]> git.vanrenterghem.biz Git - git.ikiwiki.info.git/commitdiff
Merge commit 'schmonz/master' into cvs
authorJoey Hess <joey@gnu.kitenet.net>
Thu, 10 Sep 2009 17:44:31 +0000 (13:44 -0400)
committerJoey Hess <joey@gnu.kitenet.net>
Thu, 10 Sep 2009 17:44:31 +0000 (13:44 -0400)
IkiWiki.pm
IkiWiki/Plugin/cvs.pm
IkiWiki/Plugin/rsync.pm [deleted file]
IkiWiki/Plugin/unixauth.pm [deleted file]
debian/changelog
doc/plugins/contrib/cvs.mdwn
doc/plugins/contrib/cvs/discussion.mdwn
doc/roadmap.mdwn

index 48780ae51d137fd20aba4f369817c93762035bb6..85d8eea68419cb350e530c322958796186e05b1f 100644 (file)
@@ -364,7 +364,7 @@ sub getsetup () {
        },
        web_commit_regexp => {
                type => "internal",
-               default => qr/^web commit (by (.*?(?=: |$))|from (\d+\.\d+\.\d+\.\d+)):?(.*)/,
+               default => qr/^web commit (by (.*?(?=: |$))|from ([0-9a-fA-F:.]+[0-9a-fA-F])):?(.*)/,
                description => "regexp to parse web commits from logs",
                safe => 0,
                rebuild => 0,
index e926425f292cca2554ff1944d35b0ddf8b2b124f..939e892705a5005c95aee694620a8514a62a5217 100644 (file)
@@ -75,7 +75,7 @@ sub getsetup () {
                cvs_wrapper => {
                        type => "string",
                        example => "/cvs/wikirepo/CVSROOT/post-commit",
-                       description => "cvs post-commit hook to generate (triggered by CVSROOT/loginfo entry",
+                       description => "cvs post-commit hook to generate (triggered by CVSROOT/loginfo entry)",
                        safe => 0, # file
                        rebuild => 0,
                },
@@ -235,11 +235,13 @@ sub rcs_add ($) {
                        if (defined($filemime) && $filemime eq 'text/plain') {
                                cvs_runcvs('add', $file) ||
                                        warn("cvs add $file failed\n");
-                       } else {
+                       }
+                       else {
                                cvs_runcvs('add', '-kb', $file) ||
                                        warn("cvs add binary $file failed\n");
                        }
-               } else {
+               }
+               else {
                        # directory
                        cvs_runcvs('add', $file) ||
                                warn("cvs add $file failed\n");
@@ -353,7 +355,8 @@ sub rcs_recentchanges($) {
                    $message[0]->{line}=~/$config{web_commit_regexp}/) {
                        $user=defined $2 ? "$2" : "$3";
                        $message[0]->{line}=$4;
-               } else {
+               }
+               else {
                        $committype="cvs";
                }
 
@@ -363,21 +366,24 @@ sub rcs_recentchanges($) {
                $line = <SPSVC>;
                if ($line =~ /^Author: (.*)$/) {
                        $user = $1 unless defined $user && length $user;
-               } else {
+               }
+               else {
                        error "expected Author, got $line";
                }
 
                $line = <SPSVC>;
                if ($line =~ /^Date: (.*)$/) {
                        $when = str2time($1, 'UTC');
-               } else {
+               }
+               else {
                        error "expected Date, got $line";
                }
 
                $line = <SPSVC>;
                if ($line =~ /^PatchSet (.*)$/) {
                        $rev = $1;
-               } else {
+               }
+               else {
                        error "expected PatchSet, got $line";
                }
 
