2021-06-26 11:23:15 -04:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace BookStack\Uploads;
|
2015-12-09 14:50:17 -05:00
|
|
|
|
2024-02-07 11:37:36 -05:00
|
|
|
use BookStack\Entities\Queries\EntityQueries;
|
2018-09-25 11:58:03 -04:00
|
|
|
use BookStack\Exceptions\ImageUploadException;
|
2016-02-02 02:34:48 -05:00
|
|
|
use Exception;
|
2021-09-26 10:48:22 -04:00
|
|
|
use Illuminate\Support\Facades\DB;
|
2021-11-01 07:32:00 -04:00
|
|
|
use Illuminate\Support\Facades\Log;
|
2019-09-13 18:58:40 -04:00
|
|
|
use Illuminate\Support\Str;
|
2015-12-09 14:50:17 -05:00
|
|
|
use Symfony\Component\HttpFoundation\File\UploadedFile;
|
2021-10-31 19:53:17 -04:00
|
|
|
use Symfony\Component\HttpFoundation\StreamedResponse;
|
2015-12-09 14:50:17 -05:00
|
|
|
|
2020-12-06 07:58:40 -05:00
|
|
|
class ImageService
|
2015-12-09 14:50:17 -05:00
|
|
|
{
|
2023-02-06 15:00:44 -05:00
|
|
|
protected static array $supportedExtensions = ['jpg', 'jpeg', 'png', 'gif', 'webp'];
|
2021-10-31 20:24:42 -04:00
|
|
|
|
2023-09-30 07:09:29 -04:00
|
|
|
public function __construct(
|
2023-09-30 13:28:42 -04:00
|
|
|
protected ImageStorage $storage,
|
2023-09-30 15:00:48 -04:00
|
|
|
protected ImageResizer $resizer,
|
2024-02-07 11:37:36 -05:00
|
|
|
protected EntityQueries $queries,
|
2023-09-30 07:09:29 -04:00
|
|
|
) {
|
2015-12-09 14:50:17 -05:00
|
|
|
}
|
|
|
|
|
2015-12-09 17:30:55 -05:00
|
|
|
/**
|
|
|
|
* Saves a new image from an upload.
|
2021-06-26 11:23:15 -04:00
|
|
|
*
|
2016-03-13 09:30:47 -04:00
|
|
|
* @throws ImageUploadException
|
2015-12-09 17:30:55 -05:00
|
|
|
*/
|
2019-05-04 10:48:15 -04:00
|
|
|
public function saveNewFromUpload(
|
|
|
|
UploadedFile $uploadedFile,
|
|
|
|
string $type,
|
|
|
|
int $uploadedTo = 0,
|
|
|
|
int $resizeWidth = null,
|
|
|
|
int $resizeHeight = null,
|
|
|
|
bool $keepRatio = true
|
2023-09-30 13:28:42 -04:00
|
|
|
): Image {
|
2021-03-14 19:20:21 -04:00
|
|
|
$imageName = $uploadedFile->getClientOriginalName();
|
2015-12-09 17:30:55 -05:00
|
|
|
$imageData = file_get_contents($uploadedFile->getRealPath());
|
2019-05-04 10:48:15 -04:00
|
|
|
|
|
|
|
if ($resizeWidth !== null || $resizeHeight !== null) {
|
2023-09-30 15:00:48 -04:00
|
|
|
$imageData = $this->resizer->resizeImageData($imageData, $resizeWidth, $resizeHeight, $keepRatio);
|
2019-05-04 10:48:15 -04:00
|
|
|
}
|
|
|
|
|
2016-03-13 09:30:47 -04:00
|
|
|
return $this->saveNew($imageName, $imageData, $type, $uploadedTo);
|
2015-12-09 17:30:55 -05:00
|
|
|
}
|
|
|
|
|
2017-12-30 10:24:03 -05:00
|
|
|
/**
|
|
|
|
* Save a new image from a uri-encoded base64 string of data.
