9 use open qw{:utf8 :std};
15 if ($config{sslcookie}) {
16 print $session->header(-charset => 'utf-8',
17 -cookie => $session->cookie(-httponly => 1, -secure => 1));
20 print $session->header(-charset => 'utf-8',
21 -cookie => $session->cookie(-httponly => 1));
31 if (exists $hooks{formbuilder}) {
32 run_hooks(formbuilder => sub {
33 shift->(form => $form, cgi => $cgi, session => $session,
41 sub showform ($$$$;@) {
42 my $form=prepform(@_);
48 printheader($session);
49 print misctemplate($form->title, $form->render(submit => $buttons), @_);
55 my $url=URI->new(shift);
56 if (! $config{w3mmode}) {
57 print $q->redirect($url);
60 print "Content-type: text/plain\n";
61 print "W3m-control: GOTO $url\n\n";
65 sub decode_cgi_utf8 ($) {
66 # decode_form_utf8 method is needed for 5.01
69 foreach my $f ($cgi->param) {
70 $cgi->param($f, map { decode_utf8 $_ } $cgi->param($f));
75 sub decode_form_utf8 ($) {
78 foreach my $f ($form->field) {
79 my @value=map { decode_utf8($_) } $form->field($f);
80 $form->field(name => $f,
88 # Check if the user is signed in. If not, redirect to the signin form and
89 # save their place to return to later.
94 if (! defined $session->param("name") ||
95 ! userinfo_get($session->param("name"), "regdate")) {
96 $session->param(postsignin => $ENV{QUERY_STRING});
97 cgi_signin($q, $session);
98 cgi_savesession($session);
103 sub cgi_signin ($$;$) {
106 my $returnhtml=shift;
109 eval q{use CGI::FormBuilder};
111 my $form = CGI::FormBuilder->new(
119 action => $config{cgiurl},
121 template => {type => 'div'},
124 # MITLOGIN: These should be restored when logins are allowed again.
125 #my $buttons=["Login"];
128 $form->field(name => "do", type => "hidden", value => "signin",
131 decode_form_utf8($form);
132 run_hooks(formbuilder_setup => sub {
133 shift->(form => $form, cgi => $q, session => $session,
134 buttons => $buttons);
136 decode_form_utf8($form);
138 if ($form->submitted) {
143 $form=prepform($form, $buttons, $session, $q);
144 return $form->render(submit => $buttons);
147 showform($form, $buttons, $session, $q);
150 sub cgi_postsignin ($$) {
154 # Continue with whatever was being done before the signin process.
155 if (defined $session->param("postsignin")) {
156 my $postsignin=CGI->new($session->param("postsignin"));
157 $session->clear("postsignin");
158 cgi($postsignin, $session);
159 cgi_savesession($session);
163 if ($config{sslcookie} && ! $q->https()) {
164 error(gettext("probable misconfiguration: sslcookie is set, but you are attempting to login via http, not https"));
167 error(gettext("login failed, perhaps you need to turn on cookies?"));
176 needsignin($q, $session);
179 # The session id is stored on the form and checked to
180 # guard against CSRF.
