summaryrefslogtreecommitdiff
path: root/IkiWiki/CGI.pm
blob: 14861e398d5e04fa5f050fe3e7626df8f3c3a44d (plain)
  1. #!/usr/bin/perl
  2. use warnings;
  3. use strict;
  4. use IkiWiki;
  5. use IkiWiki::UserInfo;
  6. use open qw{:utf8 :std};
  7. use Encode;
  8. package IkiWiki;
  9. sub printheader ($) { #{{{
  10. my $session=shift;
  11. if ($config{sslcookie}) {
  12. print $session->header(-charset => 'utf-8',
  13. -cookie => $session->cookie(-secure => 1));
  14. } else {
  15. print $session->header(-charset => 'utf-8');
  16. }
  17. } #}}}
  18. sub redirect ($$) { #{{{
  19. my $q=shift;
  20. my $url=shift;
  21. if (! $config{w3mmode}) {
  22. print $q->redirect($url);
  23. }
  24. else {
  25. print "Content-type: text/plain\n";
  26. print "W3m-control: GOTO $url\n\n";
  27. }
  28. } #}}}
  29. sub page_locked ($$;$) { #{{{
  30. my $page=shift;
  31. my $session=shift;
  32. my $nonfatal=shift;
  33. my $user=$session->param("name");
  34. return if defined $user && is_admin($user);
  35. foreach my $admin (@{$config{adminuser}}) {
  36. my $locked_pages=userinfo_get($admin, "locked_pages");
  37. if (pagespec_match($page, userinfo_get($admin, "locked_pages"))) {
  38. return 1 if $nonfatal;
  39. error(htmllink("", "", $page, 1)." is locked by ".
  40. htmllink("", "", $admin, 1)." and cannot be edited.");
  41. }
  42. }
  43. return 0;
  44. } #}}}
  45. sub decode_form_utf8 ($) { #{{{
  46. my $form = shift;
  47. foreach my $f ($form->field) {
  48. next if Encode::is_utf8(scalar $form->field($f));
  49. $form->field(name => $f,
  50. value => decode_utf8($form->field($f)),
  51. force => 1,
  52. );
  53. }
  54. } #}}}
  55. sub cgi_recentchanges ($) { #{{{
  56. my $q=shift;
  57. # Optimisation: building recentchanges means calculating lots of
  58. # links. Memoizing htmllink speeds it up a lot (can't be memoized
  59. # during page builds as the return values may change, but they
  60. # won't here.)
  61. eval q{use Memoize};
  62. error($@) if $@;
  63. memoize("htmllink");
  64. eval q{use Time::Duration};
  65. error($@) if $@;
  66. eval q{use CGI 'escapeHTML'};
  67. error($@) if $@;
  68. my $changelog=[rcs_recentchanges(100)];
  69. foreach my $change (@$changelog) {
  70. $change->{when} = concise(ago($change->{when}));
  71. if ($change->{user} =~ m!^https?://! &&
  72. eval q{use Net::OpenID::VerifiedIdentity; 1} && !$@) {
  73. # Munge user-urls, as used by eg, OpenID.
