2012-04-29 19:15:06 +02:00
< ? php
/**
2016-07-11 11:58:15 +02:00
* PrivateBin
2012-04-29 19:15:06 +02:00
*
* a zero - knowledge paste bin
*
2016-07-11 11:58:15 +02:00
* @ link https :// github . com / PrivateBin / PrivateBin
2012-04-29 19:15:06 +02:00
* @ copyright 2012 Sébastien SAUVAGE ( sebsauvage . net )
2016-07-19 13:56:52 +02:00
* @ license https :// www . opensource . org / licenses / zlib - license . php The zlib / libpng License
2020-03-22 06:44:04 +01:00
* @ version 1.3 . 4
2012-04-29 19:15:06 +02:00
*/
2016-12-12 18:43:23 +01:00
2016-12-12 18:50:00 +01:00
namespace PrivateBin ;
2016-07-21 17:09:48 +02:00
use Exception ;
2016-10-29 10:24:08 +02:00
use PrivateBin\Persistence\ServerSalt ;
use PrivateBin\Persistence\TrafficLimiter ;
2016-07-21 17:09:48 +02:00
2012-04-29 19:15:06 +02:00
/**
2018-07-29 15:17:35 +02:00
* Controller
2012-04-29 19:15:06 +02:00
*
2018-07-29 15:17:35 +02:00
* Puts it all together .
2012-04-29 19:15:06 +02:00
*/
2018-07-29 15:17:35 +02:00
class Controller
2012-04-29 19:15:06 +02:00
{
2015-08-16 15:55:31 +02:00
/**
* version
*
* @ const string
2012-04-29 19:15:06 +02:00
*/
2020-03-22 06:44:04 +01:00
const VERSION = '1.3.4' ;
2012-04-29 19:15:06 +02:00
2017-03-24 19:20:34 +01:00
/**
* minimal required PHP version
*
* @ const string
*/
2020-02-05 19:30:14 +01:00
const MIN_PHP_VERSION = '5.6.0' ;
2017-03-24 19:20:34 +01:00
2015-08-31 22:10:41 +02:00
/**
* show the same error message if the paste expired or does not exist
*
* @ const string
*/
const GENERIC_ERROR = 'Paste does not exist, has expired or has been deleted.' ;
2012-04-29 19:15:06 +02:00
/**
2015-09-22 23:21:31 +02:00
* configuration
2015-08-16 15:55:31 +02:00
*
2012-04-29 19:15:06 +02:00
* @ access private
2016-08-09 11:54:42 +02:00
* @ var Configuration
2012-04-29 19:15:06 +02:00
*/
2015-09-22 23:21:31 +02:00
private $_conf ;
2012-04-29 19:15:06 +02:00
/**
2015-08-16 15:55:31 +02:00
* error message
*
2012-04-29 19:15:06 +02:00
* @ access private
* @ var string
*/
private $_error = '' ;
2013-11-01 01:15:14 +01:00
/**
2015-08-16 15:55:31 +02:00
* status message
*
2013-11-01 01:15:14 +01:00
* @ access private
* @ var string
*/
private $_status = '' ;
2015-09-01 22:33:07 +02:00
/**
* JSON message
*
* @ access private
* @ var string
*/
private $_json = '' ;
2012-04-29 19:15:06 +02:00
/**
2015-09-27 03:03:55 +02:00
* Factory of instance models
2015-08-16 15:55:31 +02:00
*
2012-04-29 19:15:06 +02:00
* @ access private
2015-09-27 03:03:55 +02:00
* @ var model
2012-04-29 19:15:06 +02:00
*/
private $_model ;
2015-09-27 20:34:39 +02:00
/**
* request
*
* @ access private
* @ var request
*/
private $_request ;
2015-10-18 14:37:58 +02:00
/**
* URL base
*
* @ access private
* @ var string
*/
2016-08-09 11:54:42 +02:00
private $_urlBase ;
2015-10-18 14:37:58 +02:00
2012-04-29 19:15:06 +02:00
/**
* constructor
*
2016-07-11 11:58:15 +02:00
