summaryrefslogtreecommitdiff
path: root/IkiWiki/CGI.pm
blob: 197eabcf01a2a881a47ebc9680b0c7a1c70f866b (plain)
  1. #!/usr/bin/perl
  2. use warnings;
  3. use strict;
  4. use IkiWiki;
  5. use IkiWiki::UserInfo;
  6. use open qw{:utf8 :std};
  7. use Encode;
  8. package IkiWiki;
  9. sub printheader ($) { #{{{
  10. my $session=shift;
  11. if ($config{sslcookie}) {
  12. print $session->header(-charset => 'utf-8',
  13. -cookie => $session->cookie(-secure => 1));
  14. } else {
  15. print $session->header(-charset => 'utf-8');
  16. }
  17. } #}}}
  18. sub showform ($$$$) { #{{{
  19. my $form=shift;
  20. my $buttons=shift;
  21. my $session=shift;
  22. my $cgi=shift;
  23. if (exists $hooks{formbuilder}) {
  24. run_hooks(formbuilder => sub {
  25. shift->(form => $form, cgi => $cgi, session => $session,
  26. buttons => $buttons);
  27. });
  28. }
  29. printheader($session);
  30. print misctemplate($form->title, $form->render(submit => $buttons));
  31. }
  32. sub redirect ($$) { #{{{
  33. my $q=shift;
  34. my $url=shift;
  35. if (! $config{w3mmode}) {
  36. print $q->redirect($url);
  37. }
  38. else {
  39. print "Content-type: text/plain\n";
  40. print "W3m-control: GOTO $url\n\n";
  41. }
  42. } #}}}
  43. sub check_canedit ($$$;$) { #{{{
  44. my $page=shift;
  45. my $q=shift;
  46. my $session=shift;
  47. my $nonfatal=shift;
  48. my $canedit;
  49. run_hooks(canedit => sub {
  50. return if defined $canedit;
  51. my $ret=shift->($page, $q, $session);
  52. if (defined $ret && $ret eq "") {
  53. $canedit=1;
  54. }
  55. elsif (defined $ret) {
  56. $canedit=0;
  57. error($ret) unless $nonfatal;
  58. }
  59. });
  60. return $canedit;
  61. } #}}}
  62. sub decode_cgi_utf8 ($) { #{{{
  63. my $cgi = shift;
  64. foreach my $f ($cgi->param) {
  65. $cgi->param($f, map { decode_utf8 $_ } $cgi->param($f));
  66. }
  67. } #}}}
  68. sub cgi_recentchanges ($) { #{{{
  69. my $q=shift;
  70. # Optimisation: building recentchanges means calculating lots of
  71. # links. Memoizing htmllink speeds it up a lot (can't be memoized
  72. # during page builds as the return values may change, but they
  73. # won't here.)
  74. eval q{use Memoize};
  75. error($@) if $@;
  76. memoize("htmllink");
  77. eval q{use Time::Duration};
  78. error($@) if $@;
  79. my $changelog=[rcs_recentchanges(100)];
  80. foreach my $change (@$changelog) {
  81. $change->{when} = concise(ago($change->{when}));
  82. $change->{user} = userlink($change->{user});
  83. my $is_excess = exists $change->{pages}[10]; # limit pages to first 10
  84. delete @{$change->{pages}}[10 .. @{$change->{pages}}] if $is_excess;
  85. $change->{pages} = [
  86. map {
  87. $_->{link} = htmllink("", "", $_->{page},
  88. noimageinline => 1,
  89. linktext => pagetitle($_->{page}));
  90. $_;
  91. } @{$change->{pages}}
  92. ];
  93. push @{$change->{pages}}, { link => '...' } if $is_excess;
  94. }
  95. my $template=template("recentchanges.tmpl");
  96. $template->param(
  97. title => "RecentChanges",
  98. indexlink => indexlink(),
  99. wikiname => $config{wikiname},
  100. changelog => $changelog,
  101. baseurl => baseurl(),
  102. );
  103. run_hooks(pagetemplate => sub {
  104. shift->(page => "", destpage => "", template => $template);
  105. });
  106. print $q->header(-charset => 'utf-8'), $template->output;
  107. } #}}}
  108. # Check if the user is signed in. If not, redirect to the signin form and
  109. # save their place to return to later.
