7 use open qw{:utf8 :std};
12 sub printheader ($) { #{{{
15 if ($config{sslcookie}) {
16 print $session->header(-charset => 'utf-8',
17 -cookie => $session->cookie(-secure => 1));
19 print $session->header(-charset => 'utf-8');
24 sub showform ($$$$) { #{{{
30 if (exists $hooks{formbuilder}) {
31 run_hooks(formbuilder => sub {
32 shift->(form => $form, cgi => $cgi, session => $session,
37 printheader($session);
38 print misctemplate($form->title, $form->render(submit => $buttons));
41 sub redirect ($$) { #{{{
44 if (! $config{w3mmode}) {
45 print $q->redirect($url);
48 print "Content-type: text/plain\n";
49 print "W3m-control: GOTO $url\n\n";
53 sub check_canedit ($$$;$) { #{{{
60 run_hooks(canedit => sub {
61 return if defined $canedit;
62 my $ret=shift->($page, $q, $session);
63 if (defined $ret && $ret eq "") {
66 elsif (defined $ret) {
68 error($ret) unless $nonfatal;
74 sub decode_cgi_utf8 ($) { #{{{
76 foreach my $f ($cgi->param) {
77 $cgi->param($f, map { decode_utf8 $_ } $cgi->param($f));
81 sub cgi_recentchanges ($) { #{{{
84 # Optimisation: building recentchanges means calculating lots of
85 # links. Memoizing htmllink speeds it up a lot (can't be memoized
86 # during page builds as the return values may change, but they
92 eval q{use Time::Duration};
95 my $changelog=[rcs_recentchanges(100)];
96 foreach my $change (@$changelog) {
97 $change->{when} = concise(ago($change->{when}));
99 $change->{user} = userlink($change->{user});
101 my $is_excess = exists $change->{pages}[10]; # limit pages to first 10
102 delete @{$change->{pages}}[10 .. @{$change->{pages}}] if $is_excess;
105 $_->{link} = htmllink("", "", $_->{page},
107 linktext => pagetitle($_->{page}));
109 } @{$change->{pages}}
111 push @{$change->{pages}}, { link => '...' } if $is_excess;
114 my $template=template("recentchanges.tmpl");
116 title => "RecentChanges",
117 indexlink => indexlink(),
118 wikiname => $config{wikiname},
119 changelog => $changelog,
120 baseurl => baseurl(),
122 run_hooks(pagetemplate => sub {
123 shift->(page => "", destpage => "", template => $template);
125 print $q->header(-charset => 'utf-8'), $template->output;
128 # Check if the user is signed in. If not, redirect to the signin form and
129 # save their place to return to later.
130 sub needsignin ($$) { #{{{
134 if (! defined $session->param("name") ||
135 ! userinfo_get($session->param("name"), "regdate")) {
136 $session->param(postsignin => $ENV{QUERY_STRING});
137 cgi_signin($q, $session);
138 cgi_savesession($session);
143 sub cgi_signin ($$) { #{{{
148 eval q{use CGI::FormBuilder};
150 my $form = CGI::FormBuilder->new(
158 action => $config{cgiurl},
160 template => {type => 'div'},
161 stylesheet => baseurl()."style.css",
163 my $buttons=["Login"];
165 if ($q->param("do") ne "signin" && !$form->submitted) {
166 $form->text(gettext("You need to log in first."));
168 $form->field(name => "do", type => "hidden", value => "signin",
171 run_hooks(formbuilder_setup => sub {
172 shift->(form => $form, cgi => $q, session => $session,
173 buttons => $buttons);
176 if ($form->submitted) {
180 showform($form, $buttons, $session, $q);
183 sub cgi_postsignin ($$) { #{{{
187 # Continue with whatever was being done before the signin process.
