summaryrefslogtreecommitdiff
path: root/IkiWiki/CGI.pm
blob: e1cb83b496f4d0209caf4b7ee5a1796e4330420c (plain)
  1. #!/usr/bin/perl
  2. use warnings;
  3. use strict;
  4. use IkiWiki;
  5. use IkiWiki::UserInfo;
  6. use open qw{:utf8 :std};
  7. use Encode;
  8. package IkiWiki;
  9. sub printheader ($) { #{{{
  10. my $session=shift;
  11. if ($config{sslcookie}) {
  12. print $session->header(-charset => 'utf-8',
  13. -cookie => $session->cookie(-secure => 1));
  14. } else {
  15. print $session->header(-charset => 'utf-8');
  16. }
  17. } #}}}
  18. sub redirect ($$) { #{{{
  19. my $q=shift;
  20. my $url=shift;
  21. if (! $config{w3mmode}) {
  22. print $q->redirect($url);
  23. }
  24. else {
  25. print "Content-type: text/plain\n";
  26. print "W3m-control: GOTO $url\n\n";
  27. }
  28. } #}}}
  29. sub page_locked ($$;$) { #{{{
  30. my $page=shift;
  31. my $session=shift;
  32. my $nonfatal=shift;
  33. my $user=$session->param("name");
  34. return if defined $user && is_admin($user);
  35. foreach my $admin (@{$config{adminuser}}) {
  36. my $locked_pages=userinfo_get($admin, "locked_pages");
  37. if (pagespec_match($page, userinfo_get($admin, "locked_pages"))) {
  38. return 1 if $nonfatal;
  39. error(htmllink("", "", $page, 1)." is locked by ".
  40. htmllink("", "", $admin, 1)." and cannot be edited.");
  41. }
  42. }
  43. return 0;
  44. } #}}}
  45. sub decode_form_utf8 ($) { #{{{
  46. my $form = shift;
  47. foreach my $f ($form->field) {
  48. next if Encode::is_utf8(scalar $form->field($f));
  49. $form->field(name => $f,
  50. value => decode_utf8($form->field($f)),
  51. force => 1,
  52. );
  53. }
  54. } #}}}
  55. sub cgi_recentchanges ($) { #{{{
  56. my $q=shift;
  57. # Optimisation: building recentchanges means calculating lots of
  58. # links. Memoizing htmllink speeds it up a lot (can't be memoized
  59. # during page builds as the return values may change, but they
  60. # won't here.)
  61. eval q{use Memoize};
  62. error($@) if $@;
  63. memoize("htmllink");
  64. eval q{use Time::Duration};
  65. error($@) if $@;
  66. eval q{use CGI 'escapeHTML'};
  67. error($@) if $@;
  68. my $changelog=[rcs_recentchanges(100)];
  69. foreach my $change (@$changelog) {
  70. $change->{when} = concise(ago($change->{when}));
  71. if ($change->{user} =~ m!^https?://! &&
  72. eval q{use Net::OpenID::VerifiedIdentity; 1} && !$@) {
  73. # Munge user-urls, as used by eg, OpenID.
  74. my $oid=Net::OpenID::VerifiedIdentity->new(identity => $change->{user});
  75. $change->{user} = "<a href=\"".$change->{user}."\">".escapeHTML($oid->display)."</a>";
  76. }
  77. else {
  78. $change->{user} = htmllink("", "", escapeHTML($change->{user}), 1);
  79. }
  80. my $is_excess = exists $change->{pages}[10]; # limit pages to first 10
  81. delete @{$change->{pages}}[10 .. @{$change->{pages}}] if $is_excess;
  82. $change->{pages} = [
  83. map {
  84. $_->{link} = htmllink("", "", $_->{page}, 1);
  85. $_;
  86. } @{$change->{pages}}
  87. ];
  88. push @{$change->{pages}}, { link => '...' } if $is_excess;
  89. }
  90. my $template=template("recentchanges.tmpl");
  91. $template->param(
  92. title => "RecentChanges",
  93. indexlink => indexlink(),
  94. wikiname => $config{wikiname},
  95. changelog => $changelog,
  96. baseurl => baseurl(),
  97. );
  98. run_hooks(pagetemplate => sub {
  99. shift->(page => "", destpage => "", template => $template);
  100. });
  101. print $q->header(-charset => 'utf-8'), $template->output;
  102. } #}}}
  103. sub cgi_signin ($$) { #{{{
  104. my $q=shift;
  105. my $session=shift;
  106. eval q{use CGI::FormBuilder};
  107. error($@) if $@;
  108. my $form = CGI::FormBuilder->new(
  109. title => "signin",
  110. header => 1,
  111. charset => "utf-8",
  112. method => 'POST',
  113. required => 'NONE',
  114. javascript => 0,
  115. params => $q,
  116. action => $config{cgiurl},
  117. header => 0,
  118. template => (-e "$config{templatedir}/signin.tmpl" ?
