X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/7910f1c352d4d00551694550f34ab7c3d975e448..bac47cdecd9a9f7db3224eaaed43de0984bcf9ea:/IkiWiki/Plugin/remove.pm diff --git a/IkiWiki/Plugin/remove.pm b/IkiWiki/Plugin/remove.pm index 91f133ab6..f263db9b8 100644 --- a/IkiWiki/Plugin/remove.pm +++ b/IkiWiki/Plugin/remove.pm @@ -12,6 +12,38 @@ sub import { #{{{ } # }}} +sub check_canremove ($$$$) { + my $page=shift; + my $q=shift; + my $session=shift; + my $attachment=shift; + + # Must be a known source file. + if (! exists $pagesources{$page}) { + error(sprintf(gettext("%s does not exist"), + htmllink("", "", $page, noimageinline => 1))); + } + + # Must exist on disk, and be a regular file. + my $file=$pagesources{$page}; + if (! -e "$config{srcdir}/$file") { + error(sprintf(gettext("%s is not in the srcdir, so it cannot be deleted"), $file)); + } + elsif (-l "$config{srcdir}/$file" && ! -f _) { + error(sprintf(gettext("%s is not a file"), $file)); + } + + # Must be editiable. + IkiWiki::check_canedit($page, $q, $session); + + # This is sorta overkill, but better safe + # than sorry. If a user can't upload an + # attachment, don't let them delete it. + if ($attachment) { + IkiWiki::Plugin::attachment::check_canattach($session, $page, $file); + } +} + sub formbuilder_setup (@) { #{{{ my %params=@_; my $form=$params{form}; @@ -30,7 +62,6 @@ sub confirmation_form ($$) { #{{{ eval q{use CGI::FormBuilder}; error($@) if $@; - my @fields=qw(do page); my $f = CGI::FormBuilder->new( name => "remove", header => 0, @@ -40,7 +71,7 @@ sub confirmation_form ($$) { #{{{ params => $q, action => $config{cgiurl}, stylesheet => IkiWiki::baseurl()."style.css", - fields => \@fields, + fields => [qw{do page}], ); $f->field(name => "do", type => "hidden", value => "remove", force => 1); @@ -54,6 +85,8 @@ sub removal_confirm ($$@) { my $attachment=shift; my @pages=@_; + check_canremove($_, $q, $session, $attachment) foreach @pages; + # Save current form state to allow returning to it later # without losing any edits. # (But don't save what button was submitted, to avoid @@ -98,7 +131,11 @@ sub formbuilder (@) { #{{{ removal_confirm($q, $session, 0, $form->field("page")); } elsif ($form->submitted eq "Remove Attachments") { - removal_confirm($q, $session, 1, $q->param("attachment_select")); + my @selected=$q->param("attachment_select"); + if (! @selected) { + error(gettext("Please select the attachments to remove.")); + } + removal_confirm($q, $session, 1, @selected); } } } #}}} @@ -121,25 +158,12 @@ sub sessioncgi ($$) { #{{{ # and that the user is allowed to edit(/remove) it. my @files; foreach my $page (@pages) { - if (! exists $pagesources{$page}) { - error(sprintf(gettext("%s does not exist"), - htmllink("", "", $page, noimageinline => 1))); - } - IkiWiki::check_canedit($page, $q, $session); - - my $file=$pagesources{$page}; - if (! -e "$config{srcdir}/$file") { - error(sprintf(gettext("%s is not in the srcdir, so it cannot be deleted"), $file)); - } - elsif (! -f "$config{srcdir}/$file") { - error(sprintf(gettext("%s is not a file"), $file)); - } - - # This untaint is safe because we've - # verified the file is a known source file, - # and is in the srcdir, and is a regular - # file. - push @files, IkiWiki::possibly_foolish_untaint($file); + check_canremove($page, $q, $session, $q->param("attachment")); + + # This untaint is safe because of the + # checks performed above, which verify the + # page is a normal file, etc. + push @files, IkiWiki::possibly_foolish_untaint($pagesources{$page}); } # Do removal, and update the wiki.