]> git.vanrenterghem.biz Git - git.ikiwiki.info.git/blob - IkiWiki/CGI.pm
CGI, attachment, passwordauth: harden against repeated parameters
[git.ikiwiki.info.git] / IkiWiki / CGI.pm
1 #!/usr/bin/perl
3 package IkiWiki;
5 use warnings;
6 use strict;
7 use IkiWiki;
8 use IkiWiki::UserInfo;
9 use open qw{:utf8 :std};
10 use Encode;
12 sub printheader ($) {
13         my $session=shift;
14         
15         if (($ENV{HTTPS} && lc $ENV{HTTPS} ne "off") || $config{sslcookie}) {
16                 print $session->header(-charset => 'utf-8',
17                         -cookie => $session->cookie(-httponly => 1, -secure => 1));
18         }
19         else {
20                 print $session->header(-charset => 'utf-8',
21                         -cookie => $session->cookie(-httponly => 1));
22         }
23 }
25 sub prepform {
26         my $form=shift;
27         my $buttons=shift;
28         my $session=shift;
29         my $cgi=shift;
31         if (exists $hooks{formbuilder}) {
32                 run_hooks(formbuilder => sub {
33                         shift->(form => $form, cgi => $cgi, session => $session,
34                                 buttons => $buttons);
35                 });
36         }
38         return $form;
39 }
41 sub showform ($$$$;@) {
42         my $form=prepform(@_);
43         shift;
44         my $buttons=shift;
45         my $session=shift;
46         my $cgi=shift;
48         printheader($session);
49         print cgitemplate($cgi, $form->title,
50                 $form->render(submit => $buttons), @_);
51 }
53 sub cgitemplate ($$$;@) {
54         my $cgi=shift;
55         my $title=shift;
56         my $content=shift;
57         my %params=@_;
58         
59         my $template=template("page.tmpl");
61         my $topurl = $config{url};
62         if (defined $cgi && ! $config{w3mmode} && ! $config{reverse_proxy}) {
63                 $topurl = $cgi->url;
64         }
66         my $page="";
67         if (exists $params{page}) {
68                 $page=delete $params{page};
69                 $params{forcebaseurl}=urlto($page);
70                 if (! $config{html5}) {
71                         $params{forcebaseurl}=urlabs($params{forcebaseurl}, $topurl);
72                 }
73         }
74         run_hooks(pagetemplate => sub {
75                 shift->(
76                         page => $page,
77                         destpage => $page,
78                         template => $template,
79                 );
80         });
81         templateactions($template, "");
83         my $baseurl = baseurl();
84         if (! $config{html5}) {
85                 $baseurl = urlabs($baseurl, $topurl),
86         }
88         $template->param(
89                 dynamic => 1,
90                 title => $title,
91                 wikiname => $config{wikiname},
92                 content => $content,
93                 baseurl => $baseurl,
94                 html5 => $config{html5},
95                 %params,
96         );
97         
98         return $template->output;
99 }
101 sub redirect ($$) {
102         my $q=shift;
103         eval q{use URI};
105         my $topurl;
106         if (defined $q && ! $config{w3mmode} && ! $config{reverse_proxy}) {
107                 $topurl = $q->url;
108         }
110         my $url=URI->new(urlabs(shift, $topurl));
111         if (! $config{w3mmode}) {
112                 print $q->redirect($url);
113         }
114         else {
115                 print "Content-type: text/plain\n";
116                 print "W3m-control: GOTO $url\n\n";
117         }
120 sub decode_cgi_utf8 ($) {
121         # decode_form_utf8 method is needed for 5.01
122         if ($] < 5.01) {
123                 my $cgi = shift;
124                 foreach my $f ($cgi->param) {
125                         $cgi->param($f, map { decode_utf8 $_ }
126                                 @{$cgi->param_fetch($f)});
127                 }
128         }
131 sub safe_decode_utf8 ($) {
132     my $octets = shift;
133     # call decode_utf8 on >= 5.20 only if it's not already decoded,
134     # otherwise it balks, on < 5.20, always call it
135     if ($] < 5.02 || !Encode::is_utf8($octets)) {
136         return decode_utf8($octets);
137     }
138     else {
139         return $octets;
140     }
143 sub decode_form_utf8 ($) {
144         if ($] >= 5.01) {
145                 my $form = shift;
146                 foreach my $f ($form->field) {
147                         my @value=map { safe_decode_utf8($_) } $form->field($f);
148                         $form->field(name  => $f,
149                                      value => \@value,
150                                      force => 1,
151                         );
152                 }
153         }
156 # Check if the user is signed in. If not, redirect to the signin form and
157 # save their place to return to later.
