;
break ;
2020-05-27 12:40:00 +00:00
default :
2022-08-30 19:45:30 +00:00
Logger :: warning ( 'unknown verb' , [ 'verb' => $verb , 'item' => $item_id ]);
2020-05-27 12:40:00 +00:00
return false ;
}
$mode = Strings :: startsWith ( $verb , 'un' ) ? 'delete' : 'create' ;
// Enable activity toggling instead of on/off
$event_verb_flag = $activity === Activity :: ATTEND || $activity === Activity :: ATTENDNO || $activity === Activity :: ATTENDMAYBE ;
2018-02-01 19:14:11 +00:00
// Look for an existing verb row
2020-05-27 12:40:00 +00:00
// Event participation activities are mutually exclusive, only one of them can exist at all times.
2018-02-01 19:14:11 +00:00
if ( $event_verb_flag ) {
2019-10-23 22:25:43 +00:00
$verbs = [ Activity :: ATTEND , Activity :: ATTENDNO , Activity :: ATTENDMAYBE ];
2018-07-07 10:43:43 +00:00
// Translate to the index based activity index
2020-05-26 05:18:50 +00:00
$vids = [];
2018-07-07 10:43:43 +00:00
foreach ( $verbs as $verb ) {
2020-05-26 05:18:50 +00:00
$vids [] = Verb :: getID ( $verb );
2018-07-07 10:43:43 +00:00
}
2018-02-01 19:14:11 +00:00
} else {
2020-05-26 05:18:50 +00:00
$vids = Verb :: getID ( $activity );
2018-06-27 19:37:13 +00:00
}
2018-02-01 19:14:11 +00:00
2023-06-18 16:49:38 +00:00
$condition = [
'vid' => $vids , 'deleted' => false , 'gravity' => self :: GRAVITY_ACTIVITY ,
'author-id' => $author_id , 'uid' => $uid , 'thr-parent-id' => $uri_id
];
2021-01-16 04:13:22 +00:00
$like_item = Post :: selectFirst ([ 'id' , 'guid' , 'verb' ], $condition );
2018-02-01 19:14:11 +00:00
2018-07-21 12:46:04 +00:00
if ( DBA :: isResult ( $like_item )) {
2020-05-27 12:40:00 +00:00
/**
* Truth table for existing activities
*
* | Inputs || Outputs |
* |----------------------------||-------------------|
* | Mode | Event | Same verb || Delete ? | Return ? |
* |--------|-------|-----------||---------|---------|
* | create | Yes | Yes || No | Yes |
* | create | Yes | No || Yes | No |
* | create | No | Yes || No | Yes |
* | create | No | No || N / A† |
* | delete | Yes | Yes || Yes | N / A‡ |
* | delete | Yes | No || No | N / A‡ |
* | delete | No | Yes || Yes | N / A‡ |
* | delete | No | No || N / A† |
* |--------|-------|-----------||---------|---------|
* | A | B | C || A xor C | ! B or C |
*
* † Can 't happen: It' s impossible to find an existing non - event activity without
* the same verb because we are only looking for this single verb .
*
* ‡ The " mode = delete " is returning early whether an existing activity was found or not .
*/
if ( $mode == 'create' xor $like_item [ 'verb' ] == $activity ) {
self :: markForDeletionById ( $like_item [ 'id' ]);
}
2018-02-01 19:14:11 +00:00
if ( ! $event_verb_flag || $like_item [ 'verb' ] == $activity ) {
return true ;
}
}
2020-05-27 12:40:00 +00:00
// No need to go further if we aren't creating anything
if ( $mode == 'delete' ) {
2018-02-01 19:14:11 +00:00
return true ;
}
2019-10-24 22:10:20 +00:00
$objtype = $item [ 'resource-id' ] ? Activity\ObjectType :: IMAGE : Activity\ObjectType :: NOTE ;
2018-02-01 19:14:11 +00:00
$new_item = [
2018-09-27 11:52:15 +00:00
'guid' => System :: createUUID (),
2022-07-09 11:32:32 +00:00
'uri' => self :: newURI (),
2022-08-27 21:22:49 +00:00
'uid' => $uid ,
2020-08-09 18:42:25 +00:00
'contact-id' => $owner [ 'id' ],
2018-02-01 19:14:11 +00:00
'wall' => $item [ 'wall' ],
'origin' => 1 ,
2018-08-11 20:40:44 +00:00
'network' => Protocol :: DFRN ,
2021-01-09 12:59:30 +00:00
'protocol' => Conversation :: PARCEL_DIRECT ,
'direction' => Conversation :: PUSH ,
2022-09-12 21:12:11 +00:00
'gravity' => self :: GRAVITY_ACTIVITY ,
2018-02-01 19:14:11 +00:00
'parent' => $item [ 'id' ],
'thr-parent' => $item [ 'uri' ],
2018-10-06 08:51:52 +00:00
'owner-id' => $author_id ,
2018-07-07 10:43:43 +00:00
'author-id' => $author_id ,
'body' => $activity ,
2018-02-01 19:14:11 +00:00
'verb' => $activity ,
'object-type' => $objtype ,
2022-02-15 15:44:44 +00:00
'allow_cid' => $allow_cid ? ? $item [ 'allow_cid' ],
'allow_gid' => $allow_gid ? ? $item [ 'allow_gid' ],
'deny_cid' => $deny_cid ? ? $item [ 'deny_cid' ],
'deny_gid' => $deny_gid ? ? $item [ 'deny_gid' ],
2018-02-01 19:14:11 +00:00
'visible' => 1 ,
'unseen' => 1 ,
];
2022-08-28 19:27:21 +00:00
if ( in_array ( $activity , [ Activity :: LIKE , Activity :: DISLIKE ])) {
$signed = Diaspora :: createLikeSignature ( $uid , $new_item );
if ( ! empty ( $signed )) {
$new_item [ 'diaspora_signed_text' ] = json_encode ( $signed );
}
2018-10-27 11:09:23 +00:00
}
2022-08-27 21:22:49 +00:00
self :: insert ( $new_item , true );
2018-02-01 19:14:11 +00:00
2018-02-06 12:40:22 +00:00
// If the parent item isn't visible then set it to visible
2022-08-27 21:22:49 +00:00
// @todo Check if this is still needed
2018-02-06 12:40:22 +00:00
if ( ! $item [ 'visible' ]) {
self :: update ([ 'visible' => true ], [ 'id' => $item [ 'id' ]]);
2018-02-01 19:14:11 +00:00
}
return true ;
}
2018-02-05 12:37:32 +00:00
2020-11-03 19:24:47 +00:00
/**
* Fetch the SQL condition for the given user id
*
* @ param integer $owner_id User ID for which the permissions should be fetched
* @ return array condition
*/
2022-06-15 20:28:33 +00:00
public static function getPermissionsConditionArrayByUserId ( int $owner_id ) : array
2020-11-03 19:24:47 +00:00
{
2022-10-20 20:14:50 +00:00
$local_user = DI :: userSession () -> getLocalUserId ();
$remote_user = DI :: userSession () -> getRemoteContactID ( $owner_id );
2020-11-03 19:24:47 +00:00
// default permissions - anonymous user
$condition = [ " `private` != ? " , self :: PRIVATE ];
if ( $local_user && ( $local_user == $owner_id )) {
// Profile owner - everything is visible
$condition = [];
} elseif ( $remote_user ) {
2023-06-18 16:49:38 +00:00
// Authenticated visitor - fetch the matching permissionsets
2021-10-05 21:30:10 +00:00
$permissionSets = DI :: permissionSet () -> selectByContactId ( $remote_user , $owner_id );
2020-11-03 19:24:47 +00:00
if ( ! empty ( $set )) {
2023-06-18 16:49:38 +00:00
$condition = [
" (`private` != ? OR (`private` = ? AND `wall`
2020-11-03 20:30:59 +00:00
AND `psid` IN ( " . implode(', ', array_fill(0, count( $set ), '?')) . " ))) " ,
2023-06-18 16:49:38 +00:00
self :: PRIVATE , self :: PRIVATE
];
2021-10-05 21:30:10 +00:00
$condition = array_merge ( $condition , $permissionSets -> column ( 'id' ));
2020-11-03 19:24:47 +00:00
}
}
return $condition ;
}
2021-01-18 20:19:13 +00:00
/**
* Get a permission SQL string for the given user
2021-04-26 06:50:12 +00:00
*
* @ param int $owner_id
* @ param string $table
* @ return string
2021-01-18 20:19:13 +00:00
*/
2022-06-15 20:28:33 +00:00
public static function getPermissionsSQLByUserId ( int $owner_id , string $table = '' ) : string
2018-10-17 19:30:41 +00:00
{
2022-10-20 20:14:50 +00:00
$local_user = DI :: userSession () -> getLocalUserId ();
$remote_user = DI :: userSession () -> getRemoteContactID ( $owner_id );
2019-09-27 05:49:23 +00:00
2021-01-18 20:19:13 +00:00
if ( ! empty ( $table )) {
$table = DBA :: quoteIdentifier ( $table ) . '.' ;
}
2018-10-17 19:30:41 +00:00
/*
* Construct permissions
*
* default permissions - anonymous user
*/
2021-01-18 20:19:13 +00:00
$sql = sprintf ( " AND " . $table . " `private` != %d " , self :: PRIVATE );
2018-10-17 19:30:41 +00:00
// Profile owner - everything is visible
if ( $local_user && ( $local_user == $owner_id )) {
$sql = '' ;
} elseif ( $remote_user ) {
/*
* Authenticated visitor . Unless pre - verified ,
* check that the contact belongs to this $owner_id
2023-05-13 23:54:35 +00:00
* and load the circles the visitor belongs to .
