2012-04-29 19:15:06 +02:00
< ? php
/**
2016-07-11 11:58:15 +02:00
* PrivateBin
2012-04-29 19:15:06 +02:00
*
* a zero - knowledge paste bin
*
2016-07-11 11:58:15 +02:00
* @ link https :// github . com / PrivateBin / PrivateBin
2012-04-29 19:15:06 +02:00
* @ copyright 2012 Sébastien SAUVAGE ( sebsauvage . net )
2016-07-19 13:56:52 +02:00
* @ license https :// www . opensource . org / licenses / zlib - license . php The zlib / libpng License
2018-07-01 13:11:32 +02:00
* @ version 1.2
2012-04-29 19:15:06 +02:00
*/
2016-12-12 18:43:23 +01:00
2016-12-12 18:50:00 +01:00
namespace PrivateBin ;
2016-07-21 17:09:48 +02:00
use Exception ;
2016-10-29 10:24:08 +02:00
use PrivateBin\Persistence\ServerSalt ;
use PrivateBin\Persistence\TrafficLimiter ;
2016-07-21 17:09:48 +02:00
2012-04-29 19:15:06 +02:00
/**
2016-08-09 11:54:42 +02:00
* PrivateBin
2012-04-29 19:15:06 +02:00
*
* Controller , puts it all together .
*/
2016-08-09 11:54:42 +02:00
class PrivateBin
2012-04-29 19:15:06 +02:00
{
2015-08-16 15:55:31 +02:00
/**
* version
*
* @ const string
2012-04-29 19:15:06 +02:00
*/
2018-07-01 13:11:32 +02:00
const VERSION = '1.2' ;
2012-04-29 19:15:06 +02:00
2017-03-24 19:20:34 +01:00
/**
* minimal required PHP version
*
* @ const string
*/
const MIN_PHP_VERSION = '5.4.0' ;
2015-08-31 22:10:41 +02:00
/**
* show the same error message if the paste expired or does not exist
*
* @ const string
*/
const GENERIC_ERROR = 'Paste does not exist, has expired or has been deleted.' ;
2012-04-29 19:15:06 +02:00
/**
2015-09-22 23:21:31 +02:00
* configuration
2015-08-16 15:55:31 +02:00
*
2012-04-29 19:15:06 +02:00
* @ access private
2016-08-09 11:54:42 +02:00
* @ var Configuration
2012-04-29 19:15:06 +02:00
*/
2015-09-22 23:21:31 +02:00
private $_conf ;
2012-04-29 19:15:06 +02:00
/**
2015-08-16 15:55:31 +02:00
* error message
*
2012-04-29 19:15:06 +02:00
* @ access private
* @ var string
*/
private $_error = '' ;
2013-11-01 01:15:14 +01:00
/**
2015-08-16 15:55:31 +02:00
* status message
*
2013-11-01 01:15:14 +01:00
* @ access private
* @ var string
*/
private $_status = '' ;
2015-09-01 22:33:07 +02:00
/**
* JSON message
*
* @ access private
* @ var string
*/
private $_json = '' ;
2012-04-29 19:15:06 +02:00
/**
2015-09-27 03:03:55 +02:00
* Factory of instance models
2015-08-16 15:55:31 +02:00
*
2012-04-29 19:15:06 +02:00
* @ access private
2015-09-27 03:03:55 +02:00
* @ var model
2012-04-29 19:15:06 +02:00
*/
private $_model ;
2015-09-27 20:34:39 +02:00
/**
* request
*
* @ access private
* @ var request
*/
private $_request ;
2015-10-18 14:37:58 +02:00
/**
* URL base
*
* @ access private
* @ var string
*/
2016-08-09 11:54:42 +02:00
private $_urlBase ;
2015-10-18 14:37:58 +02:00
2012-04-29 19:15:06 +02:00
/**
* constructor
*
2016-07-11 11:58:15 +02:00
* initializes and runs PrivateBin
2012-04-29 19:15:06 +02:00
*
* @ access public
2016-08-22 09:46:26 +02:00
* @ throws Exception
2012-04-29 19:15:06 +02:00
*/
public function __construct ()
{
2017-03-24 19:20:34 +01:00
if ( version_compare ( PHP_VERSION , self :: MIN_PHP_VERSION ) < 0 ) {
throw new Exception ( I18n :: _ ( '%s requires php %s or above to work. Sorry.' , I18n :: _ ( 'PrivateBin' ), self :: MIN_PHP_VERSION ), 1 );