158 sub needsignin ($$) {
159         my $q=shift;
160         my $session=shift;
162         if (! defined $session->param("name") ||
163             ! userinfo_get($session->param("name"), "regdate")) {
164                 $session->param(postsignin => $q->query_string);
165                 cgi_signin($q, $session);
166                 cgi_savesession($session);
167                 exit;
168         }
171 sub cgi_signin ($$;$) {
172         my $q=shift;
173         my $session=shift;
174         my $returnhtml=shift;
176         decode_cgi_utf8($q);
177         eval q{use CGI::FormBuilder};
178         error($@) if $@;
179         my $form = CGI::FormBuilder->new(
180                 title => "signin",
181                 name => "signin",
182                 charset => "utf-8",
183                 method => 'POST',
184                 required => 'NONE',
185                 javascript => 0,
186                 params => $q,
187                 action => cgiurl(),
188                 header => 0,
189                 template => {type => 'div'},
190                 stylesheet => 1,
191         );
192         my $buttons=["Login"];
193         
194         $form->field(name => "do", type => "hidden", value => "signin",
195                 force => 1);
196         
197         decode_form_utf8($form);
198         run_hooks(formbuilder_setup => sub {
199                 shift->(form => $form, cgi => $q, session => $session,
200                         buttons => $buttons);
201         });
202         decode_form_utf8($form);
204         if ($form->submitted) {
205                 $form->validate;
206         }
208         if ($returnhtml) {
209                 $form=prepform($form, $buttons, $session, $q);
210                 return $form->render(submit => $buttons);
211         }
213         showform($form, $buttons, $session, $q);
216 sub cgi_postsignin ($$) {
217         my $q=shift;
218         my $session=shift;
219         
220         # Continue with whatever was being done before the signin process.
221         if (defined $session->param("postsignin")) {
222                 my $postsignin=CGI->new($session->param("postsignin"));
223                 $session->clear("postsignin");
224                 cgi($postsignin, $session);
225                 cgi_savesession($session);
226                 exit;
227         }
228         else {
229                 if ($config{sslcookie} && ! $q->https()) {
230                         error(gettext("probable misconfiguration: sslcookie is set, but you are attempting to login via http, not https"));
231                 }
232                 else {
233                         error(gettext("login failed, perhaps you need to turn on cookies?"));
234                 }
235         }
238 sub cgi_prefs ($$) {
239         my $q=shift;
240         my $session=shift;
242         needsignin($q, $session);
243         decode_cgi_utf8($q);
244         
245         # The session id is stored on the form and checked to
246         # guard against CSRF.
247         my $sid=$q->param('sid');
248         if (! defined $sid) {
249                 $q->delete_all;
250         }
251         elsif ($sid ne $session->id) {
252                 error(gettext("Your login session has expired."));
253         }
255         eval q{use CGI::FormBuilder};
256         error($@) if $@;
257         my $form = CGI::FormBuilder->new(
258                 title => "preferences",
259                 name => "preferences",
260                 header => 0,
261                 charset => "utf-8",
262                 method => 'POST',
263                 validate => {
264                         email => 'EMAIL',
265                 },
266                 required => 'NONE',
267                 javascript => 0,
268                 params => $q,
269                 action => cgiurl(),
270                 template => {type => 'div'},
271                 stylesheet => 1,
272                 fieldsets => [
273                         [login => gettext("Login")],
274                         [preferences => gettext("Preferences")],
275                         [admin => gettext("Admin")]
276                 ],
277         );
278         my $buttons=["Save Preferences", "Logout", "Cancel"];
279         
280         decode_form_utf8($form);
281         run_hooks(formbuilder_setup => sub {
282                 shift->(form => $form, cgi => $q, session => $session,
283                         buttons => $buttons);
284         });
285         decode_form_utf8($form);
286         
287         $form->field(name => "do", type => "hidden", value => "prefs",
288                 force => 1);
289         $form->field(name => "sid", type => "hidden", value => $session->id,
290                 force => 1);
291         $form->field(name => "email", size => 50, fieldset => "preferences");
292         
293         my $user_name=$session->param("name");
295         if (! $form->submitted) {
296                 $form->field(name => "email", force => 1,
297                         value => userinfo_get($user_name, "email"));
298         }
299         
300         if ($form->submitted eq 'Logout') {
301                 $session->delete();
302                 redirect($q, baseurl(undef));
303                 return;
304         }
305         elsif ($form->submitted eq 'Cancel') {
306                 redirect($q, baseurl(undef));
307                 return;
308         }
309         elsif ($form->submitted eq 'Save Preferences' && $form->validate) {
310                 my $email = $form->field('email');
311                 if (defined $email) {
312                         userinfo_set($user_name, 'email', $email) ||
313                                 error("failed to set email");
314                 }
316                 $form->text(gettext("Preferences saved."));
317         }
318         
319         showform($form, $buttons, $session, $q,
