2 rcs_id('$Id: Request.php,v 1.117 2008-03-17 19:08:29 rurban Exp $');
4 Copyright (C) 2002,2004,2005,2006 $ThePhpWikiProgrammingTeam
6 This file is part of PhpWiki.
8 PhpWiki is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 PhpWiki is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with PhpWiki; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 // backward compatibility for PHP < 4.2.0
24 if (!function_exists('ob_clean')) {
34 $this->_fix_magic_quotes_gpc();
35 $this->_fix_multipart_form_data();
37 switch($this->get('REQUEST_METHOD')) {
40 $this->args = &$GLOBALS['HTTP_GET_VARS'];
43 $this->args = &$GLOBALS['HTTP_POST_VARS'];
46 $this->args = array();
50 $this->session = new Request_SessionVars;
51 $this->cookies = new Request_CookieVars;
53 if (ACCESS_LOG or ACCESS_LOG_SQL) {
54 $this->_accesslog = new Request_AccessLog(ACCESS_LOG, ACCESS_LOG_SQL);
57 $GLOBALS['request'] = $this;
61 if (!empty($GLOBALS['HTTP_SERVER_VARS']))
62 $vars = &$GLOBALS['HTTP_SERVER_VARS'];
63 elseif (!empty($GLOBALS['HTTP_ENV_VARS']))
64 $vars = &$GLOBALS['HTTP_ENV_VARS']; // cgi or other servers than Apache
66 trigger_error("Serious php configuration error!"
67 ." No HTTP_SERVER_VARS and HTTP_ENV_VARS vars available."
68 ." These should get defined in lib/prepend.php",
71 if (isset($vars[$key]))
76 $addr = $vars['REMOTE_ADDR'];
77 if (defined('ENABLE_REVERSE_DNS') && ENABLE_REVERSE_DNS)
78 return $vars[$key] = gethostbyaddr($addr);
86 function getArg($key) {
87 if (isset($this->args[$key]))
88 return $this->args[$key];
96 function setArg($key, $val) {
98 unset($this->args[$key]);
100 $this->args[$key] = $val;
103 // Well oh well. Do we really want to pass POST params back as GET?
104 function getURLtoSelf($args = false, $exclude = array()) {
105 $get_args = $this->args;
107 $get_args = array_merge($get_args, $args);
109 // leave out empty arg values
110 foreach ($get_args as $g => $v) {
111 if ($v === false or $v === '') unset($get_args[$g]);
114 // Err... good point...
116 if ($this->isPost()) {
117 $exclude = array_merge($exclude, array('action','auth'));
118 //$get_args = $args; // or only the provided
120 trigger_error("Request::getURLtoSelf() should probably not be from POST",
125 foreach ($exclude as $ex) {
126 if (!empty($get_args[$ex])) unset($get_args[$ex]);
129 $pagename = $get_args['pagename'];
130 unset ($get_args['pagename']);
131 if (!empty($get_args['action']) and $get_args['action'] == 'browse')
132 unset($get_args['action']);
134 return WikiURL($pagename, $get_args);
138 return $this->get("REQUEST_METHOD") == "POST";
141 function isGetOrHead () {
142 return in_array($this->get('REQUEST_METHOD'),
143 array('GET', 'HEAD'));
146 function httpVersion() {
147 if (!preg_match('@HTTP\s*/\s*(\d+.\d+)@', $this->get('SERVER_PROTOCOL'), $m))
149 return (float) $m[1];
152 /* Redirects after edit may fail if no theme signature image is defined.
153 * Set DISABLE_HTTP_REDIRECT = true then.
155 function redirect($url, $noreturn = true) {
156 $bogus = defined('DISABLE_HTTP_REDIRECT') && DISABLE_HTTP_REDIRECT;
159 header("Location: $url");
161 * "302 Found" is not really meant to be sent in response
162 * to a POST. Worse still, according to (both HTTP 1.0
163 * and 1.1) spec, the user, if it is sent, the user agent
164 * is supposed to use the same method to fetch the
165 * redirected URI as the original.
167 * That means if we redirect from a POST, the user-agent
168 * supposed to generate another POST. Not what we want.
169 * (We do this after a page save after all.)
171 * Fortunately, most/all browsers don't do that.
173 * "303 See Other" is what we really want. But it only
176 * FIXME: this is still not spec compliant for HTTP
179 $status = $this->httpVersion() >= 1.1 ? 303 : 302;
180 $this->setStatus($status);
184 $this->discardOutput(); // This might print the gzip headers. Not good.
185 $this->buffer_output(false);
187 include_once('lib/Template.php');
188 $tmpl = new Template('redirect', $this, array('REDIRECT_URL' => $url));
193 // Safari needs window.location.href = targeturl
195 function redirect(url) {
196 if (typeof location.replace == 'function')
197 location.replace(url);
198 else if (typeof location.assign == 'function')
199 location.assign(url);
200 else if (self.location.href)
201 self.location.href = url;
203 window.location = url;
205 redirect('" . addslashes($url) . "')");
209 /** Set validators for this response.
211 * This sets a (possibly incomplete) set of validators
214 * The validator set can be extended using appendValidators().
216 * When you're all done setting and appending validators, you
217 * must call checkValidators() to check them and set the
218 * appropriate headers in the HTTP response.
222 * $request->setValidators(array('pagename' => $pagename,
223 * '%mtime' => $rev->get('mtime')));
225 * // Wups... response content depends on $otherpage, too...
226 * $request->appendValidators(array('otherpage' => $otherpagerev->getPageName(),
227 * '%mtime' => $otherpagerev->get('mtime')));
229 * // After all validators have been set:
230 * $request->checkValidators();
232 function setValidators($validator_set) {
233 if (is_array($validator_set))
234 $validator_set = new HTTP_ValidatorSet($validator_set);
235 $this->_validators = $validator_set;
238 /** Append more validators for this response.
239 * i.e dependencies on other pages mtimes
240 * now it may be called in init also to simplify client code.
242 function appendValidators($validator_set) {
243 if (!isset($this->_validators)) {
244 $this->setValidators($validator_set);
247 $this->_validators->append($validator_set);
250 /** Check validators and set headers in HTTP response
252 * This sets the appropriate "Last-Modified" and "ETag"
253 * headers in the HTTP response.
255 * Additionally, if the validators match any(all) conditional
256 * headers in the HTTP request, this method will not return, but
257 * instead will send "304 Not Modified" or "412 Precondition
258 * Failed" (as appropriate) back to the client.
260 function checkValidators() {
261 $validators = &$this->_validators;
263 // Set validator headers
264 if (!empty($this->_is_buffering_output) or !headers_sent()) {
265 if (($etag = $validators->getETag()) !== false)
266 header("ETag: " . $etag->asString());
267 if (($mtime = $validators->getModificationTime()) !== false)
268 header("Last-Modified: " . Rfc1123DateTime($mtime));
270 // Set cache control headers
271 $this->cacheControl();
274 if (CACHE_CONTROL == 'NO_CACHE')
275 return; // don't check conditionals...
