= 50503) { return $input; // Assume we're using the utf8mb4 charset } else { // MySQL's `utf8` charset only supports up to 3-byte symbols // Remove anything >= 0x010000 $chars = preg_split('//u', $input, -1, PREG_SPLIT_NO_EMPTY); $ret = ''; foreach ($chars as $char) { $o = 0; $ord = ordutf8($char, $o); if ($ord >= 0x010000) { continue; } $ret .= $char; } return $ret; } } /** * Download a remote file from the given url. * The file is deleted at shutdown. * * @param HttpDriver $http The http client. * @param string $file_url The url to download the file from. * @param int $request_timeout Timeout to retrieve the file. * @param array $extra_extensions Allowed file extensions. * @param string $tmp_dir Temporary directory to save the file into. * @param array $error_array An array with error codes, used to create exceptions on failure. * @return array|false Returns an array describing the file on success, or false if the file was too large * @throws InvalidArgumentException|RuntimeException Throws on invalid arguments and IO errors. */ function download_file_from_url(HttpDriver $http, $file_url, $request_timeout, $allowed_extensions, $tmp_dir, &$error_array) { if (!preg_match('@^https?://@', $file_url)) { throw new InvalidArgumentException($error_array['invalidimg']); } $param_idx = mb_strpos($file_url, '?'); if ($param_idx !== false) { $url_without_params = mb_substr($file_url, 0, $param_idx); } else { $url_without_params = $file_url; } $extension = strtolower(mb_substr($url_without_params, mb_strrpos($url_without_params, '.') + 1)); if (!in_array($extension, $allowed_extensions)) { throw new InvalidArgumentException($error_array['unknownext']); } $tmp_file = tempnam($tmp_dir, 'url'); function unlink_tmp_file($file) { @unlink($file); fatal_error_handler(); } register_shutdown_function('unlink_tmp_file', $tmp_file); $fd = fopen($tmp_file, 'w'); try { $success = $http->requestGetInto($url_without_params, null, $fd, $request_timeout); if (!$success) { return false; } } finally { fclose($fd); } return array( 'name' => basename($url_without_params), 'tmp_name' => $tmp_file, 'file_tmp' => true, 'error' => 0, 'size' => filesize($tmp_file) ); } /** * Try extract text from the given image. * * @param array $config Instance configuration. * @param string $img_path The file path to the image. * @return string|false Returns a string with the extracted text on success (if any). * @throws RuntimeException Throws if executing tesseract fails. */ function ocr_image(array $config, string $img_path): string { // The default preprocess command is an ImageMagick b/w quantization. $ret = shell_exec_error( sprintf($config['tesseract_preprocess_command'], escapeshellarg($img_path)) . ' | tesseract stdin stdout 2>/dev/null' . $config['tesseract_params'] ); if ($ret === false) { throw new RuntimeException('Unable to run tesseract'); } return trim($ret); } /** * Trim an image's EXIF metadata * * @param string $img_path The file path to the image. * @return int The size of the stripped file. * @throws RuntimeException Throws on IO errors. */ function strip_image_metadata(string $img_path): int { $err = shell_exec_error('exiftool -overwrite_original -ignoreMinorErrors -q -q -all= -Orientation ' . escapeshellarg($img_path)); if ($err === false) { throw new RuntimeException('Could not strip EXIF metadata!'); } clearstatcache(true, $img_path); $ret = filesize($img_path); if ($ret === false) { throw new RuntimeException('Could not calculate file size!'); } return $ret; } /** * Delete posts in a cyclical thread. * * @param string $boardUri The URI of the board. * @param int $threadId The ID of the thread. * @param int $cycleLimit The number of most recent posts to retain. */ function delete_cyclical_posts(string $boardUri, int $threadId, int $cycleLimit): void { $query = prepare(sprintf(' SELECT p.