summaryrefslogtreecommitdiff
path: root/IkiWiki/CGI.pm
blob: aee80253ba94401e9b517f99f1dcc87b8549145b (plain)
  1. #!/usr/bin/perl
  2. use warnings;
  3. use strict;
  4. use IkiWiki;
  5. use IkiWiki::UserInfo;
  6. use open qw{:utf8 :std};
  7. use Encode;
  8. package IkiWiki;
  9. sub printheader ($) { #{{{
  10. my $session=shift;
  11. if ($config{sslcookie}) {
  12. print $session->header(-charset => 'utf-8',
  13. -cookie => $session->cookie(-secure => 1));
  14. } else {
  15. print $session->header(-charset => 'utf-8');
  16. }
  17. } #}}}
  18. sub redirect ($$) { #{{{
  19. my $q=shift;
  20. my $url=shift;
  21. if (! $config{w3mmode}) {
  22. print $q->redirect($url);
  23. }
  24. else {
  25. print "Content-type: text/plain\n";
  26. print "W3m-control: GOTO $url\n\n";
  27. }
  28. } #}}}
  29. sub check_canedit ($$$;$) { #{{{
  30. my $page=shift;
  31. my $q=shift;
  32. my $session=shift;
  33. my $nonfatal=shift;
  34. my $canedit;
  35. run_hooks(canedit => sub {
  36. return if defined $canedit;
  37. my $ret=shift->($page, $q, $session);
  38. if (defined $ret && $ret eq "") {
  39. $canedit=1;
  40. }
  41. elsif (defined $ret) {
  42. $canedit=0;
  43. error($ret) unless $nonfatal;
  44. }
  45. });
  46. return $canedit;
  47. } #}}}
  48. sub decode_form_utf8 ($) { #{{{
  49. my $form = shift;
  50. foreach my $f ($form->field) {
  51. next if Encode::is_utf8(scalar $form->field($f));
  52. $form->field(name => $f,
  53. value => decode_utf8($form->field($f)),
  54. force => 1,
  55. );
  56. }
  57. } #}}}
  58. sub cgi_recentchanges ($) { #{{{
  59. my $q=shift;
  60. # Optimisation: building recentchanges means calculating lots of
  61. # links. Memoizing htmllink speeds it up a lot (can't be memoized
  62. # during page builds as the return values may change, but they
  63. # won't here.)
  64. eval q{use Memoize};
  65. error($@) if $@;
  66. memoize("htmllink");
  67. eval q{use Time::Duration};
  68. error($@) if $@;
  69. my $changelog=[rcs_recentchanges(100)];
  70. foreach my $change (@$changelog) {
  71. $change->{when} = concise(ago($change->{when}));
  72. $change->{user} = userlink($change->{user});
  73. my $is_excess = exists $change->{pages}[10]; # limit pages to first 10
  74. delete @{$change->{pages}}[10 .. @{$change->{pages}}] if $is_excess;
  75. $change->{pages} = [
  76. map {
  77. $_->{link} = htmllink("", "", $_->{page},
  78. noimageinline => 1,
  79. linktext => pagetitle($_->{page}));
  80. $_;
  81. } @{$change->{pages}}
  82. ];
  83. push @{$change->{pages}}, { link => '...' } if $is_excess;
  84. }
  85. my $template=template("recentchanges.tmpl");
  86. $template->param(
  87. title => "RecentChanges",
  88. indexlink => indexlink(),
  89. wikiname => $config{wikiname},
  90. changelog => $changelog,
  91. baseurl => baseurl(),
  92. );
  93. run_hooks(pagetemplate => sub {
  94. shift->(page => "", destpage => "", template => $template);
  95. });
  96. print $q->header(-charset => 'utf-8'), $template->output;
  97. } #}}}
  98. # Check if the user is signed in. If not, redirect to the signin form and
  99. # save their place to return to later.
