2 rcs_id('$Id: Request.php,v 1.98 2005-09-18 15:15:53 rurban Exp $');
4 Copyright (C) 2002,2004,2005 $ThePhpWikiProgrammingTeam
6 This file is part of PhpWiki.
8 PhpWiki is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 PhpWiki is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with PhpWiki; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 // backward compatibility for PHP < 4.2.0
24 if (!function_exists('ob_clean')) {
34 $this->_fix_magic_quotes_gpc();
35 $this->_fix_multipart_form_data();
37 switch($this->get('REQUEST_METHOD')) {
40 $this->args = &$GLOBALS['HTTP_GET_VARS'];
43 $this->args = &$GLOBALS['HTTP_POST_VARS'];
46 $this->args = array();
50 $this->session = new Request_SessionVars;
51 $this->cookies = new Request_CookieVars;
53 if (ACCESS_LOG or ACCESS_LOG_SQL) {
54 $this->_accesslog = new Request_AccessLog(ACCESS_LOG, ACCESS_LOG_SQL);
57 $GLOBALS['request'] = $this;
61 if (!empty($GLOBALS['HTTP_SERVER_VARS']))
62 $vars = &$GLOBALS['HTTP_SERVER_VARS'];
63 else // cgi or other servers than Apache
64 $vars = &$GLOBALS['HTTP_ENV_VARS'];
66 if (isset($vars[$key]))
71 $addr = $vars['REMOTE_ADDR'];
72 if (defined('ENABLE_REVERSE_DNS') && ENABLE_REVERSE_DNS)
73 return $vars[$key] = gethostbyaddr($addr);
81 function getArg($key) {
82 if (isset($this->args[$key]))
83 return $this->args[$key];
91 function setArg($key, $val) {
93 unset($this->args[$key]);
95 $this->args[$key] = $val;
98 // Well oh well. Do we really want to pass POST params back as GET?
99 function getURLtoSelf($args = false, $exclude = array()) {
100 $get_args = $this->args;
102 $get_args = array_merge($get_args, $args);
104 // Err... good point...
106 if ($this->isPost()) {
107 $exclude = array_merge($exclude, array('action','auth'));
108 //$get_args = $args; // or only the provided
110 trigger_error("Request::getURLtoSelf() should probably not be from POST",
115 foreach ($exclude as $ex) {
116 if (!empty($get_args[$ex])) unset($get_args[$ex]);
119 $pagename = $get_args['pagename'];
120 unset ($get_args['pagename']);
121 if (!empty($get_args['action']) and $get_args['action'] == 'browse')
122 unset($get_args['action']);
124 return WikiURL($pagename, $get_args);
128 return $this->get("REQUEST_METHOD") == "POST";
131 function isGetOrHead () {
132 return in_array($this->get('REQUEST_METHOD'),
133 array('GET', 'HEAD'));
136 function httpVersion() {
137 if (!preg_match('@HTTP\s*/\s*(\d+.\d+)@', $this->get('SERVER_PROTOCOL'), $m))
139 return (float) $m[1];
142 /* Redirects after edit may fail if no theme signature image is defined.
143 * Set DISABLE_HTTP_REDIRECT = true then.
145 function redirect($url, $noreturn = true) {
146 $bogus = defined('DISABLE_HTTP_REDIRECT') && DISABLE_HTTP_REDIRECT;
149 header("Location: $url");
151 * "302 Found" is not really meant to be sent in response
152 * to a POST. Worse still, according to (both HTTP 1.0
153 * and 1.1) spec, the user, if it is sent, the user agent
154 * is supposed to use the same method to fetch the
155 * redirected URI as the original.
157 * That means if we redirect from a POST, the user-agent
158 * supposed to generate another POST. Not what we want.
159 * (We do this after a page save after all.)
161 * Fortunately, most/all browsers don't do that.
163 * "303 See Other" is what we really want. But it only
166 * FIXME: this is still not spec compliant for HTTP
169 $status = $this->httpVersion() >= 1.1 ? 303 : 302;
170 $this->setStatus($status);
174 $this->discardOutput(); // This might print the gzip headers. Not good.
175 $this->buffer_output(false);
177 include_once('lib/Template.php');
178 $tmpl = new Template('redirect', $this, array('REDIRECT_URL' => $url));
183 // Safari needs window.location.href = targeturl
185 function redirect(url) {
186 if (typeof location.replace == 'function')
187 location.replace(url);
188 else if (typeof location.assign == 'function')
189 location.assign(url);
190 else if (self.location.href)
191 self.location.href = url;
193 window.location = url;
195 redirect('" . addslashes($url) . "')");
199 /** Set validators for this response.
201 * This sets a (possibly incomplete) set of validators
204 * The validator set can be extended using appendValidators().
206 * When you're all done setting and appending validators, you
207 * must call checkValidators() to check them and set the
208 * appropriate headers in the HTTP response.
212 * $request->setValidators(array('pagename' => $pagename,
213 * '%mtime' => $rev->get('mtime')));
215 * // Wups... response content depends on $otherpage, too...
216 * $request->appendValidators(array('otherpage' => $otherpagerev->getPageName(),
217 * '%mtime' => $otherpagerev->get('mtime')));
219 * // After all validators have been set:
220 * $request->checkValidators();
222 function setValidators($validator_set) {
223 if (is_array($validator_set))
224 $validator_set = new HTTP_ValidatorSet($validator_set);
225 $this->_validators = $validator_set;
228 /** Append more validators for this response.
229 * i.e dependencies on other pages mtimes
230 * now it may be called in init also to simplify client code.
232 function appendValidators($validator_set) {
233 if (!isset($this->_validators)) {
234 $this->setValidators($validator_set);
237 $this->_validators->append($validator_set);
240 /** Check validators and set headers in HTTP response
242 * This sets the appropriate "Last-Modified" and "ETag"
243 * headers in the HTTP response.
245 * Additionally, if the validators match any(all) conditional
246 * headers in the HTTP request, this method will not return, but
247 * instead will send "304 Not Modified" or "412 Precondition
248 * Failed" (as appropriate) back to the client.
250 function checkValidators() {
251 $validators = &$this->_validators;
253 // Set validator headers
254 if ($this->_is_buffering_output or !headers_sent()) {
255 if (($etag = $validators->getETag()) !== false)
256 header("ETag: " . $etag->asString());
257 if (($mtime = $validators->getModificationTime()) !== false)
258 header("Last-Modified: " . Rfc1123DateTime($mtime));
260 // Set cache control headers
261 $this->cacheControl();
264 if (CACHE_CONTROL == 'NO_CACHE')
265 return; // don't check conditionals...