  74. my $oid=Net::OpenID::VerifiedIdentity->new(identity => $change->{user});
  75. $change->{user} = "<a href=\"".$change->{user}."\">".escapeHTML($oid->display)."</a>";
  76. }
  77. else {
  78. $change->{user} = htmllink("", "", escapeHTML($change->{user}), 1);
  79. }
  80. my $is_excess = exists $change->{pages}[10]; # limit pages to first 10
  81. delete @{$change->{pages}}[10 .. @{$change->{pages}}] if $is_excess;
  82. $change->{pages} = [
  83. map {
  84. $_->{link} = htmllink("", "", $_->{page}, 1);
  85. $_;
  86. } @{$change->{pages}}
  87. ];
  88. push @{$change->{pages}}, { link => '...' } if $is_excess;
  89. }
  90. my $template=template("recentchanges.tmpl");
  91. $template->param(
  92. title => "RecentChanges",
  93. indexlink => indexlink(),
  94. wikiname => $config{wikiname},
  95. changelog => $changelog,
  96. baseurl => baseurl(),
  97. );
  98. run_hooks(pagetemplate => sub {
  99. shift->(page => "", destpage => "", template => $template);
  100. });
  101. print $q->header(-charset => 'utf-8'), $template->output;
  102. } #}}}
  103. sub cgi_signin ($$) { #{{{
  104. my $q=shift;
  105. my $session=shift;
  106. eval q{use CGI::FormBuilder};
  107. error($@) if $@;
  108. my $form = CGI::FormBuilder->new(
  109. title => "signin",
  110. fields => [qw(do name password openid_url)],
  111. header => 1,
  112. charset => "utf-8",
  113. method => 'POST',
  114. validate => {
  115. confirm_password => {
  116. perl => q{eq $form->field("password")},
  117. },
  118. email => 'EMAIL',
  119. },
  120. required => 'NONE',
  121. javascript => 0,
  122. params => $q,
  123. action => $config{cgiurl},
  124. header => 0,
  125. template => (-e "$config{templatedir}/signin.tmpl" ?
  126. {template_params("signin.tmpl")} : ""),
  127. stylesheet => baseurl()."style.css",
  128. );
  129. decode_form_utf8($form);
  130. $form->field(name => "name", required => 0, size => 30);
  131. $form->field(name => "do", type => "hidden");
  132. $form->field(name => "password", type => "password", required => 0);
  133. if ($config{openid}) {
  134. $form->field(name => "openid_url", label => "OpenID", size => 30,
  135. comment => '('.
  136. htmllink("", "", "OpenID", 1, 0, "What's this?")
  137. .($config{openidsignup} ? " | <a href=\"$config{openidsignup}\">Get an OpenID</a>" : "")
  138. .')');
  139. }
  140. else {
  141. $form->field(name => "openid_url", type => "hidden");
  142. }
  143. if ($form->submitted eq "Register" || $form->submitted eq "Create Account") {
  144. $form->title("register");
  145. $form->text("");
  146. $form->fields(qw(do name password confirm_password email));
  147. $form->field(name => "confirm_password", type => "password");
  148. $form->field(name => "email", type => "text");
  149. $form->field(name => "openid_url", type => "hidden");
  150. }
  151. if ($q->param("do") ne "signin" && !$form->submitted) {
  152. $form->text("You need to log in first.");
  153. }
  154. if ($form->submitted) {
  155. my $submittype=$form->submitted;
  156. # OpenID login uses the Login button, but validates
  157. # differently.
  158. if ($submittype eq "Login" && $config{openid} &&
  159. length $form->field("openid_url")) {
  160. $submittype="OpenID";
  161. $form->field(
  162. name => "openid_url",
  163. validate => sub {
  164. # FIXME: ugh
  165. IkiWiki::Plugin::openid::validate($q, $session, shift, $form);
  166. },
  167. );
  168. }
  169. # Set required fields based on how form was submitted.
  170. my %required=(
  171. "Login" => [qw(name password)],
  172. "Register" => [],
  173. "Create Account" => [qw(name password confirm_password email)],
  174. "Mail Password" => [qw(name)],
  175. "OpenID" => [qw(openid_url)],
  176. );
  177. foreach my $opt (@{$required{$submittype}}) {
  178. $form->field(name => $opt, required => 1);
  179. }
  180. # Validate password differently depending on how
  181. # form was submitted.
  182. if ($submittype eq 'Login') {
  183. $form->field(
  184. name => "password",
  185. validate => sub {
  186. length $form->field("name") &&
  187. shift eq userinfo_get($form->field("name"), 'password');
  188. },
  189. );
  190. $form->field(name => "name", validate => '/^\w+$/');
  191. }
  192. elsif ($submittype ne 'OpenID') {
  193. $form->field(name => "password", validate => 'VALUE');
  194. }
  195. # And make sure the entered name exists when logging
  196. # in or sending email, and does not when registering.
