<?php
+require_once('include/security.php');
+
function photo_init(&$a) {
- if($a->argc != 2) {
- killme();
+ switch($a->argc) {
+ case 4:
+ $person = $a->argv[3];
+ $customres = intval($a->argv[2]);
+ $type = $a->argv[1];
+ break;
+ case 3:
+ $person = $a->argv[2];
+ $type = $a->argv[1];
+ break;
+ case 2:
+ $photo = $a->argv[1];
+ break;
+ case 1:
+ default:
+ killme();
+ // NOTREACHED
}
- $resolution = 0;
- $photo = $a->argv[1];
- $photo = str_replace('.jpg','',$photo);
- if(substr($photo,-2,1) == '-') {
- $resolution = intval(substr($photo,-1,1));
- $photo = substr($photo,0,-2);
+
+ $default = 'images/default-profile.jpg';
+
+ if(isset($type)) {
+
+ /**
+ * Profile photos
+ */
+
+ switch($type) {
+
+ case 'profile':
+ case 'custom':
+ $resolution = 4;
+ break;
+ case 'micro':
+ $resolution = 6;
+ $default = 'images/default-profile-mm.jpg';
+ break;
+ case 'avatar':
+ default:
+ $resolution = 5;
+ $default = 'images/default-profile-sm.jpg';
+ break;
+ }
+
+ $uid = str_replace('.jpg', '', $person);
+
+ $r = q("SELECT * FROM `photo` WHERE `scale` = %d AND `uid` = %d AND `profile` = 1 LIMIT 1",
+ intval($resolution),
+ intval($uid)
+ );
+ if(count($r)) {
+ $data = $r[0]['data'];
+ }
+ if(! isset($data)) {
+ $data = file_get_contents($default);
+ }
+ }
+ else {
+
+ /**
+ * Other photos
+ */
+
+ $resolution = 0;
+ $photo = str_replace('.jpg','',$photo);
+
+ if(substr($photo,-2,1) == '-') {
+ $resolution = intval(substr($photo,-1,1));
+ $photo = substr($photo,0,-2);
+ }
+
+ $r = q("SELECT `uid` FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d LIMIT 1",
+ dbesc($photo),
+ intval($resolution)
+ );
+ if(count($r)) {
+
+ $sql_extra = permissions_sql($r[0]['uid']);
+
+ // Now we'll see if we can access the photo
+
+ $r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d $sql_extra LIMIT 1",
+ dbesc($photo),
+ intval($resolution)
+ );
+
+ if(count($r)) {
+ $data = $r[0]['data'];
+ }
+ else {
+
+ // Does the picture exist? It may be a remote person with no credentials,
+ // but who should otherwise be able to view it. Show a default image to let
+ // them know permissions was denied. It may be possible to view the image
+ // through an authenticated profile visit.
+ // There won't be many completely unauthorised people seeing this because
+ // they won't have the photo link, so there's a reasonable chance that the person
+ // might be able to obtain permission to view it.
+
+ $r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s' AND `scale` = %d LIMIT 1",
+ dbesc($photo),
+ intval($resolution)
+ );
+ if(count($r)) {
+ $data = file_get_contents('images/nosign.jpg');
+ }
+ }
+ }
}
- $r = q("SELECT * FROM `photo` WHERE `resource-id` = '%s'
- AND `scale` = %d LIMIT 1",
- dbesc($photo),
- intval($resolution));
- if($r === NULL || (! count($r))) {
+
+ if(! isset($data)) {
killme();
+ // NOTREACHED
+ }
+
+ if(intval($customres) && $customres > 0 && $customres < 500) {
+ require_once('include/Photo.php');
+ $ph = new Photo($data);
+ if($ph->is_valid()) {
+ $ph->scaleImageSquare($customres);
+ $data = $ph->imageString();
+ }
+ }
+
+ if(function_exists('header_remove')) {
+ header_remove('Pragma');
+ header_remove('pragma');
}
- header("Content-type: image/jpeg");
- echo $r[0]['data'];
-}
\ No newline at end of file
+ header("Content-type: image/jpeg");
+ header("Expires: " . gmdate("D, d M Y H:i:s", time() + (3600*24)) . " GMT");
+ header("Cache-Control: max-age=" . (3600*24));
+ echo $data;
+ killme();
+ // NOTREACHED
+}