2018-10-17 19:30:41 +00:00
* If pre - verified , the caller is expected to have already
2023-05-13 23:54:35 +00:00
* done this and passed the circles into this function .
2018-10-17 19:30:41 +00:00
*/
2021-10-05 21:30:10 +00:00
$permissionSets = DI :: permissionSet () -> selectByContactId ( $remote_user , $owner_id );
2018-10-17 19:30:41 +00:00
if ( ! empty ( $set )) {
2021-10-05 21:30:10 +00:00
$sql_set = sprintf ( " OR ( " . $table . " `private` = %d AND " . $table . " `wall` AND " . $table . " `psid` IN ( " , self :: PRIVATE ) . implode ( ',' , $permissionSets -> column ( 'id' )) . " )) " ;
2018-10-17 19:30:41 +00:00
} else {
$sql_set = '' ;
}
2021-01-18 20:19:13 +00:00
$sql = sprintf ( " AND ( " . $table . " `private` != %d " , self :: PRIVATE ) . $sql_set . " ) " ;
2018-10-17 19:30:41 +00:00
}
return $sql ;
}
2018-11-07 02:12:41 +00:00
/**
* get translated item type
*
2021-03-07 07:39:13 +00:00
* @ param array $item
* @ param \Friendica\Core\L10n $l10n
2018-11-07 02:12:41 +00:00
* @ return string
*/
2022-06-15 20:28:33 +00:00
public static function postType ( array $item , \Friendica\Core\L10n $l10n ) : string
2018-11-07 02:12:41 +00:00
{
if ( ! empty ( $item [ 'event-id' ])) {
2021-03-07 07:39:13 +00:00
return $l10n -> t ( 'event' );
2018-11-07 02:12:41 +00:00
} elseif ( ! empty ( $item [ 'resource-id' ])) {
2021-03-07 07:39:13 +00:00
return $l10n -> t ( 'photo' );
2022-09-12 21:12:11 +00:00
} elseif ( $item [ 'gravity' ] == self :: GRAVITY_ACTIVITY ) {
2021-03-07 07:39:13 +00:00
return $l10n -> t ( 'activity' );
2022-09-12 21:12:11 +00:00
} elseif ( $item [ 'gravity' ] == self :: GRAVITY_COMMENT ) {
2021-03-07 07:39:13 +00:00
return $l10n -> t ( 'comment' );
2018-11-07 02:12:41 +00:00
}
2021-03-07 07:39:13 +00:00
return $l10n -> t ( 'post' );
2018-11-07 02:12:41 +00:00
}
/**
* Sets the " rendered-html " field of the provided item
*
* Body is preserved to avoid side - effects as we modify it just - in - time for spoilers and private image links
*
* @ param array $item
*
2019-01-06 21:06:53 +00:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
2018-11-07 02:12:41 +00:00
* @ todo Remove reference , simply return " rendered-html " and " rendered-hash "
*/
2022-05-04 07:49:37 +00:00
private static function putInCache ( & $item )
2018-11-07 02:12:41 +00:00
{
2020-12-04 12:29:08 +00:00
// Save original body to prevent addons to modify it
$body = $item [ 'body' ];
2018-11-07 02:12:41 +00:00
2019-10-16 12:35:14 +00:00
$rendered_hash = $item [ 'rendered-hash' ] ? ? '' ;
$rendered_html = $item [ 'rendered-html' ] ? ? '' ;
2018-11-07 02:12:41 +00:00
2023-06-18 16:49:38 +00:00
if (
$rendered_hash == ''
2020-12-04 12:29:08 +00:00
|| $rendered_html == ''
2020-12-04 12:55:48 +00:00
|| $rendered_hash != hash ( 'md5' , BBCode :: VERSION . '::' . $body )
2020-12-04 12:29:08 +00:00
|| DI :: config () -> get ( 'system' , 'ignore_cache' )
2018-11-07 02:12:41 +00:00
) {
2021-07-09 06:29:24 +00:00
$item [ 'rendered-html' ] = BBCode :: convertForUriId ( $item [ 'uri-id' ], $item [ 'body' ]);
2020-12-04 12:55:48 +00:00
$item [ 'rendered-hash' ] = hash ( 'md5' , BBCode :: VERSION . '::' . $body );
2018-11-07 02:12:41 +00:00
$hook_data = [ 'item' => $item , 'rendered-html' => $item [ 'rendered-html' ], 'rendered-hash' => $item [ 'rendered-hash' ]];
2018-12-26 06:06:24 +00:00
Hook :: callAll ( 'put_item_in_cache' , $hook_data );
2018-11-07 02:12:41 +00:00
$item [ 'rendered-html' ] = $hook_data [ 'rendered-html' ];
2020-12-04 12:55:48 +00:00
$item [ 'rendered-hash' ] = $hook_data [ 'rendered-hash' ];
2018-11-07 02:12:41 +00:00
unset ( $hook_data );
2021-02-20 20:07:25 +00:00
// Update if the generated values differ from the existing ones
if ((( $rendered_hash != $item [ 'rendered-hash' ]) || ( $rendered_html != $item [ 'rendered-html' ])) && ! empty ( $item [ 'id' ])) {
2018-11-07 02:12:41 +00:00
self :: update (
[
2020-12-04 12:29:08 +00:00
'rendered-html' => $item [ 'rendered-html' ],
'rendered-hash' => $item [ 'rendered-hash' ]
2018-11-07 02:12:41 +00:00
],
2020-12-04 12:29:08 +00:00
[ 'id' => $item [ 'id' ]]
2018-11-07 02:12:41 +00:00
);
}
}
2020-12-04 12:29:08 +00:00
$item [ 'body' ] = $body ;
2018-11-07 02:12:41 +00:00
}
/**
2020-01-19 06:05:23 +00:00
* Given an item array , convert the body element from bbcode to html and add smilie icons .
2018-11-07 02:12:41 +00:00
* If attach is true , also add icons for item attachments .
*
2022-06-15 20:28:33 +00:00
* @ param array $item Record from item table
* @ param boolean $attach If true , add icons for item attachments as well
* @ param boolean $is_preview Whether this is a preview
* @ param boolean $only_cache Whether only cached HTML should be updated
2018-11-07 02:12:41 +00:00
* @ return string item body html
2019-01-06 21:06:53 +00:00
* @ throws \Friendica\Network\HTTPException\InternalServerErrorException
* @ throws \ImagickException
* @ hook prepare_body_init item array before any work
* @ hook prepare_body_content_filter ( 'item' => item array , 'filter_reasons' => string array ) before first bbcode to html
* @ hook prepare_body ( 'item' => item array , 'html' => body string , 'is_preview' => boolean , 'filter_reasons' => string array ) after first bbcode to html
* @ hook prepare_body_final ( 'item' => item array , 'html' => body string ) after attach icons and blockquote special case handling ( spoiler , author )
2018-11-07 02:12:41 +00:00
*/
2022-06-08 15:26:47 +00:00
public static function prepareBody ( array & $item , bool $attach = false , bool $is_preview = false , bool $only_cache = false ) : string
2018-11-07 02:12:41 +00:00
{
2019-12-15 21:34:11 +00:00
$a = DI :: app ();
2018-12-26 06:06:24 +00:00
Hook :: callAll ( 'prepare_body_init' , $item );
2018-11-07 02:12:41 +00:00
2022-12-05 02:27:51 +00:00
2018-11-07 02:12:41 +00:00
// In order to provide theme developers more possibilities, event items
// are treated differently.