  197. if ($submittype eq 'Create Account' ||
  198. $submittype eq 'Register') {
  199. $form->field(
  200. name => "name",
  201. validate => sub {
  202. my $name=shift;
  203. length $name &&
  204. $name=~/$config{wiki_file_regexp}/ &&
  205. ! userinfo_get($name, "regdate");
  206. },
  207. );
  208. }
  209. elsif ($submittype ne 'OpenID') {
  210. $form->field(
  211. name => "name",
  212. validate => sub {
  213. my $name=shift;
  214. length $name &&
  215. userinfo_get($name, "regdate");
  216. },
  217. );
  218. }
  219. }
  220. else {
  221. # First time settings.
  222. $form->field(name => "name", comment => "use FirstnameLastName");
  223. if ($session->param("name")) {
  224. $form->field(name => "name", value => $session->param("name"));
  225. }
  226. }
  227. if ($form->submitted && $form->validate) {
  228. if ($form->submitted eq 'Login') {
  229. $session->param("name", $form->field("name"));
  230. cgi_postsignin($q, $session);
  231. }
  232. elsif ($form->submitted eq 'Create Account') {
  233. my $user_name=$form->field('name');
  234. if (userinfo_setall($user_name, {
  235. 'email' => $form->field('email'),
  236. 'password' => $form->field('password'),
  237. 'regdate' => time
  238. })) {
  239. $form->field(name => "confirm_password", type => "hidden");
  240. $form->field(name => "email", type => "hidden");
  241. $form->text("Account creation successful. Now you can Login.");
  242. printheader($session);
  243. print misctemplate($form->title, $form->render(submit => ["Login"]));
  244. }
  245. else {
  246. error("Error creating account.");
  247. }
  248. }
  249. elsif ($form->submitted eq 'Mail Password') {
  250. my $user_name=$form->field("name");
  251. my $template=template("passwordmail.tmpl");
  252. $template->param(
  253. user_name => $user_name,
  254. user_password => userinfo_get($user_name, "password"),
  255. wikiurl => $config{url},
  256. wikiname => $config{wikiname},
  257. REMOTE_ADDR => $ENV{REMOTE_ADDR},
  258. );
  259. eval q{use Mail::Sendmail};
  260. error($@) if $@;
  261. sendmail(
  262. To => userinfo_get($user_name, "email"),
  263. From => "$config{wikiname} admin <$config{adminemail}>",
  264. Subject => "$config{wikiname} information",
  265. Message => $template->output,
  266. ) or error("Failed to send mail");
  267. $form->text("Your password has been emailed to you.");
  268. $form->field(name => "name", required => 0);
  269. printheader($session);
  270. print misctemplate($form->title, $form->render(submit => ["Login", "Mail Password"]));
  271. }
  272. elsif ($form->submitted eq "Register") {
  273. printheader($session);
  274. print misctemplate($form->title, $form->render(submit => ["Create Account"]));
  275. }
  276. }
  277. elsif ($form->submitted eq "Create Account") {
  278. printheader($session);
  279. print misctemplate($form->title, $form->render(submit => ["Create Account"]));
  280. }
  281. else {
  282. printheader($session);
  283. print misctemplate($form->title, $form->render(submit => ["Login", "Register", "Mail Password"]));
  284. }
  285. } #}}}
  286. sub cgi_postsignin ($$) { #{{{
  287. my $q=shift;
  288. my $session=shift;
  289. # Continue with whatever was being done before the signin process.