267 // Check conditional headers in request
268 $status = $validators->checkConditionalRequest($this);
270 // Return short response due to failed conditionals
271 $this->setStatus($status);
273 $this->discardOutput();
279 /** Set the cache control headers in the HTTP response.
281 function cacheControl($strategy=CACHE_CONTROL, $max_age=CACHE_CONTROL_MAX_AGE) {
282 if ($strategy == 'NO_CACHE') {
283 $cache_control = "no-cache"; // better set private. See Pear HTTP_Header
286 elseif ($strategy == 'ALLOW_STALE' && $max_age > 0) {
287 $cache_control = sprintf("max-age=%d", $max_age);
290 $cache_control = "must-revalidate";
293 header("Cache-Control: $cache_control");
294 header("Expires: " . Rfc1123DateTime(time() + $max_age));
295 header("Vary: Cookie"); // FIXME: add more here?
298 function setStatus($status) {
299 if (preg_match('|^HTTP/.*?\s(\d+)|i', $status, $m)) {
304 $status = (integer) $status;
305 $reason = array('200' => 'OK',
307 '303' => 'See Other',
308 '304' => 'Not Modified',
309 '400' => 'Bad Request',
310 '401' => 'Unauthorized',
311 '403' => 'Forbidden',
312 '404' => 'Not Found',
313 '412' => 'Precondition Failed');
314 // FIXME: is it always okay to send HTTP/1.1 here, even for older clients?
315 header(sprintf("HTTP/1.1 %d %s", $status, $reason[$status]));
318 if (isset($this->_log_entry))
319 $this->_log_entry->setStatus($status);
322 function buffer_output($compress = true) {
323 // FIXME: disables sessions (some byte before all headers_sent())
324 /*if (defined('USECACHE') and !USECACHE) {
325 $this->_is_buffering_output = false;
328 if (defined('COMPRESS_OUTPUT')) {
329 if (!COMPRESS_OUTPUT)
332 elseif (!check_php_version(4,2,3))
334 elseif (isCGI()) // necessary?
337 if ($this->getArg('start_debug'))
339 // Should we compress even when apache_note is not available?
340 // sf.net bug #933183 and http://bugs.php.net/17557
341 // This effectively eliminates CGI, but all other servers also. hmm.
343 and (!function_exists('ob_gzhandler')
344 or !function_exists('apache_note')))
346 // http://www.php.net/ob_gzhandler "output handler 'ob_gzhandler' cannot be used twice"
347 if ($compress and ini_get("zlib.output_compression"))
350 // New: we check for the client Accept-Encoding: "gzip" presence also
351 // This should eliminate a lot or reported problems.
353 and (!$this->get("HTTP_ACCEPT_ENCODING")
354 or !strstr($this->get("HTTP_ACCEPT_ENCODING"), "gzip")))
357 // Most RSS clients are NOT(!) application/xml gzip compatible yet.
358 // Even if they are sending the accept-encoding gzip header!
359 // wget is, Mozilla, and MSIE no.
360 // Of the RSS readers only MagpieRSS 0.5.2 is. http://www.rssgov.com/rssparsers.html
361 // See also http://phpwiki.sourceforge.net/phpwiki/KnownBugs
363 and $this->getArg('format')
364 and strstr($this->getArg('format'), 'rss'))
368 ob_start('ob_gzhandler');
370 // dont send a length or get the gzipp'ed data length.
371 $this->_is_compressing_output = true;
372 header("Content-Encoding: gzip");
374 * Attempt to prevent Apache from doing the dreaded double-gzip.
376 * It would be better if we could detect when apache was going
377 * to zip for us, and then let it ... but I have yet to figure
378 * out how to do that.
380 if (function_exists('apache_note'))
381 @apache_note('no-gzip', 1);
384 // Now we alway buffer output.
385 // This is so we can set HTTP headers (e.g. for redirect)
387 // FIXME: change the name of this method.
389 $this->_is_compressing_output = false;
391 $this->_is_buffering_output = true;
392 $this->_ob_get_length = 0;
395 function discardOutput() {
396 if (!empty($this->_is_buffering_output)) {
398 $this->_is_buffering_output = false;
400 trigger_error("Not buffering output", E_USER_NOTICE);
405 * Longer texts need too much memory on tiny or memory-limit=8MB systems.
406 * We might want to flush our buffer and restart again.
407 * (This would be fine if php would release its memory)
408 * Note that this must not be called inside Template expansion or other
409 * sections with ob_buffering.
411 function chunkOutput() {
412 if (!empty($this->_is_buffering_output) or
413 (function_exists('ob_get_level') and @ob_get_level())) {
414 $this->_do_chunked_output = true;
415 if (empty($this->_ob_get_length)) $this->_ob_get_length = 0;
416 $this->_ob_get_length += ob_get_length();
417 while (@ob_end_flush());
424 $this->_finishing = true;
425 if (!empty($this->_accesslog)) {
426 $this->_accesslog->push($this);
427 if (empty($this->_do_chunked_output))
428 $this->_ob_get_length = ob_get_length();
429 $this->_accesslog->setSize($this->_ob_get_length);
431 if ($RUNTIMER) $this->_accesslog->setDuration($RUNTIMER->getTime());
432 // sql logging must be done before the db is closed.
433 if ($this->_accesslog->logtable)
434 $this->_accesslog->write_sql();
437 if (!empty($this->_is_buffering_output)) {
438 /* This cannot work because it might destroy xml markup */
440 if (0 and $GLOBALS['SearchHighLightQuery'] and check_php_version(4,2)) {
441 $html = str_replace($GLOBALS['SearchHighLightQuery'],
442 '<span class="search-term">'.$GLOBALS['SearchHighLightQuery'].'</span>',
445 header(sprintf("Content-Length: %d", strlen($html)));
449 // if _is_compressing_output then ob_get_length() returns
450 // the uncompressed length, not the gzip'ed as required.
451 if (!headers_sent() and ! $this->_is_compressing_output) {
452 if (empty($this->_do_chunked_output)) {
453 $this->_ob_get_length = ob_get_length();
455 header(sprintf("Content-Length: %d", $this->_ob_get_length));
457 $this->_is_buffering_output = false;
460 while (@ob_end_flush()); // hmm. there's some error in redirect
461 session_write_close();
462 if (!empty($this->_dbi)) {
463 $this->_dbi->close();
470 function getSessionVar($key) {
471 return $this->session->get($key);
473 function setSessionVar($key, $val) {
474 if ($key == 'wiki_user') {
475 if (empty($val->page))
476 $val->page = $this->getArg('pagename');
477 if (empty($val->action))
478 $val->action = $this->getArg('action');
479 // avoid recursive objects and session resource handles
480 // avoid overlarge session data (max 4000 byte!)