2019-10-24 22:10:20 +00:00
if ( $item [ 'object-type' ] === Activity\ObjectType :: EVENT && isset ( $item [ 'event-id' ])) {
2018-11-07 02:12:41 +00:00
$ev = Event :: getItemHTML ( $item );
return $ev ;
}
2020-05-01 06:01:22 +00:00
$tags = Tag :: populateFromItem ( $item );
2018-11-07 02:12:41 +00:00
$item [ 'tags' ] = $tags [ 'tags' ];
$item [ 'hashtags' ] = $tags [ 'hashtags' ];
$item [ 'mentions' ] = $tags [ 'mentions' ];
2022-12-17 05:48:09 +00:00
if ( ! $is_preview ) {
2023-01-04 21:52:02 +00:00
$item [ 'body' ] = preg_replace ( " # \ s* \ [attachment .*?].*? \ [/attachment] \ s*#ism " , " \n " , $item [ 'body' ]);
2022-12-17 05:48:09 +00:00
$item [ 'body' ] = Post\Media :: removeFromEndOfBody ( $item [ 'body' ] ? ? '' );
2023-05-03 20:59:28 +00:00
$item [ 'body' ] = Post\Media :: replaceImage ( $item [ 'body' ]);
2022-12-17 05:48:09 +00:00
}
$body = $item [ 'body' ];
2023-01-04 21:52:02 +00:00
if ( $is_preview ) {
$item [ 'body' ] = preg_replace ( " # \ s* \ [attachment .*?].*? \ [/attachment] \ s*#ism " , " \n " , $item [ 'body' ]);
}
2022-10-16 21:37:05 +00:00
2022-11-15 19:55:03 +00:00
$fields = [ 'uri-id' , 'uri' , 'body' , 'title' , 'author-name' , 'author-link' , 'author-avatar' , 'guid' , 'created' , 'plink' , 'network' , 'has-media' , 'quote-uri-id' , 'post-type' ];
2022-10-16 21:37:05 +00:00
2023-02-27 07:47:31 +00:00
$shared_uri_id = 0 ;
$shared_links = [];
$quote_shared_links = [];
2022-10-16 21:37:05 +00:00
2022-10-26 17:00:55 +00:00
$shared = DI :: contentItem () -> getSharedPost ( $item , $fields );
if ( ! empty ( $shared [ 'post' ])) {
$shared_item = $shared [ 'post' ];
2022-12-17 22:07:14 +00:00
$shared_item [ 'body' ] = Post\Media :: removeFromEndOfBody ( $shared_item [ 'body' ]);
2023-05-03 20:59:28 +00:00
$shared_item [ 'body' ] = Post\Media :: replaceImage ( $shared_item [ 'body' ]);
2022-10-26 17:00:55 +00:00
$quote_uri_id = $shared [ 'post' ][ 'uri-id' ];
$shared_links [] = strtolower ( $shared [ 'post' ][ 'uri' ]);
$item [ 'body' ] = BBCode :: removeSharedData ( $item [ 'body' ]);
2022-11-23 06:27:40 +00:00
} elseif ( empty ( $shared_item [ 'uri-id' ]) && empty ( $item [ 'quote-uri-id' ]) && ( $item [ 'network' ] != Protocol :: DIASPORA )) {
2022-10-16 21:37:05 +00:00
$media = Post\Media :: getByURIId ( $item [ 'uri-id' ], [ Post\Media :: ACTIVITY ]);
if ( ! empty ( $media )) {
2023-05-01 13:05:59 +00:00
$shared_item = Post :: selectFirst ( $fields , [ 'uri-id' => $media [ 0 ][ 'media-uri-id' ], 'uid' => [ $item [ 'uid' ], 0 ]]);
if ( empty ( $shared_item [ 'uri-id' ])) {
$shared_item = Post :: selectFirst ( $fields , [ 'plink' => $media [ 0 ][ 'url' ], 'uid' => [ $item [ 'uid' ], 0 ]]);
2023-05-02 09:21:11 +00:00
} elseif ( ! in_array ( strtolower ( $media [ 0 ][ 'url' ]), $shared_links )) {
2023-05-01 13:05:59 +00:00
$shared_links [] = strtolower ( $media [ 0 ][ 'url' ]);
}
2022-10-16 21:37:05 +00:00
if ( empty ( $shared_item [ 'uri-id' ])) {
$shared_item = Post :: selectFirst ( $fields , [ 'uri' => $media [ 0 ][ 'url' ], 'uid' => [ $item [ 'uid' ], 0 ]]);
$shared_links [] = strtolower ( $media [ 0 ][ 'url' ]);
}
2023-02-27 07:47:31 +00:00
if ( ! empty ( $shared_item [ 'uri-id' ])) {
$data = BBCode :: getAttachmentData ( $shared_item [ 'body' ]);
if ( ! empty ( $data [ 'url' ])) {
$quote_shared_links [] = $data [ 'url' ];
}
$quote_uri_id = $shared_item [ 'uri-id' ];
}
2022-10-16 21:37:05 +00:00
}
}
if ( ! empty ( $quote_uri_id )) {
2023-04-03 04:03:32 +00:00
if ( isset ( $shared_item [ 'plink' ])) {
2023-07-09 14:31:47 +00:00
$item [ 'body' ] .= " \n " . DI :: contentItem () -> createSharedBlockByArray ( $shared_item , false , true );
2023-04-03 04:03:32 +00:00
} else {
DI :: logger () -> warning ( 'Missing plink in shared item' , [ 'item' => $item , 'shared' => $shared , 'quote_uri_id' => $quote_uri_id , 'shared_item' => $shared_item ]);
}
2022-10-16 21:37:05 +00:00
}
if ( ! empty ( $shared_item [ 'uri-id' ])) {
$shared_uri_id = $shared_item [ 'uri-id' ];
$shared_links [] = strtolower ( $shared_item [ 'plink' ]);
2022-11-13 23:38:48 +00:00
$shared_attachments = Post\Media :: splitAttachments ( $shared_uri_id , [], $shared_item [ 'has-media' ]);
2021-06-28 04:53:20 +00:00
$shared_links = array_merge ( $shared_links , array_column ( $shared_attachments [ 'visual' ], 'url' ));
$shared_links = array_merge ( $shared_links , array_column ( $shared_attachments [ 'link' ], 'url' ));
$shared_links = array_merge ( $shared_links , array_column ( $shared_attachments [ 'additional' ], 'url' ));
$item [ 'body' ] = self :: replaceVisualAttachments ( $shared_attachments , $item [ 'body' ]);
}
2022-06-20 18:34:02 +00:00
2022-11-13 23:38:48 +00:00
$attachments = Post\Media :: splitAttachments ( $item [ 'uri-id' ], $shared_links , $item [ 'has-media' ] ? ? false );
2021-06-28 04:53:20 +00:00
$item [ 'body' ] = self :: replaceVisualAttachments ( $attachments , $item [ 'body' ] ? ? '' );
2021-02-20 20:07:25 +00:00
self :: putInCache ( $item );
2021-04-29 05:45:35 +00:00
$item [ 'body' ] = $body ;
2018-11-07 02:12:41 +00:00
$s = $item [ " rendered-html " ];
2022-05-04 06:17:34 +00:00
if ( $only_cache ) {
2022-06-15 20:28:33 +00:00
return '' ;
2022-05-04 06:17:34 +00:00
}
2021-07-27 12:24:22 +00:00
// Compile eventual content filter reasons
$filter_reasons = [];
2022-10-20 20:14:50 +00:00
if ( ! $is_preview && DI :: userSession () -> getPublicContactId () != $item [ 'author-id' ]) {
2023-01-12 06:25:55 +00:00
if ( ! empty ( $item [ 'user-blocked-author' ]) || ! empty ( $item [ 'user-blocked-owner' ])) {
$filter_reasons [] = DI :: l10n () -> t ( '%s is blocked' , $item [ 'author-name' ]);
} elseif ( ! empty ( $item [ 'user-ignored-author' ]) || ! empty ( $item [ 'user-ignored-owner' ])) {
$filter_reasons [] = DI :: l10n () -> t ( '%s is ignored' , $item [ 'author-name' ]);
} elseif ( ! empty ( $item [ 'user-collapsed-author' ]) || ! empty ( $item [ 'user-collapsed-owner' ])) {
2023-01-08 17:40:05 +00:00
$filter_reasons [] = DI :: l10n () -> t ( 'Content from %s is collapsed' , $item [ 'author-name' ]);
}
2023-01-08 22:13:31 +00:00
2022-10-20 20:14:50 +00:00
if ( ! empty ( $item [ 'content-warning' ]) && ( ! DI :: userSession () -> getLocalUserId () || ! DI :: pConfig () -> get ( DI :: userSession () -> getLocalUserId (), 'system' , 'disable_cw' , false ))) {
2021-07-27 12:24:22 +00:00
$filter_reasons [] = DI :: l10n () -> t ( 'Content warning: %s' , $item [ 'content-warning' ]);
}
2021-08-16 09:28:08 +00:00
$item [ 'attachments' ] = $attachments ;
2021-07-27 12:24:22 +00:00
$hook_data = [
'item' => $item ,
'filter_reasons' => $filter_reasons
];
Hook :: callAll ( 'prepare_body_content_filter' , $hook_data );
$filter_reasons = $hook_data [ 'filter_reasons' ];
unset ( $hook_data );
}
2018-11-07 02:12:41 +00:00
$hook_data = [
'item' => $item ,
'html' => $s ,
'preview' => $is_preview ,
'filter_reasons' => $filter_reasons
];
2018-12-26 06:06:24 +00:00
Hook :: callAll ( 'prepare_body' , $hook_data );
2022-12-10 22:47:37 +00:00
$s = $hook_data [ 'html' ];
2022-12-13 14:33:01 +00:00
2018-11-07 02:12:41 +00:00
unset ( $hook_data );
if ( ! $attach ) {
// Replace the blockquotes with quotes that are used in mails.
