diff --git a/post.php b/post.php
index 7c506ab47..17822f9d7 100644
--- a/post.php
+++ b/post.php
@@ -5,55 +5,213 @@
require "./inc/functions.php";
require "./inc/anti-bot.php";
-// Fix for magic quotes
-if (function_exists('get_magic_quotes_gpc') && get_magic_quotes_gpc()) {
- function strip_array($var) {
- return is_array($var) ? array_map('strip_array', $var) : stripslashes($var);
+if ((!isset($_POST['mod']) || !$_POST['mod']) && $config['board_locked']) {
+ error("Board is locked");
+}
+
+$dropped_post = false;
+
+// Is it a post coming from NNTP? Let's extract it and pretend it's a normal post.
+if (isset($_GET['Newsgroups']) && $config['nntpchan']['enabled']) {
+ if ($_SERVER['REMOTE_ADDR'] != $config['nntpchan']['trusted_peer']) {
+ error("NNTPChan: Forbidden. $_SERVER[REMOTE_ADDR] is not a trusted peer");
+ }
+
+ $_POST = array();
+ $_POST['json_response'] = true;
+
+ $headers = json_encode($_GET);
+
+ if (!isset ($_GET['Message-Id'])) {
+ if (!isset ($_GET['Message-ID'])) {
+ error("NNTPChan: No message ID");
+ }
+ else $msgid = $_GET['Message-ID'];
+ }
+ else $msgid = $_GET['Message-Id'];
+
+ $groups = preg_split("/,\s*/", $_GET['Newsgroups']);
+ if (count($groups) != 1) {
+ error("NNTPChan: Messages can go to only one newsgroup");
+ }
+ $group = $groups[0];
+
+ if (!isset($config['nntpchan']['dispatch'][$group])) {
+ error("NNTPChan: We don't synchronize $group");
+ }
+ $xboard = $config['nntpchan']['dispatch'][$group];
+
+ $ref = null;
+ if (isset ($_GET['References'])) {
+ $refs = preg_split("/,\s*/", $_GET['References']);
+
+ if (count($refs) > 1) {
+ error("NNTPChan: We don't support multiple references");
+ }
+
+ $ref = $refs[0];
+
+ $query = prepare("SELECT `board`,`id` FROM ``nntp_references`` WHERE `message_id` = :ref");
+ $query->bindValue(':ref', $ref);
+ $query->execute() or error(db_error($query));
+
+ $ary = $query->fetchAll(PDO::FETCH_ASSOC);
+
+ if (count($ary) == 0) {
+ error("NNTPChan: We don't have $ref that $msgid references");
+ }
+
+ $p_id = $ary[0]['id'];
+ $p_board = $ary[0]['board'];
+
+ if ($p_board != $xboard) {
+ error("NNTPChan: Cross board references not allowed. Tried to reference $p_board on $xboard");
+ }
+
+ $_POST['thread'] = $p_id;
+ }
+
+ $date = isset($_GET['Date']) ? strtotime($_GET['Date']) : time();
+
+ list($ct) = explode('; ', $_GET['Content-Type']);
+
+ $query = prepare("SELECT COUNT(*) AS `c` FROM ``nntp_references`` WHERE `message_id` = :msgid");
+ $query->bindValue(":msgid", $msgid);
+ $query->execute() or error(db_error($query));
+
+ $a = $query->fetch(PDO::FETCH_ASSOC);
+ if ($a['c'] > 0) {
+ error("NNTPChan: We already have this post. Post discarded.");
+ }
+
+ if ($ct == 'text/plain') {
+ $content = file_get_contents("php://input");
}
+ elseif ($ct == 'multipart/mixed' || $ct == 'multipart/form-data') {
+ _syslog(LOG_INFO, "MM: Files: ".print_r($GLOBALS, true)); // Debug
- $_GET = strip_array($_GET);
- $_POST = strip_array($_POST);
+ $content = '';
+
+ $newfiles = array();
+ foreach ($_FILES['attachment']['error'] as $id => $error) {
+ if ($_FILES['attachment']['type'][$id] == 'text/plain') {
+ $content .= file_get_contents($_FILES['attachment']['tmp_name'][$id]);
+ }
+ elseif ($_FILES['attachment']['type'][$id] == 'message/rfc822') { // Signed message, ignore for now
+ }
+ else { // A real attachment :^)
+ $file = array();
+ $file['name'] = $_FILES['attachment']['name'][$id];
+ $file['type'] = $_FILES['attachment']['type'][$id];
+ $file['size'] = $_FILES['attachment']['size'][$id];
+ $file['tmp_name'] = $_FILES['attachment']['tmp_name'][$id];
+ $file['error'] = $_FILES['attachment']['error'][$id];
+
+ $newfiles["file$id"] = $file;
+ }
+ }
+
+ $_FILES = $newfiles;
+ }
+ else {
+ error("NNTPChan: Wrong mime type: $ct");
+ }
+
+ $_POST['subject'] = isset($_GET['Subject']) ? ($_GET['Subject'] == 'None' ? '' : $_GET['Subject']) : '';
+ $_POST['board'] = $xboard;
+
+ if (isset ($_GET['From'])) {
+ list($name, $mail) = explode(" <", $_GET['From'], 2);
+ $mail = preg_replace('/>\s+$/', '', $mail);
+
+ $_POST['name'] = $name;
+ //$_POST['email'] = $mail;
+ $_POST['email'] = '';
+ }
+
+ if (isset ($_GET['X_Sage'])) {
+ $_POST['email'] = 'sage';
+ }
+
+ $content = preg_replace_callback('/>>([0-9a-fA-F]{6,})/', function($id) use ($xboard) {
+ $id = $id[1];
+
+ $query = prepare("SELECT `board`,`id` FROM ``nntp_references`` WHERE `message_id_digest` LIKE :rule");
+ $idx = $id . "%";
+ $query->bindValue(':rule', $idx);
+ $query->execute() or error(db_error($query));
+
+ $ary = $query->fetchAll(PDO::FETCH_ASSOC);
+ if (count($ary) == 0) {
+ return ">>>>$id";
+ }
+ else {
+ $ret = array();
+ foreach ($ary as $v) {
+ if ($v['board'] != $xboard) {
+ $ret[] = ">>>/".$v['board']."/".$v['id'];
+ }
+ else {
+ $ret[] = ">>".$v['id'];
+ }
+ }
+ return implode($ret, ", ");
+ }
+ }, $content);
+
+ $_POST['body'] = $content;
+
+ $dropped_post = array(
+ 'date' => $date,
+ 'board' => $xboard,
+ 'msgid' => $msgid,
+ 'headers' => $headers,
+ 'from_nntp' => true,
+ );
+}
+elseif (isset($_GET['Newsgroups'])) {
+ error("NNTPChan: NNTPChan support is disabled");
}
if (isset($_POST['delete'])) {
// Delete
-
+
if (!isset($_POST['board'], $_POST['password']))
error($config['error']['bot']);
-
+
$password = &$_POST['password'];
-
+
if ($password == '')
error($config['error']['invalidpassword']);
-
+
$delete = array();
foreach ($_POST as $post => $value) {
if (preg_match('/^delete_(\d+)$/', $post, $m)) {
$delete[] = (int)$m[1];
}
}
-
+