2015-09-01 22:33:07 +02:00
}
2016-08-22 09:46:26 +02:00
if ( strlen ( PATH ) < 0 && substr ( PATH , - 1 ) !== DIRECTORY_SEPARATOR ) {
2017-01-01 16:33:11 +01:00
throw new Exception ( I18n :: _ ( '%s requires the PATH to end in a "%s". Please update the PATH in your index.php.' , I18n :: _ ( 'PrivateBin' ), DIRECTORY_SEPARATOR ), 5 );
2016-08-22 09:46:26 +02:00
}
2012-04-29 19:15:06 +02:00
2016-08-09 11:54:42 +02:00
// load config from ini file, initialize required classes
2012-04-29 19:15:06 +02:00
$this -> _init ();
2016-07-26 08:19:35 +02:00
switch ( $this -> _request -> getOperation ()) {
2015-09-27 20:34:39 +02:00
case 'create' :
$this -> _create ();
break ;
case 'delete' :
$this -> _delete (
$this -> _request -> getParam ( 'pasteid' ),
$this -> _request -> getParam ( 'deletetoken' )
);
break ;
case 'read' :
$this -> _read ( $this -> _request -> getParam ( 'pasteid' ));
break ;
2015-10-18 14:37:58 +02:00
case 'jsonld' :
$this -> _jsonld ( $this -> _request -> getParam ( 'jsonld' ));
return ;
2012-04-29 19:15:06 +02:00
}
2015-09-01 22:33:07 +02:00
// output JSON or HTML
2016-07-26 08:19:35 +02:00
if ( $this -> _request -> isJsonApiCall ()) {
2016-08-09 11:54:42 +02:00
header ( 'Content-type: ' . Request :: MIME_JSON );
2015-10-18 14:37:58 +02:00
header ( 'Access-Control-Allow-Origin: *' );
header ( 'Access-Control-Allow-Methods: GET, POST, PUT, DELETE' );
header ( 'Access-Control-Allow-Headers: X-Requested-With, Content-Type' );
2015-09-01 22:33:07 +02:00
echo $this -> _json ;
2016-07-26 08:19:35 +02:00
} else {
2015-09-01 22:33:07 +02:00
$this -> _view ();
}
2012-04-29 19:15:06 +02:00
}
/**
2016-07-11 11:58:15 +02:00
* initialize privatebin
2012-04-29 19:15:06 +02:00
*
* @ access private
*/
private function _init ()
{
2016-08-15 16:45:47 +02:00
$this -> _conf = new Configuration ;
$this -> _model = new Model ( $this -> _conf );
2016-08-09 11:54:42 +02:00
$this -> _request = new Request ;
2018-01-06 10:27:58 +01:00
$this -> _urlBase = $this -> _request -> getRequestUri ();
2016-08-25 15:02:38 +02:00
ServerSalt :: setPath ( $this -> _conf -> getKey ( 'dir' , 'traffic' ));
2015-10-18 20:38:07 +02:00
// set default language
$lang = $this -> _conf -> getKey ( 'languagedefault' );
2016-08-09 11:54:42 +02:00
I18n :: setLanguageFallback ( $lang );
2015-10-18 20:38:07 +02:00
// force default language, if language selection is disabled and a default is set
2016-07-26 08:19:35 +02:00
if ( ! $this -> _conf -> getKey ( 'languageselection' ) && strlen ( $lang ) == 2 ) {
2015-10-18 20:38:07 +02:00
$_COOKIE [ 'lang' ] = $lang ;
setcookie ( 'lang' , $lang );
}
2012-04-29 19:15:06 +02:00
}
/**
2013-11-01 01:15:14 +01:00
* Store new paste or comment
2012-04-29 19:15:06 +02:00
*
2015-09-16 22:51:48 +02:00
* POST contains one or both :
* data = json encoded SJCL encrypted text ( containing keys : iv , v , iter , ks , ts , mode , adata , cipher , salt , ct )
* attachment = json encoded SJCL encrypted text ( containing keys : iv , v , iter , ks , ts , mode , adata , cipher , salt , ct )
2012-04-29 19:15:06 +02:00
*
* All optional data will go to meta information :
2012-05-19 23:59:41 +02:00
