blob: 8bff3b49ead8110af571c29910cf93554899773d (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
|
<?php
class UploadFromStash extends UploadBase {
static function isValidSessionKey( $key, $sessionData ) {
return !empty( $key ) &&
is_array( $sessionData ) &&
isset( $sessionData[$key] ) &&
isset( $sessionData[$key]['version'] ) &&
$sessionData[$key]['version'] == self::SESSION_VERSION
;
}
static function isValidRequest( $request ) {
$sessionData = $request->getSessionData('wsUploadData');
return self::isValidSessionKey(
$request->getInt( 'wpSessionKey' ),
$sessionData
);
}
function initialize( $name, $sessionData ) {
/**
* Confirming a temporarily stashed upload.
* We don't want path names to be forged, so we keep
* them in the session on the server and just give
* an opaque key to the user agent.
*/
$this->initialize( $name,
$sessionData['mTempPath'],
$sessionData['mFileSize'],
false
);
$this->mFileProps = $sessionData['mFileProps'];
}
function initializeFromRequest( &$request ) {
$sessionKey = $request->getInt( 'wpSessionKey' );
$sessionData = $request->getSessionData('wsUploadData');
$desiredDestName = $request->getText( 'wpDestFile' );
if( !$desiredDestName )
$desiredDestName = $request->getText( 'wpUploadFile' );
return $this->initialize( $desiredDestName, $sessionData[$sessionKey] );
}
/**
* File has been previously verified so no need to do so again.
*/
protected function verifyFile( $tmpfile ) {
return true;
}
/**
* We're here from "ignore warnings anyway" so return just OK
*/
function checkWarnings() {
return array();
}
}
|