|
2021-06-26 11:23:15 -04:00
|
|
|
*
|
2017-12-30 10:24:03 -05:00
|
|
|
* @throws ImageUploadException
|
|
|
|
*/
|
2020-12-08 18:46:38 -05:00
|
|
|
public function saveNewFromBase64Uri(string $base64Uri, string $name, string $type, int $uploadedTo = 0): Image
|
2017-12-30 10:24:03 -05:00
|
|
|
{
|
|
|
|
$splitData = explode(';base64,', $base64Uri);
|
|
|
|
if (count($splitData) < 2) {
|
2021-06-26 11:23:15 -04:00
|
|
|
throw new ImageUploadException('Invalid base64 image data provided');
|
2017-12-30 10:24:03 -05:00
|
|
|
}
|
|
|
|
$data = base64_decode($splitData[1]);
|
2021-06-26 11:23:15 -04:00
|
|
|
|
2017-12-30 10:24:03 -05:00
|
|
|
return $this->saveNew($name, $data, $type, $uploadedTo);
|
|
|
|
}
|
2015-12-09 17:30:55 -05:00
|
|
|
|
|
|
|
/**
|
2020-07-25 06:18:40 -04:00
|
|
|
* Save a new image into storage.
|
2021-06-26 11:23:15 -04:00
|
|
|
*
|
2016-01-17 10:20:07 -05:00
|
|
|
* @throws ImageUploadException
|
2015-12-09 17:30:55 -05:00
|
|
|
*/
|
2020-12-08 18:46:38 -05:00
|
|
|
public function saveNew(string $imageName, string $imageData, string $type, int $uploadedTo = 0): Image
|
2015-12-09 14:50:17 -05:00
|
|
|
{
|
2023-09-30 13:28:42 -04:00
|
|
|
$disk = $this->storage->getDisk($type);
|
2016-03-06 07:55:08 -05:00
|
|
|
$secureUploads = setting('app-secure-images');
|
2023-09-30 13:28:42 -04:00
|
|
|
$fileName = $this->storage->cleanImageFileName($imageName);
|
2015-12-09 14:50:17 -05:00
|
|
|
|
2021-06-26 11:23:15 -04:00
|
|
|
$imagePath = '/uploads/images/' . $type . '/' . date('Y-m') . '/';
|
2016-10-09 13:58:22 -04:00
|
|
|
|
2023-09-30 14:12:22 -04:00
|
|
|
while ($disk->exists($imagePath . $fileName)) {
|
2020-07-25 06:18:40 -04:00
|
|
|
$fileName = Str::random(3) . $fileName;
|
2015-12-09 14:50:17 -05:00
|
|
|
}
|
2018-05-20 11:47:53 -04:00
|
|
|
|
2020-07-25 06:18:40 -04:00
|
|
|
$fullPath = $imagePath . $fileName;
|
2018-05-20 11:47:53 -04:00
|
|
|
if ($secureUploads) {
|
2020-07-25 06:18:40 -04:00
|
|
|
$fullPath = $imagePath . Str::random(16) . '-' . $fileName;
|
2018-05-20 11:47:53 -04:00
|
|
|
}
|
2015-12-09 14:50:17 -05:00
|
|
|
|
2016-02-02 02:34:48 -05:00
|
|
|
try {
|
2023-09-30 14:12:22 -04:00
|
|
|
$disk->put($fullPath, $imageData, true);
|
2016-02-02 02:34:48 -05:00
|
|
|
} catch (Exception $e) {
|
2021-11-01 07:17:30 -04:00
|
|
|
Log::error('Error when attempting image upload:' . $e->getMessage());
|
2021-06-26 11:23:15 -04:00
|
|
|
|
2016-12-04 11:51:39 -05:00
|
|
|
throw new ImageUploadException(trans('errors.path_not_writable', ['filePath' => $fullPath]));
|
2016-02-02 02:34:48 -05:00
|
|
|
}
|
2015-12-09 14:50:17 -05:00
|
|
|
|
2016-01-17 10:20:07 -05:00
|
|
|
$imageDetails = [
|
2021-06-26 11:23:15 -04:00
|
|
|
'name' => $imageName,
|
|
|
|
'path' => $fullPath,
|
2023-09-30 13:28:42 -04:00
|
|
|
'url' => $this->storage->getPublicUrl($fullPath),
|
2021-06-26 11:23:15 -04:00
|
|
|
'type' => $type,
|
|
|
|
'uploaded_to' => $uploadedTo,
|
2016-01-17 10:20:07 -05:00
|
|
|
];
|
|
|
|
|
2016-09-29 07:43:46 -04:00
|
|
|
if (user()->id !== 0) {
|
|
|
|
$userId = user()->id;
|
2016-01-17 10:20:07 -05:00
|
|
|
$imageDetails['created_by'] = $userId;
|
|
|
|
$imageDetails['updated_by'] = $userId;
|
|
|
|
}
|
|
|
|
|
2022-09-01 11:17:14 -04:00
|
|
|
$image = (new Image())->forceFill($imageDetails);
|
|
|
|
$image->save();
|
2021-06-26 11:23:15 -04:00
|
|
|
|
2015-12-09 14:50:17 -05:00
|
|
|
return $image;
|
|
|
|
}
|
|
|
|
|
2021-05-15 12:25:51 -04:00
|
|
|
/**
|
2023-09-30 13:28:42 -04:00
|
|
|
* Replace an existing image file in the system using the given file.