* initializes and runs PrivateBin
2012-04-29 19:15:06 +02:00
*
* @ access public
2016-08-22 09:46:26 +02:00
* @ throws Exception
2012-04-29 19:15:06 +02:00
*/
public function __construct ()
{
2017-03-24 19:20:34 +01:00
if ( version_compare ( PHP_VERSION , self :: MIN_PHP_VERSION ) < 0 ) {
throw new Exception ( I18n :: _ ( '%s requires php %s or above to work. Sorry.' , I18n :: _ ( 'PrivateBin' ), self :: MIN_PHP_VERSION ), 1 );
2015-09-01 22:33:07 +02:00
}
2016-08-22 09:46:26 +02:00
if ( strlen ( PATH ) < 0 && substr ( PATH , - 1 ) !== DIRECTORY_SEPARATOR ) {
2017-01-01 16:33:11 +01:00
throw new Exception ( I18n :: _ ( '%s requires the PATH to end in a "%s". Please update the PATH in your index.php.' , I18n :: _ ( 'PrivateBin' ), DIRECTORY_SEPARATOR ), 5 );
2016-08-22 09:46:26 +02:00
}
2012-04-29 19:15:06 +02:00
2016-08-09 11:54:42 +02:00
// load config from ini file, initialize required classes
2012-04-29 19:15:06 +02:00
$this -> _init ();
2016-07-26 08:19:35 +02:00
switch ( $this -> _request -> getOperation ()) {
2015-09-27 20:34:39 +02:00
case 'create' :
$this -> _create ();
break ;
case 'delete' :
$this -> _delete (
$this -> _request -> getParam ( 'pasteid' ),
$this -> _request -> getParam ( 'deletetoken' )
);
break ;
case 'read' :
$this -> _read ( $this -> _request -> getParam ( 'pasteid' ));
break ;
2015-10-18 14:37:58 +02:00
case 'jsonld' :
$this -> _jsonld ( $this -> _request -> getParam ( 'jsonld' ));
return ;
2012-04-29 19:15:06 +02:00
}
2015-09-01 22:33:07 +02:00
// output JSON or HTML
2016-07-26 08:19:35 +02:00
if ( $this -> _request -> isJsonApiCall ()) {
2016-08-09 11:54:42 +02:00
header ( 'Content-type: ' . Request :: MIME_JSON );
2015-10-18 14:37:58 +02:00
header ( 'Access-Control-Allow-Origin: *' );
header ( 'Access-Control-Allow-Methods: GET, POST, PUT, DELETE' );
header ( 'Access-Control-Allow-Headers: X-Requested-With, Content-Type' );
2015-09-01 22:33:07 +02:00
echo $this -> _json ;
2016-07-26 08:19:35 +02:00
} else {
2015-09-01 22:33:07 +02:00
$this -> _view ();
}
2012-04-29 19:15:06 +02:00
}
/**
2018-07-29 15:17:35 +02:00
* initialize PrivateBin
2012-04-29 19:15:06 +02:00
*
* @ access private
2019-05-13 22:31:52 +02:00
* @ throws Exception
2012-04-29 19:15:06 +02:00
*/
private function _init ()
{
2016-08-15 16:45:47 +02:00
$this -> _conf = new Configuration ;
$this -> _model = new Model ( $this -> _conf );
2016-08-09 11:54:42 +02:00
$this -> _request = new Request ;
2018-01-06 10:27:58 +01:00
$this -> _urlBase = $this -> _request -> getRequestUri ();
2016-08-25 15:02:38 +02:00
ServerSalt :: setPath ( $this -> _conf -> getKey ( 'dir' , 'traffic' ));
2015-10-18 20:38:07 +02:00
// set default language
$lang = $this -> _conf -> getKey ( 'languagedefault' );
2016-08-09 11:54:42 +02:00
I18n :: setLanguageFallback ( $lang );
2015-10-18 20:38:07 +02:00
// force default language, if language selection is disabled and a default is set
