summaryrefslogtreecommitdiff
path: root/IkiWiki/CGI.pm
blob: def0549c5d10367cb2dc7dd90f0f091e7028e0e8 (plain)
  1. #!/usr/bin/perl
  2. use warnings;
  3. use strict;
  4. use IkiWiki;
  5. use IkiWiki::UserInfo;
  6. use open qw{:utf8 :std};
  7. use Encode;
  8. package IkiWiki;
  9. sub printheader ($) { #{{{
  10. my $session=shift;
  11. if ($config{sslcookie}) {
  12. print $session->header(-charset => 'utf-8',
  13. -cookie => $session->cookie(-secure => 1));
  14. } else {
  15. print $session->header(-charset => 'utf-8');
  16. }
  17. } #}}}
  18. sub redirect ($$) { #{{{
  19. my $q=shift;
  20. my $url=shift;
  21. if (! $config{w3mmode}) {
  22. print $q->redirect($url);
  23. }
  24. else {
  25. print "Content-type: text/plain\n";
  26. print "W3m-control: GOTO $url\n\n";
  27. }
  28. } #}}}
  29. sub page_locked ($$;$) { #{{{
  30. my $page=shift;
  31. my $session=shift;
  32. my $nonfatal=shift;
  33. my $user=$session->param("name");
  34. return if defined $user && is_admin($user);
  35. foreach my $admin (@{$config{adminuser}}) {
  36. my $locked_pages=userinfo_get($admin, "locked_pages");
  37. if (pagespec_match($page, userinfo_get($admin, "locked_pages"))) {
  38. return 1 if $nonfatal;
  39. error(htmllink("", "", $page, 1)." is locked by ".
  40. htmllink("", "", $admin, 1)." and cannot be edited.");
  41. }
  42. }
  43. return 0;
  44. } #}}}
  45. sub decode_form_utf8 ($) { #{{{
  46. my $form = shift;
  47. foreach my $f ($form->field) {
  48. next if Encode::is_utf8(scalar $form->field($f));
  49. $form->field(name => $f,
  50. value => decode_utf8($form->field($f)),
  51. force => 1,
  52. );
  53. }
  54. } #}}}
  55. sub cgi_recentchanges ($) { #{{{
  56. my $q=shift;
  57. unlockwiki();
  58. # Optimisation: building recentchanges means calculating lots of
  59. # links. Memoizing htmllink speeds it up a lot (can't be memoized
  60. # during page builds as the return values may change, but they
  61. # won't here.)
  62. eval q{use Memoize};
  63. error($@) if $@;
  64. memoize("htmllink");
  65. eval q{use Time::Duration};
  66. error($@) if $@;
  67. eval q{use CGI 'escapeHTML'};
  68. error($@) if $@;
  69. my $changelog=[rcs_recentchanges(100)];
  70. foreach my $change (@$changelog) {
  71. $change->{when} = concise(ago($change->{when}));
  72. $change->{user} = htmllink("", "", escapeHTML($change->{user}), 1);
  73. my $is_excess = exists $change->{pages}[10]; # limit pages to first 10
  74. delete @{$change->{pages}}[10 .. @{$change->{pages}}] if $is_excess;
  75. $change->{pages} = [
  76. map {
  77. $_->{link} = htmllink("", "", $_->{page}, 1);
  78. $_;
  79. } @{$change->{pages}}
  80. ];
  81. push @{$change->{pages}}, { link => '...' } if $is_excess;
  82. }
  83. my $template=template("recentchanges.tmpl");
  84. $template->param(
  85. title => "RecentChanges",
  86. indexlink => indexlink(),
  87. wikiname => $config{wikiname},
  88. changelog => $changelog,
  89. baseurl => baseurl(),
  90. );
  91. run_hooks(pagetemplate => sub {
  92. shift->(page => "", destpage => "", template => $template);
  93. });
  94. print $q->header(-charset => 'utf-8'), $template->output;
  95. } #}}}
  96. sub cgi_signin ($$) { #{{{
  97. my $q=shift;
  98. my $session=shift;
  99. eval q{use CGI::FormBuilder};
  100. error($@) if $@;
  101. my $form = CGI::FormBuilder->new(
  102. title => "signin",
  103. fields => [qw(do title page subpage from name password openid_url)],
  104. header => 1,
  105. charset => "utf-8",
  106. method => 'POST',
  107. validate => {
  108. confirm_password => {
  109. perl => q{eq $form->field("password")},
  110. },
  111. email => 'EMAIL',
  112. },
  113. required => 'NONE',
  114. javascript => 0,
  115. params => $q,
  116. action => $config{cgiurl},
  117. header => 0,
  118. template => (-e "$config{templatedir}/signin.tmpl" ?