`id` FROM ``posts_%s`` p LEFT JOIN ( SELECT `id` FROM ``posts_%s`` WHERE `thread` = :thread ORDER BY `id` DESC LIMIT :limit ) recent_posts ON p.id = recent_posts.id WHERE p.thread = :thread AND recent_posts.id IS NULL', $boardUri, $boardUri )); $query->bindValue(':thread', $threadId, PDO::PARAM_INT); $query->bindValue(':limit', $cycleLimit, PDO::PARAM_INT); $query->execute() or error(db_error($query)); $ids = $query->fetchAll(PDO::FETCH_COLUMN); foreach ($ids as $id) { deletePost($id, false); } } /** * Method handling functions */ $dropped_post = false; $context = Vichan\build_context($config); // Is it a post coming from NNTP? Let's extract it and pretend it's a normal post. if (isset($_GET['Newsgroups']) && $config['nntpchan']['enabled']) { if ($_SERVER['REMOTE_ADDR'] != $config['nntpchan']['trusted_peer']) { error("NNTPChan: Forbidden. $_SERVER[REMOTE_ADDR] is not a trusted peer"); } $_POST = array(); $_POST['json_response'] = true; $headers = json_encode($_GET); if (!isset ($_GET['Message-Id'])) { if (!isset ($_GET['Message-ID'])) { error("NNTPChan: No message ID"); } else $msgid = $_GET['Message-ID']; } else $msgid = $_GET['Message-Id']; $groups = preg_split("/,\s*/", $_GET['Newsgroups']); if (count($groups) != 1) { error("NNTPChan: Messages can go to only one newsgroup"); } $group = $groups[0]; if (!isset($config['nntpchan']['dispatch'][$group])) { error("NNTPChan: We don't synchronize $group"); } $xboard = $config['nntpchan']['dispatch'][$group]; $ref = null; if (isset ($_GET['References'])) { $refs = preg_split("/,\s*/", $_GET['References']); if (count($refs) > 1) { error("NNTPChan: We don't support multiple references"); } $ref = $refs[0]; $query = prepare("SELECT `board`,`id` FROM ``nntp_references`` WHERE `message_id` = :ref"); $query->bindValue(':ref', $ref); $query->execute() or error(db_error($query)); $ary = $query->fetchAll(PDO::FETCH_ASSOC); if (count($ary) == 0) { error("NNTPChan: We don't have $ref that $msgid references"); } $p_id = $ary[0]['id']; $p_board = $ary[0]['board']; if ($p_board != $xboard) { error("NNTPChan: Cross board references not allowed. Tried to reference $p_board on $xboard"); } $_POST['thread'] = $p_id; } $date = isset($_GET['Date']) ? strtotime($_GET['Date']) : time(); list($ct) = explode('; ', $_GET['Content-Type']); $query = prepare("SELECT COUNT(*) AS `c` FROM ``nntp_references`` WHERE `message_id` = :msgid"); $query->bindValue(":msgid", $msgid); $query->execute() or error(db_error($query)); $a = $query->fetch(PDO::FETCH_ASSOC); if ($a['c'] > 0) { error("NNTPChan: We already have this post. Post discarded."); } if ($ct == 'text/plain') { $content = file_get_contents("php://input"); } elseif ($ct == 'multipart/mixed' || $ct == 'multipart/form-data') { $context->get(LogDriver::class)->log(LogDriver::DEBUG, 'MM: Files: ' . print_r($GLOBALS, true)); $content = ''; $newfiles = array(); foreach ($_FILES['attachment']['error'] as $id => $error) { if ($_FILES['attachment']['type'][$id] == 'text/plain') { $content .= file_get_contents($_FILES['attachment']['tmp_name'][$id]); } elseif ($_FILES['attachment']['type'][$id] == 'message/rfc822') { // Signed message, ignore for now } else { // A real attachment :^) $file = array(); $file['name'] = $_FILES['attachment']['name'][$id]; $file['type'] = $_FILES['attachment']['type'][$id]; $file['size'] = $_FILES['attachment']['size'][$id]; $file['tmp_name'] = $_FILES['attachment']['tmp_name'][$id]; $file['error'] = $_FILES['attachment']['error'][$id]; $newfiles["file$id"] = $file; } } $_FILES = $newfiles; } else { error("NNTPChan: Wrong mime type: $ct"); } $_POST['subject'] = isset($_GET['Subject']) ? ($_GET['Subject'] == 