if (checkDNSBL()) error("Tor users may not delete posts.");
-
+
// Check if board exists
if (!openBoard($_POST['board']))
error($config['error']['noboard']);
-
+
// Check if banned
checkBan($board['uri']);
// Check if deletion enabled
if (!$config['allow_delete'])
error(_('Users are not allowed to delete their own posts on this board.'));
-
+
if (empty($delete))
error($config['error']['nodelete']);
-
+
foreach ($delete as &$id) {
$query = prepare(sprintf("SELECT `thread`, `time`,`password` FROM ``posts_%s`` WHERE `id` = :id", $board['uri']));
$query->bindValue(':id', $id, PDO::PARAM_INT);
$query->execute() or error(db_error($query));
-
+
if ($post = $query->fetch(PDO::FETCH_ASSOC)) {
$thread = false;
if ($config['user_moderation'] && $post['thread']) {
@@ -61,16 +219,21 @@ function strip_array($var) {
$thread_query->bindValue(':id', $post['thread'], PDO::PARAM_INT);
$thread_query->execute() or error(db_error($query));
- $thread = $thread_query->fetch(PDO::FETCH_ASSOC);
+ $thread = $thread_query->fetch(PDO::FETCH_ASSOC);
}
+
+
+ $salt = $post['time'] . $board['uri'];
+ $password = hash_pbkdf2("sha256", $password, $salt, 10000, 20);
+
if ($password != '' && $post['password'] != $password && (!$thread || $thread['password'] != $password))
error($config['error']['invalidpassword']);
-
+
if ($post['time'] > time() - $config['delete_time'] && (!$thread || $thread['password'] != $password)) {
error(sprintf($config['error']['delete_too_soon'], until($post['time'] + $config['delete_time'])));
}
-
+
if (isset($_POST['file'])) {
// Delete just the file
deleteFile($id);
@@ -80,13 +243,13 @@ function strip_array($var) {
deletePost($id);
modLog("User deleted his own post #$id");
}
-
+
_syslog(LOG_INFO, 'Deleted post: ' .
'/' . $board['dir'] . $config['dir']['res'] . sprintf($config['file_page'], $post['thread'] ? $post['thread'] : $id) . ($post['thread'] ? '#' . $id : '')
);
}
}
-
+
buildIndex();
$is_mod = isset($_POST['mod']) && $_POST['mod'];
@@ -108,26 +271,26 @@ function strip_array($var) {
} elseif (isset($_POST['report'])) {
if (!isset($_POST['board'], $_POST['reason']))
error($config['error']['bot']);
-
+
$report = array();
foreach ($_POST as $post => $value) {
if (preg_match('/^delete_(\d+)$/', $post, $m)) {
$report[] = (int)$m[1];
}
}
-
+
if (checkDNSBL()) error("Tor users may not report posts.");
-
+
// Check if board exists
if (!openBoard($_POST['board']))
error($config['error']['noboard']);
-
+
// Check if banned
checkBan($board['uri']);
-
+
if (empty($report))
error($config['error']['noreport']);
-
+
if (count($report) > $config['report_limit'])
error($config['error']['toomanyreports']);
@@ -147,7 +310,7 @@ function strip_array($var) {
$error = $config['error']['captcha'];
}
}
-
+
if (isset($error)) {
if ($config['report_captcha']) {
$captcha = generate_captcha($config['captcha']['extra']);
@@ -159,10 +322,10 @@ function strip_array($var) {
echo Element('page.html', ['config' => $config, 'body' => $body]);
die();
}
-
+
$reason = escape_markup_modifiers($_POST['reason']);
markup($reason);
-
+
foreach ($report as &$id) {
$query = prepare(
"SELECT
@@ -177,21 +340,21 @@ function strip_array($var) {
);
$query->bindValue(':id', $id, PDO::PARAM_INT);
$query->execute() or error(db_error($query));
-
+
if( $post = $query->fetch(PDO::FETCH_ASSOC) ) {
$report_local = !$post['clean_local'];
$report_global = isset($_POST['global']) && !$post['clean_global'];
-
+
if( $report_local || $report_global ) {
$thread = $post['thread'];
-
+
if ($config['syslog']) {
_syslog(LOG_INFO, 'Reported post: ' .
'/' . $board['dir'] . $config['dir']['res'] . sprintf($config['file_page'], $thread ? $thread : $id) . ($thread ? '#' . $id : '') .
' for "' . $reason . '"'
);
}
-
+
$query = prepare("INSERT INTO `reports` (`time`, `ip`, `board`, `post`, `reason`, `local`, `global`) VALUES (:time, :ip, :board, :post, :reason, :local, :global)");
$query->bindValue(':time', time(), PDO::PARAM_INT);
$query->bindValue(':ip', $_SERVER['REMOTE_ADDR'], PDO::PARAM_STR);
@@ -204,10 +367,10 @@ function strip_array($var) {
}
}
}
-
+
$is_mod = isset($_POST['mod']) && $_POST['mod'];
$root = $is_mod ? $config['root'] . $config['file_mod'] . '?/' : $config['root'];
-
+
if (!isset($_POST['json_response'])) {
$index = $root . $board['dir'] . $config['file_index'];
echo Element('page.html', array('config' => $config, 'body' => '
', 'title' => _('Report submitted!')));
@@ -215,135 +378,137 @@ function strip_array($var) {
header('Content-Type: text/json');
echo json_encode(array('success' => true));
}
-}
-elseif (isset($_POST['post'])) {
- if (!isset($_POST['body'], $_POST['board'])) {
+} elseif (isset($_POST['post']) || $dropped_post) {
+ if ((!isset($_POST['body'], $_POST['board'], $_POST['message']) || $_POST['message'] != '') && !$dropped_post) {
error($config['error']['bot']);
}
-
+
$post = array(
'board' => $_POST['board'],
'files' => array(),
'time' => time(), // Timezone independent UNIX timecode.
);
-
+
// Check if board exists
if (!openBoard($post['board']))
error($config['error']['noboard']);
-
+
if (!isset($_POST['name']))
$_POST['name'] = $config['anonymous'];
-
+
if (!isset($_POST['email']))
$_POST['email'] = '';
-
+
if (!isset($_POST['subject']))
$_POST['subject'] = '';
-
+
if (!isset($_POST['password']))
$_POST['password'] = '';
-
+
if (isset($_POST['thread'])) {
$post['op'] = false;
$post['thread'] = round($_POST['thread']);
} else
$post['op'] = true;
- // The dnsbls is an optional DNS blacklist include.
