7 use open qw{:utf8 :std};
12 sub printheader ($) { #{{{
15 if ($config{sslcookie}) {
16 print $session->header(-charset => 'utf-8',
17 -cookie => $session->cookie(-secure => 1));
19 print $session->header(-charset => 'utf-8');
24 sub showform ($$$$;@) { #{{{
30 if (exists $hooks{formbuilder}) {
31 run_hooks(formbuilder => sub {
32 shift->(form => $form, cgi => $cgi, session => $session,
37 printheader($session);
38 print misctemplate($form->title, $form->render(submit => $buttons), @_);
41 sub redirect ($$) { #{{{
44 if (! $config{w3mmode}) {
45 print $q->redirect($url);
48 print "Content-type: text/plain\n";
49 print "W3m-control: GOTO $url\n\n";
53 sub check_canedit ($$$;$) { #{{{
60 run_hooks(canedit => sub {
61 return if defined $canedit;
62 my $ret=shift->($page, $q, $session);
67 elsif (ref $ret eq 'CODE') {
68 $ret->() unless $nonfatal;
71 elsif (defined $ret) {
72 error($ret) unless $nonfatal;
80 sub decode_cgi_utf8 ($) { #{{{
81 # decode_form_utf8 method is needed for 5.10
84 foreach my $f ($cgi->param) {
85 $cgi->param($f, map { decode_utf8 $_ } $cgi->param($f));
90 sub decode_form_utf8 ($) { #{{{
93 foreach my $f ($form->field) {
94 $form->field(name => $f,
95 value => decode_utf8($form->field($f)),
102 # Check if the user is signed in. If not, redirect to the signin form and
103 # save their place to return to later.
104 sub needsignin ($$) { #{{{
108 if (! defined $session->param("name") ||
109 ! userinfo_get($session->param("name"), "regdate")) {
110 $session->param(postsignin => $ENV{QUERY_STRING});
111 cgi_signin($q, $session);
112 cgi_savesession($session);
117 sub cgi_signin ($$) { #{{{
122 eval q{use CGI::FormBuilder};
124 my $form = CGI::FormBuilder->new(
132 action => $config{cgiurl},
134 template => {type => 'div'},
135 stylesheet => baseurl()."style.css",
137 my $buttons=["Login"];
139 if ($q->param("do") ne "signin" && !$form->submitted) {
140 $form->text(gettext("You need to log in first."));
142 $form->field(name => "do", type => "hidden", value => "signin",
145 decode_form_utf8($form);
146 run_hooks(formbuilder_setup => sub {
147 shift->(form => $form, cgi => $q, session => $session,
148 buttons => $buttons);
150 decode_form_utf8($form);
152 if ($form->submitted) {
156 showform($form, $buttons, $session, $q);
159 sub cgi_postsignin ($$) { #{{{
163 # Continue with whatever was being done before the signin process.
164 if (defined $session->param("postsignin")) {
165 my $postsignin=CGI->new($session->param("postsignin"));
166 $session->clear("postsignin");
167 cgi($postsignin, $session);
168 cgi_savesession($session);
172 error(gettext("login failed, perhaps you need to turn on cookies?"));
176 sub cgi_prefs ($$) { #{{{
180 needsignin($q, $session);
183 # The session id is stored on the form and checked to
184 # guard against CSRF.