  110. sub needsignin ($$) { #{{{
  111. my $q=shift;
  112. my $session=shift;
  113. if (! defined $session->param("name") ||
  114. ! userinfo_get($session->param("name"), "regdate")) {
  115. $session->param(postsignin => $ENV{QUERY_STRING});
  116. cgi_signin($q, $session);
  117. cgi_savesession($session);
  118. exit;
  119. }
  120. } #}}}
  121. sub cgi_signin ($$) { #{{{
  122. my $q=shift;
  123. my $session=shift;
  124. decode_cgi_utf8($q);
  125. eval q{use CGI::FormBuilder};
  126. error($@) if $@;
  127. my $form = CGI::FormBuilder->new(
  128. title => "signin",
  129. name => "signin",
  130. charset => "utf-8",
  131. method => 'POST',
  132. required => 'NONE',
  133. javascript => 0,
  134. params => $q,
  135. action => $config{cgiurl},
  136. header => 0,
  137. template => {type => 'div'},
  138. stylesheet => baseurl()."style.css",
  139. );
  140. my $buttons=["Login"];
  141. if ($q->param("do") ne "signin" && !$form->submitted) {
  142. $form->text(gettext("You need to log in first."));
  143. }
  144. $form->field(name => "do", type => "hidden", value => "signin",
  145. force => 1);
  146. run_hooks(formbuilder_setup => sub {
  147. shift->(form => $form, cgi => $q, session => $session,
  148. buttons => $buttons);
  149. });
  150. if ($form->submitted) {
  151. $form->validate;
  152. }
  153. showform($form, $buttons, $session, $q);
  154. } #}}}
  155. sub cgi_postsignin ($$) { #{{{
  156. my $q=shift;
  157. my $session=shift;
  158. # Continue with whatever was being done before the signin process.
  159. if (defined $session->param("postsignin")) {
  160. my $postsignin=CGI->new($session->param("postsignin"));
  161. $session->clear("postsignin");
  162. cgi($postsignin, $session);
  163. cgi_savesession($session);
  164. exit;
  165. }
  166. else {
  167. error(gettext("login failed, perhaps you need to turn on cookies?"));
  168. }
  169. } #}}}
  170. sub cgi_prefs ($$) { #{{{
  171. my $q=shift;
  172. my $session=shift;
  173. needsignin($q, $session);
  174. decode_cgi_utf8($q);
  175. eval q{use CGI::FormBuilder};
  176. error($@) if $@;
  177. my $form = CGI::FormBuilder->new(
  178. title => "preferences",
  179. name => "preferences",
  180. header => 0,
  181. charset => "utf-8",
  182. method => 'POST',
  183. validate => {
  184. email => 'EMAIL',
  185. },
  186. required => 'NONE',
  187. javascript => 0,
  188. params => $q,
  189. action => $config{cgiurl},
  190. template => {type => 'div'},
  191. stylesheet => baseurl()."style.css",
  192. fieldsets => [
  193. [login => gettext("Login")],
  194. [preferences => gettext("Preferences")],
  195. [admin => gettext("Admin")]
  196. ],
  197. );
  198. my $buttons=["Save Preferences", "Logout", "Cancel"];
  199. run_hooks(formbuilder_setup => sub {
  200. shift->(form => $form, cgi => $q, session => $session,
  201. buttons => $buttons);
  202. });
  203. $form->field(name => "do", type => "hidden");
  204. $form->field(name => "email", size => 50, fieldset => "preferences");
  205. $form->field(name => "subscriptions", size => 50,
  206. fieldset => "preferences",
  207. comment => "(".htmllink("", "", "ikiwiki/PageSpec", noimageinline => 1).")");
  208. $form->field(name => "banned_users", size => 50,
  209. fieldset => "admin");
  210. my $user_name=$session->param("name");
  211. if (! is_admin($user_name)) {
  212. $form->field(name => "banned_users", type => "hidden");
  213. }
  214. if (! $form->submitted) {
  215. $form->field(name => "email", force => 1,
  216. value => userinfo_get($user_name, "email"));
  217. $form->field(name => "subscriptions", force => 1,
  218. value => userinfo_get($user_name, "subscriptions"));
  219. if (is_admin($user_name)) {
  220. $form->field(name => "banned_users", force => 1,
  221. value => join(" ", get_banned_users()));
  222. }
  223. }
  224. if ($form->submitted eq 'Logout') {
  225. $session->delete();
  226. redirect($q, $config{url});
  227. return;
  228. }
  229. elsif ($form->submitted eq 'Cancel') {
  230. redirect($q, $config{url});
  231. return;
  232. }
  233. elsif ($form->submitted eq 'Save Preferences' && $form->validate) {
  234. foreach my $field (qw(email subscriptions)) {
