|
1
|
|
|
<?php |
|
2
|
|
|
/** |
|
3
|
|
|
* WordPress.com Block Editor |
|
4
|
|
|
* Allow new block editor posts to be composed on WordPress.com. |
|
5
|
|
|
* This is auto-loaded as of Jetpack v7.4 for sites connected to WordPress.com only. |
|
6
|
|
|
* |
|
7
|
|
|
* @package Jetpack |
|
8
|
|
|
*/ |
|
9
|
|
|
|
|
10
|
|
|
/** |
|
11
|
|
|
* WordPress.com Block editor for Jetpack |
|
12
|
|
|
*/ |
|
13
|
|
|
class Jetpack_WPCOM_Block_Editor { |
|
14
|
|
|
/** |
|
15
|
|
|
* ID of the user who signed the nonce. |
|
16
|
|
|
* |
|
17
|
|
|
* @var int |
|
18
|
|
|
*/ |
|
19
|
|
|
private $nonce_user_id; |
|
20
|
|
|
|
|
21
|
|
|
/** |
|
22
|
|
|
* Singleton |
|
23
|
|
|
*/ |
|
24
|
|
|
public static function init() { |
|
25
|
|
|
static $instance = false; |
|
26
|
|
|
|
|
27
|
|
|
if ( ! $instance ) { |
|
28
|
|
|
$instance = new Jetpack_WPCOM_Block_Editor(); |
|
29
|
|
|
} |
|
30
|
|
|
|
|
31
|
|
|
return $instance; |
|
32
|
|
|
} |
|
33
|
|
|
|
|
34
|
|
|
/** |
|
35
|
|
|
* Jetpack_WPCOM_Block_Editor constructor. |
|
36
|
|
|
*/ |
|
37
|
|
|
private function __construct() { |
|
38
|
|
|
if ( $this->is_iframed_block_editor() ) { |
|
39
|
|
|
add_action( 'admin_init', array( $this, 'disable_send_frame_options_header' ), 9 ); |
|
40
|
|
|
add_filter( 'admin_body_class', array( $this, 'add_iframed_body_class' ) ); |
|
41
|
|
|
} |
|
42
|
|
|
|
|
43
|
|
|
add_action( 'login_init', array( $this, 'allow_block_editor_login' ), 1 ); |
|
44
|
|
|
add_action( 'enqueue_block_editor_assets', array( $this, 'enqueue_block_editor_assets' ), 9 ); |
|
45
|
|
|
add_action( 'enqueue_block_assets', array( $this, 'enqueue_block_assets' ) ); |
|
46
|
|
|
add_filter( 'mce_external_plugins', array( $this, 'add_tinymce_plugins' ) ); |
|
47
|
|
|
|
|
48
|
|
|
$this->enable_cross_site_auth_cookies(); |
|
49
|
|
|
} |
|
50
|
|
|
|
|
51
|
|
|
/** |
|
52
|
|
|
* Checks if we are embedding the block editor in an iframe in WordPress.com. |
|
53
|
|
|
* |
|
54
|
|
|
* @return bool Whether the current request is from the iframed block editor. |
|
55
|
|
|
*/ |
|
56
|
|
|
public function is_iframed_block_editor() { |
|
57
|
|
|
global $pagenow; |
|
58
|
|
|
|
|
59
|
|
|
// phpcs:ignore WordPress.Security.NonceVerification |
|
60
|
|
|
return ( 'post.php' === $pagenow || 'post-new.php' === $pagenow ) && ! empty( $_GET['frame-nonce'] ); |
|
61
|
|
|
} |
|
62
|
|
|
|
|
63
|
|
|
/** |
|
64
|
|
|
* Prevents frame options header from firing if this is a whitelisted iframe request. |
|
65
|
|
|
*/ |
|
66
|
|
|
public function disable_send_frame_options_header() { |
|
67
|
|
|
// phpcs:ignore WordPress.Security.NonceVerification |
|
68
|
|
|
if ( $this->framing_allowed( $_GET['frame-nonce'] ) ) { |
|
69
|
|
|
remove_action( 'admin_init', 'send_frame_options_header' ); |
|
70
|
|
|
} |
|
71
|
|
|
} |
|
72
|
|
|
|
|
73
|
|
|
/** |
|
74
|
|
|
* Adds custom admin body class if this is a whitelisted iframe request. |
|
75
|
|
|
* |
|
76
|
|
|
* @param string $classes Admin body classes. |
|
77
|
|
|
* @return string |
|
78
|
|
|
*/ |
|
79
|
|
|
public function add_iframed_body_class( $classes ) { |
|
80
|
|
|