  119. {template_params("signin.tmpl")} : ""),
  120. stylesheet => baseurl()."style.css",
  121. );
  122. my $buttons=["Login"];
  123. $form->field(name => "do", type => "hidden");
  124. if ($q->param("do") ne "signin" && !$form->submitted) {
  125. $form->text("You need to log in first.");
  126. }
  127. run_hooks(formbuilder_setup => sub {
  128. shift->(form => $form, cgi => $q, session => $session);
  129. });
  130. decode_form_utf8($form);
  131. if (exists $hooks{formbuilder}) {
  132. run_hooks(formbuilder => sub {
  133. shift->(form => $form, cgi => $q, session => $session,
  134. buttons => $buttons);
  135. });
  136. }
  137. else {
  138. if ($form->submitted) {
  139. $form->validate;
  140. }
  141. printheader($session);
  142. print misctemplate($form->title, $form->render(submit => $buttons));
  143. }
  144. } #}}}
  145. sub cgi_postsignin ($$) { #{{{
  146. my $q=shift;
  147. my $session=shift;
  148. # Continue with whatever was being done before the signin process.
  149. if (defined $q->param("do") && $q->param("do") ne "signin" &&
  150. defined $session->param("postsignin")) {
  151. my $postsignin=CGI->new($session->param("postsignin"));
  152. $session->clear("postsignin");
  153. cgi($postsignin, $session);
  154. exit;
  155. }
  156. else {
  157. redirect($q, $config{url});
  158. }
  159. } #}}}
  160. sub cgi_prefs ($$) { #{{{
  161. my $q=shift;
  162. my $session=shift;
  163. eval q{use CGI::FormBuilder};
  164. error($@) if $@;
  165. my $form = CGI::FormBuilder->new(
  166. title => "preferences",
  167. header => 0,
  168. charset => "utf-8",
  169. method => 'POST',
  170. validate => {
  171. email => 'EMAIL',
  172. },
  173. required => 'NONE',
  174. javascript => 0,
  175. params => $q,
  176. action => $config{cgiurl},
  177. template => (-e "$config{templatedir}/prefs.tmpl" ?
  178. {template_params("prefs.tmpl")} : ""),
  179. stylesheet => baseurl()."style.css",
  180. );
  181. my $buttons=["Save Preferences", "Logout", "Cancel"];
  182. run_hooks(formbuilder_setup => sub {
  183. shift->(form => $form, cgi => $q, session => $session);
  184. });
  185. $form->field(name => "do", type => "hidden");
  186. $form->field(name => "email", size => 50);
  187. $form->field(name => "subscriptions", size => 50,
  188. comment => "(".htmllink("", "", "PageSpec", 1).")");
  189. $form->field(name => "locked_pages", size => 50,
  190. comment => "(".htmllink("", "", "PageSpec", 1).")");
  191. $form->field(name => "banned_users", size => 50);
  192. my $user_name=$session->param("name");
  193. if (! is_admin($user_name)) {
  194. $form->field(name => "locked_pages", type => "hidden");
  195. $form->field(name => "banned_users", type => "hidden");
  196. }
  197. if (! $form->submitted) {
  198. $form->field(name => "email", force => 1,
  199. value => userinfo_get($user_name, "email"));
  200. $form->field(name => "subscriptions", force => 1,
  201. value => userinfo_get($user_name, "subscriptions"));
  202. $form->field(name => "locked_pages", force => 1,
  203. value => userinfo_get($user_name, "locked_pages"));
  204. if (is_admin($user_name)) {
  205. $form->field(name => "banned_users", force => 1,
  206. value => join(" ", get_banned_users()));
  207. }
  208. }
  209. decode_form_utf8($form);
  210. if ($form->submitted eq 'Logout') {
  211. $session->delete();
  212. redirect($q, $config{url});
  213. return;
  214. }
  215. elsif ($form->submitted eq 'Cancel') {
  216. redirect($q, $config{url});
  217. return;
  218. }
  219. elsif ($form->submitted eq "Save Preferences" && $form->validate) {
  220. foreach my $field (qw(email subscriptions locked_pages)) {
  221. if (defined $form->field($field) && length $form->field($field)) {
  222. userinfo_set($user_name, $field, $form->field($field)) || error("failed to set $field");
  223. }
  224. }
  225. if (is_admin($user_name)) {
  226. set_banned_users(grep { ! is_admin($_) }
  227. split(' ', $form->field("banned_users")));
  228. }
  229. $form->text("Preferences saved.");
  230. }
  231. if (exists $hooks{formbuilder}) {