  235. if (defined $form->field($field) && length $form->field($field)) {
  236. userinfo_set($user_name, $field, $form->field($field)) ||
  237. error("failed to set $field");
  238. }
  239. }
  240. if (is_admin($user_name)) {
  241. set_banned_users(grep { ! is_admin($_) }
  242. split(' ',
  243. $form->field("banned_users"))) ||
  244. error("failed saving changes");
  245. }
  246. $form->text(gettext("Preferences saved."));
  247. }
  248. showform($form, $buttons, $session, $q);
  249. } #}}}
  250. sub cgi_editpage ($$) { #{{{
  251. my $q=shift;
  252. my $session=shift;
  253. my @fields=qw(do rcsinfo subpage from page type editcontent comments);
  254. my @buttons=("Save Page", "Preview", "Cancel");
  255. decode_cgi_utf8($q);
  256. eval q{use CGI::FormBuilder};
  257. error($@) if $@;
  258. my $form = CGI::FormBuilder->new(
  259. title => "editpage",
  260. fields => \@fields,
  261. charset => "utf-8",
  262. method => 'POST',
  263. required => [qw{editcontent}],
  264. javascript => 0,
  265. params => $q,
  266. action => $config{cgiurl},
  267. header => 0,
  268. table => 0,
  269. template => scalar template_params("editpage.tmpl"),
  270. wikiname => $config{wikiname},
  271. );
  272. run_hooks(formbuilder_setup => sub {
  273. shift->(form => $form, cgi => $q, session => $session,
  274. buttons => \@buttons);
  275. });
  276. # This untaint is safe because titlepage removes any problematic
  277. # characters.
  278. my ($page)=$form->field('page');
  279. $page=titlepage(possibly_foolish_untaint($page));
  280. if (! defined $page || ! length $page ||
  281. file_pruned($page, $config{srcdir}) || $page=~/^\//) {
  282. error("bad page name");
  283. }
  284. my $from;
  285. if (defined $form->field('from')) {
  286. ($from)=$form->field('from')=~/$config{wiki_file_regexp}/;
  287. }
  288. my $file;
  289. my $type;
  290. if (exists $pagesources{$page} && $form->field("do") ne "create") {
  291. $file=$pagesources{$page};
  292. $type=pagetype($file);
  293. if (! defined $type) {
  294. error(sprintf(gettext("%s is not an editable page"), $page));
  295. }
  296. if (! $form->submitted) {
  297. $form->field(name => "rcsinfo",
  298. value => rcs_prepedit($file), force => 1);
  299. }
  300. $form->field(name => "editcontent", validate => '/.*/');
  301. }
  302. else {
  303. $type=$form->param('type');
  304. if (defined $type && length $type && $hooks{htmlize}{$type}) {
  305. $type=possibly_foolish_untaint($type);
  306. }
  307. elsif (defined $from && exists $pagesources{$from}) {
  308. # favor the type of linking page
  309. $type=pagetype($pagesources{$from});
  310. }
  311. $type=$config{default_pageext} unless defined $type;
  312. $file=$page.".".$type;
  313. if (! $form->submitted) {
  314. $form->field(name => "rcsinfo", value => "", force => 1);
  315. }
  316. $form->field(name => "editcontent", validate => '/.+/');
  317. }
  318. $form->field(name => "do", type => 'hidden');
  319. $form->field(name => "from", type => 'hidden');
  320. $form->field(name => "rcsinfo", type => 'hidden');
  321. $form->field(name => "subpage", type => 'hidden');
  322. $form->field(name => "page", value => pagetitle($page, 1), force => 1);
  323. $form->field(name => "type", value => $type, force => 1);
  324. $form->field(name => "comments", type => "text", size => 80);
  325. $form->field(name => "editcontent", type => "textarea", rows => 20,
  326. cols => 80);
  327. $form->tmpl_param("can_commit", $config{rcs});
  328. $form->tmpl_param("indexlink", indexlink());
  329. $form->tmpl_param("helponformattinglink",
  330. htmllink("", "", "ikiwiki/formatting",
  331. noimageinline => 1,
  332. linktext => "FormattingHelp"));
  333. $form->tmpl_param("baseurl", baseurl());
  334. if ($form->submitted eq "Cancel") {
  335. if ($form->field("do") eq "create" && defined $from) {
  336. redirect($q, "$config{url}/".htmlpage($from));
  337. }
  338. elsif ($form->field("do") eq "create") {
  339. redirect($q, $config{url});
  340. }
  341. else {
  342. redirect($q, "$config{url}/".htmlpage($page));
  343. }
  344. return;
  345. }
  346. elsif ($form->submitted eq "Preview") {
  347. my $content=$form->field('editcontent');
  348. run_hooks(editcontent => sub {
