summaryrefslogtreecommitdiff
path: root/IkiWiki/CGI.pm
blob: 82b619592e1d9b916b0d9a1037df919edfe8502d (plain)
  1. #!/usr/bin/perl
  2. use warnings;
  3. use strict;
  4. use IkiWiki;
  5. use IkiWiki::UserInfo;
  6. use open qw{:utf8 :std};
  7. use Encode;
  8. package IkiWiki;
  9. sub printheader ($) { #{{{
  10. my $session=shift;
  11. if ($config{sslcookie}) {
  12. print $session->header(-charset => 'utf-8',
  13. -cookie => $session->cookie(-secure => 1));
  14. } else {
  15. print $session->header(-charset => 'utf-8');
  16. }
  17. } #}}}
  18. sub showform ($$$$) { #{{{
  19. my $form=shift;
  20. my $buttons=shift;
  21. my $session=shift;
  22. my $cgi=shift;
  23. if (exists $hooks{formbuilder}) {
  24. run_hooks(formbuilder => sub {
  25. shift->(form => $form, cgi => $cgi, session => $session,
  26. buttons => $buttons);
  27. });
  28. }
  29. else {
  30. printheader($session);
  31. print misctemplate($form->title, $form->render(submit => $buttons));
  32. }
  33. }
  34. sub redirect ($$) { #{{{
  35. my $q=shift;
  36. my $url=shift;
  37. if (! $config{w3mmode}) {
  38. print $q->redirect($url);
  39. }
  40. else {
  41. print "Content-type: text/plain\n";
  42. print "W3m-control: GOTO $url\n\n";
  43. }
  44. } #}}}
  45. sub check_canedit ($$$;$) { #{{{
  46. my $page=shift;
  47. my $q=shift;
  48. my $session=shift;
  49. my $nonfatal=shift;
  50. my $canedit;
  51. run_hooks(canedit => sub {
  52. return if defined $canedit;
  53. my $ret=shift->($page, $q, $session);
  54. if (defined $ret && $ret eq "") {
  55. $canedit=1;
  56. }
  57. elsif (defined $ret) {
  58. $canedit=0;
  59. error($ret) unless $nonfatal;
  60. }
  61. });
  62. return $canedit;
  63. } #}}}
  64. sub decode_form_utf8 ($) { #{{{
  65. my $form = shift;
  66. foreach my $f ($form->field) {
  67. next if Encode::is_utf8(scalar $form->field($f));
  68. $form->field(name => $f,
  69. value => decode_utf8($form->field($f)),
  70. force => 1,
  71. );
  72. }
  73. } #}}}
  74. sub cgi_recentchanges ($) { #{{{
  75. my $q=shift;
  76. # Optimisation: building recentchanges means calculating lots of
  77. # links. Memoizing htmllink speeds it up a lot (can't be memoized
  78. # during page builds as the return values may change, but they
  79. # won't here.)
  80. eval q{use Memoize};
  81. error($@) if $@;
  82. memoize("htmllink");
  83. eval q{use Time::Duration};
  84. error($@) if $@;
  85. my $changelog=[rcs_recentchanges(100)];
  86. foreach my $change (@$changelog) {
  87. $change->{when} = concise(ago($change->{when}));
  88. $change->{user} = userlink($change->{user});
  89. my $is_excess = exists $change->{pages}[10]; # limit pages to first 10
  90. delete @{$change->{pages}}[10 .. @{$change->{pages}}] if $is_excess;
  91. $change->{pages} = [
  92. map {
  93. $_->{link} = htmllink("", "", $_->{page},
  94. noimageinline => 1,
  95. linktext => pagetitle($_->{page}));
  96. $_;
  97. } @{$change->{pages}}
  98. ];
  99. push @{$change->{pages}}, { link => '...' } if $is_excess;
  100. }
  101. my $template=template("recentchanges.tmpl");
  102. $template->param(
  103. title => "RecentChanges",
  104. indexlink => indexlink(),
  105. wikiname => $config{wikiname},
  106. changelog => $changelog,
  107. baseurl => baseurl(),
  108. );
  109. run_hooks(pagetemplate => sub {
  110. shift->(page => "", destpage => "", template => $template);
  111. });
  112. print $q->header(-charset => 'utf-8'), $template->output;
  113. } #}}}
  114. # Check if the user is signed in. If not, redirect to the signin form and
  115. # save their place to return to later.