  119. {template_params("signin.tmpl")} : ""),
  120. stylesheet => baseurl()."style.css",
  121. );
  122. decode_form_utf8($form);
  123. $form->field(name => "name", required => 0);
  124. $form->field(name => "do", type => "hidden");
  125. $form->field(name => "page", type => "hidden");
  126. $form->field(name => "title", type => "hidden");
  127. $form->field(name => "from", type => "hidden");
  128. $form->field(name => "subpage", type => "hidden");
  129. $form->field(name => "password", type => "password", required => 0);
  130. if ($config{openid}) {
  131. $form->field(name => "openid_url", label => "OpenID", comment => "to log in via OpenID");
  132. }
  133. else {
  134. $form->field(name => "openid_url", type => "hidden");
  135. }
  136. if ($form->submitted eq "Register" || $form->submitted eq "Create Account") {
  137. $form->title("register");
  138. $form->text("");
  139. $form->fields(qw(do title page subpage from name password confirm_password email));
  140. $form->field(name => "confirm_password", type => "password");
  141. $form->field(name => "email", type => "text");
  142. $form->field(name => "openid_url", type => "hidden");
  143. }
  144. if ($q->param("do") ne "signin" && !$form->submitted) {
  145. $form->text("You need to log in first.");
  146. }
  147. if ($form->submitted) {
  148. my $submittype=$form->submitted;
  149. # OpenID login uses the Login button, but validates
  150. # differently.
  151. if ($submittype eq "Login" && $config{openid} &&
  152. length $form->field("openid_url")) {
  153. $submittype="OpenID";
  154. $form->field(
  155. name => "openid_url",
  156. validate => sub {
  157. # FIXME: ugh
  158. IkiWiki::Plugin::openid::validate($q, $session, $form, shift);
  159. },
  160. );
  161. }
  162. # Set required fields based on how form was submitted.
  163. my %required=(
  164. "Login" => [qw(name password)],
  165. "Register" => [],
  166. "Create Account" => [qw(name password confirm_password email)],
  167. "Mail Password" => [qw(name)],
  168. "OpenID" => [qw(openid_url)],
  169. );
  170. foreach my $opt (@{$required{$submittype}}) {
  171. $form->field(name => $opt, required => 1);
  172. }
  173. # Validate password differently depending on how
  174. # form was submitted.
  175. if ($submittype eq 'Login') {
  176. $form->field(
  177. name => "password",
  178. validate => sub {
  179. length $form->field("name") &&
  180. shift eq userinfo_get($form->field("name"), 'password');
  181. },
  182. );
  183. $form->field(name => "name", validate => '/^\w+$/');
  184. }
  185. elsif ($submittype ne 'OpenID') {
  186. $form->field(name => "password", validate => 'VALUE');
  187. }
  188. # And make sure the entered name exists when logging
  189. # in or sending email, and does not when registering.
  190. if ($submittype eq 'Create Account' ||
  191. $submittype eq 'Register') {
  192. $form->field(
  193. name => "name",
  194. validate => sub {
  195. my $name=shift;
  196. length $name &&
  197. $name=~/$config{wiki_file_regexp}/ &&
  198. ! userinfo_get($name, "regdate");
  199. },
  200. );
  201. }
  202. elsif ($submittype ne 'OpenID') {
  203. $form->field(
  204. name => "name",
  205. validate => sub {
  206. my $name=shift;
  207. length $name &&
  208. userinfo_get($name, "regdate");
  209. },
  210. );
  211. }
  212. }
  213. else {
  214. # First time settings.