277 // Check conditional headers in request
278 $status = $validators->checkConditionalRequest($this);
280 // Return short response due to failed conditionals
281 $this->setStatus($status);
283 $this->discardOutput();
289 /** Set the cache control headers in the HTTP response.
291 function cacheControl($strategy=CACHE_CONTROL, $max_age=CACHE_CONTROL_MAX_AGE) {
292 if ($strategy == 'NO_CACHE') {
293 $cache_control = "no-cache"; // better set private. See Pear HTTP_Header
296 elseif ($strategy == 'ALLOW_STALE' && $max_age > 0) {
297 $cache_control = sprintf("max-age=%d", $max_age);
300 $cache_control = "must-revalidate";
303 header("Cache-Control: $cache_control");
304 header("Expires: " . Rfc1123DateTime(time() + $max_age));
305 header("Vary: Cookie"); // FIXME: add more here?
308 function setStatus($status) {
309 if (preg_match('|^HTTP/.*?\s(\d+)|i', $status, $m)) {
314 $status = (integer) $status;
315 $reason = array('200' => 'OK',
317 '303' => 'See Other',
318 '304' => 'Not Modified',
319 '400' => 'Bad Request',
320 '401' => 'Unauthorized',
321 '403' => 'Forbidden',
322 '404' => 'Not Found',
323 '412' => 'Precondition Failed');
324 // FIXME: is it always okay to send HTTP/1.1 here, even for older clients?
325 header(sprintf("HTTP/1.1 %d %s", $status, $reason[$status]));
328 if (isset($this->_log_entry))
329 $this->_log_entry->setStatus($status);
332 function buffer_output($compress = true) {
333 // FIXME: disables sessions (some byte before all headers_sent())
334 /*if (defined('USECACHE') and !USECACHE) {
335 $this->_is_buffering_output = false;
338 if (defined('COMPRESS_OUTPUT')) {
339 if (!COMPRESS_OUTPUT)
342 elseif (!check_php_version(4,2,3))
344 elseif (isCGI()) // necessary?
347 if ($this->getArg('start_debug') or $this->getArg('nocache'))
350 // Should we compress even when apache_note is not available?
351 // sf.net bug #933183 and http://bugs.php.net/17557
352 // This effectively eliminates CGI, but all other servers also. hmm.
354 and (!function_exists('ob_gzhandler')
355 or !function_exists('apache_note')))
358 // "output handler 'ob_gzhandler' cannot be used twice"
359 // http://www.php.net/ob_gzhandler
360 if ($compress and ini_get("zlib.output_compression"))
363 // New: we check for the client Accept-Encoding: "gzip" presence also
364 // This should eliminate a lot or reported problems.
366 and (!$this->get("HTTP_ACCEPT_ENCODING")
367 or !strstr($this->get("HTTP_ACCEPT_ENCODING"), "gzip")))
370 // Most RSS clients are NOT(!) application/xml gzip compatible yet.
371 // Even if they are sending the accept-encoding gzip header!
372 // wget is, Mozilla, and MSIE no.
373 // Of the RSS readers only MagpieRSS 0.5.2 is. http://www.rssgov.com/rssparsers.html
374 // See also http://phpwiki.sourceforge.net/phpwiki/KnownBugs
376 and $this->getArg('format')
377 and strstr($this->getArg('format'), 'rss'))
381 ob_start('phpwiki_gzhandler');
383 // TODO: dont send a length or get the gzip'ed data length.
384 $this->_is_compressing_output = true;
385 header("Content-Encoding: gzip");
387 * Attempt to prevent Apache from doing the dreaded double-gzip.
389 * It would be better if we could detect when apache was going
390 * to zip for us, and then let it ... but I have yet to figure
391 * out how to do that.
393 if (function_exists('apache_note'))
394 @apache_note('no-gzip', 1);
397 // Now we alway buffer output.
398 // This is so we can set HTTP headers (e.g. for redirect)
400 // FIXME: change the name of this method.
402 $this->_is_compressing_output = false;
404 $this->_is_buffering_output = true;
405 $this->_ob_get_length = 0;
408 function discardOutput() {
409 if (!empty($this->_is_buffering_output)) {
410 if (ob_get_length()) ob_clean();
411 $this->_is_buffering_output = false;
413 trigger_error("Not buffering output", E_USER_NOTICE);
418 * Longer texts need too much memory on tiny or memory-limit=8MB systems.
419 * We might want to flush our buffer and restart again.
420 * (This would be fine if php would release its memory)
421 * Note that this must not be called inside Template expansion or other
422 * sections with ob_buffering.
424 function chunkOutput() {
425 if (!empty($this->_is_buffering_output)
427 (function_exists('ob_get_level') and @ob_get_level()))
429 $this->_do_chunked_output = true;
430 if (empty($this->_ob_get_length)) $this->_ob_get_length = 0;
431 $this->_ob_get_length += ob_get_length();
432 while (@ob_end_flush());
439 $this->_finishing = true;
440 if (!empty($this->_accesslog)) {
441 $this->_accesslog->push($this);
442 if (empty($this->_do_chunked_output) and empty($this->_ob_get_length))
443 $this->_ob_get_length = ob_get_length();
444 $this->_accesslog->setSize($this->_ob_get_length);
446 if ($RUNTIMER) $this->_accesslog->setDuration($RUNTIMER->getTime());
447 // sql logging must be done before the db is closed.
448 if (isset($this->_accesslog->logtable))
449 $this->_accesslog->write_sql();
452 if (!empty($this->_is_buffering_output)) {
453 /* This cannot work because it might destroy xml markup */
455 if (0 and $GLOBALS['SearchHighLightQuery'] and check_php_version(4,2)) {
456 $html = str_replace($GLOBALS['SearchHighLightQuery'],
457 '<span class="search-term">'.$GLOBALS['SearchHighLightQuery'].'</span>',
460 header(sprintf("Content-Length: %d", strlen($html)));
464 // if _is_compressing_output then ob_get_length() returns
465 // the uncompressed length, not the gzip'ed as required.
466 if (!headers_sent() and !$this->_is_compressing_output) {
467 // php url-rewriting miscalculates the ob length. fixes bug #1376007
468 if (ini_get('use_trans_sid') == 'off') {
469 if (empty($this->_do_chunked_output)) {
470 $this->_ob_get_length = ob_get_length();
472 header(sprintf("Content-Length: %d", $this->_ob_get_length));
475 $this->_is_buffering_output = false;
477 } elseif (function_exists('ob_get_level') and @ob_get_level()) {
480 session_write_close();
481 if (!empty($this->_dbi)) {
482 $this->_dbi->close();
489 function getSessionVar($key) {
490 return $this->session->get($key);
492 function setSessionVar($key, $val) {
493 if ($key == 'wiki_user') {
494 if (empty($val->page))
495 $val->page = $this->getArg('pagename');
496 if (empty($val->action))
497 $val->action = $this->getArg('action');
498 // avoid recursive objects and session resource handles
499 // avoid overlarge session data (max 4000 byte!)