188 if (defined $session->param("postsignin")) {
189 my $postsignin=CGI->new($session->param("postsignin"));
190 $session->clear("postsignin");
191 cgi($postsignin, $session);
192 cgi_savesession($session);
196 error(gettext("login failed, perhaps you need to turn on cookies?"));
200 sub cgi_prefs ($$) { #{{{
204 needsignin($q, $session);
207 eval q{use CGI::FormBuilder};
209 my $form = CGI::FormBuilder->new(
210 title => "preferences",
211 name => "preferences",
221 action => $config{cgiurl},
222 template => {type => 'div'},
223 stylesheet => baseurl()."style.css",
225 [login => gettext("Login")],
226 [preferences => gettext("Preferences")],
227 [admin => gettext("Admin")]
230 my $buttons=["Save Preferences", "Logout", "Cancel"];
232 run_hooks(formbuilder_setup => sub {
233 shift->(form => $form, cgi => $q, session => $session,
234 buttons => $buttons);
237 $form->field(name => "do", type => "hidden");
238 $form->field(name => "email", size => 50, fieldset => "preferences");
239 $form->field(name => "subscriptions", size => 50,
240 fieldset => "preferences",
241 comment => "(".htmllink("", "", "ikiwiki/PageSpec", noimageinline => 1).")");
242 $form->field(name => "banned_users", size => 50,
243 fieldset => "admin");
245 my $user_name=$session->param("name");
246 if (! is_admin($user_name)) {
247 $form->field(name => "banned_users", type => "hidden");
250 if (! $form->submitted) {
251 $form->field(name => "email", force => 1,
252 value => userinfo_get($user_name, "email"));
253 $form->field(name => "subscriptions", force => 1,
254 value => userinfo_get($user_name, "subscriptions"));
255 if (is_admin($user_name)) {
256 $form->field(name => "banned_users", force => 1,
257 value => join(" ", get_banned_users()));
261 if ($form->submitted eq 'Logout') {
263 redirect($q, $config{url});
266 elsif ($form->submitted eq 'Cancel') {
267 redirect($q, $config{url});
270 elsif ($form->submitted eq 'Save Preferences' && $form->validate) {
271 foreach my $field (qw(email subscriptions)) {
272 if (defined $form->field($field) && length $form->field($field)) {
273 userinfo_set($user_name, $field, $form->field($field)) ||
274 error("failed to set $field");
277 if (is_admin($user_name)) {
278 set_banned_users(grep { ! is_admin($_) }
280 $form->field("banned_users"))) ||
281 error("failed saving changes");
283 $form->text(gettext("Preferences saved."));
286 showform($form, $buttons, $session, $q);
289 sub cgi_editpage ($$) { #{{{
293 my @fields=qw(do rcsinfo subpage from page type editcontent comments);
294 my @buttons=("Save Page", "Preview", "Cancel");
297 eval q{use CGI::FormBuilder};
299 my $form = CGI::FormBuilder->new(
304 required => [qw{editcontent}],
307 action => $config{cgiurl},
310 template => scalar template_params("editpage.tmpl"),
311 wikiname => $config{wikiname},
314 run_hooks(formbuilder_setup => sub {
315 shift->(form => $form, cgi => $q, session => $session,
316 buttons => \@buttons);
319 # This untaint is safe because titlepage removes any problematic
321 my ($page)=$form->field('page');
322 $page=titlepage(possibly_foolish_untaint($page));
323 if (! defined $page || ! length $page ||
324 file_pruned($page, $config{srcdir}) || $page=~/^\//) {
325 error("bad page name");
329 if (defined $form->field('from')) {
330 ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
335 if (exists $pagesources{$page} && $form->field("do") ne "create") {
336 $file=$pagesources{$page};
337 $type=pagetype($file);
338 if (! defined $type) {
339 error(sprintf(gettext("%s is not an editable page"), $page));
341 if (! $form->submitted) {
342 $form->field(name => "rcsinfo",
343 value => rcs_prepedit($file), force => 1);
345 $form->field(name => "editcontent", validate => '/.*/');
348 $type=$form->param('type');
349 if (defined $type && length $type && $hooks{htmlize}{$type}) {
350 $type=possibly_foolish_untaint($type);
352 elsif (defined $from && exists $pagesources{$from}) {
353 # favor the type of linking page
354 $type=pagetype($pagesources{$from});
356 $type=$config{default_pageext} unless defined $type;
357 $file=$page.".".$type;
358 if (! $form->submitted) {
359 $form->field(name => "rcsinfo", value => "", force => 1);
361 $form->field(name => "editcontent", validate => '/.+/');
364 $form->field(name => "do", type => 'hidden');
365 $form->field(name => "from", type => 'hidden');
366 $form->field(name => "rcsinfo", type => 'hidden');
367 $form->field(name => "subpage", type => 'hidden');
368 $form->field(name => "page", value => pagetitle($page, 1), force => 1);
369 $form->field(name => "type", value => $type, force => 1);
370 $form->field(name => "comments", type => "text", size => 80);
371 $form->field(name => "editcontent", type => "textarea", rows => 20,
373 $form->tmpl_param("can_commit", $config{rcs});
374 $form->tmpl_param("indexlink", indexlink());
375 $form->tmpl_param("helponformattinglink",