- // Squelch warnings if it doesn't exist.
- if (!$config['captcha']['enabled'] && !($post['op'] && $config['new_thread_capt'])) {
- if (file_exists('inc/dnsbls.php')) {
- include "./inc/dnsbls.php";
+ if (!$dropped_post) {
+ // The dnsbls is an optional DNS blacklist include.
+ // Squelch warnings if it doesn't exist.
+ if (!$config['captcha']['enabled'] && !($post['op'] && $config['new_thread_capt'])) {
+ @include "./inc/dnsbls.php";
}
- }
- // Check if banned
- checkBan($board['uri']);
-
- // Check for CAPTCHA right after opening the board so the "return" link is in there
- if ($config['recaptcha']) {
- if (!isset($_POST['recaptcha_challenge_field']) || !isset($_POST['recaptcha_response_field']))
- error($config['error']['bot']);
- // Check what reCAPTCHA has to say...
- $resp = recaptcha_check_answer($config['recaptcha_private'],
- $_SERVER['REMOTE_ADDR'],
- $_POST['recaptcha_challenge_field'],
- $_POST['recaptcha_response_field']);
- if (!$resp->is_valid) {
- error($config['error']['captcha']);
+ // Check if banned
+ checkBan($board['uri']);
+
+ // Check for CAPTCHA right after opening the board so the "return" link is in there
+ if ($config['recaptcha']) {
+ if (!isset($_POST['recaptcha_challenge_field']) || !isset($_POST['recaptcha_response_field']))
+ error($config['error']['bot']);
+ // Check what reCAPTCHA has to say...
+ $resp = recaptcha_check_answer($config['recaptcha_private'],
+ $_SERVER['REMOTE_ADDR'],
+ $_POST['recaptcha_challenge_field'],
+ $_POST['recaptcha_response_field']);
+ if (!$resp->is_valid) {
+ error($config['error']['captcha']);
+ }
}
- }
-
- // Same, but now with our custom captcha provider
- //if ($config['captcha']['enabled']) {
- //New thread captcha
- if (($config['captcha']['enabled']) || (($post['op']) && ($config['new_thread_capt'])) ) {
- $resp = file_get_contents($config['captcha']['provider_check'] . "?" . http_build_query([
- 'mode' => 'check',
- 'text' => $_POST['captcha_text'],
- 'extra' => $config['captcha']['extra'],
- 'cookie' => $_POST['captcha_cookie']
- ]));
- if ($resp !== '1') {
- error($config['error']['captcha'] .
- '');
+ // Same, but now with our custom captcha provider
+ //if ($config['captcha']['enabled']) {
+ //New thread captcha
+ if (($config['captcha']['enabled']) || (($post['op']) && ($config['new_thread_capt'])) ) {
+ $resp = file_get_contents($config['captcha']['provider_check'] . "?" . http_build_query([
+ 'mode' => 'check',
+ 'text' => $_POST['captcha_text'],
+ 'extra' => $config['captcha']['extra'],
+ 'cookie' => $_POST['captcha_cookie']
+ ]));
+
+ if ($resp !== '1') {
+ error($config['error']['captcha'] .
+ '');
+ }
}
- }
-
- //if (!(($post['op'] && $_POST['post'] == $config['button_newtopic']) ||
- //(!$post['op'] && $_POST['post'] == $config['button_reply'])))
- //error($config['error']['bot']);
- // Check the referrer
- if ($config['referer_match'] !== false &&
- (!isset($_SERVER['HTTP_REFERER']) || !preg_match($config['referer_match'], rawurldecode($_SERVER['HTTP_REFERER'])))) {
- error($config['error']['referer']);
- }
-
- if ($post['mod'] = isset($_POST['mod']) && $_POST['mod']) {
- check_login(false);
- if (!$mod) {
- // Liar. You're not a mod.
- error($config['error']['notamod']);
+ //if (!(($post['op'] && $_POST['post'] == $config['button_newtopic']) ||
+ //(!$post['op'] && $_POST['post'] == $config['button_reply'])))
+ //error($config['error']['bot']);
+
+ // Check the referrer
+ // if ($config['referer_match'] !== false &&
+ // (!isset($_SERVER['HTTP_REFERER']) || !preg_match($config['referer_match'], rawurldecode($_SERVER['HTTP_REFERER'])))) {
+ // error($config['error']['referer']);
+ // }
+
+ if ($post['mod'] = isset($_POST['mod']) && $_POST['mod']) {
+ check_login(false);
+ if (!$mod) {
+ // Liar. You're not a mod.
+ error($config['error']['notamod']);
+ }
+
+ $post['sticky'] = $post['op'] && isset($_POST['sticky']);
+ $post['locked'] = $post['op'] && isset($_POST['lock']);
+ $post['raw'] = isset($_POST['raw']);
+
+ if ($post['sticky'] && !hasPermission($config['mod']['sticky'], $board['uri']))
+ error($config['error']['noaccess']);
+ if ($post['locked'] && !hasPermission($config['mod']['lock'], $board['uri']))
+ error($config['error']['noaccess']);
+ if ($post['raw'] && !hasPermission($config['mod']['rawhtml'], $board['uri']))
+ error($config['error']['noaccess']);
+ }
+
+ if (!$post['mod']) {
+ $post['antispam_hash'] = checkSpam(array($board['uri'], isset($post['thread']) ? $post['thread'] : ($config['try_smarter'] && isset($_POST['page']) ? 0 - (int)$_POST['page'] : null)));
+ if ($post['antispam_hash'] === true && $config['enable_antibot'])
+ error($config['error']['spam']);
}
- $post['sticky'] = $post['op'] && isset($_POST['sticky']);
- $post['locked'] = $post['op'] && isset($_POST['lock']);
- $post['raw'] = isset($_POST['raw']);
-
- if ($post['sticky'] && !hasPermission($config['mod']['sticky'], $board['uri']))
- error($config['error']['noaccess']);
- if ($post['locked'] && !hasPermission($config['mod']['lock'], $board['uri']))
- error($config['error']['noaccess']);
- if ($post['raw'] && !hasPermission($config['mod']['rawhtml'], $board['uri']))
- error($config['error']['noaccess']);
- }
-
- if (!$post['mod']) {
- $post['antispam_hash'] = checkSpam(array($board['uri'], isset($post['thread']) ? $post['thread'] : ($config['try_smarter'] && isset($_POST['page']) ? 0 - (int)$_POST['page'] : null)));
- if ($post['antispam_hash'] === true && $config['enable_antibot'])
- error($config['error']['spam']);
+ if ($config['robot_enable'] && $config['robot_mute']) {
+ checkMute();
+ }
}
-
- if ($config['robot_enable'] && $config['robot_mute']) {
- checkMute();
+ else {
+ $mod = $post['mod'] = false;
}
-
+
//Check if thread exists
if (!$post['op']) {
$query = prepare(sprintf("SELECT `sticky`,`locked`,`cycle`,`sage` FROM ``posts_%s`` WHERE `id` = :id AND `thread` IS NULL LIMIT 1", $board['uri']));
$query->bindValue(':id', $post['thread'], PDO::PARAM_INT);
$query->execute() or error(db_error());
-
+
if (!$thread = $query->fetch(PDO::FETCH_ASSOC)) {
// Non-existant
error($config['error']['nonexistant']);
}
}
-
-
+
+
// Check for an embed field
if ($config['enable_embedding'] && isset($_POST['embed']) && !empty($_POST['embed'])) {
// yep; validate it
@@ -363,7 +528,7 @@ function strip_array($var) {
if ($config['image_reject_repost']) {
if ($p = getPostByEmbed($post['embed'])) {
- error(sprintf($config['error']['fileexists'],
+ error(sprintf($config['error']['fileexists'],
($post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root']) .