500 if (isset($val->_group)) {
501 unset($val->_group->_request);
502 unset($val->_group->user);
504 if (ENABLE_USER_NEW) {
505 unset($val->_HomePagehandle);
506 unset($val->_auth_dbi);
509 unset($val->_authdbi);
510 unset($val->_homepage);
511 unset($val->_request);
514 return $this->session->set($key, $val);
516 function deleteSessionVar($key) {
517 return $this->session->delete($key);
520 function getCookieVar($key) {
521 return $this->cookies->get($key);
523 function setCookieVar($key, $val, $lifetime_in_days = false, $path = false) {
524 return $this->cookies->set($key, $val, $lifetime_in_days, $path);
526 function deleteCookieVar($key) {
527 return $this->cookies->delete($key);
530 function getUploadedFile($key) {
531 return Request_UploadedFile::getUploadedFile($key);
535 function _fix_magic_quotes_gpc() {
536 $needs_fix = array('HTTP_POST_VARS',
543 if (get_magic_quotes_gpc()) {
544 foreach ($needs_fix as $vars)
545 $this->_stripslashes($GLOBALS[$vars]);
549 function _stripslashes(&$var) {
550 if (is_array($var)) {
551 foreach ($var as $key => $val)
552 $this->_stripslashes($var[$key]);
554 elseif (is_string($var))
555 $var = stripslashes($var);
558 function _fix_multipart_form_data () {
559 if (preg_match('|^multipart/form-data|', $this->get('CONTENT_TYPE')))
560 $this->_strip_leading_nl($GLOBALS['HTTP_POST_VARS']);
563 function _strip_leading_nl(&$var) {
564 if (is_array($var)) {
565 foreach ($var as $key => $val)
566 $this->_strip_leading_nl($var[$key]);
568 elseif (is_string($var))
569 $var = preg_replace('|^\r?\n?|', '', $var);
573 class Request_SessionVars {
574 function Request_SessionVars() {
575 // Prevent cacheing problems with IE 5
576 session_cache_limiter('none');
578 // Avoid to get a notice if session is already started,
579 // for example if session.auto_start is activated
585 $vars = &$GLOBALS['HTTP_SESSION_VARS'];
586 if (isset($vars[$key]))
591 function set($key, $val) {
592 $vars = &$GLOBALS['HTTP_SESSION_VARS'];
593 if (!function_usable('get_cfg_var') or get_cfg_var('register_globals')) {
594 // This is funky but necessary, at least in some PHP's
595 $GLOBALS[$key] = $val;
598 if (isset($_SESSION))
599 $_SESSION[$key] = $val;
600 session_register($key);
603 function delete($key) {
604 $vars = &$GLOBALS['HTTP_SESSION_VARS'];
605 if (!function_usable('ini_get') or ini_get('register_globals'))
606 unset($GLOBALS[$key]);
607 if (DEBUG) trigger_error("delete session $key", E_USER_WARNING);
609 session_unregister($key);
613 class Request_CookieVars {
616 $vars = &$GLOBALS['HTTP_COOKIE_VARS'];
617 if (isset($vars[$key])) {
618 @$decode = base64_decode($vars[$key]);
619 if (strlen($decode) > 3 and substr($decode,1,1) == ':') {
620 @$val = unserialize($decode);
624 @$val = urldecode($vars[$key]);
631 function get_old($key) {
632 $vars = &$GLOBALS['HTTP_COOKIE_VARS'];
633 if (isset($vars[$key])) {
634 @$decode = base64_decode($vars[$key]);
635 if (strlen($decode) > 3 and substr($decode,1,1) == ':') {
636 @$val = unserialize($decode);
640 @$val = unserialize($vars[$key]);
650 function set($key, $val, $persist_days = false, $path = false) {
651 // if already defined, ignore
652 if (defined('MAIN_setUser') and $key = getCookieName()) return;
653 if (defined('WIKI_XMLRPC') and WIKI_XMLRPC) return;
655 $vars = &$GLOBALS['HTTP_COOKIE_VARS'];
656 if (is_numeric($persist_days)) {
657 $expires = time() + (24 * 3600) * $persist_days;
662 if (is_array($val) or is_object($val))
663 $packedval = base64_encode(serialize($val));
665 $packedval = urlencode($val);
666 $vars[$key] = $packedval;
667 @$_COOKIE[$key] = $packedval;
669 @setcookie($key, $packedval, $expires, $path);
671 @setcookie($key, $packedval, $expires);
674 function delete($key) {
675 static $deleted = array();
676 if (isset($deleted[$key])) return;
677 if (defined('WIKI_XMLRPC') and WIKI_XMLRPC) return;
679 $vars = &$GLOBALS['HTTP_COOKIE_VARS'];
680 if (!defined('COOKIE_DOMAIN'))
681 @setcookie($key, '', 0);
683 @setcookie($key, '', 0, COOKIE_DOMAIN);
684 unset($GLOBALS['HTTP_COOKIE_VARS'][$key]);
685 unset($_COOKIE[$key]);
692 You must set "upload_tmp_dir" = "/tmp/" or "C:/tmp/"
693 Best on the same drive as apache, with forward slashes
694 and with ending slash!
695 Otherwise "\\" => "" and the uploaded file will not be found.
697 class Request_UploadedFile {
698 function getUploadedFile($postname) {
699 global $HTTP_POST_FILES;
701 // Against php5 with !ini_get('register-long-arrays'). See Bug #1180115
702 if (empty($HTTP_POST_FILES) and !empty($_FILES))
703 $HTTP_POST_FILES =& $_FILES;
704 if (!isset($HTTP_POST_FILES[$postname]))
707 $fileinfo =& $HTTP_POST_FILES[$postname];
708 if ($fileinfo['error']) {
709 // See https://sourceforge.net/forum/message.php?msg_id=3093651
710 $err = (int) $fileinfo['error'];
711 // errmsgs by Shilad Sen
714 trigger_error(_("Upload error: file too big"), E_USER_WARNING);
717 trigger_error(_("Upload error: file too big"), E_USER_WARNING);
720 trigger_error(_("Upload error: file only partially recieved"), E_USER_WARNING);
723 trigger_error(_("Upload error: no file selected"), E_USER_WARNING);
726 trigger_error(_("Upload error: unknown error #") . $err, E_USER_WARNING);
731 // With windows/php 4.2.1 is_uploaded_file() always returns false.
732 // Be sure that upload_tmp_dir ends with a slash!
733 if (!is_uploaded_file($fileinfo['tmp_name'])) {
735 if (!$tmp_file = get_cfg_var('upload_tmp_dir')) {
736 $tmp_file = dirname(tempnam('', ''));
738 $tmp_file .= '/' . basename($fileinfo['tmp_name']);
739 /* ending slash in php.ini upload_tmp_dir is required. */
740 if (realpath(ereg_replace('/+', '/', $tmp_file)) != realpath($fileinfo['tmp_name'])) {
741 trigger_error(sprintf("Uploaded tmpfile illegal: %s != %s.",$tmp_file, $fileinfo['tmp_name']).
