summaryrefslogtreecommitdiff
path: root/IkiWiki/CGI.pm
blob: 59e9ce161b022cff7be26350e251b16d7f5a5da6 (plain)
  1. #!/usr/bin/perl
  2. use warnings;
  3. use strict;
  4. use IkiWiki;
  5. use IkiWiki::UserInfo;
  6. use open qw{:utf8 :std};
  7. use Encode;
  8. package IkiWiki;
  9. sub printheader ($) { #{{{
  10. my $session=shift;
  11. if ($config{sslcookie}) {
  12. print $session->header(-charset => 'utf-8',
  13. -cookie => $session->cookie(-secure => 1));
  14. } else {
  15. print $session->header(-charset => 'utf-8');
  16. }
  17. } #}}}
  18. sub redirect ($$) { #{{{
  19. my $q=shift;
  20. my $url=shift;
  21. if (! $config{w3mmode}) {
  22. print $q->redirect($url);
  23. }
  24. else {
  25. print "Content-type: text/plain\n";
  26. print "W3m-control: GOTO $url\n\n";
  27. }
  28. } #}}}
  29. sub page_locked ($$;$) { #{{{
  30. my $page=shift;
  31. my $session=shift;
  32. my $nonfatal=shift;
  33. my $user=$session->param("name");
  34. return if defined $user && is_admin($user);
  35. foreach my $admin (@{$config{adminuser}}) {
  36. my $locked_pages=userinfo_get($admin, "locked_pages");
  37. if (pagespec_match($page, userinfo_get($admin, "locked_pages"))) {
  38. return 1 if $nonfatal;
  39. error(htmllink("", "", $page, 1)." is locked by ".
  40. htmllink("", "", $admin, 1)." and cannot be edited.");
  41. }
  42. }
  43. return 0;
  44. } #}}}
  45. sub decode_form_utf8 ($) { #{{{
  46. my $form = shift;
  47. foreach my $f ($form->field) {
  48. next if Encode::is_utf8(scalar $form->field($f));
  49. $form->field(name => $f,
  50. value => decode_utf8($form->field($f)),
  51. force => 1,
  52. );
  53. }
  54. } #}}}
  55. sub cgi_recentchanges ($) { #{{{
  56. my $q=shift;
  57. unlockwiki();
  58. # Optimisation: building recentchanges means calculating lots of
  59. # links. Memoizing htmllink speeds it up a lot (can't be memoized
  60. # during page builds as the return values may change, but they
  61. # won't here.)
  62. eval q{use Memoize};
  63. error($@) if $@;
  64. memoize("htmllink");
  65. eval q{use Time::Duration};
  66. error($@) if $@;
  67. eval q{use CGI 'escapeHTML'};
  68. error($@) if $@;
  69. my $changelog=[rcs_recentchanges(100)];
  70. foreach my $change (@$changelog) {
  71. $change->{when} = concise(ago($change->{when}));
  72. $change->{user} = htmllink("", "", escapeHTML($change->{user}), 1);
  73. my $is_excess = exists $change->{pages}[10]; # limit pages to first 10
  74. delete @{$change->{pages}}[10 .. @{$change->{pages}}] if $is_excess;
  75. $change->{pages} = [
  76. map {
  77. $_->{link} = htmllink("", "", $_->{page}, 1);
  78. $_;
  79. } @{$change->{pages}}
  80. ];
  81. push @{$change->{pages}}, { link => '...' } if $is_excess;
  82. }
  83. my $template=template("recentchanges.tmpl");
  84. $template->param(
  85. title => "RecentChanges",
  86. indexlink => indexlink(),
  87. wikiname => $config{wikiname},
  88. changelog => $changelog,
  89. baseurl => baseurl(),
  90. );
  91. run_hooks(pagetemplate => sub {
  92. shift->(page => "", destpage => "", template => $template);
  93. });
  94. print $q->header(-charset => 'utf-8'), $template->output;
  95. } #}}}
  96. sub cgi_signin ($$) { #{{{
  97. my $q=shift;
  98. my $session=shift;
  99. eval q{use CGI::FormBuilder};
  100. error($@) if $@;
  101. my $form = CGI::FormBuilder->new(
  102. title => "signin",
  103. fields => [qw(do title page subpage from name password)],
  104. header => 1,
  105. charset => "utf-8",
  106. method => 'POST',
  107. validate => {
  108. confirm_password => {
  109. perl => q{eq $form->field("password")},
  110. },
  111. email => 'EMAIL',
  112. },
  113. required => 'NONE',
  114. javascript => 0,
  115. params => $q,
  116. action => $config{cgiurl},
  117. header => 0,
  118. template => (-e "$config{templatedir}/signin.tmpl" ?
