7 use open qw{:utf8 :std};
12 sub printheader ($) { #{{{
15 if ($config{sslcookie}) {
16 print $session->header(-charset => 'utf-8',
17 -cookie => $session->cookie(-secure => 1));
19 print $session->header(-charset => 'utf-8');
24 sub showform ($$$$;@) { #{{{
30 if (exists $hooks{formbuilder}) {
31 run_hooks(formbuilder => sub {
32 shift->(form => $form, cgi => $cgi, session => $session,
37 printheader($session);
38 print misctemplate($form->title, $form->render(submit => $buttons), @_);
41 sub redirect ($$) { #{{{
44 if (! $config{w3mmode}) {
45 print $q->redirect($url);
48 print "Content-type: text/plain\n";
49 print "W3m-control: GOTO $url\n\n";
53 sub check_canedit ($$$;$) { #{{{
60 run_hooks(canedit => sub {
61 return if defined $canedit;
62 my $ret=shift->($page, $q, $session);
67 elsif (ref $ret eq 'CODE') {
68 $ret->() unless $nonfatal;
71 elsif (defined $ret) {
72 error($ret) unless $nonfatal;
80 sub decode_form_utf8 ($) { #{{{
82 foreach my $f ($form->field) {
83 $form->field(name => $f,
84 value => decode_utf8($form->field($f)),
90 # Check if the user is signed in. If not, redirect to the signin form and
91 # save their place to return to later.
92 sub needsignin ($$) { #{{{
96 if (! defined $session->param("name") ||
97 ! userinfo_get($session->param("name"), "regdate")) {
98 $session->param(postsignin => $ENV{QUERY_STRING});
99 cgi_signin($q, $session);
100 cgi_savesession($session);
105 sub cgi_signin ($$) { #{{{
109 eval q{use CGI::FormBuilder};
111 my $form = CGI::FormBuilder->new(
119 action => $config{cgiurl},
121 template => {type => 'div'},
122 stylesheet => baseurl()."style.css",
124 my $buttons=["Login"];
126 if ($q->param("do") ne "signin" && !$form->submitted) {
127 $form->text(gettext("You need to log in first."));
129 $form->field(name => "do", type => "hidden", value => "signin",
132 decode_form_utf8($form);
133 run_hooks(formbuilder_setup => sub {
134 shift->(form => $form, cgi => $q, session => $session,
135 buttons => $buttons);
137 decode_form_utf8($form);
139 if ($form->submitted) {
143 showform($form, $buttons, $session, $q);
146 sub cgi_postsignin ($$) { #{{{
150 # Continue with whatever was being done before the signin process.
151 if (defined $session->param("postsignin")) {
152 my $postsignin=CGI->new($session->param("postsignin"));
153 $session->clear("postsignin");
154 cgi($postsignin, $session);
155 cgi_savesession($session);
159 error(gettext("login failed, perhaps you need to turn on cookies?"));
163 sub cgi_prefs ($$) { #{{{
167 needsignin($q, $session);
169 # The session id is stored on the form and checked to
170 # guard against CSRF.
171 my $sid=$q->param('sid');
172 if (! defined $sid) {
175 elsif ($sid ne $session->id) {
176 error(gettext("Your login session has expired."));
179 eval q{use CGI::FormBuilder};
181 my $form = CGI::FormBuilder->new(
182 title => "preferences",
183 name => "preferences",
193 action => $config{cgiurl},
194 template => {type => 'div'},
195 stylesheet => baseurl()."style.css",
197 [login => gettext("Login")],
198 [preferences => gettext("Preferences")],
199 [admin => gettext("Admin")]
202 my $buttons=["Save Preferences", "Logout", "Cancel"];
204 decode_form_utf8($form);
205 run_hooks(formbuilder_setup => sub {
206 shift->(form => $form, cgi => $q, session => $session,
207 buttons => $buttons);
209 decode_form_utf8($form);
211 $form->field(name => "do", type => "hidden", value => "prefs",
213 $form->field(name => "sid", type => "hidden", value => $session->id,
215 $form->field(name => "email", size => 50, fieldset => "preferences");
216 $form->field(name => "banned_users", size => 50,
217 fieldset => "admin");
219 my $user_name=$session->param("name");
220 if (! is_admin($user_name)) {
221 $form->field(name => "banned_users", type => "hidden");
224 if (! $form->submitted) {
225 $form->field(name => "email", force => 1,
226 value => userinfo_get($user_name, "email"));
227 if (is_admin($user_name)) {