'None' ? '' : $_GET['Subject']) : ''; $_POST['board'] = $xboard; if (isset ($_GET['From'])) { list($name, $mail) = explode(" <", $_GET['From'], 2); $mail = preg_replace('/>\s+$/', '', $mail); $_POST['name'] = $name; //$_POST['email'] = $mail; $_POST['email'] = ''; } if (isset ($_GET['X_Sage'])) { $_POST['email'] = 'sage'; } $content = preg_replace_callback('/>>([0-9a-fA-F]{6,})/', function($id) use ($xboard) { $id = $id[1]; $query = prepare("SELECT `board`,`id` FROM ``nntp_references`` WHERE `message_id_digest` LIKE :rule"); $idx = $id . "%"; $query->bindValue(':rule', $idx); $query->execute() or error(db_error($query)); $ary = $query->fetchAll(PDO::FETCH_ASSOC); if (count($ary) == 0) { return ">>>>$id"; } else { $ret = array(); foreach ($ary as $v) { if ($v['board'] != $xboard) { $ret[] = ">>>/".$v['board']."/".$v['id']; } else { $ret[] = ">>".$v['id']; } } return implode(", ", $ret); } }, $content); $_POST['body'] = $content; $dropped_post = array( 'date' => $date, 'board' => $xboard, 'msgid' => $msgid, 'headers' => $headers, 'from_nntp' => true, ); } elseif (isset($_GET['Newsgroups'])) { error("NNTPChan: NNTPChan support is disabled"); } session_start(); if (!isset($_POST['captcha_cookie']) && isset($_SESSION['captcha_cookie'])) { $_POST['captcha_cookie'] = $_SESSION['captcha_cookie']; } if (isset($_POST['delete'])) { // Delete if (!isset($_POST['board'], $_POST['password'])) error($config['error']['bot']); if (empty($_POST['password'])){ error($config['error']['invalidpassword']); } $password = hashPassword($_POST['password']); $delete = array(); foreach ($_POST as $post => $value) { if (preg_match('/^delete_(\d+)$/', $post, $m)) { $delete[] = (int)$m[1]; } } checkDNSBL(); // Check if board exists if (!openBoard($_POST['board'])) error($config['error']['noboard']); if ((!isset($_POST['mod']) || !$_POST['mod']) && $config['board_locked']) { error("Board is locked"); } // Check if banned checkBan($board['uri']); // Check if deletion enabled if (!$config['allow_delete']) error(_('Post deletion is not allowed!')); if (empty($delete)) error($config['error']['nodelete']); foreach ($delete as &$id) { $query = prepare(sprintf("SELECT `id`,`thread`,`time`,`password` FROM ``posts_%s`` WHERE `id` = :id", $board['uri'])); $query->bindValue(':id', $id, PDO::PARAM_INT); $query->execute() or error(db_error($query)); if ($post = $query->fetch(PDO::FETCH_ASSOC)) { $thread = false; if ($config['user_moderation'] && $post['thread']) { $thread_query = prepare(sprintf("SELECT `time`,`password` FROM ``posts_%s`` WHERE `id` = :id", $board['uri'])); $thread_query->bindValue(':id', $post['thread'], PDO::PARAM_INT); $thread_query->execute() or error(db_error($query)); $thread = $thread_query->fetch(PDO::FETCH_ASSOC); } if ($post['time'] < time() - $config['max_delete_time'] && $config['max_delete_time'] != false) { error(sprintf($config['error']['delete_too_late'], Format\until($post['time'] + $config['max_delete_time']))); } if (!hash_equals($post['password'], $password) && (!$thread || !hash_equals($thread['password'], $password))) { error($config['error']['invalidpassword']); } if ($post['time'] > time() - $config['delete_time'] && (!$thread || !hash_equals($thread['password'], $password))) { error(sprintf($config['error']['delete_too_soon'], Format\until($post['time'] + $config['delete_time']))); } $ip = $_SERVER['REMOTE_ADDR']; if (isset($_POST['file'])) { // Delete just the file deleteFile($id); modLog("User at $ip deleted file from their own post #$id"); } else { // Delete entire post deletePost($id); modLog("User at $ip deleted their own post #$id"); } $context->get(LogDriver::class)->log( LogDriver::INFO, 'Deleted post: /' . $board['dir'] . $config['dir']['res'] . link_for($post) . ($post['thread'] ? '#' . $id : '') ); } } buildIndex(); $is_mod = isset($_POST['mod']) && $_POST['mod']; $root = $is_mod ? $config['root'] . $config['file_mod'] . '?