2007-05-28 02:04:33 +02:00
< ? php
2008-10-02 03:03:26 +02:00
/**
2015-10-16 18:56:26 +02:00
* Filesystem API : Top - level functionality
*
2012-07-26 17:08:30 +02:00
* Functions for reading , writing , modifying , and deleting files on the file system .
2012-10-03 20:49:37 +02:00
* Includes functionality for theme - specific files as well as operations for uploading ,
2012-07-26 17:08:30 +02:00
* archiving , and rendering output when necessary .
2008-10-02 03:03:26 +02:00
*
* @ package WordPress
2015-10-16 18:56:26 +02:00
* @ subpackage Filesystem
* @ since 2.3 . 0
2008-10-02 03:03:26 +02:00
*/
2007-05-28 02:04:33 +02:00
2008-10-02 03:03:26 +02:00
/** The descriptions for theme files. */
2010-12-04 05:22:48 +01:00
$wp_file_descriptions = array (
2015-12-25 22:12:26 +01:00
'functions.php' => __ ( 'Theme Functions' ),
'header.php' => __ ( 'Theme Header' ),
'footer.php' => __ ( 'Theme Footer' ),
'sidebar.php' => __ ( 'Sidebar' ),
'comments.php' => __ ( 'Comments' ),
'searchform.php' => __ ( 'Search Form' ),
'404.php' => __ ( '404 Template' ),
'link.php' => __ ( 'Links Template' ),
// Archives
'index.php' => __ ( 'Main Index Template' ),
'archive.php' => __ ( 'Archives' ),
'author.php' => __ ( 'Author Template' ),
'taxonomy.php' => __ ( 'Taxonomy Template' ),
'category.php' => __ ( 'Category Template' ),
'tag.php' => __ ( 'Tag Template' ),
'home.php' => __ ( 'Posts Page' ),
'search.php' => __ ( 'Search Results' ),
'date.php' => __ ( 'Date Template' ),
// Content
'singular.php' => __ ( 'Singular Template' ),
'single.php' => __ ( 'Single Post' ),
'page.php' => __ ( 'Single Page' ),
2017-09-10 19:08:43 +02:00
'front-page.php' => __ ( 'Homepage' ),
2015-12-25 22:12:26 +01:00
// Attachments
'attachment.php' => __ ( 'Attachment Template' ),
'image.php' => __ ( 'Image Attachment Template' ),
'video.php' => __ ( 'Video Attachment Template' ),
'audio.php' => __ ( 'Audio Attachment Template' ),
'application.php' => __ ( 'Application Attachment Template' ),
2016-04-18 03:05:27 +02:00
// Embeds
'embed.php' => __ ( 'Embed Template' ),
'embed-404.php' => __ ( 'Embed 404 Template' ),
'embed-content.php' => __ ( 'Embed Content Template' ),
'header-embed.php' => __ ( 'Embed Header Template' ),
'footer-embed.php' => __ ( 'Embed Footer Template' ),
2015-12-25 22:12:26 +01:00
// Stylesheets
'style.css' => __ ( 'Stylesheet' ),
'editor-style.css' => __ ( 'Visual Editor Stylesheet' ),
'editor-style-rtl.css' => __ ( 'Visual Editor RTL Stylesheet' ),
'rtl.css' => __ ( 'RTL Stylesheet' ),
// Other
'my-hacks.php' => __ ( 'my-hacks.php (legacy hacks support)' ),
'.htaccess' => __ ( '.htaccess (for rewrite rules )' ),
2007-05-28 02:04:33 +02:00
// Deprecated files
2015-12-25 22:12:26 +01:00
'wp-layout.css' => __ ( 'Stylesheet' ),
'wp-comments.php' => __ ( 'Comments Template' ),
2010-12-04 05:22:48 +01:00
'wp-comments-popup.php' => __ ( 'Popup Comments Template' ),
2015-12-25 22:12:26 +01:00
'comments-popup.php' => __ ( 'Popup Comments' ),
2010-12-04 05:22:48 +01:00
);
2008-10-02 03:03:26 +02:00
/**
2010-10-28 00:24:06 +02:00
* Get the description for standard WordPress theme files and other various standard
* WordPress files
2008-10-02 03:03:26 +02:00
*
2010-10-28 00:24:06 +02:00
* @ since 1.5 . 0
2008-10-02 03:03:26 +02:00
*
2017-07-12 23:40:40 +02:00
* @ global array $wp_file_descriptions Theme file descriptions .
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
* @ global array $allowed_files List of allowed files .
2010-10-28 00:24:06 +02:00
* @ param string $file Filesystem path or filename
2015-09-28 05:11:24 +02:00
* @ return string Description of file from $wp_file_descriptions or basename of $file if description doesn ' t exist .
* Appends 'Page Template' to basename of $file if the file is a page template
2008-10-02 03:03:26 +02:00
*/
2007-05-28 02:04:33 +02:00
function get_file_description ( $file ) {
2015-09-28 05:11:24 +02:00
global $wp_file_descriptions , $allowed_files ;
2007-05-28 02:04:33 +02:00
2016-08-21 01:36:28 +02:00
$dirname = pathinfo ( $file , PATHINFO_DIRNAME );
2015-09-28 05:11:24 +02:00
$file_path = $allowed_files [ $file ];
2016-08-21 01:36:28 +02:00
if ( isset ( $wp_file_descriptions [ basename ( $file ) ] ) && '.' === $dirname ) {
2015-09-28 05:11:24 +02:00
return $wp_file_descriptions [ basename ( $file ) ];
} elseif ( file_exists ( $file_path ) && is_file ( $file_path ) ) {
$template_data = implode ( '' , file ( $file_path ) );
if ( preg_match ( '|Template Name:(.*)$|mi' , $template_data , $name ) ) {
return sprintf ( __ ( '%s Page Template' ), _cleanup_header_comment ( $name [ 1 ] ) );
}
2007-05-28 02:04:33 +02:00
}
2012-03-29 05:00:38 +02:00
return trim ( basename ( $file ) );
2007-05-28 02:04:33 +02:00
}
2008-10-02 03:03:26 +02:00
/**
2010-10-28 00:24:06 +02:00
* Get the absolute filesystem path to the root of the WordPress installation
2008-10-02 03:03:26 +02:00
*
2010-10-28 00:24:06 +02:00
* @ since 1.5 . 0
2008-10-02 03:03:26 +02:00
*
2010-10-28 00:24:06 +02:00
* @ return string Full filesystem path to the root of the WordPress installation
2008-10-02 03:03:26 +02:00
*/
2007-05-28 02:04:33 +02:00
function get_home_path () {
2014-06-29 12:29:14 +02:00
$home = set_url_scheme ( get_option ( 'home' ), 'http' );
$siteurl = set_url_scheme ( get_option ( 'siteurl' ), 'http' );
2012-07-06 15:54:15 +02:00
if ( ! empty ( $home ) && 0 !== strcasecmp ( $home , $siteurl ) ) {
$wp_path_rel_to_home = str_ireplace ( $home , '' , $siteurl ); /* $siteurl - $home */
2017-12-01 00:11:00 +01:00
$pos = strripos ( str_replace ( '\\' , '/' , $_SERVER [ 'SCRIPT_FILENAME' ] ), trailingslashit ( $wp_path_rel_to_home ) );
$home_path = substr ( $_SERVER [ 'SCRIPT_FILENAME' ], 0 , $pos );
$home_path = trailingslashit ( $home_path );
2007-05-28 02:04:33 +02:00
} else {
$home_path = ABSPATH ;
}
2013-03-12 12:04:14 +01:00
return str_replace ( '\\' , '/' , $home_path );
2007-05-28 02:04:33 +02:00
}
2008-10-02 03:03:26 +02:00
/**
2009-11-06 00:03:48 +01:00
* Returns a listing of all files in the specified folder and all subdirectories up to 100 levels deep .
* The depth of the recursiveness can be controlled by the $levels param .
2008-10-02 03:03:26 +02:00
*
2009-11-06 00:03:48 +01:00
* @ since 2.6 . 0
2017-10-10 07:34:49 +02:00
* @ since 4.9 . 0 Added the `$exclusions` parameter .
2008-10-02 03:03:26 +02:00
*
2018-02-09 18:26:31 +01:00
* @ param string $folder Optional . Full path to folder . Default empty .
* @ param int $levels Optional . Levels of folders to follow , Default 100 ( PHP Loop limit ) .
* @ param string [] $exclusions Optional . List of folders and files to skip .
* @ return bool | string [] False on failure , else array of files .
2008-10-02 03:03:26 +02:00
*/
2017-10-10 07:34:49 +02:00
function list_files ( $folder = '' , $levels = 100 , $exclusions = array () ) {
if ( empty ( $folder ) ) {
2008-06-16 20:35:48 +02:00
return false ;
2017-10-10 07:34:49 +02:00
}
$folder = trailingslashit ( $folder );
2008-06-16 20:35:48 +02:00
2017-10-10 07:34:49 +02:00
if ( ! $levels ) {
2008-06-16 20:35:48 +02:00
return false ;
2017-10-10 07:34:49 +02:00
}
2008-06-16 20:35:48 +02:00
$files = array ();
2017-10-10 07:34:49 +02:00
$dir = @ opendir ( $folder );
if ( $dir ) {
while ( ( $file = readdir ( $dir ) ) !== false ) {
// Skip current and parent folder links.
if ( in_array ( $file , array ( '.' , '..' ), true ) ) {
continue ;
}
// Skip hidden and excluded files.
if ( '.' === $file [ 0 ] || in_array ( $file , $exclusions , true ) ) {
2008-06-16 20:35:48 +02:00
continue ;
2017-10-10 07:34:49 +02:00
}
if ( is_dir ( $folder . $file ) ) {
$files2 = list_files ( $folder . $file , $levels - 1 );
if ( $files2 ) {
2017-12-01 00:11:00 +01:00
$files = array_merge ( $files , $files2 );
2017-10-10 07:34:49 +02:00
} else {
$files [] = $folder . $file . '/' ;
}
2008-06-16 20:35:48 +02:00
} else {
2017-10-10 07:34:49 +02:00
$files [] = $folder . $file ;
2008-06-16 20:35:48 +02:00
}
}
}
@ closedir ( $dir );
2017-10-10 07:34:49 +02:00
2008-06-16 20:35:48 +02:00
return $files ;
}
2007-05-28 02:04:33 +02:00
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
/**
* Get list of file extensions that are editable in plugins .
*
* @ since 4.9 . 0
*
2018-03-05 22:50:31 +01:00
* @ param string $plugin Path to the plugin file relative to the plugins directory .
2018-02-09 18:26:31 +01:00
* @ return string [] Array of editable file extensions .
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
*/
function wp_get_plugin_file_editable_extensions ( $plugin ) {
$editable_extensions = array (
'bash' ,
'conf' ,
'css' ,
'diff' ,
'htm' ,
'html' ,
'http' ,
'inc' ,
'include' ,
'js' ,
'json' ,
'jsx' ,
'less' ,
'md' ,
'patch' ,
'php' ,
'php3' ,
'php4' ,
'php5' ,
'php7' ,
'phps' ,
'phtml' ,
'sass' ,
'scss' ,
'sh' ,
'sql' ,
'svg' ,
'text' ,
'txt' ,
'xml' ,
'yaml' ,
'yml' ,
);
/**
* Filters file type extensions editable in the plugin editor .
*
* @ since 2.8 . 0
2018-02-09 17:55:31 +01:00
* @ since 4.9 . 0 Added the `$plugin` parameter .
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
*
2018-02-09 18:26:31 +01:00
* @ param string [] $editable_extensions An array of editable plugin file extensions .
2018-03-05 22:50:31 +01:00
* @ param string $plugin Path to the plugin file relative to the plugins directory .
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
*/
$editable_extensions = ( array ) apply_filters ( 'editable_extensions' , $editable_extensions , $plugin );
return $editable_extensions ;
}
/**
* Get list of file extensions that are editable for a given theme .
*
2018-02-09 18:26:31 +01:00
* @ param WP_Theme $theme Theme object .
* @ return string [] Array of editable file extensions .
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
*/
function wp_get_theme_file_editable_extensions ( $theme ) {
$default_types = array (
'bash' ,
'conf' ,
'css' ,
'diff' ,
'htm' ,
'html' ,
'http' ,
'inc' ,
'include' ,
'js' ,
'json' ,
'jsx' ,
'less' ,
'md' ,
'patch' ,
'php' ,
'php3' ,
'php4' ,
'php5' ,
'php7' ,
'phps' ,
'phtml' ,
'sass' ,
'scss' ,
'sh' ,
'sql' ,
'svg' ,
'text' ,
'txt' ,
'xml' ,
'yaml' ,
'yml' ,
);
/**
* Filters the list of file types allowed for editing in the Theme editor .
*
* @ since 4.4 . 0
*
2018-02-09 18:26:31 +01:00
* @ param string [] $default_types List of allowed file types .
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
* @ param WP_Theme $theme The current Theme object .
*/
$file_types = apply_filters ( 'wp_theme_editor_filetypes' , $default_types , $theme );
// Ensure that default types are still there.
return array_unique ( array_merge ( $file_types , $default_types ) );
}
/**
* Print file editor templates ( for plugins and themes ) .
*
* @ since 4.9 . 0
*/
function wp_print_file_editor_templates () {
?>
< script type = " text/html " id = " tmpl-wp-file-editor-notice " >
< div class = " notice inline notice- { { data.type || 'info' }} { { data.alt ? 'notice-alt' : '' }} { { data.dismissible ? 'is-dismissible' : '' }} { { data.classes || '' }} " >
< # if ( 'php_error' === data.code ) { #>
< p >
< ? php
printf (
2018-04-16 20:36:24 +02:00
/* translators: 1: line number, 2: file path */
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
__ ( 'Your PHP code changes were rolled back due to an error on line %1$s of file %2$s. Please fix and try saving again.' ),
'{{ data.line }}' ,
'{{ data.file }}'
);
?>
</ p >
< pre > {{ data . message }} </ pre >
< # } else if ( 'file_not_writable' === data.code ) { #>
< p >< ? php _e ( 'You need to make this file writable before you can save your changes. See <a href="https://codex.wordpress.org/Changing_File_Permissions">the Codex</a> for more information.' ); ?> </p>
< # } else { #>
< p > {{ data . message || data . code }} </ p >
< # if ( 'lint_errors' === data.code ) { #>
< p >
< # var elementId = 'el-' + String( Math.random() ); #>
< input id = " { { elementId }} " type = " checkbox " >
< label for = " { { elementId }} " >< ? php _e ( 'Update anyway, even though it might break your site?' ); ?> </label>
</ p >
< # } #>
< # } #>
< # if ( data.dismissible ) { #>
< button type = " button " class = " notice-dismiss " >< span class = " screen-reader-text " >< ? php _e ( 'Dismiss' ); ?> </span></button>
< # } #>
</ div >
</ script >
< ? php
}
/**
* Attempt to edit a file for a theme or plugin .
*
* When editing a PHP file , loopback requests will be made to the admin and the homepage
* to attempt to see if there is a fatal error introduced . If so , the PHP change will be
* reverted .
*
* @ since 4.9 . 0
*
2018-02-09 18:26:31 +01:00
* @ param string [] $args {
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
* Args . Note that all of the arg values are already unslashed . They are , however ,
2018-02-09 17:55:31 +01:00
* coming straight from `$_POST` and are not validated or sanitized in any way .
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
*
* @ type string $file Relative path to file .
2018-03-05 22:50:31 +01:00
* @ type string $plugin Path to the plugin file relative to the plugins directory .
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
* @ type string $theme Theme being edited .
* @ type string $newcontent New content for the file .
* @ type string $nonce Nonce .
* }
* @ return true | WP_Error True on success or `WP_Error` on failure .
