7 use open qw{:utf8 :std};
12 sub printheader ($) { #{{{
15 if ($config{sslcookie}) {
16 print $session->header(-charset => 'utf-8',
17 -cookie => $session->cookie(-secure => 1));
19 print $session->header(-charset => 'utf-8');
24 sub redirect ($$) { #{{{
27 if (! $config{w3mmode}) {
28 print $q->redirect($url);
31 print "Content-type: text/plain\n";
32 print "W3m-control: GOTO $url\n\n";
36 sub check_canedit ($$$;$) { #{{{
43 run_hooks(canedit => sub {
44 return if defined $canedit;
45 my $ret=shift->($page, $q, $session);
46 if (defined $ret && $ret eq "") {
49 elsif (defined $ret) {
51 error($ret) unless $nonfatal;
57 sub decode_form_utf8 ($) { #{{{
59 foreach my $f ($form->field) {
60 next if Encode::is_utf8(scalar $form->field($f));
61 $form->field(name => $f,
62 value => decode_utf8($form->field($f)),
68 sub cgi_recentchanges ($) { #{{{
71 # Optimisation: building recentchanges means calculating lots of
72 # links. Memoizing htmllink speeds it up a lot (can't be memoized
73 # during page builds as the return values may change, but they
79 eval q{use Time::Duration};
82 my $changelog=[rcs_recentchanges(100)];
83 foreach my $change (@$changelog) {
84 $change->{when} = concise(ago($change->{when}));
86 $change->{user} = userlink($change->{user});
88 my $is_excess = exists $change->{pages}[10]; # limit pages to first 10
89 delete @{$change->{pages}}[10 .. @{$change->{pages}}] if $is_excess;
92 $_->{link} = htmllink("", "", $_->{page},
94 linktext => pagetitle($_->{page}));
98 push @{$change->{pages}}, { link => '...' } if $is_excess;
101 my $template=template("recentchanges.tmpl");
103 title => "RecentChanges",
104 indexlink => indexlink(),
105 wikiname => $config{wikiname},
106 changelog => $changelog,
107 baseurl => baseurl(),
109 run_hooks(pagetemplate => sub {
110 shift->(page => "", destpage => "", template => $template);
112 print $q->header(-charset => 'utf-8'), $template->output;
115 # Check if the user is signed in. If not, redirect to the signin form and
116 # save their place to return to later.
117 sub needsignin ($$) { #{{{
121 if (! defined $session->param("name") ||
122 ! userinfo_get($session->param("name"), "regdate")) {
123 if (! defined $session->param("postsignin")) {
124 $session->param(postsignin => $ENV{QUERY_STRING});
126 cgi_signin($q, $session);
127 cgi_savesession($session);
132 sub cgi_signin ($$) { #{{{
136 eval q{use CGI::FormBuilder};
138 my $form = CGI::FormBuilder->new(
147 action => $config{cgiurl},
149 template => {type => 'div'},
150 stylesheet => baseurl()."style.css",
152 my $buttons=["Login"];
154 if ($q->param("do") ne "signin" && !$form->submitted) {
155 $form->text(gettext("You need to log in first."));
157 $form->field(name => "do", type => "hidden", value => "signin",
160 run_hooks(formbuilder_setup => sub {
161 shift->(form => $form, cgi => $q, session => $session);
164 decode_form_utf8($form);
166 if (exists $hooks{formbuilder}) {
167 run_hooks(formbuilder => sub {
168 shift->(form => $form, cgi => $q, session => $session,
169 buttons => $buttons);
173 if ($form->submitted) {
176 printheader($session);
177 print misctemplate($form->title, $form->render(submit => $buttons));
181 sub cgi_postsignin ($$) { #{{{
185 # Continue with whatever was being done before the signin process.
186 if (defined $session->param("postsignin")) {
187 my $postsignin=CGI->new($session->param("postsignin"));
188 $session->clear("postsignin");
189 cgi($postsignin, $session);
190 cgi_savesession($session);
194 # This can occur, for example, if a user went to the signin
195 # url via a bookmark.