$mailquote = '<blockquote type="cite" class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">' ;
$s = str_replace ([ '<blockquote>' , '<blockquote class="spoiler">' , '<blockquote class="author">' ], [ $mailquote , $mailquote , $mailquote ], $s );
return $s ;
}
2021-06-28 04:53:20 +00:00
if ( ! empty ( $shared_attachments )) {
2023-05-03 21:14:35 +00:00
$s = self :: addGallery ( $s , $shared_attachments , $item [ 'uri-id' ]);
2022-11-15 19:55:03 +00:00
$s = self :: addVisualAttachments ( $shared_attachments , $shared_item , $s , true );
2023-02-27 07:47:31 +00:00
$s = self :: addLinkAttachment ( $shared_uri_id ? : $item [ 'uri-id' ], $shared_attachments , $body , $s , true , $quote_shared_links );
2021-06-28 04:53:20 +00:00
$s = self :: addNonVisualAttachments ( $shared_attachments , $item , $s , true );
2022-10-25 06:37:23 +00:00
$body = BBCode :: removeSharedData ( $body );
2021-04-26 06:50:12 +00:00
}
2023-07-09 14:15:01 +00:00
$pos = strpos ( $s , BBCode :: SHARED_ANCHOR );
if ( $pos ) {
$shared_html = substr ( $s , $pos + strlen ( BBCode :: SHARED_ANCHOR ));
$s = substr ( $s , 0 , $pos );
}
2023-07-26 05:50:15 +00:00
2023-05-03 21:14:35 +00:00
$s = self :: addGallery ( $s , $attachments , $item [ 'uri-id' ]);
2022-11-15 19:55:03 +00:00
$s = self :: addVisualAttachments ( $attachments , $item , $s , false );
2021-07-05 18:45:49 +00:00
$s = self :: addLinkAttachment ( $item [ 'uri-id' ], $attachments , $body , $s , false , $shared_links );
2021-04-26 06:50:12 +00:00
$s = self :: addNonVisualAttachments ( $attachments , $item , $s , false );
2022-05-16 04:55:15 +00:00
$s = self :: addQuestions ( $item , $s );
2021-04-05 09:15:36 +00:00
// Map.
if ( strpos ( $s , '<div class="map">' ) !== false && ! empty ( $item [ 'coord' ])) {
$x = Map :: byCoordinates ( trim ( $item [ 'coord' ]));
if ( $x ) {
$s = preg_replace ( '/\<div class\=\"map\"\>/' , '$0' . $x , $s );
}
}
// Replace friendica image url size with theme preference.
2021-07-25 19:39:10 +00:00
if ( ! empty ( $a -> getThemeInfoValue ( 'item_image_size' ))) {
$ps = $a -> getThemeInfoValue ( 'item_image_size' );
2021-04-05 09:15:36 +00:00
$s = preg_replace ( '|(<img[^>]+src="[^"]+/photo/[0-9a-f]+)-[0-9]|' , " $ 1- " . $ps , $s );
}
2023-07-09 14:15:01 +00:00
if ( ! empty ( $shared_html )) {
$s .= $shared_html ;
}
2021-04-05 09:15:36 +00:00
$s = HTML :: applyContentFilter ( $s , $filter_reasons );
$hook_data = [ 'item' => $item , 'html' => $s ];
Hook :: callAll ( 'prepare_body_final' , $hook_data );
return $hook_data [ 'html' ];
}
2022-12-10 21:54:50 +00:00
/**
* @ param array $images
* @ return string
* @ throws \Friendica\Network\HTTPException\ServiceUnavailableException
*/
2022-12-15 20:29:14 +00:00
private static function makeImageGrid ( array $images ) : string
2022-12-10 21:54:50 +00:00
{
2022-12-11 16:09:28 +00:00
// Image for first column (fc) and second column (sc)
2022-12-13 14:33:01 +00:00
$images_fc = [];
$images_sc = [];
2022-12-11 17:25:19 +00:00
2022-12-15 20:29:14 +00:00
for ( $i = 0 ; $i < count ( $images ); $i ++ ) {
( $i % 2 == 0 ) ? ( $images_fc [] = $images [ $i ]) : ( $images_sc [] = $images [ $i ]);
2022-12-10 21:54:50 +00:00
}
2022-12-10 22:37:03 +00:00
return Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'content/image_grid.tpl' ), [
2022-12-10 21:54:50 +00:00
'columns' => [
2022-12-11 17:25:19 +00:00
'fc' => $images_fc ,
'sc' => $images_sc ,
2022-12-10 21:54:50 +00:00
],
]);
}
2022-12-29 16:37:36 +00:00
2023-05-03 20:59:28 +00:00
/**
* Modify links to pictures to links for the " Fancybox " gallery
*
* @ param string $s
* @ param array $attachments
* @ param integer $uri_id
* @ return string
*/
2023-05-03 21:14:35 +00:00
private static function addGallery ( string $s , array $attachments , int $uri_id ) : string
2023-05-03 20:59:28 +00:00
{
foreach ( $attachments [ 'visual' ] as $attachment ) {
if ( empty ( $attachment [ 'preview' ]) || ( $attachment [ 'type' ] != Post\Media :: IMAGE )) {
continue ;
}
$s = str_replace ( '<a href="' . $attachment [ 'url' ] . '"' , '<a data-fancybox="' . $uri_id . '" href="' . $attachment [ 'url' ] . '"' , $s );
}
return $s ;
}
2022-12-10 21:54:50 +00:00
2021-04-05 09:15:36 +00:00
/**
2021-04-26 06:50:12 +00:00
* Check if the body contains a link
2021-04-05 09:15:36 +00:00
*
2021-04-26 15:09:32 +00:00
* @ param string $body
* @ param string $url
2021-05-23 12:35:05 +00:00
* @ param int $type
2021-04-26 15:09:32 +00:00
* @ return bool
2021-04-26 06:50:12 +00:00
*/
2022-06-14 07:08:09 +00:00
public static function containsLink ( string $body , string $url , int $type = 0 ) : bool
2021-04-26 06:50:12 +00:00
{
2021-05-02 17:33:32 +00:00
// Make sure that for example site parameters aren't used when testing if the link is contained in the body
$urlparts = parse_url ( $url );
2022-11-05 22:38:25 +00:00
if ( empty ( $urlparts )) {
return false ;
}
unset ( $urlparts [ 'query' ]);
unset ( $urlparts [ 'fragment' ]);
try {
2022-07-29 16:05:04 +00:00
$url = ( string ) Uri :: fromParts ( $urlparts );
2022-11-05 22:38:25 +00:00
} catch ( \InvalidArgumentException $e ) {
DI :: logger () -> notice ( 'Invalid URL' , [ '$url' => $url , '$urlparts' => $urlparts ]);
/* See https :// github . com / friendica / friendica / issues / 12113
* Malformed URLs will result in a Fatal Error
*/
2022-07-29 14:56:40 +00:00
return false ;
}
2021-05-02 17:33:32 +00:00
2021-05-23 12:35:05 +00:00
// Remove media links to only search in embedded content
// @todo Check images for image link, audio for audio links, ...