  100. sub needsignin ($$) { #{{{
  101. my $q=shift;
  102. my $session=shift;
  103. if (! defined $session->param("name") ||
  104. ! userinfo_get($session->param("name"), "regdate")) {
  105. if (! defined $session->param("postsignin")) {
  106. $session->param(postsignin => $ENV{QUERY_STRING});
  107. }
  108. cgi_signin($q, $session);
  109. cgi_savesession($session);
  110. exit;
  111. }
  112. } #}}}
  113. sub cgi_signin ($$) { #{{{
  114. my $q=shift;
  115. my $session=shift;
  116. eval q{use CGI::FormBuilder};
  117. error($@) if $@;
  118. my $form = CGI::FormBuilder->new(
  119. title => "signin",
  120. header => 1,
  121. charset => "utf-8",
  122. method => 'POST',
  123. required => 'NONE',
  124. javascript => 0,
  125. params => $q,
  126. action => $config{cgiurl},
  127. header => 0,
  128. template => scalar template_params("signin.tmpl"),
  129. stylesheet => baseurl()."style.css",
  130. );
  131. my $buttons=["Login"];
  132. if ($q->param("do") ne "signin" && !$form->submitted) {
  133. $form->text(gettext("You need to log in first."));
  134. }
  135. $form->field(name => "do", type => "hidden", value => "signin",
  136. force => 1);
  137. run_hooks(formbuilder_setup => sub {
  138. shift->(form => $form, cgi => $q, session => $session);
  139. });
  140. decode_form_utf8($form);
  141. if (exists $hooks{formbuilder}) {
  142. run_hooks(formbuilder => sub {
  143. shift->(form => $form, cgi => $q, session => $session,
  144. buttons => $buttons);
  145. });
  146. }
  147. else {
  148. if ($form->submitted) {
  149. $form->validate;
  150. }
  151. printheader($session);
  152. print misctemplate($form->title, $form->render(submit => $buttons));
  153. }
  154. } #}}}
  155. sub cgi_postsignin ($$) { #{{{
  156. my $q=shift;
  157. my $session=shift;
  158. # Continue with whatever was being done before the signin process.
  159. if (defined $session->param("postsignin")) {
  160. my $postsignin=CGI->new($session->param("postsignin"));
  161. $session->clear("postsignin");
  162. cgi($postsignin, $session);
  163. cgi_savesession($session);
  164. exit;
  165. }
  166. else {
  167. # This can occur, for example, if a user went to the signin
  168. # url via a bookmark.
  169. redirect($q, $config{url});
  170. }
  171. } #}}}
  172. sub cgi_prefs ($$) { #{{{
  173. my $q=shift;
  174. my $session=shift;
  175. needsignin($q, $session);
  176. eval q{use CGI::FormBuilder};
  177. error($@) if $@;
  178. my $form = CGI::FormBuilder->new(
  179. title => "preferences",
  180. header => 0,
  181. charset => "utf-8",
  182. method => 'POST',
  183. validate => {
  184. email => 'EMAIL',
  185. },
  186. required => 'NONE',
  187. javascript => 0,
  188. params => $q,
  189. action => $config{cgiurl},
  190. template => scalar template_params("prefs.tmpl"),
  191. stylesheet => baseurl()."style.css",
  192. );
  193. my $buttons=["Save Preferences", "Logout", "Cancel"];
  194. run_hooks(formbuilder_setup => sub {
  195. shift->(form => $form, cgi => $q, session => $session);
  196. });
  197. $form->field(name => "do", type => "hidden");
  198. $form->field(name => "email", size => 50);
  199. $form->field(name => "subscriptions", size => 50,
  200. comment => "(".htmllink("", "", "PageSpec", noimageinline => 1).")");
  201. $form->field(name => "banned_users", size => 50);
  202. my $user_name=$session->param("name");
  203. if (! is_admin($user_name)) {
  204. $form->field(name => "banned_users", type => "hidden");
  205. }
  206. if (! $form->submitted) {
  207. $form->field(name => "email", force => 1,
  208. value => userinfo_get($user_name, "email"));
  209. $form->field(name => "subscriptions", force => 1,
  210. value => userinfo_get($user_name, "subscriptions"));
  211. if (is_admin($user_name)) {
  212. $form->field(name => "banned_users", force => 1,
  213. value => join(" ", get_banned_users()));
  214. }
  215. }
  216. decode_form_utf8($form);
  217. if ($form->submitted eq 'Logout') {
  218. $session->delete();
  219. redirect($q, $config{url});
  220. return;
  221. }
  222. elsif ($form->submitted eq 'Cancel') {
  223. redirect($q, $config{url});
  224. return;
  225. }
  226. elsif ($form->submitted eq 'Save Preferences' && $form->validate) {
  227. foreach my $field (qw(email subscriptions)) {
  228. if (defined $form->field($field) && length $form->field($field)) {