  116. sub needsignin ($$) { #{{{
  117. my $q=shift;
  118. my $session=shift;
  119. if (! defined $session->param("name") ||
  120. ! userinfo_get($session->param("name"), "regdate")) {
  121. if (! defined $session->param("postsignin")) {
  122. $session->param(postsignin => $ENV{QUERY_STRING});
  123. }
  124. cgi_signin($q, $session);
  125. cgi_savesession($session);
  126. exit;
  127. }
  128. } #}}}
  129. sub cgi_signin ($$) { #{{{
  130. my $q=shift;
  131. my $session=shift;
  132. eval q{use CGI::FormBuilder};
  133. error($@) if $@;
  134. my $form = CGI::FormBuilder->new(
  135. title => "signin",
  136. name => "signin",
  137. charset => "utf-8",
  138. method => 'POST',
  139. required => 'NONE',
  140. javascript => 0,
  141. params => $q,
  142. action => $config{cgiurl},
  143. header => 0,
  144. template => {type => 'div'},
  145. stylesheet => baseurl()."style.css",
  146. );
  147. my $buttons=["Login"];
  148. if ($q->param("do") ne "signin" && !$form->submitted) {
  149. $form->text(gettext("You need to log in first."));
  150. }
  151. $form->field(name => "do", type => "hidden", value => "signin",
  152. force => 1);
  153. decode_form_utf8($form);
  154. run_hooks(formbuilder_setup => sub {
  155. shift->(form => $form, cgi => $q, session => $session,
  156. buttons => $buttons);
  157. });
  158. if ($form->submitted) {
  159. $form->validate;
  160. }
  161. showform($form, $buttons, $session, $q);
  162. } #}}}
  163. sub cgi_postsignin ($$) { #{{{
  164. my $q=shift;
  165. my $session=shift;
  166. # Continue with whatever was being done before the signin process.
  167. if (defined $session->param("postsignin")) {
  168. my $postsignin=CGI->new($session->param("postsignin"));
  169. $session->clear("postsignin");
  170. cgi($postsignin, $session);
  171. cgi_savesession($session);
  172. exit;
  173. }
  174. else {
  175. # This can occur, for example, if a user went to the signin
  176. # url via a bookmark.
  177. redirect($q, $config{url});
  178. }
  179. } #}}}
  180. sub cgi_prefs ($$) { #{{{
  181. my $q=shift;
  182. my $session=shift;
  183. needsignin($q, $session);
  184. eval q{use CGI::FormBuilder};
  185. error($@) if $@;
  186. my $form = CGI::FormBuilder->new(
  187. title => "preferences",
  188. name => "preferences",
  189. header => 0,
  190. charset => "utf-8",
  191. method => 'POST',
  192. validate => {
  193. email => 'EMAIL',
  194. },
  195. required => 'NONE',
  196. javascript => 0,
  197. params => $q,
  198. action => $config{cgiurl},
  199. template => {type => 'div'},
  200. stylesheet => baseurl()."style.css",
  201. fieldsets => [
  202. [login => gettext("Login")],
  203. [preferences => gettext("Preferences")],
  204. [admin => gettext("Admin")]
  205. ],
  206. );
  207. my $buttons=["Save Preferences", "Logout", "Cancel"];
  208. decode_form_utf8($form);
  209. run_hooks(formbuilder_setup => sub {
  210. shift->(form => $form, cgi => $q, session => $session,
  211. buttons => $buttons);
  212. });
  213. $form->field(name => "do", type => "hidden");
  214. $form->field(name => "email", size => 50, fieldset => "preferences");
  215. $form->field(name => "subscriptions", size => 50,
  216. fieldset => "preferences",
  217. comment => "(".htmllink("", "", "PageSpec", noimageinline => 1).")");
  218. $form->field(name => "banned_users", size => 50,
  219. fieldset => "admin");
  220. my $user_name=$session->param("name");
  221. if (! is_admin($user_name)) {
  222. $form->field(name => "banned_users", type => "hidden");
  223. }
  224. if (! $form->submitted) {
  225. $form->field(name => "email", force => 1,
  226. value => userinfo_get($user_name, "email"));
  227. $form->field(name => "subscriptions", force => 1,
  228. value => userinfo_get($user_name, "subscriptions"));
  229. if (is_admin($user_name)) {
  230. $form->field(name => "banned_users", force => 1,
  231. value => join(" ", get_banned_users()));
  232. }
  233. }
  234. if ($form->submitted eq 'Logout') {
  235. $session->delete();
  236. redirect($q, $config{url});
  237. return;
  238. }
  239. elsif ($form->submitted eq 'Cancel') {
  240. redirect($q, $config{url});
  241. return;
  242. }