* expire ( optional ) = expiration delay ( never , 5 min , 10 min , 1 hour , 1 day , 1 week , 1 month , 1 year , burn ) ( default : never )
2015-09-16 22:51:48 +02:00
* formatter ( optional ) = format to display the paste as ( plaintext , syntaxhighlighting , markdown ) ( default : syntaxhighlighting )
* burnafterreading ( optional ) = if this paste may only viewed once ? ( 0 / 1 ) ( default : 0 )
2012-04-29 19:15:06 +02:00
* opendiscusssion ( optional ) = is the discussion allowed on this paste ? ( 0 / 1 ) ( default : 0 )
2015-09-21 22:32:52 +02:00
* attachmentname = json encoded SJCL encrypted text ( containing keys : iv , v , iter , ks , ts , mode , adata , cipher , salt , ct )
2015-09-05 02:24:56 +02:00
* nickname ( optional ) = in discussion , encoded SJCL encrypted text nickname of author of comment ( containing keys : iv , v , iter , ks , ts , mode , adata , cipher , salt , ct )
2012-04-29 19:15:06 +02:00
* parentid ( optional ) = in discussion , which comment this comment replies to .
* pasteid ( optional ) = in discussion , which paste this comment belongs to .
*
* @ access private
2015-08-27 23:58:56 +02:00
* @ return string
2012-04-29 19:15:06 +02:00
*/
2015-09-16 22:51:48 +02:00
private function _create ()
2012-04-29 19:15:06 +02:00
{
2015-09-27 03:03:55 +02:00
// Ensure last paste from visitors IP address was more than configured amount of seconds ago.
2016-08-09 11:54:42 +02:00
TrafficLimiter :: setConfiguration ( $this -> _conf );
if ( ! TrafficLimiter :: canPass ()) {
2016-07-26 08:19:35 +02:00
return $this -> _return_message (
2016-08-09 11:54:42 +02:00
1 , I18n :: _ (
2015-09-19 14:22:29 +02:00
'Please wait %d seconds between each post.' ,
2015-09-22 23:21:31 +02:00
$this -> _conf -> getKey ( 'limit' , 'traffic' )
2015-09-19 14:22:29 +02:00
)
);
2016-07-26 08:19:35 +02:00
}
2012-04-29 19:15:06 +02:00
2016-08-15 16:45:47 +02:00
$data = $this -> _request -> getParam ( 'data' );
$attachment = $this -> _request -> getParam ( 'attachment' );
2015-09-27 20:34:39 +02:00
$attachmentname = $this -> _request -> getParam ( 'attachmentname' );
2015-09-27 03:03:55 +02:00
// Ensure content is not too big.
2015-09-22 23:21:31 +02:00
$sizelimit = $this -> _conf -> getKey ( 'sizelimit' );
2015-09-19 14:22:29 +02:00
if (
strlen ( $data ) + strlen ( $attachment ) + strlen ( $attachmentname ) > $sizelimit
2016-07-26 08:19:35 +02:00
) {
return $this -> _return_message (
2015-09-19 14:22:29 +02:00
1 ,
2016-08-09 11:54:42 +02:00
I18n :: _ (
2015-09-19 14:22:29 +02:00
'Paste is limited to %s of encrypted data.' ,
2016-08-09 11:54:42 +02:00
Filter :: formatHumanReadableSize ( $sizelimit )
2015-09-19 14:22:29 +02:00
)
);
2016-07-26 08:19:35 +02:00
}
2012-04-29 19:15:06 +02:00
2016-07-19 15:26:41 +02:00
// Ensure attachment did not get lost due to webserver limits or Suhosin
2016-07-26 08:19:35 +02:00
if ( strlen ( $attachmentname ) > 0 && strlen ( $attachment ) == 0 ) {
2016-07-19 15:26:41 +02:00
return $this -> _return_message ( 1 , 'Attachment missing in data received by server. Please check your webserver or suhosin configuration for maximum POST parameter limitations.' );
}
2015-09-27 03:03:55 +02:00
// The user posts a comment.