*/
function wp_edit_theme_plugin_file ( $args ) {
if ( empty ( $args [ 'file' ] ) ) {
return new WP_Error ( 'missing_file' );
}
$file = $args [ 'file' ];
if ( 0 !== validate_file ( $file ) ) {
return new WP_Error ( 'bad_file' );
}
if ( ! isset ( $args [ 'newcontent' ] ) ) {
return new WP_Error ( 'missing_content' );
}
$content = $args [ 'newcontent' ];
if ( ! isset ( $args [ 'nonce' ] ) ) {
return new WP_Error ( 'missing_nonce' );
}
2017-12-01 00:11:00 +01:00
$plugin = null ;
$theme = null ;
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
$real_file = null ;
if ( ! empty ( $args [ 'plugin' ] ) ) {
$plugin = $args [ 'plugin' ];
if ( ! current_user_can ( 'edit_plugins' ) ) {
return new WP_Error ( 'unauthorized' , __ ( 'Sorry, you are not allowed to edit plugins for this site.' ) );
}
if ( ! wp_verify_nonce ( $args [ 'nonce' ], 'edit-plugin_' . $file ) ) {
return new WP_Error ( 'nonce_failure' );
}
if ( ! array_key_exists ( $plugin , get_plugins () ) ) {
return new WP_Error ( 'invalid_plugin' );
}
if ( 0 !== validate_file ( $file , get_plugin_files ( $plugin ) ) ) {
return new WP_Error ( 'bad_plugin_file_path' , __ ( 'Sorry, that file cannot be edited.' ) );
}
$editable_extensions = wp_get_plugin_file_editable_extensions ( $plugin );
$real_file = WP_PLUGIN_DIR . '/' . $file ;
$is_active = in_array (
$plugin ,
( array ) get_option ( 'active_plugins' , array () ),
true
);
} elseif ( ! empty ( $args [ 'theme' ] ) ) {
$stylesheet = $args [ 'theme' ];
if ( 0 !== validate_file ( $stylesheet ) ) {
return new WP_Error ( 'bad_theme_path' );
}
if ( ! current_user_can ( 'edit_themes' ) ) {
return new WP_Error ( 'unauthorized' , __ ( 'Sorry, you are not allowed to edit templates for this site.' ) );
}
$theme = wp_get_theme ( $stylesheet );
if ( ! $theme -> exists () ) {
return new WP_Error ( 'non_existent_theme' , __ ( 'The requested theme does not exist.' ) );
}
2017-11-27 04:44:47 +01:00
if ( ! wp_verify_nonce ( $args [ 'nonce' ], 'edit-theme_' . $stylesheet . '_' . $file ) ) {
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
return new WP_Error ( 'nonce_failure' );
}
if ( $theme -> errors () && 'theme_no_stylesheet' === $theme -> errors () -> get_error_code () ) {
return new WP_Error (
'theme_no_stylesheet' ,
__ ( 'The requested theme does not exist.' ) . ' ' . $theme -> errors () -> get_error_message ()
);
}
$editable_extensions = wp_get_theme_file_editable_extensions ( $theme );
$allowed_files = array ();
foreach ( $editable_extensions as $type ) {
switch ( $type ) {
case 'php' :
2017-11-03 00:05:48 +01:00
$allowed_files = array_merge ( $allowed_files , $theme -> get_files ( 'php' , - 1 ) );
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
break ;
case 'css' :
2017-12-01 00:11:00 +01:00
$style_files = $theme -> get_files ( 'css' , - 1 );
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
$allowed_files [ 'style.css' ] = $style_files [ 'style.css' ];
2017-12-01 00:11:00 +01:00
$allowed_files = array_merge ( $allowed_files , $style_files );
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
break ;
default :
2017-11-03 00:05:48 +01:00
$allowed_files = array_merge ( $allowed_files , $theme -> get_files ( $type , - 1 ) );
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
break ;
}
}
2017-11-27 04:28:48 +01:00
// Compare based on relative paths
if ( 0 !== validate_file ( $file , array_keys ( $allowed_files ) ) ) {
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
return new WP_Error ( 'disallowed_theme_file' , __ ( 'Sorry, that file cannot be edited.' ) );
}
2017-11-27 04:44:47 +01:00
$real_file = $theme -> get_stylesheet_directory () . '/' . $file ;
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
$is_active = ( get_stylesheet () === $stylesheet || get_template () === $stylesheet );
2017-11-27 04:44:47 +01:00
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
} else {
return new WP_Error ( 'missing_theme_or_plugin' );
}
// Ensure file is real.
if ( ! is_file ( $real_file ) ) {
return new WP_Error ( 'file_does_not_exist' , __ ( 'No such file exists! Double check the name and try again.' ) );
}
// Ensure file extension is allowed.
$extension = null ;
if ( preg_match ( '/\.([^.]+)$/' , $real_file , $matches ) ) {
$extension = strtolower ( $matches [ 1 ] );
if ( ! in_array ( $extension , $editable_extensions , true ) ) {
return new WP_Error ( 'illegal_file_type' , __ ( 'Files of this type are not editable.' ) );
}
}
$previous_content = file_get_contents ( $real_file );
if ( ! is_writeable ( $real_file ) ) {
return new WP_Error ( 'file_not_writable' );
}
$f = fopen ( $real_file , 'w+' );
if ( false === $f ) {
return new WP_Error ( 'file_not_writable' );
}
$written = fwrite ( $f , $content );
fclose ( $f );
if ( false === $written ) {
return new WP_Error ( 'unable_to_write' , __ ( 'Unable to write to file.' ) );
}
if ( 'php' === $extension && function_exists ( 'opcache_invalidate' ) ) {
opcache_invalidate ( $real_file , true );
}
if ( $is_active && 'php' === $extension ) {
2017-12-01 00:11:00 +01:00
$scrape_key = md5 ( rand () );
$transient = 'scrape_key_' . $scrape_key ;
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
$scrape_nonce = strval ( rand () );
set_transient ( $transient , $scrape_nonce , 60 ); // It shouldn't take more than 60 seconds to make the two loopback requests.
2017-12-01 00:11:00 +01:00
$cookies = wp_unslash ( $_COOKIE );
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
$scrape_params = array (
2017-12-01 00:11:00 +01:00
'wp_scrape_key' => $scrape_key ,
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
'wp_scrape_nonce' => $scrape_nonce ,
);
2017-12-01 00:11:00 +01:00
$headers = array (
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
'Cache-Control' => 'no-cache' ,
);
2017-10-10 07:27:49 +02:00
// Include Basic auth in loopback requests.
if ( isset ( $_SERVER [ 'PHP_AUTH_USER' ] ) && isset ( $_SERVER [ 'PHP_AUTH_PW' ] ) ) {
$headers [ 'Authorization' ] = 'Basic ' . base64_encode ( wp_unslash ( $_SERVER [ 'PHP_AUTH_USER' ] ) . ':' . wp_unslash ( $_SERVER [ 'PHP_AUTH_PW' ] ) );
}
// Make sure PHP process doesn't die before loopback requests complete.
@ set_time_limit ( 300 );
// Time to wait for loopback requests to finish.
$timeout = 100 ;
$needle_start = " ###### wp_scraping_result_start: $scrape_key ###### " ;
2017-12-01 00:11:00 +01:00
$needle_end = " ###### wp_scraping_result_end: $scrape_key ###### " ;
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
// Attempt loopback request to editor to see if user just whitescreened themselves.
if ( $plugin ) {
$url = add_query_arg ( compact ( 'plugin' , 'file' ), admin_url ( 'plugin-editor.php' ) );
} elseif ( isset ( $stylesheet ) ) {
$url = add_query_arg (
array (
'theme' => $stylesheet ,
2017-12-01 00:11:00 +01:00
'file' => $file ,
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
),
admin_url ( 'theme-editor.php' )
);
} else {
$url = admin_url ();
}
2017-12-01 00:11:00 +01:00
$url = add_query_arg ( $scrape_params , $url );
$r = wp_remote_get ( $url , compact ( 'cookies' , 'headers' , 'timeout' ) );
$body = wp_remote_retrieve_body ( $r );
2017-10-10 07:27:49 +02:00
$scrape_result_position = strpos ( $body , $needle_start );
$loopback_request_failure = array (
2017-12-01 00:11:00 +01:00
'code' => 'loopback_request_failed' ,
2017-10-10 07:27:49 +02:00
'message' => __ ( 'Unable to communicate back with site to check for fatal errors, so the PHP change was reverted. You will need to upload your PHP file change by some other means, such as by using SFTP.' ),
);
2017-12-01 00:11:00 +01:00
$json_parse_failure = array (
2017-10-10 07:27:49 +02:00
'code' => 'json_parse_error' ,
);
$result = null ;
if ( false === $scrape_result_position ) {
$result = $loopback_request_failure ;
} else {
$error_output = substr ( $body , $scrape_result_position + strlen ( $needle_start ) );
$error_output = substr ( $error_output , 0 , strpos ( $error_output , $needle_end ) );
2017-12-01 00:11:00 +01:00
$result = json_decode ( trim ( $error_output ), true );
2017-10-10 07:27:49 +02:00
if ( empty ( $result ) ) {
$result = $json_parse_failure ;
}
}
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
// Try making request to homepage as well to see if visitors have been whitescreened.
2017-10-10 07:27:49 +02:00
if ( true === $result ) {
2017-12-01 00:11:00 +01:00
$url = home_url ( '/' );
$url = add_query_arg ( $scrape_params , $url );
$r = wp_remote_get ( $url , compact ( 'cookies' , 'headers' , 'timeout' ) );
$body = wp_remote_retrieve_body ( $r );
2017-10-10 07:27:49 +02:00
$scrape_result_position = strpos ( $body , $needle_start );
if ( false === $scrape_result_position ) {
$result = $loopback_request_failure ;
} else {
$error_output = substr ( $body , $scrape_result_position + strlen ( $needle_start ) );
$error_output = substr ( $error_output , 0 , strpos ( $error_output , $needle_end ) );
2017-12-01 00:11:00 +01:00
$result = json_decode ( trim ( $error_output ), true );
2017-10-10 07:27:49 +02:00
if ( empty ( $result ) ) {
$result = $json_parse_failure ;
}
}
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
}
delete_transient ( $transient );
2017-10-10 07:27:49 +02:00
if ( true !== $result ) {
// Roll-back file change.
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
file_put_contents ( $real_file , $previous_content );
if ( function_exists ( 'opcache_invalidate' ) ) {
opcache_invalidate ( $real_file , true );
}
2017-10-10 07:27:49 +02:00
if ( ! isset ( $result [ 'message' ] ) ) {
2018-02-19 03:13:32 +01:00
$message = __ ( 'Something went wrong.' );
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
} else {
2017-10-10 07:27:49 +02:00
$message = $result [ 'message' ];
unset ( $result [ 'message' ] );
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
}
2017-10-10 07:27:49 +02:00
return new WP_Error ( 'php_error' , $message , $result );
File Editors: Introduce sandboxed live editing of PHP files with rollbacks for both themes and plugins.
* Edits to active plugins which cause PHP fatal errors will no longer auto-deactivate the plugin. Supersedes #39766.
* Introduce sandboxed PHP file edits for active themes, preventing accidental whitescreening of a user's site when introducing a fatal error.
* After writing a change to a PHP file for an active theme or plugin, perform loopback requests on the file editor admin screens and the homepage to check for fatal errors. If a fatal error is encountered, roll back the edited file and display the error to the user to fix and try again.
* Introduce a secure way to scrape PHP fatal errors from a site via `wp_start_scraping_edited_file_errors()` and `wp_finalize_scraping_edited_file_errors()`.
* Moves file modifications from `theme-editor.php` and `plugin-editor.php` to common `wp_edit_theme_plugin_file()` function.
* Refactor themes and plugin editors to submit file changes via Ajax instead of doing full page refreshes when JS is available.
* Use `get` method for theme/plugin dropdowns.
* Improve styling of plugin editors, including width of plugin/theme dropdowns.
* Improve notices API for theme/plugin editor JS component.
* Strip common base directory from plugin file list. See #24048.
* Factor out functions to list editable file types in `wp_get_theme_file_editable_extensions()` and `wp_get_plugin_file_editable_extensions()`.
* Scroll to line in editor that has linting error when attempting to save. See #41886.
* Add checkbox to dismiss lint errors to proceed with saving. See #41887.
* Only style the Update File button as disabled instead of actually disabling it for accessibility reasons.
* Ensure that value from CodeMirror is used instead of `textarea` when CodeMirror is present.
* Add "Are you sure?" check when leaving editor when there are unsaved changes.
Supersedes [41560].
See #39766, #24048, #41886.
Props westonruter, Clorith, melchoyce, johnbillion, jjj, jdgrimes, azaozz.
Fixes #21622, #41887.
Built from https://develop.svn.wordpress.org/trunk@41721
git-svn-id: http://core.svn.wordpress.org/trunk@41555 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-10-04 02:20:45 +02:00
}
}
if ( $theme instanceof WP_Theme ) {
$theme -> cache_delete ();
}
return true ;
}
2008-10-02 03:03:26 +02:00
/**
2009-11-06 00:03:48 +01:00
* Returns a filename of a Temporary unique file .
* Please note that the calling function must unlink () this itself .
2008-10-02 03:03:26 +02:00
*
2009-11-06 00:03:48 +01:00
* The filename is based off the passed parameter or defaults to the current unix timestamp ,
2011-12-14 18:36:38 +01:00
* while the directory can either be passed as well , or by leaving it blank , default to a writable temporary directory .
2008-10-02 03:03:26 +02:00
*
2009-11-06 00:03:48 +01:00
* @ since 2.6 . 0
*
2014-12-06 22:24:45 +01:00
* @ param string $filename Optional . Filename to base the Unique file off . Default empty .
* @ param string $dir Optional . Directory to store the file in . Default empty .
2009-11-06 00:03:48 +01:00
* @ return string a writable filename
2008-10-02 03:03:26 +02:00
*/
2015-03-31 04:11:26 +02:00
function wp_tempnam ( $filename = '' , $dir = '' ) {
if ( empty ( $dir ) ) {
2008-04-25 23:34:54 +02:00
$dir = get_temp_dir ();
2015-03-31 04:11:26 +02:00
}
2016-07-25 17:28:29 +02:00
if ( empty ( $filename ) || '.' == $filename || '/' == $filename || '\\' == $filename ) {
2017-11-24 04:05:50 +01:00
$filename = uniqid ();
2015-03-31 04:11:26 +02:00
}
// Use the basename of the given file without the extension as the name for the temporary directory
$temp_filename = basename ( $filename );
$temp_filename = preg_replace ( '|\.[^.]*$|' , '' , $temp_filename );
2008-04-25 23:34:54 +02:00
2015-09-16 14:46:28 +02:00
// If the folder is falsey, use its parent directory name instead.
2015-03-31 04:11:26 +02:00
if ( ! $temp_filename ) {
return wp_tempnam ( dirname ( $filename ), $dir );
}
2015-11-16 06:33:25 +01:00
// Suffix some random data to avoid filename conflicts
$temp_filename .= '-' . wp_generate_password ( 6 , false );
2015-03-31 04:11:26 +02:00
$temp_filename .= '.tmp' ;
2017-12-01 00:11:00 +01:00
$temp_filename = $dir . wp_unique_filename ( $dir , $temp_filename );
2015-11-16 06:33:25 +01:00
$fp = @ fopen ( $temp_filename , 'x' );
if ( ! $fp && is_writable ( $dir ) && file_exists ( $temp_filename ) ) {
return wp_tempnam ( $filename , $dir );
}
if ( $fp ) {
fclose ( $fp );
}
2015-03-31 04:11:26 +02:00
return $temp_filename ;
2008-04-25 23:34:54 +02:00
}
2008-10-02 03:03:26 +02:00
/**
2017-10-25 00:50:49 +02:00
* Makes sure that the file that was requested to be edited is allowed to be edited .
2010-10-28 00:24:06 +02:00
*
2017-10-25 00:50:49 +02:00
* Function will die if you are not allowed to edit the file .
2008-10-02 03:03:26 +02:00
*
2010-10-28 00:24:06 +02:00
* @ since 1.5 . 0
2008-10-02 03:03:26 +02:00
*
2018-02-09 18:26:31 +01:00
* @ param string $file File the user is attempting to edit .
* @ param string [] $allowed_files Optional . Array of allowed files to edit . `$file` must match an entry exactly .
* @ return string | void Returns the file name on success , dies on failure .
2008-10-02 03:03:26 +02:00
*/
2017-10-25 01:15:49 +02:00
function validate_file_to_edit ( $file , $allowed_files = array () ) {
2007-05-28 02:04:33 +02:00
$code = validate_file ( $file , $allowed_files );
2017-12-01 00:11:00 +01:00
if ( ! $code ) {
2007-05-28 02:04:33 +02:00
return $file ;
2017-12-01 00:11:00 +01:00
}
2007-05-28 02:04:33 +02:00
switch ( $code ) {
2017-12-01 00:11:00 +01:00
case 1 :
2014-02-21 15:46:14 +01:00
wp_die ( __ ( 'Sorry, that file cannot be edited.' ) );
2007-05-28 02:04:33 +02:00
2017-12-01 00:11:00 +01:00
// case 2 :
// wp_die( __('Sorry, can’t call files with their real path.' ));
2007-05-28 02:04:33 +02:00
2017-12-01 00:11:00 +01:00
case 3 :
2014-02-21 15:46:14 +01:00
wp_die ( __ ( 'Sorry, that file cannot be edited.' ) );
2007-05-28 02:04:33 +02:00
}
}
2008-10-02 03:03:26 +02:00
/**
2010-10-28 00:24:06 +02:00
* Handle PHP uploads in WordPress , sanitizing file names , checking extensions for mime type ,
* and moving the file to the appropriate directory within the uploads directory .
2008-10-02 03:03:26 +02:00
*
2016-02-03 21:19:25 +01:00
* @ access private
2014-07-17 20:58:44 +02:00
* @ since 4.0 . 0
2008-10-02 03:03:26 +02:00
*
2014-07-17 20:58:44 +02:00
* @ see wp_handle_upload_error
*
2018-02-09 18:26:31 +01:00
* @ param string [] $file Reference to a single element of `$_FILES` . Call the function once for each uploaded file .
* @ param string [] | false $overrides An associative array of names => values to override default variables . Default false .
* @ param string $time Time formatted in 'yyyy/mm' .
* @ param string $action Expected value for `$_POST['action']` .
* @ return string [] On success , returns an associative array of file attributes . On failure , returns
* `$overrides['upload_error_handler'](&$file, $message )` or `array( 'error'=>$message )` .
2015-12-12 16:37:28 +01:00
*/
2014-07-17 20:58:44 +02:00
function _wp_handle_upload ( & $file , $overrides , $time , $action ) {
2007-05-28 02:04:33 +02:00
// The default error handler.
2010-02-22 17:54:51 +01:00
if ( ! function_exists ( 'wp_handle_upload_error' ) ) {
2007-05-28 02:04:33 +02:00
function wp_handle_upload_error ( & $file , $message ) {
2014-07-17 20:58:44 +02:00
return array ( 'error' => $message );
2007-05-28 02:04:33 +02:00
}
}
2014-03-24 03:45:15 +01:00
/**
2016-05-22 20:01:30 +02:00
* Filters the data for a file before it is uploaded to WordPress .