  119. {template_params("signin.tmpl")} : ""),
  120. stylesheet => baseurl()."style.css",
  121. );
  122. decode_form_utf8($form);
  123. $form->field(name => "name", required => 0);
  124. $form->field(name => "do", type => "hidden");
  125. $form->field(name => "page", type => "hidden");
  126. $form->field(name => "title", type => "hidden");
  127. $form->field(name => "from", type => "hidden");
  128. $form->field(name => "subpage", type => "hidden");
  129. $form->field(name => "password", type => "password", required => 0);
  130. if ($form->submitted eq "Register" || $form->submitted eq "Create Account") {
  131. $form->title("register");
  132. $form->text("");
  133. $form->fields(qw(do title page subpage from name password confirm_password email));
  134. $form->field(name => "confirm_password", type => "password");
  135. $form->field(name => "email", type => "text");
  136. }
  137. if ($q->param("do") ne "signin" && !$form->submitted) {
  138. $form->text("You need to log in first.");
  139. }
  140. if ($form->submitted) {
  141. # Set required fields based on how form was submitted.
  142. my %required=(
  143. "Login" => [qw(name password)],
  144. "Register" => [],
  145. "Create Account" => [qw(name password confirm_password email)],
  146. "Mail Password" => [qw(name)],
  147. );
  148. foreach my $opt (@{$required{$form->submitted}}) {
  149. $form->field(name => $opt, required => 1);
  150. }
  151. # Validate password differently depending on how
  152. # form was submitted.
  153. if ($form->submitted eq 'Login') {
  154. $form->field(
  155. name => "password",
  156. validate => sub {
  157. length $form->field("name") &&
  158. shift eq userinfo_get($form->field("name"), 'password');
  159. },
  160. );
  161. $form->field(name => "name", validate => '/^\w+$/');
  162. }
  163. else {
  164. $form->field(name => "password", validate => 'VALUE');
  165. }
  166. # And make sure the entered name exists when logging
  167. # in or sending email, and does not when registering.
  168. if ($form->submitted eq 'Create Account' ||
  169. $form->submitted eq 'Register') {
  170. $form->field(
  171. name => "name",
  172. validate => sub {
  173. my $name=shift;
  174. length $name &&
  175. $name=~/$config{wiki_file_regexp}/ &&
  176. ! userinfo_get($name, "regdate");
  177. },
  178. );
  179. }
  180. else {
  181. $form->field(
  182. name => "name",
  183. validate => sub {
  184. my $name=shift;
  185. length $name &&
  186. userinfo_get($name, "regdate");
  187. },
  188. );
  189. }
  190. }
  191. else {
  192. # First time settings.