($board['dir'] . $config['dir']['res'] .
($p['thread'] ?
@@ -375,7 +540,7 @@ function strip_array($var) {
}
} else if (!$post['op'] && $config['image_reject_repost_in_thread']) {
if ($p = getPostByEmbedInThread($post['embed'], $post['thread'])) {
- error(sprintf($config['error']['fileexistsinthread'],
+ error(sprintf($config['error']['fileexistsinthread'],
($post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root']) .
($board['dir'] . $config['dir']['res'] .
($p['thread'] ?
@@ -387,29 +552,29 @@ function strip_array($var) {
}
}
}
-
+
if (!hasPermission($config['mod']['bypass_field_disable'], $board['uri'])) {
if ($config['field_disable_name'])
$_POST['name'] = $config['anonymous']; // "forced anonymous"
-
+
if ($config['field_disable_email'])
$_POST['email'] = '';
if ($config['field_email_selectbox'] && $_POST['email'] != 'sage')
$_POST['email'] = '';
-
+
if ($config['field_disable_password'])
$_POST['password'] = '';
-
+
if ($config['field_disable_subject'] || (!$post['op'] && $config['field_disable_reply_subject']))
$_POST['subject'] = '';
}
-
+
if ($config['allow_upload_by_url'] && isset($_POST['file_url']) && !empty($_POST['file_url'])) {
$post['file_url'] = $_POST['file_url'];
if (!preg_match('@^https?://@', $post['file_url']))
error($config['error']['invalidimg']);
-
+
if (mb_strpos($post['file_url'], '?') !== false)
$url_without_params = mb_substr($post['file_url'], 0, mb_strpos($post['file_url'], '?'));
else
@@ -430,9 +595,9 @@ function unlink_tmp_file($file) {
fatal_error_handler();
}
register_shutdown_function('unlink_tmp_file', $post['file_tmp']);
-
+
$fp = fopen($post['file_tmp'], 'w');
-
+
$curl = curl_init();
curl_setopt($curl, CURLOPT_URL, $post['file_url']);
curl_setopt($curl, CURLOPT_FAILONERROR, true);
@@ -443,12 +608,12 @@ function unlink_tmp_file($file) {
curl_setopt($curl, CURLOPT_BINARYTRANSFER, true);
curl_setopt($curl, CURLOPT_FILE, $fp);
curl_setopt($curl, CURLOPT_PROTOCOLS, CURLPROTO_HTTP | CURLPROTO_HTTPS);
-
+
if (curl_exec($curl) === false)
error($config['error']['nomove'] . '
Curl says: ' . curl_error($curl));
-
+
curl_close($curl);
-
+
fclose($fp);
$_FILES['file'] = array(
@@ -459,7 +624,7 @@ function unlink_tmp_file($file) {
'size' => filesize($post['file_tmp'])
);
}
-
+
$post['name'] = $_POST['name'] != '' ? $_POST['name'] : $config['anonymous'];
$post['subject'] = $_POST['subject'];
$post['email'] = str_replace(' ', '%20', htmlspecialchars($_POST['email']));
@@ -471,54 +636,61 @@ function unlink_tmp_file($file) {
$post['email'] = 'sage';
}
}
-
+
$post['body'] = $_POST['body'];
$post['password'] = $_POST['password'];
- $post['has_file'] = (!isset($post['embed']) && (($post['op'] && !isset($post['no_longer_require_an_image_for_op']) && $config['force_image_op']) || !empty($_FILES['file']['name'])));
-
- // Handle our Tor users
- $tor = checkDNSBL();
- if ($tor && !(isset($_SERVER['HTTP_X_TOR'], $_SERVER['REMOTE_ADDR']) && $_SERVER['REMOTE_ADDR'] == '127.0.0.2' && $_SERVER['HTTP_X_TOR'] = 'true'))
- error('To post on 8chan over Tor, you must use the hidden service for security reasons. You can find it at http://fullchan4jtta4sx.onion.');
- if ($tor && $post['has_file'] && !$config['tor_image_posting'])
- error('Sorry. Tor users can\'t upload files on this board.');
- if ($tor && !$config['tor_posting'])
- error('Sorry. The owner of this board has decided not to allow Tor posters for some reason...');
-
- if ($post['has_file'] && $config['disable_images']) {
- error($config['error']['images_disabled']);
- }
-
- if (!($post['has_file'] || isset($post['embed'])) || (($post['op'] && $config['force_body_op']) || (!$post['op'] && $config['force_body']))) {
- // http://stackoverflow.com/a/4167053
- $stripped_whitespace = preg_replace('/^[\pZ\pC]+|[\pZ\pC]+$/u', '', $post['body']);
- if ($stripped_whitespace == '') {
- error($config['error']['tooshort_body']);
+ $post['has_file'] = (!isset($post['embed']) && (($post['op'] && !isset($post['no_longer_require_an_image_for_op']) && $config['force_image_op']) || count($_FILES) > 0));
+
+ if (!$dropped_post) {
+ // Handle our Tor users
+ $tor = checkDNSBL();
+ if ($tor && !(isset($_SERVER['HTTP_X_TOR'], $_SERVER['REMOTE_ADDR']) && $_SERVER['REMOTE_ADDR'] == '127.0.0.2' && $_SERVER['HTTP_X_TOR'] = 'true'))
+ error('To post on 8chan over Tor, you must use the hidden service for security reasons. You can find it at http://8ch.vichandcxw4gm3wy.onion/.');
+ if ($tor && $post['has_file'] && !$config['tor_image_posting'])
+ error('Sorry. Tor users can\'t upload files on this board.');
+ if ($tor && !$config['tor_posting'])
+ error('Sorry. The owner of this board has decided not to allow Tor posters for some reason...');
+
+ if ($post['has_file'] && $config['disable_images']) {
+ error($config['error']['images_disabled']);
+ }
+
+ if (!($post['has_file'] || isset($post['embed'])) || (($post['op'] && $config['force_body_op']) || (!$post['op'] && $config['force_body']))) {
+ // http://stackoverflow.com/a/4167053
+ $stripped_whitespace = preg_replace('/^[\pZ\pC]+|[\pZ\pC]+$/u', '', $post['body']);
+ if ($stripped_whitespace == '') {
+ error($config['error']['tooshort_body']);
+ }
}
- }
- if ($config['force_subject_op'] && $post['op']) {
- $stripped_whitespace = preg_replace('/^[\pZ\pC]+|[\pZ\pC]+$/u', '', $post['subject']);
- if ($stripped_whitespace == '') {
- error(_('It is required to enter a subject when starting a new thread on this board.'));
+ if ($config['force_subject_op'] && $post['op']) {
+ $stripped_whitespace = preg_replace('/^[\pZ\pC]+|[\pZ\pC]+$/u', '', $post['subject']);