2014-03-24 03:45:15 +01:00
*
2014-11-30 12:28:24 +01:00
* The dynamic portion of the hook name , `$action` , refers to the post action .
*
* @ since 2.9 . 0 as 'wp_handle_upload_prefilter' .
* @ since 4.0 . 0 Converted to a dynamic hook with `$action` .
2014-03-24 03:45:15 +01:00
*
2018-02-09 18:26:31 +01:00
* @ param string [] $file An array of data for a single file .
2014-03-24 03:45:15 +01:00
*/
2014-07-17 20:58:44 +02:00
$file = apply_filters ( " { $action } _prefilter " , $file );
2009-11-05 15:24:20 +01:00
2007-05-28 02:04:33 +02:00
// You may define your own function and pass the name in $overrides['upload_error_handler']
$upload_error_handler = 'wp_handle_upload_error' ;
2014-05-16 18:10:38 +02:00
if ( isset ( $overrides [ 'upload_error_handler' ] ) ) {
$upload_error_handler = $overrides [ 'upload_error_handler' ];
}
2007-05-28 02:04:33 +02:00
2011-12-14 00:45:31 +01:00
// You may have had one or more 'wp_handle_upload_prefilter' functions error out the file. Handle that gracefully.
2014-07-17 20:58:44 +02:00
if ( isset ( $file [ 'error' ] ) && ! is_numeric ( $file [ 'error' ] ) && $file [ 'error' ] ) {
2016-08-09 23:54:30 +02:00
return call_user_func_array ( $upload_error_handler , array ( & $file , $file [ 'error' ] ) );
2014-07-17 20:58:44 +02:00
}
2009-11-05 15:24:20 +01:00
2014-05-16 18:10:38 +02:00
// Install user overrides. Did we mention that this voids your warranty?
2008-11-15 00:01:16 +01:00
// You may define your own function and pass the name in $overrides['unique_filename_callback']
$unique_filename_callback = null ;
2014-05-16 18:10:38 +02:00
if ( isset ( $overrides [ 'unique_filename_callback' ] ) ) {
$unique_filename_callback = $overrides [ 'unique_filename_callback' ];
}
2008-11-15 00:01:16 +01:00
2014-07-17 11:14:16 +02:00
/*
* This may not have orignially been intended to be overrideable ,
* but historically has been .
*/
2014-05-16 18:10:38 +02:00
if ( isset ( $overrides [ 'upload_error_strings' ] ) ) {
$upload_error_strings = $overrides [ 'upload_error_strings' ];
2014-07-17 20:58:44 +02:00
} else {
// Courtesy of php.net, the strings that describe the error indicated in $_FILES[{form field}]['error'].
$upload_error_strings = array (
false ,
__ ( 'The uploaded file exceeds the upload_max_filesize directive in php.ini.' ),
__ ( 'The uploaded file exceeds the MAX_FILE_SIZE directive that was specified in the HTML form.' ),
__ ( 'The uploaded file was only partially uploaded.' ),
__ ( 'No file was uploaded.' ),
'' ,
__ ( 'Missing a temporary folder.' ),
__ ( 'Failed to write file to disk.' ),
2017-12-01 00:11:00 +01:00
__ ( 'File upload stopped by extension.' ),
2014-07-17 20:58:44 +02:00
);
2014-05-16 18:10:38 +02:00
}
2011-07-21 19:46:01 +02:00
// All tests are on by default. Most can be turned off by $overrides[{test_name}] = false;
2014-05-16 18:10:38 +02:00
$test_form = isset ( $overrides [ 'test_form' ] ) ? $overrides [ 'test_form' ] : true ;
$test_size = isset ( $overrides [ 'test_size' ] ) ? $overrides [ 'test_size' ] : true ;
2007-05-28 02:04:33 +02:00
2014-07-17 11:14:16 +02:00
// If you override this, you must provide $ext and $type!!
2014-05-16 18:10:38 +02:00
$test_type = isset ( $overrides [ 'test_type' ] ) ? $overrides [ 'test_type' ] : true ;
2017-12-01 00:11:00 +01:00
$mimes = isset ( $overrides [ 'mimes' ] ) ? $overrides [ 'mimes' ] : false ;
2007-05-28 02:04:33 +02:00
// A correct form post will pass this test.
2014-07-17 20:58:44 +02:00
if ( $test_form && ( ! isset ( $_POST [ 'action' ] ) || ( $_POST [ 'action' ] != $action ) ) ) {
2016-08-09 23:54:30 +02:00
return call_user_func_array ( $upload_error_handler , array ( & $file , __ ( 'Invalid form submission.' ) ) );
2014-05-16 18:10:38 +02:00
}
2007-05-28 02:04:33 +02:00
// A successful upload will pass this test. It makes no sense to override this one.
2014-02-27 22:16:15 +01:00
if ( isset ( $file [ 'error' ] ) && $file [ 'error' ] > 0 ) {
2016-08-09 23:54:30 +02:00
return call_user_func_array ( $upload_error_handler , array ( & $file , $upload_error_strings [ $file [ 'error' ] ] ) );
2014-02-27 22:16:15 +01:00
}
2007-05-28 02:04:33 +02:00
2018-01-17 08:16:30 +01:00
// A properly uploaded file will pass this test. There should be no reason to override this one.
$test_uploaded_file = 'wp_handle_upload' === $action ? @ is_uploaded_file ( $file [ 'tmp_name' ] ) : @ is_readable ( $file [ 'tmp_name' ] );
if ( ! $test_uploaded_file ) {
return call_user_func_array ( $upload_error_handler , array ( & $file , __ ( 'Specified file failed upload test.' ) ) );
}
2014-07-17 20:58:44 +02:00
$test_file_size = 'wp_handle_upload' === $action ? $file [ 'size' ] : filesize ( $file [ 'tmp_name' ] );
2007-05-28 02:04:33 +02:00
// A non-empty file will pass this test.
2014-07-17 20:58:44 +02:00
if ( $test_size && ! ( $test_file_size > 0 ) ) {
if ( is_multisite () ) {
2010-02-22 17:54:51 +01:00
$error_msg = __ ( 'File is empty. Please upload something more substantial.' );
2014-07-17 20:58:44 +02:00
} else {
2010-02-22 17:54:51 +01:00
$error_msg = __ ( 'File is empty. Please upload something more substantial. This error could also be caused by uploads being disabled in your php.ini or by post_max_size being defined as smaller than upload_max_filesize in php.ini.' );
2014-07-17 20:58:44 +02:00
}
2016-08-09 23:54:30 +02:00
return call_user_func_array ( $upload_error_handler , array ( & $file , $error_msg ) );
2010-02-22 17:54:51 +01:00
}
2007-05-28 02:04:33 +02:00
// A correct MIME type will pass this test. Override $mimes or use the upload_mimes filter.
if ( $test_type ) {
2017-12-01 00:11:00 +01:00
$wp_filetype = wp_check_filetype_and_ext ( $file [ 'tmp_name' ], $file [ 'name' ], $mimes );
$ext = empty ( $wp_filetype [ 'ext' ] ) ? '' : $wp_filetype [ 'ext' ];
$type = empty ( $wp_filetype [ 'type' ] ) ? '' : $wp_filetype [ 'type' ];
2014-05-15 06:31:14 +02:00
$proper_filename = empty ( $wp_filetype [ 'proper_filename' ] ) ? '' : $wp_filetype [ 'proper_filename' ];
2007-05-28 02:04:33 +02:00
2010-05-15 06:47:03 +02:00
// Check to see if wp_check_filetype_and_ext() determined the filename was incorrect
2014-05-15 06:31:14 +02:00
if ( $proper_filename ) {
2010-05-15 06:47:03 +02:00
$file [ 'name' ] = $proper_filename ;
2014-05-15 06:31:14 +02:00
}
2017-12-01 00:11:00 +01:00
if ( ( ! $type || ! $ext ) && ! current_user_can ( 'unfiltered_upload' ) ) {
2016-08-09 23:54:30 +02:00
return call_user_func_array ( $upload_error_handler , array ( & $file , __ ( 'Sorry, this file type is not permitted for security reasons.' ) ) );
2014-05-15 06:31:14 +02:00
}
if ( ! $type ) {
2008-03-06 20:48:54 +01:00
$type = $file [ 'type' ];
2014-05-15 06:31:14 +02:00
}
2009-05-07 08:50:54 +02:00
} else {
$type = '' ;
2007-05-28 02:04:33 +02:00
}
2014-07-17 11:14:16 +02:00
/*
* A writable uploads dir will pass this test . Again , there ' s no point
* overriding this one .
*/
2014-07-17 20:58:44 +02:00
if ( ! ( ( $uploads = wp_upload_dir ( $time ) ) && false === $uploads [ 'error' ] ) ) {
2016-08-09 23:54:30 +02:00
return call_user_func_array ( $upload_error_handler , array ( & $file , $uploads [ 'error' ] ) );
2014-07-17 20:58:44 +02:00
}
2007-05-28 02:04:33 +02:00
2007-12-18 04:32:43 +01:00
$filename = wp_unique_filename ( $uploads [ 'path' ], $file [ 'name' ], $unique_filename_callback );
2007-05-28 02:04:33 +02:00
2014-07-17 11:14:16 +02:00
// Move the file to the uploads dir.
2011-07-29 10:59:35 +02:00
$new_file = $uploads [ 'path' ] . " / $filename " ;
2014-07-17 20:58:44 +02:00
2017-12-01 00:11:00 +01:00
/**
2017-08-16 23:59:43 +02:00
* Filters whether to short - circuit moving the uploaded file after passing all checks .
*
* If a non - null value is passed to the filter , moving the file and any related error
* reporting will be completely skipped .
*
* @ since 4.9 . 0
*
* @ param string $move_new_file If null ( default ) move the file after the upload .
* @ param string $file An array of data for a single file .
* @ param string $new_file Filename of the newly - uploaded file .
* @ param string $type File type .
*/
$move_new_file = apply_filters ( 'pre_move_uploaded_file' , null , $file , $new_file , $type );
if ( null === $move_new_file ) {
if ( 'wp_handle_upload' === $action ) {
$move_new_file = @ move_uploaded_file ( $file [ 'tmp_name' ], $new_file );
2014-07-17 20:58:44 +02:00
} else {
2017-08-16 23:59:43 +02:00
// use copy and unlink because rename breaks streams.
$move_new_file = @ copy ( $file [ 'tmp_name' ], $new_file );
unlink ( $file [ 'tmp_name' ] );
}
if ( false === $move_new_file ) {
if ( 0 === strpos ( $uploads [ 'basedir' ], ABSPATH ) ) {
$error_path = str_replace ( ABSPATH , '' , $uploads [ 'basedir' ] ) . $uploads [ 'subdir' ];
} else {
$error_path = basename ( $uploads [ 'basedir' ] ) . $uploads [ 'subdir' ];
}
2017-12-01 00:11:00 +01:00
return $upload_error_handler ( $file , sprintf ( __ ( 'The uploaded file could not be moved to %s.' ), $error_path ) );
2014-07-17 20:58:44 +02:00
}
2013-06-21 04:29:26 +02:00
}
2011-10-24 21:13:23 +02:00
2014-07-17 11:14:16 +02:00
// Set correct file permissions.
2017-12-01 00:11:00 +01:00
$stat = stat ( dirname ( $new_file ) );
2007-05-28 02:04:33 +02:00
$perms = $stat [ 'mode' ] & 0000666 ;
@ chmod ( $new_file , $perms );
2014-07-17 11:14:16 +02:00
// Compute the URL.
2007-05-28 02:04:33 +02:00
$url = $uploads [ 'url' ] . " / $filename " ;
2014-07-17 20:58:44 +02:00
if ( is_multisite () ) {
2010-02-04 19:57:32 +01:00
delete_transient ( 'dirsize_cache' );
2014-07-17 20:58:44 +02:00
}
2010-02-04 19:57:32 +01:00
2014-03-24 03:45:15 +01:00
/**
2016-05-22 20:01:30 +02:00
* Filters the data array for the uploaded file .
2014-03-24 03:45:15 +01:00
*
* @ since 2.1 . 0
*
* @ param array $upload {
* Array of upload data .
*
* @ type string $file Filename of the newly - uploaded file .
* @ type string $url URL of the uploaded file .
* @ type string $type File type .
* }
2014-07-17 20:58:44 +02:00
* @ param string $context The type of upload action . Values include 'upload' or 'sideload' .
2014-03-24 03:45:15 +01:00
*/
2017-12-01 00:11:00 +01:00
return apply_filters (
2018-08-17 03:51:36 +02:00
'wp_handle_upload' ,
array (
2017-12-01 00:11:00 +01:00
'file' => $new_file ,
'url' => $url ,
'type' => $type ,
2018-08-17 03:51:36 +02:00
),
'wp_handle_sideload' === $action ? 'sideload' : 'upload'
2017-12-01 00:11:00 +01:00
);
2016-01-21 21:27:26 +01:00
}
2008-10-02 03:03:26 +02:00
/**
2016-05-23 19:28:27 +02:00
* Wrapper for _wp_handle_upload () .
*
* Passes the { @ see 'wp_handle_upload' } action .
2008-10-02 03:03:26 +02:00
*
2014-07-17 20:58:44 +02:00
* @ since 2.0 . 0
*
* @ see _wp_handle_upload ()
2008-10-02 03:03:26 +02:00
*
2016-05-23 19:28:27 +02:00
* @ param array $file Reference to a single element of `$_FILES` . Call the function once for
2014-07-17 20:58:44 +02:00
* each uploaded file .
* @ param array | bool $overrides Optional . An associative array of names => values to override default
* variables . Default false .
* @ param string $time Optional . Time formatted in 'yyyy/mm' . Default null .
* @ return array On success , returns an associative array of file attributes . On failure , returns
* $overrides [ 'upload_error_handler' ]( & $file , $message ) or array ( 'error' => $message ) .
2008-10-02 03:03:26 +02:00
*/
2014-07-17 20:58:44 +02:00
function wp_handle_upload ( & $file , $overrides = false , $time = null ) {
/*
* $_POST [ 'action' ] must be set and its value must equal $overrides [ 'action' ]
* or this :
*/
$action = 'wp_handle_upload' ;
if ( isset ( $overrides [ 'action' ] ) ) {
$action = $overrides [ 'action' ];
2014-05-16 18:15:14 +02:00
}
2008-06-04 18:13:55 +02:00
2014-07-17 20:58:44 +02:00
return _wp_handle_upload ( $file , $overrides , $time , $action );
}
2008-11-15 19:10:35 +01:00
2014-07-17 20:58:44 +02:00
/**
2016-05-23 19:28:27 +02:00
* Wrapper for _wp_handle_upload () .
*
* Passes the { @ see 'wp_handle_sideload' } action .
2014-07-17 20:58:44 +02:00
*
* @ since 2.6 . 0
*
* @ see _wp_handle_upload ()
*
2016-05-23 19:28:27 +02:00
* @ param array $file An array similar to that of a PHP `$_FILES` POST array
2014-07-17 20:58:44 +02:00
* @ param array | bool $overrides Optional . An associative array of names => values to override default
* variables . Default false .
* @ param string $time Optional . Time formatted in 'yyyy/mm' . Default null .
* @ return array On success , returns an associative array of file attributes . On failure , returns
* $overrides [ 'upload_error_handler' ]( & $file , $message ) or array ( 'error' => $message ) .
*/
function wp_handle_sideload ( & $file , $overrides = false , $time = null ) {
/*
* $_POST [ 'action' ] must be set and its value must equal $overrides [ 'action' ]
* or this :
*/
2008-06-04 18:13:55 +02:00
$action = 'wp_handle_sideload' ;
2014-05-16 18:15:14 +02:00
if ( isset ( $overrides [ 'action' ] ) ) {
$action = $overrides [ 'action' ];
}
2014-07-17 20:58:44 +02:00
return _wp_handle_upload ( $file , $overrides , $time , $action );
2008-06-04 18:13:55 +02:00
}
2007-05-28 02:04:33 +02:00
2014-07-17 20:58:44 +02:00
2008-02-11 06:45:54 +01:00
/**
2018-03-04 20:50:31 +01:00
* Downloads a URL to a local temporary file using the WordPress HTTP API .
*
* Please note that the calling function must unlink () the file .
2008-10-02 03:03:26 +02:00
*
2009-11-06 00:03:48 +01:00
* @ since 2.5 . 0
2008-10-02 03:03:26 +02:00
*
2018-03-04 20:50:31 +01:00
* @ param string $url The URL of the file to download .
* @ param int $timeout The timeout for the request to download the file . Default 300 seconds .
* @ return string | WP_Error Filename on success , WP_Error on failure .
2008-10-02 03:03:26 +02:00
*/
2010-12-07 13:45:24 +01:00
function download_url ( $url , $timeout = 300 ) {
2008-02-11 06:45:54 +01:00
//WARNING: The file is not automatically deleted, The script must unlink() the file.