228 $form->field(name => "banned_users", force => 1,
229 value => join(" ", get_banned_users()));
233 if ($form->submitted eq 'Logout') {
235 redirect($q, $config{url});
238 elsif ($form->submitted eq 'Cancel') {
239 redirect($q, $config{url});
242 elsif ($form->submitted eq 'Save Preferences' && $form->validate) {
243 if (defined $form->field('email')) {
244 userinfo_set($user_name, 'email', $form->field('email')) ||
245 error("failed to set email");
247 if (is_admin($user_name)) {
248 set_banned_users(grep { ! is_admin($_) }
250 $form->field("banned_users"))) ||
251 error("failed saving changes");
253 $form->text(gettext("Preferences saved."));
256 showform($form, $buttons, $session, $q);
259 sub cgi_editpage ($$) { #{{{
263 my @fields=qw(do rcsinfo subpage from page type editcontent comments);
264 my @buttons=("Save Page", "Preview", "Cancel");
265 eval q{use CGI::FormBuilder};
267 my $form = CGI::FormBuilder->new(
272 required => [qw{editcontent}],
275 action => $config{cgiurl},
278 template => scalar template_params("editpage.tmpl"),
279 wikiname => $config{wikiname},
282 decode_form_utf8($form);
283 run_hooks(formbuilder_setup => sub {
284 shift->(form => $form, cgi => $q, session => $session,
285 buttons => \@buttons);
287 decode_form_utf8($form);
289 # This untaint is safe because titlepage removes any problematic
291 my ($page)=$form->field('page');
292 $page=titlepage(possibly_foolish_untaint($page));
293 if (! defined $page || ! length $page ||
294 file_pruned($page, $config{srcdir}) || $page=~/^\//) {
295 error("bad page name");
298 my $baseurl=$config{url}."/".htmlpage($page);
301 if (defined $form->field('from')) {
302 ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
307 if (exists $pagesources{$page} && $form->field("do") ne "create") {
308 $file=$pagesources{$page};
309 $type=pagetype($file);
310 if (! defined $type || $type=~/^_/) {
311 error(sprintf(gettext("%s is not an editable page"), $page));
313 if (! $form->submitted) {
314 $form->field(name => "rcsinfo",
315 value => rcs_prepedit($file), force => 1);
317 $form->field(name => "editcontent", validate => '/.*/');
320 $type=$form->param('type');
321 if (defined $type && length $type && $hooks{htmlize}{$type}) {
322 $type=possibly_foolish_untaint($type);
324 elsif (defined $from && exists $pagesources{$from}) {
325 # favor the type of linking page
326 $type=pagetype($pagesources{$from});
328 $type=$config{default_pageext} unless defined $type;
329 $file=$page.".".$type;
330 if (! $form->submitted) {
331 $form->field(name => "rcsinfo", value => "", force => 1);
333 $form->field(name => "editcontent", validate => '/.+/');
336 $form->field(name => "do", type => 'hidden');
337 $form->field(name => "sid", type => "hidden", value => $session->id,
339 $form->field(name => "from", type => 'hidden');
340 $form->field(name => "rcsinfo", type => 'hidden');
341 $form->field(name => "subpage", type => 'hidden');
342 $form->field(name => "page", value => pagetitle($page, 1), force => 1);
343 $form->field(name => "type", value => $type, force => 1);
344 $form->field(name => "comments", type => "text", size => 80);
345 $form->field(name => "editcontent", type => "textarea", rows => 20,
347 $form->tmpl_param("can_commit", $config{rcs});
348 $form->tmpl_param("indexlink", indexlink());
349 $form->tmpl_param("helponformattinglink",
350 htmllink($page, $page, "ikiwiki/formatting",
352 linktext => "FormattingHelp"));
354 if ($form->submitted eq "Cancel") {
355 if ($form->field("do") eq "create" && defined $from) {
356 redirect($q, "$config{url}/".htmlpage($from));
358 elsif ($form->field("do") eq "create") {
359 redirect($q, $config{url});
362 redirect($q, "$config{url}/".htmlpage($page));
366 elsif ($form->submitted eq "Preview") {
367 my $new=not exists $pagesources{$page};
369 # temporarily record its type
370 $pagesources{$page}=$page.".".$type;
373 my $content=$form->field('editcontent');