185 my $sid=$q->param('sid');
186 if (! defined $sid) {
189 elsif ($sid ne $session->id) {
190 error(gettext("Your login session has expired."));
193 eval q{use CGI::FormBuilder};
195 my $form = CGI::FormBuilder->new(
196 title => "preferences",
197 name => "preferences",
207 action => $config{cgiurl},
208 template => {type => 'div'},
209 stylesheet => baseurl()."style.css",
211 [login => gettext("Login")],
212 [preferences => gettext("Preferences")],
213 [admin => gettext("Admin")]
216 my $buttons=["Save Preferences", "Logout", "Cancel"];
218 decode_form_utf8($form);
219 run_hooks(formbuilder_setup => sub {
220 shift->(form => $form, cgi => $q, session => $session,
221 buttons => $buttons);
223 decode_form_utf8($form);
225 $form->field(name => "do", type => "hidden", value => "prefs",
227 $form->field(name => "sid", type => "hidden", value => $session->id,
229 $form->field(name => "email", size => 50, fieldset => "preferences");
230 $form->field(name => "banned_users", size => 50,
231 fieldset => "admin");
233 my $user_name=$session->param("name");
234 if (! is_admin($user_name)) {
235 $form->field(name => "banned_users", type => "hidden");
238 if (! $form->submitted) {
239 $form->field(name => "email", force => 1,
240 value => userinfo_get($user_name, "email"));
241 if (is_admin($user_name)) {
242 $form->field(name => "banned_users", force => 1,
243 value => join(" ", get_banned_users()));
247 if ($form->submitted eq 'Logout') {
249 redirect($q, $config{url});
252 elsif ($form->submitted eq 'Cancel') {
253 redirect($q, $config{url});
256 elsif ($form->submitted eq 'Save Preferences' && $form->validate) {
257 if (defined $form->field('email')) {
258 userinfo_set($user_name, 'email', $form->field('email')) ||
259 error("failed to set email");
261 if (is_admin($user_name)) {
262 set_banned_users(grep { ! is_admin($_) }
264 $form->field("banned_users"))) ||
265 error("failed saving changes");
267 $form->text(gettext("Preferences saved."));
270 showform($form, $buttons, $session, $q);
273 sub cgi_editpage ($$) { #{{{
279 my @fields=qw(do rcsinfo subpage from page type editcontent comments);
280 my @buttons=("Save Page", "Preview", "Cancel");
281 eval q{use CGI::FormBuilder};
283 my $form = CGI::FormBuilder->new(
287 required => [qw{editcontent}],
290 action => $config{cgiurl},
293 template => scalar template_params("editpage.tmpl"),
294 wikiname => $config{wikiname},
297 decode_form_utf8($form);
298 run_hooks(formbuilder_setup => sub {
299 shift->(form => $form, cgi => $q, session => $session,
300 buttons => \@buttons);
302 decode_form_utf8($form);
304 # This untaint is safe because we check file_pruned.
305 my $page=$form->field('page');
306 $page=possibly_foolish_untaint($page);
307 if (! defined $page || ! length $page ||
308 file_pruned($page, $config{srcdir}) || $page=~/^\//) {
309 error("bad page name");
312 my $baseurl=$config{url}."/".htmlpage($page);
315 if (defined $form->field('from')) {
316 ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
321 if (exists $pagesources{$page} && $form->field("do") ne "create") {
322 $file=$pagesources{$page};
323 $type=pagetype($file);
324 if (! defined $type || $type=~/^_/) {
325 error(sprintf(gettext("%s is not an editable page"), $page));
327 if (! $form->submitted) {
328 $form->field(name => "rcsinfo",
329 value => rcs_prepedit($file), force => 1);
331 $form->field(name => "editcontent", validate => '/.*/');
334 $type=$form->param('type');
335 if (defined $type && length $type && $hooks{htmlize}{$type}) {
336 $type=possibly_foolish_untaint($type);
338 elsif (defined $from && exists $pagesources{$from}) {
339 # favor the type of linking page
340 $type=pagetype($pagesources{$from});
342 $type=$config{default_pageext} unless defined $type;
343 $file=$page.".".$type;
344 if (! $form->submitted) {
345 $form->field(name => "rcsinfo", value => "", force => 1);
347 $form->field(name => "editcontent", validate => '/.+/');
350 $form->field(name => "do", type => 'hidden');
351 $form->field(name => "sid", type => "hidden", value => $session->id,
353 $form->field(name => "from", type => 'hidden');
354 $form->field(name => "rcsinfo", type => 'hidden');
355 $form->field(name => "subpage", type => 'hidden');
356 $form->field(name => "page", value => $page, force => 1);
357 $form->field(name => "type", value => $type, force => 1);
358 $form->field(name => "comments", type => "text", size => 80);
359 $form->field(name => "editcontent", type => "textarea", rows => 20,
361 $form->tmpl_param("can_commit", $config{rcs});
362 $form->tmpl_param("indexlink", indexlink());