2017-12-01 00:11:00 +01:00
if ( ! $url ) {
return new WP_Error ( 'http_no_url' , __ ( 'Invalid URL Provided.' ) );
}
2008-02-11 06:45:54 +01:00
2016-05-31 04:21:29 +02:00
$url_filename = basename ( parse_url ( $url , PHP_URL_PATH ) );
$tmpfname = wp_tempnam ( $url_filename );
2017-12-01 00:11:00 +01:00
if ( ! $tmpfname ) {
return new WP_Error ( 'http_no_file' , __ ( 'Could not create Temporary file.' ) );
}
2008-02-11 06:45:54 +01:00
2017-12-01 00:11:00 +01:00
$response = wp_safe_remote_get (
2018-08-17 03:51:36 +02:00
$url ,
array (
2017-12-01 00:11:00 +01:00
'timeout' => $timeout ,
'stream' => true ,
'filename' => $tmpfname ,
)
);
2008-03-02 21:17:30 +01:00
2011-03-25 03:42:20 +01:00
if ( is_wp_error ( $response ) ) {
unlink ( $tmpfname );
2008-10-15 18:35:35 +02:00
return $response ;
}
2018-03-04 18:14:31 +01:00
$response_code = wp_remote_retrieve_response_code ( $response );
if ( 200 != $response_code ) {
$data = array (
'code' => $response_code ,
);
// Retrieve a sample of the response body for debugging purposes.
$tmpf = fopen ( $tmpfname , 'rb' );
if ( $tmpf ) {
/**
* Filters the maximum error response body size in `download_url()` .
*
* @ since 5.0 . 0
*
* @ see download_url ()
*
* @ param int $size The maximum error response body size . Default 1 KB .
*/
$response_size = apply_filters ( 'download_url_error_max_body_size' , KB_IN_BYTES );
$data [ 'body' ] = fread ( $tmpf , $response_size );
fclose ( $tmpf );
}
2011-03-25 03:42:20 +01:00
unlink ( $tmpfname );
2018-03-04 18:14:31 +01:00
return new WP_Error ( 'http_404' , trim ( wp_remote_retrieve_response_message ( $response ) ), $data );
2008-03-27 08:36:30 +01:00
}
2008-10-14 18:37:08 +02:00
2013-09-21 08:54:09 +02:00
$content_md5 = wp_remote_retrieve_header ( $response , 'content-md5' );
if ( $content_md5 ) {
$md5_check = verify_file_md5 ( $tmpfname , $content_md5 );
if ( is_wp_error ( $md5_check ) ) {
unlink ( $tmpfname );
return $md5_check ;
}
}
2008-02-11 06:45:54 +01:00
return $tmpfname ;
}
2013-09-21 08:54:09 +02:00
/**
2014-04-04 02:03:14 +02:00
* Calculates and compares the MD5 of a file to its expected value .
2013-09-21 08:54:09 +02:00
*
* @ since 3.7 . 0
*
2018-03-04 22:43:30 +01:00
* @ param string $filename The filename to check the MD5 of .
* @ param string $expected_md5 The expected MD5 of the file , either a base64 - encoded raw md5 ,
* or a hex - encoded md5 .
* @ return bool | WP_Error True on success , false when the MD5 format is unknown / unexpected ,
* WP_Error on failure .
2013-09-21 08:54:09 +02:00
*/
function verify_file_md5 ( $filename , $expected_md5 ) {
2017-12-01 00:11:00 +01:00
if ( 32 == strlen ( $expected_md5 ) ) {
2013-09-21 08:54:09 +02:00
$expected_raw_md5 = pack ( 'H*' , $expected_md5 );
2017-12-01 00:11:00 +01:00
} elseif ( 24 == strlen ( $expected_md5 ) ) {
2013-09-21 08:54:09 +02:00
$expected_raw_md5 = base64_decode ( $expected_md5 );
2017-12-01 00:11:00 +01:00
} else {
2013-09-21 08:54:09 +02:00
return false ; // unknown format
2017-12-01 00:11:00 +01:00
}
2013-09-21 08:54:09 +02:00
$file_md5 = md5_file ( $filename , true );
2017-12-01 00:11:00 +01:00
if ( $file_md5 === $expected_raw_md5 ) {
2013-09-21 08:54:09 +02:00
return true ;
2017-12-01 00:11:00 +01:00
}
2013-09-21 08:54:09 +02:00
return new WP_Error ( 'md5_mismatch' , sprintf ( __ ( 'The checksum of the file (%1$s) does not match the expected checksum value (%2$s).' ), bin2hex ( $file_md5 ), bin2hex ( $expected_raw_md5 ) ) );
}
2008-10-02 03:03:26 +02:00
/**
2018-03-04 22:43:30 +01:00
* Unzips a specified ZIP file to a location on the filesystem via the WordPress
* Filesystem Abstraction .
2008-10-02 03:03:26 +02:00
*
2018-03-04 22:43:30 +01:00
* Assumes that WP_Filesystem () has already been called and set up . Does not extract
* a root - level __MACOSX directory , if present .
*
* Attempts to increase the PHP memory limit to 256 M before uncompressing . However ,
* the most memory required shouldn ' t be much larger than the archive itself .
2008-10-02 03:03:26 +02:00
*
2009-11-06 00:03:48 +01:00
* @ since 2.5 . 0
*
2018-03-04 22:58:30 +01:00
* @ global WP_Filesystem_Base $wp_filesystem WordPress filesystem subclass .
2015-05-28 23:41:30 +02:00
*
2018-03-04 22:43:30 +01:00
* @ param string $file Full path and filename of ZIP archive .
* @ param string $to Full path on the filesystem to extract archive to .
* @ return true | WP_Error True on success , WP_Error on failure .
2008-10-02 03:03:26 +02:00
*/
2017-12-01 00:11:00 +01:00
function unzip_file ( $file , $to ) {
2008-02-11 06:45:54 +01:00
global $wp_filesystem ;
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem || ! is_object ( $wp_filesystem ) ) {
return new WP_Error ( 'fs_unavailable' , __ ( 'Could not access filesystem.' ) );
}
2008-03-02 21:17:30 +01:00
2016-07-08 16:37:30 +02:00
// Unzip can use a lot of memory, but not this much hopefully.
wp_raise_memory_limit ( 'admin' );
2008-11-11 20:11:48 +01:00
2010-01-22 12:02:09 +01:00
$needed_dirs = array ();
2017-12-01 00:11:00 +01:00
$to = trailingslashit ( $to );
2010-01-22 12:02:09 +01:00
// Determine any parent dir's needed (of the upgrade directory)
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem -> is_dir ( $to ) ) { //Only do parents if no children exist
$path = preg_split ( '![/\\\]!' , untrailingslashit ( $to ) );
for ( $i = count ( $path ); $i >= 0 ; $i -- ) {
if ( empty ( $path [ $i ] ) ) {
2008-09-13 20:06:20 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
2008-02-11 06:45:54 +01:00
2017-12-01 00:11:00 +01:00
$dir = implode ( '/' , array_slice ( $path , 0 , $i + 1 ) );
if ( preg_match ( '!^[a-z]:$!i' , $dir ) ) { // Skip it if it looks like a Windows Drive letter.
2010-01-22 12:02:09 +01:00
continue ;
2017-12-01 00:11:00 +01:00
}
2010-01-22 12:02:09 +01:00
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem -> is_dir ( $dir ) ) {
2010-01-22 12:02:09 +01:00
$needed_dirs [] = $dir ;
2017-12-01 00:11:00 +01:00
} else {
2010-01-22 12:02:09 +01:00
break ; // A folder exists, therefor, we dont need the check the levels below this
2017-12-01 00:11:00 +01:00
}
2008-08-07 21:15:04 +02:00
}
2008-02-11 06:45:54 +01:00
}
2010-01-22 12:02:09 +01:00
2014-03-24 03:45:15 +01:00
/**
2016-05-22 20:01:30 +02:00
* Filters whether to use ZipArchive to unzip archives .
2014-03-24 03:45:15 +01:00
*
* @ since 3.0 . 0
*
* @ param bool $ziparchive Whether to use ZipArchive . Default true .
*/
2015-09-20 05:52:25 +02:00
if ( class_exists ( 'ZipArchive' , false ) && apply_filters ( 'unzip_file_use_ziparchive' , true ) ) {
2017-12-01 00:11:00 +01:00
$result = _unzip_file_ziparchive ( $file , $to , $needed_dirs );
2010-02-19 11:59:32 +01:00
if ( true === $result ) {
return $result ;
2017-12-01 00:11:00 +01:00
} elseif ( is_wp_error ( $result ) ) {
if ( 'incompatible_archive' != $result -> get_error_code () ) {
2010-02-19 11:59:32 +01:00
return $result ;
2017-12-01 00:11:00 +01:00
}
2010-02-19 11:59:32 +01:00
}
}
// Fall through to PclZip if ZipArchive is not available, or encountered an error opening the file.
2017-12-01 00:11:00 +01:00
return _unzip_file_pclzip ( $file , $to , $needed_dirs );
2010-02-07 05:52:35 +01:00
}
2010-02-07 06:07:36 +01:00
/**
2018-03-04 22:43:30 +01:00
* Attempts to unzip an archive using the ZipArchive class .
*
* This function should not be called directly , use `unzip_file()` instead .
*
2010-02-07 06:07:36 +01:00
* Assumes that WP_Filesystem () has already been called and set up .
*
2010-03-26 20:13:36 +01:00
* @ since 3.0 . 0
2018-03-04 22:43:30 +01:00
* @ see unzip_file ()
2010-02-07 06:07:36 +01:00
* @ access private
*
2018-03-04 22:58:30 +01:00
* @ global WP_Filesystem_Base $wp_filesystem WordPress filesystem subclass .
2015-05-28 23:41:30 +02:00
*
2018-03-04 22:43:30 +01:00
* @ param string $file Full path and filename of ZIP archive .
* @ param string $to Full path on the filesystem to extract archive to .
2010-02-07 06:07:36 +01:00
* @ param array $needed_dirs A partial list of required folders needed to be created .
2018-03-04 22:43:30 +01:00
* @ return true | WP_Error True on success , WP_Error on failure .
2010-02-07 06:07:36 +01:00
*/
2017-12-01 00:11:00 +01:00
function _unzip_file_ziparchive ( $file , $to , $needed_dirs = array () ) {
2010-02-07 05:52:35 +01:00
global $wp_filesystem ;
$z = new ZipArchive ();
2010-02-07 22:28:05 +01:00
2013-10-14 23:55:09 +02:00
$zopen = $z -> open ( $file , ZIPARCHIVE :: CHECKCONS );
2017-12-01 00:11:00 +01:00
if ( true !== $zopen ) {
2013-10-14 23:55:09 +02:00
return new WP_Error ( 'incompatible_archive' , __ ( 'Incompatible Archive.' ), array ( 'ziparchive_error' => $zopen ) );
2017-12-01 00:11:00 +01:00
}
2010-02-07 05:52:35 +01:00
2013-10-14 22:15:09 +02:00
$uncompressed_size = 0 ;
2010-02-07 05:52:35 +01:00
for ( $i = 0 ; $i < $z -> numFiles ; $i ++ ) {
2017-12-01 00:11:00 +01:00
if ( ! $info = $z -> statIndex ( $i ) ) {
2013-10-11 18:06:11 +02:00
return new WP_Error ( 'stat_failed_ziparchive' , __ ( 'Could not retrieve file from archive.' ) );
2017-12-01 00:11:00 +01:00
}
2010-02-07 05:52:35 +01:00
2017-12-01 00:11:00 +01:00
if ( '__MACOSX/' === substr ( $info [ 'name' ], 0 , 9 ) ) { // Skip the OS X-created __MACOSX directory
2010-05-03 01:24:36 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
2010-05-03 01:24:36 +02:00
2017-10-25 01:11:50 +02:00
// Don't extract invalid files:
2017-09-19 16:36:47 +02:00
if ( 0 !== validate_file ( $info [ 'name' ] ) ) {
2017-10-25 01:11:50 +02:00
continue ;
2017-09-19 16:36:47 +02:00
}
2013-10-14 22:15:09 +02:00
$uncompressed_size += $info [ 'size' ];
2016-05-12 14:40:28 +02:00
if ( '/' === substr ( $info [ 'name' ], - 1 ) ) {
// Directory.
$needed_dirs [] = $to . untrailingslashit ( $info [ 'name' ] );
} elseif ( '.' !== $dirname = dirname ( $info [ 'name' ] ) ) {
// Path to a file.
$needed_dirs [] = $to . untrailingslashit ( $dirname );
}
2010-02-07 05:52:35 +01:00
}
2010-02-08 19:02:23 +01:00
2013-10-14 22:58:09 +02:00
/*
* disk_free_space () could return false . Assume that any falsey value is an error .
* A disk that has zero free bytes has bigger problems .
* Require we have enough space to unzip the file and copy its contents , with a 10 % buffer .
*/
2017-05-06 16:30:40 +02:00
if ( wp_doing_cron () ) {
2013-10-25 00:59:29 +02:00
$available_space = @ disk_free_space ( WP_CONTENT_DIR );
2017-12-01 00:11:00 +01:00
if ( $available_space && ( $uncompressed_size * 2.1 ) > $available_space ) {
2013-10-25 00:59:29 +02:00
return new WP_Error ( 'disk_full_unzip_file' , __ ( 'Could not copy files. You may have run out of disk space.' ), compact ( 'uncompressed_size' , 'available_space' ) );
2017-12-01 00:11:00 +01:00
}
2013-10-25 00:59:29 +02:00
}
2013-10-14 22:15:09 +02:00
2017-12-01 00:11:00 +01:00
$needed_dirs = array_unique ( $needed_dirs );
2010-05-23 07:56:31 +02:00
foreach ( $needed_dirs as $dir ) {
2010-05-26 04:42:15 +02:00
// Check the parent folders of the folders all exist within the creation array.
2017-12-01 00:11:00 +01:00
if ( untrailingslashit ( $to ) == $dir ) { // Skip over the working directory, We know this exists (or will exist)
2010-05-23 07:56:31 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
if ( strpos ( $dir , $to ) === false ) { // If the directory is not within the working directory, Skip it
2010-06-07 13:19:51 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
2010-05-23 07:56:31 +02:00
2017-12-01 00:11:00 +01:00
$parent_folder = dirname ( $dir );
while ( ! empty ( $parent_folder ) && untrailingslashit ( $to ) != $parent_folder && ! in_array ( $parent_folder , $needed_dirs ) ) {
2010-05-23 07:56:31 +02:00
$needed_dirs [] = $parent_folder ;
2017-12-01 00:11:00 +01:00
$parent_folder = dirname ( $parent_folder );
2010-05-23 07:56:31 +02:00
}
}
2017-12-01 00:11:00 +01:00
asort ( $needed_dirs );
2010-02-08 19:02:23 +01:00
2010-02-07 05:52:35 +01:00
// Create those directories if need be:
foreach ( $needed_dirs as $_dir ) {
2015-03-31 04:11:26 +02:00
// Only check to see if the Dir exists upon creation failure. Less I/O this way.
if ( ! $wp_filesystem -> mkdir ( $_dir , FS_CHMOD_DIR ) && ! $wp_filesystem -> is_dir ( $_dir ) ) {
2013-10-15 00:25:08 +02:00
return new WP_Error ( 'mkdir_failed_ziparchive' , __ ( 'Could not create directory.' ), substr ( $_dir , strlen ( $to ) ) );
2015-03-31 04:11:26 +02:00
}
2010-02-07 05:52:35 +01:00
}
2017-12-01 00:11:00 +01:00
unset ( $needed_dirs );
2010-02-08 19:02:23 +01:00
2010-02-07 05:52:35 +01:00
for ( $i = 0 ; $i < $z -> numFiles ; $i ++ ) {
2017-12-01 00:11:00 +01:00
if ( ! $info = $z -> statIndex ( $i ) ) {
2013-10-11 18:06:11 +02:00
return new WP_Error ( 'stat_failed_ziparchive' , __ ( 'Could not retrieve file from archive.' ) );
2017-12-01 00:11:00 +01:00
}
2010-02-07 05:52:35 +01:00
2017-12-01 00:11:00 +01:00
if ( '/' == substr ( $info [ 'name' ], - 1 ) ) { // directory
2010-02-07 05:52:35 +01:00
continue ;
2017-12-01 00:11:00 +01:00
}
2010-02-07 05:52:35 +01:00
2017-12-01 00:11:00 +01:00
if ( '__MACOSX/' === substr ( $info [ 'name' ], 0 , 9 ) ) { // Don't extract the OS X-created __MACOSX directory files
2010-05-03 22:26:11 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
2010-05-03 01:24:36 +02:00
2017-10-25 01:11:50 +02:00
// Don't extract invalid files:
if ( 0 !== validate_file ( $info [ 'name' ] ) ) {
continue ;
}
2017-12-01 00:11:00 +01:00
$contents = $z -> getFromIndex ( $i );
if ( false === $contents ) {
2013-10-11 18:06:11 +02:00
return new WP_Error ( 'extract_failed_ziparchive' , __ ( 'Could not extract file from archive.' ), $info [ 'name' ] );
2017-12-01 00:11:00 +01:00
}
2010-02-07 06:02:24 +01:00
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem -> put_contents ( $to . $info [ 'name' ], $contents , FS_CHMOD_FILE ) ) {
2013-10-15 00:25:08 +02:00
return new WP_Error ( 'copy_failed_ziparchive' , __ ( 'Could not copy file.' ), $info [ 'name' ] );
2017-12-01 00:11:00 +01:00
}
2010-02-07 05:52:35 +01:00
}
2010-02-19 11:59:32 +01:00
$z -> close ();
2010-02-07 05:52:35 +01:00
return true ;
}
2010-02-07 06:07:36 +01:00
/**
2018-03-04 22:43:30 +01:00
* Attempts to unzip an archive using the PclZip library .