181 my $sid=$q->param('sid');
182 if (! defined $sid) {
185 elsif ($sid ne $session->id) {
186 error(gettext("Your login session has expired."));
189 eval q{use CGI::FormBuilder};
191 my $form = CGI::FormBuilder->new(
192 title => "preferences",
193 name => "preferences",
203 action => $config{cgiurl},
204 template => {type => 'div'},
207 [login => gettext("Login")],
208 [preferences => gettext("Preferences")],
209 [admin => gettext("Admin")]
212 my $buttons=["Save Preferences", "Logout", "Cancel"];
214 decode_form_utf8($form);
215 run_hooks(formbuilder_setup => sub {
216 shift->(form => $form, cgi => $q, session => $session,
217 buttons => $buttons);
219 decode_form_utf8($form);
221 $form->field(name => "do", type => "hidden", value => "prefs",
223 $form->field(name => "sid", type => "hidden", value => $session->id,
225 #$form->field(name => "email", size => 50, fieldset => "preferences");
226 $form->field(name => "realname", size => 50, fieldset => "preferences");
228 my $user_name=$session->param("name");
230 if (! $form->submitted) {
231 #$form->field(name => "email", force => 1,
232 #value => userinfo_get($user_name, "email"));
233 $form->field(name => "realname", force => 1,
234 value => userinfo_get($user_name, "realname"));
237 if ($form->submitted eq 'Logout') {
239 redirect($q, $config{url});
242 elsif ($form->submitted eq 'Cancel') {
243 redirect($q, $config{url});
246 elsif ($form->submitted eq 'Save Preferences' && $form->validate) {
247 if (defined $form->field('email')) {
248 userinfo_set($user_name, 'email', $form->field('email')) ||
249 error("failed to set email");
251 if (defined $form->field('realname')) {
252 userinfo_set($user_name, 'realname', $form->field('realname')) ||
253 error("failed to set realname");
255 $form->text(gettext("Preferences saved."));
258 showform($form, $buttons, $session, $q);
261 sub cgi_custom_failure ($$$) {
263 my $httpstatus=shift;
267 -status => $httpstatus,
272 # Internet Explod^Hrer won't show custom 404 responses
273 # unless they're >= 512 bytes
279 sub check_banned ($$) {
284 my $name=$session->param("name");
286 grep { $name eq $_ } @{$config{banned_users}}) {
290 foreach my $b (@{$config{banned_users}}) {
291 if (pagespec_match("", $b,
292 ip => $ENV{REMOTE_ADDR},
293 name => defined $name ? $name : "",
302 cgi_savesession($session);
305 gettext("You are banned."));
309 sub cgi_getsession ($) {
312 eval q{use CGI::Session; use HTML::Entities};
314 CGI::Session->name("ikiwiki_session_".encode_entities($config{wikiname}));
316 my $oldmask=umask(077);
318 CGI::Session->new("driver:DB_File", $q,
319 { FileName => "$config{wikistatedir}/sessions.db" })
321 if (! $session || $@) {
322 error($@." ".CGI::Session->errstr());
330 # To guard against CSRF, the user's session id (sid)
331 # can be stored on a form. This function will check
332 # (for logged in users) that the sid on the form matches
333 # the session id in the cookie.
334 sub checksessionexpiry ($$) {
338 if (defined $session->param("name")) {
339 my $sid=$q->param('sid');
340 if (! defined $sid || $sid ne $session->id) {
341 error(gettext("Your login session has expired."));
346 sub cgi_savesession ($) {
349 # Force session flush with safe umask.
350 my $oldmask=umask(077);
361 $CGI::DISABLE_UPLOADS=$config{cgi_disable_uploads};
366 binmode(STDIN, ":utf8");
368 run_hooks(cgi => sub { shift->($q) });
371 my $do=$q->param('do');
372 if (! defined $do || ! length $do) {
373 my $error = $q->cgi_error;
375 error("Request not processed: $error");
378 error("\"do\" parameter missing");
382 # Need to lock the wiki before getting a session.
387 $session=cgi_getsession($q);
390 # Auth hooks can sign a user in.
391 if ($do ne 'signin' && ! defined $session->param("name")) {
392 run_hooks(auth => sub {
393 shift->($q, $session)
395 if (defined $session->param("name")) {
396 # Make sure whatever user was authed is in the
398 if (! userinfo_get($session->param("name"), "regdate")) {
399 userinfo_setall($session->param("name"), {
403 }) || error("failed adding user");
408 check_banned($q, $session);
410 run_hooks(sessioncgi => sub { shift->($q, $session) });
412 if ($do eq 'signin') {
413 cgi_signin($q, $session);
414 cgi_savesession($session);
416 elsif ($do eq 'prefs') {
417 cgi_prefs($q, $session);
419 elsif (defined $session->param("postsignin") || $do eq 'postsignin') {
420 cgi_postsignin($q, $session);
423 error("unknown do parameter");
427 # Does not need to be called directly; all errors will go through here.
431 print "Content-type: text/html\n\n";
432 print misctemplate(gettext("Error"),
433 "<p class=\"error\">".gettext("Error").": $message</p>");