  243. elsif ($form->submitted eq 'Save Preferences' && $form->validate) {
  244. foreach my $field (qw(email subscriptions)) {
  245. if (defined $form->field($field) && length $form->field($field)) {
  246. userinfo_set($user_name, $field, $form->field($field)) ||
  247. error("failed to set $field");
  248. }
  249. }
  250. if (is_admin($user_name)) {
  251. set_banned_users(grep { ! is_admin($_) }
  252. split(' ',
  253. $form->field("banned_users"))) ||
  254. error("failed saving changes");
  255. }
  256. $form->text(gettext("Preferences saved."));
  257. }
  258. showform($form, $buttons, $session, $q);
  259. } #}}}
  260. sub cgi_editpage ($$) { #{{{
  261. my $q=shift;
  262. my $session=shift;
  263. my @fields=qw(do rcsinfo subpage from page type editcontent comments);
  264. my @buttons=("Save Page", "Preview", "Cancel");
  265. eval q{use CGI::FormBuilder};
  266. error($@) if $@;
  267. my $form = CGI::FormBuilder->new(
  268. title => "editpage",
  269. fields => \@fields,
  270. charset => "utf-8",
  271. method => 'POST',
  272. validate => {
  273. editcontent => '/.+/',
  274. },
  275. required => [qw{editcontent}],
  276. javascript => 0,
  277. params => $q,
  278. action => $config{cgiurl},
  279. header => 0,
  280. table => 0,
  281. template => scalar template_params("editpage.tmpl"),
  282. wikiname => $config{wikiname},
  283. );
  284. decode_form_utf8($form);
  285. run_hooks(formbuilder_setup => sub {
  286. shift->(form => $form, cgi => $q, session => $session,
  287. buttons => \@buttons);
  288. });
  289. # This untaint is safe because titlepage removes any problematic
  290. # characters.
  291. my ($page)=$form->field('page');
  292. $page=titlepage(possibly_foolish_untaint($page));
  293. if (! defined $page || ! length $page || file_pruned($page, $config{srcdir}) || $page=~/^\//) {
  294. error("bad page name");
  295. }
  296. my $from;
  297. if (defined $form->field('from')) {
  298. ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
  299. }
  300. my $file;
  301. my $type;
  302. if (exists $pagesources{$page} && $form->field("do") ne "create") {
  303. $file=$pagesources{$page};
  304. $type=pagetype($file);
  305. if (! defined $type) {
  306. error(sprintf(gettext("%s is not an editable page"), $page));
  307. }
  308. if (! $form->submitted) {
  309. $form->field(name => "rcsinfo",
  310. value => rcs_prepedit($file), force => 1);
  311. }
  312. }
  313. else {
  314. $type=$form->param('type');
  315. if (defined $type && length $type && $hooks{htmlize}{$type}) {
  316. $type=possibly_foolish_untaint($type);
  317. }
  318. elsif (defined $from) {
  319. # favor the type of linking page
  320. $type=pagetype($pagesources{$from});
  321. }
  322. $type=$config{default_pageext} unless defined $type;
  323. $file=$page.".".$type;
  324. if (! $form->submitted) {
  325. $form->field(name => "rcsinfo", value => "", force => 1);
  326. }
  327. }
  328. $form->field(name => "do", type => 'hidden');
  329. $form->field(name => "from", type => 'hidden');
  330. $form->field(name => "rcsinfo", type => 'hidden');
  331. $form->field(name => "subpage", type => 'hidden');
  332. $form->field(name => "page", value => pagetitle($page, 1), force => 1);
  333. $form->field(name => "type", value => $type, force => 1);
  334. $form->field(name => "comments", type => "text", size => 80);
  335. $form->field(name => "editcontent", type => "textarea", rows => 20,
  336. cols => 80);
  337. $form->tmpl_param("can_commit", $config{rcs});
  338. $form->tmpl_param("indexlink", indexlink());
  339. $form->tmpl_param("helponformattinglink",
  340. htmllink("", "", "HelpOnFormatting", noimageinline => 1));
  341. $form->tmpl_param("baseurl", baseurl());
  342. if ($form->submitted eq "Cancel") {
  343. if ($form->field("do") eq "create" && defined $from) {
  344. redirect($q, "$config{url}/".htmlpage($from));
  345. }
  346. elsif ($form->field("do") eq "create") {
  347. redirect($q, $config{url});
  348. }
  349. else {
  350. redirect($q, "$config{url}/".htmlpage($page));
  351. }
  352. return;
  353. }
  354. elsif ($form->submitted eq "Preview") {
  355. my $content=$form->field('editcontent');
  356. run_hooks(editcontent => sub {