  232. run_hooks(formbuilder => sub {
  233. shift->(form => $form, cgi => $q, session => $session,
  234. buttons => $buttons);
  235. });
  236. }
  237. else {
  238. printheader($session);
  239. print misctemplate($form->title, $form->render(submit => $buttons));
  240. }
  241. } #}}}
  242. sub cgi_editpage ($$) { #{{{
  243. my $q=shift;
  244. my $session=shift;
  245. my @fields=qw(do rcsinfo subpage from page type editcontent comments);
  246. my @buttons=("Save Page", "Preview", "Cancel");
  247. eval q{use CGI::FormBuilder; use CGI::FormBuilder::Template::HTML};
  248. error($@) if $@;
  249. my $renderer=CGI::FormBuilder::Template::HTML->new(
  250. fields => \@fields,
  251. template_params("editpage.tmpl"),
  252. );
  253. run_hooks(pagetemplate => sub {
  254. shift->(page => "", destpage => "", template => $renderer->engine);
  255. });
  256. my $form = CGI::FormBuilder->new(
  257. fields => \@fields,
  258. header => 1,
  259. charset => "utf-8",
  260. method => 'POST',
  261. validate => {
  262. editcontent => '/.+/',
  263. },
  264. required => [qw{editcontent}],
  265. javascript => 0,
  266. params => $q,
  267. action => $config{cgiurl},
  268. table => 0,
  269. template => $renderer,
  270. );
  271. run_hooks(formbuilder_setup => sub {
  272. shift->(form => $form, cgi => $q, session => $session);
  273. });
  274. decode_form_utf8($form);
  275. # This untaint is safe because titlepage removes any problematic
  276. # characters.
  277. my ($page)=$form->field('page');
  278. $page=titlepage(possibly_foolish_untaint($page));
  279. if (! defined $page || ! length $page ||
  280. $page=~/$config{wiki_file_prune_regexp}/ || $page=~/^\//) {
  281. error("bad page name");
  282. }
  283. my $from;
  284. if (defined $form->field('from')) {
  285. ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
  286. }
  287. my $file;
  288. my $type;
  289. if (exists $pagesources{$page}) {
  290. $file=$pagesources{$page};
  291. $type=pagetype($file);
  292. }
  293. else {
  294. $type=$form->param('type');
  295. if (defined $type && length $type && $hooks{htmlize}{$type}) {
  296. $type=possibly_foolish_untaint($type);
  297. }
  298. elsif (defined $from) {
  299. # favor the type of linking page
  300. $type=pagetype($pagesources{$from});
  301. }
  302. $type=$config{default_pageext} unless defined $type;
  303. $file=$page.".".$type;
  304. }
  305. my $newfile=0;
  306. if (! -e "$config{srcdir}/$file") {
  307. $newfile=1;
  308. }
  309. $form->field(name => "do", type => 'hidden');
  310. $form->field(name => "from", type => 'hidden');
  311. $form->field(name => "rcsinfo", type => 'hidden');
  312. $form->field(name => "subpage", type => 'hidden');
  313. $form->field(name => "page", value => $page, force => 1);
  314. $form->field(name => "type", value => $type, force => 1);
  315. $form->field(name => "comments", type => "text", size => 80);
  316. $form->field(name => "editcontent", type => "textarea", rows => 20,
  317. cols => 80);
  318. $form->tmpl_param("can_commit", $config{rcs});
  319. $form->tmpl_param("indexlink", indexlink());
  320. $form->tmpl_param("helponformattinglink",
  321. htmllink("", "", "HelpOnFormatting", 1));
  322. $form->tmpl_param("baseurl", baseurl());
  323. if (! $form->submitted) {
  324. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  325. force => 1);
  326. }
  327. if ($form->submitted eq "Cancel") {
  328. if ($newfile && defined $from) {
  329. redirect($q, "$config{url}/".htmlpage($from));
  330. }
  331. elsif ($newfile) {
  332. redirect($q, $config{url});
  333. }
  334. else {
  335. redirect($q, "$config{url}/".htmlpage($page));
  336. }
  337. return;
  338. }
  339. elsif ($form->submitted eq "Preview") {
  340. my $content=$form->field('editcontent');
  341. my $comments=$form->field('comments');
  342. $form->field(name => "editcontent",
  343. value => $content, force => 1);
  344. $form->field(name => "comments",
  345. value => $comments, force => 1);
  346. $config{rss}=$config{atom}=0; # avoid preview writing a feed!