// phpcs:ignore WordPress.Security.NonceVerification |
|
81
|
|
|
if ( $this->framing_allowed( $_GET['frame-nonce'] ) ) { |
|
82
|
|
|
$classes .= ' is-iframed '; |
|
83
|
|
|
} |
|
84
|
|
|
|
|
85
|
|
|
return $classes; |
|
86
|
|
|
} |
|
87
|
|
|
|
|
88
|
|
|
/** |
|
89
|
|
|
* Allows to iframe the login page if a user is logged out |
|
90
|
|
|
* while trying to access the block editor from wordpress.com. |
|
91
|
|
|
*/ |
|
92
|
|
|
public function allow_block_editor_login() { |
|
93
|
|
|
// phpcs:ignore WordPress.Security.NonceVerification |
|
94
|
|
|
if ( empty( $_REQUEST['redirect_to'] ) ) { |
|
95
|
|
|
return; |
|
96
|
|
|
} |
|
97
|
|
|
|
|
98
|
|
|
// phpcs:ignore WordPress.Security.NonceVerification |
|
99
|
|
|
$query = wp_parse_url( urldecode( $_REQUEST['redirect_to'] ), PHP_URL_QUERY ); |
|
100
|
|
|
$args = wp_parse_args( $query ); |
|
101
|
|
|
|
|
102
|
|
|
// Check nonce and make sure this is a Gutenframe request. |
|
103
|
|
|
if ( ! empty( $args['frame-nonce'] ) && $this->framing_allowed( $args['frame-nonce'] ) ) { |
|
104
|
|
|
|
|
105
|
|
|
// If SSO is active, we'll let WordPress.com handle authentication... |
|
106
|
|
|
if ( Jetpack::is_module_active( 'sso' ) ) { |
|
107
|
|
|
// ...but only if it's not an Atomic site. They already do that. |
|
108
|
|
|
if ( ! jetpack_is_atomic_site() ) { |
|
109
|
|
|
add_filter( 'jetpack_sso_bypass_login_forward_wpcom', '__return_true' ); |
|
110
|
|
|
} |
|
111
|
|
|
} else { |
|
112
|
|
|
$_REQUEST['interim-login'] = true; |
|
113
|
|
|
add_action( 'wp_login', array( $this, 'do_redirect' ) ); |
|
114
|
|
|
add_action( 'login_form', array( $this, 'add_login_html' ) ); |
|
115
|
|
|
add_filter( 'wp_login_errors', array( $this, 'add_login_message' ) ); |
|
116
|
|
|
remove_action( 'login_init', 'send_frame_options_header' ); |
|
117
|
|
|
wp_add_inline_style( 'login', '.interim-login #login{padding-top:8%}' ); |
|
118
|
|
|
} |
|
119
|
|
|
} |
|
120
|
|
|
} |
|
121
|
|
|
|
|
122
|
|
|
/** |
|
123
|
|
|
* Adds a login message. |
|
124
|
|
|
* |
|
125
|
|
|
* Intended to soften the expectation mismatch of ending up with a login screen rather than the editor. |
|
126
|
|
|
* |
|
127
|
|
|
* @param WP_Error $errors WP Error object. |
|
128
|
|
|
* @return \WP_Error |
|
129
|
|
|
*/ |
|
130
|
|
|
public function add_login_message( $errors ) { |
|
131
|
|
|
$errors->remove( 'expired' ); |
|
|
|
|
|
|
132
|
|
|
$errors->add( 'info', __( 'Before we continue, please log in to your Jetpack site.', 'jetpack' ), 'message' ); |
|
|
|
|
|
|
133
|
|
|
|
|
134
|
|
|
return $errors; |
|
135
|
|
|
} |
|
136
|
|
|
|
|
137
|
|
|
/** |
|
138
|
|
|
* Maintains the `redirect_to` parameter in login form links. |
|
139
|
|
|
* Adds visual feedback of login in progress. |
|
140
|
|
|
*/ |
|
141
|
|
|
public function add_login_html() { |
|
142
|
|
|
?> |
|
143
|
|
|
<input type="hidden" name="redirect_to" value="<?php echo esc_url( $_REQUEST['redirect_to'] ); // phpcs:ignore WordPress.Security.NonceVerification.Recommended ?>" /> |
|
144
|
|
|
<script type="application/javascript"> |
|
145
|
|
|
document.getElementById( 'loginform' ).addEventListener( 'submit' , function() { |
|