  193. $form->field(name => "name", comment => "use FirstnameLastName");
  194. if ($session->param("name")) {
  195. $form->field(name => "name", value => $session->param("name"));
  196. }
  197. }
  198. if ($form->submitted && $form->validate) {
  199. if ($form->submitted eq 'Login') {
  200. $session->param("name", $form->field("name"));
  201. if (defined $form->field("do") &&
  202. $form->field("do") ne 'signin') {
  203. redirect($q, cgiurl(
  204. do => $form->field("do"),
  205. page => $form->field("page"),
  206. title => $form->field("title"),
  207. subpage => $form->field("subpage"),
  208. from => $form->field("from"),
  209. ));
  210. }
  211. else {
  212. redirect($q, $config{url});
  213. }
  214. }
  215. elsif ($form->submitted eq 'Create Account') {
  216. my $user_name=$form->field('name');
  217. if (userinfo_setall($user_name, {
  218. 'email' => $form->field('email'),
  219. 'password' => $form->field('password'),
  220. 'regdate' => time
  221. })) {
  222. $form->field(name => "confirm_password", type => "hidden");
  223. $form->field(name => "email", type => "hidden");
  224. $form->text("Account creation successful. Now you can Login.");
  225. printheader($session);
  226. print misctemplate($form->title, $form->render(submit => ["Login"]));
  227. }
  228. else {
  229. error("Error creating account.");
  230. }
  231. }
  232. elsif ($form->submitted eq 'Mail Password') {
  233. my $user_name=$form->field("name");
  234. my $template=template("passwordmail.tmpl");
  235. $template->param(
  236. user_name => $user_name,
  237. user_password => userinfo_get($user_name, "password"),
  238. wikiurl => $config{url},
  239. wikiname => $config{wikiname},
  240. REMOTE_ADDR => $ENV{REMOTE_ADDR},
  241. );
  242. eval q{use Mail::Sendmail};
  243. error($@) if $@;
  244. sendmail(
  245. To => userinfo_get($user_name, "email"),
  246. From => "$config{wikiname} admin <$config{adminemail}>",
  247. Subject => "$config{wikiname} information",
  248. Message => $template->output,
  249. ) or error("Failed to send mail");
  250. $form->text("Your password has been emailed to you.");
  251. $form->field(name => "name", required => 0);
  252. printheader($session);
  253. print misctemplate($form->title, $form->render(submit => ["Login", "Mail Password"]));
  254. }
  255. elsif ($form->submitted eq "Register") {
  256. printheader($session);
  257. print misctemplate($form->title, $form->render(submit => ["Create Account"]));
  258. }
  259. }
  260. elsif ($form->submitted eq "Create Account") {
  261. printheader($session);
  262. print misctemplate($form->title, $form->render(submit => ["Create Account"]));
  263. }
  264. else {
  265. printheader($session);
  266. print misctemplate($form->title, $form->render(submit => ["Login", "Register", "Mail Password"]));
  267. }
  268. } #}}}
  269. sub cgi_prefs ($$) { #{{{
  270. my $q=shift;
  271. my $session=shift;
  272. eval q{use CGI::FormBuilder};
  273. error($@) if $@;
  274. my $form = CGI::FormBuilder->new(
  275. title => "preferences",
  276. fields => [qw(do name password confirm_password email
  277. subscriptions locked_pages)],
  278. header => 0,
  279. charset => "utf-8",
  280. method => 'POST',
  281. validate => {
  282. confirm_password => {
  283. perl => q{eq $form->field("password")},
  284. },
  285. email => 'EMAIL',
  286. },
  287. required => 'NONE',
  288. javascript => 0,
  289. params => $q,
  290. action => $config{cgiurl},
  291. template => (-e "$config{templatedir}/prefs.tmpl" ?
  292. {template_params("prefs.tmpl")} : ""),
  293. stylesheet => baseurl()."style.css",
  294. );
  295. my @buttons=("Save Preferences", "Logout", "Cancel");
  296. my $user_name=$session->param("name");
  297. $form->field(name => "do", type => "hidden");
  298. $form->field(name => "name", disabled => 1,
  299. value => $user_name, force => 1);
  300. $form->field(name => "password", type => "password");
  301. $form->field(name => "confirm_password", type => "password");
  302. $form->field(name => "subscriptions", size => 50,
  303. comment => "(".htmllink("", "", "PageSpec", 1).")");
  304. $form->field(name => "locked_pages", size => 50,
  305. comment => "(".htmllink("", "", "PageSpec", 1).")");
  306. $form->field(name => "banned_users", size => 50);
  307. if (! is_admin($user_name)) {
  308. $form->field(name => "locked_pages", type => "hidden");
  309. $form->field(name => "banned_users", type => "hidden");
  310. }
  311. if ($config{httpauth}) {
  312. $form->field(name => "password", type => "hidden");
  313. $form->field(name => "confirm_password", type => "hidden");
  314. }
  315. if (! $form->submitted) {
  316. $form->field(name => "email", force => 1,
  317. value => userinfo_get($user_name, "email"));
  318. $form->field(name => "subscriptions", force => 1,