376 htmllink("", "", "ikiwiki/formatting",
378 linktext => "FormattingHelp"));
379 $form->tmpl_param("baseurl", baseurl());
381 if ($form->submitted eq "Cancel") {
382 if ($form->field("do") eq "create" && defined $from) {
383 redirect($q, "$config{url}/".htmlpage($from));
385 elsif ($form->field("do") eq "create") {
386 redirect($q, $config{url});
389 redirect($q, "$config{url}/".htmlpage($page));
393 elsif ($form->submitted eq "Preview") {
394 my $content=$form->field('editcontent');
395 run_hooks(editcontent => sub {
403 $form->tmpl_param("page_preview",
404 htmlize($page, $type,
406 preprocess($page, $page,
407 filter($page, $page, $content), 0, 1))));
409 elsif ($form->submitted eq "Save Page") {
410 $form->tmpl_param("page_preview", "");
412 $form->tmpl_param("page_conflict", "");
414 if ($form->submitted ne "Save Page" || ! $form->validate) {
415 if ($form->field("do") eq "create") {
418 if (! defined $from || ! length $from ||
419 $from ne $form->field('from') ||
420 file_pruned($from, $config{srcdir}) ||
422 $form->submitted eq "Preview") {
423 @page_locs=$best_loc=$page;
429 if ((defined $form->field('subpage') && length $form->field('subpage')) ||
430 $page eq gettext('discussion')) {
431 $best_loc="$from/$page";
434 $best_loc=$dir.$page;
437 push @page_locs, $dir.$page;
438 push @page_locs, "$from/$page";
439 while (length $dir) {
441 push @page_locs, $dir.$page;
444 push @page_locs, "$config{userdir}/$page"
445 if length $config{userdir};
448 ! exists $pagecase{lc $_}
451 # hmm, someone else made the page in the
453 redirect($q, "$config{url}/".htmlpage($page));
457 my @editable_locs = grep {
458 check_canedit($_, $q, $session, 1)
460 if (! @editable_locs) {
461 # let it throw an error this time
462 map { check_canedit($_, $q, $session) } @page_locs;
466 if (exists $hooks{htmlize}) {
467 @page_types=keys %{$hooks{htmlize}};
470 $form->tmpl_param("page_select", 1);
471 $form->field(name => "page", type => 'select',
472 options => [ map { pagetitle($_, 1) } @editable_locs ],
473 value => pagetitle($best_loc, 1));
474 $form->field(name => "type", type => 'select',
475 options => \@page_types);
476 $form->title(sprintf(gettext("creating %s"), pagetitle($page)));
479 elsif ($form->field("do") eq "edit") {
480 check_canedit($page, $q, $session);
481 if (! defined $form->field('editcontent') ||
482 ! length $form->field('editcontent')) {
484 if (exists $pagesources{$page}) {
485 $content=readfile(srcfile($pagesources{$page}));
486 $content=~s/\n/\r\n/g;
488 $form->field(name => "editcontent", value => $content,
491 $form->tmpl_param("page_select", 0);
492 $form->field(name => "page", type => 'hidden');
493 $form->field(name => "type", type => 'hidden');
494 $form->title(sprintf(gettext("editing %s"), pagetitle($page)));
497 showform($form, \@buttons, $session, $q);
502 check_canedit($page, $q, $session);
504 my $exists=-e "$config{srcdir}/$file";
506 if ($form->field("do") ne "create" && ! $exists &&
507 ! eval { srcfile($file) }) {
508 $form->tmpl_param("page_gone", 1);
509 $form->field(name => "do", value => "create", force => 1);
510 $form->tmpl_param("page_select", 0);
511 $form->field(name => "page", type => 'hidden');
512 $form->field(name => "type", type => 'hidden');
513 $form->title(sprintf(gettext("editing %s"), $page));
514 showform($form, \@buttons, $session, $q);
517 elsif ($form->field("do") eq "create" && $exists) {
518 $form->tmpl_param("creation_conflict", 1);
519 $form->field(name => "do", value => "edit", force => 1);
520 $form->tmpl_param("page_select", 0);
521 $form->field(name => "page", type => 'hidden');
522 $form->field(name => "type", type => 'hidden');
523 $form->title(sprintf(gettext("editing %s"), $page));
524 $form->field("editcontent",
525 value => readfile("$config{srcdir}/$file").
526 "\n\n\n".$form->field("editcontent"),
528 showform($form, \@buttons, $session, $q);
532 my $content=$form->field('editcontent');
533 run_hooks(editcontent => sub {
541 $content=~s/\r\n/\n/g;
543 $content.="\n" if $content !~ /\n$/;
545 $config{cgi}=0; # avoid cgi error message
546 eval { writefile($file, $config{srcdir}, $content) };
549 $form->field(name => "rcsinfo", value => rcs_prepedit($file),
551 $form->tmpl_param("failed_save", 1);
552 $form->tmpl_param("error_message", $@);
553 $form->field("editcontent", value => $content, force => 1);
554 $form->tmpl_param("page_select", 0);
555 $form->field(name => "page", type => 'hidden');
556 $form->field(name => "type", type => 'hidden');
557 $form->title(sprintf(gettext("editing %s"), $page));
558 showform($form, \@buttons, $session, $q);
565 if (defined $form->field('comments') &&
566 length $form->field('comments')) {
567 $message=$form->field('comments');
574 # Prevent deadlock with post-commit hook by
575 # signaling to it that it should not try to
576 # do anything (except send commit mails).