146
|
|
|
document.getElementById( 'wp-submit' ).setAttribute( 'disabled', 'disabled' ); |
|
147
|
|
|
document.getElementById( 'wp-submit' ).value = '<?php echo esc_js( __( 'Logging In...', 'jetpack' ) ); ?>'; |
|
148
|
|
|
} ); |
|
149
|
|
|
</script> |
|
150
|
|
|
<?php |
|
151
|
|
|
} |
|
152
|
|
|
|
|
153
|
|
|
/** |
|
154
|
|
|
* Does the redirect to the block editor. |
|
155
|
|
|
*/ |
|
156
|
|
|
public function do_redirect() { |
|
157
|
|
|
wp_safe_redirect( $GLOBALS['redirect_to'] ); |
|
158
|
|
|
exit; |
|
159
|
|
|
} |
|
160
|
|
|
|
|
161
|
|
|
/** |
|
162
|
|
|
* Checks whether this is a whitelisted iframe request. |
|
163
|
|
|
* |
|
164
|
|
|
* @param string $nonce Nonce to verify. |
|
165
|
|
|
* @return bool |
|
166
|
|
|
*/ |
|
167
|
|
|
public function framing_allowed( $nonce ) { |
|
168
|
|
|
$verified = $this->verify_frame_nonce( $nonce, 'frame-' . Jetpack_Options::get_option( 'id' ) ); |
|
169
|
|
|
|
|
170
|
|
|
if ( is_wp_error( $verified ) ) { |
|
171
|
|
|
wp_die( $verified ); // phpcs:ignore WordPress.Security.EscapeOutput.OutputNotEscaped |
|
172
|
|
|
} |
|
173
|
|
|
|
|
174
|
|
|
if ( $verified && ! defined( 'IFRAME_REQUEST' ) ) { |
|
175
|
|
|
define( 'IFRAME_REQUEST', true ); |
|
176
|
|
|
} |
|
177
|
|
|
|
|
178
|
|
|
return (bool) $verified; |
|
179
|
|
|
} |
|
180
|
|
|
|
|
181
|
|
|
/** |
|
182
|
|
|
* Verify that correct nonce was used with time limit. |
|
183
|
|
|
* |
|
184
|
|
|
* The user is given an amount of time to use the token, so therefore, since the |
|
185
|
|
|
* UID and $action remain the same, the independent variable is the time. |
|
186
|
|
|
* |
|
187
|
|
|
* @param string $nonce Nonce that was used in the form to verify. |
|
188
|
|
|
* @param string $action Should give context to what is taking place and be the same when nonce was created. |
|
189
|
|
|
* @return boolean|WP_Error Whether the nonce is valid. |
|
190
|
|
|
*/ |
|
191
|
|
|
public function verify_frame_nonce( $nonce, $action ) { |
|
192
|
|
|
if ( empty( $nonce ) ) { |
|
193
|
|
|
return false; |
|
194
|
|
|
} |
|
195
|
|
|
|
|
196
|
|
|
list( $expiration, $user_id, $hash ) = explode( ':', $nonce, 3 ); |
|
197
|
|
|
|
|
198
|
|
|
$this->nonce_user_id = (int) $user_id; |
|
199
|
|
|
if ( ! $this->nonce_user_id ) { |
|
200
|
|
|
return false; |
|
201
|
|
|
} |
|
202
|
|
|
|
|
203
|
|
|
$token = Jetpack_Data::get_access_token( $this->nonce_user_id ); |
|
|
|
|
|
|
204
|
|
|
if ( ! $token ) { |
|
205
|
|
|
return false; |
|
206
|
|
|
} |
|
207
|
|
|
|
|
208
|
|
|
/* |
|
209
|
|
|
* Failures must return `false` (blocking the iframe) prior to the |
|
210
|
|
|
* signature verification. |
|
211
|
|
|
*/ |
|
212
|
|
|
|
|
213
|
|
|
add_filter( 'salt', array( $this, 'filter_salt' ), 10, 2 ); |
|
214
|
|
|
$expected_hash = wp_hash( "$expiration|$action|{$this->nonce_user_id}", 'jetpack_frame_nonce' ); |
|
215
|
|
|
remove_filter( 'salt', array( $this, 'filter_salt' ) ); |
|
216
|
|
|
|
|
217
|
|
|
if ( ! hash_equals( $hash, $expected_hash ) ) { |
|
218
|
|
|
return false; |
|
219
|
|
|
} |
|
220
|
|
|
|
|
221
|
|
|
/* |
|
222
|
|
|
* Failures may return `WP_Error` (showing an error in the iframe) after the |