/' : $config['root']; if (!isset($_POST['json_response'])) { header('Location: ' . $root . $board['dir'] . $config['file_index'], true, $config['redirect_http']); } else { header('Content-Type: text/json'); echo json_encode(array('success' => true)); } // We are already done, let's continue our heavy-lifting work in the background (if we run off FastCGI) if (function_exists('fastcgi_finish_request')) @fastcgi_finish_request(); Vichan\Functions\Theme\rebuild_themes('post-delete', $board['uri']); } elseif (isset($_POST['report'])) { if (!isset($_POST['board'], $_POST['reason'])) error($config['error']['bot']); $report = array(); foreach ($_POST as $post => $value) { if (preg_match('/^delete_(\d+)$/', $post, $m)) { $report[] = (int)$m[1]; } } checkDNSBL(); // Check if board exists if (!openBoard($_POST['board'])) error($config['error']['noboard']); if ((!isset($_POST['mod']) || !$_POST['mod']) && $config['board_locked']) { error("Board is locked"); } // Check if banned checkBan($board['uri']); if (empty($report)) error($config['error']['noreport']); if (count($report) > $config['report_limit']) error($config['error']['toomanyreports']); if ($config['report_captcha']) { if (!isset($_POST['captcha_text'], $_POST['captcha_cookie'])) { error($config['error']['bot']); } try { $query = new NativeCaptchaQuery( $context->get(HttpDriver::class), $config['domain'], $config['captcha']['provider_check'], $config['captcha']['extra'] ); $success = $query->verify( $_POST['captcha_text'], $_POST['captcha_cookie'] ); if (!$success) { error($config['error']['captcha']); } } catch (RuntimeException $e) { $context->get(LogDriver::class)->log(LogDriver::ERROR, "Native captcha IO exception: {$e->getMessage()}"); error($config['error']['local_io_error']); } } $reason = escape_markup_modifiers($_POST['reason']); markup($reason); if (mb_strlen($reason) > $config['report_max_length']) { error($config['error']['toolongreport']); } foreach ($report as &$id) { $query = prepare(sprintf("SELECT `id`, `thread` FROM ``posts_%s`` WHERE `id` = :id", $board['uri'])); $query->bindValue(':id', $id, PDO::PARAM_INT); $query->execute() or error(db_error($query)); $post = $query->fetch(PDO::FETCH_ASSOC); if ($post === false) { $context->get(LogDriver::class)->log(LogDriver::INFO, "Failed to report non-existing post #{$id} in {$board['dir']}"); error($config['error']['nopost']); } $error = event('report', array('ip' => $_SERVER['REMOTE_ADDR'], 'board' => $board['uri'], 'post' => $post, 'reason' => $reason, 'link' => link_for($post))); if ($error) { error($error); } $context->get(LogDriver::class)->log( LogDriver::INFO, 'Reported post: /' . $board['dir'] . $config['dir']['res'] . link_for($post) . ($post['thread'] ? '#' . $id : '') . " for \"$reason\"" ); $query = prepare("INSERT INTO ``reports`` VALUES (NULL, :time, :ip, :board, :post, :reason)"); $query->bindValue(':time', time(), PDO::PARAM_INT); $query->bindValue(':ip', $_SERVER['REMOTE_ADDR'], PDO::PARAM_STR); $query->bindValue(':board', $board['uri'], PDO::PARAM_STR); $query->bindValue(':post', $id, PDO::PARAM_INT); $query->bindValue(':reason', $reason, PDO::PARAM_STR); $query->execute() or error(db_error($query)); } $is_mod = isset($_POST['mod']) && $_POST['mod']; $root = $is_mod ? $config['root'] . $config['file_mod'] . '?/' : $config['root']; if (!isset($_POST['json_response'])) { $index = $root . $board['dir'] . $config['file_index']; echo Element($config['file_page_template'], array('config' => $config, 'body' => '