  290. if (defined $q->param("do") && $q->param("do") ne "signin" &&
  291. defined $session->param("postsignin")) {
  292. my $postsignin=CGI->new($session->param("postsignin"));
  293. $session->clear("postsignin");
  294. cgi($postsignin, $session);
  295. exit;
  296. }
  297. else {
  298. redirect($q, $config{url});
  299. }
  300. } #}}}
  301. sub cgi_prefs ($$) { #{{{
  302. my $q=shift;
  303. my $session=shift;
  304. eval q{use CGI::FormBuilder};
  305. error($@) if $@;
  306. my $form = CGI::FormBuilder->new(
  307. title => "preferences",
  308. fields => [qw(do name password confirm_password email
  309. subscriptions locked_pages)],
  310. header => 0,
  311. charset => "utf-8",
  312. method => 'POST',
  313. validate => {
  314. confirm_password => {
  315. perl => q{eq $form->field("password")},
  316. },
  317. email => 'EMAIL',
  318. },
  319. required => 'NONE',
  320. javascript => 0,
  321. params => $q,
  322. action => $config{cgiurl},
  323. template => (-e "$config{templatedir}/prefs.tmpl" ?
  324. {template_params("prefs.tmpl")} : ""),
  325. stylesheet => baseurl()."style.css",
  326. );
  327. my @buttons=("Save Preferences", "Logout", "Cancel");
  328. my $user_name=$session->param("name");
  329. $form->field(name => "do", type => "hidden");
  330. $form->field(name => "name", disabled => 1,
  331. value => $user_name, force => 1, size => 30);
  332. $form->field(name => "password", type => "password");
  333. $form->field(name => "confirm_password", type => "password");
  334. $form->field(name => "subscriptions", size => 50,
  335. comment => "(".htmllink("", "", "PageSpec", 1).")");
  336. $form->field(name => "locked_pages", size => 50,
  337. comment => "(".htmllink("", "", "PageSpec", 1).")");
  338. $form->field(name => "banned_users", size => 50);
  339. if (! is_admin($user_name)) {
  340. $form->field(name => "locked_pages", type => "hidden");
  341. $form->field(name => "banned_users", type => "hidden");
  342. }
  343. if ($config{httpauth}) {
  344. $form->field(name => "password", type => "hidden");
  345. $form->field(name => "confirm_password", type => "hidden");
  346. }
  347. if (! $form->submitted) {
  348. $form->field(name => "email", force => 1,
  349. value => userinfo_get($user_name, "email"));
  350. $form->field(name => "subscriptions", force => 1,
  351. value => userinfo_get($user_name, "subscriptions"));
  352. $form->field(name => "locked_pages", force => 1,
  353. value => userinfo_get($user_name, "locked_pages"));
  354. if (is_admin($user_name)) {
  355. $form->field(name => "banned_users", force => 1,
  356. value => join(" ", get_banned_users()));
  357. }
  358. }
  359. decode_form_utf8($form);
  360. if ($form->submitted eq 'Logout') {
  361. $session->delete();
  362. redirect($q, $config{url});
  363. return;
  364. }
  365. elsif ($form->submitted eq 'Cancel') {
  366. redirect($q, $config{url});
  367. return;
  368. }
  369. elsif ($form->submitted eq "Save Preferences" && $form->validate) {
  370. foreach my $field (qw(password email subscriptions locked_pages)) {
  371. if (length $form->field($field)) {
  372. userinfo_set($user_name, $field, $form->field($field)) || error("failed to set $field");
  373. }
  374. }
  375. if (is_admin($user_name)) {
  376. set_banned_users(grep { ! is_admin($_) }
  377. split(' ', $form->field("banned_users")));
  378. }
  379. $form->text("Preferences saved.");
  380. }
  381. printheader($session);
  382. print misctemplate($form->title, $form->render(submit => \@buttons));
  383. } #}}}
  384. sub cgi_editpage ($$) { #{{{
  385. my $q=shift;
  386. my $session=shift;
  387. my @fields=qw(do rcsinfo subpage from page type editcontent comments);
  388. my @buttons=("Save Page", "Preview", "Cancel");
  389. eval q{use CGI::FormBuilder; use CGI::FormBuilder::Template::HTML};
  390. error($@) if $@;
  391. my $renderer=CGI::FormBuilder::Template::HTML->new(
  392. fields => \@fields,
  393. template_params("editpage.tmpl"),
  394. );
  395. run_hooks(pagetemplate => sub {
  396. shift->(page => "", destpage => "", template => $renderer->engine);
  397. });
  398. my $form = CGI::FormBuilder->new(
  399. fields => \@fields,
  400. header => 1,
  401. charset => "utf-8",
  402. method => 'POST',
  403. validate => {
  404. editcontent => '/.+/',
  405. },
  406. required => [qw{editcontent}],
  407. javascript => 0,
  408. params => $q,
  409. action => $config{cgiurl},
  410. table => 0,
  411. template => $renderer,
  412. );
  413. decode_form_utf8($form);
  414. # This untaint is safe because titlepage removes any problematic
  415. # characters.