  319. value => userinfo_get($user_name, "subscriptions"));
  320. $form->field(name => "locked_pages", force => 1,
  321. value => userinfo_get($user_name, "locked_pages"));
  322. if (is_admin($user_name)) {
  323. $form->field(name => "banned_users", force => 1,
  324. value => join(" ", get_banned_users()));
  325. }
  326. }
  327. decode_form_utf8($form);
  328. if ($form->submitted eq 'Logout') {
  329. $session->delete();
  330. redirect($q, $config{url});
  331. return;
  332. }
  333. elsif ($form->submitted eq 'Cancel') {
  334. redirect($q, $config{url});
  335. return;
  336. }
  337. elsif ($form->submitted eq "Save Preferences" && $form->validate) {
  338. foreach my $field (qw(password email subscriptions locked_pages)) {
  339. if (length $form->field($field)) {
  340. userinfo_set($user_name, $field, $form->field($field)) || error("failed to set $field");
  341. }
  342. }
  343. if (is_admin($user_name)) {
  344. set_banned_users(grep { ! is_admin($_) }
  345. split(' ', $form->field("banned_users")));
  346. }
  347. $form->text("Preferences saved.");
  348. }
  349. printheader($session);
  350. print misctemplate($form->title, $form->render(submit => \@buttons));
  351. } #}}}
  352. sub cgi_editpage ($$) { #{{{
  353. my $q=shift;
  354. my $session=shift;
  355. my @fields=qw(do rcsinfo subpage from page type editcontent comments);
  356. my @buttons=("Save Page", "Preview", "Cancel");
  357. eval q{use CGI::FormBuilder; use CGI::FormBuilder::Template::HTML};
  358. error($@) if $@;
  359. my $renderer=CGI::FormBuilder::Template::HTML->new(
  360. fields => \@fields,
  361. template_params("editpage.tmpl"),
  362. );
  363. run_hooks(pagetemplate => sub {
  364. shift->(page => "", destpage => "", template => $renderer->engine);
  365. });
  366. my $form = CGI::FormBuilder->new(
  367. fields => \@fields,
  368. header => 1,
  369. charset => "utf-8",
  370. method => 'POST',
  371. validate => {
  372. editcontent => '/.+/',
  373. },
  374. required => [qw{editcontent}],
  375. javascript => 0,
  376. params => $q,
  377. action => $config{cgiurl},
  378. table => 0,
  379. template => $renderer,
  380. );
  381. decode_form_utf8($form);
  382. # This untaint is safe because titlepage removes any problematic
  383. # characters.
  384. my ($page)=$form->field('page');
  385. $page=titlepage(possibly_foolish_untaint($page));
  386. if (! defined $page || ! length $page ||
  387. $page=~/$config{wiki_file_prune_regexp}/ || $page=~/^\//) {
  388. error("bad page name");
  389. }
  390. my $from;
  391. if (defined $form->field('from')) {
  392. ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
  393. }
  394. my $file;
  395. my $type;
  396. if (exists $pagesources{$page}) {
  397. $file=$pagesources{$page};
  398. $type=pagetype($file);
  399. }
  400. else {
  401. $type=$form->param('type');
  402. if (defined $type && length $type && $hooks{htmlize}{$type}) {
  403. $type=possibly_foolish_untaint($type);
  404. }
  405. elsif (defined $from) {
  406. # favor the type of linking page
  407. $type=pagetype($pagesources{$from});
  408. }
  409. $type=$config{default_pageext} unless defined $type;
  410. $file=$page.".".$type;
  411. }
  412. my $newfile=0;
  413. if (! -e "$config{srcdir}/$file") {
  414. $newfile=1;
  415. }
  416. $form->field(name => "do", type => 'hidden');
  417. $form->field(name => "from", type => 'hidden');
  418. $form->field(name => "rcsinfo", type => 'hidden');
  419. $form->field(name => "subpage", type => 'hidden');
  420. $form->field(name => "page", value => $page, force => 1);
  421. $form->field(name => "type", value => $type, force => 1);
  422. $form->field(name => "comments", type => "text", size => 80);
  423. $form->field(name => "editcontent", type => "textarea", rows => 20,
  424. cols => 80);
  425. $form->tmpl_param("can_commit", $config{rcs});
  426. $form->tmpl_param("indexlink", indexlink());
  427. $form->tmpl_param("helponformattinglink",
  428. htmllink("", "", "HelpOnFormatting", 1));
  429. $form->tmpl_param("baseurl", baseurl());
  430. if (! $form->submitted) {
  431. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  432. force => 1);
  433. }
  434. if ($form->submitted eq "Cancel") {
  435. if ($newfile && defined $from) {
  436. redirect($q, "$config{url}/".htmlpage($from));
  437. }
  438. elsif ($newfile) {
  439. redirect($q, $config{url});
  440. }
  441. else {
  442. redirect($q, "$config{url}/".htmlpage($page));
  443. }
  444. return;
  445. }
  446. elsif ($form->submitted eq "Preview") {
  447. my $content=$form->field('editcontent');
  448. my $comments=$form->field('comments');
  449. $form->field(name => "editcontent",
  450. value => $content, force => 1);
  451. $form->field(name => "comments",
  452. value => $comments, force => 1);
  453. $config{rss}=$config{atom}=0; # avoid preview writing a feed!