  349. $content=shift->(
  350. content => $content,
  351. page => $page,
  352. cgi => $q,
  353. session => $session,
  354. );
  355. });
  356. $form->tmpl_param("page_preview",
  357. htmlize($page, $type,
  358. linkify($page, "",
  359. preprocess($page, $page,
  360. filter($page, $page, $content), 0, 1))));
  361. }
  362. elsif ($form->submitted eq "Save Page") {
  363. $form->tmpl_param("page_preview", "");
  364. }
  365. $form->tmpl_param("page_conflict", "");
  366. if ($form->submitted ne "Save Page" || ! $form->validate) {
  367. if ($form->field("do") eq "create") {
  368. my @page_locs;
  369. my $best_loc;
  370. if (! defined $from || ! length $from ||
  371. $from ne $form->field('from') ||
  372. file_pruned($from, $config{srcdir}) ||
  373. $from=~/^\// ||
  374. $form->submitted eq "Preview") {
  375. @page_locs=$best_loc=$page;
  376. }
  377. else {
  378. my $dir=$from."/";
  379. $dir=~s![^/]+/+$!!;
  380. if ((defined $form->field('subpage') && length $form->field('subpage')) ||
  381. $page eq gettext('discussion')) {
  382. $best_loc="$from/$page";
  383. }
  384. else {
  385. $best_loc=$dir.$page;
  386. }
  387. push @page_locs, $dir.$page;
  388. push @page_locs, "$from/$page";
  389. while (length $dir) {
  390. $dir=~s![^/]+/+$!!;
  391. push @page_locs, $dir.$page;
  392. }
  393. }
  394. push @page_locs, "$config{userdir}/$page"
  395. if length $config{userdir};
  396. @page_locs = grep {
  397. ! exists $pagecase{lc $_}
  398. } @page_locs;
  399. if (! @page_locs) {
  400. # hmm, someone else made the page in the
  401. # meantime?
  402. redirect($q, "$config{url}/".htmlpage($page));
  403. return;
  404. }
  405. my @editable_locs = grep {
  406. check_canedit($_, $q, $session, 1)
  407. } @page_locs;
  408. if (! @editable_locs) {
  409. # let it throw an error this time
  410. map { check_canedit($_, $q, $session) } @page_locs;
  411. }
  412. my @page_types;
  413. if (exists $hooks{htmlize}) {
  414. @page_types=keys %{$hooks{htmlize}};
  415. }
  416. $form->tmpl_param("page_select", 1);
  417. $form->field(name => "page", type => 'select',
  418. options => [ map { pagetitle($_, 1) } @editable_locs ],
  419. value => pagetitle($best_loc, 1));
  420. $form->field(name => "type", type => 'select',
  421. options => \@page_types);
  422. $form->title(sprintf(gettext("creating %s"), pagetitle($page)));
  423. }
  424. elsif ($form->field("do") eq "edit") {
  425. check_canedit($page, $q, $session);
  426. if (! defined $form->field('editcontent') ||
  427. ! length $form->field('editcontent')) {
  428. my $content="";
  429. if (exists $pagesources{$page}) {
  430. $content=readfile(srcfile($pagesources{$page}));
  431. $content=~s/\n/\r\n/g;
  432. }
  433. $form->field(name => "editcontent", value => $content,
  434. force => 1);
  435. }
  436. $form->tmpl_param("page_select", 0);
  437. $form->field(name => "page", type => 'hidden');
  438. $form->field(name => "type", type => 'hidden');
  439. $form->title(sprintf(gettext("editing %s"), pagetitle($page)));
  440. }
  441. showform($form, \@buttons, $session, $q);
  442. saveindex();
  443. }
  444. else {
  445. # save page
  446. check_canedit($page, $q, $session);
  447. my $exists=-e "$config{srcdir}/$file";
  448. if ($form->field("do") ne "create" && ! $exists &&
  449. ! eval { srcfile($file) }) {
  450. $form->tmpl_param("page_gone", 1);
  451. $form->field(name => "do", value => "create", force => 1);
  452. $form->tmpl_param("page_select", 0);
  453. $form->field(name => "page", type => 'hidden');
  454. $form->field(name => "type", type => 'hidden');
  455. $form->title(sprintf(gettext("editing %s"), $page));
  456. showform($form, \@buttons, $session, $q);
  457. return;
  458. }
  459. elsif ($form->field("do") eq "create" && $exists) {
  460. $form->tmpl_param("creation_conflict", 1);
  461. $form->field(name => "do", value => "edit", force => 1);
  462. $form->tmpl_param("page_select", 0);
  463. $form->field(name => "page", type => 'hidden');
  464. $form->field(name => "type", type => 'hidden');
  465. $form->title(sprintf(gettext("editing %s"), $page));
  466. $form->field("editcontent",
  467. value => readfile("$config{srcdir}/$file").