481 if (isset($val->_group)) {
482 unset($val->_group->_request);
483 unset($val->_group->user);
485 if (ENABLE_USER_NEW) {
486 unset($val->_HomePagehandle);
487 unset($val->_auth_dbi);
490 unset($val->_authdbi);
491 unset($val->_homepage);
492 unset($val->_request);
495 return $this->session->set($key, $val);
497 function deleteSessionVar($key) {
498 return $this->session->delete($key);
501 function getCookieVar($key) {
502 return $this->cookies->get($key);
504 function setCookieVar($key, $val, $lifetime_in_days = false, $path = false) {
505 return $this->cookies->set($key, $val, $lifetime_in_days, $path);
507 function deleteCookieVar($key) {
508 return $this->cookies->delete($key);
511 function getUploadedFile($key) {
512 return Request_UploadedFile::getUploadedFile($key);
516 function _fix_magic_quotes_gpc() {
517 $needs_fix = array('HTTP_POST_VARS',
524 if (get_magic_quotes_gpc()) {
525 foreach ($needs_fix as $vars)
526 $this->_stripslashes($GLOBALS[$vars]);
530 function _stripslashes(&$var) {
531 if (is_array($var)) {
532 foreach ($var as $key => $val)
533 $this->_stripslashes($var[$key]);
535 elseif (is_string($var))
536 $var = stripslashes($var);
539 function _fix_multipart_form_data () {
540 if (preg_match('|^multipart/form-data|', $this->get('CONTENT_TYPE')))
541 $this->_strip_leading_nl($GLOBALS['HTTP_POST_VARS']);
544 function _strip_leading_nl(&$var) {
545 if (is_array($var)) {
546 foreach ($var as $key => $val)
547 $this->_strip_leading_nl($var[$key]);
549 elseif (is_string($var))
550 $var = preg_replace('|^\r?\n?|', '', $var);
554 class Request_SessionVars {
555 function Request_SessionVars() {
556 // Prevent cacheing problems with IE 5
557 session_cache_limiter('none');
559 // Avoid to get a notice if session is already started,
560 // for example if session.auto_start is activated
566 $vars = &$GLOBALS['HTTP_SESSION_VARS'];
567 if (isset($vars[$key]))
572 function set($key, $val) {
573 $vars = &$GLOBALS['HTTP_SESSION_VARS'];
574 if (!function_usable('get_cfg_var') or get_cfg_var('register_globals')) {
575 // This is funky but necessary, at least in some PHP's
576 $GLOBALS[$key] = $val;
579 if (isset($_SESSION))
580 $_SESSION[$key] = $val;
581 session_register($key);
584 function delete($key) {
585 $vars = &$GLOBALS['HTTP_SESSION_VARS'];
586 if (!function_usable('ini_get') or ini_get('register_globals'))
587 unset($GLOBALS[$key]);
588 if (DEBUG) trigger_error("delete session $key", E_USER_WARNING);
590 session_unregister($key);
594 class Request_CookieVars {
597 $vars = &$GLOBALS['HTTP_COOKIE_VARS'];
598 if (isset($vars[$key])) {
599 @$val = unserialize(base64_decode($vars[$key]));
602 @$val = urldecode($vars[$key]);
609 function get_old($key) {
610 $vars = &$GLOBALS['HTTP_COOKIE_VARS'];
611 if (isset($vars[$key])) {
612 @$val = unserialize(base64_decode($vars[$key]));
615 @$val = unserialize($vars[$key]);
625 function set($key, $val, $persist_days = false, $path = false) {
626 // if already defined, ignore
627 if (defined('MAIN_setUser') and $key = 'WIKI_ID') return;
628 if (defined('WIKI_XMLRPC') and WIKI_XMLRPC) return;
630 $vars = &$GLOBALS['HTTP_COOKIE_VARS'];
631 if (is_numeric($persist_days)) {
632 $expires = time() + (24 * 3600) * $persist_days;
637 if (is_array($val) or is_object($val))
638 $packedval = base64_encode(serialize($val));
640 $packedval = urlencode($val);
641 $vars[$key] = $packedval;
642 @$_COOKIE[$key] = $packedval;
644 @setcookie($key, $packedval, $expires, $path);
646 @setcookie($key, $packedval, $expires);
649 function delete($key) {
650 static $deleted = array();
651 if (isset($deleted[$key])) return;
652 if (defined('WIKI_XMLRPC') and WIKI_XMLRPC) return;
654 $vars = &$GLOBALS['HTTP_COOKIE_VARS'];
655 if (!defined('COOKIE_DOMAIN'))
656 @setcookie($key, '', 0);
658 @setcookie($key, '', 0, COOKIE_DOMAIN);
659 unset($GLOBALS['HTTP_COOKIE_VARS'][$key]);
660 unset($_COOKIE[$key]);
667 You must set "upload_tmp_dir" = "/tmp/" or "C:/tmp/"
668 Best on the same drive as apache, with forward slashes
669 and with ending slash!
670 Otherwise "\\" => "" and the uploaded file will not be found.
672 class Request_UploadedFile {
673 function getUploadedFile($postname) {
674 global $HTTP_POST_FILES;
676 // Against php5 with !ini_get('register-long-arrays'). See Bug #1180115
677 if (empty($HTTP_POST_FILES) and !empty($_FILES))
678 $HTTP_POST_FILES =& $_FILES;
679 if (!isset($HTTP_POST_FILES[$postname]))
682 $fileinfo =& $HTTP_POST_FILES[$postname];
683 if ($fileinfo['error']) {
684 // See https://sourceforge.net/forum/message.php?msg_id=3093651
685 $err = (int) $fileinfo['error'];
686 // errmsgs by Shilad Sen
689 trigger_error(_("Upload error: file too big"), E_USER_WARNING);
692 trigger_error(_("Upload error: file too big"), E_USER_WARNING);
695 trigger_error(_("Upload error: file only partially recieved"), E_USER_WARNING);
698 trigger_error(_("Upload error: no file selected"), E_USER_WARNING);
701 trigger_error(_("Upload error: unknown error #") . $err, E_USER_WARNING);
706 // With windows/php 4.2.1 is_uploaded_file() always returns false.
707 // Be sure that upload_tmp_dir ends with a slash!