2016-07-26 08:19:35 +02:00
if ( ! $this -> _conf -> getKey ( 'languageselection' ) && strlen ( $lang ) == 2 ) {
2015-10-18 20:38:07 +02:00
$_COOKIE [ 'lang' ] = $lang ;
setcookie ( 'lang' , $lang );
}
2012-04-29 19:15:06 +02:00
}
/**
2013-11-01 01:15:14 +01:00
* Store new paste or comment
2012-04-29 19:15:06 +02:00
*
2015-09-16 22:51:48 +02:00
* POST contains one or both :
2019-05-03 23:03:57 +02:00
* data = json encoded FormatV2 encrypted text ( containing keys : iv , v , iter , ks , ts , mode , adata , cipher , salt , ct )
* attachment = json encoded FormatV2 encrypted text ( containing keys : iv , v , iter , ks , ts , mode , adata , cipher , salt , ct )
2012-04-29 19:15:06 +02:00
*
* All optional data will go to meta information :
2012-05-19 23:59:41 +02:00
* expire ( optional ) = expiration delay ( never , 5 min , 10 min , 1 hour , 1 day , 1 week , 1 month , 1 year , burn ) ( default : never )
2015-09-16 22:51:48 +02:00
* formatter ( optional ) = format to display the paste as ( plaintext , syntaxhighlighting , markdown ) ( default : syntaxhighlighting )
* burnafterreading ( optional ) = if this paste may only viewed once ? ( 0 / 1 ) ( default : 0 )
2012-04-29 19:15:06 +02:00
* opendiscusssion ( optional ) = is the discussion allowed on this paste ? ( 0 / 1 ) ( default : 0 )
2019-05-03 23:03:57 +02:00
* attachmentname = json encoded FormatV2 encrypted text ( containing keys : iv , v , iter , ks , ts , mode , adata , cipher , salt , ct )
* nickname ( optional ) = in discussion , encoded FormatV2 encrypted text nickname of author of comment ( containing keys : iv , v , iter , ks , ts , mode , adata , cipher , salt , ct )
2012-04-29 19:15:06 +02:00
* parentid ( optional ) = in discussion , which comment this comment replies to .
* pasteid ( optional ) = in discussion , which paste this comment belongs to .
*
* @ access private
2015-08-27 23:58:56 +02:00
* @ return string
2012-04-29 19:15:06 +02:00
*/
2015-09-16 22:51:48 +02:00
private function _create ()
2012-04-29 19:15:06 +02:00
{
2020-05-05 23:18:52 +02:00
// Check whitelist if allowed to create
2020-05-08 01:13:25 +02:00
$whitelist = explode ( ',' , $this -> _conf -> getKey ( 'whitelist_paste_creation' , 'traffic' ));
2020-05-05 23:18:52 +02:00
if (( $option = $this -> _conf -> getKey ( 'header' , 'traffic' )) !== null ) {
$httpHeader = 'HTTP_' . $option ;
if ( array_key_exists ( $httpHeader , $_SERVER ) && ! empty ( $_SERVER [ $httpHeader ])) {
2020-05-08 01:45:24 +02:00
// compare source IP from web server with whitelist
if ( ! in_array ( $_SERVER [ $httpHeader ], $whitelist )) {
$this -> _return_message ( 1 , I18n :: _ ( 'Your IP is not authorized to create pastes.' ));
return ;
}
2020-05-05 23:18:52 +02:00
}
}
2015-09-27 03:03:55 +02:00
// Ensure last paste from visitors IP address was more than configured amount of seconds ago.