@@ -415,7 +421,8 @@ sub rcs_diff ($) {
 
        if (wantarray) {
                return @cvsps;
-       } else {
+       }
+       else {
                return join("", @cvsps);
        }
 }
diff --git a/IkiWiki/Plugin/rsync.pm b/IkiWiki/Plugin/rsync.pm
deleted file mode 100644 (file)
index 3f04945..0000000
+++ /dev/null
@@ -1,45 +0,0 @@
-#!/usr/bin/perl
-package IkiWiki::Plugin::rsync;
-
-use warnings;
-use strict;
-use IkiWiki 3.00;
-
-sub import {
-       hook(type => "getsetup", id => "rsync", call => \&getsetup);
-       hook(type => "checkconfig", id => "rsync", call => \&checkconfig);
-       hook(type => "postrefresh", id => "rsync", call => \&postrefresh);
-}
-
-sub getsetup () {
-       return
-               plugin => {
-                       safe => 0,
-                       rebuild => 0,
-               },
-               rsync_command => {
-                       type => "string",
-                       example => "rsync -qa --delete /path/to/destdir/ user\@host:/path/to/docroot/",
-                       description => "unattended command to upload regenerated pages",
-                       safe => 0,
-                       rebuild => 0,
-               },
-}
-
-sub checkconfig {
-       if (! exists $config{rsync_command} ||
-           ! defined $config{rsync_command}) {
-               error("Must specify rsync_command");
-       }
-}
-
-sub postrefresh () {
-       system $config{rsync_command};
-       if ($? == -1) {
-               error("failed to execute rsync_command: $!");
-       } elsif ($? != 0) {
-               error(sprintf("rsync_command exited %d", $? >> 8));
-       }
-}
-
-1
diff --git a/IkiWiki/Plugin/unixauth.pm b/IkiWiki/Plugin/unixauth.pm
deleted file mode 100644 (file)
index 4f0cb4d..0000000
+++ /dev/null
@@ -1,195 +0,0 @@
-#!/usr/bin/perl
-# Ikiwiki unixauth authentication.
-package IkiWiki::Plugin::unixauth;
-
-use warnings;
-use strict;
-use IkiWiki 2.00;
-
-sub import {
-       hook(type => "getsetup", id => "unixauth", call => \&getsetup);
-               hook(type => "formbuilder_setup", id => "unixauth",
-                       call => \&formbuilder_setup);
-               hook(type => "formbuilder", id => "unixauth",
-                       call => \&formbuilder);
-       hook(type => "sessioncgi", id => "unixauth", call => \&sessioncgi);
-}
-
-sub getsetup () {
-       return
-       unixauth_type => {
-                       type => "string",
-                       example => "checkpassword",
-                       description => "type of authenticator; can be 'checkpassword' or 'pwauth'",
-                       safe => 0,
-                       rebuild => 1,
-       },
-       unixauth_command => {
-                       type => "string",
-                       example => "/path/to/checkpassword",
-                       description => "full path and any arguments",
-                       safe => 0,
-                       rebuild => 1,
-       },
-       unixauth_requiressl => {
-                       type => "boolean",
-                       example => "1",
-                       description => "require SSL? strongly recommended",
-                       safe => 0,
-                       rebuild => 1,
-       },
-       plugin => {
-                       description => "Unix user authentication",
-                       safe => 0,
-                       rebuild => 1,
-       },
-}
-
-# Checks if a string matches a user's password, and returns true or false.
-sub checkpassword ($$;$) {
-       my $user=shift;
-       my $password=shift;
-       my $field=shift || "password";
-
-       # It's very important that the user not be allowed to log in with
-       # an empty password!
-       if (! length $password) {
-                       return 0;
-       }
-
-       my $ret=0;
-       if (! exists $config{unixauth_type}) {
-                       # admin needs to carefully think over his configuration
-                       return 0;
-       }
-       elsif ($config{unixauth_type} eq "checkpassword") {
-                       open UNIXAUTH, "|$config{unixauth_command} true 3<&0" or die("Could not run $config{unixauth_type}");
-                       print UNIXAUTH "$user\0$password\0Y123456\0";
-                       close UNIXAUTH;
-                       $ret=!($?>>8);
-       }
-       elsif ($config{unixauth_type} eq "pwauth") {
-                       open UNIXAUTH, "|$config{unixauth_command}" or die("Could not run $config{unixauth_type}");
-                       print UNIXAUTH "$user\n$password\n";
-                       close UNIXAUTH;
-                       $ret=!($?>>8);
-       }
-       else {
-                       # no such authentication type
-                       return 0;
-       }
-
-       if ($ret) {
-               my $userinfo=IkiWiki::userinfo_retrieve();
-               if (! length $user || ! defined $userinfo ||
-                       ! exists $userinfo->{$user} || ! ref $userinfo->{$user}) {
-                               IkiWiki::userinfo_setall($user, {
-                                       'email' => '',
-                                       'regdate' => time,
-                               });