708 if (!is_uploaded_file($fileinfo['tmp_name'])) {
710 if (!$tmp_file = get_cfg_var('upload_tmp_dir')) {
711 $tmp_file = dirname(tempnam('', ''));
713 $tmp_file .= '/' . basename($fileinfo['tmp_name']);
714 /* but ending slash in php.ini upload_tmp_dir is required. */
715 if (realpath(ereg_replace('/+', '/', $tmp_file)) != realpath($fileinfo['tmp_name'])) {
716 trigger_error(sprintf("Uploaded tmpfile illegal: %s != %s.",$tmp_file, $fileinfo['tmp_name']).
718 "Probably illegal TEMP environment or upload_tmp_dir setting.",
723 trigger_error(sprintf("Workaround for PHP/Windows is_uploaded_file() problem for %s.",
724 $fileinfo['tmp_name'])."\n".
725 "Probably illegal TEMP environment or upload_tmp_dir setting.",
731 trigger_error(sprintf("Uploaded tmpfile %s not found.", $fileinfo['tmp_name'])."\n".
732 " Probably illegal TEMP environment or upload_tmp_dir setting.",
736 return new Request_UploadedFile($fileinfo);
739 function Request_UploadedFile($fileinfo) {
740 $this->_info = $fileinfo;
744 return $this->_info['size'];
748 return $this->_info['name'];
752 return $this->_info['type'];
755 function getTmpName() {
756 return $this->_info['tmp_name'];
760 if ( ($fd = fopen($this->_info['tmp_name'], "rb")) ) {
761 if ($this->getSize() < filesize($this->_info['tmp_name'])) {
762 // FIXME: Some PHP's (or is it some browsers?) put
763 // HTTP/MIME headers in the file body, some don't.
765 // At least, I think that's the case. I know I used
766 // to need this code, now I don't.
768 // This code is more-or-less untested currently.
770 // Dump HTTP headers.
771 while ( ($header = fgets($fd, 4096)) ) {
772 if (trim($header) == '') {
775 else if (!preg_match('/^content-(length|type):/i', $header)) {
785 function getContents() {
787 $data = fread($fd, $this->getSize());
794 * Create NCSA "combined" log entry for current request.
795 * Also needed for advanced spam prevention.
796 * global object holding global state (sql or file, entries, to dump)
798 class Request_AccessLog {
800 * @param $logfile string Log file name.
802 function Request_AccessLog ($logfile, $do_sql = false) {
803 //global $request; // request not yet initialized!
805 $this->logfile = $logfile;
806 if ($logfile and !is_writeable($logfile)) {
808 (sprintf(_("%s is not writable."), _("The PhpWiki access log file"))
810 . sprintf(_("Please ensure that %s is writable, or redefine %s in config/config.ini."),
811 sprintf(_("the file '%s'"), ACCESS_LOG),
815 //$request->_accesslog =& $this;
816 //if (empty($request->_accesslog->entries))
817 register_shutdown_function("Request_AccessLogEntry_shutdown_function");
821 if (!in_array($DBParams['dbtype'], array('SQL','ADODB'))) {
822 trigger_error("Unsupported database backend for ACCESS_LOG_SQL.\nNeed DATABASE_TYPE=SQL or ADODB");
824 //$this->_dbi =& $request->_dbi;
825 $this->logtable = (!empty($DBParams['prefix']) ? $DBParams['prefix'] : '')."accesslog";
828 $this->entries = array();
829 $this->entries[] = new Request_AccessLogEntry($this);
832 function _do($cmd, &$arg) {
834 for ($i=0; $i < count($this->entries);$i++)
835 $this->entries[$i]->$cmd($arg);
837 function push(&$request) { $this->_do('push',$request); }
838 function setSize($arg) { $this->_do('setSize',$arg); }
839 function setStatus($arg) { $this->_do('setStatus',$arg); }
840 function setDuration($arg) { $this->_do('setDuration',$arg); }
843 * Read sequentially all previous entries from the beginning.
844 * while ($logentry = Request_AccessLogEntry::read()) ;
845 * For internal log analyzers: RecentReferrers, WikiAccessRestrictions
848 return $this->logtable ? $this->read_sql() : $this->read_file();
852 * Return iterator of referer items reverse sorted (latest first).
854 function get_referer($limit=15, $external_only=false) {
855 if ($external_only) { // see stdlin.php:isExternalReferrer()
857 $blen = strlen($base);
859 if (!empty($this->_dbi)) {
860 // check same hosts in referer and request and remove them
861 $ext_where = " AND LEFT(referer,$blen) <> ".$this->_dbi->quote($base)
862 ." AND LEFT(referer,$blen) <> LEFT(CONCAT(".$this->_dbi->quote(SERVER_URL).",request_uri),$blen)";
863 return $this->_read_sql_query("(referer <>'' AND NOT(ISNULL(referer)))"
864 .($external_only ? $ext_where : '')
865 ." ORDER BY time_stamp DESC"
866 .($limit ? " LIMIT $limit" : ""));
868 $iter = new WikiDB_Array_generic_iter(0);
869 $logs =& $iter->_array;
870 while ($logentry = $this->read_file()) {
871 if (!empty($logentry->referer)
872 and (!$external_only or (substr($logentry->referer,0,$blen) != $base)))
874 $iter->_array[] = $logentry;
875 if ($limit and count($logs) > $limit)
879 $logs = array_reverse($logs);
880 $logs = array_slice($logs,0,min($limit,count($logs)));
886 * Return iterator of matching host items reverse sorted (latest first).
888 function get_host($host, $since_minutes=20) {
889 if ($this->logtable) {
890 // mysql specific only:
891 return $this->read_sql("request_host=".$this->_dbi->quote($host)." AND time_stamp > ". (time()-$since_minutes*60)
892 ." ORDER BY time_stamp DESC");
894 $iter = new WikiDB_Array_generic_iter();
895 $logs =& $iter->_array;
896 $logentry = new Request_AccessLogEntry($this);
897 while ($logentry->read_file()) {
898 if (!empty($logentry->referer)) {
899 $iter->_array[] = $logentry;
900 if ($limit and count($logs) > $limit)
902 $logentry = new Request_AccessLogEntry($this);
905 $logs = array_reverse($logs);
906 $logs = array_slice($logs,0,min($limit,count($logs)));
912 * Read sequentially all previous entries from log file.