  468. "\n\n\n".$form->field("editcontent"),
  469. force => 1);
  470. showform($form, \@buttons, $session, $q);
  471. return;
  472. }
  473. my $content=$form->field('editcontent');
  474. run_hooks(editcontent => sub {
  475. $content=shift->(
  476. content => $content,
  477. page => $page,
  478. cgi => $q,
  479. session => $session,
  480. );
  481. });
  482. $content=~s/\r\n/\n/g;
  483. $content=~s/\r/\n/g;
  484. $content.="\n" if $content !~ /\n$/;
  485. $config{cgi}=0; # avoid cgi error message
  486. eval { writefile($file, $config{srcdir}, $content) };
  487. $config{cgi}=1;
  488. if ($@) {
  489. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  490. force => 1);
  491. $form->tmpl_param("failed_save", 1);
  492. $form->tmpl_param("error_message", $@);
  493. $form->field("editcontent", value => $content, force => 1);
  494. $form->tmpl_param("page_select", 0);
  495. $form->field(name => "page", type => 'hidden');
  496. $form->field(name => "type", type => 'hidden');
  497. $form->title(sprintf(gettext("editing %s"), $page));
  498. showform($form, \@buttons, $session, $q);
  499. return;
  500. }
  501. my $conflict;
  502. if ($config{rcs}) {
  503. my $message="";
  504. if (defined $form->field('comments') &&
  505. length $form->field('comments')) {
  506. $message=$form->field('comments');
  507. }
  508. if (! $exists) {
  509. rcs_add($file);
  510. }
  511. # Prevent deadlock with post-commit hook by
  512. # signaling to it that it should not try to
  513. # do anything (except send commit mails).
  514. disable_commit_hook();
  515. $conflict=rcs_commit($file, $message,
  516. $form->field("rcsinfo"),
  517. $session->param("name"), $ENV{REMOTE_ADDR});
  518. enable_commit_hook();
  519. rcs_update();
  520. }
  521. # Refresh even if there was a conflict, since other changes
  522. # may have been committed while the post-commit hook was
  523. # disabled.
  524. require IkiWiki::Render;
  525. # Reload index, since the first time it's loaded is before
  526. # the wiki is locked, and things may have changed in the
  527. # meantime.
  528. loadindex();
  529. refresh();
  530. saveindex();
  531. if (defined $conflict) {
  532. $form->field(name => "rcsinfo", value => rcs_prepedit($file),
  533. force => 1);
  534. $form->tmpl_param("page_conflict", 1);
  535. $form->field("editcontent", value => $conflict, force => 1);
  536. $form->field("do", "edit", force => 1);
  537. $form->tmpl_param("page_select", 0);
  538. $form->field(name => "page", type => 'hidden');
  539. $form->field(name => "type", type => 'hidden');
  540. $form->title(sprintf(gettext("editing %s"), $page));
  541. showform($form, \@buttons, $session, $q);
  542. return;
  543. }
  544. else {
  545. # The trailing question mark tries to avoid broken
  546. # caches and get the most recent version of the page.