196 redirect($q, $config{url});
200 sub cgi_prefs ($$) { #{{{
204 needsignin($q, $session);
206 eval q{use CGI::FormBuilder};
208 my $form = CGI::FormBuilder->new(
209 title => "preferences",
210 name => "preferences",
220 action => $config{cgiurl},
221 template => {type => 'div'},
222 stylesheet => baseurl()."style.css",
224 [login => gettext("Login")],
225 [preferences => gettext("Preferences")],
226 [admin => gettext("Admin")]
229 my $buttons=["Save Preferences", "Logout", "Cancel"];
231 run_hooks(formbuilder_setup => sub {
232 shift->(form => $form, cgi => $q, session => $session);
235 $form->field(name => "do", type => "hidden");
236 $form->field(name => "email", size => 50, fieldset => "preferences");
237 $form->field(name => "subscriptions", size => 50,
238 fieldset => "preferences",
239 comment => "(".htmllink("", "", "PageSpec", noimageinline => 1).")");
240 $form->field(name => "banned_users", size => 50,
241 fieldset => "admin");
243 my $user_name=$session->param("name");
244 if (! is_admin($user_name)) {
245 $form->field(name => "banned_users", type => "hidden");
248 if (! $form->submitted) {
249 $form->field(name => "email", force => 1,
250 value => userinfo_get($user_name, "email"));
251 $form->field(name => "subscriptions", force => 1,
252 value => userinfo_get($user_name, "subscriptions"));
253 if (is_admin($user_name)) {
254 $form->field(name => "banned_users", force => 1,
255 value => join(" ", get_banned_users()));
259 decode_form_utf8($form);
261 if ($form->submitted eq 'Logout') {
263 redirect($q, $config{url});
266 elsif ($form->submitted eq 'Cancel') {
267 redirect($q, $config{url});
270 elsif ($form->submitted eq 'Save Preferences' && $form->validate) {
271 foreach my $field (qw(email subscriptions)) {
272 if (defined $form->field($field) && length $form->field($field)) {
273 userinfo_set($user_name, $field, $form->field($field)) ||
274 error("failed to set $field");
277 if (is_admin($user_name)) {
278 set_banned_users(grep { ! is_admin($_) }
280 $form->field("banned_users"))) ||
281 error("failed saving changes");
283 $form->text(gettext("Preferences saved."));
286 if (exists $hooks{formbuilder}) {
287 run_hooks(formbuilder => sub {
288 shift->(form => $form, cgi => $q, session => $session,
289 buttons => $buttons);
293 printheader($session);
294 print misctemplate($form->title, $form->render(submit => $buttons));
298 sub cgi_editpage ($$) { #{{{
302 my @fields=qw(do rcsinfo subpage from page type editcontent comments);
303 my @buttons=("Save Page", "Preview", "Cancel");
305 eval q{use CGI::FormBuilder};
307 my $form = CGI::FormBuilder->new(
313 editcontent => '/.+/',
315 required => [qw{editcontent}],
318 action => $config{cgiurl},
320 template => scalar template_params("editpage.tmpl"),
321 wikiname => $config{wikiname},
324 run_hooks(formbuilder_setup => sub {
325 shift->(form => $form, cgi => $q, session => $session);
328 decode_form_utf8($form);
330 # This untaint is safe because titlepage removes any problematic
332 my ($page)=$form->field('page');
333 $page=titlepage(possibly_foolish_untaint($page));
334 if (! defined $page || ! length $page || file_pruned($page, $config{srcdir}) || $page=~/^\//) {
335 error("bad page name");
339 if (defined $form->field('from')) {
340 ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
345 if (exists $pagesources{$page} && $form->field("do") ne "create") {
346 $file=$pagesources{$page};
347 $type=pagetype($file);
348 if (! defined $type) {
349 error(sprintf(gettext("%s is not an editable page"), $page));
351 if (! $form->submitted) {
352 $form->field(name => "rcsinfo",
353 value => rcs_prepedit($file), force => 1);
357 $type=$form->param('type');
358 if (defined $type && length $type && $hooks{htmlize}{$type}) {
359 $type=possibly_foolish_untaint($type);
361 elsif (defined $from) {
362 # favor the type of linking page
363 $type=pagetype($pagesources{$from});
365 $type=$config{default_pageext} unless defined $type;
366 $file=$page.".".$type;
367 if (! $form->submitted) {
368 $form->field(name => "rcsinfo", value => "", force => 1);
372 $form->field(name => "do", type => 'hidden');
373 $form->field(name => "from", type => 'hidden');
374 $form->field(name => "rcsinfo", type => 'hidden');
375 $form->field(name => "subpage", type => 'hidden');
376 $form->field(name => "page", value => pagetitle($page, 1), force => 1);
377 $form->field(name => "type", value => $type, force => 1);
378 $form->field(name => "comments", type => "text", size => 80);
379 $form->field(name => "editcontent", type => "textarea", rows => 20,
381 $form->tmpl_param("can_commit", $config{rcs});
382 $form->tmpl_param("indexlink", indexlink());
383 $form->tmpl_param("helponformattinglink",