375 run_hooks(editcontent => sub {
383 $form->tmpl_param("page_preview",
384 htmlize($page, $type,
385 linkify($page, $page,
386 preprocess($page, $page,
387 filter($page, $page, $content), 0, 1))));
390 delete $pagesources{$page};
392 # previewing may have created files on disk
395 elsif ($form->submitted eq "Save Page") {
396 $form->tmpl_param("page_preview", "");
398 $form->tmpl_param("page_conflict", "");
400 if ($form->submitted ne "Save Page" || ! $form->validate) {
401 if ($form->field("do") eq "create") {
404 if (! defined $from || ! length $from ||
405 $from ne $form->field('from') ||
406 file_pruned($from, $config{srcdir}) ||
408 $form->submitted eq "Preview") {
409 @page_locs=$best_loc=$page;
415 if ((defined $form->field('subpage') && length $form->field('subpage')) ||
416 $page eq gettext('discussion')) {
417 $best_loc="$from/$page";
420 $best_loc=$dir.$page;
423 push @page_locs, $dir.$page;
424 push @page_locs, "$from/$page";
425 while (length $dir) {
427 push @page_locs, $dir.$page;
430 push @page_locs, "$config{userdir}/$page"
431 if length $config{userdir};
435 ! exists $pagecase{lc $_}
438 # hmm, someone else made the page in the
440 if ($form->submitted eq "Preview") {
441 # let them go ahead with the edit
442 # and resolve the conflict at save
447 redirect($q, "$config{url}/".htmlpage($page));
452 my @editable_locs = grep {
453 check_canedit($_, $q, $session, 1)
455 if (! @editable_locs) {
456 # let it throw an error this time
457 map { check_canedit($_, $q, $session) } @page_locs;
461 if (exists $hooks{htmlize}) {
462 @page_types=grep { !/^_/ }
463 keys %{$hooks{htmlize}};
466 $form->tmpl_param("page_select", 1);
467 $form->field(name => "page", type => 'select',
468 options => [ map { pagetitle($_, 1) } @editable_locs ],
469 value => pagetitle($best_loc, 1));
470 $form->field(name => "type", type => 'select',
471 options => \@page_types);
472 $form->title(sprintf(gettext("creating %s"), pagetitle($page)));
475 elsif ($form->field("do") eq "edit") {
476 check_canedit($page, $q, $session);
477 if (! defined $form->field('editcontent') ||
478 ! length $form->field('editcontent')) {
480 if (exists $pagesources{$page}) {
481 $content=readfile(srcfile($pagesources{$page}));
482 $content=~s/\n/\r\n/g;
484 $form->field(name => "editcontent", value => $content,
487 $form->tmpl_param("page_select", 0);
488 $form->field(name => "page", type => 'hidden');
489 $form->field(name => "type", type => 'hidden');
490 $form->title(sprintf(gettext("editing %s"), pagetitle($page)));
493 showform($form, \@buttons, $session, $q, forcebaseurl => $baseurl);
497 check_canedit($page, $q, $session);
499 # The session id is stored on the form and checked to
500 # guard against CSRF. But only if the user is logged in,
501 # as anonok can allow anonymous edits.
502 if (defined $session->param("name")) {
503 my $sid=$q->param('sid');
504 if (! defined $sid || $sid ne $session->id) {
505 error(gettext("Your login session has expired."));
509 my $exists=-e "$config{srcdir}/$file";
511 if ($form->field("do") ne "create" && ! $exists &&
512 ! defined srcfile($file, 1)) {
513 $form->tmpl_param("page_gone", 1);
514 $form->field(name => "do", value => "create", force => 1);
515 $form->tmpl_param("page_select", 0);
516 $form->field(name => "page", type => 'hidden');
517 $form->field(name => "type", type => 'hidden');
518 $form->title(sprintf(gettext("editing %s"), $page));
519 showform($form, \@buttons, $session, $q, forcebaseurl => $baseurl);
522 elsif ($form->field("do") eq "create" && $exists) {
523 $form->tmpl_param("creation_conflict", 1);
524 $form->field(name => "do", value => "edit", force => 1);
525 $form->tmpl_param("page_select", 0);
526 $form->field(name => "page", type => 'hidden');
527 $form->field(name => "type", type => 'hidden');
528 $form->title(sprintf(gettext("editing %s"), $page));
529 $form->field("editcontent",
530 value => readfile("$config{srcdir}/$file").