  347. $form->tmpl_param("page_preview",
  348. htmlize($page, $type,
  349. linkify($page, "",
  350. preprocess($page, $page,
  351. filter($page, $content)))));
  352. }
  353. else {
  354. $form->tmpl_param("page_preview", "");
  355. }
  356. $form->tmpl_param("page_conflict", "");
  357. if (! $form->submitted || $form->submitted eq "Preview" ||
  358. ! $form->validate) {
  359. if ($form->field("do") eq "create") {
  360. my @page_locs;
  361. my $best_loc;
  362. if (! defined $from || ! length $from ||
  363. $from ne $form->field('from') ||
  364. $from=~/$config{wiki_file_prune_regexp}/ ||
  365. $from=~/^\// ||
  366. $form->submitted eq "Preview") {
  367. @page_locs=$best_loc=$page;
  368. }
  369. else {
  370. my $dir=$from."/";
  371. $dir=~s![^/]+/+$!!;
  372. if ((defined $form->field('subpage') && length $form->field('subpage')) ||
  373. $page eq 'discussion') {
  374. $best_loc="$from/$page";
  375. }
  376. else {
  377. $best_loc=$dir.$page;
  378. }
  379. push @page_locs, $dir.$page;
  380. push @page_locs, "$from/$page";
  381. while (length $dir) {
  382. $dir=~s![^/]+/+$!!;
  383. push @page_locs, $dir.$page;
  384. }
  385. }
  386. @page_locs = grep {
  387. ! exists $pagecase{lc $_} &&
  388. ! page_locked($_, $session, 1)
  389. } @page_locs;
  390. if (! @page_locs) {
  391. # hmm, someone else made the page in the
  392. # meantime?
  393. redirect($q, "$config{url}/".htmlpage($page));
  394. return;
  395. }
  396. my @page_types;
  397. if (exists $hooks{htmlize}) {
  398. @page_types=keys %{$hooks{htmlize}};
  399. }
  400. $form->tmpl_param("page_select", 1);
  401. $form->field(name => "page", type => 'select',
  402. options => \@page_locs, value => $best_loc);
  403. $form->field(name => "type", type => 'select',
  404. options => \@page_types);
  405. $form->title("creating ".pagetitle($page));
  406. }
  407. elsif ($form->field("do") eq "edit") {
  408. page_locked($page, $session);
  409. if (! defined $form->field('editcontent') ||
  410. ! length $form->field('editcontent')) {
  411. my $content="";
  412. if (exists $pagesources{$page}) {
  413. $content=readfile(srcfile($pagesources{$page}));
  414. $content=~s/\n/\r\n/g;
  415. }
  416. $form->field(name => "editcontent", value => $content,
  417. force => 1);
  418. }
  419. $form->tmpl_param("page_select", 0);
  420. $form->field(name => "page", type => 'hidden');
  421. $form->field(name => "type", type => 'hidden');
  422. $form->title("editing ".pagetitle($page));
  423. }
  424. print $form->render(submit => \@buttons);
  425. }
  426. else {
  427. # save page
  428. page_locked($page, $session);
  429. my $content=$form->field('editcontent');
  430. $content=~s/\r\n/\n/g;
  431. $content=~s/\r/\n/g;
  432. writefile($file, $config{srcdir}, $content);
  433. my $message="web commit ";
  434. if (defined $session->param("name") &&
  435. length $session->param("name")) {
  436. $message.="by ".$session->param("name");
  437. }
  438. else {
  439. $message.="from $ENV{REMOTE_ADDR}";
  440. }
  441. if (defined $form->field('comments') &&
  442. length $form->field('comments')) {
  443. $message.=": ".$form->field('comments');
  444. }
  445. if ($config{rcs}) {
  446. if ($newfile) {
  447. rcs_add($file);
  448. }
  449. # prevent deadlock with post-commit hook
  450. unlockwiki();
  451. # presumably the commit will trigger an update
  452. # of the wiki
  453. my $conflict=rcs_commit($file, $message,
  454. $form->field("rcsinfo"));
  455. if (defined $conflict) {
  456. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  457. force => 1);
  458. $form->tmpl_param("page_conflict", 1);
  459. $form->field("editcontent", value => $conflict, force => 1);
  460. $form->field(name => "comments", value => $form->field('comments'), force => 1);
  461. $form->field("do", "edit)");
  462. $form->tmpl_param("page_select", 0);
  463. $form->field(name => "page", type => 'hidden');
  464. $form->field(name => "type", type => 'hidden');
  465. $form->title("editing $page");
  466. print $form->render(submit => \@buttons);
  467. return;
  468. }
  469. }
  470. else {
  471. require IkiWiki::Render;
  472. refresh();
  473. saveindex();
  474. }
  475. # The trailing question mark tries to avoid broken
  476. # caches and get the most recent version of the page.