384 htmllink("", "", "HelpOnFormatting", noimageinline => 1));
385 $form->tmpl_param("baseurl", baseurl());
387 if ($form->submitted eq "Cancel") {
388 if ($form->field("do") eq "create" && defined $from) {
389 redirect($q, "$config{url}/".htmlpage($from));
391 elsif ($form->field("do") eq "create") {
392 redirect($q, $config{url});
395 redirect($q, "$config{url}/".htmlpage($page));
399 elsif ($form->submitted eq "Preview") {
400 $form->tmpl_param("page_preview",
401 htmlize($page, $type,
403 preprocess($page, $page,
404 filter($page, $page, $form->field('editcontent')), 0, 1))));
407 $form->tmpl_param("page_preview", "");
409 $form->tmpl_param("page_conflict", "");
411 if (! $form->submitted || $form->submitted eq "Preview" ||
413 if ($form->field("do") eq "create") {
416 if (! defined $from || ! length $from ||
417 $from ne $form->field('from') ||
418 file_pruned($from, $config{srcdir}) ||
420 $form->submitted eq "Preview") {
421 @page_locs=$best_loc=$page;
427 if ((defined $form->field('subpage') && length $form->field('subpage')) ||
428 $page eq gettext('discussion')) {
429 $best_loc="$from/$page";
432 $best_loc=$dir.$page;
435 push @page_locs, $dir.$page;
436 push @page_locs, "$from/$page";
437 while (length $dir) {
439 push @page_locs, $dir.$page;
442 push @page_locs, "$config{userdir}/$page"
443 if length $config{userdir};
446 ! exists $pagecase{lc $_}
449 # hmm, someone else made the page in the
451 redirect($q, "$config{url}/".htmlpage($page));
455 my @editable_locs = grep {
456 check_canedit($_, $q, $session, 1)
458 if (! @editable_locs) {
459 # let it throw an error this time
460 map { check_canedit($_, $q, $session) } @page_locs;
464 if (exists $hooks{htmlize}) {
465 @page_types=keys %{$hooks{htmlize}};
468 $form->tmpl_param("page_select", 1);
469 $form->field(name => "page", type => 'select',
470 options => [ map { pagetitle($_, 1) } @editable_locs ],
471 value => pagetitle($best_loc, 1));
472 $form->field(name => "type", type => 'select',
473 options => \@page_types);
474 $form->title(sprintf(gettext("creating %s"), pagetitle($page)));
476 elsif ($form->field("do") eq "edit") {
477 check_canedit($page, $q, $session);
478 if (! defined $form->field('editcontent') ||
479 ! length $form->field('editcontent')) {
481 if (exists $pagesources{$page}) {
482 $content=readfile(srcfile($pagesources{$page}));
483 $content=~s/\n/\r\n/g;
485 $form->field(name => "editcontent", value => $content,
488 $form->tmpl_param("page_select", 0);
489 $form->field(name => "page", type => 'hidden');
490 $form->field(name => "type", type => 'hidden');
491 $form->title(sprintf(gettext("editing %s"), pagetitle($page)));
494 print $form->render(submit => \@buttons);
498 check_canedit($page, $q, $session);
499 if (! -e "$config{srcdir}/$file" &&
500 $form->field("do") ne "create") {
501 $form->tmpl_param("page_gone", 1);
502 $form->field(name => "do", value => "create", force => 1);
503 $form->tmpl_param("page_select", 0);
504 $form->field(name => "page", type => 'hidden');
505 $form->field(name => "type", type => 'hidden');
506 $form->title(sprintf(gettext("editing %s"), $page));
507 print $form->render(submit => \@buttons);
510 elsif (-e "$config{srcdir}/$file" &&
511 $form->field("do") eq "create") {
512 $form->tmpl_param("creation_conflict", 1);
513 $form->field(name => "do", value => "edit", force => 1);
514 $form->tmpl_param("page_select", 0);
515 $form->field(name => "page", type => 'hidden');
516 $form->field(name => "type", type => 'hidden');
517 $form->title(sprintf(gettext("editing %s"), $page));
518 $form->field("editcontent",
519 value => readfile("$config{srcdir}/$file").
520 "\n\n\n".$form->field("editcontent"),
522 print $form->render(submit => \@buttons);
526 my $content=$form->field('editcontent');
528 $content=~s/\r\n/\n/g;
531 $config{cgi}=0; # avoid cgi error message
532 eval { writefile($file, $config{srcdir}, $content) };
535 $form->field(name => "rcsinfo", value => rcs_prepedit($file),
537 $form->tmpl_param("failed_save", 1);
538 $form->tmpl_param("error_message", $@);
539 $form->field("editcontent", value => $content, force => 1);
540 $form->tmpl_param("page_select", 0);
541 $form->field(name => "page", type => 'hidden');
542 $form->field(name => "type", type => 'hidden');
543 $form->title(sprintf(gettext("editing %s"), $page));
544 print $form->render(submit => \@buttons);
551 if (defined $form->field('comments') &&
552 length $form->field('comments')) {
553 $message=$form->field('comments');
556 if ($form->field("do") eq "create") {
560 # Prevent deadlock with post-commit hook by
561 # signaling to it that it should not try to
562 # do anything (except send commit mails).