  229. userinfo_set($user_name, $field, $form->field($field)) ||
  230. error("failed to set $field");
  231. }
  232. }
  233. if (is_admin($user_name)) {
  234. set_banned_users(grep { ! is_admin($_) }
  235. split(' ',
  236. $form->field("banned_users"))) ||
  237. error("failed saving changes");
  238. }
  239. $form->text(gettext("Preferences saved."));
  240. }
  241. if (exists $hooks{formbuilder}) {
  242. run_hooks(formbuilder => sub {
  243. shift->(form => $form, cgi => $q, session => $session,
  244. buttons => $buttons);
  245. });
  246. }
  247. else {
  248. printheader($session);
  249. print misctemplate($form->title, $form->render(submit => $buttons));
  250. }
  251. } #}}}
  252. sub cgi_editpage ($$) { #{{{
  253. my $q=shift;
  254. my $session=shift;
  255. my @fields=qw(do rcsinfo subpage from page type editcontent comments);
  256. my @buttons=("Save Page", "Preview", "Cancel");
  257. eval q{use CGI::FormBuilder};
  258. error($@) if $@;
  259. my $form = CGI::FormBuilder->new(
  260. fields => \@fields,
  261. header => 1,
  262. charset => "utf-8",
  263. method => 'POST',
  264. validate => {
  265. editcontent => '/.+/',
  266. },
  267. required => [qw{editcontent}],
  268. javascript => 0,
  269. params => $q,
  270. action => $config{cgiurl},
  271. table => 0,
  272. template => scalar template_params("editpage.tmpl"),
  273. );
  274. run_hooks(formbuilder_setup => sub {
  275. shift->(form => $form, cgi => $q, session => $session);
  276. });
  277. decode_form_utf8($form);
  278. # This untaint is safe because titlepage removes any problematic
  279. # characters.
  280. my ($page)=$form->field('page');
  281. $page=titlepage(possibly_foolish_untaint($page));
  282. if (! defined $page || ! length $page || file_pruned($page, $config{srcdir}) || $page=~/^\//) {
  283. error("bad page name");
  284. }
  285. my $from;
  286. if (defined $form->field('from')) {
  287. ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
  288. }
  289. my $file;
  290. my $type;
  291. if (exists $pagesources{$page}) {
  292. $file=$pagesources{$page};
  293. $type=pagetype($file);
  294. if (! defined $type) {
  295. error(sprintf(gettext("%s is not an editable page"), $page));
  296. }
  297. }
  298. else {
  299. $type=$form->param('type');
  300. if (defined $type && length $type && $hooks{htmlize}{$type}) {
  301. $type=possibly_foolish_untaint($type);
  302. }
  303. elsif (defined $from) {
  304. # favor the type of linking page
  305. $type=pagetype($pagesources{$from});
  306. }
  307. $type=$config{default_pageext} unless defined $type;
  308. $file=$page.".".$type;
  309. }
  310. my $newfile=0;
  311. if (! -e "$config{srcdir}/$file") {
  312. $newfile=1;
  313. }
  314. $form->field(name => "do", type => 'hidden');
  315. $form->field(name => "from", type => 'hidden');
  316. $form->field(name => "rcsinfo", type => 'hidden');
  317. $form->field(name => "subpage", type => 'hidden');
  318. $form->field(name => "page", value => $page, force => 1);
  319. $form->field(name => "type", value => $type, force => 1);
  320. $form->field(name => "comments", type => "text", size => 80);
  321. $form->field(name => "editcontent", type => "textarea", rows => 20,
  322. cols => 80);
  323. $form->tmpl_param("can_commit", $config{rcs});
  324. $form->tmpl_param("indexlink", indexlink());
  325. $form->tmpl_param("helponformattinglink",
  326. htmllink("", "", "HelpOnFormatting", noimageinline => 1));
  327. $form->tmpl_param("baseurl", baseurl());
  328. if (! $form->submitted) {
  329. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  330. force => 1);
  331. }
  332. if ($form->submitted eq "Cancel") {
  333. if ($newfile && defined $from) {
  334. redirect($q, "$config{url}/".htmlpage($from));
  335. }
  336. elsif ($newfile) {
  337. redirect($q, $config{url});
  338. }
  339. else {
  340. redirect($q, "$config{url}/".htmlpage($page));
  341. }
  342. return;
  343. }
  344. elsif ($form->submitted eq "Preview") {
  345. my $content=$form->field('editcontent');
  346. my $comments=$form->field('comments');
  347. $form->field(name => "editcontent",
  348. value => $content, force => 1);
  349. $form->field(name => "comments",
  350. value => $comments, force => 1);
  351. $config{rss}=$config{atom}=0; # avoid preview writing a feed!