|
2021-05-15 12:25:51 -04:00
|
|
|
*/
|
2023-09-30 13:28:42 -04:00
|
|
|
public function replaceExistingFromUpload(string $path, string $type, UploadedFile $file): void
|
2021-05-15 12:25:51 -04:00
|
|
|
{
|
2023-09-30 13:28:42 -04:00
|
|
|
$imageData = file_get_contents($file->getRealPath());
|
|
|
|
$disk = $this->storage->getDisk($type);
|
2023-09-30 14:12:22 -04:00
|
|
|
$disk->put($path, $imageData);
|
2021-05-15 12:25:51 -04:00
|
|
|
}
|
|
|
|
|
2017-12-30 10:24:03 -05:00
|
|
|
/**
|
|
|
|
* Get the raw data content from an image.
|
2021-06-26 11:23:15 -04:00
|
|
|
*
|
2023-09-30 13:28:42 -04:00
|
|
|
* @throws Exception
|
2017-12-30 10:24:03 -05:00
|
|
|
*/
|
2020-12-06 07:58:40 -05:00
|
|
|
public function getImageData(Image $image): string
|
2017-12-30 10:24:03 -05:00
|
|
|
{
|
2023-09-30 13:28:42 -04:00
|
|
|
$disk = $this->storage->getDisk();
|
2021-10-08 17:23:17 -04:00
|
|
|
|
2023-09-30 14:12:22 -04:00
|
|
|
return $disk->get($image->path);
|
2017-12-30 10:24:03 -05:00
|
|
|
}
|
|
|
|
|
2015-12-09 14:50:17 -05:00
|
|
|
/**
|
2018-05-13 12:41:35 -04:00
|
|
|
* Destroy an image along with its revisions, thumbnails and remaining folders.
|
2021-06-26 11:23:15 -04:00
|
|
|
*
|
2018-01-28 09:08:14 -05:00
|
|
|
* @throws Exception
|
2015-12-09 14:50:17 -05:00
|
|
|
*/
|
2023-09-30 14:12:22 -04:00
|
|
|
public function destroy(Image $image): void
|
2018-05-13 12:41:35 -04:00
|
|
|
{
|
2023-09-30 14:12:22 -04:00
|
|
|
$disk = $this->storage->getDisk($image->type);
|
|
|
|
$disk->destroyAllMatchingNameFromPath($image->path);
|
2018-05-13 12:41:35 -04:00
|
|
|
$image->delete();
|
|
|
|
}
|
|
|
|
|
2018-05-20 13:16:01 -04:00
|
|
|
/**
|
|
|
|
* Delete gallery and drawings that are not within HTML content of pages or page revisions.
|
2018-05-27 09:33:50 -04:00
|
|
|
* Checks based off of only the image name.
|
|
|
|
* Could be much improved to be more specific but kept it generic for now to be safe.
|
|
|
|
*
|
|
|
|
* Returns the path of the images that would be/have been deleted.
|
2018-05-20 13:16:01 -04:00
|
|
|
*/
|
2023-09-30 14:12:22 -04:00
|
|
|
public function deleteUnusedImages(bool $checkRevisions = true, bool $dryRun = true): array
|
2018-05-20 13:16:01 -04:00
|
|
|
{
|
2020-12-18 17:54:53 -05:00
|
|
|
$types = ['gallery', 'drawio'];
|
2018-05-27 09:33:50 -04:00
|
|
|
$deletedPaths = [];
|
|
|
|
|
2022-09-01 11:17:14 -04:00
|
|
|
Image::query()->whereIn('type', $types)
|
2020-12-18 17:54:53 -05:00
|
|
|
->chunk(1000, function ($images) use ($checkRevisions, &$deletedPaths, $dryRun) {
|
2023-05-24 05:34:43 -04:00
|
|
|
/** @var Image $image */
|
2018-09-21 13:48:47 -04:00
|
|
|
foreach ($images as $image) {
|
|
|
|
$searchQuery = '%' . basename($image->path) . '%';
|
|
|
|
$inPage = DB::table('pages')
|
2020-12-06 07:58:40 -05:00
|
|
|
->where('html', 'like', $searchQuery)->count() > 0;
|
2020-12-18 17:54:53 -05:00
|
|
|
|
2018-09-21 13:48:47 -04:00
|
|
|
$inRevision = false;
|
|
|
|
if ($checkRevisions) {
|
2020-12-06 07:58:40 -05:00
|
|
|
$inRevision = DB::table('page_revisions')
|
|
|
|
->where('html', 'like', $searchQuery)->count() > 0;
|
2018-09-21 13:48:47 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!$inPage && !$inRevision) {
|
|
|
|
$deletedPaths[] = $image->path;
|
|
|
|
if (!$dryRun) {
|
|
|
|
$this->destroy($image);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
2021-06-26 11:23:15 -04:00
|
|
|
|
2018-05-27 09:33:50 -04:00
|
|
|
return $deletedPaths;
|
2018-05-20 13:16:01 -04:00
|
|
|
}
|
|
|
|
|
2018-04-22 07:23:43 -04:00
|
|
|
/**
|
2021-10-08 12:47:14 -04:00
|
|
|
* Convert an image URI to a Base64 encoded string.