*
* This function should not be called directly , use `unzip_file()` instead .
*
2010-02-07 06:07:36 +01:00
* Assumes that WP_Filesystem () has already been called and set up .
*
2010-03-26 20:13:36 +01:00
* @ since 3.0 . 0
2018-03-04 22:43:30 +01:00
* @ see unzip_file ()
2010-02-07 06:07:36 +01:00
* @ access private
*
2018-03-04 22:58:30 +01:00
* @ global WP_Filesystem_Base $wp_filesystem WordPress filesystem subclass .
2015-05-28 23:41:30 +02:00
*
2018-03-04 22:43:30 +01:00
* @ param string $file Full path and filename of ZIP archive .
* @ param string $to Full path on the filesystem to extract archive to .
2010-02-07 06:07:36 +01:00
* @ param array $needed_dirs A partial list of required folders needed to be created .
2018-03-04 22:43:30 +01:00
* @ return true | WP_Error True on success , WP_Error on failure .
2010-02-07 06:07:36 +01:00
*/
2017-12-01 00:11:00 +01:00
function _unzip_file_pclzip ( $file , $to , $needed_dirs = array () ) {
2010-02-07 05:52:35 +01:00
global $wp_filesystem ;
2013-09-11 10:09:08 +02:00
mbstring_binary_safe_encoding ();
2011-04-03 14:32:06 +02:00
2017-12-01 00:11:00 +01:00
require_once ( ABSPATH . 'wp-admin/includes/class-pclzip.php' );
2016-08-31 18:31:29 +02:00
2017-12-01 00:11:00 +01:00
$archive = new PclZip ( $file );
2010-02-07 05:52:35 +01:00
2017-12-01 00:11:00 +01:00
$archive_files = $archive -> extract ( PCLZIP_OPT_EXTRACT_AS_STRING );
2011-04-03 14:32:06 +02:00
2013-09-11 10:09:08 +02:00
reset_mbstring_encoding ();
2011-04-03 14:32:06 +02:00
2010-02-07 05:52:35 +01:00
// Is the archive valid?
2017-12-01 00:11:00 +01:00
if ( ! is_array ( $archive_files ) ) {
return new WP_Error ( 'incompatible_archive' , __ ( 'Incompatible Archive.' ), $archive -> errorInfo ( true ) );
}
2010-02-07 05:52:35 +01:00
2017-12-01 00:11:00 +01:00
if ( 0 == count ( $archive_files ) ) {
2013-10-11 18:06:11 +02:00
return new WP_Error ( 'empty_archive_pclzip' , __ ( 'Empty archive.' ) );
2017-12-01 00:11:00 +01:00
}
2010-02-07 05:52:35 +01:00
2013-10-14 22:15:09 +02:00
$uncompressed_size = 0 ;
2010-01-22 12:02:09 +01:00
// Determine any children directories needed (From within the archive)
2010-05-03 01:24:36 +02:00
foreach ( $archive_files as $file ) {
2017-12-01 00:11:00 +01:00
if ( '__MACOSX/' === substr ( $file [ 'filename' ], 0 , 9 ) ) { // Skip the OS X-created __MACOSX directory
2010-05-03 01:24:36 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
2010-05-03 22:26:11 +02:00
2013-10-14 22:15:09 +02:00
$uncompressed_size += $file [ 'size' ];
2017-12-01 00:11:00 +01:00
$needed_dirs [] = $to . untrailingslashit ( $file [ 'folder' ] ? $file [ 'filename' ] : dirname ( $file [ 'filename' ] ) );
2010-05-03 01:24:36 +02:00
}
2010-01-22 12:02:09 +01:00
2013-10-14 22:58:09 +02:00
/*
* disk_free_space () could return false . Assume that any falsey value is an error .
* A disk that has zero free bytes has bigger problems .
* Require we have enough space to unzip the file and copy its contents , with a 10 % buffer .
*/
2017-05-06 16:30:40 +02:00
if ( wp_doing_cron () ) {
2013-10-25 00:59:29 +02:00
$available_space = @ disk_free_space ( WP_CONTENT_DIR );
2017-12-01 00:11:00 +01:00
if ( $available_space && ( $uncompressed_size * 2.1 ) > $available_space ) {
2013-10-25 00:59:29 +02:00
return new WP_Error ( 'disk_full_unzip_file' , __ ( 'Could not copy files. You may have run out of disk space.' ), compact ( 'uncompressed_size' , 'available_space' ) );
2017-12-01 00:11:00 +01:00
}
2013-10-25 00:59:29 +02:00
}
2013-10-14 22:15:09 +02:00
2017-12-01 00:11:00 +01:00
$needed_dirs = array_unique ( $needed_dirs );
2010-05-23 07:56:31 +02:00
foreach ( $needed_dirs as $dir ) {
2010-05-26 04:42:15 +02:00
// Check the parent folders of the folders all exist within the creation array.
2017-12-01 00:11:00 +01:00
if ( untrailingslashit ( $to ) == $dir ) { // Skip over the working directory, We know this exists (or will exist)
2010-05-23 07:56:31 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
if ( strpos ( $dir , $to ) === false ) { // If the directory is not within the working directory, Skip it
2010-06-07 13:19:51 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
2010-05-23 07:56:31 +02:00
2017-12-01 00:11:00 +01:00
$parent_folder = dirname ( $dir );
while ( ! empty ( $parent_folder ) && untrailingslashit ( $to ) != $parent_folder && ! in_array ( $parent_folder , $needed_dirs ) ) {
2010-05-23 07:56:31 +02:00
$needed_dirs [] = $parent_folder ;
2017-12-01 00:11:00 +01:00
$parent_folder = dirname ( $parent_folder );
2010-05-23 07:56:31 +02:00
}
}
2017-12-01 00:11:00 +01:00
asort ( $needed_dirs );
2010-01-22 12:02:09 +01:00
// Create those directories if need be:
foreach ( $needed_dirs as $_dir ) {
2013-10-15 23:24:09 +02:00
// Only check to see if the dir exists upon creation failure. Less I/O this way.
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem -> mkdir ( $_dir , FS_CHMOD_DIR ) && ! $wp_filesystem -> is_dir ( $_dir ) ) {
2013-10-15 00:25:08 +02:00
return new WP_Error ( 'mkdir_failed_pclzip' , __ ( 'Could not create directory.' ), substr ( $_dir , strlen ( $to ) ) );
2017-12-01 00:11:00 +01:00
}
2010-01-22 12:02:09 +01:00
}
2017-12-01 00:11:00 +01:00
unset ( $needed_dirs );
2010-01-22 12:02:09 +01:00
// Extract the files from the zip
foreach ( $archive_files as $file ) {
2017-12-01 00:11:00 +01:00
if ( $file [ 'folder' ] ) {
2010-01-22 12:02:09 +01:00
continue ;
2017-12-01 00:11:00 +01:00
}
2010-01-22 12:02:09 +01:00
2017-12-01 00:11:00 +01:00
if ( '__MACOSX/' === substr ( $file [ 'filename' ], 0 , 9 ) ) { // Don't extract the OS X-created __MACOSX directory files
2010-05-03 01:24:36 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
2010-05-03 01:24:36 +02:00
2017-10-25 01:11:50 +02:00
// Don't extract invalid files:
2017-09-19 16:36:47 +02:00
if ( 0 !== validate_file ( $file [ 'filename' ] ) ) {
2017-10-25 01:11:50 +02:00
continue ;
2017-09-19 16:36:47 +02:00
}
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem -> put_contents ( $to . $file [ 'filename' ], $file [ 'content' ], FS_CHMOD_FILE ) ) {
2013-10-15 00:25:08 +02:00
return new WP_Error ( 'copy_failed_pclzip' , __ ( 'Could not copy file.' ), $file [ 'filename' ] );
2017-12-01 00:11:00 +01:00
}
2010-01-22 12:02:09 +01:00
}
2008-03-01 22:20:23 +01:00
return true ;
2008-02-11 06:45:54 +01:00
}
2008-10-02 03:03:26 +02:00
/**
2018-03-04 22:43:30 +01:00
* Copies a directory from one location to another via the WordPress Filesystem
* Abstraction .
*
2009-11-06 00:03:48 +01:00
* Assumes that WP_Filesystem () has already been called and setup .
2008-10-02 03:03:26 +02:00
*
2009-11-06 00:03:48 +01:00
* @ since 2.5 . 0
2008-10-02 03:03:26 +02:00
*
2018-03-04 22:58:30 +01:00
* @ global WP_Filesystem_Base $wp_filesystem WordPress filesystem subclass .
2015-05-28 23:41:30 +02:00
*
2018-03-04 22:43:30 +01:00
* @ param string $from Source directory .
* @ param string $to Destination directory .
* @ param array $skip_list A list of files / folders to skip copying .
* @ return true | WP_Error True on success , WP_Error on failure .
2008-10-02 03:03:26 +02:00
*/
2017-12-01 00:11:00 +01:00
function copy_dir ( $from , $to , $skip_list = array () ) {
2008-02-11 06:45:54 +01:00
global $wp_filesystem ;
2017-12-01 00:11:00 +01:00
$dirlist = $wp_filesystem -> dirlist ( $from );
2008-02-11 06:45:54 +01:00
2017-12-01 00:11:00 +01:00
$from = trailingslashit ( $from );
$to = trailingslashit ( $to );
2008-02-11 06:45:54 +01:00
foreach ( ( array ) $dirlist as $filename => $fileinfo ) {
2017-12-01 00:11:00 +01:00
if ( in_array ( $filename , $skip_list ) ) {
2013-09-21 08:49:11 +02:00
continue ;
2017-12-01 00:11:00 +01:00
}
2011-03-31 15:28:36 +02:00
2008-03-01 22:20:23 +01:00
if ( 'f' == $fileinfo [ 'type' ] ) {
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem -> copy ( $from . $filename , $to . $filename , true , FS_CHMOD_FILE ) ) {
2008-11-03 18:16:41 +01:00
// If copy failed, chmod file to 0644 and try again.
2013-10-15 21:14:10 +02:00
$wp_filesystem -> chmod ( $to . $filename , FS_CHMOD_FILE );
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem -> copy ( $from . $filename , $to . $filename , true , FS_CHMOD_FILE ) ) {
2013-10-11 18:06:11 +02:00
return new WP_Error ( 'copy_failed_copy_dir' , __ ( 'Could not copy file.' ), $to . $filename );
2017-12-01 00:11:00 +01:00
}
2008-11-03 18:16:41 +01:00
}
2008-03-01 22:20:23 +01:00
} elseif ( 'd' == $fileinfo [ 'type' ] ) {
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem -> is_dir ( $to . $filename ) ) {
if ( ! $wp_filesystem -> mkdir ( $to . $filename , FS_CHMOD_DIR ) ) {
2013-10-11 18:06:11 +02:00
return new WP_Error ( 'mkdir_failed_copy_dir' , __ ( 'Could not create directory.' ), $to . $filename );
2017-12-01 00:11:00 +01:00
}
2008-08-09 00:49:35 +02:00
}
2013-09-21 08:49:11 +02:00
// generate the $sub_skip_list for the subdirectory as a sub-set of the existing $skip_list
$sub_skip_list = array ();
foreach ( $skip_list as $skip_item ) {
2017-12-01 00:11:00 +01:00
if ( 0 === strpos ( $skip_item , $filename . '/' ) ) {
2013-09-21 08:49:11 +02:00
$sub_skip_list [] = preg_replace ( '!^' . preg_quote ( $filename , '!' ) . '/!i' , '' , $skip_item );
2017-12-01 00:11:00 +01:00
}
2013-09-21 08:49:11 +02:00
}
2017-12-01 00:11:00 +01:00
$result = copy_dir ( $from . $filename , $to . $filename , $sub_skip_list );
if ( is_wp_error ( $result ) ) {
2008-05-29 19:29:32 +02:00
return $result ;
2017-12-01 00:11:00 +01:00
}
2008-02-11 06:45:54 +01:00
}
}
2009-11-06 00:03:48 +01:00
return true ;
2008-02-11 06:45:54 +01:00
}
2008-10-02 03:03:26 +02:00
/**
2009-11-06 00:03:48 +01:00
* Initialises and connects the WordPress Filesystem Abstraction classes .
2018-03-04 22:43:30 +01:00
*
2009-11-06 00:03:48 +01:00
* This function will include the chosen transport and attempt connecting .
2008-10-02 03:03:26 +02:00
*
2014-12-06 22:24:45 +01:00
* Plugins may add extra transports , And force WordPress to use them by returning
* the filename via the { @ see 'filesystem_method_file' } filter .
2008-10-02 03:03:26 +02:00
*
2009-11-06 00:03:48 +01:00
* @ since 2.5 . 0
*
2018-03-04 22:58:30 +01:00
* @ global WP_Filesystem_Base $wp_filesystem WordPress filesystem subclass .
2015-05-28 23:41:30 +02:00
*
2015-05-04 03:04:25 +02:00
* @ param array | false $args Optional . Connection args , These are passed directly to
* the `WP_Filesystem_*()` classes . Default false .
* @ param string | false $context Optional . Context for get_filesystem_method () . Default false .
* @ param bool $allow_relaxed_file_ownership Optional . Whether to allow Group / World writable . Default false .
2018-03-04 22:43:30 +01:00
* @ return bool | null True on success , false on failure , null if the filesystem method class file does not exist .
2008-10-02 03:03:26 +02:00
*/
2014-11-19 06:40:23 +01:00
function WP_Filesystem ( $args = false , $context = false , $allow_relaxed_file_ownership = false ) {
2008-02-11 06:45:54 +01:00
global $wp_filesystem ;
2017-12-01 00:11:00 +01:00
require_once ( ABSPATH . 'wp-admin/includes/class-wp-filesystem-base.php' );
2016-08-31 18:31:29 +02:00
2014-11-19 06:40:23 +01:00
$method = get_filesystem_method ( $args , $context , $allow_relaxed_file_ownership );
2008-05-05 19:06:29 +02:00
2017-12-01 00:11:00 +01:00
if ( ! $method ) {
2008-02-11 06:45:54 +01:00
return false ;
2017-12-01 00:11:00 +01:00
}
2008-02-11 06:45:54 +01:00
2016-08-31 18:31:29 +02:00
if ( ! class_exists ( " WP_Filesystem_ $method " ) ) {
2014-03-24 03:45:15 +01:00
/**
2016-05-22 20:01:30 +02:00
* Filters the path for a specific filesystem method class file .
2014-03-24 03:45:15 +01:00
*
* @ since 2.6 . 0
*
* @ see get_filesystem_method ()
*
* @ param string $path Path to the specific filesystem method class file .
* @ param string $method The filesystem method to use .
*/
$abstraction_file = apply_filters ( 'filesystem_method_file' , ABSPATH . 'wp-admin/includes/class-wp-filesystem-' . $method . '.php' , $method );
2017-12-01 00:11:00 +01:00
if ( ! file_exists ( $abstraction_file ) ) {
2009-05-30 19:14:07 +02:00
return ;
2017-12-01 00:11:00 +01:00
}
2009-09-14 16:03:32 +02:00
2017-12-01 00:11:00 +01:00
require_once ( $abstraction_file );
2009-05-30 19:14:07 +02:00
}
2016-08-31 18:31:29 +02:00
$method = " WP_Filesystem_ $method " ;
2008-02-11 06:45:54 +01:00
2017-12-01 00:11:00 +01:00
$wp_filesystem = new $method ( $args );
2008-02-11 06:45:54 +01:00
2009-08-15 14:01:04 +02:00
//Define the timeouts for the connections. Only available after the construct is called to allow for per-transport overriding of the default.
2017-12-01 00:11:00 +01:00
if ( ! defined ( 'FS_CONNECT_TIMEOUT' ) ) {
define ( 'FS_CONNECT_TIMEOUT' , 30 );
}
if ( ! defined ( 'FS_TIMEOUT' ) ) {
define ( 'FS_TIMEOUT' , 30 );
}
2009-08-15 14:01:04 +02:00
2018-02-27 03:31:31 +01:00
if ( is_wp_error ( $wp_filesystem -> errors ) && $wp_filesystem -> errors -> has_errors () ) {
2008-02-11 06:45:54 +01:00
return false ;
2017-12-01 00:11:00 +01:00
}
2008-02-11 06:45:54 +01:00
2017-12-01 00:11:00 +01:00
if ( ! $wp_filesystem -> connect () ) {
2011-09-03 16:18:10 +02:00
return false ; //There was an error connecting to the server.
2017-12-01 00:11:00 +01:00
}
2008-02-11 06:45:54 +01:00
2008-12-04 22:58:46 +01:00
// Set the permission constants if not already set.
2017-12-01 00:11:00 +01:00
if ( ! defined ( 'FS_CHMOD_DIR' ) ) {
define ( 'FS_CHMOD_DIR' , ( fileperms ( ABSPATH ) & 0777 | 0755 ) );
}
if ( ! defined ( 'FS_CHMOD_FILE' ) ) {
define ( 'FS_CHMOD_FILE' , ( fileperms ( ABSPATH . 'index.php' ) & 0777 | 0644 ) );
}
2008-12-04 22:58:46 +01:00
2008-02-11 06:45:54 +01:00
return true ;
}
2008-10-02 03:03:26 +02:00
/**
2015-03-25 17:32:28 +01:00
* Determines which method to use for reading , writing , modifying , or deleting
* files on the filesystem .