if ( in_array ( $type , [ Post\Media :: AUDIO , Post\Media :: VIDEO , Post\Media :: IMAGE ])) {
$body = preg_replace ( " / \ [url=[^ \ [ \ ]]* \ ](.*) \ [ \ /url \ ]/Usi " , ' $1 ' , $body );
}
2021-04-26 06:50:12 +00:00
if ( strpos ( $body , $url )) {
return true ;
}
2022-11-05 22:38:25 +00:00
2021-04-26 06:50:12 +00:00
foreach ([ 0 , 1 , 2 ] as $size ) {
2023-06-18 16:49:38 +00:00
if (
preg_match ( '#/photo/.*-' . $size . '\.#ism' , $url ) &&
strpos ( preg_replace ( '#(/photo/.*)-[012]\.#ism' , '$1-' . $size . '.' , $body ), $url )
) {
2021-04-26 06:50:12 +00:00
return true ;
}
}
2022-11-05 22:38:25 +00:00
2021-04-26 06:50:12 +00:00
return false ;
}
2021-06-28 04:53:20 +00:00
/**
* Replace visual attachments in the body
*
* @ param array $attachments
* @ param string $body
* @ return string modified body
*/
2022-06-14 07:08:09 +00:00
private static function replaceVisualAttachments ( array $attachments , string $body ) : string
2021-06-28 04:53:20 +00:00
{
2021-07-27 04:57:29 +00:00
DI :: profiler () -> startRecording ( 'rendering' );
2021-06-28 04:53:20 +00:00
foreach ( $attachments [ 'visual' ] as $attachment ) {
if ( ! empty ( $attachment [ 'preview' ])) {
2023-05-03 20:59:28 +00:00
if ( Network :: isLocalLink ( $attachment [ 'preview' ])) {
continue ;
}
2022-05-21 06:58:26 +00:00
$proxy = Post\Media :: getPreviewUrlForId ( $attachment [ 'id' ], Proxy :: SIZE_LARGE );
$search = [ '[img=' . $attachment [ 'preview' ] . ']' , ']' . $attachment [ 'preview' ] . '[/img]' ];
$replace = [ '[img=' . $proxy . ']' , ']' . $proxy . '[/img]' ];
$body = str_replace ( $search , $replace , $body );
2021-06-28 04:53:20 +00:00
} elseif ( $attachment [ 'filetype' ] == 'image' ) {
2023-05-03 20:59:28 +00:00
if ( Network :: isLocalLink ( $attachment [ 'url' ])) {
continue ;
}
2022-05-21 06:58:26 +00:00
$proxy = Post\Media :: getUrlForId ( $attachment [ 'id' ]);
$search = [ '[img=' . $attachment [ 'url' ] . ']' , ']' . $attachment [ 'url' ] . '[/img]' ];
$replace = [ '[img=' . $proxy . ']' , ']' . $proxy . '[/img]' ];
$body = str_replace ( $search , $replace , $body );
2021-06-28 04:53:20 +00:00
}
}
2021-07-27 04:57:29 +00:00
DI :: profiler () -> stopRecording ();
2021-06-28 04:53:20 +00:00
return $body ;
}
2021-04-26 06:50:12 +00:00
/**
* Add visual attachments to the content
*
2022-11-15 19:55:03 +00:00
* @ param array $attachments
* @ param array $item
2021-04-05 09:15:36 +00:00
* @ param string $content
2021-04-26 06:50:12 +00:00
* @ return string modified content
2021-04-05 09:15:36 +00:00
*/
2022-11-15 19:55:03 +00:00
private static function addVisualAttachments ( array $attachments , array $item , string $content , bool $shared ) : string
2021-04-05 09:15:36 +00:00
{
2021-07-27 04:57:29 +00:00
DI :: profiler () -> startRecording ( 'rendering' );
2022-12-08 07:16:25 +00:00
$leading = '' ;
2021-04-05 11:44:43 +00:00
$trailing = '' ;
2022-12-08 07:16:25 +00:00
$images = [];
2021-04-26 06:50:12 +00:00
2021-04-30 06:11:13 +00:00
// @todo In the future we should make a single for the template engine with all media in it. This allows more flexibilty.
2021-04-26 06:50:12 +00:00
foreach ( $attachments [ 'visual' ] as $attachment ) {
2021-07-17 07:55:19 +00:00
if ( self :: containsLink ( $item [ 'body' ], $attachment [ 'preview' ] ? ? $attachment [ 'url' ], $attachment [ 'type' ])) {
2021-04-14 19:12:01 +00:00
continue ;
}
2021-04-26 15:09:32 +00:00
2022-11-15 19:48:43 +00:00
if ( $attachment [ 'filetype' ] == 'image' ) {
$preview_url = Post\Media :: getPreviewUrlForId ( $attachment [ 'id' ], ( $attachment [ 'width' ] > $attachment [ 'height' ]) ? Proxy :: SIZE_MEDIUM : Proxy :: SIZE_LARGE );
} elseif ( ! empty ( $attachment [ 'preview' ])) {
2021-06-28 04:53:20 +00:00
$preview_url = Post\Media :: getPreviewUrlForId ( $attachment [ 'id' ], Proxy :: SIZE_LARGE );
2021-04-28 19:05:46 +00:00
} else {
$preview_url = '' ;
}
2022-11-15 19:55:03 +00:00
if ( $preview_url && self :: containsLink ( $item [ 'body' ], $preview_url )) {
2022-11-15 19:48:43 +00:00
continue ;
}
2021-04-26 06:50:12 +00:00
if (( $attachment [ 'filetype' ] == 'video' )) {
2021-04-05 11:44:43 +00:00
/// @todo Move the template to /content as well
2021-04-07 06:02:06 +00:00
$media = Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'video_top.tpl' ), [
2021-04-05 09:15:36 +00:00
'$video' => [
2021-04-28 19:05:46 +00:00
'id' => $attachment [ 'id' ],
2021-06-27 11:50:10 +00:00
'src' => $attachment [ 'url' ],
2021-04-28 19:05:46 +00:00
'name' => $attachment [ 'name' ] ? : $attachment [ 'url' ],
'preview' => $preview_url ,
'mime' => $attachment [ 'mimetype' ],
2021-04-05 09:15:36 +00:00
],
]);
2021-05-31 05:39:04 +00:00
if (( $item [ 'post-type' ] ? ? null ) == Item :: PT_VIDEO ) {
2021-04-07 06:02:06 +00:00
$leading .= $media ;
} else {
$trailing .= $media ;
}
2021-04-26 06:50:12 +00:00
} elseif ( $attachment [ 'filetype' ] == 'audio' ) {
2021-04-07 06:02:06 +00:00
$media = Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'content/audio.tpl' ), [
2021-04-05 09:15:36 +00:00
'$audio' => [
2021-04-28 19:05:46 +00:00
'id' => $attachment [ 'id' ],
2021-06-27 11:50:10 +00:00
'src' => $attachment [ 'url' ],
'name' => $attachment [ 'name' ] ? : $attachment [ 'url' ],
2021-04-26 06:50:12 +00:00
'mime' => $attachment [ 'mimetype' ],
2021-04-05 09:15:36 +00:00
],
]);
2021-06-02 17:43:30 +00:00
if (( $item [ 'post-type' ] ? ? null ) == Item :: PT_AUDIO ) {
2021-04-07 06:02:06 +00:00
$leading .= $media ;
} else {
$trailing .= $media ;
}
2021-04-26 06:50:12 +00:00
} elseif ( $attachment [ 'filetype' ] == 'image' ) {
2022-11-15 19:48:43 +00:00
$src_url = Post\Media :: getUrlForId ( $attachment [ 'id' ]);
2022-11-15 19:55:03 +00:00
if ( self :: containsLink ( $item [ 'body' ], $src_url )) {
2022-11-15 19:48:43 +00:00
continue ;
}
2023-05-03 20:59:28 +00:00
$images [] = [ 'src' => $src_url , 'preview' => $preview_url , 'attachment' => $attachment , 'uri_id' => $item [ 'uri-id' ]];
2022-12-08 07:16:25 +00:00
}
}
2022-12-10 21:54:50 +00:00
$media = '' ;
if ( count ( $images ) > 1 ) {
$media = self :: makeImageGrid ( $images );
2022-12-13 14:33:01 +00:00
} elseif ( count ( $images ) == 1 ) {
$media = Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'content/image.tpl' ), [
2022-12-10 21:54:50 +00:00
'$image' => $images [ 0 ],
2022-12-08 07:16:25 +00:00
]);
2022-12-10 21:54:50 +00:00
}
// On Diaspora posts the attached pictures are leading
if ( $item [ 'network' ] == Protocol :: DIASPORA ) {
$leading .= $media ;
} else {
$trailing .= $media ;
2021-04-26 06:50:12 +00:00
}
if ( $shared ) {
2022-12-14 14:53:58 +00:00
$content = str_replace ( BBCode :: TOP_ANCHOR , '<div class="body-attach">' . $leading . '</div>' . BBCode :: TOP_ANCHOR , $content );