2016-08-09 11:54:42 +02:00
TrafficLimiter :: setConfiguration ( $this -> _conf );
if ( ! TrafficLimiter :: canPass ()) {
2019-05-19 09:42:55 +02:00
$this -> _return_message (
2019-05-08 22:11:21 +02:00
1 , I18n :: _ (
'Please wait %d seconds between each post.' ,
$this -> _conf -> getKey ( 'limit' , 'traffic' )
)
);
2019-05-19 09:42:55 +02:00
return ;
2016-07-26 08:19:35 +02:00
}
2012-04-29 19:15:06 +02:00
2019-05-08 22:11:21 +02:00
$data = $this -> _request -> getData ();
2019-05-10 07:55:39 +02:00
$isComment = array_key_exists ( 'pasteid' , $data ) &&
! empty ( $data [ 'pasteid' ]) &&
array_key_exists ( 'parentid' , $data ) &&
! empty ( $data [ 'parentid' ]);
if ( ! FormatV2 :: isValid ( $data , $isComment )) {
2019-05-19 09:42:55 +02:00
$this -> _return_message ( 1 , I18n :: _ ( 'Invalid data.' ));
return ;
2019-05-10 07:55:39 +02:00
}
2015-09-22 23:21:31 +02:00
$sizelimit = $this -> _conf -> getKey ( 'sizelimit' );
2019-05-13 22:31:52 +02:00
// Ensure content is not too big.
2019-05-08 22:11:21 +02:00
if ( strlen ( $data [ 'ct' ]) > $sizelimit ) {
2019-05-19 09:42:55 +02:00
$this -> _return_message (
2019-05-08 22:11:21 +02:00
1 ,
I18n :: _ (
'Paste is limited to %s of encrypted data.' ,
Filter :: formatHumanReadableSize ( $sizelimit )
)
);
2019-05-19 09:42:55 +02:00
return ;
2016-07-19 15:26:41 +02:00
}
2015-09-27 03:03:55 +02:00
// The user posts a comment.
2019-05-10 07:55:39 +02:00
if ( $isComment ) {
2019-05-08 22:11:21 +02:00
$paste = $this -> _model -> getPaste ( $data [ 'pasteid' ]);
2015-09-27 03:03:55 +02:00
if ( $paste -> exists ()) {
try {
2019-05-08 22:11:21 +02:00
$comment = $paste -> getComment ( $data [ 'parentid' ]);
2015-09-27 03:03:55 +02:00
$comment -> setData ( $data );
$comment -> store ();
2016-07-26 08:19:35 +02:00
} catch ( Exception $e ) {
2019-05-19 09:42:55 +02:00
$this -> _return_message ( 1 , $e -> getMessage ());
return ;
2015-09-27 03:03:55 +02:00
}
$this -> _return_message ( 0 , $comment -> getId ());
2016-07-26 08:19:35 +02:00
} else {
2019-05-15 07:44:03 +02:00
$this -> _return_message ( 1 , I18n :: _ ( 'Invalid data.' ));
2015-09-12 17:33:16 +02:00
}
}
2015-09-27 03:03:55 +02:00
// The user posts a standard paste.
2016-07-26 08:19:35 +02:00
else {
2016-07-15 17:02:59 +02:00
$this -> _model -> purge ();
2015-09-27 03:03:55 +02:00
$paste = $this -> _model -> getPaste ();
try {
2015-10-03 17:54:18 +02:00
$paste -> setData ( $data );
2015-09-27 03:03:55 +02:00
$paste -> store ();
} catch ( Exception $e ) {
return $this -> _return_message ( 1 , $e -> getMessage ());
}
$this -> _return_message ( 0 , $paste -> getId (), array ( 'deletetoken' => $paste -> getDeleteToken ()));
2012-04-29 19:15:06 +02:00
}
}
2013-02-24 14:33:51 +01:00
/**
* Delete an existing paste
*
* @ access private
2013-11-01 01:15:14 +01:00
* @ param string $dataid
* @ param string $deletetoken
2013-02-24 14:33:51 +01:00
*/
private function _delete ( $dataid , $deletetoken )
{
2015-09-27 03:03:55 +02:00
try {
$paste = $this -> _model -> getPaste ( $dataid );
2016-07-26 08:19:35 +02:00
if ( $paste -> exists ()) {
2019-05-08 22:11:21 +02:00
// accessing this method ensures that the paste would be
2015-09-27 03:03:55 +02:00
// deleted if it has already expired
2019-05-08 22:11:21 +02:00
$paste -> get ();
2020-02-05 19:30:14 +01:00
if ( hash_equals ( $paste -> getDeleteToken (), $deletetoken )) {
2019-05-08 22:11:21 +02:00
// Paste exists and deletion token is valid: Delete the paste.