  357. $content=shift->(
  358. content => $content,
  359. page => $page,
  360. cgi => $q,
  361. session => $session,
  362. );
  363. });
  364. $form->tmpl_param("page_preview",
  365. htmlize($page, $type,
  366. linkify($page, "",
  367. preprocess($page, $page,
  368. filter($page, $page, $content), 0, 1))));
  369. }
  370. elsif ($form->submitted eq "Save Page") {
  371. $form->tmpl_param("page_preview", "");
  372. }
  373. $form->tmpl_param("page_conflict", "");
  374. if ($form->submitted ne "Save Page" || ! $form->validate) {
  375. if ($form->field("do") eq "create") {
  376. my @page_locs;
  377. my $best_loc;
  378. if (! defined $from || ! length $from ||
  379. $from ne $form->field('from') ||
  380. file_pruned($from, $config{srcdir}) ||
  381. $from=~/^\// ||
  382. $form->submitted eq "Preview") {
  383. @page_locs=$best_loc=$page;
  384. }
  385. else {
  386. my $dir=$from."/";
  387. $dir=~s![^/]+/+$!!;
  388. if ((defined $form->field('subpage') && length $form->field('subpage')) ||
  389. $page eq gettext('discussion')) {
  390. $best_loc="$from/$page";
  391. }
  392. else {
  393. $best_loc=$dir.$page;
  394. }
  395. push @page_locs, $dir.$page;
  396. push @page_locs, "$from/$page";
  397. while (length $dir) {
  398. $dir=~s![^/]+/+$!!;
  399. push @page_locs, $dir.$page;
  400. }
  401. }
  402. push @page_locs, "$config{userdir}/$page"
  403. if length $config{userdir};
  404. @page_locs = grep {
  405. ! exists $pagecase{lc $_}
  406. } @page_locs;
  407. if (! @page_locs) {
  408. # hmm, someone else made the page in the
  409. # meantime?
  410. redirect($q, "$config{url}/".htmlpage($page));
  411. return;
  412. }
  413. my @editable_locs = grep {
  414. check_canedit($_, $q, $session, 1)
  415. } @page_locs;
  416. if (! @editable_locs) {
  417. # let it throw an error this time
  418. map { check_canedit($_, $q, $session) } @page_locs;
  419. }
  420. my @page_types;
  421. if (exists $hooks{htmlize}) {
  422. @page_types=keys %{$hooks{htmlize}};
  423. }
  424. $form->tmpl_param("page_select", 1);
  425. $form->field(name => "page", type => 'select',
  426. options => [ map { pagetitle($_, 1) } @editable_locs ],
  427. value => pagetitle($best_loc, 1));
  428. $form->field(name => "type", type => 'select',
  429. options => \@page_types);
  430. $form->title(sprintf(gettext("creating %s"), pagetitle($page)));
  431. }
  432. elsif ($form->field("do") eq "edit") {
  433. check_canedit($page, $q, $session);
  434. if (! defined $form->field('editcontent') ||
  435. ! length $form->field('editcontent')) {
  436. my $content="";
  437. if (exists $pagesources{$page}) {
  438. $content=readfile(srcfile($pagesources{$page}));
  439. $content=~s/\n/\r\n/g;
  440. }
  441. $form->field(name => "editcontent", value => $content,
  442. force => 1);
  443. }
  444. $form->tmpl_param("page_select", 0);
  445. $form->field(name => "page", type => 'hidden');
  446. $form->field(name => "type", type => 'hidden');
  447. $form->title(sprintf(gettext("editing %s"), pagetitle($page)));
  448. }
  449. showform($form, \@buttons, $session, $q);
  450. }
  451. else {
  452. # save page
  453. check_canedit($page, $q, $session);
  454. my $exists=-e "$config{srcdir}/$file";
  455. if ($form->field("do") ne "create" &&
  456. ! $exists && ! -e "$config{underlaydir}/$file") {
  457. $form->tmpl_param("page_gone", 1);
  458. $form->field(name => "do", value => "create", force => 1);
  459. $form->tmpl_param("page_select", 0);
  460. $form->field(name => "page", type => 'hidden');
  461. $form->field(name => "type", type => 'hidden');
  462. $form->title(sprintf(gettext("editing %s"), $page));
  463. showform($form, \@buttons, $session, $q);
  464. return;
  465. }
  466. elsif ($form->field("do") eq "create" && $exists) {
  467. $form->tmpl_param("creation_conflict", 1);
  468. $form->field(name => "do", value => "edit", force => 1);
  469. $form->tmpl_param("page_select", 0);
  470. $form->field(name => "page", type => 'hidden');
  471. $form->field(name => "type", type => 'hidden');
  472. $form->title(sprintf(gettext("editing %s"), $page));
  473. $form->field("editcontent",
  474. value => readfile("$config{srcdir}/$file").