  215. $form->field(name => "name", comment => "use FirstnameLastName");
  216. if ($session->param("name")) {
  217. $form->field(name => "name", value => $session->param("name"));
  218. }
  219. }
  220. if ($form->submitted && $form->validate) {
  221. if ($form->submitted eq 'Login') {
  222. $session->param("name", $form->field("name"));
  223. if (defined $form->field("do") &&
  224. $form->field("do") ne 'signin') {
  225. redirect($q, cgiurl(
  226. do => $form->field("do"),
  227. page => $form->field("page"),
  228. title => $form->field("title"),
  229. from => $form->field("from"),
  230. subpage => $form->field("subpage"),
  231. ));
  232. }
  233. else {
  234. redirect($q, $config{url});
  235. }
  236. }
  237. elsif ($form->submitted eq 'Create Account') {
  238. my $user_name=$form->field('name');
  239. if (userinfo_setall($user_name, {
  240. 'email' => $form->field('email'),
  241. 'password' => $form->field('password'),
  242. 'regdate' => time
  243. })) {
  244. $form->field(name => "confirm_password", type => "hidden");
  245. $form->field(name => "email", type => "hidden");
  246. $form->text("Account creation successful. Now you can Login.");
  247. printheader($session);
  248. print misctemplate($form->title, $form->render(submit => ["Login"]));
  249. }
  250. else {
  251. error("Error creating account.");
  252. }
  253. }
  254. elsif ($form->submitted eq 'Mail Password') {
  255. my $user_name=$form->field("name");
  256. my $template=template("passwordmail.tmpl");
  257. $template->param(
  258. user_name => $user_name,
  259. user_password => userinfo_get($user_name, "password"),
  260. wikiurl => $config{url},
  261. wikiname => $config{wikiname},
  262. REMOTE_ADDR => $ENV{REMOTE_ADDR},
  263. );
  264. eval q{use Mail::Sendmail};
  265. error($@) if $@;
  266. sendmail(
  267. To => userinfo_get($user_name, "email"),
  268. From => "$config{wikiname} admin <$config{adminemail}>",
  269. Subject => "$config{wikiname} information",
  270. Message => $template->output,
  271. ) or error("Failed to send mail");
  272. $form->text("Your password has been emailed to you.");
  273. $form->field(name => "name", required => 0);
  274. printheader($session);
  275. print misctemplate($form->title, $form->render(submit => ["Login", "Mail Password"]));
  276. }
  277. elsif ($form->submitted eq "Register") {
  278. printheader($session);
  279. print misctemplate($form->title, $form->render(submit => ["Create Account"]));
  280. }
  281. }
  282. elsif ($form->submitted eq "Create Account") {
  283. printheader($session);
  284. print misctemplate($form->title, $form->render(submit => ["Create Account"]));
  285. }
  286. else {
  287. printheader($session);
  288. print misctemplate($form->title, $form->render(submit => ["Login", "Register", "Mail Password"]));
  289. }
  290. } #}}}
  291. sub cgi_prefs ($$) { #{{{
  292. my $q=shift;
  293. my $session=shift;
  294. eval q{use CGI::FormBuilder};
  295. error($@) if $@;
  296. my $form = CGI::FormBuilder->new(
  297. title => "preferences",
  298. fields => [qw(do name password confirm_password email
  299. subscriptions locked_pages)],
  300. header => 0,
  301. charset => "utf-8",
  302. method => 'POST',
  303. validate => {
  304. confirm_password => {
  305. perl => q{eq $form->field("password")},
  306. },
  307. email => 'EMAIL',
  308. },
  309. required => 'NONE',
  310. javascript => 0,
  311. params => $q,
  312. action => $config{cgiurl},
  313. template => (-e "$config{templatedir}/prefs.tmpl" ?
  314. {template_params("prefs.tmpl")} : ""),
  315. stylesheet => baseurl()."style.css",
  316. );
  317. my @buttons=("Save Preferences", "Logout", "Cancel");
  318. my $user_name=$session->param("name");
  319. $form->field(name => "do", type => "hidden");
  320. $form->field(name => "name", disabled => 1,
  321. value => $user_name, force => 1);
  322. $form->field(name => "password", type => "password");
  323. $form->field(name => "confirm_password", type => "password");
  324. $form->field(name => "subscriptions", size => 50,
  325. comment => "(".htmllink("", "", "PageSpec", 1).")");
  326. $form->field(name => "locked_pages", size => 50,
  327. comment => "(".htmllink("", "", "PageSpec", 1).")");
  328. $form->field(name => "banned_users", size => 50);
  329. if (! is_admin($user_name)) {
  330. $form->field(name => "locked_pages", type => "hidden");
  331. $form->field(name => "banned_users", type => "hidden");
  332. }
  333. if ($config{httpauth}) {
  334. $form->field(name => "password", type => "hidden");
  335. $form->field(name => "confirm_password", type => "hidden");
  336. }
  337. if (! $form->submitted) {
  338. $form->field(name => "email", force => 1,
  339. value => userinfo_get($user_name, "email"));
  340. $form->field(name => "subscriptions", force => 1,