914 function read_file() {
916 if ($this->logfile) $this->logfile = ACCESS_LOG; // support Request_AccessLog::read
918 if (empty($this->reader)) // start at the beginning
919 $this->reader = fopen($this->logfile, "r");
920 if ($s = fgets($this->reader)) {
921 $entry = new Request_AccessLogEntry($this);
922 if (preg_match('/^(\S+)\s(\S+)\s(\S+)\s\[(.+?)\] "([^"]+)" (\d+) (\d+) "([^"]*)" "([^"]*)"$/',$s,$m)) {
923 list(,$entry->host, $entry->ident, $entry->user, $entry->time,
924 $entry->request, $entry->status, $entry->size,
925 $entry->referer, $entry->user_agent) = $m;
928 } else { // until the end
929 fclose($this->reader);
933 function _read_sql_query($where='') {
934 $dbh =& $GLOBALS['request']->_dbi;
935 $log_tbl =& $this->logtable;
936 return $dbh->genericSqlIter("SELECT *,request_uri as request,request_time as time,remote_user as user,"
937 ."remote_host as host,agent as user_agent"
939 . ($where ? " WHERE $where" : ""));
941 function read_sql($where='') {
942 if (empty($this->sqliter))
943 $this->sqliter = $this->_read_sql_query($where);
944 return $this->sqliter->next();
947 /* done in request->finish() before the db is closed */
948 function write_sql() {
949 $dbh =& $GLOBALS['request']->_dbi;
950 if (isset($this->entries) and $dbh and $dbh->isOpen())
951 foreach ($this->entries as $entry) {
955 /* done in the shutdown callback */
956 function write_file() {
957 if (isset($this->entries) and $this->logfile)
958 foreach ($this->entries as $entry) {
959 $entry->write_file();
961 unset($this->entries);
963 /* in an ideal world... */
965 if ($this->logfile) $this->write_file();
966 if ($this->logtable) $this->write_sql();
967 unset($this->entries);
971 class Request_AccessLogEntry
976 * The log entry will be automatically appended to the log file or
977 * SQL table when the current request terminates.
979 * If you want to modify a Request_AccessLogEntry before it gets
980 * written (e.g. via the setStatus and setSize methods) you should
981 * use an '&' on the constructor, so that you're working with the
982 * original (rather than a copy) object.
985 * $log_entry = & new Request_AccessLogEntry("/tmp/wiki_access_log");
986 * $log_entry->setStatus(401);
987 * $log_entry->push($request);
992 function Request_AccessLogEntry (&$accesslog) {
993 $this->_accesslog = $accesslog;
994 $this->logfile = $accesslog->logfile;
995 $this->time = time();
996 $this->status = 200; // see setStatus()
997 $this->size = 0; // see setSize()
1001 * @param $request object Request object for current request.
1003 function push(&$request) {
1004 $this->host = $request->get('REMOTE_HOST');
1005 $this->ident = $request->get('REMOTE_IDENT');
1008 $user = $request->getUser();
1009 if ($user->isAuthenticated())
1010 $this->user = $user->UserName();
1013 $this->request = join(' ', array($request->get('REQUEST_METHOD'),
1014 $request->get('REQUEST_URI'),
1015 $request->get('SERVER_PROTOCOL')));
1016 $this->referer = (string) $request->get('HTTP_REFERER');
1017 $this->user_agent = (string) $request->get('HTTP_USER_AGENT');
1021 * Set result status code.
1023 * @param $status integer HTTP status code.
1025 function setStatus ($status) {
1026 $this->status = $status;
1030 * Set response size.
1032 * @param $size integer
1034 function setSize ($size=0) {
1035 $this->size = $size;
1037 function setDuration ($seconds) {
1038 $this->duration = $seconds;
1042 * Get time zone offset.
1044 * This is a static member function.
1046 * @param $time integer Unix timestamp (defaults to current time).
1047 * @return string Zone offset, e.g. "-0800" for PST.
1049 function _zone_offset ($time = false) {
1052 $offset = date("Z", $time);
1058 $offhours = floor($offset / 3600);
1059 $offmins = $offset / 60 - $offhours * 60;
1060 return sprintf("%s%02d%02d", $negoffset, $offhours, $offmins);
1064 * Format time in NCSA format.
1066 * This is a static member function.
1068 * @param $time integer Unix timestamp (defaults to current time).
1069 * @return string Formatted date & time.
1071 function _ncsa_time($time = false) {
1074 return date("d/M/Y:H:i:s", $time) .
1075 " " . $this->_zone_offset();
1079 if ($this->_accesslog->logfile) $this->write_file();
1080 if ($this->_accesslog->logtable) $this->write_sql();
1084 * Write entry to log file.
1086 function write_file() {
1087 $entry = sprintf('%s %s %s [%s] "%s" %d %d "%s" "%s"',
1088 $this->host, $this->ident, $this->user,
1089 $this->_ncsa_time($this->time),
1090 $this->request, $this->status, $this->size,
1091 $this->referer, $this->user_agent);
1092 if (!empty($this->_accesslog->reader)) {
1093 fclose($this->_accesslog->reader);
1094 unset($this->_accesslog->reader);
1096 //Error log doesn't provide locking.
1097 //error_log("$entry\n", 3, $this->logfile);
1099 if (($fp = fopen($this->logfile, "a"))) {
1100 flock($fp, LOCK_EX);
1101 fputs($fp, "$entry\n");
1106 /* This is better been done by apache mod_log_sql */
1107 /* If ACCESS_LOG_SQL & 2 we do write it by our own */
1108 function write_sql() {
1111 $dbh =& $request->_dbi;
1112 if ($dbh and $dbh->isOpen() and $this->_accesslog->logtable) {
1113 $log_tbl =& $this->_accesslog->logtable;
1114 if ($request->get('REQUEST_METHOD') == "POST") {
1115 // strangely HTTP_POST_VARS doesn't contain all posted vars.
1116 if (check_php_version(4,2))
1117 $args = $_POST; // copy not ref. clone not needed on hashes
1119 $args = $GLOBALS['HTTP_POST_VARS'];
1121 if (!empty($args['auth']['passwd'])) $args['auth']['passwd'] = '<not displayed>';
1122 if (!empty($args['dbadmin']['passwd'])) $args['dbadmin']['passwd'] = '<not displayed>';
1123 if (!empty($args['pref']['passwd'])) $args['pref']['passwd'] = '<not displayed>';
1124 if (!empty($args['pref']['passwd2'])) $args['pref']['passwd2'] = '<not displayed>';
1125 $this->request_args = substr(serialize($args),0,254); // if VARCHAR(255) is used.