2016-08-15 16:45:47 +02:00
$pasteid = $this -> _request -> getParam ( 'pasteid' );
2015-09-27 20:34:39 +02:00
$parentid = $this -> _request -> getParam ( 'parentid' );
2016-07-26 08:19:35 +02:00
if ( ! empty ( $pasteid ) && ! empty ( $parentid )) {
2015-09-27 20:34:39 +02:00
$paste = $this -> _model -> getPaste ( $pasteid );
2015-09-27 03:03:55 +02:00
if ( $paste -> exists ()) {
try {
2015-09-27 20:34:39 +02:00
$comment = $paste -> getComment ( $parentid );
2015-09-27 03:03:55 +02:00
2015-09-27 20:34:39 +02:00
$nickname = $this -> _request -> getParam ( 'nickname' );
2016-07-26 08:19:35 +02:00
if ( ! empty ( $nickname )) {
$comment -> setNickname ( $nickname );
}
2015-09-27 03:03:55 +02:00
$comment -> setData ( $data );
$comment -> store ();
2016-07-26 08:19:35 +02:00
} catch ( Exception $e ) {
2015-09-27 03:03:55 +02:00
return $this -> _return_message ( 1 , $e -> getMessage ());
}
$this -> _return_message ( 0 , $comment -> getId ());
2016-07-26 08:19:35 +02:00
} else {
2015-09-27 03:03:55 +02:00
$this -> _return_message ( 1 , 'Invalid data.' );
2015-09-12 17:33:16 +02:00
}
}
2015-09-27 03:03:55 +02:00
// The user posts a standard paste.
2016-07-26 08:19:35 +02:00
else {
2016-07-15 17:02:59 +02:00
$this -> _model -> purge ();
2015-09-27 03:03:55 +02:00
$paste = $this -> _model -> getPaste ();
try {
2015-10-03 17:54:18 +02:00
$paste -> setData ( $data );
2016-07-26 08:19:35 +02:00
if ( ! empty ( $attachment )) {
2015-09-27 03:03:55 +02:00
$paste -> setAttachment ( $attachment );
2016-07-26 08:19:35 +02:00
if ( ! empty ( $attachmentname )) {
2015-09-27 03:03:55 +02:00
$paste -> setAttachmentName ( $attachmentname );
2016-07-26 08:19:35 +02:00
}
2012-04-29 19:15:06 +02:00
}
2015-09-27 20:34:39 +02:00
$expire = $this -> _request -> getParam ( 'expire' );
2016-07-26 08:19:35 +02:00
if ( ! empty ( $expire )) {
$paste -> setExpiration ( $expire );
}
2012-04-29 19:15:06 +02:00
2015-09-27 20:34:39 +02:00
$burnafterreading = $this -> _request -> getParam ( 'burnafterreading' );
2016-07-26 08:19:35 +02:00
if ( ! empty ( $burnafterreading )) {
$paste -> setBurnafterreading ( $burnafterreading );
}
2012-04-29 19:15:06 +02:00
2015-09-27 20:34:39 +02:00
$opendiscussion = $this -> _request -> getParam ( 'opendiscussion' );
2016-07-26 08:19:35 +02:00
if ( ! empty ( $opendiscussion )) {
$paste -> setOpendiscussion ( $opendiscussion );
}
2012-04-29 19:15:06 +02:00
2015-09-27 20:34:39 +02:00
$formatter = $this -> _request -> getParam ( 'formatter' );
2016-07-26 08:19:35 +02:00
if ( ! empty ( $formatter )) {
$paste -> setFormatter ( $formatter );
}
2012-04-29 19:15:06 +02:00
2015-09-27 03:03:55 +02:00
$paste -> store ();
} catch ( Exception $e ) {
return $this -> _return_message ( 1 , $e -> getMessage ());
}
$this -> _return_message ( 0 , $paste -> getId (), array ( 'deletetoken' => $paste -> getDeleteToken ()));
2012-04-29 19:15:06 +02:00
}
}
2013-02-24 14:33:51 +01:00
/**
* Delete an existing paste
*
* @ access private
2013-11-01 01:15:14 +01:00
* @ param string $dataid
* @ param string $deletetoken
2013-02-24 14:33:51 +01:00
*/
private function _delete ( $dataid , $deletetoken )
{
2015-09-27 03:03:55 +02:00
try {
$paste = $this -> _model -> getPaste ( $dataid );
2016-07-26 08:19:35 +02:00
if ( $paste -> exists ()) {
2015-09-27 03:03:55 +02:00
// accessing this property ensures that the paste would be
// deleted if it has already expired
$burnafterreading = $paste -> isBurnafterreading ();
2017-02-22 21:42:14 +01:00
if (
2017-04-11 16:34:13 +02:00
( $burnafterreading && $deletetoken == 'burnafterreading' ) || // either we burn-after it has been read //@TODO: not needed anymore now?