  454. $form->tmpl_param("page_preview",
  455. htmlize($page, $type,
  456. linkify($page, "",
  457. preprocess($page, $page,
  458. filter($page, $content)))));
  459. }
  460. else {
  461. $form->tmpl_param("page_preview", "");
  462. }
  463. $form->tmpl_param("page_conflict", "");
  464. if (! $form->submitted || $form->submitted eq "Preview" ||
  465. ! $form->validate) {
  466. if ($form->field("do") eq "create") {
  467. my @page_locs;
  468. my $best_loc;
  469. if (! defined $from || ! length $from ||
  470. $from ne $form->field('from') ||
  471. $from=~/$config{wiki_file_prune_regexp}/ ||
  472. $from=~/^\// ||
  473. $form->submitted eq "Preview") {
  474. @page_locs=$best_loc=$page;
  475. }
  476. else {
  477. my $dir=$from."/";
  478. $dir=~s![^/]+/+$!!;
  479. if ((defined $form->field('subpage') && length $form->field('subpage')) ||
  480. $page eq 'discussion') {
  481. $best_loc="$from/$page";
  482. }
  483. else {
  484. $best_loc=$dir.$page;
  485. }
  486. push @page_locs, $dir.$page;
  487. push @page_locs, "$from/$page";
  488. while (length $dir) {
  489. $dir=~s![^/]+/+$!!;
  490. push @page_locs, $dir.$page;
  491. }
  492. }
  493. @page_locs = grep {
  494. ! exists $pagecase{lc $_} &&
  495. ! page_locked($_, $session, 1)
  496. } @page_locs;
  497. if (! @page_locs) {
  498. # hmm, someone else made the page in the
  499. # meantime?
  500. redirect($q, "$config{url}/".htmlpage($page));
  501. return;
  502. }
  503. my @page_types;
  504. if (exists $hooks{htmlize}) {
  505. @page_types=keys %{$hooks{htmlize}};
  506. }
  507. $form->tmpl_param("page_select", 1);
  508. $form->field(name => "page", type => 'select',
  509. options => \@page_locs, value => $best_loc);
  510. $form->field(name => "type", type => 'select',
  511. options => \@page_types);
  512. $form->title("creating ".pagetitle($page));
  513. }
  514. elsif ($form->field("do") eq "edit") {
  515. page_locked($page, $session);
  516. if (! defined $form->field('editcontent') ||
  517. ! length $form->field('editcontent')) {
  518. my $content="";
  519. if (exists $pagesources{$page}) {
  520. $content=readfile(srcfile($pagesources{$page}));
  521. $content=~s/\n/\r\n/g;
  522. }
  523. $form->field(name => "editcontent", value => $content,
  524. force => 1);
  525. }
  526. $form->tmpl_param("page_select", 0);
  527. $form->field(name => "page", type => 'hidden');
  528. $form->field(name => "type", type => 'hidden');
  529. $form->title("editing ".pagetitle($page));
  530. }
  531. print "Content-Type: text/html\n\n";
  532. print $form->render(submit => \@buttons);
  533. }
  534. else {
  535. # save page
  536. page_locked($page, $session);
  537. my $content=$form->field('editcontent');
  538. $content=~s/\r\n/\n/g;
  539. $content=~s/\r/\n/g;
  540. writefile($file, $config{srcdir}, $content);
  541. my $message="web commit ";
  542. if (defined $session->param("name") &&
  543. length $session->param("name")) {
  544. $message.="by ".$session->param("name");
  545. }
  546. else {
  547. $message.="from $ENV{REMOTE_ADDR}";
  548. }
  549. if (defined $form->field('comments') &&
  550. length $form->field('comments')) {
  551. $message.=": ".$form->field('comments');
  552. }
  553. if ($config{rcs}) {
  554. if ($newfile) {
  555. rcs_add($file);
  556. }
  557. # prevent deadlock with post-commit hook
  558. unlockwiki();
  559. # presumably the commit will trigger an update
  560. # of the wiki
  561. my $conflict=rcs_commit($file, $message,
  562. $form->field("rcsinfo"));
  563. if (defined $conflict) {
  564. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  565. force => 1);
  566. $form->tmpl_param("page_conflict", 1);
  567. $form->field("editcontent", value => $conflict, force => 1);
  568. $form->field(name => "comments", value => $form->field('comments'), force => 1);
  569. $form->field("do", "edit)");
  570. $form->tmpl_param("page_select", 0);
  571. $form->field(name => "page", type => 'hidden');
  572. $form->field(name => "type", type => 'hidden');
  573. $form->title("editing $page");
  574. print $form->render(submit => \@buttons);
  575. return;
  576. }
  577. }
  578. else {
  579. require IkiWiki::Render;
  580. refresh();
  581. saveindex();
  582. }
  583. # The trailing question mark tries to avoid broken
  584. # caches and get the most recent version of the page.