$content = str_replace ( BBCode :: BOTTOM_ANCHOR , '<div class="body-attach">' . $trailing . '</div>' . BBCode :: BOTTOM_ANCHOR , $content );
2021-04-26 06:50:12 +00:00
} else {
if ( $leading != '' ) {
2022-12-14 14:53:58 +00:00
$content = '<div class="body-attach">' . $leading . '</div>' . $content ;
2021-04-26 06:50:12 +00:00
}
2021-04-26 15:09:32 +00:00
2021-04-26 06:50:12 +00:00
if ( $trailing != '' ) {
2022-12-14 14:53:58 +00:00
$content .= '<div class="body-attach">' . $trailing . '</div>' ;
2021-04-26 06:50:12 +00:00
}
}
2021-07-27 04:57:29 +00:00
DI :: profiler () -> stopRecording ();
2021-04-26 06:50:12 +00:00
return $content ;
}
/**
* Add link attachment to the content
*
* @ param array $attachments
2021-04-29 05:45:35 +00:00
* @ param string $body
2021-04-26 06:50:12 +00:00
* @ param string $content
* @ param bool $shared
2021-04-30 20:31:24 +00:00
* @ param array $ignore_links A list of URLs to ignore
2021-04-26 06:50:12 +00:00
* @ return string modified content
*/
2022-06-14 07:08:09 +00:00
private static function addLinkAttachment ( int $uriid , array $attachments , string $body , string $content , bool $shared , array $ignore_links ) : string
2021-04-26 06:50:12 +00:00
{
2021-07-27 04:57:29 +00:00
DI :: profiler () -> startRecording ( 'rendering' );
2021-12-04 04:03:18 +00:00
// Don't show a preview when there is a visual attachment (audio or video)
$types = array_column ( $attachments [ 'visual' ], 'type' );
$preview = ! in_array ( Post\Media :: IMAGE , $types ) && ! in_array ( Post\Media :: VIDEO , $types );
2018-11-07 02:12:41 +00:00
2021-04-26 06:50:12 +00:00
if ( ! empty ( $attachments [ 'link' ])) {
foreach ( $attachments [ 'link' ] as $link ) {
2021-04-29 19:02:43 +00:00
$found = false ;
foreach ( $ignore_links as $ignore_link ) {
if ( Strings :: compareLink ( $link [ 'url' ], $ignore_link )) {
$found = true ;
}
}
2021-05-05 16:46:55 +00:00
// @todo Judge between the links to use the one with most information
2021-05-07 06:26:41 +00:00
if ( ! $found && ( empty ( $attachment ) || ! empty ( $link [ 'author-name' ]) ||
( empty ( $attachment [ 'name' ]) && ! empty ( $link [ 'name' ])) ||
( empty ( $attachment [ 'description' ]) && ! empty ( $link [ 'description' ])) ||
( empty ( $attachment [ 'preview' ]) && ! empty ( $link [ 'preview' ])))) {
2021-04-26 06:50:12 +00:00
$attachment = $link ;
2021-04-05 09:15:36 +00:00
}
2021-04-26 06:50:12 +00:00
}
}
if ( ! empty ( $attachment )) {
$data = [
2021-04-27 12:29:54 +00:00
'after' => '' ,
'author_name' => $attachment [ 'author-name' ] ? ? '' ,
'author_url' => $attachment [ 'author-url' ] ? ? '' ,
'description' => $attachment [ 'description' ] ? ? '' ,
'image' => '' ,
'preview' => '' ,
'provider_name' => $attachment [ 'publisher-name' ] ? ? '' ,
'provider_url' => $attachment [ 'publisher-url' ] ? ? '' ,
'text' => '' ,
'title' => $attachment [ 'name' ] ? ? '' ,
'type' => 'link' ,
2023-06-18 16:49:38 +00:00
'url' => $attachment [ 'url' ]
];
2021-04-27 12:29:54 +00:00
2021-06-27 11:50:10 +00:00
if ( $preview && ! empty ( $attachment [ 'preview' ])) {
2021-04-27 12:29:54 +00:00
if ( $attachment [ 'preview-width' ] >= 500 ) {
2021-06-28 04:53:20 +00:00
$data [ 'image' ] = Post\Media :: getPreviewUrlForId ( $attachment [ 'id' ], Proxy :: SIZE_MEDIUM );
2021-04-27 12:29:54 +00:00
} else {
2021-06-27 11:50:10 +00:00
$data [ 'preview' ] = Post\Media :: getPreviewUrlForId ( $attachment [ 'id' ], Proxy :: SIZE_MEDIUM );
2021-04-27 12:29:54 +00:00
}
2021-04-26 06:50:12 +00:00
}
2021-05-04 05:18:03 +00:00
if ( ! empty ( $data [ 'description' ]) && ! empty ( $content )) {
similar_text ( $data [ 'description' ], $content , $percent );
} else {
$percent = 0 ;
}
if ( ! empty ( $data [ 'description' ]) && (( $data [ 'title' ] == $data [ 'description' ]) || ( $percent > 95 ) || ( strpos ( $content , $data [ 'description' ]) !== false ))) {
$data [ 'description' ] = '' ;
}
2021-05-04 06:08:40 +00:00
2021-05-13 11:26:56 +00:00
if (( $data [ 'author_name' ] ? ? '' ) == ( $data [ 'provider_name' ] ? ? '' )) {
2021-05-04 06:08:40 +00:00
$data [ 'author_name' ] = '' ;
}
2021-05-13 15:01:35 +00:00
if (( $data [ 'author_url' ] ? ? '' ) == ( $data [ 'provider_url' ] ? ? '' )) {
2021-05-04 06:08:40 +00:00
$data [ 'author_url' ] = '' ;
}
2021-04-29 05:45:35 +00:00
} elseif ( preg_match ( " /.*( \ [attachment.*? \ ].*? \ [ \ /attachment \ ]).*/ism " , $body , $match )) {
$data = BBCode :: getAttachmentData ( $match [ 1 ]);
2021-04-26 06:50:12 +00:00
}
2021-07-27 04:57:29 +00:00
DI :: profiler () -> stopRecording ();
2018-11-07 02:12:41 +00:00
2022-10-16 21:37:05 +00:00
if ( isset ( $data [ 'url' ]) && ! in_array ( strtolower ( $data [ 'url' ]), $ignore_links )) {
2023-02-27 07:47:31 +00:00
if ( ! empty ( $data [ 'description' ]) || ! empty ( $data [ 'image' ]) || ! empty ( $data [ 'preview' ]) || ( ! empty ( $data [ 'title' ]) && ! Strings :: compareLink ( $data [ 'title' ], $data [ 'url' ]))) {
2021-05-04 05:18:03 +00:00
$parts = parse_url ( $data [ 'url' ]);
if ( ! empty ( $parts [ 'scheme' ]) && ! empty ( $parts [ 'host' ])) {
if ( empty ( $data [ 'provider_name' ])) {
$data [ 'provider_name' ] = $parts [ 'host' ];
}
if ( empty ( $data [ 'provider_url' ]) || empty ( parse_url ( $data [ 'provider_url' ], PHP_URL_SCHEME ))) {
$data [ 'provider_url' ] = $parts [ 'scheme' ] . '://' . $parts [ 'host' ];
2021-05-01 17:03:50 +00:00
2021-05-04 05:18:03 +00:00
if ( ! empty ( $parts [ 'port' ])) {
$data [ 'provider_url' ] .= ':' . $parts [ 'port' ];
}
2021-05-01 17:03:50 +00:00
}
}
2021-05-04 05:18:03 +00:00
// @todo Use a template
2022-12-31 16:47:33 +00:00
$preview_mode = DI :: pConfig () -> get ( DI :: userSession () -> getLocalUserId (), 'system' , 'preview_mode' , BBCode :: PREVIEW_LARGE );
2022-12-07 07:02:04 +00:00
if ( $preview_mode != BBCode :: PREVIEW_NONE ) {
$rendered = BBCode :: convertAttachment ( '' , BBCode :: INTERNAL , false , $data , $uriid , $preview_mode );
2022-12-31 16:47:33 +00:00
} else {
$rendered = '' ;
2022-12-07 07:02:04 +00:00
}
2021-05-23 12:35:05 +00:00
} elseif ( ! self :: containsLink ( $content , $data [ 'url' ], Post\Media :: HTML )) {
2021-05-04 05:18:03 +00:00
$rendered = Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'content/link.tpl' ), [
2022-12-31 16:47:33 +00:00
'$url' => $data [ 'url' ],
2021-05-04 05:18:03 +00:00
'$title' => $data [ 'title' ],
]);
} else {
return $content ;
2021-05-01 17:03:50 +00:00
}
2021-04-26 06:50:12 +00:00
if ( $shared ) {
2021-04-29 19:29:29 +00:00
return str_replace ( BBCode :: BOTTOM_ANCHOR , BBCode :: BOTTOM_ANCHOR . $rendered , $content );
2021-04-26 06:50:12 +00:00
} else {
return $content . $rendered ;
2018-11-07 02:12:41 +00:00
}
}
2021-04-26 06:50:12 +00:00
return $content ;
}
/**
* Add non visual attachments to the content
*
* @ param array $attachments