Filter :: slowEquals ( $deletetoken , $paste -> getDeleteToken ()) // or we manually delete it with this secret token
2017-02-22 21:42:14 +01:00
) {
2017-04-11 16:34:13 +02:00
// Paste exists and deletion token (if required) is valid: Delete the paste.
2017-02-22 21:42:14 +01:00
$paste -> delete ();
$this -> _status = 'Paste was properly deleted.' ;
2016-07-26 08:19:35 +02:00
} else {
2017-02-22 21:42:14 +01:00
if ( ! $burnafterreading && $deletetoken == 'burnafterreading' ) {
$this -> _error = 'Paste is not of burn-after-reading type.' ;
2016-07-26 08:19:35 +02:00
} else {
2015-09-27 03:03:55 +02:00
$this -> _error = 'Wrong deletion token. Paste was not deleted.' ;
}
}
2016-07-26 08:19:35 +02:00
} else {
2015-09-27 03:03:55 +02:00
$this -> _error = self :: GENERIC_ERROR ;
2015-08-31 22:10:41 +02:00
}
2015-09-27 03:03:55 +02:00
} catch ( Exception $e ) {
$this -> _error = $e -> getMessage ();
2013-11-01 01:15:14 +01:00
}
2017-02-22 21:42:14 +01:00
if ( $this -> _request -> isJsonApiCall ()) {
if ( strlen ( $this -> _error )) {
$this -> _return_message ( 1 , $this -> _error );
} else {
$this -> _return_message ( 0 , $dataid );
}
}
2013-11-01 01:15:14 +01:00
}
2012-04-29 19:15:06 +02:00
/**
2018-05-27 14:36:30 +02:00
* Read an existing paste or comment , only allowed via a JSON API call
2012-04-29 19:15:06 +02:00
*
* @ access private
2013-11-01 01:15:14 +01:00
* @ param string $dataid
2012-04-29 19:15:06 +02:00
*/
2013-11-01 01:15:14 +01:00
private function _read ( $dataid )
2012-04-29 19:15:06 +02:00
{
2018-05-27 14:36:30 +02:00
if ( ! $this -> _request -> isJsonApiCall ()) {
return ;
}
2015-09-27 03:03:55 +02:00
try {
$paste = $this -> _model -> getPaste ( $dataid );
2016-07-26 08:19:35 +02:00
if ( $paste -> exists ()) {
2018-05-27 15:05:31 +02:00
$data = $paste -> get ();
2018-05-27 14:36:30 +02:00
if ( property_exists ( $data -> meta , 'salt' )) {
unset ( $data -> meta -> salt );
2016-07-26 08:19:35 +02:00
}
2018-05-27 14:36:30 +02:00
$this -> _return_message ( 0 , $dataid , ( array ) $data );
2016-07-26 08:19:35 +02:00
} else {
2018-05-27 14:36:30 +02:00
$this -> _return_message ( 1 , self :: GENERIC_ERROR );
2012-04-29 19:15:06 +02:00
}
2015-09-27 03:03:55 +02:00
} catch ( Exception $e ) {
2018-05-27 14:36:30 +02:00
$this -> _return_message ( 1 , $e -> getMessage ());
2015-09-01 22:33:07 +02:00
}
2012-04-29 19:15:06 +02:00
}
/**
2016-07-11 11:58:15 +02:00
* Display PrivateBin frontend .