-               }
-       }
-
-       return $ret;
-}
-
-sub formbuilder_setup (@) {
-       my %params=@_;
-
-       my $form=$params{form};
-       my $session=$params{session};
-       my $cgi=$params{cgi};
-
-       # if not under SSL, die before even showing a login form,
-       # unless the admin explicitly says it's fine
-       if (! exists $config{unixauth_requiressl}) {
-                       $config{unixauth_requiressl} = 1;
-       }
-       if ($config{unixauth_requiressl}) {
-               if ((! $config{sslcookie}) || (! exists $ENV{'HTTPS'})) {
-                       die("SSL required to login. Contact your administrator.<br>");
-               }
-       }
-
-       if ($form->title eq "signin") {
-                       $form->field(name => "name", required => 0);
-                       $form->field(name => "password", type => "password", required => 0);
-
-                       if ($form->submitted) {
-                                       my $submittype=$form->submitted;
-                                       # Set required fields based on how form was submitted.
-                                       my %required=(
-                                                       "Login" => [qw(name password)],
-                                       );
-                                       foreach my $opt (@{$required{$submittype}}) {
-                                                       $form->field(name => $opt, required => 1);
-                                       }
-
-                                       # Validate password against name for Login.
-                                       if ($submittype eq "Login") {
-                                                       $form->field(
-                                                                       name => "password",
-                                                                       validate => sub {
-                                                                                       checkpassword($form->field("name"), shift);
-                                                                       },
-                                                       );
-                                       }
-
-                                       # XXX is this reachable? looks like no
-                                       elsif ($submittype eq "Login") {
-                                                       $form->field(
-                                                                       name => "name",
-                                                                       validate => sub {
-                                                                                       my $name=shift;
-                                                                                       length $name &&
-                                                                                       IkiWiki::userinfo_get($name, "regdate");
-                                                                       },
-                                                       );
-                                       }
-                       }
-                       else {
-                                       # First time settings.
-                                       $form->field(name => "name");
-                                       if ($session->param("name")) {
-                                                       $form->field(name => "name", value => $session->param("name"));
-                                       }
-                       }
-       }
-       elsif ($form->title eq "preferences") {
-               $form->field(name => "name", disabled => 1,
-                               value => $session->param("name"), force => 1,
-                               fieldset => "login");
-               $form->field(name => "password", disabled => 1, type => "password",
-                               fieldset => "login"),
-       }
-}
-
-sub formbuilder (@) {
-       my %params=@_;
-
-       my $form=$params{form};
-       my $session=$params{session};
-       my $cgi=$params{cgi};
-       my $buttons=$params{buttons};
-
-       if ($form->title eq "signin") {
-               if ($form->submitted && $form->validate) {
-                       if ($form->submitted eq 'Login') {
-                               $session->param("name", $form->field("name"));
-                               IkiWiki::cgi_postsignin($cgi, $session);
-                       }
-               }
-       }
-       elsif ($form->title eq "preferences") {
-               if ($form->submitted eq "Save Preferences" && $form->validate) {
-                       my $user_name=$form->field('name');
-               }
-       }
-}
-
-sub sessioncgi ($$) {
-       my $q=shift;
-       my $session=shift;
-}
-
-1
index de165e4ff9cb7ab15733975184767ac2f111bd9a..2e178171349e37fbb85f7890fb37c4eeb6dd724f 100644 (file)
@@ -6,6 +6,7 @@ ikiwiki (3.14159265) UNRELEASED; urgency=low
     allows banning by IP address.
   * underlay: Also allow configuring additional directories to search 
     for template files in.
+  * Fix parsing web commits from ipv6 addresses.
 