  547. redirect($q, "$config{url}/".htmlpage($page)."?updated");
  548. }
  549. }
  550. } #}}}
  551. sub cgi_getsession ($) { #{{{
  552. my $q=shift;
  553. eval q{use CGI::Session};
  554. CGI::Session->name("ikiwiki_session_".encode_utf8($config{wikiname}));
  555. my $oldmask=umask(077);
  556. my $session = CGI::Session->new("driver:DB_File", $q,
  557. { FileName => "$config{wikistatedir}/sessions.db" });
  558. umask($oldmask);
  559. return $session;
  560. } #}}}
  561. sub cgi_savesession ($) { #{{{
  562. my $session=shift;
  563. # Force session flush with safe umask.
  564. my $oldmask=umask(077);
  565. $session->flush;
  566. umask($oldmask);
  567. } #}}}
  568. sub cgi (;$$) { #{{{
  569. my $q=shift;
  570. my $session=shift;
  571. if (! $q) {
  572. eval q{use CGI};
  573. error($@) if $@;
  574. $q=CGI->new;
  575. run_hooks(cgi => sub { shift->($q) });
  576. }
  577. my $do=$q->param('do');
  578. if (! defined $do || ! length $do) {
  579. my $error = $q->cgi_error;
  580. if ($error) {
  581. error("Request not processed: $error");
  582. }
  583. else {
  584. error("\"do\" parameter missing");
  585. }
  586. }
  587. # Things that do not need a session.
  588. if ($do eq 'recentchanges') {
  589. cgi_recentchanges($q);
  590. return;
  591. }
  592. # Need to lock the wiki before getting a session.
  593. lockwiki();
  594. if (! $session) {
  595. $session=cgi_getsession($q);
  596. }
  597. # Auth hooks can sign a user in.
  598. if ($do ne 'signin' && ! defined $session->param("name")) {
  599. run_hooks(auth => sub {
  600. shift->($q, $session)
  601. });
  602. if (defined $session->param("name")) {
  603. # Make sure whatever user was authed is in the
  604. # userinfo db.
  605. if (! userinfo_get($session->param("name"), "regdate")) {
  606. userinfo_setall($session->param("name"), {
  607. email => "",
  608. password => "",
  609. regdate => time,
  610. }) || error("failed adding user");
  611. }
  612. }
  613. }
  614. if (defined $session->param("name") &&
  615. userinfo_get($session->param("name"), "banned")) {
  616. print $q->header(-status => "403 Forbidden");
  617. $session->delete();
  618. print gettext("You are banned.");
  619. cgi_savesession($session);
  620. }
  621. run_hooks(sessioncgi => sub { shift->($q, $session) });
  622. if ($do eq 'signin') {
  623. cgi_signin($q, $session);
  624. cgi_savesession($session);
  625. }
  626. elsif ($do eq 'prefs') {
  627. cgi_prefs($q, $session);
  628. }
  629. elsif ($do eq 'create' || $do eq 'edit') {
  630. cgi_editpage($q, $session);
  631. }
  632. elsif (defined $session->param("postsignin")) {
  633. cgi_postsignin($q, $session);
  634. }
  635. else {
  636. error("unknown do parameter");
  637. }
  638. } #}}}
  639. sub userlink ($) { #{{{
  640. my $user=shift;
  641. eval q{use CGI 'escapeHTML'};
  642. error($@) if $@;
  643. if ($user =~ m!^https?://! &&
  644. eval q{use Net::OpenID::VerifiedIdentity; 1} && !$@) {
  645. # Munge user-urls, as used by eg, OpenID.
  646. my $oid=Net::OpenID::VerifiedIdentity->new(identity => $user);
  647. my $display=$oid->display;
  648. # Convert "user.somehost.com" to "user [somehost.com]".
  649. if ($display !~ /\[/) {
  650. $display=~s/^(.*?)\.([^.]+\.[a-z]+)$/$1 [$2]/;
  651. }
  652. # Convert "http://somehost.com/user" to "user [somehost.com]".
  653. if ($display !~ /\[/) {
  654. $display=~s/^https?:\/\/(.+)\/([^\/]+)$/$2 [$1]/;
  655. }
  656. $display=~s!^https?://!!; # make sure this is removed
  657. return "<a href=\"$user\">".escapeHTML($display)."</a>";
  658. }
  659. else {
  660. return htmllink("", "", escapeHTML(
  661. length $config{userdir} ? $config{userdir}."/".$user : $user
  662. ), noimageinline => 1);
  663. }
  664. } #}}}
  665. 1