743 "Probably illegal TEMP environment or upload_tmp_dir setting. ".
744 "Esp. on WINDOWS be sure to set upload_tmp_dir in php.ini to use forward slashes and ".
745 "end with a slash. upload_tmp_dir = \"C:/WINDOWS/TEMP/\" is good suggestion.",
750 trigger_error(sprintf("Workaround for PHP/Windows is_uploaded_file() problem for %s.",
751 $fileinfo['tmp_name'])."\n".
752 "Probably illegal TEMP environment or upload_tmp_dir setting.",
758 trigger_error(sprintf("Uploaded tmpfile %s not found.", $fileinfo['tmp_name'])."\n".
759 " Probably illegal TEMP environment or upload_tmp_dir setting.",
763 return new Request_UploadedFile($fileinfo);
766 function Request_UploadedFile($fileinfo) {
767 $this->_info = $fileinfo;
771 return $this->_info['size'];
775 return $this->_info['name'];
779 return $this->_info['type'];
782 function getTmpName() {
783 return $this->_info['tmp_name'];
787 if ( ($fd = fopen($this->_info['tmp_name'], "rb")) ) {
788 if ($this->getSize() < filesize($this->_info['tmp_name'])) {
789 // FIXME: Some PHP's (or is it some browsers?) put
790 // HTTP/MIME headers in the file body, some don't.
792 // At least, I think that's the case. I know I used
793 // to need this code, now I don't.
795 // This code is more-or-less untested currently.
797 // Dump HTTP headers.
798 while ( ($header = fgets($fd, 4096)) ) {
799 if (trim($header) == '') {
802 else if (!preg_match('/^content-(length|type):/i', $header)) {
812 function getContents() {
814 $data = fread($fd, $this->getSize());
821 * Create NCSA "combined" log entry for current request.
822 * Also needed for advanced spam prevention.
823 * global object holding global state (sql or file, entries, to dump)
825 class Request_AccessLog {
827 * @param $logfile string Log file name.
829 function Request_AccessLog ($logfile, $do_sql = false) {
830 //global $request; // request not yet initialized!
832 $this->logfile = $logfile;
833 if ($logfile and !is_writeable($logfile)) {
835 (sprintf(_("%s is not writable."), _("The PhpWiki access log file"))
837 . sprintf(_("Please ensure that %s is writable, or redefine %s in config/config.ini."),
838 sprintf(_("the file '%s'"), ACCESS_LOG),
842 //$request->_accesslog =& $this;
843 //if (empty($request->_accesslog->entries))
844 register_shutdown_function("Request_AccessLogEntry_shutdown_function");
848 if (!in_array($DBParams['dbtype'], array('SQL','ADODB'))) {
849 trigger_error("Unsupported database backend for ACCESS_LOG_SQL.\nNeed DATABASE_TYPE=SQL or ADODB");
851 //$this->_dbi =& $request->_dbi;
852 $this->logtable = (!empty($DBParams['prefix']) ? $DBParams['prefix'] : '')."accesslog";
855 $this->entries = array();
856 $this->entries[] = new Request_AccessLogEntry($this);
859 function _do($cmd, &$arg) {
861 for ($i=0; $i < count($this->entries);$i++)
862 $this->entries[$i]->$cmd($arg);
864 function push(&$request) { $this->_do('push',$request); }
865 function setSize($arg) { $this->_do('setSize',$arg); }
866 function setStatus($arg) { $this->_do('setStatus',$arg); }
867 function setDuration($arg) { $this->_do('setDuration',$arg); }
870 * Read sequentially all previous entries from the beginning.
871 * while ($logentry = Request_AccessLogEntry::read()) ;
872 * For internal log analyzers: RecentReferrers, WikiAccessRestrictions
875 return $this->logtable ? $this->read_sql() : $this->read_file();
879 * Return iterator of referer items reverse sorted (latest first).
881 function get_referer($limit=15, $external_only=false) {
882 if ($external_only) { // see stdlin.php:isExternalReferrer()
884 $blen = strlen($base);
886 if (!empty($this->_dbi)) {
887 // check same hosts in referer and request and remove them
888 $ext_where = " AND LEFT(referer,$blen) <> ".$this->_dbi->quote($base)
889 ." AND LEFT(referer,$blen) <> LEFT(CONCAT(".$this->_dbi->quote(SERVER_URL).",request_uri),$blen)";
890 return $this->_read_sql_query("(referer <>'' AND NOT(ISNULL(referer)))"
891 .($external_only ? $ext_where : '')
892 ." ORDER BY time_stamp DESC"
893 .($limit ? " LIMIT $limit" : ""));
895 $iter = new WikiDB_Array_generic_iter(0);
896 $logs =& $iter->_array;
897 while ($logentry = $this->read_file()) {
898 if (!empty($logentry->referer)
899 and (!$external_only or (substr($logentry->referer,0,$blen) != $base)))
901 $iter->_array[] = $logentry;
902 if ($limit and count($logs) > $limit)
906 $logs = array_reverse($logs);
907 $logs = array_slice($logs,0,min($limit,count($logs)));
913 * Return iterator of matching host items reverse sorted (latest first).
915 function get_host($host, $since_minutes=20) {
916 if ($this->logtable) {
917 // mysql specific only:
918 return $this->read_sql("request_host=".$this->_dbi->quote($host)." AND time_stamp > ". (time()-$since_minutes*60)
919 ." ORDER BY time_stamp DESC");
921 $iter = new WikiDB_Array_generic_iter();
922 $logs =& $iter->_array;
923 $logentry = new Request_AccessLogEntry($this);
924 while ($logentry->read_file()) {
925 if (!empty($logentry->referer)) {
926 $iter->_array[] = $logentry;
927 if ($limit and count($logs) > $limit)
929 $logentry = new Request_AccessLogEntry($this);
932 $logs = array_reverse($logs);
933 $logs = array_slice($logs,0,min($limit,count($logs)));
939 * Read sequentially all previous entries from log file.