2014-11-24 06:19:23 +01:00
*
2015-03-25 17:32:28 +01:00
* The priority of the transports are : Direct , SSH2 , FTP PHP Extension , FTP Sockets
* ( Via Sockets class , or `fsockopen()` ) . Valid values for these are : 'direct' , 'ssh2' ,
* 'ftpext' or 'ftpsockets' .
2008-10-02 03:03:26 +02:00
*
2015-03-25 17:32:28 +01:00
* The return value can be overridden by defining the `FS_METHOD` constant in `wp-config.php` ,
* or filtering via { @ see 'filesystem_method' } .
2014-11-24 06:19:23 +01:00
*
2015-03-25 17:32:28 +01:00
* @ link https :// codex . wordpress . org / Editing_wp - config . php #WordPress_Upgrade_Constants
2014-11-24 06:19:23 +01:00
*
2015-03-25 17:32:28 +01:00
* Plugins may define a custom transport handler , See WP_Filesystem () .
2009-11-06 00:03:48 +01:00
*
* @ since 2.5 . 0
2008-10-02 03:03:26 +02:00
*
2015-09-26 01:58:25 +02:00
* @ global callable $_wp_filesystem_direct_method
2015-05-28 23:41:30 +02:00
*
2015-03-25 17:32:28 +01:00
* @ param array $args Optional . Connection details . Default empty array .
* @ param string $context Optional . Full path to the directory that is tested
2016-07-22 14:10:27 +02:00
* for being writable . Default empty .
2015-03-25 17:32:28 +01:00
* @ param bool $allow_relaxed_file_ownership Optional . Whether to allow Group / World writable .
* Default false .
2009-11-06 00:03:48 +01:00
* @ return string The transport to use , see description for valid return values .
2008-10-02 03:03:26 +02:00
*/
2016-07-22 14:10:27 +02:00
function get_filesystem_method ( $args = array (), $context = '' , $allow_relaxed_file_ownership = false ) {
2017-12-01 00:11:00 +01:00
$method = defined ( 'FS_METHOD' ) ? FS_METHOD : false ; // Please ensure that this is either 'direct', 'ssh2', 'ftpext' or 'ftpsockets'
2009-05-25 12:39:21 +02:00
2014-11-19 06:40:23 +01:00
if ( ! $context ) {
$context = WP_CONTENT_DIR ;
}
// If the directory doesn't exist (wp-content/languages) then use the parent directory as we'll create it.
if ( WP_LANG_DIR == $context && ! is_dir ( $context ) ) {
$context = dirname ( $context );
}
2013-10-16 06:15:09 +02:00
2014-11-19 06:40:23 +01:00
$context = trailingslashit ( $context );
if ( ! $method ) {
2013-10-16 06:15:09 +02:00
2017-11-24 04:05:50 +01:00
$temp_file_name = $context . 'temp-write-test-' . str_replace ( '.' , '-' , uniqid ( '' , true ) );
2017-12-01 00:11:00 +01:00
$temp_handle = @ fopen ( $temp_file_name , 'w' );
2009-05-27 02:56:32 +02:00
if ( $temp_handle ) {
2014-11-19 06:40:23 +01:00
// Attempt to determine the file owner of the WordPress files, and that of newly created files
$wp_file_owner = $temp_file_owner = false ;
2017-12-01 00:11:00 +01:00
if ( function_exists ( 'fileowner' ) ) {
$wp_file_owner = @ fileowner ( __FILE__ );
2014-11-19 06:40:23 +01:00
$temp_file_owner = @ fileowner ( $temp_file_name );
}
if ( $wp_file_owner !== false && $wp_file_owner === $temp_file_owner ) {
2015-01-08 06:03:23 +01:00
// WordPress is creating files as the same owner as the WordPress files,
2014-11-19 06:40:23 +01:00
// this means it's safe to modify & create new files via PHP.
2017-12-01 00:11:00 +01:00
$method = 'direct' ;
2014-12-15 15:08:23 +01:00
$GLOBALS [ '_wp_filesystem_direct_method' ] = 'file_owner' ;
2015-01-08 08:05:25 +01:00
} elseif ( $allow_relaxed_file_ownership ) {
2014-11-19 06:40:23 +01:00
// The $context directory is writable, and $allow_relaxed_file_ownership is set, this means we can modify files
// safely in this directory. This mode doesn't create new files, only alter existing ones.
2017-12-01 00:11:00 +01:00
$method = 'direct' ;
2014-12-15 15:08:23 +01:00
$GLOBALS [ '_wp_filesystem_direct_method' ] = 'relaxed_ownership' ;
2014-11-19 06:40:23 +01:00
}
2017-12-01 00:11:00 +01:00
@ fclose ( $temp_handle );
@ unlink ( $temp_file_name );
2009-05-27 02:56:32 +02:00
}
2017-12-01 00:11:00 +01:00
}
2008-02-11 06:45:54 +01:00
2017-12-01 00:11:00 +01:00
if ( ! $method && isset ( $args [ 'connection_type' ] ) && 'ssh' == $args [ 'connection_type' ] && extension_loaded ( 'ssh2' ) && function_exists ( 'stream_get_contents' ) ) {
$method = 'ssh2' ;
}
if ( ! $method && extension_loaded ( 'ftp' ) ) {
$method = 'ftpext' ;
}
if ( ! $method && ( extension_loaded ( 'sockets' ) || function_exists ( 'fsockopen' ) ) ) {
$method = 'ftpsockets' ; //Sockets: Socket extension; PHP Mode: FSockopen / fwrite / fread
}
2014-03-24 03:45:15 +01:00
/**
2016-05-22 20:01:30 +02:00
* Filters the filesystem method to use .
2014-03-24 03:45:15 +01:00
*
* @ since 2.6 . 0
*
2014-11-19 06:40:23 +01:00
* @ param string $method Filesystem method to return .
* @ param array $args An array of connection details for the method .
* @ param string $context Full path to the directory that is tested for being writable .
* @ param bool $allow_relaxed_file_ownership Whether to allow Group / World writable .
2014-03-24 03:45:15 +01:00
*/
2014-11-19 06:40:23 +01:00
return apply_filters ( 'filesystem_method' , $method , $args , $context , $allow_relaxed_file_ownership );
2008-02-11 06:45:54 +01:00
}
2008-10-02 03:03:26 +02:00
/**
2014-11-24 06:19:23 +01:00
* Displays a form to the user to request for their FTP / SSH details in order
* to connect to the filesystem .
*
2016-07-22 14:10:27 +02:00
* All chosen / entered details are saved , excluding the password .
2008-10-02 03:03:26 +02:00
*
2014-11-24 06:19:23 +01:00
* Hostnames may be in the form of hostname : portnumber ( eg : wordpress . org : 2467 )
* to specify an alternate FTP / SSH port .
2008-10-02 03:03:26 +02:00
*
2016-07-22 14:10:27 +02:00
* Plugins may override this form by returning true | false via the { @ see 'request_filesystem_credentials' } filter .
2009-11-06 00:03:48 +01:00
*
2016-07-22 14:10:27 +02:00
* @ since 2.5 . 0
* @ since 4.6 . 0 The `$context` parameter default changed from `false` to an empty string .
2014-11-24 06:19:23 +01:00
*
2015-10-21 05:51:24 +02:00
* @ global string $pagenow
*
2015-12-12 17:16:26 +01:00
* @ param string $form_post The URL to post the form to .
* @ param string $type Optional . Chosen type of filesystem . Default empty .
* @ param bool $error Optional . Whether the current request has failed to connect .
* Default false .
2016-07-22 14:10:27 +02:00
* @ param string $context Optional . Full path to the directory that is tested for being
* writable . Default empty .
* @ param array $extra_fields Optional . Extra `POST` fields to be checked for inclusion in
* the post . Default null .
* @ param bool $allow_relaxed_file_ownership Optional . Whether to allow Group / World writable . Default false .
2015-12-12 17:16:26 +01:00
*
2018-03-04 22:43:30 +01:00
* @ return bool True on success , false on failure .
2008-10-02 03:03:26 +02:00
*/
2016-07-22 14:10:27 +02:00
function request_filesystem_credentials ( $form_post , $type = '' , $error = false , $context = '' , $extra_fields = null , $allow_relaxed_file_ownership = false ) {
2015-10-21 05:51:24 +02:00
global $pagenow ;
2014-03-24 03:45:15 +01:00
/**
2016-05-22 20:01:30 +02:00
* Filters the filesystem credentials form output .
2014-03-24 03:45:15 +01:00
*
* Returning anything other than an empty string will effectively short - circuit
* output of the filesystem credentials form , returning that value instead .
*
* @ since 2.5 . 0
2016-07-22 14:10:27 +02:00
* @ since 4.6 . 0 The `$context` parameter default changed from `false` to an empty string .
2014-03-24 03:45:15 +01:00
*
2015-12-12 17:16:26 +01:00
* @ param mixed $output Form output to return instead . Default empty .
* @ param string $form_post The URL to post the form to .
* @ param string $type Chosen type of filesystem .
* @ param bool $error Whether the current request has failed to connect .
* Default false .
* @ param string $context Full path to the directory that is tested for
* being writable .
* @ param bool $allow_relaxed_file_ownership Whether to allow Group / World writable .
* Default false .
* @ param array $extra_fields Extra POST fields .
2014-03-24 03:45:15 +01:00
*/
2014-11-19 06:40:23 +01:00
$req_cred = apply_filters ( 'request_filesystem_credentials' , '' , $form_post , $type , $error , $context , $extra_fields , $allow_relaxed_file_ownership );
2017-12-01 00:11:00 +01:00
if ( '' !== $req_cred ) {
2008-08-04 23:01:09 +02:00
return $req_cred ;
2017-12-01 00:11:00 +01:00
}
2008-08-04 23:01:09 +02:00
2017-12-01 00:11:00 +01:00
if ( empty ( $type ) ) {
2014-11-19 06:40:23 +01:00
$type = get_filesystem_method ( array (), $context , $allow_relaxed_file_ownership );
}
2008-08-04 23:01:09 +02:00
2017-12-01 00:11:00 +01:00
if ( 'direct' == $type ) {
2008-08-04 23:01:09 +02:00
return true ;
2017-12-01 00:11:00 +01:00
}
2008-08-09 07:36:14 +02:00
2017-12-01 00:11:00 +01:00
if ( is_null ( $extra_fields ) ) {
2010-03-03 20:53:39 +01:00
$extra_fields = array ( 'version' , 'locale' );
2017-12-01 00:11:00 +01:00
}
2010-03-03 20:53:39 +01:00
2017-12-01 00:11:00 +01:00
$credentials = get_option (
2018-08-17 03:51:36 +02:00
'ftp_credentials' ,
array (
2017-12-01 00:11:00 +01:00
'hostname' => '' ,
'username' => '' ,
)
);
2009-04-23 01:38:01 +02:00
2017-05-16 16:48:44 +02:00
$submitted_form = wp_unslash ( $_POST );
// Verify nonce, or unset submitted form field values on failure
if ( ! isset ( $_POST [ '_fs_nonce' ] ) || ! wp_verify_nonce ( $_POST [ '_fs_nonce' ], 'filesystem-credentials' ) ) {
unset (
$submitted_form [ 'hostname' ],
$submitted_form [ 'username' ],
$submitted_form [ 'password' ],
$submitted_form [ 'public_key' ],
$submitted_form [ 'private_key' ],
$submitted_form [ 'connection_type' ]
);
}
2008-08-04 23:01:09 +02:00
// If defined, set it to that, Else, If POST'd, set it to that, If not, Set it to whatever it previously was(saved details in option)
2017-12-01 00:11:00 +01:00
$credentials [ 'hostname' ] = defined ( 'FTP_HOST' ) ? FTP_HOST : ( ! empty ( $submitted_form [ 'hostname' ] ) ? $submitted_form [ 'hostname' ] : $credentials [ 'hostname' ] );
$credentials [ 'username' ] = defined ( 'FTP_USER' ) ? FTP_USER : ( ! empty ( $submitted_form [ 'username' ] ) ? $submitted_form [ 'username' ] : $credentials [ 'username' ] );
$credentials [ 'password' ] = defined ( 'FTP_PASS' ) ? FTP_PASS : ( ! empty ( $submitted_form [ 'password' ] ) ? $submitted_form [ 'password' ] : '' );
2008-12-09 19:03:31 +01:00
2008-09-11 19:44:43 +02:00
// Check to see if we are setting the public/private keys for ssh
2017-12-01 00:11:00 +01:00
$credentials [ 'public_key' ] = defined ( 'FTP_PUBKEY' ) ? FTP_PUBKEY : ( ! empty ( $submitted_form [ 'public_key' ] ) ? $submitted_form [ 'public_key' ] : '' );
$credentials [ 'private_key' ] = defined ( 'FTP_PRIKEY' ) ? FTP_PRIKEY : ( ! empty ( $submitted_form [ 'private_key' ] ) ? $submitted_form [ 'private_key' ] : '' );
2008-12-09 19:03:31 +01:00
2014-07-17 11:14:16 +02:00
// Sanitize the hostname, Some people might pass in odd-data:
2017-12-01 00:11:00 +01:00
$credentials [ 'hostname' ] = preg_replace ( '|\w+://|' , '' , $credentials [ 'hostname' ] ); //Strip any schemes off
2008-12-12 21:12:16 +01:00
2017-12-01 00:11:00 +01:00
if ( strpos ( $credentials [ 'hostname' ], ':' ) ) {
list ( $credentials [ 'hostname' ], $credentials [ 'port' ] ) = explode ( ':' , $credentials [ 'hostname' ], 2 );
if ( ! is_numeric ( $credentials [ 'port' ] ) ) {
unset ( $credentials [ 'port' ] );
}
2009-11-06 00:03:48 +01:00
} else {
2017-12-01 00:11:00 +01:00
unset ( $credentials [ 'port' ] );
2009-11-06 00:03:48 +01:00
}
2008-09-09 05:24:05 +02:00
2015-01-08 08:05:25 +01:00
if ( ( defined ( 'FTP_SSH' ) && FTP_SSH ) || ( defined ( 'FS_METHOD' ) && 'ssh2' == FS_METHOD ) ) {
2008-09-05 07:35:58 +02:00
$credentials [ 'connection_type' ] = 'ssh' ;
2015-01-08 08:05:25 +01:00
} elseif ( ( defined ( 'FTP_SSL' ) && FTP_SSL ) && 'ftpext' == $type ) { //Only the FTP Extension understands SSL
2008-09-05 07:35:58 +02:00
$credentials [ 'connection_type' ] = 'ftps' ;
2017-05-16 16:48:44 +02:00
} elseif ( ! empty ( $submitted_form [ 'connection_type' ] ) ) {
$credentials [ 'connection_type' ] = $submitted_form [ 'connection_type' ];
2015-01-08 08:05:25 +01:00
} elseif ( ! isset ( $credentials [ 'connection_type' ] ) ) { //All else fails (And it's not defaulted to something else saved), Default to FTP
2008-09-05 07:35:58 +02:00
$credentials [ 'connection_type' ] = 'ftp' ;
2015-01-08 08:05:25 +01:00
}
2009-05-25 01:47:49 +02:00
if ( ! $error &&
2009-04-23 01:38:01 +02:00
(
2017-12-01 00:11:00 +01:00
( ! empty ( $credentials [ 'password' ] ) && ! empty ( $credentials [ 'username' ] ) && ! empty ( $credentials [ 'hostname' ] ) ) ||
( 'ssh' == $credentials [ 'connection_type' ] && ! empty ( $credentials [ 'public_key' ] ) && ! empty ( $credentials [ 'private_key' ] ) )
2009-04-23 01:38:01 +02:00
) ) {
2008-08-04 23:01:09 +02:00
$stored_credentials = $credentials ;
2017-12-01 00:11:00 +01:00
if ( ! empty ( $stored_credentials [ 'port' ] ) ) { //save port as part of hostname to simplify above code.
2008-12-12 21:12:16 +01:00
$stored_credentials [ 'hostname' ] .= ':' . $stored_credentials [ 'port' ];
2017-12-01 00:11:00 +01:00
}
2008-12-12 21:12:16 +01:00
2017-12-01 00:11:00 +01:00
unset ( $stored_credentials [ 'password' ], $stored_credentials [ 'port' ], $stored_credentials [ 'private_key' ], $stored_credentials [ 'public_key' ] );
Use `wp_installing()` instead of `WP_INSTALLING` constant.
The `WP_INSTALLING` constant is a flag that WordPress sets in a number of
places, telling the system that options should be fetched directly from the
database instead of from the cache, that WP should not ping wordpress.org for
updates, that the normal "not installed" checks should be bypassed, and so on.
A constant is generally necessary for this purpose, because the flag is
typically set before the WP bootstrap, meaning that WP functions are not yet
available. However, it is possible - notably, during `wpmu_create_blog()` -
for the "installing" flag to be set after WP has already loaded. In these
cases, `WP_INSTALLING` would be set for the remainder of the process, since
there's no way to change a constant once it's defined. This, in turn, polluted
later function calls that ought to have been outside the scope of site
creation, particularly the non-caching of option data. The problem was
particularly evident in the case of the automated tests, where `WP_INSTALLING`
was set the first time a site was created, and remained set for the rest of the
suite.
The new `wp_installing()` function allows developers to fetch the current
installation status (when called without any arguments) or to set the
installation status (when called with a boolean `true` or `false`). Use of
the `WP_INSTALLING` constant is still supported; `wp_installing()` will default
to `true` if the constant is defined during the bootstrap.