  475. "\n\n\n".$form->field("editcontent"),
  476. force => 1);
  477. showform($form, \@buttons, $session, $q);
  478. return;
  479. }
  480. my $content=$form->field('editcontent');
  481. run_hooks(editcontent => sub {
  482. $content=shift->(
  483. content => $content,
  484. page => $page,
  485. cgi => $q,
  486. session => $session,
  487. );
  488. });
  489. $content=~s/\r\n/\n/g;
  490. $content=~s/\r/\n/g;
  491. $config{cgi}=0; # avoid cgi error message
  492. eval { writefile($file, $config{srcdir}, $content) };
  493. $config{cgi}=1;
  494. if ($@) {
  495. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  496. force => 1);
  497. $form->tmpl_param("failed_save", 1);
  498. $form->tmpl_param("error_message", $@);
  499. $form->field("editcontent", value => $content, force => 1);
  500. $form->tmpl_param("page_select", 0);
  501. $form->field(name => "page", type => 'hidden');
  502. $form->field(name => "type", type => 'hidden');
  503. $form->title(sprintf(gettext("editing %s"), $page));
  504. showform($form, \@buttons, $session, $q);
  505. return;
  506. }
  507. my $conflict;
  508. if ($config{rcs}) {
  509. my $message="";
  510. if (defined $form->field('comments') &&
  511. length $form->field('comments')) {
  512. $message=$form->field('comments');
  513. }
  514. if (! $exists) {
  515. rcs_add($file);
  516. }
  517. # Prevent deadlock with post-commit hook by
  518. # signaling to it that it should not try to
  519. # do anything (except send commit mails).
  520. disable_commit_hook();
  521. $conflict=rcs_commit($file, $message,
  522. $form->field("rcsinfo"),
  523. $session->param("name"), $ENV{REMOTE_ADDR});
  524. enable_commit_hook();
  525. rcs_update();
  526. }
  527. # Refresh even if there was a conflict, since other changes
  528. # may have been committed while the post-commit hook was
  529. # disabled.
  530. require IkiWiki::Render;
  531. refresh();
  532. saveindex();
  533. if (defined $conflict) {
  534. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  535. force => 1);
  536. $form->tmpl_param("page_conflict", 1);
  537. $form->field("editcontent", value => $conflict, force => 1);
  538. $form->field("do", "edit", force => 1);
  539. $form->tmpl_param("page_select", 0);
  540. $form->field(name => "page", type => 'hidden');
  541. $form->field(name => "type", type => 'hidden');
  542. $form->title(sprintf(gettext("editing %s"), $page));
  543. showform($form, \@buttons, $session, $q);
  544. return;
  545. }
  546. else {
  547. # The trailing question mark tries to avoid broken
  548. # caches and get the most recent version of the page.