941 function read_file() {
943 if ($this->logfile) $this->logfile = ACCESS_LOG; // support Request_AccessLog::read
945 if (empty($this->reader)) // start at the beginning
946 $this->reader = fopen($this->logfile, "r");
947 if ($s = fgets($this->reader)) {
948 $entry = new Request_AccessLogEntry($this);
949 if (preg_match('/^(\S+)\s(\S+)\s(\S+)\s\[(.+?)\] "([^"]+)" (\d+) (\d+) "([^"]*)" "([^"]*)"$/',$s,$m)) {
950 list(,$entry->host, $entry->ident, $entry->user, $entry->time,
951 $entry->request, $entry->status, $entry->size,
952 $entry->referer, $entry->user_agent) = $m;
955 } else { // until the end
956 fclose($this->reader);
960 function _read_sql_query($where='') {
961 $dbh =& $GLOBALS['request']->_dbi;
962 $log_tbl =& $this->logtable;
963 return $dbh->genericSqlIter("SELECT *,request_uri as request,request_time as time,remote_user as user,"
964 ."remote_host as host,agent as user_agent"
966 . ($where ? " WHERE $where" : ""));
968 function read_sql($where='') {
969 if (empty($this->sqliter))
970 $this->sqliter = $this->_read_sql_query($where);
971 return $this->sqliter->next();
974 /* done in request->finish() before the db is closed */
975 function write_sql() {
976 $dbh =& $GLOBALS['request']->_dbi;
977 if (isset($this->entries) and $dbh and $dbh->isOpen())
978 foreach ($this->entries as $entry) {
982 /* done in the shutdown callback */
983 function write_file() {
984 if (isset($this->entries) and $this->logfile)
985 foreach ($this->entries as $entry) {
986 $entry->write_file();
988 unset($this->entries);
990 /* in an ideal world... */
992 if ($this->logfile) $this->write_file();
993 if ($this->logtable) $this->write_sql();
994 unset($this->entries);
998 class Request_AccessLogEntry
1003 * The log entry will be automatically appended to the log file or
1004 * SQL table when the current request terminates.
1006 * If you want to modify a Request_AccessLogEntry before it gets
1007 * written (e.g. via the setStatus and setSize methods) you should
1008 * use an '&' on the constructor, so that you're working with the
1009 * original (rather than a copy) object.
1012 * $log_entry = & new Request_AccessLogEntry("/tmp/wiki_access_log");
1013 * $log_entry->setStatus(401);
1014 * $log_entry->push($request);
1019 function Request_AccessLogEntry (&$accesslog) {
1020 $this->_accesslog = $accesslog;
1021 $this->logfile = $accesslog->logfile;
1022 $this->time = time();
1023 $this->status = 200; // see setStatus()
1024 $this->size = 0; // see setSize()
1028 * @param $request object Request object for current request.
1030 function push(&$request) {
1031 $this->host = $request->get('REMOTE_HOST');
1032 $this->ident = $request->get('REMOTE_IDENT');
1035 $user = $request->getUser();
1036 if ($user->isAuthenticated())
1037 $this->user = $user->UserName();
1040 $this->request = join(' ', array($request->get('REQUEST_METHOD'),
1041 $request->get('REQUEST_URI'),
1042 $request->get('SERVER_PROTOCOL')));
1043 $this->referer = (string) $request->get('HTTP_REFERER');
1044 $this->user_agent = (string) $request->get('HTTP_USER_AGENT');
1048 * Set result status code.
1050 * @param $status integer HTTP status code.
1052 function setStatus ($status) {
1053 $this->status = $status;
1057 * Set response size.
1059 * @param $size integer
1061 function setSize ($size=0) {
1062 $this->size = (int)$size;
1064 function setDuration ($seconds) {
1065 // Pear DB does not correctly quote , in floats using ?. e.g. in european locales.
1067 $this->duration = strtr(sprintf("%f", $seconds),",",".");
1071 * Get time zone offset.
1073 * This is a static member function.
1075 * @param $time integer Unix timestamp (defaults to current time).
1076 * @return string Zone offset, e.g. "-0800" for PST.
1078 function _zone_offset ($time = false) {
1081 $offset = date("Z", $time);
1087 $offhours = floor($offset / 3600);
1088 $offmins = $offset / 60 - $offhours * 60;
1089 return sprintf("%s%02d%02d", $negoffset, $offhours, $offmins);
1093 * Format time in NCSA format.
1095 * This is a static member function.
1097 * @param $time integer Unix timestamp (defaults to current time).
1098 * @return string Formatted date & time.
1100 function _ncsa_time($time = false) {
1103 return date("d/M/Y:H:i:s", $time) .
1104 " " . $this->_zone_offset();
1108 if ($this->_accesslog->logfile) $this->write_file();
1109 if ($this->_accesslog->logtable) $this->write_sql();
1113 * Write entry to log file.
1115 function write_file() {
1116 $entry = sprintf('%s %s %s [%s] "%s" %d %d "%s" "%s"',
1117 $this->host, $this->ident, $this->user,
1118 $this->_ncsa_time($this->time),
1119 $this->request, $this->status, $this->size,
1120 $this->referer, $this->user_agent);
1121 if (!empty($this->_accesslog->reader)) {
1122 fclose($this->_accesslog->reader);
1123 unset($this->_accesslog->reader);
1125 //Error log doesn't provide locking.
1126 //error_log("$entry\n", 3, $this->logfile);
1128 if (($fp = fopen($this->logfile, "a"))) {
1129 flock($fp, LOCK_EX);
1130 fputs($fp, "$entry\n");
1135 /* This is better been done by apache mod_log_sql */
1136 /* If ACCESS_LOG_SQL & 2 we do write it by our own */
1137 function write_sql() {
1140 $dbh =& $request->_dbi;
1141 if ($dbh and $dbh->isOpen() and $this->_accesslog->logtable) {
1142 //$log_tbl =& $this->_accesslog->logtable;
1143 if ($request->get('REQUEST_METHOD') == "POST") {
1144 // strangely HTTP_POST_VARS doesn't contain all posted vars.
1145 if (check_php_version(4,2))
1146 $args = $_POST; // copy not ref. clone not needed on hashes
1148 $args = $GLOBALS['HTTP_POST_VARS'];
1150 if (!empty($args['auth']['passwd'])) $args['auth']['passwd'] = '<not displayed>';
1151 if (!empty($args['dbadmin']['passwd'])) $args['dbadmin']['passwd'] = '<not displayed>';
1152 if (!empty($args['pref']['passwd'])) $args['pref']['passwd'] = '<not displayed>';
1153 if (!empty($args['pref']['passwd2'])) $args['pref']['passwd2'] = '<not displayed>';
1154 $this->request_args = substr(serialize($args),0,254); // if VARCHAR(255) is used.
1156 $this->request_args = $request->get('QUERY_STRING');
1158 $this->request_method = $request->get('REQUEST_METHOD');
1159 $this->request_uri = $request->get('REQUEST_URI');
1160 // duration problem: sprintf "%f" might use comma e.g. "100,201" in european locales
1161 $dbh->_backend->write_accesslog($this);
1167 * Shutdown callback.
1170 * @see Request_AccessLogEntry
1172 function Request_AccessLogEntry_shutdown_function () {
1175 if (isset($request->_accesslog->entries) and $request->_accesslog->logfile)
1176 foreach ($request->_accesslog->entries as $entry) {
1177 $entry->write_file();
1179 unset($request->_accesslog->entries);
1184 function HTTP_ETag($val, $is_weak=false) {
1185 $this->_val = wikihash($val);
1186 $this->_weak = $is_weak;
1191 * Strong comparison: If either (or both) tag is weak, they
1194 function equals($that, $strong_match=false) {
1195 if ($this->_val != $that->_val)
1197 if ($strong_match and ($this->_weak or $that->_weak))
1203 function asString() {
1204 $quoted = '"' . addslashes($this->_val) . '"';
1205 return $this->_weak ? "W/$quoted" : $quoted;
1208 /** Parse tag from header.