|
223
|
|
|
* signature verification passes. |
|
224
|
|
|
*/ |
|
225
|
|
|
|
|
226
|
|
|
if ( time() > $expiration ) { |
|
227
|
|
|
return new WP_Error( 'nonce_invalid_expired', 'Expired nonce.', array( 'status' => 401 ) ); |
|
|
|
|
|
|
228
|
|
|
} |
|
229
|
|
|
|
|
230
|
|
|
// Check if it matches the current user, unless they're trying to log in. |
|
231
|
|
|
if ( get_current_user_id() !== $this->nonce_user_id && ! doing_action( 'login_init' ) ) { |
|
232
|
|
|
return new WP_Error( 'nonce_invalid_user_mismatch', 'User ID mismatch.', array( 'status' => 401 ) ); |
|
|
|
|
|
|
233
|
|
|
} |
|
234
|
|
|
|
|
235
|
|
|
return true; |
|
236
|
|
|
} |
|
237
|
|
|
|
|
238
|
|
|
/** |
|
239
|
|
|
* Filters the WordPress salt. |
|
240
|
|
|
* |
|
241
|
|
|
* @param string $salt Salt for the given scheme. |
|
242
|
|
|
* @param string $scheme Authentication scheme. |
|
243
|
|
|
* @return string |
|
244
|
|
|
*/ |
|
245
|
|
|
public function filter_salt( $salt, $scheme ) { |
|
246
|
|
|
if ( 'jetpack_frame_nonce' === $scheme ) { |
|
247
|
|
|
$token = Jetpack_Data::get_access_token( $this->nonce_user_id ); |
|
|
|
|
|
|
248
|
|
|
|
|
249
|
|
|
if ( $token ) { |
|
250
|
|
|
$salt = $token->secret; |
|
251
|
|
|
} |
|
252
|
|
|
} |
|
253
|
|
|
|
|
254
|
|
|
return $salt; |
|
255
|
|
|
} |
|
256
|
|
|
|
|
257
|
|
|
/** |
|
258
|
|
|
* Enqueues the WordPress.com block editor integration assets for the editor. |
|
259
|
|
|
*/ |
|
260
|
|
|
public function enqueue_block_editor_assets() { |
|
261
|
|
|
$debug = defined( 'SCRIPT_DEBUG' ) && SCRIPT_DEBUG; |
|
262
|
|
|
$version = gmdate( 'Ymd' ); |
|
263
|
|
|
|
|
264
|
|
|
wp_enqueue_script( |
|
265
|
|
|
'wpcom-block-editor-default-editor-script', |
|
266
|
|
|
$debug |
|
267
|
|
|
? '//widgets.wp.com/wpcom-block-editor/default.editor.js?minify=false' |
|
268
|
|
|
: '//widgets.wp.com/wpcom-block-editor/default.editor.min.js', |
|
269
|
|
|
array( |
|
270
|
|
|
'jquery', |
|
271
|
|
|
'lodash', |
|
272
|
|
|
'wp-compose', |
|
273
|
|
|
'wp-data', |
|
274
|
|
|
'wp-editor', |
|
275
|
|
|
'wp-element', |
|
276
|
|
|
'wp-rich-text', |
|
277
|
|
|
), |
|
278
|
|
|
$version, |
|
279
|
|
|
true |
|
280
|
|
|
); |
|
281
|
|
|
|
|
282
|
|
|
wp_localize_script( |
|
283
|
|
|
'wpcom-block-editor-default-editor-script', |
|
284
|
|
|
'wpcomGutenberg', |
|
285
|
|
|
array( |
|
286
|
|
|
'switchToClassic' => array( |
|
287
|
|
|
'isVisible' => $this->is_iframed_block_editor(), |
|
288
|
|
|
'label' => __( 'Switch to Classic Editor', 'jetpack' ), |
|
289
|
|
|
'url' => Jetpack_Calypsoify::getInstance()->get_switch_to_classic_editor_url(), |
|
290
|
|
|
), |
|
291
|
|
|
'richTextToolbar' => array( |
|
292
|
|
|
'justify' => __( 'Justify', 'jetpack' ), |
|
293
|
|
|
'underline' => __( 'Underline', 'jetpack' ), |
|
294
|
|
|
), |
|
295
|
|
|
) |
|
296
|
|
|
); |
|
297
|
|
|
|
|
298
|
|
|
if ( jetpack_is_atomic_site() ) { |
|
299
|
|
|
wp_enqueue_script( |
|
300
|
|
|
'wpcom-block-editor-wpcom-editor-script', |
|
301
|
|
|
$debug |
|
302
|
|
|
? '//widgets.wp.com/wpcom-block-editor/wpcom.editor.js?minify=false' |
|
303
|
|
|