+ if ($stripped_whitespace == '') {
+ error(_('It is required to enter a subject when starting a new thread on this board.'));
+ }
+ }
+
+ if (!$post['op']) {
+ // Check if thread is locked
+ // but allow mods to post
+ if ($thread['locked'] && !hasPermission($config['mod']['postinlocked'], $board['uri']))
+ error($config['error']['locked']);
+
+ $numposts = numPosts($post['thread']);
+
+ if ($config['reply_hard_limit'] != 0 && $config['reply_hard_limit'] <= $numposts['replies'])
+ error($config['error']['reply_hard_limit']);
+
+ if ($post['has_file'] && $config['image_hard_limit'] != 0 && $config['image_hard_limit'] <= $numposts['images'])
+ error($config['error']['image_hard_limit']);
}
}
-
- if (!$post['op']) {
- // Check if thread is locked
- // but allow mods to post
- if ($thread['locked'] && !hasPermission($config['mod']['postinlocked'], $board['uri']))
- error($config['error']['locked']);
-
- $numposts = numPosts($post['thread']);
-
- if ($config['reply_hard_limit'] != 0 && $config['reply_hard_limit'] <= $numposts['replies'])
- error($config['error']['reply_hard_limit']);
-
- if ($post['has_file'] && $config['image_hard_limit'] != 0 && $config['image_hard_limit'] <= $numposts['images'])
- error($config['error']['image_hard_limit']);
+ else {
+ if (!$post['op']) {
+ $numposts = numPosts($post['thread']);
+ }
}
-
+
if ($post['has_file']) {
// Determine size sanity
$size = 0;
@@ -544,30 +716,30 @@ function unlink_tmp_file($file) {
)));
$post['filesize'] = $size;
}
-
-
+
+
$post['capcode'] = false;
-
+
if ($mod && preg_match('/^((.+) )?## (.+)$/', $post['name'], $matches) && (in_array($board['uri'], $mod['boards']) or $mod['boards'][0] == '*')) {
$name = $matches[2] != '' ? $matches[2] : $config['anonymous'];
$cap = $matches[3];
-
+
if (isset($config['mod']['capcode'][$mod['type']])) {
if ( $config['mod']['capcode'][$mod['type']] === true ||
(is_array($config['mod']['capcode'][$mod['type']]) &&
in_array($cap, $config['mod']['capcode'][$mod['type']])
)) {
-
+
$post['capcode'] = utf8tohtml($cap);
$post['name'] = $name;
}
}
}
-
+
$trip = generate_tripcode($post['name']);
$post['name'] = $trip[0];
- $post['trip'] = isset($trip[1]) ? $trip[1] : '';
-
+ $post['trip'] = isset($trip[1]) ? $trip[1] : ''; // XX: Dropped posts and tripcodes
+
$noko = false;
if (strtolower($post['email']) == 'noko') {
$noko = true;
@@ -576,12 +748,12 @@ function unlink_tmp_file($file) {
$noko = false;
$post['email'] = '';
} else $noko = $config['always_noko'];
-
+
if ($post['has_file']) {
$i = 0;
foreach ($_FILES as $key => $file) {
if ($file['size'] && $file['tmp_name']) {
- $file['filename'] = urldecode(function_exists('get_magic_quotes_gpc') && get_magic_quotes_gpc() ? stripslashes($file['name']) : $file['name']);
+ $file['filename'] = urldecode($file['name']);
$file['extension'] = strtolower(mb_substr($file['filename'], mb_strrpos($file['filename'], '.') + 1));
if (isset($config['filename_func']))
$file['file_id'] = $config['filename_func']($file);
@@ -590,7 +762,7 @@ function unlink_tmp_file($file) {
if (sizeof($_FILES) > 1)
$file['file_id'] .= "-$i";
-
+
$file['file'] = $config['dir']['img_root'] . $board['dir'] . $config['dir']['img'] . $file['file_id'] . '.' . $file['extension'];
while (file_exists ($file['file'])) {
@@ -607,15 +779,17 @@ function unlink_tmp_file($file) {
if (empty($post['files'])) $post['has_file'] = false;
- // Check for a file
- if ($post['op'] && !isset($post['no_longer_require_an_image_for_op'])) {
- if (!$post['has_file'] && $config['force_image_op'])
- error($config['error']['noimage']);
- }
+ if (!$dropped_post) {
+ // Check for a file
+ if ($post['op'] && !isset($post['no_longer_require_an_image_for_op'])) {
+ if (!$post['has_file'] && $config['force_image_op'])
+ error($config['error']['noimage']);
+ }
- // Check for too many files
- if (sizeof($post['files']) > $config['max_images'])
- error($config['error']['toomanyimages']);
+ // Check for too many files
+ if (sizeof($post['files']) > $config['max_images'])
+ error($config['error']['toomanyimages']);
+ }
if ($config['strip_combining_chars']) {
$post['name'] = strip_combining_chars($post['name']);
@@ -623,41 +797,44 @@ function unlink_tmp_file($file) {
$post['subject'] = strip_combining_chars($post['subject']);
$post['body'] = strip_combining_chars($post['body']);
}
-
- // Check string lengths
- if (mb_strlen($post['name']) > 35)
- error(sprintf($config['error']['toolong'], 'name'));
- if (mb_strlen($post['email']) > 40)
- error(sprintf($config['error']['toolong'], 'email'));
- if (mb_strlen($post['subject']) > 100)
- error(sprintf($config['error']['toolong'], 'subject'));
- if (!$mod && mb_strlen($post['body']) > $config['max_body'])
- error($config['error']['toolong_body']);
- if (mb_strlen($post['body']) < $config['min_body'] && $post['op'])
- error(sprintf(_('OP must be at least %d chars on this board.'), $config['min_body']));
- if (mb_strlen($post['password']) > 20)
- error(sprintf($config['error']['toolong'], 'password'));
+
+ if (!$dropped_post) {
+ // Check string lengths
+ if (mb_strlen($post['name']) > 35)
+ error(sprintf($config['error']['toolong'], 'name'));
+ if (mb_strlen($post['email']) > 40)
+ error(sprintf($config['error']['toolong'], 'email'));
+ if (mb_strlen($post['subject']) > 100)
+ error(sprintf($config['error']['toolong'], 'subject'));
+ if (!$mod && mb_strlen($post['body']) > $config['max_body'])
+ error($config['error']['toolong_body']);
+ if (mb_strlen($post['body']) < $config['min_body'] && $post['op'])