2012-04-29 19:15:06 +02:00
*
* @ access private
*/
private function _view ()
{
2012-08-28 23:28:41 +02:00
// set headers to disable caching
2013-02-24 14:33:51 +01:00
$time = gmdate ( 'D, d M Y H:i:s \G\M\T' );
2016-09-18 11:29:37 +02:00
header ( 'Cache-Control: no-store, no-cache, no-transform, must-revalidate' );
2013-02-24 14:33:51 +01:00
header ( 'Pragma: no-cache' );
header ( 'Expires: ' . $time );
header ( 'Last-Modified: ' . $time );
header ( 'Vary: Accept' );
2016-08-09 14:46:32 +02:00
header ( 'Content-Security-Policy: ' . $this -> _conf -> getKey ( 'cspheader' ));
2016-09-18 11:29:37 +02:00
header ( 'X-Xss-Protection: 1; mode=block' );
header ( 'X-Frame-Options: DENY' );
header ( 'X-Content-Type-Options: nosniff' );
2012-08-26 00:49:11 +02:00
2013-10-30 23:54:42 +01:00
// label all the expiration options
$expire = array ();
2016-07-26 08:19:35 +02:00
foreach ( $this -> _conf -> getSection ( 'expire_options' ) as $time => $seconds ) {
2016-08-15 16:45:47 +02:00
$expire [ $time ] = ( $seconds == 0 ) ? I18n :: _ ( ucfirst ( $time )) : Filter :: formatHumanReadableTime ( $time );
2013-10-30 23:54:42 +01:00
}
2015-09-12 17:33:16 +02:00
// translate all the formatter options
2016-08-09 11:54:42 +02:00
$formatters = array_map ( 'PrivateBin\\I18n::_' , $this -> _conf -> getSection ( 'formatter_options' ));
2015-09-12 17:33:16 +02:00
2015-09-19 11:21:13 +02:00
// set language cookie if that functionality was enabled
$languageselection = '' ;
2016-07-26 08:19:35 +02:00
if ( $this -> _conf -> getKey ( 'languageselection' )) {
2016-08-09 11:54:42 +02:00
$languageselection = I18n :: getLanguage ();
2015-09-19 11:21:13 +02:00
setcookie ( 'lang' , $languageselection );
}
2016-08-09 11:54:42 +02:00
$page = new View ;
2017-01-01 16:33:11 +01:00
$page -> assign ( 'NAME' , $this -> _conf -> getKey ( 'name' ));
2016-08-09 11:54:42 +02:00
$page -> assign ( 'ERROR' , I18n :: _ ( $this -> _error ));
$page -> assign ( 'STATUS' , I18n :: _ ( $this -> _status ));
2012-04-29 19:15:06 +02:00
$page -> assign ( 'VERSION' , self :: VERSION );
2015-09-22 23:21:31 +02:00
$page -> assign ( 'DISCUSSION' , $this -> _conf -> getKey ( 'discussion' ));
$page -> assign ( 'OPENDISCUSSION' , $this -> _conf -> getKey ( 'opendiscussion' ));
2015-09-12 17:33:16 +02:00
$page -> assign ( 'MARKDOWN' , array_key_exists ( 'markdown' , $formatters ));
$page -> assign ( 'SYNTAXHIGHLIGHTING' , array_key_exists ( 'syntaxhighlighting' , $formatters ));
2015-09-22 23:21:31 +02:00
$page -> assign ( 'SYNTAXHIGHLIGHTINGTHEME' , $this -> _conf -> getKey ( 'syntaxhighlightingtheme' ));
2015-09-12 17:33:16 +02:00
$page -> assign ( 'FORMATTER' , $formatters );
2015-09-22 23:21:31 +02:00
$page -> assign ( 'FORMATTERDEFAULT' , $this -> _conf -> getKey ( 'defaultformatter' ));
2016-08-09 11:54:42 +02:00
$page -> assign ( 'NOTICE' , I18n :: _ ( $this -> _conf -> getKey ( 'notice' )));
2015-09-22 23:21:31 +02:00