2017-02-22 21:42:14 +01:00
$paste -> delete ();
$this -> _status = 'Paste was properly deleted.' ;
2016-07-26 08:19:35 +02:00
} else {
2019-05-08 22:11:21 +02:00
$this -> _error = 'Wrong deletion token. Paste was not deleted.' ;
2015-09-27 03:03:55 +02:00
}
2016-07-26 08:19:35 +02:00
} else {
2015-09-27 03:03:55 +02:00
$this -> _error = self :: GENERIC_ERROR ;
2015-08-31 22:10:41 +02:00
}
2015-09-27 03:03:55 +02:00
} catch ( Exception $e ) {
$this -> _error = $e -> getMessage ();
2013-11-01 01:15:14 +01:00
}
2017-02-22 21:42:14 +01:00
if ( $this -> _request -> isJsonApiCall ()) {
if ( strlen ( $this -> _error )) {
$this -> _return_message ( 1 , $this -> _error );
} else {
$this -> _return_message ( 0 , $dataid );
}
}
2013-11-01 01:15:14 +01:00
}
2012-04-29 19:15:06 +02:00
/**
2018-05-27 14:36:30 +02:00
* Read an existing paste or comment , only allowed via a JSON API call
2012-04-29 19:15:06 +02:00
*
* @ access private
2013-11-01 01:15:14 +01:00
* @ param string $dataid
2012-04-29 19:15:06 +02:00
*/
2013-11-01 01:15:14 +01:00
private function _read ( $dataid )
2012-04-29 19:15:06 +02:00
{
2018-05-27 14:36:30 +02:00
if ( ! $this -> _request -> isJsonApiCall ()) {
return ;
}
2015-09-27 03:03:55 +02:00
try {
$paste = $this -> _model -> getPaste ( $dataid );
2016-07-26 08:19:35 +02:00
if ( $paste -> exists ()) {
2018-05-27 15:05:31 +02:00
$data = $paste -> get ();
2019-05-08 22:11:21 +02:00
if ( array_key_exists ( 'salt' , $data [ 'meta' ])) {
unset ( $data [ 'meta' ][ 'salt' ]);
2016-07-26 08:19:35 +02:00
}
2018-05-27 14:36:30 +02:00
$this -> _return_message ( 0 , $dataid , ( array ) $data );
2016-07-26 08:19:35 +02:00
} else {
2018-05-27 14:36:30 +02:00
$this -> _return_message ( 1 , self :: GENERIC_ERROR );
2012-04-29 19:15:06 +02:00
}
2015-09-27 03:03:55 +02:00
} catch ( Exception $e ) {
2018-05-27 14:36:30 +02:00
$this -> _return_message ( 1 , $e -> getMessage ());
2015-09-01 22:33:07 +02:00
}
2012-04-29 19:15:06 +02:00
}
/**
2018-07-29 15:17:35 +02:00
* Display frontend .