531 "\n\n\n".$form->field("editcontent"),
533 showform($form, \@buttons, $session, $q, forcebaseurl => $baseurl);
537 my $content=$form->field('editcontent');
538 run_hooks(editcontent => sub {
546 $content=~s/\r\n/\n/g;
548 $content.="\n" if $content !~ /\n$/;
550 $config{cgi}=0; # avoid cgi error message
551 eval { writefile($file, $config{srcdir}, $content) };
554 $form->field(name => "rcsinfo", value => rcs_prepedit($file),
556 $form->tmpl_param("failed_save", 1);
557 $form->tmpl_param("error_message", $@);
558 $form->field("editcontent", value => $content, force => 1);
559 $form->tmpl_param("page_select", 0);
560 $form->field(name => "page", type => 'hidden');
561 $form->field(name => "type", type => 'hidden');
562 $form->title(sprintf(gettext("editing %s"), $page));
563 showform($form, \@buttons, $session, $q,
564 forcebaseurl => $baseurl);
571 if (defined $form->field('comments') &&
572 length $form->field('comments')) {
573 $message=$form->field('comments');
580 # Prevent deadlock with post-commit hook by
581 # signaling to it that it should not try to
583 disable_commit_hook();
584 $conflict=rcs_commit($file, $message,
585 $form->field("rcsinfo"),
586 $session->param("name"), $ENV{REMOTE_ADDR});
587 enable_commit_hook();
591 # Refresh even if there was a conflict, since other changes
592 # may have been committed while the post-commit hook was
594 require IkiWiki::Render;
598 if (defined $conflict) {
599 $form->field(name => "rcsinfo", value => rcs_prepedit($file),
601 $form->tmpl_param("page_conflict", 1);
602 $form->field("editcontent", value => $conflict, force => 1);
603 $form->field("do", "edit", force => 1);
604 $form->tmpl_param("page_select", 0);
605 $form->field(name => "page", type => 'hidden');
606 $form->field(name => "type", type => 'hidden');
607 $form->title(sprintf(gettext("editing %s"), $page));
608 showform($form, \@buttons, $session, $q,
609 forcebaseurl => $baseurl);
613 # The trailing question mark tries to avoid broken
614 # caches and get the most recent version of the page.
615 redirect($q, "$config{url}/".htmlpage($page)."?updated");
620 sub cgi_getsession ($) { #{{{
623 eval q{use CGI::Session};
624 CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
626 my $oldmask=umask(077);
627 my $session = CGI::Session->new("driver:DB_File", $q,
628 { FileName => "$config{wikistatedir}/sessions.db" });
634 sub cgi_savesession ($) { #{{{
637 # Force session flush with safe umask.
638 my $oldmask=umask(077);
653 binmode(STDIN, ":utf8");
655 run_hooks(cgi => sub { shift->($q) });
658 my $do=$q->param('do');
659 if (! defined $do || ! length $do) {
660 my $error = $q->cgi_error;
662 error("Request not processed: $error");
665 error("\"do\" parameter missing");
669 # Need to lock the wiki before getting a session.
674 $session=cgi_getsession($q);
677 # Auth hooks can sign a user in.
678 if ($do ne 'signin' && ! defined $session->param("name")) {
679 run_hooks(auth => sub {
680 shift->($q, $session)
682 if (defined $session->param("name")) {
683 # Make sure whatever user was authed is in the
685 if (! userinfo_get($session->param("name"), "regdate")) {
686 userinfo_setall($session->param("name"), {
690 }) || error("failed adding user");
695 if (defined $session->param("name") &&
696 userinfo_get($session->param("name"), "banned")) {
697 print $q->header(-status => "403 Forbidden");
699 print gettext("You are banned.");
700 cgi_savesession($session);
703 run_hooks(sessioncgi => sub { shift->($q, $session) });
705 if ($do eq 'signin') {
706 cgi_signin($q, $session);
707 cgi_savesession($session);
709 elsif ($do eq 'prefs') {
710 cgi_prefs($q, $session);
712 elsif ($do eq 'create' || $do eq 'edit') {
713 cgi_editpage($q, $session);
715 elsif (defined $session->param("postsignin") || $do eq 'postsignin') {
716 cgi_postsignin($q, $session);
719 error("unknown do parameter");