  341. value => userinfo_get($user_name, "subscriptions"));
  342. $form->field(name => "locked_pages", force => 1,
  343. value => userinfo_get($user_name, "locked_pages"));
  344. if (is_admin($user_name)) {
  345. $form->field(name => "banned_users", force => 1,
  346. value => join(" ", get_banned_users()));
  347. }
  348. }
  349. decode_form_utf8($form);
  350. if ($form->submitted eq 'Logout') {
  351. $session->delete();
  352. redirect($q, $config{url});
  353. return;
  354. }
  355. elsif ($form->submitted eq 'Cancel') {
  356. redirect($q, $config{url});
  357. return;
  358. }
  359. elsif ($form->submitted eq "Save Preferences" && $form->validate) {
  360. foreach my $field (qw(password email subscriptions locked_pages)) {
  361. if (length $form->field($field)) {
  362. userinfo_set($user_name, $field, $form->field($field)) || error("failed to set $field");
  363. }
  364. }
  365. if (is_admin($user_name)) {
  366. set_banned_users(grep { ! is_admin($_) }
  367. split(' ', $form->field("banned_users")));
  368. }
  369. $form->text("Preferences saved.");
  370. }
  371. printheader($session);
  372. print misctemplate($form->title, $form->render(submit => \@buttons));
  373. } #}}}
  374. sub cgi_editpage ($$) { #{{{
  375. my $q=shift;
  376. my $session=shift;
  377. my @fields=qw(do rcsinfo subpage from page type editcontent comments);
  378. my @buttons=("Save Page", "Preview", "Cancel");
  379. eval q{use CGI::FormBuilder; use CGI::FormBuilder::Template::HTML};
  380. error($@) if $@;
  381. my $renderer=CGI::FormBuilder::Template::HTML->new(
  382. fields => \@fields,
  383. template_params("editpage.tmpl"),
  384. );
  385. run_hooks(pagetemplate => sub {
  386. shift->(page => "", destpage => "", template => $renderer->engine);
  387. });
  388. my $form = CGI::FormBuilder->new(
  389. fields => \@fields,
  390. header => 1,
  391. charset => "utf-8",
  392. method => 'POST',
  393. validate => {
  394. editcontent => '/.+/',
  395. },
  396. required => [qw{editcontent}],
  397. javascript => 0,
  398. params => $q,
  399. action => $config{cgiurl},
  400. table => 0,
  401. template => $renderer,
  402. );
  403. decode_form_utf8($form);
  404. # This untaint is safe because titlepage removes any problematic
  405. # characters.
  406. my ($page)=$form->field('page');
  407. $page=titlepage(possibly_foolish_untaint($page));
  408. if (! defined $page || ! length $page ||
  409. $page=~/$config{wiki_file_prune_regexp}/ || $page=~/^\//) {
  410. error("bad page name");
  411. }
  412. my $from;
  413. if (defined $form->field('from')) {
  414. ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
  415. }
  416. my $file;
  417. my $type;
  418. if (exists $pagesources{$page}) {
  419. $file=$pagesources{$page};
  420. $type=pagetype($file);
  421. }
  422. else {
  423. $type=$form->param('type');
  424. if (defined $type && length $type && $hooks{htmlize}{$type}) {
  425. $type=possibly_foolish_untaint($type);
  426. }
  427. elsif (defined $from) {
  428. # favor the type of linking page
  429. $type=pagetype($pagesources{$from});
  430. }
  431. $type=$config{default_pageext} unless defined $type;
  432. $file=$page.".".$type;
  433. }
  434. my $newfile=0;
  435. if (! -e "$config{srcdir}/$file") {
  436. $newfile=1;
  437. }
  438. $form->field(name => "do", type => 'hidden');
  439. $form->field(name => "from", type => 'hidden');
  440. $form->field(name => "rcsinfo", type => 'hidden');
  441. $form->field(name => "subpage", type => 'hidden');
  442. $form->field(name => "page", value => $page, force => 1);
  443. $form->field(name => "type", value => $type, force => 1);
  444. $form->field(name => "comments", type => "text", size => 80);
  445. $form->field(name => "editcontent", type => "textarea", rows => 20,
  446. cols => 80);
  447. $form->tmpl_param("can_commit", $config{rcs});
  448. $form->tmpl_param("indexlink", indexlink());
  449. $form->tmpl_param("helponformattinglink",
  450. htmllink("", "", "HelpOnFormatting", 1));
  451. $form->tmpl_param("baseurl", baseurl());
  452. if (! $form->submitted) {
  453. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  454. force => 1);
  455. }
  456. if ($form->submitted eq "Cancel") {
  457. if ($newfile && defined $from) {
  458. redirect($q, "$config{url}/".htmlpage($from));
  459. }
  460. elsif ($newfile) {
  461. redirect($q, $config{url});
  462. }
  463. else {
  464. redirect($q, "$config{url}/".htmlpage($page));
  465. }
  466. return;
  467. }
  468. elsif ($form->submitted eq "Preview") {
  469. my $content=$form->field('editcontent');
  470. my $comments=$form->field('comments');
  471. $form->field(name => "editcontent",
  472. value => $content, force => 1);
  473. $form->field(name => "comments",
  474. value => $comments, force => 1);
  475. $config{rss}=$config{atom}=0; # avoid preview writing a feed!