|
2020-12-06 09:24:22 -05:00
|
|
|
* Attempts to convert the URL to a system storage url then
|
|
|
|
* fetch the data from the disk or storage location.
|
|
|
|
* Returns null if the image data cannot be fetched from storage.
|
2018-04-22 07:23:43 -04:00
|
|
|
*/
|
2023-09-30 13:28:42 -04:00
|
|
|
public function imageUrlToBase64(string $url): ?string
|
2018-04-22 07:23:43 -04:00
|
|
|
{
|
2023-09-30 13:28:42 -04:00
|
|
|
$storagePath = $this->storage->urlToPath($url);
|
|
|
|
if (empty($url) || is_null($storagePath)) {
|
2020-12-06 09:24:22 -05:00
|
|
|
return null;
|
2018-04-22 07:23:43 -04:00
|
|
|
}
|
|
|
|
|
2022-09-02 09:21:43 -04:00
|
|
|
// Apply access control when local_secure_restricted images are active
|
2023-09-30 13:28:42 -04:00
|
|
|
if ($this->storage->usingSecureRestrictedImages()) {
|
2022-09-02 09:21:43 -04:00
|
|
|
if (!$this->checkUserHasAccessToRelationOfImageAtPath($storagePath)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-30 13:28:42 -04:00
|
|
|
$disk = $this->storage->getDisk();
|
2018-04-22 07:23:43 -04:00
|
|
|
$imageData = null;
|
2023-09-30 13:28:42 -04:00
|
|
|
if ($disk->exists($storagePath)) {
|
|
|
|
$imageData = $disk->get($storagePath);
|
2018-04-22 07:23:43 -04:00
|
|
|
}
|
|
|
|
|
2020-12-06 09:24:22 -05:00
|
|
|
if (is_null($imageData)) {
|
2018-04-22 07:23:43 -04:00
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2023-09-30 13:28:42 -04:00
|
|
|
$extension = pathinfo($url, PATHINFO_EXTENSION);
|
2019-07-17 17:36:49 -04:00
|
|
|
if ($extension === 'svg') {
|
|
|
|
$extension = 'svg+xml';
|
|
|
|
}
|
|
|
|
|
|
|
|
return 'data:image/' . $extension . ';base64,' . base64_encode($imageData);
|
2018-04-22 07:23:43 -04:00
|
|
|
}
|
|
|
|
|
2021-10-31 19:53:17 -04:00
|
|
|
/**
|
2022-09-01 11:17:14 -04:00
|
|
|
* Check if the given path exists and is accessible in the local secure image system.
|
|
|
|
* Returns false if local_secure is not in use, if the file does not exist, if the
|
|
|
|
* file is likely not a valid image, or if permission does not allow access.