Props boonebgorges, jeremyfelt.
See #31130.
Built from https://develop.svn.wordpress.org/trunk@34828
git-svn-id: http://core.svn.wordpress.org/trunk@34793 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2015-10-05 17:06:28 +02:00
if ( ! wp_installing () ) {
2014-09-17 19:58:15 +02:00
update_option ( 'ftp_credentials' , $stored_credentials );
}
2008-08-04 23:01:09 +02:00
return $credentials ;
}
2017-12-01 00:11:00 +01:00
$hostname = isset ( $credentials [ 'hostname' ] ) ? $credentials [ 'hostname' ] : '' ;
$username = isset ( $credentials [ 'username' ] ) ? $credentials [ 'username' ] : '' ;
$public_key = isset ( $credentials [ 'public_key' ] ) ? $credentials [ 'public_key' ] : '' ;
$private_key = isset ( $credentials [ 'private_key' ] ) ? $credentials [ 'private_key' ] : '' ;
$port = isset ( $credentials [ 'port' ] ) ? $credentials [ 'port' ] : '' ;
2014-08-24 18:04:18 +02:00
$connection_type = isset ( $credentials [ 'connection_type' ] ) ? $credentials [ 'connection_type' ] : '' ;
2014-05-16 20:26:15 +02:00
2008-09-05 07:35:58 +02:00
if ( $error ) {
2017-12-01 00:11:00 +01:00
$error_string = __ ( '<strong>ERROR:</strong> There was an error connecting to the server, Please verify the settings are correct.' );
if ( is_wp_error ( $error ) ) {
2011-01-01 23:14:42 +01:00
$error_string = esc_html ( $error -> get_error_message () );
2017-12-01 00:11:00 +01:00
}
2011-01-01 23:14:42 +01:00
echo '<div id="message" class="error"><p>' . $error_string . '</p></div>' ;
2008-09-05 07:35:58 +02:00
}
2009-11-06 00:03:48 +01:00
$types = array ();
2017-12-01 00:11:00 +01:00
if ( extension_loaded ( 'ftp' ) || extension_loaded ( 'sockets' ) || function_exists ( 'fsockopen' ) ) {
$types [ 'ftp' ] = __ ( 'FTP' );
}
if ( extension_loaded ( 'ftp' ) ) { //Only this supports FTPS
$types [ 'ftps' ] = __ ( 'FTPS (SSL)' );
}
if ( extension_loaded ( 'ssh2' ) && function_exists ( 'stream_get_contents' ) ) {
$types [ 'ssh' ] = __ ( 'SSH2' );
}
2009-11-06 00:03:48 +01:00
2014-03-24 03:45:15 +01:00
/**
2016-05-22 20:01:30 +02:00
* Filters the connection types to output to the filesystem credentials form .
2014-03-24 03:45:15 +01:00
*
* @ since 2.9 . 0
2016-07-22 14:10:27 +02:00
* @ since 4.6 . 0 The `$context` parameter default changed from `false` to an empty string .
2014-03-24 03:45:15 +01:00
*
* @ param array $types Types of connections .
* @ param array $credentials Credentials to connect with .
* @ param string $type Chosen filesystem method .
* @ param object $error Error object .
* @ param string $context Full path to the directory that is tested
* for being writable .
*/
$types = apply_filters ( 'fs_ftp_connection_types' , $types , $credentials , $type , $error , $context );
2009-11-06 00:03:48 +01:00
2018-08-17 03:51:36 +02:00
?>
2017-12-01 00:11:00 +01:00
< form action = " <?php echo esc_url( $form_post ); ?> " method = " post " >
2015-04-01 04:48:28 +02:00
< div id = " request-filesystem-credentials-form " class = " request-filesystem-credentials-form " >
2018-08-17 03:51:36 +02:00
< ? php
// Print a H1 heading in the FTP credentials modal dialog, default is a H2.
$heading_tag = 'h2' ;
if ( 'plugins.php' === $pagenow || 'plugin-install.php' === $pagenow ) {
$heading_tag = 'h1' ;
}
echo " < $heading_tag id='request-filesystem-credentials-title'> " . __ ( 'Connection Information' ) . " </ $heading_tag > " ;
?>
2017-12-01 00:11:00 +01:00
< p id = " request-filesystem-credentials-desc " >
2018-08-17 03:51:36 +02:00
< ? php
2017-12-01 00:11:00 +01:00
$label_user = __ ( 'Username' );
$label_pass = __ ( 'Password' );
_e ( 'To perform the requested action, WordPress needs to access your web server.' );
2010-06-01 23:57:26 +02:00
echo ' ' ;
2018-08-17 03:51:36 +02:00
if ( ( isset ( $types [ 'ftp' ] ) || isset ( $types [ 'ftps' ] ) ) ) {
if ( isset ( $types [ 'ssh' ] ) ) {
_e ( 'Please enter your FTP or SSH credentials to proceed.' );
$label_user = __ ( 'FTP/SSH Username' );
$label_pass = __ ( 'FTP/SSH Password' );
} else {
_e ( 'Please enter your FTP credentials to proceed.' );
$label_user = __ ( 'FTP Username' );
$label_pass = __ ( 'FTP Password' );
}
echo ' ' ;
2010-06-01 22:35:59 +02:00
}
2017-12-01 00:11:00 +01:00
_e ( 'If you do not remember your credentials, you should contact your web host.' );
2017-11-23 05:09:49 +01:00
2018-08-15 08:22:26 +02:00
$hostname_value = esc_attr ( $hostname );
if ( ! empty ( $port ) ) {
$hostname_value .= " : $port " ;
}
2017-11-23 05:09:49 +01:00
$password_value = '' ;
2018-08-15 08:22:26 +02:00
if ( defined ( 'FTP_PASS' ) ) {
$password_value = '*****' ;
}
2018-08-17 03:51:36 +02:00
?>
2017-12-01 00:11:00 +01:00
</ p >
2015-04-01 04:48:28 +02:00
< label for = " hostname " >
2017-12-01 00:11:00 +01:00
< span class = " field-title " >< ? php _e ( 'Hostname' ); ?> </span>
2018-08-15 08:22:26 +02:00
< input name = " hostname " type = " text " id = " hostname " aria - describedby = " request-filesystem-credentials-desc " class = " code " placeholder = " <?php esc_attr_e( 'example: www.wordpress.org' ); ?> " value = " <?php echo $hostname_value ; ?> " < ? php disabled ( defined ( 'FTP_HOST' ) ); ?> />
2015-04-01 04:48:28 +02:00
</ label >
< div class = " ftp-username " >
< label for = " username " >
< span class = " field-title " >< ? php echo $label_user ; ?> </span>
2017-12-01 00:11:00 +01:00
< input name = " username " type = " text " id = " username " value = " <?php echo esc_attr( $username ); ?> " < ? php disabled ( defined ( 'FTP_USER' ) ); ?> />
2015-04-01 04:48:28 +02:00
</ label >
</ div >
< div class = " ftp-password " >
< label for = " password " >
< span class = " field-title " >< ? php echo $label_pass ; ?> </span>
2017-12-01 00:11:00 +01:00
< input name = " password " type = " password " id = " password " value = " <?php echo $password_value ; ?> " < ? php disabled ( defined ( 'FTP_PASS' ) ); ?> />
< em >
< ? php
if ( ! defined ( 'FTP_PASS' ) ) {
_e ( 'This password will not be stored on the server.' );}
2018-08-17 03:51:36 +02:00
?>
2017-12-01 00:11:00 +01:00
</ em >
2015-04-01 04:48:28 +02:00
</ label >
</ div >
2015-10-21 05:51:24 +02:00
< fieldset >
2016-05-20 00:59:28 +02:00
< legend >< ? php _e ( 'Connection Type' ); ?> </legend>
2018-08-17 03:51:36 +02:00
< ? php
2016-05-20 00:59:28 +02:00
$disabled = disabled ( ( defined ( 'FTP_SSL' ) && FTP_SSL ) || ( defined ( 'FTP_SSH' ) && FTP_SSH ), true , false );
2018-08-17 03:51:36 +02:00
foreach ( $types as $name => $text ) :
?>
2017-12-01 00:11:00 +01:00
< label for = " <?php echo esc_attr( $name ); ?> " >
2018-08-15 08:22:26 +02:00
< input type = " radio " name = " connection_type " id = " <?php echo esc_attr( $name ); ?> " value = " <?php echo esc_attr( $name ); ?> " < ? php checked ( $name , $connection_type ); ?> <?php echo $disabled; ?> />
2016-05-20 00:59:28 +02:00
< ? php echo $text ; ?>
</ label >
2018-08-17 03:51:36 +02:00
< ? php
2016-05-20 00:59:28 +02:00
endforeach ;
2018-08-17 03:51:36 +02:00
?>
2016-05-20 00:59:28 +02:00
</ fieldset >
2018-08-17 03:51:36 +02:00
< ? php
if ( isset ( $types [ 'ssh' ] ) ) {
$hidden_class = '' ;
if ( 'ssh' != $connection_type || empty ( $connection_type ) ) {
$hidden_class = ' class="hidden"' ;
}
?>
2016-12-30 08:42:42 +01:00
< fieldset id = " ssh-keys " < ? php echo $hidden_class ; ?> >
2015-10-21 05:51:24 +02:00
< legend >< ? php _e ( 'Authentication Keys' ); ?> </legend>
2015-04-01 04:48:28 +02:00
< label for = " public_key " >
2017-12-01 00:11:00 +01:00
< span class = " field-title " >< ? php _e ( 'Public Key:' ); ?> </span>
< input name = " public_key " type = " text " id = " public_key " aria - describedby = " auth-keys-desc " value = " <?php echo esc_attr( $public_key ); ?> " < ? php disabled ( defined ( 'FTP_PUBKEY' ) ); ?> />
2015-04-01 04:48:28 +02:00
</ label >
< label for = " private_key " >
2017-12-01 00:11:00 +01:00
< span class = " field-title " >< ? php _e ( 'Private Key:' ); ?> </span>
< input name = " private_key " type = " text " id = " private_key " value = " <?php echo esc_attr( $private_key ); ?> " < ? php disabled ( defined ( 'FTP_PRIKEY' ) ); ?> />
2015-04-01 04:48:28 +02:00
</ label >
2017-12-01 00:11:00 +01:00
< p id = " auth-keys-desc " >< ? php _e ( 'Enter the location on the server where the public and private keys are located. If a passphrase is needed, enter that in the password field above.' ); ?> </p>
2008-09-05 07:35:58 +02:00
</ fieldset >
2018-08-17 03:51:36 +02:00
< ? php
}
2016-05-20 00:59:28 +02:00
2018-08-17 03:51:36 +02:00
foreach ( ( array ) $extra_fields as $field ) {
if ( isset ( $submitted_form [ $field ] ) ) {
echo '<input type="hidden" name="' . esc_attr ( $field ) . '" value="' . esc_attr ( $submitted_form [ $field ] ) . '" />' ;
}
2017-12-01 00:11:00 +01:00
}
2018-08-17 03:51:36 +02:00
?>
2015-04-01 04:48:28 +02:00
< p class = " request-filesystem-credentials-action-buttons " >
2017-05-16 16:48:44 +02:00
< ? php wp_nonce_field ( 'filesystem-credentials' , '_fs_nonce' , false , true ); ?>
2015-04-01 04:48:28 +02:00
< button class = " button cancel-button " data - js - action = " close " type = " button " >< ? php _e ( 'Cancel' ); ?> </button>
2016-09-28 21:54:28 +02:00
< ? php submit_button ( __ ( 'Proceed' ), '' , 'upgrade' , false ); ?>
2015-04-01 04:48:28 +02:00
</ p >
2008-08-04 23:01:09 +02:00
</ div >
</ form >
2018-08-17 03:51:36 +02:00
< ? php
2008-08-04 23:01:09 +02:00
return false ;
}
2015-03-18 04:18:27 +01:00
/**
2015-04-04 23:13:26 +02:00
* Print the filesystem credentials modal when needed .
2015-03-18 04:18:27 +01:00
*
* @ since 4.2 . 0
*/
function wp_print_request_filesystem_credentials_modal () {
$filesystem_method = get_filesystem_method ();
ob_start ();
$filesystem_credentials_are_stored = request_filesystem_credentials ( self_admin_url () );
ob_end_clean ();
$request_filesystem_credentials = ( $filesystem_method != 'direct' && ! $filesystem_credentials_are_stored );
if ( ! $request_filesystem_credentials ) {
return ;
}
?>
< div id = " request-filesystem-credentials-dialog " class = " notification-dialog-wrap request-filesystem-credentials-dialog " >
< div class = " notification-dialog-background " ></ div >
2015-04-01 04:48:28 +02:00
< div class = " notification-dialog " role = " dialog " aria - labelledby = " request-filesystem-credentials-title " tabindex = " 0 " >
2015-03-18 04:18:27 +01:00
< div class = " request-filesystem-credentials-dialog-content " >
< ? php request_filesystem_credentials ( site_url () ); ?>
2015-09-05 17:17:24 +02:00
</ div >
2015-03-18 04:18:27 +01:00
</ div >
</ div >
< ? php
}
2018-04-27 21:54:21 +02:00
/**
* Generate a single group for the personal data export report .
*
* @ since 4.9 . 6
*
2018-05-21 15:03:21 +02:00
* @ param array $group_data {
2018-04-27 21:54:21 +02:00
* The group data to render .
*
* @ type string $group_label The user - facing heading for the group , e . g . 'Comments' .
* @ type array $items {
* An array of group items .
*
* @ type array $group_item_data {
* An array of name - value pairs for the item .
*
* @ type string $name The user - facing name of an item name - value pair , e . g . 'IP Address' .
* @ type string $value The user - facing value of an item data pair , e . g . '50.60.70.0' .
* }
* }
* }
* @ return string The HTML for this group and its items .
*/
function wp_privacy_generate_personal_data_export_group_html ( $group_data ) {
$allowed_tags = array (
2018-08-17 03:51:36 +02:00
'a' => array (
2018-04-27 21:54:21 +02:00
'href' => array (),
2018-08-17 03:51:36 +02:00
'target' => array (),
2018-04-27 21:54:21 +02:00
),
2018-08-17 03:51:36 +02:00
'br' => array (),
2018-04-27 21:54:21 +02:00
);
$allowed_protocols = array ( 'http' , 'https' );
$group_html = '' ;
$group_html .= '<h2>' . esc_html ( $group_data [ 'group_label' ] ) . '</h2>' ;
$group_html .= '<div>' ;
foreach ( ( array ) $group_data [ 'items' ] as $group_item_id => $group_item_data ) {
$group_html .= '<table>' ;
$group_html .= '<tbody>' ;
foreach ( ( array ) $group_item_data as $group_item_datum ) {
2018-05-01 15:45:21 +02:00
$value = $group_item_datum [ 'value' ];
// If it looks like a link, make it a link
if ( false === strpos ( $value , ' ' ) && ( 0 === strpos ( $value , 'http://' ) || 0 === strpos ( $value , 'https://' ) ) ) {
$value = '<a href="' . esc_url ( $value ) . '">' . esc_html ( $value ) . '</a>' ;
}
2018-04-27 21:54:21 +02:00
$group_html .= '<tr>' ;
$group_html .= '<th>' . esc_html ( $group_item_datum [ 'name' ] ) . '</th>' ;
2018-05-01 15:45:21 +02:00
$group_html .= '<td>' . wp_kses ( $value , $allowed_tags , $allowed_protocols ) . '</td>' ;
2018-04-27 21:54:21 +02:00
$group_html .= '</tr>' ;
}
$group_html .= '</tbody>' ;
$group_html .= '</table>' ;
}
$group_html .= '</div>' ;
return $group_html ;
}
/**
* Generate the personal data export file .
*
* @ since 4.9 . 6
*
2018-05-21 15:03:21 +02:00
* @ param int $request_id The export request ID .
2018-04-27 21:54:21 +02:00
*/
function wp_privacy_generate_personal_data_export_file ( $request_id ) {
if ( ! class_exists ( 'ZipArchive' ) ) {
wp_send_json_error ( __ ( 'Unable to generate export file. ZipArchive not available.' ) );
}
// Get the request data.
$request = wp_get_user_request_data ( $request_id );
if ( ! $request || 'export_personal_data' !== $request -> action_name ) {
2018-05-02 20:42:21 +02:00
wp_send_json_error ( __ ( 'Invalid request ID when generating export file.' ) );
2018-04-27 21:54:21 +02:00
}
$email_address = $request -> email ;
if ( ! is_email ( $email_address ) ) {
2018-05-02 20:42:21 +02:00
wp_send_json_error ( __ ( 'Invalid email address when generating export file.' ) );
2018-04-27 21:54:21 +02:00
}
// Create the exports folder if needed.
Privacy: Rename exports folder to avoid deleting other files.
Previously, personal data exports were stored in `wp-content/uploads/exports`, which is generic enough that it's likely there are existing folders with that name, either created by plugins or manually by administrators. If that folder were reused by Core, then `wp_privacy_delete_old_export_files()` would delete all of the existing files inside it, which is almost certainly not what the site owner wants or expects.
To avoid that, the folder is being renamed to include a specific reference to Core, and a more verbose description of its purpose. With those factored in, it's very unlikely that there will be any conflicts with existing folders.