: '//widgets.wp.com/wpcom-block-editor/wpcom.editor.min.js', |
|
304
|
|
|
array( |
|
305
|
|
|
'lodash', |
|
306
|
|
|
'wp-blocks', |
|
307
|
|
|
'wp-data', |
|
308
|
|
|
'wp-dom-ready', |
|
309
|
|
|
'wp-plugins', |
|
310
|
|
|
), |
|
311
|
|
|
$version, |
|
312
|
|
|
true |
|
313
|
|
|
); |
|
314
|
|
|
} |
|
315
|
|
|
|
|
316
|
|
|
if ( $this->is_iframed_block_editor() ) { |
|
317
|
|
|
wp_enqueue_script( |
|
318
|
|
|
'wpcom-block-editor-calypso-editor-script', |
|
319
|
|
|
$debug |
|
320
|
|
|
? '//widgets.wp.com/wpcom-block-editor/calypso.editor.js?minify=false' |
|
321
|
|
|
: '//widgets.wp.com/wpcom-block-editor/calypso.editor.min.js', |
|
322
|
|
|
array( |
|
323
|
|
|
'calypsoify_wpadminmods_js', |
|
324
|
|
|
'jquery', |
|
325
|
|
|
'lodash', |
|
326
|
|
|
'react', |
|
327
|
|
|
'wp-blocks', |
|
328
|
|
|
'wp-data', |
|
329
|
|
|
'wp-hooks', |
|
330
|
|
|
'wp-tinymce', |
|
331
|
|
|
'wp-url', |
|
332
|
|
|
), |
|
333
|
|
|
$version, |
|
334
|
|
|
true |
|
335
|
|
|
); |
|
336
|
|
|
|
|
337
|
|
|
wp_enqueue_style( |
|
338
|
|
|
'wpcom-block-editor-calypso-editor-styles', |
|
339
|
|
|
$debug |
|
340
|
|
|
? '//widgets.wp.com/wpcom-block-editor/calypso.editor.css?minify=false' |
|
341
|
|
|
: '//widgets.wp.com/wpcom-block-editor/calypso.editor.min.css', |
|
342
|
|
|
array(), |
|
343
|
|
|
$version |
|
344
|
|
|
); |
|
345
|
|
|
} |
|
346
|
|
|
} |
|
347
|
|
|
|
|
348
|
|
|
/** |
|
349
|
|
|
* Enqueues the WordPress.com block editor integration assets for both editor and front-end. |
|
350
|
|
|
*/ |
|
351
|
|
|
public function enqueue_block_assets() { |
|
352
|
|
|
// These styles are manually copied from //widgets.wp.com/wpcom-block-editor/default.view.css in order to |
|
353
|
|
|
// improve the performance by avoiding an extra network request to download the CSS file on every page. |
|
354
|
|
|
wp_add_inline_style( 'wp-block-library', '.has-text-align-justify{text-align:justify;}' ); |
|
355
|
|
|
} |
|
356
|
|
|
|
|
357
|
|
|
/** |
|
358
|
|
|
* Determines if the current $post contains a justified paragraph block. |
|
359
|
|
|
* |
|
360
|
|
|
* @return boolean true if justified paragraph is found, false otherwise. |
|
361
|
|
|
*/ |
|
362
|
|
|
public function has_justified_block() { |
|
363
|
|
|
global $post; |
|
364
|
|
|
if ( ! $post instanceof WP_Post ) { |
|
|
|
|
|
|
365
|
|
|
return false; |
|
366
|
|
|
}; |
|
367
|
|
|
|
|
368
|
|
|
if ( ! has_blocks( $post ) ) { |
|
369
|
|
|
return false; |
|
370
|
|
|
} |
|
371
|
|
|
|
|
372
|
|
|
return false !== strpos( $post->post_content, '<!-- wp:paragraph {"align":"justify"' ); |
|
373
|
|
|
} |
|
374
|
|
|
|
|
375
|
|
|
/** |
|
376
|
|
|
* Register the Tiny MCE plugins for the WordPress.com block editor integration. |
|
377
|
|
|
* |
|
378
|
|
|
* @param array $plugin_array An array of external Tiny MCE plugins. |
|
379
|
|
|
* @return array External TinyMCE plugins. |
|
380
|
|
|
*/ |
|
381
|
|
|
public function add_tinymce_plugins( $plugin_array ) { |
|
382
|
|
|
if ( $this->is_iframed_block_editor() ) { |
|
383
|
|
|
$debug = defined( 'SCRIPT_DEBUG' ) && SCRIPT_DEBUG; |
|
384
|
|
|
|
|
385
|
|
|
$plugin_array['gutenberg-wpcom-iframe-media-modal'] = add_query_arg( |