+ error(sprintf(_('OP must be at least %d chars on this board.'), $config['min_body']));
+ if (mb_strlen($post['password']) > 20)
+ error(sprintf($config['error']['toolong'], 'password'));
+ }
wordfilters($post['body']);
if ($config['max_newlines'] > 0) {
preg_match_all("/\n/", $post['body'], $nlmatches);
-
+
if (isset($nlmatches[0]) && sizeof($nlmatches[0]) > $config['max_newlines'])
error(sprintf(_('Your post contains too many lines. This board only allows %d maximum.'), $config['max_newlines']));
}
-
-
+
+
$post['body'] = escape_markup_modifiers($post['body']);
-
+
if ($mod && isset($post['raw']) && $post['raw']) {
$post['body'] .= "\n1";
}
-
+
+ if (!$dropped_post)
if (($config['country_flags'] && (!$config['allow_no_country'] || $config['force_flag'])) || ($config['country_flags'] && $config['allow_no_country'] && !isset($_POST['no_country']))) {
require 'inc/lib/geoip/geoip.inc';
$gi=geoip\geoip_open('inc/lib/geoip/GeoIPv6.dat', GEOIP_STANDARD);
-
+
function ipv4to6($ip) {
if (strpos($ip, ':') !== false) {
if (strpos($ip, '.') > 0)
@@ -669,7 +846,7 @@ function ipv4to6($ip) {
$part8 = base_convert(($iparr[2] * 256) + $iparr[3], 10, 16);
return '::ffff:'.$part7.':'.$part8;
}
-
+
$country_code = geoip\geoip_country_code_by_addr_v6($gi, ipv4to6($_SERVER['REMOTE_ADDR']));
$country_name = geoip\geoip_country_name_by_addr_v6($gi, ipv4to6($_SERVER['REMOTE_ADDR']));
if (!$country_code) $country_code = 'A1';
@@ -678,11 +855,11 @@ function ipv4to6($ip) {
$post['body'] .= "\n".strtolower($country_code)."".
"\n$country_name";
}
-
+
if ($config['user_flag'] && isset($_POST['user_flag'])) {
if (!empty($_POST['user_flag']) ){
$user_flag = $_POST['user_flag'];
-
+
if (!isset($config['user_flags'][$user_flag]))
error(_('Invalid flag selection!'));
@@ -699,13 +876,20 @@ function ipv4to6($ip) {
$post['body'] .= "\n" . $_POST['tag'] . "";
}
+ // TODO: backport this part fully from vichan
+ //if (!$dropped_post)
+ //if ($config['proxy_save'] && isset($_SERVER['HTTP_X_FORWARDED_FOR'])) {
+ // $proxy = preg_replace("/[^0-9a-fA-F.,: ]/", '', $_SERVER['HTTP_X_FORWARDED_FOR']);
+ // $post['body'] .= "\n".$proxy."";
+ //}
+
if (mysql_version() >= 50503) {
$post['body_nomarkup'] = $post['body']; // Assume we're using the utf8mb4 charset
}
else {
// MySQL's `utf8` charset only supports up to 3-byte symbols
// Remove anything >= 0x010000
-
+
$chars = preg_split('//u', $post['body'], -1, PREG_SPLIT_NO_EMPTY);
$post['body_nomarkup'] = '';
foreach ($chars as $char) {
@@ -716,12 +900,16 @@ function ipv4to6($ip) {
$post['body_nomarkup'] .= $char;
}
}
-
+
$post['tracked_cites'] = markup($post['body'], true, $post['op']);
-
-
+
+
if ($post['has_file']) {
+ $md5cmd = false;
+ if ($config['bsd_md5']) $md5cmd = '/sbin/md5 -r';
+ if ($config['gnu_md5']) $md5cmd = 'md5sum';
+
$allhashes = '';
foreach ($post['files'] as $key => &$file) {
@@ -731,22 +919,23 @@ function ipv4to6($ip) {
}
elseif (!in_array($file['extension'], $config['allowed_ext']) && !in_array($file['extension'], $config['allowed_ext_files']))
error($config['error']['unknownext']);
-
+
$file['is_an_image'] = !in_array($file['extension'], $config['allowed_ext_files']);
-
+
// Truncate filename if it is too long
$file['filename'] = mb_substr($file['filename'], 0, $config['max_filename_len']);
-
+
$upload = $file['tmp_name'];
-
+
if (!is_readable($upload))
error($config['error']['nomove']);
- $md5cmd = $config['bsd_md5'] ? 'md5 -r' : 'md5sum';
- if( ($output = shell_exec_error("cat " . escapeshellarg($upload) . " | $md5cmd")) !== false ) {
- $explodedvar = explode(' ', $output);
- $hash = $explodedvar[0];
- } else {
+ if ($md5cmd) {
+ $output = shell_exec_error($md5cmd . " < " . escapeshellarg($upload));
+ $output = explode(' ', $output);
+ $hash = $output[0];
+ }
+ else {
$hash = md5_file($upload);
}
@@ -763,14 +952,15 @@ function ipv4to6($ip) {
$allhashes .= $hash;
}
- if (count($post['files']) == 1) {
+ if (count ($post['files']) == 1) {
$post['filehash'] = $hash;
- } else {
+ }
+ else {
$post['filehash'] = md5($allhashes);
}
}
- if (!hasPermission($config['mod']['bypass_filters'], $board['uri'])) {
+ if (!hasPermission($config['mod']['bypass_filters'], $board['uri']) && !$dropped_post) {
require_once 'inc/filters.php';
do_filters($post);
@@ -778,25 +968,30 @@ function ipv4to6($ip) {
if ($post['has_file']) {
foreach ($post['files'] as $key => &$file) {
- if ($file['is_an_image'] && $config['ie_mime_type_detection'] !== false) {
- // Check IE MIME type detection XSS exploit
- $buffer = file_get_contents($upload, null, null, null, 255);
- if (preg_match($config['ie_mime_type_detection'], $buffer)) {
- undoImage($post);
- error($config['error']['mime_exploit']);
+ if ($file['is_an_image']) {
+ if ($config['ie_mime_type_detection'] !== false) {
+ // Check IE MIME type detection XSS exploit
+ $buffer = file_get_contents($upload, null, null, null, 255);
+ if (preg_match($config['ie_mime_type_detection'], $buffer)) {
+ undoImage($post);
+ error($config['error']['mime_exploit']);
+ }
}
-
+
require_once 'inc/image.php';
-
+
// find dimensions of an image using GD
if (!$size = @getimagesize($file['tmp_name'])) {
error($config['error']['invalidimg']);
}
+ if (!in_array($size[2], array(IMAGETYPE_PNG, IMAGETYPE_GIF, IMAGETYPE_JPEG, IMAGETYPE_BMP))) {
+ error($config['error']['invalidimg']);
+ }
if ($size[0] > $config['max_width'] || $size[1] > $config['max_height']) {
error($config['error']['maxsize']);
}
-
-
+
+
if ($config['convert_auto_orient'] && ($file['extension'] == 'jpg' || $file['extension'] == 'jpeg')) {
// The following code corrects the image orientation.