  -- Joey Hess <joeyh@debian.org>  Wed, 02 Sep 2009 15:01:27 -0400
 
index fcf5b936f926e19d70d82794666cdbc7dc463838..d4599230004870fff4742326763cfae32746cbda 100644 (file)
@@ -5,8 +5,8 @@
 This plugin allows ikiwiki to use [[!wikipedia desc="CVS" Concurrent Versions System]] as an [[rcs]].
 
 ### Usage
-7. Install [cvsps](http://www.cobite.com/cvsps/), [[!cpan
-File::ReadBackwards]], and
+7. Install [[!cpan File::chdir]], [[!cpan File::ReadBackwards]],
+[cvsps](http://www.cobite.com/cvsps/), and
 [cvsweb](http://www.freebsd.org/projects/cvsweb.html) or the like.
 7. Adjust CVS-related parameters in your setup file.
 
@@ -22,9 +22,9 @@ Consider creating `$HOME/.cvsrc` if you don't have one already; the plugin doesn
 * `cvs.pm` started life as a copy of [[3.14159|news/version_3.14159]]'s `svn.pm`.
 * `IkiWiki.pm:wiki_file_prune_regexps` avoids copying CVS metadata
 into `$DESTDIR`.
-* `IkiWiki/Wrapper.pm` avoids calling ikiwiki from post-commit if it's a
-directory being `cvs add`ed (this check is only compiled into the wrapper
-iff the configured VCS is "cvs").
+* `IkiWiki/Wrapper.pm` provides a new "wrapperargcheck" hook, which
+the plugin implements to avoid calling ikiwiki from post-commit
+(and locking against itself) if it's a directory being `cvs add`ed.
 * [[ikiwiki-makerepo]]:
  * creates a repository,
  * imports `$SRCDIR` into top-level module `ikiwiki` (vendor tag IKIWIKI, release tag PRE_CVS),
@@ -32,6 +32,5 @@ iff the configured VCS is "cvs").
 * CVS multi-directory commits happen separately; the post-commit hook sees only the first directory's changes in time for [[recentchanges|plugins/recentchanges]]. The next run of `ikiwiki --setup` will correctly re-render such a recentchanges entry. It should be possible to solve this problem with NetBSD's `commit_prep` and `log_accum` scripts (see below).
 
 ### To do
-* Add automated tests. (Blindly adding svn-like tests to `t/file_pruned.t` doesn't do the trick.)
 * Instead of resource-intensively scraping changesets with `cvsps`, have `ikiwiki-makerepo` set up NetBSD-like `log_accum` and `commit_prep` scripts that coalesce and keep records of commits. `cvsps` can be used as a fallback for repositories without such records.
 * Perhaps prevent web edits from attempting to create `.../CVS/foo.mdwn` (and `.../cvs/foo.mdwn` on case-insensitive filesystems); thanks to the CVS metadata directory, the attempt will fail anyway (and much more confusingly) if we don't.
index 1f0ce010211cd7a77eadf7bf563ba6dfd0cc7163..155a2289ddf5dbb44a28283de537de1132e3aa7f 100644 (file)
@@ -125,3 +125,19 @@ to pass to the command.
 
 > Thanks for reading carefully. I've tested your suggestions and
 > applied them on my branch. --[[schmonz]]
+
+----
+
+I've abstracted out CVS's involvement in the wrapper, adding a new
+"wrapperargcheck" hook to examine `argc/argv` and return success or
+failure (failure causes the wrapper to terminate) and implementing
+this hook in the plugin. In the non-CVS case, the check immediately
+returns success, so the added overhead is just a function call.
+
+Given how rarely anything should need to reach in and modify the
+wrapper -- I'd go so far as to say we shouldn't make it too easy
+-- I don't think it's worth the effort to try and design a more
+general-purpose way to do so. If and when some other problem thinks
+it wants to be solved by a new wrapper hook, it's easy enough to add
+one. Until then, I'd say it's more important to keep the wrapper as
+short and clear as possible. --[[schmonz]]
index 2f79f79784ef0efc73c5db8a52a9ff3250dad7f0..a701a26855f7cc548fb83d62da5a08d0ad2a9c8d 100644 (file)
@@ -7,7 +7,7 @@ This is the roadmap for ikiwiki development.
 
 Released 29 April 2006.
 
-The 1.x series is no longer supported.
+The 1.X series is no longer supported.
 
 ----