1210 * This is a static member function.
1212 function parse($strval) {
1213 if (!preg_match(':^(W/)?"(.+)"$:i', trim($strval), $m))
1214 return false; // parse failed
1215 list(,$weak,$str) = $m;
1216 return new HTTP_ETag(stripslashes($str), $weak);
1219 function matches($taglist, $strong_match=false) {
1220 $taglist = trim($taglist);
1222 if ($taglist == '*') {
1224 return ! $this->_weak;
1229 while (preg_match('@^(W/)?"((?:\\\\.|[^"])*)"\s*,?\s*@i',
1231 list($match, $weak, $str) = $m;
1232 $taglist = substr($taglist, strlen($match));
1233 $tag = new HTTP_ETag(stripslashes($str), $weak);
1234 if ($this->equals($tag, $strong_match)) {
1242 // Possible results from the HTTP_ValidatorSet::_check*() methods.
1243 // (Higher numerical values take precedence.)
1244 define ('_HTTP_VAL_PASS', 0); // Test is irrelevant
1245 define ('_HTTP_VAL_NOT_MODIFIED', 1); // Test passed, content not changed
1246 define ('_HTTP_VAL_MODIFIED', 2); // Test failed, content changed
1247 define ('_HTTP_VAL_FAILED', 3); // Precondition failed.
1249 class HTTP_ValidatorSet {
1250 function HTTP_ValidatorSet($validators) {
1251 $this->_mtime = $this->_weak = false;
1252 $this->_tag = array();
1254 foreach ($validators as $key => $val) {
1255 if ($key == '%mtime') {
1256 $this->_mtime = $val;
1258 elseif ($key == '%weak') {
1260 $this->_weak = true;
1263 $this->_tag[$key] = $val;
1268 function append($that) {
1269 if (is_array($that))
1270 $that = new HTTP_ValidatorSet($that);
1272 // Pick the most recent mtime
1273 if (isset($that->_mtime))
1274 if (!isset($this->_mtime) || $that->_mtime > $this->_mtime)
1275 $this->_mtime = $that->_mtime;
1277 // If either is weak, we're weak
1278 if (!empty($that->_weak))
1279 $this->_weak = true;
1280 if (is_array($this->_tag))
1281 $this->_tag = array_merge($this->_tag, $that->_tag);
1283 $this->_tag = $that->_tag;
1286 function getETag() {
1289 return new HTTP_ETag($this->_tag, $this->_weak);
1292 function getModificationTime() {
1293 return $this->_mtime;
1296 function checkConditionalRequest (&$request) {
1297 $result = max($this->_checkIfUnmodifiedSince($request),
1298 $this->_checkIfModifiedSince($request),
1299 $this->_checkIfMatch($request),
1300 $this->_checkIfNoneMatch($request));
1302 if ($result == _HTTP_VAL_PASS || $result == _HTTP_VAL_MODIFIED)
1303 return false; // "please proceed with normal processing"
1304 elseif ($result == _HTTP_VAL_FAILED)
1305 return 412; // "412 Precondition Failed"
1306 elseif ($result == _HTTP_VAL_NOT_MODIFIED)
1307 return 304; // "304 Not Modified"
1309 trigger_error("Ack, shouldn't get here", E_USER_ERROR);
1313 function _checkIfUnmodifiedSince(&$request) {
1314 if ($this->_mtime !== false) {
1315 $since = ParseRfc1123DateTime($request->get("HTTP_IF_UNMODIFIED_SINCE"));
1316 if ($since !== false && $this->_mtime > $since)
1317 return _HTTP_VAL_FAILED;
1319 return _HTTP_VAL_PASS;
1322 function _checkIfModifiedSince(&$request) {
1323 if ($this->_mtime !== false and $request->isGetOrHead()) {
1324 $since = ParseRfc1123DateTime($request->get("HTTP_IF_MODIFIED_SINCE"));
1325 if ($since !== false) {
1326 if ($this->_mtime <= $since)
1327 return _HTTP_VAL_NOT_MODIFIED;
1328 return _HTTP_VAL_MODIFIED;
1331 return _HTTP_VAL_PASS;
1334 function _checkIfMatch(&$request) {
1335 if ($this->_tag && ($taglist = $request->get("HTTP_IF_MATCH"))) {
1336 $tag = $this->getETag();
1337 if (!$tag->matches($taglist, 'strong'))
1338 return _HTTP_VAL_FAILED;
1340 return _HTTP_VAL_PASS;
1343 function _checkIfNoneMatch(&$request) {
1344 if ($this->_tag && ($taglist = $request->get("HTTP_IF_NONE_MATCH"))) {
1345 $tag = $this->getETag();
1346 $strong_compare = ! $request->isGetOrHead();
1348 if ($tag->matches($taglist, $strong_compare)) {
1349 if ($request->isGetOrHead())
1350 return _HTTP_VAL_NOT_MODIFIED;
1352 return _HTTP_VAL_FAILED;
1354 return _HTTP_VAL_MODIFIED;
1357 return _HTTP_VAL_PASS;
1362 // $Log: not supported by cvs2svn $
1363 // Revision 1.116 2008/02/14 18:31:04 rurban
1364 // nocache to omit compress cache headers (fix async calls for rating images)
1366 // Revision 1.115 2007/09/01 13:28:34 rurban
1367 // document pear DB problem
1369 // Revision 1.114 2007/07/14 19:17:15 rurban
1370 // fix bug#1749950 float with ","
1372 // Revision 1.113 2007/03/18 10:25:21 rurban
1373 // cast AccessLog types
1375 // Revision 1.112 2007/01/28 22:49:55 rurban
1376 // use backend specific SQL write_accesslog
1378 // Revision 1.111 2007/01/07 18:43:26 rurban
1379 // Explain failed UpLoad on Windows to the user.
1381 // Revision 1.110 2007/01/04 16:45:10 rurban
1382 // Be more verbose in serious php problem.
1384 // Revision 1.109 2006/12/22 00:24:09 rurban
1385 // silence empty obcache messages
1387 // Revision 1.108 2006/11/29 19:49:48 rurban
1390 // Revision 1.107 2006/11/19 11:10:11 rurban
1391 // Patch from Bug# 1569424 by Bob Peele (bob.peele@oracle.com)
1393 // Revision 1.106 2006/08/15 13:37:59 rurban
1394 // error on no long arrays
1396 // Revision 1.105 2006/04/17 17:25:19 rurban
1397 // make the flush error go away. die
1399 // Revision 1.104 2006/04/16 11:42:16 rurban
1400 // php url-rewriting miscalculates the ob length. fixes bug #1376007
1402 // do not flush a not existing buffer to avoid Pragma: no-cache on @ error.