  585. redirect($q, "$config{url}/".htmlpage($page)."?updated");
  586. }
  587. } #}}}
  588. sub cgi () { #{{{
  589. eval q{use CGI; use CGI::Session};
  590. error($@) if $@;
  591. my $q=CGI->new;
  592. run_hooks(cgi => sub { shift->($q) });
  593. my $do=$q->param('do');
  594. if (! defined $do || ! length $do) {
  595. my $error = $q->cgi_error;
  596. if ($error) {
  597. error("Request not processed: $error");
  598. }
  599. else {
  600. error("\"do\" parameter missing");
  601. }
  602. }
  603. # Things that do not need a session.
  604. if ($do eq 'recentchanges') {
  605. cgi_recentchanges($q);
  606. return;
  607. }
  608. elsif ($do eq 'hyperestraier') {
  609. cgi_hyperestraier();
  610. }
  611. CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
  612. my $oldmask=umask(077);
  613. my $session = CGI::Session->new("driver:DB_File", $q,
  614. { FileName => "$config{wikistatedir}/sessions.db" });
  615. umask($oldmask);
  616. # Everything below this point needs the user to be signed in.
  617. if (((! $config{anonok} || $do eq 'prefs') &&
  618. (! $config{httpauth}) &&
  619. (! defined $session->param("name") ||
  620. ! userinfo_get($session->param("name"), "regdate"))) || $do eq 'signin') {
  621. cgi_signin($q, $session);
  622. # Force session flush with safe umask.
  623. my $oldmask=umask(077);
  624. $session->flush;
  625. umask($oldmask);
  626. return;
  627. }
  628. if ($config{httpauth} && (! defined $session->param("name"))) {
  629. if (! defined $q->remote_user()) {
  630. error("Could not determine authenticated username.");
  631. }
  632. else {
  633. $session->param("name", $q->remote_user());
  634. if (! userinfo_get($session->param("name"), "regdate")) {
  635. userinfo_setall($session->param("name"), {
  636. email => "",
  637. password => "",
  638. regdate=>time,
  639. });
  640. }
  641. }
  642. }
  643. if (userinfo_get($session->param("name"), "banned")) {
  644. print $q->header(-status => "403 Forbidden");
  645. $session->delete();
  646. print "You are banned.";
  647. exit;
  648. }
  649. if ($do eq 'create' || $do eq 'edit') {
  650. cgi_editpage($q, $session);
  651. }
  652. elsif ($do eq 'prefs') {
  653. cgi_prefs($q, $session);
  654. }
  655. elsif ($do eq 'blog') {
  656. my $page=titlepage(decode_utf8($q->param('title')));
  657. # if the page already exists, munge it to be unique
  658. my $from=$q->param('from');
  659. my $add="";
  660. while (exists $pagecase{lc "$from/$page$add"}) {
  661. $add=1 unless length $add;
  662. $add++;
  663. }
  664. $q->param('page', $page.$add);
  665. # now run same as create
  666. $q->param('do', 'create');
  667. cgi_editpage($q, $session);
  668. }
  669. else {
  670. error("unknown do parameter");
  671. }
  672. } #}}}
  673. 1