  416. my ($page)=$form->field('page');
  417. $page=titlepage(possibly_foolish_untaint($page));
  418. if (! defined $page || ! length $page ||
  419. $page=~/$config{wiki_file_prune_regexp}/ || $page=~/^\//) {
  420. error("bad page name");
  421. }
  422. my $from;
  423. if (defined $form->field('from')) {
  424. ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
  425. }
  426. my $file;
  427. my $type;
  428. if (exists $pagesources{$page}) {
  429. $file=$pagesources{$page};
  430. $type=pagetype($file);
  431. }
  432. else {
  433. $type=$form->param('type');
  434. if (defined $type && length $type && $hooks{htmlize}{$type}) {
  435. $type=possibly_foolish_untaint($type);
  436. }
  437. elsif (defined $from) {
  438. # favor the type of linking page
  439. $type=pagetype($pagesources{$from});
  440. }
  441. $type=$config{default_pageext} unless defined $type;
  442. $file=$page.".".$type;
  443. }
  444. my $newfile=0;
  445. if (! -e "$config{srcdir}/$file") {
  446. $newfile=1;
  447. }
  448. $form->field(name => "do", type => 'hidden');
  449. $form->field(name => "from", type => 'hidden');
  450. $form->field(name => "rcsinfo", type => 'hidden');
  451. $form->field(name => "subpage", type => 'hidden');
  452. $form->field(name => "page", value => $page, force => 1);
  453. $form->field(name => "type", value => $type, force => 1);
  454. $form->field(name => "comments", type => "text", size => 80);
  455. $form->field(name => "editcontent", type => "textarea", rows => 20,
  456. cols => 80);
  457. $form->tmpl_param("can_commit", $config{rcs});
  458. $form->tmpl_param("indexlink", indexlink());
  459. $form->tmpl_param("helponformattinglink",
  460. htmllink("", "", "HelpOnFormatting", 1));
  461. $form->tmpl_param("baseurl", baseurl());
  462. if (! $form->submitted) {
  463. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  464. force => 1);
  465. }
  466. if ($form->submitted eq "Cancel") {
  467. if ($newfile && defined $from) {
  468. redirect($q, "$config{url}/".htmlpage($from));
  469. }
  470. elsif ($newfile) {
  471. redirect($q, $config{url});
  472. }
  473. else {
  474. redirect($q, "$config{url}/".htmlpage($page));
  475. }
  476. return;
  477. }
  478. elsif ($form->submitted eq "Preview") {
  479. my $content=$form->field('editcontent');
  480. my $comments=$form->field('comments');
  481. $form->field(name => "editcontent",
  482. value => $content, force => 1);
  483. $form->field(name => "comments",
  484. value => $comments, force => 1);
  485. $config{rss}=$config{atom}=0; # avoid preview writing a feed!