  352. $form->tmpl_param("page_preview",
  353. htmlize($page, $type,
  354. linkify($page, "",
  355. preprocess($page, $page,
  356. filter($page, $content)))));
  357. }
  358. else {
  359. $form->tmpl_param("page_preview", "");
  360. }
  361. $form->tmpl_param("page_conflict", "");
  362. if (! $form->submitted || $form->submitted eq "Preview" ||
  363. ! $form->validate) {
  364. if ($form->field("do") eq "create") {
  365. my @page_locs;
  366. my $best_loc;
  367. if (! defined $from || ! length $from ||
  368. $from ne $form->field('from') ||
  369. file_pruned($from, $config{srcdir}) ||
  370. $from=~/^\// ||
  371. $form->submitted eq "Preview") {
  372. @page_locs=$best_loc=$page;
  373. }
  374. else {
  375. my $dir=$from."/";
  376. $dir=~s![^/]+/+$!!;
  377. if ((defined $form->field('subpage') && length $form->field('subpage')) ||
  378. $page eq gettext('discussion')) {
  379. $best_loc="$from/$page";
  380. }
  381. else {
  382. $best_loc=$dir.$page;
  383. }
  384. push @page_locs, $dir.$page;
  385. push @page_locs, "$from/$page";
  386. while (length $dir) {
  387. $dir=~s![^/]+/+$!!;
  388. push @page_locs, $dir.$page;
  389. }
  390. }
  391. push @page_locs, "$config{userdir}/$page"
  392. if length $config{userdir};
  393. @page_locs = grep {
  394. ! exists $pagecase{lc $_}
  395. } @page_locs;
  396. if (! @page_locs) {
  397. # hmm, someone else made the page in the
  398. # meantime?
  399. redirect($q, "$config{url}/".htmlpage($page));
  400. return;
  401. }
  402. my @editable_locs = grep {
  403. check_canedit($_, $q, $session, 1)
  404. } @page_locs;
  405. if (! @editable_locs) {
  406. # let it throw an error this time
  407. map { check_canedit($_, $q, $session) } @page_locs;
  408. }
  409. my @page_types;
  410. if (exists $hooks{htmlize}) {
  411. @page_types=keys %{$hooks{htmlize}};
  412. }
  413. $form->tmpl_param("page_select", 1);
  414. $form->field(name => "page", type => 'select',
  415. options => { map { $_ => pagetitle($_, 1) } @editable_locs },
  416. value => $best_loc);
  417. $form->field(name => "type", type => 'select',
  418. options => \@page_types);
  419. $form->title(sprintf(gettext("creating %s"), pagetitle($page)));
  420. }
  421. elsif ($form->field("do") eq "edit") {
  422. check_canedit($page, $q, $session);
  423. if (! defined $form->field('editcontent') ||
  424. ! length $form->field('editcontent')) {
  425. my $content="";
  426. if (exists $pagesources{$page}) {
  427. $content=readfile(srcfile($pagesources{$page}));
  428. $content=~s/\n/\r\n/g;
  429. }
  430. $form->field(name => "editcontent", value => $content,
  431. force => 1);
  432. }
  433. $form->tmpl_param("page_select", 0);
  434. $form->field(name => "page", type => 'hidden');
  435. $form->field(name => "type", type => 'hidden');
  436. $form->title(sprintf(gettext("editing %s"), pagetitle($page)));
  437. }
  438. print $form->render(submit => \@buttons);
  439. }
  440. else {
  441. # save page
  442. check_canedit($page, $q, $session);
  443. my $content=$form->field('editcontent');
  444. $content=~s/\r\n/\n/g;
  445. $content=~s/\r/\n/g;
  446. $config{cgi}=0; # avoid cgi error message
  447. eval { writefile($file, $config{srcdir}, $content) };
  448. $config{cgi}=1;
  449. if ($@) {
  450. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  451. force => 1);