|
386
|
|
|
'v', |
|
387
|
|
|
gmdate( 'YW' ), |
|
388
|
|
|
$debug |
|
389
|
|
|
? '//widgets.wp.com/wpcom-block-editor/calypso.tinymce.js?minify=false' |
|
390
|
|
|
: '//widgets.wp.com/wpcom-block-editor/calypso.tinymce.min.js' |
|
391
|
|
|
); |
|
392
|
|
|
} |
|
393
|
|
|
|
|
394
|
|
|
return $plugin_array; |
|
395
|
|
|
} |
|
396
|
|
|
|
|
397
|
|
|
/** |
|
398
|
|
|
* Ensures the authentication cookies are designated for cross-site access. |
|
399
|
|
|
*/ |
|
400
|
|
|
private function enable_cross_site_auth_cookies() { |
|
401
|
|
|
/** |
|
402
|
|
|
* Allow plugins to disable the cross-site auth cookies. |
|
403
|
|
|
* |
|
404
|
|
|
* @since 8.1.1 |
|
405
|
|
|
* |
|
406
|
|
|
* @param false bool Whether auth cookies should be disabled for cross-site access. False by default. |
|
407
|
|
|
*/ |
|
408
|
|
|
if ( apply_filters( 'jetpack_disable_cross_site_auth_cookies', false ) ) { |
|
409
|
|
|
return; |
|
410
|
|
|
} |
|
411
|
|
|
|
|
412
|
|
|
add_action( 'set_auth_cookie', array( $this, 'set_samesite_auth_cookies' ), 10, 6 ); |
|
413
|
|
|
add_action( 'set_logged_in_cookie', array( $this, 'set_samesite_logged_in_cookies' ), 10, 6 ); |
|
414
|
|
|
add_action( 'clear_auth_cookie', array( $this, 'clear_auth_cookies' ) ); |
|
415
|
|
|
add_filter( 'send_auth_cookies', array( $this, 'disable_core_auth_cookies' ) ); |
|
416
|
|
|
} |
|
417
|
|
|
|
|
418
|
|
|
/** |
|
419
|
|
|
* Gets the SameSite attribute to use in auth cookies. |
|
420
|
|
|
* |
|
421
|
|
|
* @param int $user_id User ID. |
|
422
|
|
|
* @return string SameSite attribute to use on auth cookies. |
|
423
|
|
|
*/ |
|
424
|
|
|
public function get_samesite_attr_for_auth_cookies( $user_id ) { |
|
425
|
|
|
$secure = apply_filters( 'secure_auth_cookie', is_ssl(), $user_id ); |
|
426
|
|
|
$samesite = $secure ? 'None' : 'Lax'; |
|
427
|
|
|
/** |
|
428
|
|
|
* Filters the SameSite attribute to use in auth cookies. |
|
429
|
|
|
* |
|
430
|
|
|
* @param string $samesite SameSite attribute to use in auth cookies. |
|
431
|
|
|
* |
|
432
|
|
|
* @since 8.1.1 |
|
433
|
|
|
*/ |
|
434
|
|
|
$samesite = apply_filters( 'jetpack_auth_cookie_samesite', $samesite ); |
|
435
|
|
|
|
|
436
|
|
|
return $samesite; |
|
437
|
|
|
} |
|
438
|
|
|
|
|
439
|
|
|
/** |
|
440
|
|
|
* Generates cross-site auth cookies so they can be accessed by WordPress.com. |
|
441
|
|
|
* |
|
442
|
|
|
* @param string $auth_cookie Authentication cookie value. |
|
443
|
|
|
* @param int $expire The time the login grace period expires as a UNIX timestamp. |
|
444
|
|
|
* Default is 12 hours past the cookie's expiration time. |
|
445
|
|
|
* @param int $expiration The time when the authentication cookie expires as a UNIX timestamp. |
|
446
|
|
|
* Default is 14 days from now. |
|
447
|
|
|
* @param int $user_id User ID. |
|
448
|
|
|
* @param string $scheme Authentication scheme. Values include 'auth' or 'secure_auth'. |
|
449
|
|
|
* @param string $token User's session token to use for this cookie. |
|
450
|
|
|
*/ |
|
451
|
|
|
public function set_samesite_auth_cookies( $auth_cookie, $expire, $expiration, $user_id, $scheme, $token ) { |