1127 $this->request_args = $request->get('QUERY_STRING');
1129 // duration problem: sprintf "%f" might use comma e.g. "100,201" in european locales
1130 $dbh->genericSqlQuery
1132 sprintf("INSERT INTO $log_tbl"
1133 . " (time_stamp,remote_host,remote_user,request_method,request_line,request_uri,"
1134 . "request_args,request_time,status,bytes_sent,referer,agent,request_duration)"
1135 . " VALUES(%d,%s,%s,%s,%s,%s,%s,%s,%d,%d,%s,%s,'%s')",
1137 $dbh->quote($this->host), $dbh->quote($this->user),
1138 $dbh->quote($request->get('REQUEST_METHOD')), $dbh->quote($this->request),
1139 $dbh->quote($request->get('REQUEST_URI')), $dbh->quote($this->request_args),
1140 $dbh->quote($this->_ncsa_time($this->time)), $this->status, $this->size,
1141 $dbh->quote($this->referer),
1142 $dbh->quote($this->user_agent),
1150 * Shutdown callback.
1153 * @see Request_AccessLogEntry
1155 function Request_AccessLogEntry_shutdown_function () {
1158 if (isset($request->_accesslog->entries) and $request->_accesslog->logfile)
1159 foreach ($request->_accesslog->entries as $entry) {
1160 $entry->write_file();
1162 unset($request->_accesslog->entries);
1167 function HTTP_ETag($val, $is_weak=false) {
1168 $this->_val = hash($val);
1169 $this->_weak = $is_weak;
1174 * Strong comparison: If either (or both) tag is weak, they
1177 function equals($that, $strong_match=false) {
1178 if ($this->_val != $that->_val)
1180 if ($strong_match and ($this->_weak or $that->_weak))
1186 function asString() {
1187 $quoted = '"' . addslashes($this->_val) . '"';
1188 return $this->_weak ? "W/$quoted" : $quoted;
1191 /** Parse tag from header.
1193 * This is a static member function.
1195 function parse($strval) {
1196 if (!preg_match(':^(W/)?"(.+)"$:i', trim($strval), $m))
1197 return false; // parse failed
1198 list(,$weak,$str) = $m;
1199 return new HTTP_ETag(stripslashes($str), $weak);
1202 function matches($taglist, $strong_match=false) {
1203 $taglist = trim($taglist);
1205 if ($taglist == '*') {
1207 return ! $this->_weak;
1212 while (preg_match('@^(W/)?"((?:\\\\.|[^"])*)"\s*,?\s*@i',
1214 list($match, $weak, $str) = $m;
1215 $taglist = substr($taglist, strlen($match));
1216 $tag = new HTTP_ETag(stripslashes($str), $weak);
1217 if ($this->equals($tag, $strong_match)) {
1225 // Possible results from the HTTP_ValidatorSet::_check*() methods.
1226 // (Higher numerical values take precedence.)
1227 define ('_HTTP_VAL_PASS', 0); // Test is irrelevant
1228 define ('_HTTP_VAL_NOT_MODIFIED', 1); // Test passed, content not changed
1229 define ('_HTTP_VAL_MODIFIED', 2); // Test failed, content changed
1230 define ('_HTTP_VAL_FAILED', 3); // Precondition failed.
1232 class HTTP_ValidatorSet {
1233 function HTTP_ValidatorSet($validators) {
1234 $this->_mtime = $this->_weak = false;
1235 $this->_tag = array();
1237 foreach ($validators as $key => $val) {
1238 if ($key == '%mtime') {
1239 $this->_mtime = $val;
1241 elseif ($key == '%weak') {
1243 $this->_weak = true;
1246 $this->_tag[$key] = $val;
1251 function append($that) {
1252 if (is_array($that))
1253 $that = new HTTP_ValidatorSet($that);
1255 // Pick the most recent mtime
1256 if (isset($that->_mtime))
1257 if (!isset($this->_mtime) || $that->_mtime > $this->_mtime)
1258 $this->_mtime = $that->_mtime;
1260 // If either is weak, we're weak
1261 if (!empty($that->_weak))
1262 $this->_weak = true;
1263 if (is_array($this->_tag))
1264 $this->_tag = array_merge($this->_tag, $that->_tag);
1266 $this->_tag = $that->_tag;
1269 function getETag() {
1272 return new HTTP_ETag($this->_tag, $this->_weak);
1275 function getModificationTime() {
1276 return $this->_mtime;
1279 function checkConditionalRequest (&$request) {
1280 $result = max($this->_checkIfUnmodifiedSince($request),
1281 $this->_checkIfModifiedSince($request),
1282 $this->_checkIfMatch($request),
1283 $this->_checkIfNoneMatch($request));
1285 if ($result == _HTTP_VAL_PASS || $result == _HTTP_VAL_MODIFIED)
1286 return false; // "please proceed with normal processing"
1287 elseif ($result == _HTTP_VAL_FAILED)
1288 return 412; // "412 Precondition Failed"
1289 elseif ($result == _HTTP_VAL_NOT_MODIFIED)
1290 return 304; // "304 Not Modified"
1292 trigger_error("Ack, shouldn't get here", E_USER_ERROR);
1296 function _checkIfUnmodifiedSince(&$request) {
1297 if ($this->_mtime !== false) {
1298 $since = ParseRfc1123DateTime($request->get("HTTP_IF_UNMODIFIED_SINCE"));
1299 if ($since !== false && $this->_mtime > $since)
1300 return _HTTP_VAL_FAILED;
1302 return _HTTP_VAL_PASS;
1305 function _checkIfModifiedSince(&$request) {
1306 if ($this->_mtime !== false and $request->isGetOrHead()) {
1307 $since = ParseRfc1123DateTime($request->get("HTTP_IF_MODIFIED_SINCE"));
1308 if ($since !== false) {
1309 if ($this->_mtime <= $since)
1310 return _HTTP_VAL_NOT_MODIFIED;
1311 return _HTTP_VAL_MODIFIED;
1314 return _HTTP_VAL_PASS;
1317 function _checkIfMatch(&$request) {
1318 if ($this->_tag && ($taglist = $request->get("HTTP_IF_MATCH"))) {
1319 $tag = $this->getETag();
1320 if (!$tag->matches($taglist, 'strong'))
1321 return _HTTP_VAL_FAILED;
1323 return _HTTP_VAL_PASS;
1326 function _checkIfNoneMatch(&$request) {
1327 if ($this->_tag && ($taglist = $request->get("HTTP_IF_NONE_MATCH"))) {
1328 $tag = $this->getETag();
1329 $strong_compare = ! $request->isGetOrHead();
1331 if ($tag->matches($taglist, $strong_compare)) {
1332 if ($request->isGetOrHead())
1333 return _HTTP_VAL_NOT_MODIFIED;
1335 return _HTTP_VAL_FAILED;
1337 return _HTTP_VAL_MODIFIED;
1340 return _HTTP_VAL_PASS;
1345 // $Log: not supported by cvs2svn $
1346 // Revision 1.97 2005/09/14 05:58:17 rurban
1347 // protect against Content-Length if headers_sent(), fixed writing unwanted accesslog sql entries
1349 // Revision 1.96 2005/08/07 10:52:43 rurban
1350 // stricter error handling: dba errors are fatal, display errors on Request->finish or session_close
1352 // Revision 1.95 2005/08/07 10:09:33 rurban
1355 // Revision 1.94 2005/08/07 09:14:39 rurban
1358 // Revision 1.93 2005/08/06 14:31:10 rurban
1359 // ensure absolute uploads path
1361 // Revision 1.92 2005/05/14 07:22:47 rurban
1362 // remove mysql specific INSERT DELAYED
1364 // Revision 1.91 2005/04/11 19:40:14 rurban
1365 // Simplify upload. See https://sourceforge.net/forum/message.php?msg_id=3093651
1366 // Improve UpLoad warnings.