The `wp_privacy_exports_dir()` and `wp_privacy_exports_url()` functions were introduced to provide a canonical source for the location, and the `wp_privacy_exports_dir` and `wp_privacy_exports_url` filters were introduced to allow plugins to customize it.
Props johnjamesjacoby, allendav.
Fixes #44091.
Built from https://develop.svn.wordpress.org/trunk@43284
git-svn-id: http://core.svn.wordpress.org/trunk@43113 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2018-05-15 22:22:20 +02:00
$exports_dir = wp_privacy_exports_dir ();
$exports_url = wp_privacy_exports_url ();
2018-04-27 21:54:21 +02:00
2018-05-21 13:59:24 +02:00
if ( ! wp_mkdir_p ( $exports_dir ) ) {
wp_send_json_error ( __ ( 'Unable to create export folder.' ) );
2018-04-27 21:54:21 +02:00
}
// Protect export folder from browsing.
$index_pathname = $exports_dir . 'index.html' ;
if ( ! file_exists ( $index_pathname ) ) {
$file = fopen ( $index_pathname , 'w' );
if ( false === $file ) {
2018-05-02 20:42:21 +02:00
wp_send_json_error ( __ ( 'Unable to protect export folder from browsing.' ) );
2018-04-27 21:54:21 +02:00
}
2018-07-16 01:39:27 +02:00
fwrite ( $file , '<!-- Silence is golden. -->' );
2018-04-27 21:54:21 +02:00
fclose ( $file );
}
$stripped_email = str_replace ( '@' , '-at-' , $email_address );
$stripped_email = sanitize_title ( $stripped_email ); // slugify the email address
2018-04-30 20:53:25 +02:00
$obscura = wp_generate_password ( 32 , false , false );
2018-04-27 21:54:21 +02:00
$file_basename = 'wp-personal-data-file-' . $stripped_email . '-' . $obscura ;
$html_report_filename = $file_basename . '.html' ;
2018-05-10 23:11:23 +02:00
$html_report_pathname = wp_normalize_path ( $exports_dir . $html_report_filename );
2018-08-17 03:51:36 +02:00
$file = fopen ( $html_report_pathname , 'w' );
2018-04-27 21:54:21 +02:00
if ( false === $file ) {
2018-05-02 20:42:21 +02:00
wp_send_json_error ( __ ( 'Unable to open export file (HTML report) for writing.' ) );
2018-04-27 21:54:21 +02:00
}
$title = sprintf (
2018-05-02 03:52:22 +02:00
/* translators: %s: user's e-mail address */
2018-04-27 21:54:21 +02:00
__ ( 'Personal Data Export for %s' ),
$email_address
);
// Open HTML.
fwrite ( $file , " <!DOCTYPE html> \n " );
fwrite ( $file , " <html> \n " );
// Head.
fwrite ( $file , " <head> \n " );
fwrite ( $file , " <meta http-equiv='Content-Type' content='text/html; charset=UTF-8' /> \n " );
fwrite ( $file , " <style type='text/css'> " );
2018-08-17 03:51:36 +02:00
fwrite ( $file , 'body { color: black; font-family: Arial, sans-serif; font-size: 11pt; margin: 15px auto; width: 860px; }' );
fwrite ( $file , 'table { background: #f0f0f0; border: 1px solid #ddd; margin-bottom: 20px; width: 100%; }' );
fwrite ( $file , 'th { padding: 5px; text-align: left; width: 20%; }' );
fwrite ( $file , 'td { padding: 5px; }' );
fwrite ( $file , 'tr:nth-child(odd) { background-color: #fafafa; }' );
fwrite ( $file , '</style>' );
fwrite ( $file , '<title>' );
2018-04-27 21:54:21 +02:00
fwrite ( $file , esc_html ( $title ) );
2018-08-17 03:51:36 +02:00
fwrite ( $file , '</title>' );
2018-04-27 21:54:21 +02:00
fwrite ( $file , " </head> \n " );
// Body.
fwrite ( $file , " <body> \n " );
// Heading.
2018-08-17 03:51:36 +02:00
fwrite ( $file , '<h1>' . esc_html__ ( 'Personal Data Export' ) . '</h1>' );
2018-04-27 21:54:21 +02:00
// And now, all the Groups.
$groups = get_post_meta ( $request_id , '_export_data_grouped' , true );
// First, build an "About" group on the fly for this report.
$about_group = array (
2018-07-24 17:04:25 +02:00
/* translators: Header for the About section in a personal data export. */
'group_label' => _x ( 'About' , 'personal data group label' ),
2018-04-27 21:54:21 +02:00
'items' => array (
'about-1' => array (
array (
2018-05-02 20:42:21 +02:00
'name' => _x ( 'Report generated for' , 'email address' ),
2018-04-27 21:54:21 +02:00
'value' => $email_address ,
),
array (
2018-05-02 20:42:21 +02:00
'name' => _x ( 'For site' , 'website name' ),
2018-04-27 21:54:21 +02:00
'value' => get_bloginfo ( 'name' ),
),
array (
2018-05-02 20:42:21 +02:00
'name' => _x ( 'At URL' , 'website URL' ),
2018-04-27 21:54:21 +02:00
'value' => get_bloginfo ( 'url' ),
),
array (
2018-05-02 20:42:21 +02:00
'name' => _x ( 'On' , 'date/time' ),
2018-04-27 21:54:21 +02:00
'value' => current_time ( 'mysql' ),
),
),
),
);
// Merge in the special about group.
$groups = array_merge ( array ( 'about' => $about_group ), $groups );
// Now, iterate over every group in $groups and have the formatter render it in HTML.
foreach ( ( array ) $groups as $group_id => $group_data ) {
fwrite ( $file , wp_privacy_generate_personal_data_export_group_html ( $group_data ) );
}
fwrite ( $file , " </body> \n " );
// Close HTML.
fwrite ( $file , " </html> \n " );
fclose ( $file );
2018-05-08 02:52:21 +02:00
/*
* Now , generate the ZIP .
*
* If an archive has already been generated , then remove it and reuse the
* filename , to avoid breaking any URLs that may have been previously sent
* via email .
*/
2018-04-30 23:04:22 +02:00
$error = false ;
2018-05-08 02:52:21 +02:00
$archive_url = get_post_meta ( $request_id , '_export_file_url' , true );
$archive_pathname = get_post_meta ( $request_id , '_export_file_path' , true );
if ( empty ( $archive_pathname ) || empty ( $archive_url ) ) {
$archive_filename = $file_basename . '.zip' ;
$archive_pathname = $exports_dir . $archive_filename ;
$archive_url = $exports_url . $archive_filename ;
update_post_meta ( $request_id , '_export_file_url' , $archive_url );
2018-05-10 23:11:23 +02:00
update_post_meta ( $request_id , '_export_file_path' , wp_normalize_path ( $archive_pathname ) );
2018-05-08 02:52:21 +02:00
}
if ( ! empty ( $archive_pathname ) && file_exists ( $archive_pathname ) ) {
wp_delete_file ( $archive_pathname );
}
2018-04-27 21:54:21 +02:00
$zip = new ZipArchive ;
2018-04-30 23:04:22 +02:00
if ( true === $zip -> open ( $archive_pathname , ZipArchive :: CREATE ) ) {
if ( ! $zip -> addFile ( $html_report_pathname , 'index.html' ) ) {
$error = __ ( 'Unable to add data to export file.' );
}
2018-04-27 21:54:21 +02:00
$zip -> close ();
2018-04-30 23:04:22 +02:00
if ( ! $error ) {
/**
* Fires right after all personal data has been written to the export file .
*
* @ since 4.9 . 6
*
* @ param string $archive_pathname The full path to the export file on the filesystem .
* @ param string $archive_url The URL of the archive file .
* @ param string $html_report_pathname The full path to the personal data report on the filesystem .
2018-05-21 15:03:21 +02:00
* @ param int $request_id The export request ID .
2018-04-30 23:04:22 +02:00
*/
2018-05-10 01:18:22 +02:00
do_action ( 'wp_privacy_personal_data_export_file_created' , $archive_pathname , $archive_url , $html_report_pathname , $request_id );
2018-04-30 23:04:22 +02:00
}
2018-04-27 21:54:21 +02:00
} else {
2018-04-30 23:04:22 +02:00
$error = __ ( 'Unable to open export file (archive) for writing.' );
2018-04-27 21:54:21 +02:00
}
// And remove the HTML file.
unlink ( $html_report_pathname );
2018-04-30 23:04:22 +02:00
if ( $error ) {
wp_send_json_error ( $error );
}
2018-04-27 21:54:21 +02:00
}
/**
* Send an email to the user with a link to the personal data export file
*
* @ since 4.9 . 6
*
2018-05-21 15:03:21 +02:00
* @ param int $request_id The request ID for this personal data export .
* @ return true | WP_Error True on success or `WP_Error` on failure .
2018-04-27 21:54:21 +02:00
*/
function wp_privacy_send_personal_data_export_email ( $request_id ) {
// Get the request data.
$request = wp_get_user_request_data ( $request_id );
if ( ! $request || 'export_personal_data' !== $request -> action_name ) {
2018-08-13 18:32:27 +02:00
return new WP_Error ( 'invalid_request' , __ ( 'Invalid request ID when sending personal data export email.' ) );
2018-04-27 21:54:21 +02:00
}
2018-05-21 15:03:21 +02:00
/** This filter is documented in wp-includes/functions.php */
2018-04-30 22:09:23 +02:00
$expiration = apply_filters ( 'wp_privacy_export_expiration' , 3 * DAY_IN_SECONDS );
$expiration_date = date_i18n ( get_option ( 'date_format' ), time () + $expiration );
2018-08-17 03:51:36 +02:00
/* translators: Do not translate EXPIRATION, LINK, SITENAME, SITEURL: those are placeholders. */
$email_text = __ (
' Howdy ,
2018-04-27 21:54:21 +02:00
Your request for an export of personal data has been completed . You may
2018-04-30 22:09:23 +02:00
download your personal data by clicking on the link below . For privacy
and security , we will automatically delete the file on ###EXPIRATION###,
so please download it before then .
2018-04-27 21:54:21 +02:00
###LINK###
Regards ,
All at ###SITENAME###
###SITEURL###'
2018-08-17 03:51:36 +02:00
);
2018-04-27 21:54:21 +02:00
/**
* Filters the text of the email sent with a personal data export file .
*
* The following strings have a special meaning and will get replaced dynamically :
2018-04-30 22:09:23 +02:00
* ###EXPIRATION### The date when the URL will be automatically deleted.
2018-04-27 21:54:21 +02:00
* ###LINK### URL of the personal data export file for the user.
* ###SITENAME### The name of the site.
* ###SITEURL### The URL to the site.
*
* @ since 4.9 . 6
*
* @ param string $email_text Text in the email .
* @ param int $request_id The request ID for this personal data export .
*/
$content = apply_filters ( 'wp_privacy_personal_data_email_content' , $email_text , $request_id );
2018-08-17 03:51:36 +02:00
$email_address = $request -> email ;
2018-04-27 21:54:21 +02:00
$export_file_url = get_post_meta ( $request_id , '_export_file_url' , true );
2018-08-17 03:51:36 +02:00
$site_name = wp_specialchars_decode ( get_option ( 'blogname' ), ENT_QUOTES );
$site_url = home_url ();
2018-04-27 21:54:21 +02:00
2018-04-30 22:09:23 +02:00
$content = str_replace ( '###EXPIRATION###' , $expiration_date , $content );
2018-04-27 21:54:21 +02:00
$content = str_replace ( '###LINK###' , esc_url_raw ( $export_file_url ), $content );
$content = str_replace ( '###EMAIL###' , $email_address , $content );
2018-07-08 15:55:28 +02:00
$content = str_replace ( '###SITENAME###' , $site_name , $content );
2018-04-27 21:54:21 +02:00
$content = str_replace ( '###SITEURL###' , esc_url_raw ( $site_url ), $content );
$mail_success = wp_mail (
$email_address ,
sprintf (
__ ( '[%s] Personal Data Export' ),
2018-07-08 15:55:28 +02:00
$site_name
2018-04-27 21:54:21 +02:00
),
$content
);
if ( ! $mail_success ) {
2018-08-13 18:32:27 +02:00
return new WP_Error ( 'privacy_email_error' , __ ( 'Unable to send personal data export email.' ) );
2018-04-27 21:54:21 +02:00
}
return true ;
}
/**
* Intercept personal data exporter page ajax responses in order to assemble the personal data export file .
* @ see wp_privacy_personal_data_export_page
* @ since 4.9 . 6
*
* @ param array $response The response from the personal data exporter for the given page .
* @ param int $exporter_index The index of the personal data exporter . Begins at 1.
* @ param string $email_address The email address of the user whose personal data this is .
* @ param int $page The page of personal data for this exporter . Begins at 1.
* @ param int $request_id The request ID for this personal data export .
* @ param bool $send_as_email Whether the final results of the export should be emailed to the user .
2018-05-03 21:28:21 +02:00
* @ param string $exporter_key The slug ( key ) of the exporter .
2018-04-27 21:54:21 +02:00
* @ return array The filtered response .
*/
2018-05-03 21:28:21 +02:00
function wp_privacy_process_personal_data_export_page ( $response , $exporter_index , $email_address , $page , $request_id , $send_as_email , $exporter_key ) {
2018-04-27 21:54:21 +02:00
/* Do some simple checks on the shape of the response from the exporter .
* If the exporter response is malformed , don ' t attempt to consume it - let it
* pass through to generate a warning to the user by default ajax processing .
*/
if ( ! is_array ( $response ) ) {
return $response ;
}
if ( ! array_key_exists ( 'done' , $response ) ) {
return $response ;
}
if ( ! array_key_exists ( 'data' , $response ) ) {
return $response ;
}
if ( ! is_array ( $response [ 'data' ] ) ) {
return $response ;
}
// Get the request data.
$request = wp_get_user_request_data ( $request_id );
if ( ! $request || 'export_personal_data' !== $request -> action_name ) {
2018-05-02 20:42:21 +02:00
wp_send_json_error ( __ ( 'Invalid request ID when merging exporter data.' ) );
2018-04-27 21:54:21 +02:00
}
$export_data = array ();
// First exporter, first page? Reset the report data accumulation array.
if ( 1 === $exporter_index && 1 === $page ) {
update_post_meta ( $request_id , '_export_data_raw' , $export_data );
} else {
$export_data = get_post_meta ( $request_id , '_export_data_raw' , true );
}
// Now, merge the data from the exporter response into the data we have accumulated already.
$export_data = array_merge ( $export_data , $response [ 'data' ] );
update_post_meta ( $request_id , '_export_data_raw' , $export_data );
// If we are not yet on the last page of the last exporter, return now.
2018-05-21 15:03:21 +02:00
/** This filter is documented in wp-admin/includes/ajax-actions.php */
2018-08-17 03:51:36 +02:00
$exporters = apply_filters ( 'wp_privacy_personal_data_exporters' , array () );
2018-04-27 21:54:21 +02:00
$is_last_exporter = $exporter_index === count ( $exporters );
2018-08-17 03:51:36 +02:00
$exporter_done = $response [ 'done' ];
2018-04-27 21:54:21 +02:00
if ( ! $is_last_exporter || ! $exporter_done ) {
return $response ;
}
// Last exporter, last page - let's prepare the export file.
// First we need to re-organize the raw data hierarchically in groups and items.
$groups = array ();
foreach ( ( array ) $export_data as $export_datum ) {
$group_id = $export_datum [ 'group_id' ];
$group_label = $export_datum [ 'group_label' ];
if ( ! array_key_exists ( $group_id , $groups ) ) {
$groups [ $group_id ] = array (
'group_label' => $group_label ,
'items' => array (),
);
}
$item_id = $export_datum [ 'item_id' ];
if ( ! array_key_exists ( $item_id , $groups [ $group_id ][ 'items' ] ) ) {
$groups [ $group_id ][ 'items' ][ $item_id ] = array ();
}
2018-08-17 03:51:36 +02:00
$old_item_data = $groups [ $group_id ][ 'items' ][ $item_id ];
$merged_item_data = array_merge ( $export_datum [ 'data' ], $old_item_data );
2018-04-27 21:54:21 +02:00
$groups [ $group_id ][ 'items' ][ $item_id ] = $merged_item_data ;
}
// Then save the grouped data into the request.
delete_post_meta ( $request_id , '_export_data_raw' );
update_post_meta ( $request_id , '_export_data_grouped' , $groups );
2018-05-21 15:03:21 +02:00
/**
* Generate the export file from the collected , grouped personal data .
*
* @ since 4.9 . 6
*
* @ param int $request_id The export request ID .
*/
2018-04-27 21:54:21 +02:00
do_action ( 'wp_privacy_personal_data_export_file' , $request_id );
// Clear the grouped data now that it is no longer needed.
delete_post_meta ( $request_id , '_export_data_grouped' );
// If the destination is email, send it now.
if ( $send_as_email ) {
$mail_success = wp_privacy_send_personal_data_export_email ( $request_id );
if ( is_wp_error ( $mail_success ) ) {
wp_send_json_error ( $mail_success -> get_error_message () );
}
} else {
// Modify the response to include the URL of the export file so the browser can fetch it.
$export_file_url = get_post_meta ( $request_id , '_export_file_url' , true );
if ( ! empty ( $export_file_url ) ) {
$response [ 'url' ] = $export_file_url ;
}
}
// Update the request to completed state.
_wp_privacy_completed_request ( $request_id );
return $response ;
}