  477. redirect($q, "$config{url}/".htmlpage($page)."?updated");
  478. }
  479. } #}}}
  480. sub cgi (;$$) { #{{{
  481. my $q=shift;
  482. my $session=shift;
  483. if (! $q) {
  484. eval q{use CGI; use CGI::Session};
  485. error($@) if $@;
  486. $q=CGI->new;
  487. run_hooks(cgi => sub { shift->($q) });
  488. }
  489. my $do=$q->param('do');
  490. if (! defined $do || ! length $do) {
  491. my $error = $q->cgi_error;
  492. if ($error) {
  493. error("Request not processed: $error");
  494. }
  495. else {
  496. error("\"do\" parameter missing");
  497. }
  498. }
  499. # Things that do not need a session.
  500. if ($do eq 'recentchanges') {
  501. cgi_recentchanges($q);
  502. return;
  503. }
  504. elsif ($do eq 'hyperestraier') {
  505. cgi_hyperestraier();
  506. }
  507. # Need to lock the wiki before getting a session.
  508. lockwiki();
  509. if (! $session) {
  510. CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
  511. my $oldmask=umask(077);
  512. $session = CGI::Session->new("driver:DB_File", $q,
  513. { FileName => "$config{wikistatedir}/sessions.db" });
  514. umask($oldmask);
  515. }
  516. # Auth hooks can sign a user in.
  517. if ($do ne 'signin' && ! defined $session->param("name")) {
  518. run_hooks(auth => sub {
  519. shift->($q, $session)
  520. });
  521. if (defined $session->param("name")) {
  522. # Make sure whatever user was authed is in the
  523. # userinfo db.
  524. if (! userinfo_get($session->param("name"), "regdate")) {
  525. userinfo_setall($session->param("name"), {
  526. email => "",
  527. password => "",
  528. regdate => time,
  529. });
  530. }
  531. }
  532. }
  533. # Everything below this point needs the user to be signed in.
  534. if (((! $config{anonok} || $do eq 'prefs') &&
  535. (! defined $session->param("name") ||
  536. ! userinfo_get($session->param("name"), "regdate")))
  537. || $do eq 'signin') {
  538. if ($do ne 'signin' && ! defined $session->param("postsignin")) {
  539. $session->param(postsignin => $ENV{QUERY_STRING});
  540. }
  541. cgi_signin($q, $session);
  542. # Force session flush with safe umask.
  543. my $oldmask=umask(077);
  544. $session->flush;
  545. umask($oldmask);
  546. return;
  547. }
  548. elsif (defined $session->param("postsignin")) {
  549. cgi_postsignin($q, $session);
  550. }
  551. if (defined $session->param("name") && userinfo_get($session->param("name"), "banned")) {
  552. print $q->header(-status => "403 Forbidden");
  553. $session->delete();
  554. print "You are banned.";
  555. exit;
  556. }
  557. if ($do eq 'create' || $do eq 'edit') {
  558. cgi_editpage($q, $session);
  559. }
  560. elsif ($do eq 'prefs') {
  561. cgi_prefs($q, $session);
  562. }
  563. elsif ($do eq 'blog') {
  564. my $page=titlepage(decode_utf8($q->param('title')));
  565. # if the page already exists, munge it to be unique
  566. my $from=$q->param('from');
  567. my $add="";
  568. while (exists $pagecase{lc "$from/$page$add"}) {
  569. $add=1 unless length $add;
  570. $add++;
  571. }
  572. $q->param('page', $page.$add);
  573. # now run same as create
  574. $q->param('do', 'create');
  575. cgi_editpage($q, $session);
  576. }
  577. else {
  578. error("unknown do parameter");
  579. }
  580. } #}}}
  581. 1