  452. $form->tmpl_param("failed_save", 1);
  453. $form->tmpl_param("error_message", $@);
  454. $form->field("editcontent", value => $content, force => 1);
  455. $form->field(name => "comments", value => $form->field('comments'), force => 1);
  456. $form->field("do", "edit)");
  457. $form->tmpl_param("page_select", 0);
  458. $form->field(name => "page", type => 'hidden');
  459. $form->field(name => "type", type => 'hidden');
  460. $form->title(sprintf(gettext("editing %s"), $page));
  461. print $form->render(submit => \@buttons);
  462. return;
  463. }
  464. my $conflict;
  465. if ($config{rcs}) {
  466. my $message="";
  467. if (defined $form->field('comments') &&
  468. length $form->field('comments')) {
  469. $message=$form->field('comments');
  470. }
  471. if ($newfile) {
  472. rcs_add($file);
  473. }
  474. # Prevent deadlock with post-commit hook by
  475. # signaling to it that it should not try to
  476. # do anything (except send commit mails).
  477. disable_commit_hook();
  478. $conflict=rcs_commit($file, $message,
  479. $form->field("rcsinfo"),
  480. $session->param("name"), $ENV{REMOTE_ADDR});
  481. enable_commit_hook();
  482. rcs_update();
  483. }
  484. # Refresh even if there was a conflict, since other changes
  485. # may have been committed while the post-commit hook was
  486. # disabled.
  487. require IkiWiki::Render;
  488. refresh();
  489. saveindex();
  490. if (defined $conflict) {
  491. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  492. force => 1);
  493. $form->tmpl_param("page_conflict", 1);
  494. $form->field("editcontent", value => $conflict, force => 1);
  495. $form->field(name => "comments", value => $form->field('comments'), force => 1);
  496. $form->field("do", "edit)");
  497. $form->tmpl_param("page_select", 0);
  498. $form->field(name => "page", type => 'hidden');
  499. $form->field(name => "type", type => 'hidden');
  500. $form->title(sprintf(gettext("editing %s"), $page));
  501. print $form->render(submit => \@buttons);
  502. return;
  503. }
  504. else {
  505. # The trailing question mark tries to avoid broken
  506. # caches and get the most recent version of the page.
  507. redirect($q, "$config{url}/".htmlpage($page)."?updated");
  508. }
  509. }
  510. } #}}}
  511. sub cgi_getsession ($) { #{{{
  512. my $q=shift;
  513. eval q{use CGI::Session};
  514. CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
  515. my $oldmask=umask(077);
  516. my $session = CGI::Session->new("driver:DB_File", $q,
  517. { FileName => "$config{wikistatedir}/sessions.db" });
  518. umask($oldmask);
  519. return $session;
  520. } #}}}
  521. sub cgi_savesession ($) { #{{{
  522. my $session=shift;
  523. # Force session flush with safe umask.
  524. my $oldmask=umask(077);
  525. $session->flush;
  526. umask($oldmask);
  527. } #}}}
  528. sub cgi (;$$) { #{{{
  529. my $q=shift;
  530. my $session=shift;
  531. if (! $q) {
  532. eval q{use CGI};
  533. error($@) if $@;
  534. $q=CGI->new;
  535. run_hooks(cgi => sub { shift->($q) });
  536. }
  537. my $do=$q->param('do');
  538. if (! defined $do || ! length $do) {
  539. my $error = $q->cgi_error;
  540. if ($error) {
  541. error("Request not processed: $error");
  542. }
  543. else {
  544. error("\"do\" parameter missing");
  545. }
  546. }
  547. # Things that do not need a session.
