aboutsummaryrefslogblamecommitdiffstats
path: root/mod/photo.php
blob: 653ca81c27ede3eae17f6633de6232dcdd73ddd7 (plain) (tree)
1
2
3
4



                          







































                                                                                                           
         
              
 







                                                                  
                                                                                                       



                                           












































                                                                                                                           
                 
         

                                
                         
                                     
         
 
                                           

                                                                                                         


                            
 
<?php

function photo_init(&$a) {

	switch($a->argc) {
		case 3:
			$person = $a->argv[2];
			$type = $a->argv[1];
			break;
		case 2:
			$photo = $a->argv[1];
			break;
		case 1:
		default:
			killme();
			return; // NOTREACHED
	}

	if(x($type)) {
		switch($type) {

			case 'profile':
				$resolution = 4;
				break;
			case 'avatar':
			default:
				$resolution = 5;
				break;
		}

		$uid = str_replace('.jpg', '', $person);

		$r = q("SELECT * FROM `photo` WHERE `scale` = %d AND `uid` = %d AND `profile` = 1 LIMIT 1",
			intval($resolution),
			intval($uid)
		);
		if(count($r)) {
			$data = $r[0]['data'];
		}
		if(x($data) === false) {
			$data = file_get_contents(($resolution == 5) 
				? 'images/default-profile-sm.jpg' 
				: 'images/default-profile.jpg');
		}
	}
	else {

		$resolution = 0;
		$photo = str_replace('.jpg','',$photo);
	
		if(substr($photo,-2,1) == '-') {
			$resolution = intval(substr($photo,-1,1));
			$photo = substr($photo,0,-2);
		}

		$r = q("SELECT `uid` FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d LIMIT 1",
			dbesc($photo),
			intval($resolution)
		);
		if(count($r)) {
			
			$owner = $r[0]['uid'];

			$sql_extra = " AND `allow_cid` = '' AND `allow_gid` = '' AND `deny_cid` = '' AND `deny_gid` = '' ";

			if(local_user() && ($owner == $_SESSION['uid'])) {

				// Owner can always see his/her photos
				$sql_extra = ''; 

			}
			elseif(remote_user()) {

				// authenticated visitor - here lie dragons

				$groups = init_groups_visitor($_SESSION['visitor_id']);
				$gs = '<<>>'; // should be impossible to match
				if(count($groups)) {
					foreach($groups as $g)
						$gs .= '|<' . intval($g) . '>';
				} 

				$sql_extra = sprintf(
					" AND ( `allow_cid` = '' OR `allow_cid` REGEXP '<%d>' ) 
					  AND ( `deny_cid`  = '' OR  NOT `deny_cid` REGEXP '<%d>' ) 
					  AND ( `allow_gid` = '' OR `allow_gid` REGEXP '%s' )
					  AND ( `deny_gid`  = '' OR NOT `deny_gid` REGEXP '%s') ",

					intval($_SESSION['visitor_id']),
					intval($_SESSION['visitor_id']),
					dbesc($gs),
					dbesc($gs)
				);
			}

			// Now we'll see if we can access the photo

			$r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d $sql_extra LIMIT 1",
				dbesc($photo),
				intval($resolution)
			);

			if(count($r)) {
				$data = $r[0]['data'];
			}
		}
	}

	if(x($data) === false) {
		killme();
		return; // NOTREACHED
	}

        header("Content-type: image/jpeg");
	header('Expires: ' . datetime_convert('UTC','UTC', 'now + 3 months', 'D, d M Y H:i:s' . ' GMT'));
//	header("Cache-Control: max-age=36000, only-if-cached");
        echo $data;
	killme();
	return; //NOTREACHED
}