2021-04-26 15:09:32 +00:00
* @ param array $item
2021-04-26 06:50:12 +00:00
* @ param string $content
* @ return string modified content
*/
2022-06-14 07:08:09 +00:00
private static function addNonVisualAttachments ( array $attachments , array $item , string $content ) : string
2021-04-26 06:50:12 +00:00
{
2021-07-27 04:57:29 +00:00
DI :: profiler () -> startRecording ( 'rendering' );
2021-04-26 06:50:12 +00:00
$trailing = '' ;
foreach ( $attachments [ 'additional' ] as $attachment ) {
if ( strpos ( $item [ 'body' ], $attachment [ 'url' ])) {
continue ;
}
2023-06-18 16:49:38 +00:00
$author = [
2023-07-26 05:50:15 +00:00
'uid' => 0 ,
2023-06-18 16:49:38 +00:00
'id' => $item [ 'author-id' ],
2023-07-26 05:50:15 +00:00
'network' => $item [ 'author-network' ],
2023-06-18 16:49:38 +00:00
'url' => $item [ 'author-link' ],
'alias' => $item [ 'author-alias' ]
];
2021-04-26 06:50:12 +00:00
$the_url = Contact :: magicLinkByContact ( $author , $attachment [ 'url' ]);
$title = Strings :: escapeHtml ( trim (( $attachment [ 'description' ] ? ? '' ) ? : $attachment [ 'url' ]));
2018-11-07 02:12:41 +00:00
2021-04-26 06:50:12 +00:00
if ( ! empty ( $attachment [ 'size' ])) {
$title .= ' ' . $attachment [ 'size' ] . ' ' . DI :: l10n () -> t ( 'bytes' );
}
/// @todo Use a template
$icon = '<div class="attachtype icon s22 type-' . $attachment [ 'filetype' ] . ' subtype-' . $attachment [ 'subtype' ] . '"></div>' ;
$trailing .= '<a href="' . strip_tags ( $the_url ) . '" title="' . $title . '" class="attachlink" target="_blank" rel="noopener noreferrer" >' . $icon . '</a>' ;
2021-04-05 11:44:43 +00:00
}
if ( $trailing != '' ) {
2022-12-14 14:53:58 +00:00
$content .= '<div class="body-attach">' . $trailing . '</div>' ;
2018-11-07 02:12:41 +00:00
}
2021-07-27 04:57:29 +00:00
DI :: profiler () -> stopRecording ();
2021-04-05 09:15:36 +00:00
return $content ;
2018-11-07 02:12:41 +00:00
}
2018-11-07 12:19:39 +00:00
2022-06-15 20:03:13 +00:00
private static function addQuestions ( array $item , string $content ) : string
2022-05-16 04:55:15 +00:00
{
DI :: profiler () -> startRecording ( 'rendering' );
if ( ! empty ( $item [ 'question-id' ])) {
$question = [
'id' => $item [ 'question-id' ],
'multiple' => $item [ 'question-multiple' ],
'voters' => $item [ 'question-voters' ],
'endtime' => $item [ 'question-end-time' ]
];
$options = Post\QuestionOption :: getByURIId ( $item [ 'uri-id' ]);
foreach ( $options as $key => $option ) {
2022-05-16 06:04:46 +00:00
if ( $question [ 'voters' ] > 0 ) {
2022-08-08 05:52:16 +00:00
$percent = $option [ 'replies' ] / $question [ 'voters' ] * 100 ;
$options [ $key ][ 'vote' ] = DI :: l10n () -> tt ( '%2$s (%3$d%%, %1$d vote)' , '%2$s (%3$d%%, %1$d votes)' , $option [ 'replies' ], $option [ 'name' ], round ( $percent , 1 ));
2022-05-16 06:04:46 +00:00
} else {
2022-10-28 17:45:09 +00:00
$options [ $key ][ 'vote' ] = DI :: l10n () -> tt ( '%2$s (%1$d vote)' , '%2$s (%1$d votes)' , $option [ 'replies' ], $option [ 'name' ]);
2022-05-16 06:04:46 +00:00
}
}
if ( ! empty ( $question [ 'voters' ]) && ! empty ( $question [ 'endtime' ])) {
2022-08-08 05:52:16 +00:00
$summary = DI :: l10n () -> tt ( '%d voter. Poll end: %s' , '%d voters. Poll end: %s' , $question [ 'voters' ], Temporal :: getRelativeDate ( $question [ 'endtime' ]));
2022-05-16 06:04:46 +00:00
} elseif ( ! empty ( $question [ 'voters' ])) {
2022-08-08 05:52:16 +00:00
$summary = DI :: l10n () -> tt ( '%d voter.' , '%d voters.' , $question [ 'voters' ]);
2022-05-16 06:04:46 +00:00
} elseif ( ! empty ( $question [ 'endtime' ])) {
$summary = DI :: l10n () -> t ( 'Poll end: %s' , Temporal :: getRelativeDate ( $question [ 'endtime' ]));
2023-06-18 16:49:38 +00:00
} else {
2022-05-16 06:04:46 +00:00
$summary = '' ;
2022-05-16 04:55:15 +00:00
}
$content .= Renderer :: replaceMacros ( Renderer :: getMarkupTemplate ( 'content/question.tpl' ), [
'$question' => $question ,
'$options' => $options ,
2022-05-16 06:04:46 +00:00
'$summary' => $summary ,
2022-05-16 04:55:15 +00:00
]);
2023-06-18 16:49:38 +00:00
}
2022-05-16 04:55:15 +00:00
DI :: profiler () -> stopRecording ();
return $content ;
}
2018-11-07 12:19:39 +00:00
/**
* get private link for item
2019-01-06 21:06:53 +00:00
*
2018-11-07 12:19:39 +00:00
* @ param array $item
* @ return boolean | array False if item has not plink , otherwise array ( 'href' => plink url , 'title' => translated title )
2019-01-06 21:06:53 +00:00
* @ throws \Exception
2018-11-07 12:19:39 +00:00
*/
2022-06-14 07:08:09 +00:00
public static function getPlink ( array $item )
2018-11-07 12:19:39 +00:00
{
2022-04-06 16:26:51 +00:00
if ( ! empty ( $item [ 'plink' ]) && Network :: isValidHttpUrl ( $item [ 'plink' ])) {
2022-04-03 07:21:36 +00:00
$plink = $item [ 'plink' ];
2022-04-06 16:26:51 +00:00
} elseif ( ! empty ( $item [ 'uri' ]) && Network :: isValidHttpUrl ( $item [ 'uri' ]) && ! Network :: isLocalLink ( $item [ 'uri' ])) {
2022-04-03 07:21:36 +00:00
$plink = $item [ 'uri' ];
}
2022-10-20 20:14:50 +00:00
if ( DI :: userSession () -> getLocalUserId ()) {
2018-11-07 12:19:39 +00:00
$ret = [
2018-11-07 19:16:59 +00:00
'href' => " display/ " . $item [ 'guid' ],
'orig' => " display/ " . $item [ 'guid' ],
2020-01-18 19:52:34 +00:00
'title' => DI :: l10n () -> t ( 'View on separate page' ),
2021-05-10 14:47:58 +00:00
'orig_title' => DI :: l10n () -> t ( 'View on separate page' ),
2018-11-07 19:16:59 +00:00
];
2018-11-07 12:19:39 +00:00
2022-05-05 07:57:52 +00:00
if ( ! empty ( $plink ) && ( $item [ 'private' ] == self :: PRIVATE )) {
2023-06-18 16:49:38 +00:00
$author = [
2023-07-26 05:50:15 +00:00
'uid' => 0 ,
2023-06-18 16:49:38 +00:00
'id' => $item [ 'author-id' ],
2023-07-26 05:50:15 +00:00
'network' => $item [ 'author-network' ],
2023-06-18 16:49:38 +00:00
'url' => $item [ 'author-link' ],
'alias' => $item [ 'author-alias' ],
];
2022-05-05 07:57:52 +00:00
$plink = Contact :: magicLinkByContact ( $author , $plink );
}
2022-04-03 07:21:36 +00:00
if ( ! empty ( $plink )) {
$ret [ 'href' ] = DI :: baseUrl () -> remove ( $plink );
2021-05-10 14:47:58 +00:00
$ret [ 'title' ] = DI :: l10n () -> t ( 'Link to source' );
2018-11-07 12:19:39 +00:00
}
2022-04-03 07:21:36 +00:00
} elseif ( ! empty ( $plink ) && ( $item [ 'private' ] != self :: PRIVATE )) {
2018-11-07 12:19:39 +00:00
$ret = [
2022-04-03 07:21:36 +00:00
'href' => $plink ,
'orig' => $plink ,
2021-05-10 14:47:58 +00:00
'title' => DI :: l10n () -> t ( 'Link to source' ),
2021-05-10 22:59:09 +00:00
'orig_title' => DI :: l10n () -> t ( 'Link to source' ),
2018-11-07 19:16:59 +00:00
];
2018-11-07 12:19:39 +00:00
} else {
$ret = [];
}
return $ret ;
}
2019-03-14 18:44:41 +00:00
/**
2023-05-30 13:15:17 +00:00
* Does the given uri - id belongs to a post that is sent as starting post to a group ?