  548. if ($do eq 'recentchanges') {
  549. cgi_recentchanges($q);
  550. return;
  551. }
  552. elsif ($do eq 'hyperestraier') {
  553. cgi_hyperestraier();
  554. }
  555. # Need to lock the wiki before getting a session.
  556. lockwiki();
  557. if (! $session) {
  558. $session=cgi_getsession($q);
  559. }
  560. # Auth hooks can sign a user in.
  561. if ($do ne 'signin' && ! defined $session->param("name")) {
  562. run_hooks(auth => sub {
  563. shift->($q, $session)
  564. });
  565. if (defined $session->param("name")) {
  566. # Make sure whatever user was authed is in the
  567. # userinfo db.
  568. if (! userinfo_get($session->param("name"), "regdate")) {
  569. userinfo_setall($session->param("name"), {
  570. email => "",
  571. password => "",
  572. regdate => time,
  573. }) || error("failed adding user");
  574. }
  575. }
  576. }
  577. if (defined $session->param("name") &&
  578. userinfo_get($session->param("name"), "banned")) {
  579. print $q->header(-status => "403 Forbidden");
  580. $session->delete();
  581. print gettext("You are banned.");
  582. cgi_savesession($session);
  583. }
  584. elsif ($do eq 'signin') {
  585. cgi_signin($q, $session);
  586. cgi_savesession($session);
  587. }
  588. elsif (defined $session->param("postsignin")) {
  589. cgi_postsignin($q, $session);
  590. }
  591. elsif ($do eq 'prefs') {
  592. cgi_prefs($q, $session);
  593. }
  594. elsif ($do eq 'create' || $do eq 'edit') {
  595. cgi_editpage($q, $session);
  596. }
  597. elsif ($do eq 'blog') {
  598. my $page=titlepage(decode_utf8($q->param('title')));
  599. $page=~s/(\/)/"__".ord($1)."__"/eg; # escape slashes too
  600. # if the page already exists, munge it to be unique
  601. my $from=$q->param('from');
  602. my $add="";
  603. while (exists $pagecase{lc "$from/$page$add"}) {
  604. $add=1 unless length $add;
  605. $add++;
  606. }
  607. $q->param('page', $page.$add);
  608. # now run same as create
  609. $q->param('do', 'create');
  610. cgi_editpage($q, $session);
  611. }
  612. elsif ($do eq 'postsignin') {
  613. error(gettext("login failed, perhaps you need to turn on cookies?"));
  614. }
  615. else {
  616. error("unknown do parameter");
  617. }
  618. } #}}}
  619. sub userlink ($) { #{{{
  620. my $user=shift;
  621. eval q{use CGI 'escapeHTML'};
  622. error($@) if $@;
  623. if ($user =~ m!^https?://! &&
  624. eval q{use Net::OpenID::VerifiedIdentity; 1} && !$@) {
  625. # Munge user-urls, as used by eg, OpenID.
  626. my $oid=Net::OpenID::VerifiedIdentity->new(identity => $user);
  627. my $display=$oid->display;
  628. # Convert "user.somehost.com" to "user [somehost.com]".
  629. if ($display !~ /\[/) {
  630. $display=~s/^(.*?)\.([^.]+\.[a-z]+)$/$1 [$2]/;
  631. }
  632. # Convert "http://somehost.com/user" to "user [somehost.com]".
  633. if ($display !~ /\[/) {
  634. $display=~s/^https?:\/\/(.+)\/([^\/]+)$/$2 [$1]/;
  635. }
  636. $display=~s!^https?://!!; # make sure this is removed
  637. return "<a href=\"$user\">".escapeHTML($display)."</a>";
  638. }
  639. else {
  640. return htmllink("", "", escapeHTML(
  641. length $config{userdir} ? $config{userdir}."/".$user : $user
  642. ), noimageinline => 1);
  643. }
  644. } #}}}
  645. 1