// Currently only works with the 'convert' option selected but it could easily be expanded to work with the rest if you can be bothered.
@@ -835,20 +1030,20 @@ function ipv4to6($ip) {
}
}
}
-
+
// create image object
$image = new Image($file['tmp_name'], $file['extension'], $size);
if ($image->size->width > $config['max_width'] || $image->size->height > $config['max_height']) {
$image->delete();
error($config['error']['maxsize']);
}
-
+
$file['width'] = $image->size->width;
$file['height'] = $image->size->height;
-
+
if ($config['spoiler_images'] && isset($_POST['spoiler'])) {
$file['thumb'] = 'spoiler';
-
+
$size = @getimagesize($config['spoiler_image']);
$file['thumbwidth'] = $size[0];
$file['thumbheight'] = $size[1];
@@ -856,10 +1051,10 @@ function ipv4to6($ip) {
$image->size->width <= $config['thumb_width'] &&
$image->size->height <= $config['thumb_height'] &&
$file['extension'] == ($config['thumb_ext'] ? $config['thumb_ext'] : $file['extension'])) {
-
+
// Copy, because there's nothing to resize
copy($file['tmp_name'], $file['thumb']);
-
+
$file['thumbwidth'] = $image->size->width;
$file['thumbheight'] = $image->size->height;
} else {
@@ -868,16 +1063,16 @@ function ipv4to6($ip) {
$post['op'] ? $config['thumb_op_width'] : $config['thumb_width'],
$post['op'] ? $config['thumb_op_height'] : $config['thumb_height']
);
-
+
$thumb->to($file['thumb']);
-
+
$file['thumbwidth'] = $thumb->width;
$file['thumbheight'] = $thumb->height;
-
+
$thumb->_destroy();
}
-
- if ($config['redraw_image'] || (empty($file['exif_stripped']) && $config['strip_exif'] && ($file['extension'] == 'jpg' || $file['extension'] == 'jpeg'))) {
+
+ if ($config['redraw_image'] || (!@$file['exif_stripped'] && $config['strip_exif'] && ($file['extension'] == 'jpg' || $file['extension'] == 'jpeg'))) {
if (!$config['redraw_image'] && $config['use_exiftool']) {
if($error = shell_exec_error('exiftool -overwrite_original -ignoreMinorErrors -q -q -all= ' .
escapeshellarg($file['tmp_name'])))
@@ -900,6 +1095,34 @@ function ipv4to6($ip) {
$file['thumbheight'] = $size[1];
}
+ if ($config['tesseract_ocr'] && $file['thumb'] != 'file') { // Let's OCR it!
+ $fname = $file['tmp_name'];
+
+ if ($file['height'] > 500 || $file['width'] > 500) {
+ $fname = $file['thumb'];
+ }
+
+ if ($fname == 'spoiler') { // We don't have that much CPU time, do we?
+ }
+ else {
+ $tmpname = "tmp/tesseract/".rand(0,10000000);
+
+ // Preprocess command is an ImageMagick b/w quantization
+ $error = shell_exec_error(sprintf($config['tesseract_preprocess_command'], escapeshellarg($fname)) . " | " .
+ 'tesseract stdin '.escapeshellarg($tmpname).' '.$config['tesseract_params']);
+ $tmpname .= ".txt";
+
+ $value = @file_get_contents($tmpname);
+ @unlink($tmpname);
+
+ if ($value && trim($value)) {
+ // This one has an effect, that the body is appended to a post body. So you can write a correct
+ // spamfilter.
+ $post['body_nomarkup'] .= "".htmlspecialchars($value)."";
+ }
+ }
+ }
+
if (!isset($dont_copy_file) || !$dont_copy_file) {
if (isset($file['file_tmp'])) {
if (!@rename($file['tmp_name'], $file['file']))
@@ -913,7 +1136,7 @@ function ipv4to6($ip) {
if ($config['image_reject_repost']) {
if ($p = getPostByHash($post['filehash'])) {
undoImage($post);
- error(sprintf($config['error']['fileexists'],
+ error(sprintf($config['error']['fileexists'],
($post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root']) .
($board['dir'] . $config['dir']['res'] .
($p['thread'] ?
@@ -926,7 +1149,7 @@ function ipv4to6($ip) {
} else if (!$post['op'] && $config['image_reject_repost_in_thread']) {
if ($p = getPostByHashInThread($post['filehash'], $post['thread'])) {
undoImage($post);
- error(sprintf($config['error']['fileexistsinthread'],
+ error(sprintf($config['error']['fileexistsinthread'],
($post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root']) .
($board['dir'] . $config['dir']['res'] .
($p['thread'] ?
@@ -938,8 +1161,13 @@ function ipv4to6($ip) {
}
}
}
+
+ // Do filters again if OCRing
+ if ($config['tesseract_ocr'] && !hasPermission($config['mod']['bypass_filters'], $board['uri']) && !$dropped_post) {
+ do_filters($post);
+ }
- if (!hasPermission($config['mod']['postunoriginal'], $board['uri']) && $config['robot_enable'] && checkRobot($post['body_nomarkup'])) {
+ if (!hasPermission($config['mod']['postunoriginal'], $board['uri']) && $config['robot_enable'] && checkRobot($post['body_nomarkup']) && !$dropped_post) {
undoImage($post);
if ($config['robot_mute']) {
error(sprintf($config['error']['muted'], mute()));
@@ -947,7 +1175,7 @@ function ipv4to6($ip) {
error($config['error']['unoriginal']);
}
}
-
+
// Remove board directories before inserting them into the database.
if ($post['has_file']) {
foreach ($post['files'] as $key => &$file) {
@@ -958,7 +1186,7 @@ function ipv4to6($ip) {
$file['thumb'] = mb_substr($file['thumb'], mb_strlen($config['dir']['img_root'] . $board['dir'] . $config['dir']['thumb']));
}
}
-
+
$post = (object)$post;
$post->files = array_map(function($a) { return (object)$a; }, $post->files);
$error = event('post', $post);
@@ -973,15 +1201,51 @@ function ipv4to6($ip) {
if ($post['files'])
$post['files'] = $post['files'];
$post['num_files'] = sizeof($post['files']);
-
+
// Commit the post to the database.