|
2021-10-31 19:53:17 -04:00
|
|
|
*/
|
2022-09-01 11:17:14 -04:00
|
|
|
public function pathAccessibleInLocalSecure(string $imagePath): bool
|
2021-10-31 19:53:17 -04:00
|
|
|
{
|
2023-09-30 13:28:42 -04:00
|
|
|
$disk = $this->storage->getDisk('gallery');
|
2021-10-31 19:53:17 -04:00
|
|
|
|
2023-09-30 13:28:42 -04:00
|
|
|
if ($this->storage->usingSecureRestrictedImages() && !$this->checkUserHasAccessToRelationOfImageAtPath($imagePath)) {
|
2022-09-01 11:17:14 -04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-10-31 19:53:17 -04:00
|
|
|
// Check local_secure is active
|
2023-09-30 14:12:22 -04:00
|
|
|
return $disk->usingSecureImages()
|
2021-10-31 19:53:17 -04:00
|
|
|
// Check the image file exists
|
|
|
|
&& $disk->exists($imagePath)
|
|
|
|
// Check the file is likely an image file
|
2023-09-30 07:09:29 -04:00
|
|
|
&& str_starts_with($disk->mimeType($imagePath), 'image/');
|
2021-10-31 19:53:17 -04:00
|
|
|
}
|
|
|
|
|
2022-09-01 11:17:14 -04:00
|
|
|
/**
|
|
|
|
* Check that the current user has access to the relation
|
|
|
|
* of the image at the given path.
|
|
|
|
*/
|
|
|
|
protected function checkUserHasAccessToRelationOfImageAtPath(string $path): bool
|
|
|
|
{
|
2023-09-30 15:00:48 -04:00
|
|
|
if (str_starts_with($path, 'uploads/images/')) {
|
2022-09-02 09:21:43 -04:00
|
|
|
$path = substr($path, 15);
|
|
|
|
}
|
|
|
|
|
2022-09-01 11:17:14 -04:00
|
|
|
// Strip thumbnail element from path if existing
|
2022-09-02 09:47:44 -04:00
|
|
|
$originalPathSplit = array_filter(explode('/', $path), function (string $part) {
|
2023-09-30 07:09:29 -04:00
|
|
|
$resizedDir = (str_starts_with($part, 'thumbs-') || str_starts_with($part, 'scaled-'));
|
|
|
|
$missingExtension = !str_contains($part, '.');
|
2022-09-02 09:47:44 -04:00
|
|
|
|
2022-09-01 11:17:14 -04:00
|
|
|
return !($resizedDir && $missingExtension);
|
|
|
|
});
|
|
|
|
|
|
|
|
// Build a database-format image path and search for the image entry
|
|
|
|
$fullPath = '/uploads/images/' . ltrim(implode('/', $originalPathSplit), '/');
|
|
|
|
$image = Image::query()->where('path', '=', $fullPath)->first();
|
|
|
|
|
|
|
|
if (is_null($image)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
$imageType = $image->type;
|
|
|
|
|
|
|
|
// Allow user or system (logo) images
|
|
|
|
// (No specific relation control but may still have access controlled by auth)
|
|
|
|
if ($imageType === 'user' || $imageType === 'system') {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($imageType === 'gallery' || $imageType === 'drawio') {
|
2024-02-07 11:37:36 -05:00
|
|
|
return $this->queries->pages->visibleForList()->where('id', '=', $image->uploaded_to)->exists();
|
2022-09-01 11:17:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if ($imageType === 'cover_book') {
|
2024-02-07 11:37:36 -05:00
|
|
|
return $this->queries->books->visibleForList()->where('id', '=', $image->uploaded_to)->exists();
|
2022-09-01 11:17:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if ($imageType === 'cover_bookshelf') {
|
2024-02-07 11:37:36 -05:00
|
|
|
return $this->queries->shelves->visibleForList()->where('id', '=', $image->uploaded_to)->exists();
|
2022-09-01 11:17:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-10-31 19:53:17 -04:00
|
|
|
/**
|
|
|
|
* For the given path, if existing, provide a response that will stream the image contents.
|
|
|
|
*/
|
|
|
|
public function streamImageFromStorageResponse(string $imageType, string $path): StreamedResponse
|
|
|
|
{
|
2023-09-30 13:28:42 -04:00
|
|
|
$disk = $this->storage->getDisk($imageType);
|
2021-11-01 09:26:02 -04:00
|
|
|
|
2021-10-31 19:53:17 -04:00
|
|
|
return $disk->response($path);
|
|
|
|
}
|
|
|
|
|
2021-10-31 20:24:42 -04:00
|
|
|
/**
|
|
|
|
* Check if the given image extension is supported by BookStack.
|
|
|
|
* The extension must not be altered in this function. This check should provide a guarantee
|
|
|
|
* that the provided extension is safe to use for the image to be saved.
|
|
|
|
*/
|
|
|
|
public static function isExtensionSupported(string $extension): bool
|
|
|
|
{
|
|
|
|
return in_array($extension, static::$supportedExtensions);
|
|
|
|
}
|
2016-07-09 09:26:53 -04:00
|
|
|
}
|