', 'title' => _('Report submitted!'))); } else { header('Content-Type: text/json'); echo json_encode(array('success' => true)); } } elseif (isset($_POST['post']) || $dropped_post) { if (!isset($_POST['body'], $_POST['board']) && !$dropped_post) error($config['error']['bot']); $post = array('board' => $_POST['board'], 'files' => array()); // Check if board exists if (!openBoard($post['board'])) error($config['error']['noboard']); if ((!isset($_POST['mod']) || !$_POST['mod']) && $config['board_locked']) { error("Board is locked"); } if (!isset($_POST['name'])) $_POST['name'] = $config['anonymous']; if (!isset($_POST['email'])) $_POST['email'] = ''; if (!isset($_POST['subject'])) $_POST['subject'] = ''; if (!isset($_POST['password'])) $_POST['password'] = ''; if (isset($_POST['thread'])) { $post['op'] = false; $post['thread'] = round($_POST['thread']); } else $post['op'] = true; if (!$dropped_post) { if ($config['simple_spam'] && $post['op']) { if (!isset($_POST['simple_spam']) || strtolower($config['simple_spam']['answer']) != strtolower($_POST['simple_spam'])) { error($config['error']['simple_spam']); } } // Check if banned checkBan($board['uri']); // Check for CAPTCHA right after opening the board so the "return" link is in there. try { $provider = $config['captcha']['provider']; $new_thread_capt = $config['captcha']['native']['new_thread_capt']; $dynamic = $config['captcha']['dynamic']; // With our custom captcha provider if (($provider === 'native' && !$new_thread_capt) || ($provider === 'native' && $new_thread_capt && $post['op'])) { $query = $context->get(NativeCaptchaQuery::class); $success = $query->verify($_POST['captcha_text'], $_POST['captcha_cookie']); if (!$success) { error( "{$config['error']['captcha']} " ); } } // Remote 3rd party captchas. elseif ($provider && (!$dynamic || $dynamic === $_SERVER['REMOTE_ADDR'])) { $query = $content->get(RemoteCaptchaQuery::class); $field = $query->responseField(); if (!isset($_POST[$field])) { error($config['error']['bot']); } $response = $_POST[$field]; /* * Do not query with the IP if the mode is dynamic. This config is meant for proxies and internal * loopback addresses. */ $ip = $dynamic ? null : $_SERVER['REMOTE_ADDR']; $success = $query->verify($response, $ip); if (!$success) { error($config['error']['captcha']); } } } catch (RuntimeException $e) { $context->get(LogDriver::class)->log(LogDriver::ERROR, "Captcha IO exception: {$e->getMessage()}"); error($config['error']['remote_io_error']); } catch (JsonException $e) { $context->get(LogDriver::class)->log(LogDriver::ERROR, "Bad JSON reply to captcha: {$e->getMessage()}"); error($config['error']['remote_io_error']); } if (!(($post['op'] && $_POST['post'] == $config['button_newtopic']) || (!$post['op'] && $_POST['post'] == $config['button_reply']))) error($config['error']['bot']); // Check the referrer if ($config['referer_match'] !== false && (!isset($_SERVER['HTTP_REFERER']) || !preg_match($config['referer_match'], rawurldecode($_SERVER['HTTP_REFERER'])))) error($config['error']['referer']); checkDNSBL(); if ($post['mod'] = isset($_POST['mod']) && $_POST['mod']) { check_login($context, false); if (!$mod) { // Liar. You're not a mod. error($config['error']['notamod']); } $post['sticky'] = $post['op'] && isset($_POST['sticky']); $post['locked'] = $post['op'] && isset($_POST['lock']); $post['raw'] = isset($_POST['raw']); if ($post['sticky'] && !hasPermission($config['mod']['sticky'], $board['uri'])) error($config['error']['noaccess']); if ($post['locked'] && !hasPermission($config['mod']['lock'], $board['uri'])) error($config['error']['noaccess']); if ($post['raw'] && !hasPermission($config['mod']['rawhtml'], $board['uri'])) error($config['error']['noaccess']); } if (!$post['mod']) { $post['antispam_hash'] = checkSpam(array($board['uri'], isset($post['thread']) ? $post['thread'] : ($config['try_smarter'] && isset($_POST['page']) ? 