320                 prefsurl => "", # avoid showing the preferences link
321         );
324 sub cgi_custom_failure ($$$) {
325         my $q=shift;
326         my $httpstatus=shift;
327         my $message=shift;
329         print $q->header(
330                 -status => $httpstatus,
331                 -charset => 'utf-8',
332         );
333         print $message;
335         # Internet Explod^Hrer won't show custom 404 responses
336         # unless they're >= 512 bytes
337         print ' ' x 512;
339         exit;
342 sub check_banned ($$) {
343         my $q=shift;
344         my $session=shift;
346         my $banned=0;
347         my $name=$session->param("name");
348         if (defined $name && 
349             grep { $name eq $_ } @{$config{banned_users}}) {
350                 $banned=1;
351         }
353         foreach my $b (@{$config{banned_users}}) {
354                 if (pagespec_match("", $b,
355                         ip => $session->remote_addr(),
356                         name => defined $name ? $name : "",
357                 )) {
358                         $banned=1;
359                         last;
360                 }
361         }
363         if ($banned) {
364                 $session->delete();
365                 cgi_savesession($session);
366                 cgi_custom_failure(
367                         $q, "403 Forbidden",
368                         gettext("You are banned."));
369         }
372 sub cgi_getsession ($) {
373         my $q=shift;
375         eval q{use CGI::Session; use HTML::Entities};
376         error($@) if $@;
377         CGI::Session->name("ikiwiki_session_".encode_entities($config{wikiname}));
378         
379         my $oldmask=umask(077);
380         my $session = eval {
381                 CGI::Session->new("driver:DB_File", $q,
382                         { FileName => "$config{wikistatedir}/sessions.db" })
383         };
384         if (! $session || $@) {
385                 my $error = $@;
386                 error($error." ".CGI::Session->errstr());
387         }
388         
389         umask($oldmask);
391         return $session;
394 # To guard against CSRF, the user's session id (sid)
395 # can be stored on a form. This function will check
396 # (for logged in users) that the sid on the form matches
397 # the session id in the cookie.
398 sub checksessionexpiry ($$) {
399         my $q=shift;
400         my $session = shift;
402         if (defined $session->param("name")) {
403                 my $sid=$q->param('sid');
404                 if (! defined $sid || $sid ne $session->id) {
405                         error(gettext("Your login session has expired."));
406                 }
407         }
410 sub cgi_savesession ($) {
411         my $session=shift;
413         # Force session flush with safe umask.
414         my $oldmask=umask(077);
415         $session->flush;
416         umask($oldmask);
419 sub cgi (;$$) {
420         my $q=shift;
421         my $session=shift;
423         eval q{use CGI};
424         error($@) if $@;
425         $CGI::DISABLE_UPLOADS=$config{cgi_disable_uploads};
427         if (! $q) {
428                 binmode(STDIN);
429                 $q=CGI->new;
430                 binmode(STDIN, ":utf8");
431         
432                 run_hooks(cgi => sub { shift->($q) });
433         }
435         my $do=$q->param('do');
436         if (! defined $do || ! length $do) {
437                 my $error = $q->cgi_error;
438                 if ($error) {
439                         error("Request not processed: $error");
440                 }
441                 else {
442                         error("\"do\" parameter missing");
443                 }
444         }
446         # Need to lock the wiki before getting a session.
447         lockwiki();
448         loadindex();
449         
450         if (! $session) {
451                 $session=cgi_getsession($q);
452         }
453         
454         # Auth hooks can sign a user in.
455         if ($do ne 'signin' && ! defined $session->param("name")) {
456                 run_hooks(auth => sub {
457                         shift->($q, $session)
458                 });
459                 if (defined $session->param("name")) {
460                         # Make sure whatever user was authed is in the
461                         # userinfo db.
462                         if (! userinfo_get($session->param("name"), "regdate")) {
463                                 userinfo_setall($session->param("name"), {
464                                         email => defined $session->param("email") ? $session->param("email") : "",
465                                         password => "",
466                                         regdate => time,
467                                 }) || error("failed adding user");
468                         }
469                 }
470         }
471         
472         check_banned($q, $session);
473         
474         run_hooks(sessioncgi => sub { shift->($q, $session) });
476         if ($do eq 'signin') {
477                 cgi_signin($q, $session);
478                 cgi_savesession($session);
479         }
480         elsif ($do eq 'prefs') {
481                 cgi_prefs($q, $session);
482         }
483         elsif (defined $session->param("postsignin") || $do eq 'postsignin') {
484                 cgi_postsignin($q, $session);
485         }
486         else {
487                 error("unknown do parameter");
488         }
491 # Does not need to be called directly; all errors will go through here.
492 sub cgierror ($) {
493         my $message=shift;
495         eval q{use HTML::Entities};
496         $message = encode_entities($message);
498         print "Content-type: text/html\n\n";
499         print cgitemplate(undef, gettext("Error"),
500                 "<p class=\"error\">".gettext("Error").": $message</p>");
501         die $@;