  549. redirect($q, "$config{url}/".htmlpage($page)."?updated");
  550. }
  551. }
  552. } #}}}
  553. sub cgi_getsession ($) { #{{{
  554. my $q=shift;
  555. eval q{use CGI::Session};
  556. CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
  557. my $oldmask=umask(077);
  558. my $session = CGI::Session->new("driver:DB_File", $q,
  559. { FileName => "$config{wikistatedir}/sessions.db" });
  560. umask($oldmask);
  561. return $session;
  562. } #}}}
  563. sub cgi_savesession ($) { #{{{
  564. my $session=shift;
  565. # Force session flush with safe umask.
  566. my $oldmask=umask(077);
  567. $session->flush;
  568. umask($oldmask);
  569. } #}}}
  570. sub cgi (;$$) { #{{{
  571. my $q=shift;
  572. my $session=shift;
  573. if (! $q) {
  574. eval q{use CGI};
  575. error($@) if $@;
  576. $q=CGI->new;
  577. run_hooks(cgi => sub { shift->($q) });
  578. }
  579. my $do=$q->param('do');
  580. if (! defined $do || ! length $do) {
  581. my $error = $q->cgi_error;
  582. if ($error) {
  583. error("Request not processed: $error");
  584. }
  585. else {
  586. error("\"do\" parameter missing");
  587. }
  588. }
  589. # Things that do not need a session.
  590. if ($do eq 'recentchanges') {
  591. cgi_recentchanges($q);
  592. return;
  593. }
  594. # Need to lock the wiki before getting a session.
  595. lockwiki();
  596. if (! $session) {
  597. $session=cgi_getsession($q);
  598. }
  599. # Auth hooks can sign a user in.
  600. if ($do ne 'signin' && ! defined $session->param("name")) {
  601. run_hooks(auth => sub {
  602. shift->($q, $session)
  603. });
  604. if (defined $session->param("name")) {
  605. # Make sure whatever user was authed is in the
  606. # userinfo db.
  607. if (! userinfo_get($session->param("name"), "regdate")) {
  608. userinfo_setall($session->param("name"), {
  609. email => "",
  610. password => "",
  611. regdate => time,
  612. }) || error("failed adding user");
  613. }
  614. }
  615. }
  616. if (defined $session->param("name") &&
  617. userinfo_get($session->param("name"), "banned")) {
  618. print $q->header(-status => "403 Forbidden");
  619. $session->delete();
  620. print gettext("You are banned.");
  621. cgi_savesession($session);
  622. }
  623. run_hooks(sessioncgi => sub { shift->($q, $session) });
  624. if ($do eq 'signin') {
  625. cgi_signin($q, $session);
  626. cgi_savesession($session);
  627. }
  628. elsif (defined $session->param("postsignin")) {
  629. cgi_postsignin($q, $session);
  630. }
  631. elsif ($do eq 'prefs') {
  632. cgi_prefs($q, $session);
  633. }
  634. elsif ($do eq 'create' || $do eq 'edit') {
  635. cgi_editpage($q, $session);
  636. }
  637. elsif ($do eq 'postsignin') {
  638. error(gettext("login failed, perhaps you need to turn on cookies?"));
  639. }
  640. else {
  641. error("unknown do parameter");
  642. }
  643. } #}}}
  644. sub userlink ($) { #{{{
  645. my $user=shift;
  646. eval q{use CGI 'escapeHTML'};
  647. error($@) if $@;
  648. if ($user =~ m!^https?://! &&
  649. eval q{use Net::OpenID::VerifiedIdentity; 1} && !$@) {
  650. # Munge user-urls, as used by eg, OpenID.
  651. my $oid=Net::OpenID::VerifiedIdentity->new(identity => $user);
  652. my $display=$oid->display;
  653. # Convert "user.somehost.com" to "user [somehost.com]".
  654. if ($display !~ /\[/) {
  655. $display=~s/^(.*?)\.([^.]+\.[a-z]+)$/$1 [$2]/;
  656. }
  657. # Convert "http://somehost.com/user" to "user [somehost.com]".
  658. if ($display !~ /\[/) {
  659. $display=~s/^https?:\/\/(.+)\/([^\/]+)$/$2 [$1]/;
  660. }
  661. $display=~s!^https?://!!; # make sure this is removed
  662. return "<a href=\"$user\">".escapeHTML($display)."</a>";
  663. }
  664. else {
  665. return htmllink("", "", escapeHTML(
  666. length $config{userdir} ? $config{userdir}."/".$user : $user
  667. ), noimageinline => 1);
  668. }
  669. } #}}}
  670. 1