1367 // Move auth check before upload.
1369 // Revision 1.90 2005/02/26 18:30:01 rurban
1372 // Revision 1.89 2005/02/04 10:38:36 rurban
1373 // do not log passwords! Thanks to Charles Corrigan
1375 // Revision 1.88 2005/01/25 07:00:23 rurban
1378 // Revision 1.87 2005/01/08 21:27:45 rurban
1379 // Prevent from Overlarge session data crash
1381 // Revision 1.86 2005/01/04 20:26:34 rurban
1382 // honor DISABLE_HTTP_REDIRECT, do not gzip the redirect template, flush it
1384 // Revision 1.85 2004/12/26 17:08:36 rurban
1385 // php5 fixes: case-sensitivity, no & new
1387 // Revision 1.84 2004/12/17 16:37:30 rurban
1390 // Revision 1.83 2004/12/10 02:36:43 rurban
1391 // More help with the new native xmlrpc lib. no warnings, no user cookie on xmlrpc.
1393 // Revision 1.82 2004/12/06 19:49:55 rurban
1394 // enable action=remove which is undoable and seeable in RecentChanges: ADODB ony for now.
1395 // renamed delete_page to purge_page.
1396 // enable action=edit&version=-1 to force creation of a new version.
1397 // added BABYCART_PATH config
1398 // fixed magiqc in adodb.inc.php
1399 // and some more docs
1401 // Revision 1.81 2004/11/27 14:39:04 rurban
1402 // simpified regex search architecture:
1403 // no db specific node methods anymore,
1404 // new sql() method for each node
1405 // parallel to regexp() (which returns pcre)
1406 // regex types bitmasked (op's not yet)
1408 // clarified WikiDB::quote() backend methods:
1409 // ->quote() adds surrounsing quotes
1410 // ->qstr() (new method) assumes strings and adds no quotes! (in contrast to ADODB)
1411 // pear and adodb have now unified quote methods for all generic queries.
1413 // Revision 1.80 2004/11/21 11:59:16 rurban
1414 // remove final \n to be ob_cache independent
1416 // Revision 1.79 2004/11/11 18:29:44 rurban
1417 // (write_sql) isOpen really is useless in non-SQL, do more explicit check
1419 // Revision 1.78 2004/11/10 15:29:20 rurban
1420 // * requires newer Pear_DB (as the internal one): quote() uses now escapeSimple for strings
1421 // * ACCESS_LOG_SQL: fix cause request not yet initialized
1422 // * WikiDB: moved SQL specific methods upwards
1423 // * new Pear_DB quoting: same as ADODB and as newer Pear_DB.
1424 // fixes all around: WikiGroup, WikiUserNew SQL methods, SQL logging
1426 // Revision 1.77 2004/11/09 17:11:04 rurban
1427 // * revert to the wikidb ref passing. there's no memory abuse there.
1428 // * use new wikidb->_cache->_id_cache[] instead of wikidb->_iwpcache, to effectively
1429 // store page ids with getPageLinks (GleanDescription) of all existing pages, which
1430 // are also needed at the rendering for linkExistingWikiWord().
1431 // pass options to pageiterator.
1432 // use this cache also for _get_pageid()
1433 // This saves about 8 SELECT count per page (num all pagelinks).
1434 // * fix passing of all page fields to the pageiterator.
1435 // * fix overlarge session data which got broken with the latest ACCESS_LOG_SQL changes
1437 // Revision 1.76 2004/11/09 08:15:18 rurban
1438 // fix ADODB quoting style
1440 // Revision 1.75 2004/11/07 18:34:28 rurban
1441 // more logging fixes
1443 // Revision 1.74 2004/11/07 16:02:51 rurban
1444 // new sql access log (for spam prevention), and restructured access log class
1445 // dbh->quote (generic)
1446 // pear_db: mysql specific parts seperated (using replace)
1448 // Revision 1.73 2004/11/06 04:51:25 rurban
1449 // readable ACCESS_LOG support: RecentReferrers, WikiAccessRestrictions
1451 // Revision 1.72 2004/11/01 10:43:55 rurban
1452 // seperate PassUser methods into seperate dir (memory usage)
1453 // fix WikiUser (old) overlarge data session
1454 // remove wikidb arg from various page class methods, use global ->_dbi instead
1457 // Revision 1.71 2004/10/22 09:20:36 rurban
1458 // fix for USECACHE=false
1460 // Revision 1.70 2004/10/21 19:59:18 rurban
1461 // Patch #991494 (ppo): Avoid notice in PHP >= 4.3.3 if session already started
1463 // Revision 1.69 2004/10/21 19:00:37 rurban
1464 // upload errmsgs by Shilad Sen.
1465 // chunkOutput support: flush the buffer piecewise (dumphtml, large pagelists)
1466 // doesn't gain much because ob_end_clean() doesn't release its
1467 // memory properly yet.
1469 // Revision 1.68 2004/10/12 13:13:19 rurban
1470 // php5 compatibility (5.0.1 ok)
1472 // Revision 1.67 2004/09/25 18:56:54 rurban
1473 // make start_debug logic work
1475 // Revision 1.66 2004/09/25 16:24:52 rurban
1476 // dont compress on debugging
1478 // Revision 1.65 2004/09/17 14:13:49 rurban
1479 // We check for the client Accept-Encoding: "gzip" presence also
1480 // This should eliminate a lot or reported problems.
1482 // Note that this doesn#t fix RSS ssues:
1483 // Most RSS clients are NOT(!) application/xml gzip compatible yet.
1484 // Even if they are sending the accept-encoding gzip header!
1485 // wget is, Mozilla, and MSIE no.