2012-04-29 19:15:06 +02:00
*
* @ access private
*/
private function _view ()
{
2012-08-28 23:28:41 +02:00
// set headers to disable caching
2013-02-24 14:33:51 +01:00
$time = gmdate ( 'D, d M Y H:i:s \G\M\T' );
2016-09-18 11:29:37 +02:00
header ( 'Cache-Control: no-store, no-cache, no-transform, must-revalidate' );
2013-02-24 14:33:51 +01:00
header ( 'Pragma: no-cache' );
header ( 'Expires: ' . $time );
header ( 'Last-Modified: ' . $time );
header ( 'Vary: Accept' );
2016-08-09 14:46:32 +02:00
header ( 'Content-Security-Policy: ' . $this -> _conf -> getKey ( 'cspheader' ));
2019-06-27 20:31:10 +02:00
header ( 'Referrer-Policy: no-referrer' );
2016-09-18 11:29:37 +02:00
header ( 'X-Xss-Protection: 1; mode=block' );
header ( 'X-Frame-Options: DENY' );
header ( 'X-Content-Type-Options: nosniff' );
2012-08-26 00:49:11 +02:00
2013-10-30 23:54:42 +01:00
// label all the expiration options
$expire = array ();
2016-07-26 08:19:35 +02:00
foreach ( $this -> _conf -> getSection ( 'expire_options' ) as $time => $seconds ) {
2016-08-15 16:45:47 +02:00
$expire [ $time ] = ( $seconds == 0 ) ? I18n :: _ ( ucfirst ( $time )) : Filter :: formatHumanReadableTime ( $time );
2013-10-30 23:54:42 +01:00
}
2015-09-12 17:33:16 +02:00
// translate all the formatter options
2016-08-09 11:54:42 +02:00
$formatters = array_map ( 'PrivateBin\\I18n::_' , $this -> _conf -> getSection ( 'formatter_options' ));
2015-09-12 17:33:16 +02:00
2015-09-19 11:21:13 +02:00
// set language cookie if that functionality was enabled
$languageselection = '' ;
2016-07-26 08:19:35 +02:00
if ( $this -> _conf -> getKey ( 'languageselection' )) {
2016-08-09 11:54:42 +02:00
$languageselection = I18n :: getLanguage ();
2015-09-19 11:21:13 +02:00
setcookie ( 'lang' , $languageselection );
}
2016-08-09 11:54:42 +02:00
$page = new View ;
2017-01-01 16:33:11 +01:00
$page -> assign ( 'NAME' , $this -> _conf -> getKey ( 'name' ));
2016-08-09 11:54:42 +02:00
$page -> assign ( 'ERROR' , I18n :: _ ( $this -> _error ));
$page -> assign ( 'STATUS' , I18n :: _ ( $this -> _status ));
2012-04-29 19:15:06 +02:00
$page -> assign ( 'VERSION' , self :: VERSION );
2015-09-22 23:21:31 +02:00
$page -> assign ( 'DISCUSSION' , $this -> _conf -> getKey ( 'discussion' ));
$page -> assign ( 'OPENDISCUSSION' , $this -> _conf -> getKey ( 'opendiscussion' ));
2015-09-12 17:33:16 +02:00
$page -> assign ( 'MARKDOWN' , array_key_exists ( 'markdown' , $formatters ));
$page -> assign ( 'SYNTAXHIGHLIGHTING' , array_key_exists ( 'syntaxhighlighting' , $formatters ));
2015-09-22 23:21:31 +02:00
$page -> assign ( 'SYNTAXHIGHLIGHTINGTHEME' , $this -> _conf -> getKey ( 'syntaxhighlightingtheme' ));
2015-09-12 17:33:16 +02:00
$page -> assign ( 'FORMATTER' , $formatters );
2015-09-22 23:21:31 +02:00
$page -> assign ( 'FORMATTERDEFAULT' , $this -> _conf -> getKey ( 'defaultformatter' ));
2016-08-09 11:54:42 +02:00
$page -> assign ( 'NOTICE' , I18n :: _ ( $this -> _conf -> getKey ( 'notice' )));
2015-09-22 23:21:31 +02:00
$page -> assign ( 'BURNAFTERREADINGSELECTED' , $this -> _conf -> getKey ( 'burnafterreadingselected' ));
$page -> assign ( 'PASSWORD' , $this -> _conf -> getKey ( 'password' ));