363 $form->tmpl_param("helponformattinglink",
364 htmllink($page, $page, "ikiwiki/formatting",
366 linktext => "FormattingHelp"));
368 if ($form->submitted eq "Cancel") {
369 if ($form->field("do") eq "create" && defined $from) {
370 redirect($q, "$config{url}/".htmlpage($from));
372 elsif ($form->field("do") eq "create") {
373 redirect($q, $config{url});
376 redirect($q, "$config{url}/".htmlpage($page));
380 elsif ($form->submitted eq "Preview") {
381 my $new=not exists $pagesources{$page};
383 # temporarily record its type
384 $pagesources{$page}=$page.".".$type;
387 my $content=$form->field('editcontent');
389 run_hooks(editcontent => sub {
397 my $preview=htmlize($page, $page, $type,
398 linkify($page, $page,
399 preprocess($page, $page,
400 filter($page, $page, $content), 0, 1)));
401 run_hooks(format => sub {
407 $form->tmpl_param("page_preview", $preview);
410 delete $pagesources{$page};
412 # previewing may have created files on disk
415 elsif ($form->submitted eq "Save Page") {
416 $form->tmpl_param("page_preview", "");
418 $form->tmpl_param("page_conflict", "");
420 if ($form->submitted ne "Save Page" || ! $form->validate) {
421 if ($form->field("do") eq "create") {
424 if (! defined $from || ! length $from ||
425 $from ne $form->field('from') ||
426 file_pruned($from, $config{srcdir}) ||
428 $form->submitted eq "Preview") {
429 @page_locs=$best_loc=$page;
435 if ((defined $form->field('subpage') && length $form->field('subpage')) ||
436 $page eq gettext('discussion')) {
437 $best_loc="$from/$page";
440 $best_loc=$dir.$page;
443 push @page_locs, $dir.$page;
444 push @page_locs, "$from/$page";
445 while (length $dir) {
447 push @page_locs, $dir.$page;
450 push @page_locs, "$config{userdir}/$page"
451 if length $config{userdir};
455 ! exists $pagecase{lc $_}
458 # hmm, someone else made the page in the
460 if ($form->submitted eq "Preview") {
461 # let them go ahead with the edit
462 # and resolve the conflict at save
467 redirect($q, "$config{url}/".htmlpage($page));
472 my @editable_locs = grep {
473 check_canedit($_, $q, $session, 1)
475 if (! @editable_locs) {
476 # let it throw an error this time
477 map { check_canedit($_, $q, $session) } @page_locs;
481 if (exists $hooks{htmlize}) {
482 @page_types=grep { !/^_/ }
483 keys %{$hooks{htmlize}};
486 $form->tmpl_param("page_select", 1);
487 $form->field(name => "page", type => 'select',
488 options => [ map { [ $_, pagetitle($_, 1) ] } @editable_locs ],
490 $form->field(name => "type", type => 'select',
491 options => \@page_types);
492 $form->title(sprintf(gettext("creating %s"), pagetitle($page)));
495 elsif ($form->field("do") eq "edit") {
496 check_canedit($page, $q, $session);
497 if (! defined $form->field('editcontent') ||
498 ! length $form->field('editcontent')) {
500 if (exists $pagesources{$page}) {
501 $content=readfile(srcfile($pagesources{$page}));
502 $content=~s/\n/\r\n/g;
504 $form->field(name => "editcontent", value => $content,
507 $form->tmpl_param("page_select", 0);
508 $form->field(name => "page", type => 'hidden');
509 $form->field(name => "type", type => 'hidden');
510 $form->title(sprintf(gettext("editing %s"), pagetitle($page)));
513 showform($form, \@buttons, $session, $q, forcebaseurl => $baseurl);
517 check_canedit($page, $q, $session);
519 # The session id is stored on the form and checked to
520 # guard against CSRF. But only if the user is logged in,
521 # as anonok can allow anonymous edits.
522 if (defined $session->param("name")) {
523 my $sid=$q->param('sid');
524 if (! defined $sid || $sid ne $session->id) {
525 error(gettext("Your login session has expired."));
529 my $exists=-e "$config{srcdir}/$file";
531 if ($form->field("do") ne "create" && ! $exists &&
532 ! defined srcfile($file, 1)) {
533 $form->tmpl_param("page_gone", 1);
534 $form->field(name => "do", value => "create", force => 1);
535 $form->tmpl_param("page_select", 0);
536 $form->field(name => "page", type => 'hidden');
537 $form->field(name => "type", type => 'hidden');
538 $form->title(sprintf(gettext("editing %s"), $page));
539 showform($form, \@buttons, $session, $q, forcebaseurl => $baseurl);
542 elsif ($form->field("do") eq "create" && $exists) {
543 $form->tmpl_param("creation_conflict", 1);
544 $form->field(name => "do", value => "edit", force => 1);
545 $form->tmpl_param("page_select", 0);
546 $form->field(name => "page", type => 'hidden');
547 $form->field(name => "type", type => 'hidden');
548 $form->title(sprintf(gettext("editing %s"), $page));
549 $form->field("editcontent",
550 value => readfile("$config{srcdir}/$file").