  476. $form->tmpl_param("page_preview",
  477. htmlize($page, $type,
  478. linkify($page, "",
  479. preprocess($page, $page,
  480. filter($page, $content)))));
  481. }
  482. else {
  483. $form->tmpl_param("page_preview", "");
  484. }
  485. $form->tmpl_param("page_conflict", "");
  486. if (! $form->submitted || $form->submitted eq "Preview" ||
  487. ! $form->validate) {
  488. if ($form->field("do") eq "create") {
  489. my @page_locs;
  490. my $best_loc;
  491. if (! defined $from || ! length $from ||
  492. $from ne $form->field('from') ||
  493. $from=~/$config{wiki_file_prune_regexp}/ ||
  494. $from=~/^\// ||
  495. $form->submitted eq "Preview") {
  496. @page_locs=$best_loc=$page;
  497. }
  498. else {
  499. my $dir=$from."/";
  500. $dir=~s![^/]+/+$!!;
  501. if ((defined $form->field('subpage') && length $form->field('subpage')) ||
  502. $page eq 'discussion') {
  503. $best_loc="$from/$page";
  504. }
  505. else {
  506. $best_loc=$dir.$page;
  507. }
  508. push @page_locs, $dir.$page;
  509. push @page_locs, "$from/$page";
  510. while (length $dir) {
  511. $dir=~s![^/]+/+$!!;
  512. push @page_locs, $dir.$page;
  513. }
  514. }
  515. @page_locs = grep {
  516. ! exists $pagecase{lc $_} &&
  517. ! page_locked($_, $session, 1)
  518. } @page_locs;
  519. if (! @page_locs) {
  520. # hmm, someone else made the page in the
  521. # meantime?
  522. redirect($q, "$config{url}/".htmlpage($page));
  523. return;
  524. }
  525. my @page_types;
  526. if (exists $hooks{htmlize}) {
  527. @page_types=keys %{$hooks{htmlize}};
  528. }
  529. $form->tmpl_param("page_select", 1);
  530. $form->field(name => "page", type => 'select',
  531. options => \@page_locs, value => $best_loc);
  532. $form->field(name => "type", type => 'select',
  533. options => \@page_types);
  534. $form->title("creating ".pagetitle($page));
  535. }
  536. elsif ($form->field("do") eq "edit") {
  537. page_locked($page, $session);
  538. if (! defined $form->field('editcontent') ||
  539. ! length $form->field('editcontent')) {
  540. my $content="";
  541. if (exists $pagesources{$page}) {
  542. $content=readfile(srcfile($pagesources{$page}));
  543. $content=~s/\n/\r\n/g;
  544. }
  545. $form->field(name => "editcontent", value => $content,
  546. force => 1);
  547. }
  548. $form->tmpl_param("page_select", 0);
  549. $form->field(name => "page", type => 'hidden');
  550. $form->field(name => "type", type => 'hidden');
  551. $form->title("editing ".pagetitle($page));
  552. }
  553. print $form->render(submit => \@buttons);
  554. }
  555. else {
  556. # save page
  557. page_locked($page, $session);
  558. my $content=$form->field('editcontent');
  559. $content=~s/\r\n/\n/g;
  560. $content=~s/\r/\n/g;
  561. writefile($file, $config{srcdir}, $content);
  562. my $message="web commit ";
  563. if (defined $session->param("name") &&
  564. length $session->param("name")) {
  565. $message.="by ".$session->param("name");
  566. }
  567. else {
  568. $message.="from $ENV{REMOTE_ADDR}";
  569. }
  570. if (defined $form->field('comments') &&
  571. length $form->field('comments')) {
  572. $message.=": ".$form->field('comments');
  573. }
  574. if ($config{rcs}) {
  575. if ($newfile) {
  576. rcs_add($file);
  577. }
  578. # prevent deadlock with post-commit hook
  579. unlockwiki();
  580. # presumably the commit will trigger an update
  581. # of the wiki
  582. my $conflict=rcs_commit($file, $message,
  583. $form->field("rcsinfo"));
  584. if (defined $conflict) {
  585. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  586. force => 1);
  587. $form->tmpl_param("page_conflict", 1);
  588. $form->field("editcontent", value => $conflict, force => 1);
  589. $form->field(name => "comments", value => $form->field('comments'), force => 1);
  590. $form->field("do", "edit)");
  591. $form->tmpl_param("page_select", 0);
  592. $form->field(name => "page", type => 'hidden');
  593. $form->field(name => "type", type => 'hidden');
  594. $form->title("editing $page");
  595. print $form->render(submit => \@buttons);
  596. return;
  597. }
  598. }
  599. else {
  600. require IkiWiki::Render;
  601. refresh();
  602. saveindex();
  603. }
  604. # The trailing question mark tries to avoid broken
  605. # caches and get the most recent version of the page.