577 disable_commit_hook();
578 $conflict=rcs_commit($file, $message,
579 $form->field("rcsinfo"),
580 $session->param("name"), $ENV{REMOTE_ADDR});
581 enable_commit_hook();
585 # Refresh even if there was a conflict, since other changes
586 # may have been committed while the post-commit hook was
588 require IkiWiki::Render;
589 # Reload index, since the first time it's loaded is before
590 # the wiki is locked, and things may have changed in the
596 if (defined $conflict) {
597 $form->field(name => "rcsinfo", value => rcs_prepedit($file),
599 $form->tmpl_param("page_conflict", 1);
600 $form->field("editcontent", value => $conflict, force => 1);
601 $form->field("do", "edit", force => 1);
602 $form->tmpl_param("page_select", 0);
603 $form->field(name => "page", type => 'hidden');
604 $form->field(name => "type", type => 'hidden');
605 $form->title(sprintf(gettext("editing %s"), $page));
606 showform($form, \@buttons, $session, $q);
610 # The trailing question mark tries to avoid broken
611 # caches and get the most recent version of the page.
612 redirect($q, "$config{url}/".htmlpage($page)."?updated");
617 sub cgi_getsession ($) { #{{{
620 eval q{use CGI::Session};
621 CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
623 my $oldmask=umask(077);
624 my $session = CGI::Session->new("driver:DB_File", $q,
625 { FileName => "$config{wikistatedir}/sessions.db" });
631 sub cgi_savesession ($) { #{{{
634 # Force session flush with safe umask.
635 my $oldmask=umask(077);
650 run_hooks(cgi => sub { shift->($q) });
653 my $do=$q->param('do');
654 if (! defined $do || ! length $do) {
655 my $error = $q->cgi_error;
657 error("Request not processed: $error");
660 error("\"do\" parameter missing");
664 # Things that do not need a session.
665 if ($do eq 'recentchanges') {
666 cgi_recentchanges($q);
670 # Need to lock the wiki before getting a session.
674 $session=cgi_getsession($q);
677 # Auth hooks can sign a user in.
678 if ($do ne 'signin' && ! defined $session->param("name")) {
679 run_hooks(auth => sub {
680 shift->($q, $session)
682 if (defined $session->param("name")) {
683 # Make sure whatever user was authed is in the
685 if (! userinfo_get($session->param("name"), "regdate")) {
686 userinfo_setall($session->param("name"), {
690 }) || error("failed adding user");
695 if (defined $session->param("name") &&
696 userinfo_get($session->param("name"), "banned")) {
697 print $q->header(-status => "403 Forbidden");
699 print gettext("You are banned.");
700 cgi_savesession($session);
703 run_hooks(sessioncgi => sub { shift->($q, $session) });
705 if ($do eq 'signin') {
706 cgi_signin($q, $session);
707 cgi_savesession($session);
709 elsif ($do eq 'prefs') {
710 cgi_prefs($q, $session);
712 elsif ($do eq 'create' || $do eq 'edit') {
713 cgi_editpage($q, $session);
715 elsif (defined $session->param("postsignin")) {
716 cgi_postsignin($q, $session);
719 error("unknown do parameter");
723 sub userlink ($) { #{{{
726 eval q{use CGI 'escapeHTML'};
728 if ($user =~ m!^https?://! &&
729 eval q{use Net::OpenID::VerifiedIdentity; 1} && !$@) {
730 # Munge user-urls, as used by eg, OpenID.
731 my $oid=Net::OpenID::VerifiedIdentity->new(identity => $user);
732 my $display=$oid->display;
733 # Convert "user.somehost.com" to "user [somehost.com]".
734 if ($display !~ /\[/) {
735 $display=~s/^(.*?)\.([^.]+\.[a-z]+)$/$1 [$2]/;
737 # Convert "http://somehost.com/user" to "user [somehost.com]".
738 if ($display !~ /\[/) {
739 $display=~s/^https?:\/\/(.+)\/([^\/]+)$/$2 [$1]/;
741 $display=~s!^https?://!!; # make sure this is removed
742 return "<a href=\"$user\">".escapeHTML($display)."</a>";
745 return htmllink("", "", escapeHTML(
746 length $config{userdir} ? $config{userdir}."/".$user : $user
747 ), noimageinline => 1);