|
452
|
|
|
if ( wp_startswith( $scheme, 'secure_' ) ) { |
|
453
|
|
|
$secure = true; |
|
454
|
|
|
$auth_cookie_name = SECURE_AUTH_COOKIE; |
|
455
|
|
|
} else { |
|
456
|
|
|
$secure = false; |
|
457
|
|
|
$auth_cookie_name = AUTH_COOKIE; |
|
458
|
|
|
} |
|
459
|
|
|
$samesite = $this->get_samesite_attr_for_auth_cookies( $user_id ); |
|
460
|
|
|
|
|
461
|
|
|
jetpack_shim_setcookie( |
|
462
|
|
|
$auth_cookie_name, |
|
463
|
|
|
$auth_cookie, |
|
464
|
|
|
array( |
|
465
|
|
|
'expires' => $expire, |
|
466
|
|
|
'path' => PLUGINS_COOKIE_PATH, |
|
467
|
|
|
'domain' => COOKIE_DOMAIN, |
|
468
|
|
|
'secure' => $secure, |
|
469
|
|
|
'httponly' => true, |
|
470
|
|
|
'samesite' => $samesite, |
|
471
|
|
|
) |
|
472
|
|
|
); |
|
473
|
|
|
|
|
474
|
|
|
jetpack_shim_setcookie( |
|
475
|
|
|
$auth_cookie_name, |
|
476
|
|
|
$auth_cookie, |
|
477
|
|
|
array( |
|
478
|
|
|
'expires' => $expire, |
|
479
|
|
|
'path' => ADMIN_COOKIE_PATH, |
|
480
|
|
|
'domain' => COOKIE_DOMAIN, |
|
481
|
|
|
'secure' => $secure, |
|
482
|
|
|
'httponly' => true, |
|
483
|
|
|
'samesite' => $samesite, |
|
484
|
|
|
) |
|
485
|
|
|
); |
|
486
|
|
|
} |
|
487
|
|
|
|
|
488
|
|
|
/** |
|
489
|
|
|
* Generates cross-site logged in cookies so they can be accessed by WordPress.com. |
|
490
|
|
|
* |
|
491
|
|
|
* @param string $logged_in_cookie The logged-in cookie value. |
|
492
|
|
|
* @param int $expire The time the login grace period expires as a UNIX timestamp. |
|
493
|
|
|
* Default is 12 hours past the cookie's expiration time. |
|
494
|
|
|
* @param int $expiration The time when the logged-in cookie expires as a UNIX timestamp. |
|
495
|
|
|
* Default is 14 days from now. |
|
496
|
|
|
* @param int $user_id User ID. |
|
497
|
|
|
* @param string $scheme Authentication scheme. Default 'logged_in'. |
|
498
|
|
|
* @param string $token User's session token to use for this cookie. |
|
499
|
|
|
*/ |
|
500
|
|
|
public function set_samesite_logged_in_cookies( $logged_in_cookie, $expire, $expiration, $user_id, $scheme, $token ) { |
|
501
|
|
|
$secure = apply_filters( 'secure_auth_cookie', is_ssl(), $user_id ); |
|
502
|
|
|
$samesite = $this->get_samesite_attr_for_auth_cookies( $user_id ); |
|
503
|
|
|
|
|
504
|
|
|
jetpack_shim_setcookie( |
|
505
|
|
|
LOGGED_IN_COOKIE, |
|
506
|
|
|
$logged_in_cookie, |
|
507
|
|
|
array( |
|
508
|
|
|
'expires' => $expire, |
|
509
|
|
|
'path' => COOKIEPATH, |
|
510
|
|
|
'domain' => COOKIE_DOMAIN, |
|
511
|
|
|
'secure' => $secure, |
|
512
|
|
|
'httponly' => true, |
|
513
|
|
|
'samesite' => $samesite, |
|
514
|
|
|
) |
|
515
|
|
|
); |
|
516
|
|
|
|
|
517
|
|
|
if ( COOKIEPATH !== SITECOOKIEPATH ) { |
|
518
|
|
|
jetpack_shim_setcookie( |
|
519
|
|
|
LOGGED_IN_COOKIE, |
|
520
|
|
|
$logged_in_cookie, |
|
521
|
|
|
array( |
|
522
|
|
|
'expires' => $expire, |
|
523
|
|
|
'path' => SITECOOKIEPATH, |
|
524
|
|
|
'domain' => COOKIE_DOMAIN, |
|
525
|
|
|
'secure' => $secure, |
|
526
|
|
|
'httponly' => true, |
|
527
|
|
|
'samesite' => $samesite, |
|
528
|
|
|
) |
|
529
|
|
|
); |
|
530
|
|
|
} |
|
531
|
|
|
} |
|
532
|
|
|
|
|
533
|
|
|
/** |
|
534
|
|
|