0 - (int)$_POST['page'] : null))); if ($post['antispam_hash'] === true) error($config['error']['spam']); } if ($config['robot_enable'] && $config['robot_mute']) { checkMute(); } } else { $mod = $post['mod'] = false; } //Check if thread exists if (!$post['op']) { $query = prepare(sprintf("SELECT `sticky`,`locked`,`cycle`,`sage`,`slug` FROM ``posts_%s`` WHERE `id` = :id AND `thread` IS NULL LIMIT 1", $board['uri'])); $query->bindValue(':id', $post['thread'], PDO::PARAM_INT); $query->execute() or error(db_error()); if (!$thread = $query->fetch(PDO::FETCH_ASSOC)) { // Non-existant error($config['error']['nonexistant']); } } else { $thread = false; } // Check for an embed field if ($config['enable_embedding'] && isset($_POST['embed']) && !empty($_POST['embed'])) { // yep; validate it $value = $_POST['embed']; foreach ($config['embedding'] as &$embed) { if (preg_match($embed[0], $value)) { // Valid link $post['embed'] = $value; // This is bad, lol. $post['no_longer_require_an_image_for_op'] = true; break; } } if (!isset($post['embed'])) { error($config['error']['invalid_embed']); } } if (!hasPermission($config['mod']['bypass_field_disable'], $board['uri'])) { if ($config['field_disable_name']) $_POST['name'] = $config['anonymous']; // "forced anonymous" if ($config['field_disable_email']) $_POST['email'] = ''; if ($config['field_disable_password']) $_POST['password'] = ''; if ($config['field_disable_subject'] || (!$post['op'] && $config['field_disable_reply_subject'])) $_POST['subject'] = ''; } if ($config['allow_upload_by_url'] && isset($_POST['file_url']) && !empty($_POST['file_url'])) { $allowed_extensions = $config['allowed_ext_files']; // Add allowed extensions for OP, if enabled. if ($post['op'] && $config['allowed_ext_op']) { array_merge($allowed_extensions, $config['allowed_ext_op']); } try { $ret = download_file_from_url( $context->get(HttpDriver::class), $_POST['file_url'], $config['upload_by_url_timeout'], $allowed_extensions, $config['tmp'], $config['error'] ); if ($ret === false) { error(sprintf3($config['error']['filesize'], array( 'filesz' => 'more than that', 'maxsz' => number_format($config['max_filesize']) ))); } $_FILES['file'] = $ret; } catch (Exception $e) { error($e->getMessage()); } } $post['name'] = $_POST['name'] != '' ? $_POST['name'] : $config['anonymous']; $post['subject'] = $_POST['subject']; $post['email'] = str_replace(' ', '%20', htmlspecialchars($_POST['email'])); $post['body'] = $_POST['body']; $post['password'] = hashPassword($_POST['password']); $post['has_file'] = (!isset($post['embed']) && (($post['op'] && !isset($post['no_longer_require_an_image_for_op']) && $config['force_image_op']) || count($_FILES) > 0)); if (!$dropped_post) { if (!($post['has_file'] || isset($post['embed'])) || (($post['op'] && $config['force_body_op']) || (!$post['op'] && $config['force_body']))) { $stripped_whitespace = preg_replace('/[\s]/u', '', $post['body']); if ($stripped_whitespace == '') { error($config['error']['tooshort_body']); } } if (!$post['op']) { // Check if thread is locked // but allow mods to post if ($thread['locked'] && !hasPermission($config['mod']['postinlocked'], $board['uri'])) error($config['error']['locked']); $numposts = numPosts($post['thread']); if ($config['reply_hard_limit'] != 0 && $config['reply_hard_limit'] <= $numposts['replies']) error($config['error']['reply_hard_limit']); if ($post['has_file'] && $config['image_hard_limit'] != 0 && $config['image_hard_limit'] <= $numposts['images']) error($config['error']['image_hard_limit']); } } else { if (!