  606. redirect($q, "$config{url}/".htmlpage($page)."?updated");
  607. }
  608. } #}}}
  609. sub cgi () { #{{{
  610. eval q{use CGI; use CGI::Session};
  611. error($@) if $@;
  612. my $q=CGI->new;
  613. run_hooks(cgi => sub { shift->($q) });
  614. my $do=$q->param('do');
  615. if (! defined $do || ! length $do) {
  616. my $error = $q->cgi_error;
  617. if ($error) {
  618. error("Request not processed: $error");
  619. }
  620. else {
  621. error("\"do\" parameter missing");
  622. }
  623. }
  624. # Things that do not need a session.
  625. if ($do eq 'recentchanges') {
  626. cgi_recentchanges($q);
  627. return;
  628. }
  629. elsif ($do eq 'hyperestraier') {
  630. cgi_hyperestraier();
  631. }
  632. CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
  633. my $oldmask=umask(077);
  634. my $session = CGI::Session->new("driver:DB_File", $q,
  635. { FileName => "$config{wikistatedir}/sessions.db" });
  636. umask($oldmask);
  637. # Auth hooks can sign a user in.
  638. if ($do ne 'signin' && ! defined $session->param("name")) {
  639. run_hooks(auth => sub {
  640. shift->($q, $session)
  641. });
  642. if (defined $session->param("name")) {
  643. # Make sure whatever user was authed is in the
  644. # userinfo db.
  645. if (! userinfo_get($session->param("name"), "regdate")) {
  646. userinfo_setall($session->param("name"), {
  647. email => "",
  648. password => "",
  649. regdate => time,
  650. });
  651. }
  652. }
  653. }
  654. # Everything below this point needs the user to be signed in.
  655. if (((! $config{anonok} || $do eq 'prefs') &&
  656. (! $config{httpauth}) &&
  657. (! defined $session->param("name") ||
  658. ! userinfo_get($session->param("name"), "regdate")))
  659. || $do eq 'signin') {
  660. cgi_signin($q, $session);
  661. # Force session flush with safe umask.
  662. my $oldmask=umask(077);
  663. $session->flush;
  664. umask($oldmask);
  665. return;
  666. }
  667. if (defined $session->param("name") && userinfo_get($session->param("name"), "banned")) {
  668. print $q->header(-status => "403 Forbidden");
  669. $session->delete();
  670. print "You are banned.";
  671. exit;
  672. }
  673. if ($do eq 'create' || $do eq 'edit') {
  674. cgi_editpage($q, $session);
  675. }
  676. elsif ($do eq 'prefs') {
  677. cgi_prefs($q, $session);
  678. }
  679. elsif ($do eq 'blog') {
  680. my $page=titlepage(decode_utf8($q->param('title')));
  681. # if the page already exists, munge it to be unique
  682. my $from=$q->param('from');
  683. my $add="";
  684. while (exists $pagecase{lc "$from/$page$add"}) {
  685. $add=1 unless length $add;
  686. $add++;
  687. }
  688. $q->param('page', $page.$add);
  689. # now run same as create
  690. $q->param('do', 'create');
  691. cgi_editpage($q, $session);
  692. }
  693. else {
  694. error("unknown do parameter");
  695. }
  696. } #}}}
  697. 1