563 disable_commit_hook();
564 $conflict=rcs_commit($file, $message,
565 $form->field("rcsinfo"),
566 $session->param("name"), $ENV{REMOTE_ADDR});
567 enable_commit_hook();
571 # Refresh even if there was a conflict, since other changes
572 # may have been committed while the post-commit hook was
574 require IkiWiki::Render;
578 if (defined $conflict) {
579 $form->field(name => "rcsinfo", value => rcs_prepedit($file),
581 $form->tmpl_param("page_conflict", 1);
582 $form->field("editcontent", value => $conflict, force => 1);
583 $form->field("do", "edit", force => 1);
584 $form->tmpl_param("page_select", 0);
585 $form->field(name => "page", type => 'hidden');
586 $form->field(name => "type", type => 'hidden');
587 $form->title(sprintf(gettext("editing %s"), $page));
588 print $form->render(submit => \@buttons);
592 # The trailing question mark tries to avoid broken
593 # caches and get the most recent version of the page.
594 redirect($q, "$config{url}/".htmlpage($page)."?updated");
599 sub cgi_getsession ($) { #{{{
602 eval q{use CGI::Session};
603 CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
605 my $oldmask=umask(077);
606 my $session = CGI::Session->new("driver:DB_File", $q,
607 { FileName => "$config{wikistatedir}/sessions.db" });
613 sub cgi_savesession ($) { #{{{
616 # Force session flush with safe umask.
617 my $oldmask=umask(077);
632 run_hooks(cgi => sub { shift->($q) });
635 my $do=$q->param('do');
636 if (! defined $do || ! length $do) {
637 my $error = $q->cgi_error;
639 error("Request not processed: $error");
642 error("\"do\" parameter missing");
646 # Things that do not need a session.
647 if ($do eq 'recentchanges') {
648 cgi_recentchanges($q);
651 elsif ($do eq 'hyperestraier') {
655 # Need to lock the wiki before getting a session.
659 $session=cgi_getsession($q);
662 # Auth hooks can sign a user in.
663 if ($do ne 'signin' && ! defined $session->param("name")) {
664 run_hooks(auth => sub {
665 shift->($q, $session)
667 if (defined $session->param("name")) {
668 # Make sure whatever user was authed is in the
670 if (! userinfo_get($session->param("name"), "regdate")) {
671 userinfo_setall($session->param("name"), {
675 }) || error("failed adding user");
680 if (defined $session->param("name") &&
681 userinfo_get($session->param("name"), "banned")) {
682 print $q->header(-status => "403 Forbidden");
684 print gettext("You are banned.");
685 cgi_savesession($session);
687 elsif ($do eq 'signin') {
688 cgi_signin($q, $session);
689 cgi_savesession($session);
691 elsif (defined $session->param("postsignin")) {
692 cgi_postsignin($q, $session);
694 elsif ($do eq 'prefs') {
695 cgi_prefs($q, $session);
697 elsif ($do eq 'create' || $do eq 'edit') {
698 cgi_editpage($q, $session);
700 elsif ($do eq 'blog') {
701 my $page=decode_utf8($q->param('title'));
702 $page=~s/\///g; # no slashes in blog posts
703 # if the page already exists, munge it to be unique
704 my $from=$q->param('from');
706 while (exists $pagecase{lc($from."/".titlepage($page).$add)}) {
707 $add=1 unless length $add;
710 $q->param('page', $page.$add);
711 # now run same as create
712 $q->param('do', 'create');
713 cgi_editpage($q, $session);
715 elsif ($do eq 'postsignin') {
716 error(gettext("login failed, perhaps you need to turn on cookies?"));
719 error("unknown do parameter");
723 sub userlink ($) { #{{{
726 eval q{use CGI 'escapeHTML'};
728 if ($user =~ m!^https?://! &&
729 eval q{use Net::OpenID::VerifiedIdentity; 1} && !$@) {
730 # Munge user-urls, as used by eg, OpenID.
731 my $oid=Net::OpenID::VerifiedIdentity->new(identity => $user);
732 my $display=$oid->display;
733 # Convert "user.somehost.com" to "user [somehost.com]".
734 if ($display !~ /\[/) {
735 $display=~s/^(.*?)\.([^.]+\.[a-z]+)$/$1 [$2]/;
737 # Convert "http://somehost.com/user" to "user [somehost.com]".
738 if ($display !~ /\[/) {
739 $display=~s/^https?:\/\/(.+)\/([^\/]+)$/$2 [$1]/;
741 $display=~s!^https?://!!; # make sure this is removed
742 return "<a href=\"$user\">".escapeHTML($display)."</a>";
745 return htmllink("", "", escapeHTML(
746 length $config{userdir} ? $config{userdir}."/".$user : $user
747 ), noimageinline => 1);