  486. $form->tmpl_param("page_preview",
  487. htmlize($page, $type,
  488. linkify($page, "",
  489. preprocess($page, $page,
  490. filter($page, $content)))));
  491. }
  492. else {
  493. $form->tmpl_param("page_preview", "");
  494. }
  495. $form->tmpl_param("page_conflict", "");
  496. if (! $form->submitted || $form->submitted eq "Preview" ||
  497. ! $form->validate) {
  498. if ($form->field("do") eq "create") {
  499. my @page_locs;
  500. my $best_loc;
  501. if (! defined $from || ! length $from ||
  502. $from ne $form->field('from') ||
  503. $from=~/$config{wiki_file_prune_regexp}/ ||
  504. $from=~/^\// ||
  505. $form->submitted eq "Preview") {
  506. @page_locs=$best_loc=$page;
  507. }
  508. else {
  509. my $dir=$from."/";
  510. $dir=~s![^/]+/+$!!;
  511. if ((defined $form->field('subpage') && length $form->field('subpage')) ||
  512. $page eq 'discussion') {
  513. $best_loc="$from/$page";
  514. }
  515. else {
  516. $best_loc=$dir.$page;
  517. }
  518. push @page_locs, $dir.$page;
  519. push @page_locs, "$from/$page";
  520. while (length $dir) {
  521. $dir=~s![^/]+/+$!!;
  522. push @page_locs, $dir.$page;
  523. }
  524. }
  525. @page_locs = grep {
  526. ! exists $pagecase{lc $_} &&
  527. ! page_locked($_, $session, 1)
  528. } @page_locs;
  529. if (! @page_locs) {
  530. # hmm, someone else made the page in the
  531. # meantime?
  532. redirect($q, "$config{url}/".htmlpage($page));
  533. return;
  534. }
  535. my @page_types;
  536. if (exists $hooks{htmlize}) {
  537. @page_types=keys %{$hooks{htmlize}};
  538. }
  539. $form->tmpl_param("page_select", 1);
  540. $form->field(name => "page", type => 'select',
  541. options => \@page_locs, value => $best_loc);
  542. $form->field(name => "type", type => 'select',
  543. options => \@page_types);
  544. $form->title("creating ".pagetitle($page));
  545. }
  546. elsif ($form->field("do") eq "edit") {
  547. page_locked($page, $session);
  548. if (! defined $form->field('editcontent') ||
  549. ! length $form->field('editcontent')) {
  550. my $content="";
  551. if (exists $pagesources{$page}) {
  552. $content=readfile(srcfile($pagesources{$page}));
  553. $content=~s/\n/\r\n/g;
  554. }
  555. $form->field(name => "editcontent", value => $content,
  556. force => 1);
  557. }
  558. $form->tmpl_param("page_select", 0);
  559. $form->field(name => "page", type => 'hidden');
  560. $form->field(name => "type", type => 'hidden');
  561. $form->title("editing ".pagetitle($page));
  562. }
  563. print $form->render(submit => \@buttons);
  564. }
  565. else {
  566. # save page
  567. page_locked($page, $session);
  568. my $content=$form->field('editcontent');
  569. $content=~s/\r\n/\n/g;
  570. $content=~s/\r/\n/g;
  571. writefile($file, $config{srcdir}, $content);
  572. my $message="web commit ";
  573. if (defined $session->param("name") &&
  574. length $session->param("name")) {
  575. $message.="by ".$session->param("name");
  576. }
  577. else {
  578. $message.="from $ENV{REMOTE_ADDR}";
  579. }
  580. if (defined $form->field('comments') &&
  581. length $form->field('comments')) {
  582. $message.=": ".$form->field('comments');
  583. }
  584. if ($config{rcs}) {
  585. if ($newfile) {
  586. rcs_add($file);
  587. }
  588. # prevent deadlock with post-commit hook
  589. unlockwiki();
  590. # presumably the commit will trigger an update
  591. # of the wiki
  592. my $conflict=rcs_commit($file, $message,
  593. $form->field("rcsinfo"));
  594. if (defined $conflict) {
  595. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  596. force => 1);
  597. $form->tmpl_param("page_conflict", 1);
  598. $form->field("editcontent", value => $conflict, force => 1);
  599. $form->field(name => "comments", value => $form->field('comments'), force => 1);
  600. $form->field("do", "edit)");
  601. $form->tmpl_param("page_select", 0);
  602. $form->field(name => "page", type => 'hidden');
  603. $form->field(name => "type", type => 'hidden');
  604. $form->title("editing $page");
  605. print $form->render(submit => \@buttons);
  606. return;
  607. }
  608. }
  609. else {
  610. require IkiWiki::Render;
  611. refresh();
  612. saveindex();
  613. }
  614. # The trailing question mark tries to avoid broken
  615. # caches and get the most recent version of the page.