551 "\n\n\n".$form->field("editcontent"),
553 showform($form, \@buttons, $session, $q, forcebaseurl => $baseurl);
557 my $content=$form->field('editcontent');
558 run_hooks(editcontent => sub {
566 $content=~s/\r\n/\n/g;
568 $content.="\n" if $content !~ /\n$/;
570 $config{cgi}=0; # avoid cgi error message
571 eval { writefile($file, $config{srcdir}, $content) };
574 $form->field(name => "rcsinfo", value => rcs_prepedit($file),
576 $form->tmpl_param("failed_save", 1);
577 $form->tmpl_param("error_message", $@);
578 $form->field("editcontent", value => $content, force => 1);
579 $form->tmpl_param("page_select", 0);
580 $form->field(name => "page", type => 'hidden');
581 $form->field(name => "type", type => 'hidden');
582 $form->title(sprintf(gettext("editing %s"), $page));
583 showform($form, \@buttons, $session, $q,
584 forcebaseurl => $baseurl);
591 if (defined $form->field('comments') &&
592 length $form->field('comments')) {
593 $message=$form->field('comments');
600 # Prevent deadlock with post-commit hook by
601 # signaling to it that it should not try to
603 disable_commit_hook();
604 $conflict=rcs_commit($file, $message,
605 $form->field("rcsinfo"),
606 $session->param("name"), $ENV{REMOTE_ADDR});
607 enable_commit_hook();
611 # Refresh even if there was a conflict, since other changes
612 # may have been committed while the post-commit hook was
614 require IkiWiki::Render;
618 if (defined $conflict) {
619 $form->field(name => "rcsinfo", value => rcs_prepedit($file),
621 $form->tmpl_param("page_conflict", 1);
622 $form->field("editcontent", value => $conflict, force => 1);
623 $form->field("do", "edit", force => 1);
624 $form->tmpl_param("page_select", 0);
625 $form->field(name => "page", type => 'hidden');
626 $form->field(name => "type", type => 'hidden');
627 $form->title(sprintf(gettext("editing %s"), $page));
628 showform($form, \@buttons, $session, $q,
629 forcebaseurl => $baseurl);
633 # The trailing question mark tries to avoid broken
634 # caches and get the most recent version of the page.
635 redirect($q, "$config{url}/".htmlpage($page)."?updated");
640 sub cgi_getsession ($) { #{{{
643 eval q{use CGI::Session};
645 CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
647 my $oldmask=umask(077);
648 my $session = CGI::Session->new("driver:DB_File", $q,
649 { FileName => "$config{wikistatedir}/sessions.db" });
655 sub cgi_savesession ($) { #{{{
658 # Force session flush with safe umask.
659 my $oldmask=umask(077);
670 $CGI::DISABLE_UPLOADS=$config{cgi_disable_uploads};
675 binmode(STDIN, ":utf8");
677 run_hooks(cgi => sub { shift->($q) });
680 my $do=$q->param('do');
681 if (! defined $do || ! length $do) {
682 my $error = $q->cgi_error;
684 error("Request not processed: $error");
687 error("\"do\" parameter missing");
691 # Need to lock the wiki before getting a session.
696 $session=cgi_getsession($q);
699 # Auth hooks can sign a user in.
700 if ($do ne 'signin' && ! defined $session->param("name")) {
701 run_hooks(auth => sub {
702 shift->($q, $session)
704 if (defined $session->param("name")) {
705 # Make sure whatever user was authed is in the
707 if (! userinfo_get($session->param("name"), "regdate")) {
708 userinfo_setall($session->param("name"), {
712 }) || error("failed adding user");
717 if (defined $session->param("name") &&
718 userinfo_get($session->param("name"), "banned")) {
719 print $q->header(-status => "403 Forbidden");
721 print gettext("You are banned.");
722 cgi_savesession($session);
725 run_hooks(sessioncgi => sub { shift->($q, $session) });
727 if ($do eq 'signin') {
728 cgi_signin($q, $session);
729 cgi_savesession($session);
731 elsif ($do eq 'prefs') {
732 cgi_prefs($q, $session);
734 elsif ($do eq 'create' || $do eq 'edit') {
735 cgi_editpage($q, $session);
737 elsif (defined $session->param("postsignin") || $do eq 'postsignin') {
738 cgi_postsignin($q, $session);
741 error("unknown do parameter");