$post['id'] = $id = post($post);
-
- if (!$tor) insertFloodPost($post);
-
+
+
// Update statistics for this board.
updateStatisticsForPost( $post );
+
+
+ if ($dropped_post && $dropped_post['from_nntp']) {
+ $query = prepare("INSERT INTO ``nntp_references`` (`board`, `id`, `message_id`, `message_id_digest`, `own`, `headers`) VALUES ".
+ "(:board , :id , :message_id , :message_id_digest , false, :headers)");
+
+ $query->bindValue(':board', $dropped_post['board']);
+ $query->bindValue(':id', $id);
+ $query->bindValue(':message_id', $dropped_post['msgid']);
+ $query->bindValue(':message_id_digest', sha1($dropped_post['msgid']));
+ $query->bindValue(':headers', $dropped_post['headers']);
+ $query->execute() or error(db_error($query));
+ } // ^^^^^ For inbound posts ^^^^^
+ elseif ($config['nntpchan']['enabled'] && $config['nntpchan']['group']) {
+ // vvvvv For outbound posts vvvvv
+ require_once('inc/nntpchan/nntpchan.php');
+ $msgid = gen_msgid($post['board'], $post['id']);
+
+ list($headers, $files) = post2nntp($post, $msgid);
+
+ $message = gen_nntp($headers, $files);
+
+ $query = prepare("INSERT INTO ``nntp_references`` (`board`, `id`, `message_id`, `message_id_digest`, `own`, `headers`) VALUES ".
+ "(:board , :id , :message_id , :message_id_digest , true , :headers)");
+
+ $query->bindValue(':board', $post['board']);
+ $query->bindValue(':id', $post['id']);
+ $query->bindValue(':message_id', $msgid);
+ $query->bindValue(':message_id_digest', sha1($msgid));
+ $query->bindValue(':headers', json_encode($headers));
+ $query->execute() or error(db_error($query));
+
+ // Let's broadcast it!
+ nntp_publish($message, $msgid);
+ }
+
+ if (!$tor) insertFloodPost($post);
// Handle cyclical threads
if (!$post['op'] && isset($thread['cycle']) && $thread['cycle']) {
@@ -995,11 +1259,11 @@ function ipv4to6($ip) {
deletePost($dpost['id'], false, false);
}
}
-
+
if (isset($post['antispam_hash'])) {
incrementSpamHash($post['antispam_hash']);
}
-
+
if (isset($post['tracked_cites']) && !empty($post['tracked_cites'])) {
$insert_rows = array();
foreach ($post['tracked_cites'] as $cite) {
@@ -1009,11 +1273,11 @@ function ipv4to6($ip) {
}
query('INSERT INTO ``cites`` VALUES ' . implode(', ', $insert_rows)) or error(db_error());
}
-
+
if (!$post['op'] && !isset($_POST['no-bump']) && strtolower($post['email']) != 'sage' && !$thread['sage'] && ($thread['cycle'] || $config['reply_limit'] == 0 || $numposts['replies']+1 < $config['reply_limit'])) {
bumpThread($post['thread']);
}
-
+
if (isset($_SERVER['HTTP_REFERER'])) {
// Tell Javascript that we posted successfully
if (isset($_COOKIE[$config['cookies']['js']]))
@@ -1025,13 +1289,13 @@ function ipv4to6($ip) {
// Encode and set cookie
setcookie($config['cookies']['js'], json_encode($js), 0, $config['cookies']['jail'] ? $config['cookies']['path'] : '/', null, false, false);
}
-
+
$root = $post['mod'] ? $config['root'] . $config['file_mod'] . '?/' : $config['root'];
-
+
if ($noko) {
$redirect = $root . $board['dir'] . $config['dir']['res'] .
sprintf($config['file_page'], $post['op'] ? $id:$post['thread']) . (!$post['op'] ? '#' . $id : '');
-
+
if (!$post['op'] && isset($_SERVER['HTTP_REFERER'])) {
$regex = array(
'board' => str_replace('%s', '(\w{1,8})', preg_quote($config['board_path'], '/')),
@@ -1047,15 +1311,15 @@ function ipv4to6($ip) {
}
} else {
$redirect = $root . $board['dir'] . $config['file_index'];
-
+
}
buildThread($post['op'] ? $id : $post['thread']);
-
+
if ($config['syslog'])
_syslog(LOG_INFO, 'New post: /' . $board['dir'] . $config['dir']['res'] .
sprintf($config['file_page'], $post['op'] ? $id : $post['thread']) . (!$post['op'] ? '#' . $id : ''));
-
+
if (!$post['mod']) header('X-Associated-Content: "' . $redirect . '"');
if (!isset($_POST['json_response'])) {
@@ -1068,22 +1332,22 @@ function ipv4to6($ip) {
'id' => $id
));
}
-
+
if ($config['try_smarter'] && $post['op'])
$build_pages = range(1, $config['max_pages']);
-
+
if ($post['op'])
- clean();
-
+ clean($id);
+
event('post-after', $post);
-
+
// We are already done, let's continue our heavy-lifting work in the background (if we run off FastCGI)
if (function_exists('fastcgi_finish_request')) {
@fastcgi_finish_request();
}
buildIndex();
-
+
if ($post['op']) {
rebuildThemes('post-thread', $board['uri']);
}
@@ -1094,9 +1358,9 @@ function ipv4to6($ip) {
elseif (isset($_POST['appeal'])) {
if (!isset($_POST['ban_id']))
error($config['error']['bot']);
-
+
$ban_id = (int)$_POST['ban_id'];
-
+
$bans = Bans::find($_SERVER['REMOTE_ADDR']);
foreach ($bans as $_ban) {
if ($_ban['id'] == $ban_id) {
@@ -1104,33 +1368,33 @@ function ipv4to6($ip) {
break;
}
}
-
+
if (!isset($ban)) {
error(_("That ban doesn't exist or is not for you."));
}
-
+
if ($ban['expires'] && $ban['expires'] - $ban['created'] <= $config['ban_appeals_min_length']) {
error(_("You cannot appeal a ban of this length."));
}
-
+
$query = query("SELECT `denied` FROM ``ban_appeals`` WHERE `ban_id` = $ban_id") or error(db_error());
$ban_appeals = $query->fetchAll(PDO::FETCH_COLUMN);
-
+
if (count($ban_appeals) >= $config['ban_appeals_max']) {
error(_("You cannot appeal this ban again."));
}
-
+
foreach ($ban_appeals as $is_denied) {
if (!$is_denied)
error(_("There is already a pending appeal for this ban."));
}
-
+
$query = prepare("INSERT INTO ``ban_appeals`` VALUES (NULL, :ban_id, :time, :message, 0)");
$query->bindValue(':ban_id', $ban_id, PDO::PARAM_INT);
$query->bindValue(':time', time(), PDO::PARAM_INT);
$query->bindValue(':message', $_POST['appeal']);
$query->execute() or error(db_error($query));
-
+
displayBan($ban);
}
else {