  616. redirect($q, "$config{url}/".htmlpage($page)."?updated");
  617. }
  618. } #}}}
  619. sub cgi (;$$) { #{{{
  620. my $q=shift;
  621. my $session=shift;
  622. if (! $q) {
  623. eval q{use CGI; use CGI::Session};
  624. error($@) if $@;
  625. $q=CGI->new;
  626. run_hooks(cgi => sub { shift->($q) });
  627. }
  628. my $do=$q->param('do');
  629. if (! defined $do || ! length $do) {
  630. my $error = $q->cgi_error;
  631. if ($error) {
  632. error("Request not processed: $error");
  633. }
  634. else {
  635. error("\"do\" parameter missing");
  636. }
  637. }
  638. # Things that do not need a session.
  639. if ($do eq 'recentchanges') {
  640. cgi_recentchanges($q);
  641. return;
  642. }
  643. elsif ($do eq 'hyperestraier') {
  644. cgi_hyperestraier();
  645. }
  646. # Need to lock the wiki before getting a session.
  647. lockwiki();
  648. if (! $session) {
  649. CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
  650. my $oldmask=umask(077);
  651. $session = CGI::Session->new("driver:DB_File", $q,
  652. { FileName => "$config{wikistatedir}/sessions.db" });
  653. umask($oldmask);
  654. }
  655. # Auth hooks can sign a user in.
  656. if ($do ne 'signin' && ! defined $session->param("name")) {
  657. run_hooks(auth => sub {
  658. shift->($q, $session)
  659. });
  660. if (defined $session->param("name")) {
  661. # Make sure whatever user was authed is in the
  662. # userinfo db.
  663. if (! userinfo_get($session->param("name"), "regdate")) {
  664. userinfo_setall($session->param("name"), {
  665. email => "",
  666. password => "",
  667. regdate => time,
  668. });
  669. }
  670. }
  671. }
  672. # Everything below this point needs the user to be signed in.
  673. if (((! $config{anonok} || $do eq 'prefs') &&
  674. (! defined $session->param("name") ||
  675. ! userinfo_get($session->param("name"), "regdate")))
  676. || $do eq 'signin') {
  677. if ($do ne 'signin' && ! defined $session->param("postsignin")) {
  678. $session->param(postsignin => $ENV{QUERY_STRING});
  679. }
  680. cgi_signin($q, $session);
  681. # Force session flush with safe umask.
  682. my $oldmask=umask(077);
  683. $session->flush;
  684. umask($oldmask);
  685. return;
  686. }
  687. elsif (defined $session->param("postsignin")) {
  688. cgi_postsignin($q, $session);
  689. }
  690. if (defined $session->param("name") && userinfo_get($session->param("name"), "banned")) {
  691. print $q->header(-status => "403 Forbidden");
  692. $session->delete();
  693. print "You are banned.";
  694. exit;
  695. }
  696. if ($do eq 'create' || $do eq 'edit') {
  697. cgi_editpage($q, $session);
  698. }
  699. elsif ($do eq 'prefs') {
  700. cgi_prefs($q, $session);
  701. }
  702. elsif ($do eq 'blog') {
  703. my $page=titlepage(decode_utf8($q->param('title')));
  704. # if the page already exists, munge it to be unique
  705. my $from=$q->param('from');
  706. my $add="";
  707. while (exists $pagecase{lc "$from/$page$add"}) {
  708. $add=1 unless length $add;
  709. $add++;
  710. }
  711. $q->param('page', $page.$add);
  712. # now run same as create
  713. $q->param('do', 'create');
  714. cgi_editpage($q, $session);
  715. }
  716. else {
  717. error("unknown do parameter");
  718. }
  719. } #}}}
  720. 1