$page -> assign ( 'BURNAFTERREADINGSELECTED' , $this -> _conf -> getKey ( 'burnafterreadingselected' ));
$page -> assign ( 'PASSWORD' , $this -> _conf -> getKey ( 'password' ));
$page -> assign ( 'FILEUPLOAD' , $this -> _conf -> getKey ( 'fileupload' ));
2016-08-16 11:11:03 +02:00
$page -> assign ( 'ZEROBINCOMPATIBILITY' , $this -> _conf -> getKey ( 'zerobincompatibility' ));
2015-09-19 11:21:13 +02:00
$page -> assign ( 'LANGUAGESELECTION' , $languageselection );
2016-08-09 11:54:42 +02:00
$page -> assign ( 'LANGUAGES' , I18n :: getLanguageLabels ( I18n :: getAvailableLanguages ()));
2013-10-30 23:54:42 +01:00
$page -> assign ( 'EXPIRE' , $expire );
2015-09-22 23:21:31 +02:00
$page -> assign ( 'EXPIREDEFAULT' , $this -> _conf -> getKey ( 'default' , 'expire' ));
2016-01-31 09:56:06 +01:00
$page -> assign ( 'URLSHORTENER' , $this -> _conf -> getKey ( 'urlshortener' ));
2017-12-25 14:59:15 +01:00
$page -> assign ( 'QRCODE' , $this -> _conf -> getKey ( 'qrcode' ));
2015-09-22 23:21:31 +02:00
$page -> draw ( $this -> _conf -> getKey ( 'template' ));
2012-04-29 19:15:06 +02:00
}
2015-10-18 20:38:07 +02:00
/**
* outputs requested JSON - LD context
*
* @ access private
* @ param string $type
*/
2015-10-18 14:37:58 +02:00
private function _jsonld ( $type )
{
if (
$type !== 'paste' && $type !== 'comment' &&
$type !== 'pastemeta' && $type !== 'commentmeta'
2016-07-26 08:19:35 +02:00
) {
2015-10-18 14:37:58 +02:00
$type = '' ;
}
$content = '{}' ;
2016-08-15 16:45:47 +02:00
$file = PUBLIC_PATH . DIRECTORY_SEPARATOR . 'js' . DIRECTORY_SEPARATOR . $type . '.jsonld' ;
2016-07-26 08:19:35 +02:00
if ( is_readable ( $file )) {
2015-10-18 14:37:58 +02:00
$content = str_replace (
'?jsonld=' ,
2016-08-09 11:54:42 +02:00
$this -> _urlBase . '?jsonld=' ,
2015-10-18 14:37:58 +02:00
file_get_contents ( $file )
);
}
header ( 'Content-type: application/ld+json' );
header ( 'Access-Control-Allow-Origin: *' );
header ( 'Access-Control-Allow-Methods: GET' );
echo $content ;
}
2012-04-29 19:15:06 +02:00
/**
2015-10-18 20:38:07 +02:00
* prepares JSON encoded status message
2012-04-29 19:15:06 +02:00
*
* @ access private
2016-07-06 14:12:14 +02:00
* @ param int $status
2012-04-29 19:15:06 +02:00
* @ param string $message
2013-11-01 01:15:14 +01:00
* @ param array $other
2012-04-29 19:15:06 +02:00
*/
2013-11-01 01:15:14 +01:00
private function _return_message ( $status , $message , $other = array ())
2012-04-29 19:15:06 +02:00
{
$result = array ( 'status' => $status );
2016-07-26 08:19:35 +02:00
if ( $status ) {
2016-08-09 11:54:42 +02:00
$result [ 'message' ] = I18n :: _ ( $message );
2016-07-26 08:19:35 +02:00
} else {
2016-08-15 16:45:47 +02:00
$result [ 'id' ] = $message ;
2016-08-09 11:54:42 +02:00
$result [ 'url' ] = $this -> _urlBase . '?' . $message ;
2012-04-29 19:15:06 +02:00
}
2013-11-01 01:15:14 +01:00
$result += $other ;
2015-09-01 22:33:07 +02:00
$this -> _json = json_encode ( $result );
2012-04-29 19:15:06 +02:00
}
}