summaryrefslogtreecommitdiff
path: root/includes/UploadFromStash.php
blob: 8bff3b49ead8110af571c29910cf93554899773d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
<?php

class UploadFromStash extends UploadBase {
	static function isValidSessionKey( $key, $sessionData ) {
		return !empty( $key ) && 
			is_array( $sessionData ) && 
			isset( $sessionData[$key] ) && 
			isset( $sessionData[$key]['version'] ) && 
			$sessionData[$key]['version'] == self::SESSION_VERSION
		;
	}
	static function isValidRequest( $request ) {
		$sessionData = $request->getSessionData('wsUploadData');
		return self::isValidSessionKey( 
			$request->getInt( 'wpSessionKey' ),
			$sessionData
		);
	}
	
	function initialize( $name, $sessionData ) {
			/**
			 * Confirming a temporarily stashed upload.
			 * We don't want path names to be forged, so we keep
			 * them in the session on the server and just give
			 * an opaque key to the user agent.
			 */
			$this->initialize( $name, 
				$sessionData['mTempPath'], 
				$sessionData['mFileSize'],
				false
			);

			$this->mFileProps        = $sessionData['mFileProps'];
	}
	function initializeFromRequest( &$request ) {
		$sessionKey = $request->getInt( 'wpSessionKey' );
		$sessionData = $request->getSessionData('wsUploadData');
		
		$desiredDestName = $request->getText( 'wpDestFile' );
		if( !$desiredDestName )
			$desiredDestName = $request->getText( 'wpUploadFile' );
			
		return $this->initialize( $desiredDestName, $sessionData[$sessionKey] );
	}
	
	/**
	 * File has been previously verified so no need to do so again.
	 */
	protected function verifyFile( $tmpfile ) {
		return true;
	}
	/**
	 * We're here from "ignore warnings anyway" so return just OK
	 */
	function checkWarnings() {
		return array();
	}
}