1486 // Of the RSS readers only MagpieRSS 0.5.2 is. http://www.rssgov.com/rssparsers.html
1488 // Revision 1.64 2004/09/17 13:32:36 rurban
1489 // Disable server-side gzip encoding for RSS (RDF encoding), even if the client says it
1490 // supports it. Mozilla has this error, wget works fine. IE not checked.
1492 // Revision 1.63 2004/07/01 09:29:40 rurban
1493 // fixed another DbSession crash: wrong WikiGroup vars
1495 // Revision 1.62 2004/06/27 10:26:02 rurban
1496 // oci8 patch by Philippe Vanhaesendonck + some ADODB notes+fixes
1498 // Revision 1.61 2004/06/25 14:29:17 rurban
1499 // WikiGroup refactoring:
1500 // global group attached to user, code for not_current user.
1501 // improved helpers for special groups (avoid double invocations)
1502 // new experimental config option ENABLE_XHTML_XML (fails with IE, and document.write())
1503 // fixed a XHTML validation error on userprefs.tmpl
1505 // Revision 1.60 2004/06/19 11:51:13 rurban
1506 // CACHE_CONTROL: NONE => NO_CACHE
1508 // Revision 1.59 2004/06/13 11:34:22 rurban
1509 // fixed bug #969532 (space in uploaded filenames)
1510 // improved upload error messages
1512 // Revision 1.58 2004/06/04 20:32:53 rurban
1513 // Several locale related improvements suggested by Pierrick Meignen
1514 // LDAP fix by John Cole
1515 // reanable admin check without ENABLE_PAGEPERM in the admin plugins
1517 // Revision 1.57 2004/06/03 18:54:25 rurban
1518 // fixed "lost level in session" warning, now that signout sets level = 0 (before -1)
1520 // Revision 1.56 2004/05/17 17:43:29 rurban
1521 // CGI: no PATH_INFO fix
1523 // Revision 1.55 2004/05/15 18:31:00 rurban
1524 // some action=pdf Request fixes: With MSIE it works now. Now the work with the page formatting begins.
1526 // Revision 1.54 2004/05/04 22:34:25 rurban
1529 // Revision 1.53 2004/05/03 21:57:47 rurban
1530 // locale updates: we previously lost some words because of wrong strings in
1531 // PhotoAlbum, german rewording.
1532 // fixed $_SESSION registering (lost session vars, esp. prefs)
1533 // fixed ending slash in listAvailableLanguages/Themes
1535 // Revision 1.52 2004/05/03 13:16:47 rurban
1536 // fixed UserPreferences update, esp for boolean and int
1538 // Revision 1.51 2004/05/02 21:26:38 rurban
1539 // limit user session data (HomePageHandle and auth_dbi have to invalidated anyway)
1540 // because they will not survive db sessions, if too large.
1541 // extended action=upgrade
1542 // some WikiTranslation button work
1543 // revert WIKIAUTH_UNOBTAINABLE (need it for main.php)
1544 // some temp. session debug statements
1546 // Revision 1.50 2004/04/29 19:39:44 rurban
1547 // special support for formatted plugins (one-liners)
1548 // like <small><plugin BlaBla ></small>
1549 // iter->asArray() helper for PopularNearby
1550 // db_session for older php's (no &func() allowed)
1552 // Revision 1.49 2004/04/26 20:44:34 rurban
1553 // locking table specific for better databases
1555 // Revision 1.48 2004/04/13 09:13:50 rurban
1556 // sf.net bug #933183 and http://bugs.php.net/17557
1557 // disable ob_gzhandler if apache_note cannot be used.
1558 // (conservative until we find why)
1560 // Revision 1.47 2004/04/02 15:06:55 rurban
1561 // fixed a nasty ADODB_mysql session update bug
1562 // improved UserPreferences layout (tabled hints)
1563 // fixed UserPreferences auth handling
1564 // improved auth stability
1565 // improved old cookie handling: fixed deletion of old cookies with paths
1567 // Revision 1.46 2004/03/30 02:14:03 rurban
1568 // fixed yet another Prefs bug
1569 // added generic PearDb_iter
1570 // $request->appendValidators no so strict as before
1571 // added some box plugin methods
1572 // PageList commalist for condensed output
1574 // Revision 1.45 2004/03/24 19:39:02 rurban
1575 // php5 workaround code (plus some interim debugging code in XmlElement)
1576 // php5 doesn't work yet with the current XmlElement class constructors,
1577 // WikiUserNew does work better than php4.
1578 // rewrote WikiUserNew user upgrading to ease php5 update
1579 // fixed pref handling in WikiUserNew
1580 // added Email Notification
1581 // added simple Email verification
1582 // removed emailVerify userpref subclass: just a email property
1583 // changed pref binary storage layout: numarray => hash of non default values
1584 // print optimize message only if really done.
1585 // forced new cookie policy: delete pref cookies, use only WIKI_ID as plain string.
1586 // prefs should be stored in db or homepage, besides the current session.
1588 // Revision 1.44 2004/03/14 16:26:22 rurban
1591 // Revision 1.43 2004/03/12 20:59:17 rurban
1592 // important cookie fix by Konstantin Zadorozhny
1593 // new editpage feature: JS_SEARCHREPLACE
1595 // Revision 1.42 2004/03/10 15:38:48 rurban
1596 // store current user->page and ->action in session for WhoIsOnline
1597 // better WhoIsOnline icon
1598 // fixed WhoIsOnline warnings
1600 // Revision 1.41 2004/02/27 01:25:14 rurban
1601 // Workarounds for upload handling
1603 // Revision 1.40 2004/02/26 01:39:51 rurban
1606 // Revision 1.39 2004/02/24 15:14:57 rurban
1607 // fixed action=upload problems on Win32, and remove Merge Edit buttons: file does not exist anymore
1609 // Revision 1.38 2004/01/25 10:26:02 rurban
1610 // fixed bug [ 541193 ] HTTP_SERVER_VARS are Apache specific
1611 // http://sourceforge.net/tracker/index.php?func=detail&aid=541193&group_id=6121&atid=106121
1612 // CGI and other servers than apache populate _ENV and not _SERVER
1614 // Revision 1.37 2003/12/26 06:41:16 carstenklapp
1615 // Bugfix: Try to defer OS errors about session.save_path and ACCESS_LOG,
1616 // so they don't prevent IE from partially (or not at all) rendering the
1617 // page. This should help a little for the IE user who encounters trouble
1618 // when setting up a new PhpWiki for the first time.
1624 // c-basic-offset: 4
1625 // c-hanging-comment-ender-p: nil
1626 // indent-tabs-mode: nil