$post['op']) { $numposts = numPosts($post['thread']); } } if ($post['has_file']) { // Determine size sanity $size = 0; if ($config['multiimage_method'] == 'split') { foreach ($_FILES as $key => $file) { $size += $file['size']; } } elseif ($config['multiimage_method'] == 'each') { foreach ($_FILES as $key => $file) { if ($file['size'] > $size) { $size = $file['size']; } } } else { error(_('Unrecognized file size determination method.')); } if ($size > $config['max_filesize']) error(sprintf3($config['error']['filesize'], array( 'sz' => number_format($size), 'filesz' => number_format($size), 'maxsz' => number_format($config['max_filesize']) ))); $post['filesize'] = $size; } $post['capcode'] = false; if ($mod && preg_match('/^((.+) )?## (.+)$/', $post['name'], $matches)) { $name = $matches[2] != '' ? $matches[2] : $config['anonymous']; $cap = $matches[3]; if (isset($config['mod']['capcode'][$mod['type']])) { if ( $config['mod']['capcode'][$mod['type']] === true || (is_array($config['mod']['capcode'][$mod['type']]) && in_array($cap, $config['mod']['capcode'][$mod['type']]) )) { $post['capcode'] = utf8tohtml($cap); $post['name'] = $name; } } } $trip = generate_tripcode($post['name']); $post['name'] = $trip[0]; if ($config['disable_tripcodes'] && !$mod) { $post['trip'] = ''; } else { $post['trip'] = isset($trip[1]) ? $trip[1] : ''; // XX: Dropped posts and tripcodes } $noko = false; if (strtolower($post['email']) == 'noko') { $noko = true; $post['email'] = ''; } elseif (strtolower($post['email']) == 'nonoko'){ $noko = false; $post['email'] = ''; } else $noko = $config['always_noko']; if ($post['has_file']) { $i = 0; foreach ($_FILES as $key => $file) { if (!in_array($file['error'], array(UPLOAD_ERR_NO_FILE, UPLOAD_ERR_OK))) { error(sprintf3($config['error']['phpfileserror'], array( 'index' => $i+1, 'code' => $file['error'] ))); } if ($file['size'] && $file['tmp_name']) { $file['filename'] = urldecode($file['name']); $file['extension'] = strtolower(mb_substr($file['filename'], mb_strrpos($file['filename'], '.') + 1)); if (isset($config['filename_func'])) $file['file_id'] = $config['filename_func']($file); else $file['file_id'] = time() . substr(microtime(), 2, 3); if (sizeof($_FILES) > 1) $file['file_id'] .= "-$i"; $file['file'] = $board['dir'] . $config['dir']['img'] . $file['file_id'] . '.' . $file['extension']; $file['thumb'] = $board['dir'] . $config['dir']['thumb'] . $file['file_id'] . '.' . ($config['thumb_ext'] ? $config['thumb_ext'] : $file['extension']); $post['files'][] = $file; $i++; } } } if (empty($post['files'])) $post['has_file'] = false; if (!$dropped_post) { // Check for a file if ($post['op'] && !isset($post['no_longer_require_an_image_for_op'])) { if (!$post['has_file'] && $config['force_image_op']) error($config['error']['noimage']); } // Check for too many files if (sizeof($post['files']) > $config['max_images']) error($config['error']['toomanyimages']); } if ($config['strip_combining_chars']) { $post['name'] = strip_combining_chars($post['name']); $post['email'] = strip_combining_chars($post['email']); $post['subject'] = strip_combining_chars($post['subject']); $post['body'] = strip_combining_chars($post['body']); } if (!$dropped_post) { // Check string lengths if (mb_strlen($post['name']) > 35) error(sprintf($config['error']['toolong'], 'name')); if (mb_strlen($post['email']) > 40) error(sprintf($config['error']['toolong'], 'email')); if (mb_strlen($post['subject']) > 100) error(sprintf($config['error']['toolong'], 'subject')); if (!$mod && mb_strlen($post['body']) > $config['max_body']) error($config['error']['toolong_body']); if (!$mod && substr_count($post['body'], "\n") >= $config['maximum_lines']) error($config['error']['toomanylines']); } wordfilters($post['body']); $post['body'] = escape_markup_modifiers($post['body']); if ($mod && isset($post['raw']) && $post['raw']) { $post['body'] .= "\n