1403 // fixes bug #1438448
1405 // Revision 1.103 2006/04/15 12:23:32 rurban
1406 // silence $this->_is_buffering_output warning
1408 // Revision 1.102 2006/03/19 15:01:00 rurban
1409 // sf.net patch #1333957 by Matt Brown: Authentication cookie identical across all wikis on a host
1411 // Revision 1.101 2006/03/07 20:45:43 rurban
1412 // wikihash for php-5.1
1414 // Revision 1.100 2006/01/17 18:57:09 uckelman
1415 // _accesslog->logtable is not set when using non-SQL logging; check should
1416 // be isset to avoid a PHP warning
1418 // Revision 1.99 2005/09/18 16:01:09 rurban
1419 // trick to send the correct gzipped Content-Length
1421 // Revision 1.98 2005/09/18 15:15:53 rurban
1422 // add a proper Content-Encoding: gzip if compressed, and omit Content-Length then.
1424 // Revision 1.97 2005/09/14 05:58:17 rurban
1425 // protect against Content-Length if headers_sent(), fixed writing unwanted accesslog sql entries
1427 // Revision 1.96 2005/08/07 10:52:43 rurban
1428 // stricter error handling: dba errors are fatal, display errors on Request->finish or session_close
1430 // Revision 1.95 2005/08/07 10:09:33 rurban
1433 // Revision 1.94 2005/08/07 09:14:39 rurban
1436 // Revision 1.93 2005/08/06 14:31:10 rurban
1437 // ensure absolute uploads path
1439 // Revision 1.92 2005/05/14 07:22:47 rurban
1440 // remove mysql specific INSERT DELAYED
1442 // Revision 1.91 2005/04/11 19:40:14 rurban
1443 // Simplify upload. See https://sourceforge.net/forum/message.php?msg_id=3093651
1444 // Improve UpLoad warnings.
1445 // Move auth check before upload.
1447 // Revision 1.90 2005/02/26 18:30:01 rurban
1450 // Revision 1.89 2005/02/04 10:38:36 rurban
1451 // do not log passwords! Thanks to Charles Corrigan
1453 // Revision 1.88 2005/01/25 07:00:23 rurban
1456 // Revision 1.87 2005/01/08 21:27:45 rurban
1457 // Prevent from Overlarge session data crash
1459 // Revision 1.86 2005/01/04 20:26:34 rurban
1460 // honor DISABLE_HTTP_REDIRECT, do not gzip the redirect template, flush it
1462 // Revision 1.85 2004/12/26 17:08:36 rurban
1463 // php5 fixes: case-sensitivity, no & new
1465 // Revision 1.84 2004/12/17 16:37:30 rurban
1468 // Revision 1.83 2004/12/10 02:36:43 rurban
1469 // More help with the new native xmlrpc lib. no warnings, no user cookie on xmlrpc.
1471 // Revision 1.82 2004/12/06 19:49:55 rurban
1472 // enable action=remove which is undoable and seeable in RecentChanges: ADODB ony for now.
1473 // renamed delete_page to purge_page.
1474 // enable action=edit&version=-1 to force creation of a new version.
1475 // added BABYCART_PATH config
1476 // fixed magiqc in adodb.inc.php
1477 // and some more docs
1479 // Revision 1.81 2004/11/27 14:39:04 rurban
1480 // simpified regex search architecture:
1481 // no db specific node methods anymore,
1482 // new sql() method for each node
1483 // parallel to regexp() (which returns pcre)
1484 // regex types bitmasked (op's not yet)
1486 // clarified WikiDB::quote() backend methods:
1487 // ->quote() adds surrounsing quotes
1488 // ->qstr() (new method) assumes strings and adds no quotes! (in contrast to ADODB)
1489 // pear and adodb have now unified quote methods for all generic queries.
1491 // Revision 1.80 2004/11/21 11:59:16 rurban
1492 // remove final \n to be ob_cache independent
1494 // Revision 1.79 2004/11/11 18:29:44 rurban
1495 // (write_sql) isOpen really is useless in non-SQL, do more explicit check
1497 // Revision 1.78 2004/11/10 15:29:20 rurban
1498 // * requires newer Pear_DB (as the internal one): quote() uses now escapeSimple for strings
1499 // * ACCESS_LOG_SQL: fix cause request not yet initialized
1500 // * WikiDB: moved SQL specific methods upwards
1501 // * new Pear_DB quoting: same as ADODB and as newer Pear_DB.
1502 // fixes all around: WikiGroup, WikiUserNew SQL methods, SQL logging
1504 // Revision 1.77 2004/11/09 17:11:04 rurban
1505 // * revert to the wikidb ref passing. there's no memory abuse there.
1506 // * use new wikidb->_cache->_id_cache[] instead of wikidb->_iwpcache, to effectively
1507 // store page ids with getPageLinks (GleanDescription) of all existing pages, which
1508 // are also needed at the rendering for linkExistingWikiWord().
1509 // pass options to pageiterator.
1510 // use this cache also for _get_pageid()
1511 // This saves about 8 SELECT count per page (num all pagelinks).
1512 // * fix passing of all page fields to the pageiterator.
1513 // * fix overlarge session data which got broken with the latest ACCESS_LOG_SQL changes
1515 // Revision 1.76 2004/11/09 08:15:18 rurban
1516 // fix ADODB quoting style
1518 // Revision 1.75 2004/11/07 18:34:28 rurban
1519 // more logging fixes
1521 // Revision 1.74 2004/11/07 16:02:51 rurban
1522 // new sql access log (for spam prevention), and restructured access log class
1523 // dbh->quote (generic)
1524 // pear_db: mysql specific parts seperated (using replace)
1526 // Revision 1.73 2004/11/06 04:51:25 rurban
1527 // readable ACCESS_LOG support: RecentReferrers, WikiAccessRestrictions
1529 // Revision 1.72 2004/11/01 10:43:55 rurban
1530 // seperate PassUser methods into seperate dir (memory usage)
1531 // fix WikiUser (old) overlarge data session
1532 // remove wikidb arg from various page class methods, use global ->_dbi instead
1535 // Revision 1.71 2004/10/22 09:20:36 rurban
1536 // fix for USECACHE=false
1538 // Revision 1.70 2004/10/21 19:59:18 rurban
1539 // Patch #991494 (ppo): Avoid notice in PHP >= 4.3.3 if session already started
1541 // Revision 1.69 2004/10/21 19:00:37 rurban
1542 // upload errmsgs by Shilad Sen.
1543 // chunkOutput support: flush the buffer piecewise (dumphtml, large pagelists)
1544 // doesn't gain much because ob_end_clean() doesn't release its
1545 // memory properly yet.
1547 // Revision 1.68 2004/10/12 13:13:19 rurban
1548 // php5 compatibility (5.0.1 ok)
1550 // Revision 1.67 2004/09/25 18:56:54 rurban
1551 // make start_debug logic work
1553 // Revision 1.66 2004/09/25 16:24:52 rurban
1554 // dont compress on debugging
1556 // Revision 1.65 2004/09/17 14:13:49 rurban
1557 // We check for the client Accept-Encoding: "gzip" presence also
1558 // This should eliminate a lot or reported problems.