2023-06-23 21:05:45 +00:00
* This does apply to posts that are sent via ! and not in parallel to a group via @
2019-03-14 18:44:41 +00:00
*
2022-02-16 22:56:55 +00:00
* @ param int $uri_id
2019-03-14 18:44:41 +00:00
*
2023-05-30 13:15:17 +00:00
* @ return boolean " true " when it is a group post
2019-03-14 18:44:41 +00:00
*/
2023-05-30 13:15:17 +00:00
public static function isGroupPost ( int $uri_id ) : bool
2019-03-14 18:44:41 +00:00
{
2023-06-15 22:04:28 +00:00
if ( Post :: exists ([ 'private' => Item :: PUBLIC , 'uri-id' => $uri_id ])) {
return false ;
}
foreach ( Tag :: getByURIId ( $uri_id , [ Tag :: EXCLUSIVE_MENTION , Tag :: AUDIENCE ]) as $tag ) {
// @todo Possibly check for a public audience in the future, see https://socialhub.activitypub.rocks/t/fep-1b12-group-federation/2724
// and https://codeberg.org/fediverse/fep/src/branch/main/feps/fep-1b12.md
2022-02-16 22:56:55 +00:00
if ( DBA :: exists ( 'contact' , [ 'uid' => 0 , 'nurl' => Strings :: normaliseLink ( $tag [ 'url' ]), 'contact-type' => Contact :: TYPE_COMMUNITY ])) {
return true ;
2019-03-14 18:44:41 +00:00
}
}
2022-02-16 22:56:55 +00:00
return false ;
2019-03-14 18:44:41 +00:00
}
2019-07-18 06:11:02 +00:00
/**
* Search item id for given URI or plink
*
* @ param string $uri
* @ param integer $uid
*
* @ return integer item id
*/
2022-06-14 07:08:09 +00:00
public static function searchByLink ( string $uri , int $uid = 0 ) : int
2019-07-18 06:11:02 +00:00
{
$ssl_uri = str_replace ( 'http://' , 'https://' , $uri );
$uris = [ $uri , $ssl_uri , Strings :: normaliseLink ( $uri )];
2021-01-27 10:01:42 +00:00
$item = Post :: selectFirst ([ 'id' ], [ 'uri' => $uris , 'uid' => $uid ]);
2019-07-18 06:11:02 +00:00
if ( DBA :: isResult ( $item )) {
return $item [ 'id' ];
}
2021-01-27 10:01:42 +00:00
$item = Post :: selectFirst ([ 'id' ], [ 'plink' => $uris , 'uid' => $uid ]);
2019-07-18 06:11:02 +00:00
if ( DBA :: isResult ( $item )) {
return $item [ 'id' ];
}
return 0 ;
}
2020-02-02 19:59:14 +00:00
/**
2021-04-26 06:50:12 +00:00
* Return the URI for a link to the post
*
2020-02-02 19:59:14 +00:00
* @ param string $uri URI or link to post
*
* @ return string URI
*/
2022-06-15 20:03:13 +00:00
public static function getURIByLink ( string $uri ) : string
2020-02-02 19:59:14 +00:00
{
$ssl_uri = str_replace ( 'http://' , 'https://' , $uri );
$uris = [ $uri , $ssl_uri , Strings :: normaliseLink ( $uri )];
2021-01-27 10:01:42 +00:00
$item = Post :: selectFirst ([ 'uri' ], [ 'uri' => $uris ]);
2020-02-02 19:59:14 +00:00
if ( DBA :: isResult ( $item )) {
return $item [ 'uri' ];
}
2021-01-27 10:01:42 +00:00
$item = Post :: selectFirst ([ 'uri' ], [ 'plink' => $uris ]);
if ( DBA :: isResult ( $item )) {
return $item [ 'uri' ];
2020-02-02 19:59:14 +00:00
}
return '' ;
}
2019-07-18 06:11:02 +00:00
/**
* Fetches item for given URI or plink
*
* @ param string $uri
* @ param integer $uid
*
* @ return integer item id
*/
2022-06-14 07:08:09 +00:00
public static function fetchByLink ( string $uri , int $uid = 0 ) : int
2019-07-18 06:11:02 +00:00
{
2020-07-29 05:12:16 +00:00
Logger :: info ( 'Trying to fetch link' , [ 'uid' => $uid , 'uri' => $uri ]);
2019-07-18 06:11:02 +00:00
$item_id = self :: searchByLink ( $uri , $uid );
if ( ! empty ( $item_id )) {
2020-07-29 05:12:16 +00:00
Logger :: info ( 'Link found' , [ 'uid' => $uid , 'uri' => $uri , 'id' => $item_id ]);
2019-07-18 06:11:02 +00:00
return $item_id ;
}
2021-11-23 22:47:02 +00:00
$hookData = [
'uri' => $uri ,
'uid' => $uid ,
'item_id' => null ,
];
Hook :: callAll ( 'item_by_link' , $hookData );
if ( isset ( $hookData [ 'item_id' ])) {
return is_numeric ( $hookData [ 'item_id' ]) ? $hookData [ 'item_id' ] : 0 ;
}
2023-01-28 14:57:04 +00:00
$fetched_uri = ActivityPub\Processor :: fetchMissingActivity ( $uri , [], '' , ActivityPub\Receiver :: COMPLETION_MANUAL , $uid );
2022-06-25 03:48:49 +00:00
if ( $fetched_uri ) {
2020-01-20 22:30:34 +00:00
$item_id = self :: searchByLink ( $fetched_uri , $uid );
2019-07-21 07:37:50 +00:00
} else {
$item_id = Diaspora :: fetchByURL ( $uri );
}
2019-07-18 06:20:54 +00:00
2019-07-18 06:11:02 +00:00
if ( ! empty ( $item_id )) {
2020-07-29 05:12:16 +00:00
Logger :: info ( 'Link fetched' , [ 'uid' => $uid , 'uri' => $uri , 'id' => $item_id ]);
2019-07-18 06:11:02 +00:00
return $item_id ;
}
2020-07-29 05:12:16 +00:00
Logger :: info ( 'Link not found' , [ 'uid' => $uid , 'uri' => $uri ]);
2019-07-18 06:11:02 +00:00
return 0 ;
}
2019-12-04 22:57:09 +00:00
2022-10-10 22:39:30 +00:00
/**
* Fetch the uri - id of a quote
*
* @ param string $body
* @ return integer
*/
2022-10-29 22:11:39 +00:00
public static function getQuoteUriId ( string $body , int $uid = 0 ) : int
2022-10-10 22:39:30 +00:00
{
$shared = BBCode :: fetchShareAttributes ( $body );
2022-10-29 22:11:39 +00:00
if ( empty ( $shared [ 'guid' ]) && empty ( $shared [ 'message_id' ])) {
2022-10-10 22:39:30 +00:00
return 0 ;
}
2022-10-29 22:11:39 +00:00
if ( empty ( $shared [ 'link' ]) && empty ( $shared [ 'message_id' ])) {
Logger :: notice ( 'Invalid share block.' , [ 'share' => $shared ]);
return 0 ;
}
if ( ! empty ( $shared [ 'guid' ])) {
$shared_item = Post :: selectFirst ([ 'uri-id' ], [ 'guid' => $shared [ 'guid' ], 'uid' => [ 0 , $uid ]]);
if ( ! empty ( $shared_item [ 'uri-id' ])) {
Logger :: debug ( 'Found post by guid' , [ 'guid' => $shared [ 'guid' ], 'uid' => $uid ]);
2022-10-29 22:55:39 +00:00
return $shared_item [ 'uri-id' ];
2022-10-29 22:11:39 +00:00
}
}
2022-10-29 22:55:39 +00:00
if ( ! empty ( $shared [ 'message_id' ])) {
2022-10-29 22:11:39 +00:00
$shared_item = Post :: selectFirst ([ 'uri-id' ], [ 'uri' => $shared [ 'message_id' ], 'uid' => [ 0 , $uid ]]);
if ( ! empty ( $shared_item [ 'uri-id' ])) {
Logger :: debug ( 'Found post by message_id' , [ 'message_id' => $shared [ 'message_id' ], 'uid' => $uid ]);
2022-10-29 22:55:39 +00:00
return $shared_item [ 'uri-id' ];
2022-10-29 22:11:39 +00:00
}
}
2022-10-29 22:55:39 +00:00
if ( ! empty ( $shared [ 'link' ])) {
2022-10-29 22:11:39 +00:00
$shared_item = Post :: selectFirst ([ 'uri-id' ], [ 'plink' => $shared [ 'link' ], 'uid' => [ 0 , $uid ]]);
if ( ! empty ( $shared_item [ 'uri-id' ])) {
Logger :: debug ( 'Found post by link' , [ 'link' => $shared [ 'link' ], 'uid' => $uid ]);
2022-10-29 22:55:39 +00:00
return $shared_item [ 'uri-id' ];
2022-10-29 22:11:39 +00:00
}
}
2022-10-29 22:55:39 +00:00
$url = $shared [ 'message_id' ] ? : $shared [ 'link' ];
$id = self :: fetchByLink ( $url );
if ( ! $id ) {
Logger :: notice ( 'Post could not be fetched.' , [ 'url' => $url , 'uid' => $uid ]);
return 0 ;
}
2022-10-29 22:11:39 +00:00
2022-10-29 22:55:39 +00:00
$shared_item = Post :: selectFirst ([ 'uri-id' ], [ 'id' => $id ]);
2022-10-30 10:02:12 +00:00
if ( ! empty ( $shared_item [ 'uri-id' ])) {
2022-10-29 22:11:39 +00:00
Logger :: debug ( 'Fetched shared post' , [ 'id' => $id , 'url' => $url , 'uid' => $uid ]);
2022-10-30 10:02:12 +00:00
return $shared_item [ 'uri-id' ];
2022-10-29 22:11:39 +00:00
}
2022-10-30 10:02:12 +00:00
Logger :: warning ( 'Post does not exist although it was supposed to had been fetched.' , [ 'id' => $id , 'url' => $url , 'uid' => $uid ]);
return 0 ;
2022-10-10 22:39:30 +00:00
}
2018-01-09 21:13:45 +00:00
}