$page -> assign ( 'FILEUPLOAD' , $this -> _conf -> getKey ( 'fileupload' ));
2016-08-16 11:11:03 +02:00
$page -> assign ( 'ZEROBINCOMPATIBILITY' , $this -> _conf -> getKey ( 'zerobincompatibility' ));
2015-09-19 11:21:13 +02:00
$page -> assign ( 'LANGUAGESELECTION' , $languageselection );
2016-08-09 11:54:42 +02:00
$page -> assign ( 'LANGUAGES' , I18n :: getLanguageLabels ( I18n :: getAvailableLanguages ()));
2013-10-30 23:54:42 +01:00
$page -> assign ( 'EXPIRE' , $expire );
2015-09-22 23:21:31 +02:00
$page -> assign ( 'EXPIREDEFAULT' , $this -> _conf -> getKey ( 'default' , 'expire' ));
2016-01-31 09:56:06 +01:00
$page -> assign ( 'URLSHORTENER' , $this -> _conf -> getKey ( 'urlshortener' ));
2017-12-25 14:59:15 +01:00
$page -> assign ( 'QRCODE' , $this -> _conf -> getKey ( 'qrcode' ));
2019-06-17 21:40:37 +02:00
$page -> assign ( 'HTTPWARNING' , $this -> _conf -> getKey ( 'httpwarning' ));
2019-09-19 19:14:48 +02:00
$page -> assign ( 'HTTPSLINK' , 'https://' . $this -> _request -> getHost () . $this -> _request -> getRequestUri ());
2019-06-23 19:45:40 +02:00
$page -> assign ( 'COMPRESSION' , $this -> _conf -> getKey ( 'compression' ));
2015-09-22 23:21:31 +02:00
$page -> draw ( $this -> _conf -> getKey ( 'template' ));
2012-04-29 19:15:06 +02:00
}
2015-10-18 20:38:07 +02:00
/**
* outputs requested JSON - LD context
*
* @ access private
* @ param string $type
*/
2015-10-18 14:37:58 +02:00
private function _jsonld ( $type )
{
if (
$type !== 'paste' && $type !== 'comment' &&
$type !== 'pastemeta' && $type !== 'commentmeta'
2016-07-26 08:19:35 +02:00
) {
2015-10-18 14:37:58 +02:00
$type = '' ;
}
$content = '{}' ;
2016-08-15 16:45:47 +02:00
$file = PUBLIC_PATH . DIRECTORY_SEPARATOR . 'js' . DIRECTORY_SEPARATOR . $type . '.jsonld' ;
2016-07-26 08:19:35 +02:00
if ( is_readable ( $file )) {
2015-10-18 14:37:58 +02:00
$content = str_replace (
'?jsonld=' ,
2016-08-09 11:54:42 +02:00
$this -> _urlBase . '?jsonld=' ,
2015-10-18 14:37:58 +02:00
file_get_contents ( $file )
);
}
header ( 'Content-type: application/ld+json' );
header ( 'Access-Control-Allow-Origin: *' );
header ( 'Access-Control-Allow-Methods: GET' );
echo $content ;
}
2012-04-29 19:15:06 +02:00
/**
2015-10-18 20:38:07 +02:00
* prepares JSON encoded status message
2012-04-29 19:15:06 +02:00
*
* @ access private
2016-07-06 14:12:14 +02:00
* @ param int $status
2012-04-29 19:15:06 +02:00
* @ param string $message
2013-11-01 01:15:14 +01:00
* @ param array $other
2012-04-29 19:15:06 +02:00
*/
2013-11-01 01:15:14 +01:00
private function _return_message ( $status , $message , $other = array ())
2012-04-29 19:15:06 +02:00
{
$result = array ( 'status' => $status );
2016-07-26 08:19:35 +02:00
if ( $status ) {
2016-08-09 11:54:42 +02:00
$result [ 'message' ] = I18n :: _ ( $message );
2016-07-26 08:19:35 +02:00
} else {
2016-08-15 16:45:47 +02:00
$result [ 'id' ] = $message ;
2016-08-09 11:54:42 +02:00
$result [ 'url' ] = $this -> _urlBase . '?' . $message ;
2012-04-29 19:15:06 +02:00
}
2013-11-01 01:15:14 +01:00
$result += $other ;
2019-05-13 22:31:52 +02:00
$this -> _json = Json :: encode ( $result );
2012-04-29 19:15:06 +02:00
}
}