* Prevents the default core auth cookies from being generated so they don't collide with our cross-site cookies. |
|
535
|
|
|
* |
|
536
|
|
|
* @return bool Whether the default core auth cookies should be generated. |
|
537
|
|
|
*/ |
|
538
|
|
|
public function disable_core_auth_cookies() { |
|
539
|
|
|
return false; |
|
540
|
|
|
} |
|
541
|
|
|
|
|
542
|
|
|
/** |
|
543
|
|
|
* Removes all of the cookies associated with authentication. |
|
544
|
|
|
* |
|
545
|
|
|
* This is copied from core's `wp_clear_auth_cookie` since disabling the core auth cookies prevents also the auth |
|
546
|
|
|
* cookies from being cleared. |
|
547
|
|
|
* |
|
548
|
|
|
* @see wp_clear_auth_cookie |
|
549
|
|
|
*/ |
|
550
|
|
|
public function clear_auth_cookies() { |
|
551
|
|
|
// Auth cookies. |
|
552
|
|
|
setcookie( AUTH_COOKIE, ' ', time() - YEAR_IN_SECONDS, ADMIN_COOKIE_PATH, COOKIE_DOMAIN ); |
|
553
|
|
|
setcookie( SECURE_AUTH_COOKIE, ' ', time() - YEAR_IN_SECONDS, ADMIN_COOKIE_PATH, COOKIE_DOMAIN ); |
|
554
|
|
|
setcookie( AUTH_COOKIE, ' ', time() - YEAR_IN_SECONDS, PLUGINS_COOKIE_PATH, COOKIE_DOMAIN ); |
|
555
|
|
|
setcookie( SECURE_AUTH_COOKIE, ' ', time() - YEAR_IN_SECONDS, PLUGINS_COOKIE_PATH, COOKIE_DOMAIN ); |
|
556
|
|
|
setcookie( LOGGED_IN_COOKIE, ' ', time() - YEAR_IN_SECONDS, COOKIEPATH, COOKIE_DOMAIN ); |
|
557
|
|
|
setcookie( LOGGED_IN_COOKIE, ' ', time() - YEAR_IN_SECONDS, SITECOOKIEPATH, COOKIE_DOMAIN ); |
|
558
|
|
|
|
|
559
|
|
|
// Settings cookies. |
|
560
|
|
|
setcookie( 'wp-settings-' . get_current_user_id(), ' ', time() - YEAR_IN_SECONDS, SITECOOKIEPATH ); |
|
561
|
|
|
setcookie( 'wp-settings-time-' . get_current_user_id(), ' ', time() - YEAR_IN_SECONDS, SITECOOKIEPATH ); |
|
562
|
|
|
|
|
563
|
|
|
// Old cookies. |
|
564
|
|
|
setcookie( AUTH_COOKIE, ' ', time() - YEAR_IN_SECONDS, COOKIEPATH, COOKIE_DOMAIN ); |
|
565
|
|
|
setcookie( AUTH_COOKIE, ' ', time() - YEAR_IN_SECONDS, SITECOOKIEPATH, COOKIE_DOMAIN ); |
|
566
|
|
|
setcookie( SECURE_AUTH_COOKIE, ' ', time() - YEAR_IN_SECONDS, COOKIEPATH, COOKIE_DOMAIN ); |
|
567
|
|
|
setcookie( SECURE_AUTH_COOKIE, ' ', time() - YEAR_IN_SECONDS, SITECOOKIEPATH, COOKIE_DOMAIN ); |
|
568
|
|
|
|
|
569
|
|
|
// Even older cookies. |
|
570
|
|
|
setcookie( USER_COOKIE, ' ', time() - YEAR_IN_SECONDS, COOKIEPATH, COOKIE_DOMAIN ); |
|
571
|
|
|
setcookie( PASS_COOKIE, ' ', time() - YEAR_IN_SECONDS, COOKIEPATH, COOKIE_DOMAIN ); |
|
572
|
|
|
setcookie( USER_COOKIE, ' ', time() - YEAR_IN_SECONDS, SITECOOKIEPATH, COOKIE_DOMAIN ); |
|
573
|
|
|
setcookie( PASS_COOKIE, ' ', time() - YEAR_IN_SECONDS, SITECOOKIEPATH, COOKIE_DOMAIN ); |
|
574
|
|
|
|
|
575
|
|
|
// Post password cookie. |
|
576
|
|
|
setcookie( 'wp-postpass_' . COOKIEHASH, ' ', time() - YEAR_IN_SECONDS, COOKIEPATH, COOKIE_DOMAIN ); |
|
577
|
|
|
} |
|
578
|
|
|
} |
|
579
|
|
|
|
|
580
|
|
|
Jetpack_WPCOM_Block_Editor::init(); |
|
581
|
|
|
|
This check looks for calls to methods that do not seem to exist on a given type. It looks for the method on the type itself as well as in inherited classes or implemented interfaces.
This is most likely a typographical error or the method has been renamed.