1560 // Note that this doesn#t fix RSS ssues:
1561 // Most RSS clients are NOT(!) application/xml gzip compatible yet.
1562 // Even if they are sending the accept-encoding gzip header!
1563 // wget is, Mozilla, and MSIE no.
1564 // Of the RSS readers only MagpieRSS 0.5.2 is. http://www.rssgov.com/rssparsers.html
1566 // Revision 1.64 2004/09/17 13:32:36 rurban
1567 // Disable server-side gzip encoding for RSS (RDF encoding), even if the client says it
1568 // supports it. Mozilla has this error, wget works fine. IE not checked.
1570 // Revision 1.63 2004/07/01 09:29:40 rurban
1571 // fixed another DbSession crash: wrong WikiGroup vars
1573 // Revision 1.62 2004/06/27 10:26:02 rurban
1574 // oci8 patch by Philippe Vanhaesendonck + some ADODB notes+fixes
1576 // Revision 1.61 2004/06/25 14:29:17 rurban
1577 // WikiGroup refactoring:
1578 // global group attached to user, code for not_current user.
1579 // improved helpers for special groups (avoid double invocations)
1580 // new experimental config option ENABLE_XHTML_XML (fails with IE, and document.write())
1581 // fixed a XHTML validation error on userprefs.tmpl
1583 // Revision 1.60 2004/06/19 11:51:13 rurban
1584 // CACHE_CONTROL: NONE => NO_CACHE
1586 // Revision 1.59 2004/06/13 11:34:22 rurban
1587 // fixed bug #969532 (space in uploaded filenames)
1588 // improved upload error messages
1590 // Revision 1.58 2004/06/04 20:32:53 rurban
1591 // Several locale related improvements suggested by Pierrick Meignen
1592 // LDAP fix by John Cole
1593 // reanable admin check without ENABLE_PAGEPERM in the admin plugins
1595 // Revision 1.57 2004/06/03 18:54:25 rurban
1596 // fixed "lost level in session" warning, now that signout sets level = 0 (before -1)
1598 // Revision 1.56 2004/05/17 17:43:29 rurban
1599 // CGI: no PATH_INFO fix
1601 // Revision 1.55 2004/05/15 18:31:00 rurban
1602 // some action=pdf Request fixes: With MSIE it works now. Now the work with the page formatting begins.
1604 // Revision 1.54 2004/05/04 22:34:25 rurban
1607 // Revision 1.53 2004/05/03 21:57:47 rurban
1608 // locale updates: we previously lost some words because of wrong strings in
1609 // PhotoAlbum, german rewording.
1610 // fixed $_SESSION registering (lost session vars, esp. prefs)
1611 // fixed ending slash in listAvailableLanguages/Themes
1613 // Revision 1.52 2004/05/03 13:16:47 rurban
1614 // fixed UserPreferences update, esp for boolean and int
1616 // Revision 1.51 2004/05/02 21:26:38 rurban
1617 // limit user session data (HomePageHandle and auth_dbi have to invalidated anyway)
1618 // because they will not survive db sessions, if too large.
1619 // extended action=upgrade
1620 // some WikiTranslation button work
1621 // revert WIKIAUTH_UNOBTAINABLE (need it for main.php)
1622 // some temp. session debug statements
1624 // Revision 1.50 2004/04/29 19:39:44 rurban
1625 // special support for formatted plugins (one-liners)
1626 // like <small><plugin BlaBla ></small>
1627 // iter->asArray() helper for PopularNearby
1628 // db_session for older php's (no &func() allowed)
1630 // Revision 1.49 2004/04/26 20:44:34 rurban
1631 // locking table specific for better databases
1633 // Revision 1.48 2004/04/13 09:13:50 rurban
1634 // sf.net bug #933183 and http://bugs.php.net/17557
1635 // disable ob_gzhandler if apache_note cannot be used.
1636 // (conservative until we find why)
1638 // Revision 1.47 2004/04/02 15:06:55 rurban
1639 // fixed a nasty ADODB_mysql session update bug
1640 // improved UserPreferences layout (tabled hints)
1641 // fixed UserPreferences auth handling
1642 // improved auth stability
1643 // improved old cookie handling: fixed deletion of old cookies with paths
1645 // Revision 1.46 2004/03/30 02:14:03 rurban
1646 // fixed yet another Prefs bug
1647 // added generic PearDb_iter
1648 // $request->appendValidators no so strict as before
1649 // added some box plugin methods
1650 // PageList commalist for condensed output
1652 // Revision 1.45 2004/03/24 19:39:02 rurban
1653 // php5 workaround code (plus some interim debugging code in XmlElement)
1654 // php5 doesn't work yet with the current XmlElement class constructors,
1655 // WikiUserNew does work better than php4.
1656 // rewrote WikiUserNew user upgrading to ease php5 update
1657 // fixed pref handling in WikiUserNew
1658 // added Email Notification
1659 // added simple Email verification
1660 // removed emailVerify userpref subclass: just a email property
1661 // changed pref binary storage layout: numarray => hash of non default values
1662 // print optimize message only if really done.
1663 // forced new cookie policy: delete pref cookies, use only WIKI_ID as plain string.
1664 // prefs should be stored in db or homepage, besides the current session.
1666 // Revision 1.44 2004/03/14 16:26:22 rurban
1669 // Revision 1.43 2004/03/12 20:59:17 rurban
1670 // important cookie fix by Konstantin Zadorozhny
1671 // new editpage feature: JS_SEARCHREPLACE
1673 // Revision 1.42 2004/03/10 15:38:48 rurban
1674 // store current user->page and ->action in session for WhoIsOnline
1675 // better WhoIsOnline icon
1676 // fixed WhoIsOnline warnings
1678 // Revision 1.41 2004/02/27 01:25:14 rurban
1679 // Workarounds for upload handling
1681 // Revision 1.40 2004/02/26 01:39:51 rurban
1684 // Revision 1.39 2004/02/24 15:14:57 rurban
1685 // fixed action=upload problems on Win32, and remove Merge Edit buttons: file does not exist anymore
1687 // Revision 1.38 2004/01/25 10:26:02 rurban
1688 // fixed bug [ 541193 ] HTTP_SERVER_VARS are Apache specific
1689 // http://sourceforge.net/tracker/index.php?func=detail&aid=541193&group_id=6121&atid=106121
1690 // CGI and other servers than apache populate _ENV and not _SERVER
1692 // Revision 1.37 2003/12/26 06:41:16 carstenklapp
1693 // Bugfix: Try to defer OS errors about session.save_path and ACCESS_LOG,
1694 // so they don't prevent IE from partially (or not at all) rendering the
1695 // page. This should help a little for the IE user who encounters trouble
1696 // when setting up a new PhpWiki for the first time.
1702 // c-basic-offset: 4
1703 // c-hanging-comment-ender-p: nil
1704 // indent-tabs-mode: nil