3 * Copyright (C) 2005 Brion Vibber <brion@pobox.com>
4 * http://www.mediawiki.org/
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License along
17 * with this program; if not, write to the Free Software Foundation, Inc.,
18 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
19 * http://www.gnu.org/copyleft/gpl.html
23 * @todo document, briefly.
25 class ProtectionForm
{
26 var $mRestrictions = array();
28 var $mCascade = false;
30 var $mPermErrors = array();
31 var $mApplicableTypes = array();
33 function __construct( &$article ) {
34 global $wgRequest, $wgUser;
35 global $wgRestrictionTypes, $wgRestrictionLevels;
36 $this->mArticle
=& $article;
37 $this->mTitle
=& $article->mTitle
;
38 $this->mApplicableTypes
= $this->mTitle
->exists() ?
$wgRestrictionTypes : array('create');
41 $this->mTitle
->loadRestrictions();
43 foreach( $this->mApplicableTypes
as $action ) {
44 // Fixme: this form currently requires individual selections,
45 // but the db allows multiples separated by commas.
46 $this->mRestrictions
[$action] = implode( '', $this->mTitle
->getRestrictions( $action ) );
49 $this->mCascade
= $this->mTitle
->areRestrictionsCascading();
51 if ( $this->mTitle
->mRestrictionsExpiry
== 'infinity' ) {
52 $this->mExpiry
= 'infinite';
53 } else if ( strlen($this->mTitle
->mRestrictionsExpiry
) == 0 ) {
56 // FIXME: this format is not user friendly
57 $this->mExpiry
= wfTimestamp( TS_ISO_8601
, $this->mTitle
->mRestrictionsExpiry
);
61 // The form will be available in read-only to show levels.
62 $this->disabled
= wfReadOnly() ||
($this->mPermErrors
= $this->mTitle
->getUserPermissionsErrors('protect',$wgUser)) != array();
63 $this->disabledAttrib
= $this->disabled
64 ?
array( 'disabled' => 'disabled' )
67 if( $wgRequest->wasPosted() ) {
68 $this->mReason
= $wgRequest->getText( 'mwProtect-reason' );
69 $this->mCascade
= $wgRequest->getBool( 'mwProtect-cascade' );
70 $this->mExpiry
= $wgRequest->getText( 'mwProtect-expiry' );
72 foreach( $this->mApplicableTypes
as $action ) {
73 $val = $wgRequest->getVal( "mwProtect-level-$action" );
74 if( isset( $val ) && in_array( $val, $wgRestrictionLevels ) ) {
75 //prevent users from setting levels that they cannot later unset
76 if( $val == 'sysop' ) {
77 //special case, rewrite sysop to either protect and editprotected
78 if( !$wgUser->isAllowed('protect') && !$wgUser->isAllowed('editprotected') )
81 if( !$wgUser->isAllowed($val) )
84 $this->mRestrictions
[$action] = $val;
91 global $wgRequest, $wgOut;
92 if( $wgRequest->wasPosted() ) {
94 $article = new Article( $this->mTitle
);
95 $q = $article->isRedirect() ?
'redirect=no' : '';
96 $wgOut->redirect( $this->mTitle
->getFullUrl( $q ) );
103 function show( $err = null ) {
104 global $wgOut, $wgUser;
106 $wgOut->setRobotpolicy( 'noindex,nofollow' );
108 if( is_null( $this->mTitle
) ||
109 $this->mTitle
->getNamespace() == NS_MEDIAWIKI
) {
110 $wgOut->showFatalError( wfMsg( 'badarticleerror' ) );
114 list( $cascadeSources, /* $restrictions */ ) = $this->mTitle
->getCascadeProtectionSources();
117 $wgOut->setSubtitle( wfMsgHtml( 'formerror' ) );
118 $wgOut->addHTML( "<p class='error'>{$err}</p>\n" );
121 if ( $cascadeSources && count($cascadeSources) > 0 ) {
124 foreach ( $cascadeSources as $title ) {
125 $titles .= '* [[:' . $title->getPrefixedText() . "]]\n";
128 $wgOut->wrapWikiMsg( "$1\n$titles", array( 'protect-cascadeon', count($cascadeSources) ) );
131 $sk = $wgUser->getSkin();
132 $titleLink = $sk->makeLinkObj( $this->mTitle
);
133 $wgOut->setPageTitle( wfMsg( 'protect-title', $this->mTitle
->getPrefixedText() ) );
134 $wgOut->setSubtitle( wfMsg( 'protect-backlink', $titleLink ) );
136 # Show an appropriate message if the user isn't allowed or able to change
137 # the protection settings at this time
138 if( $this->disabled
) {
140 $wgOut->readOnlyPage();
141 } elseif( $this->mPermErrors
) {
142 $wgOut->addWikiText( $wgOut->formatPermissionsErrorMessage( $this->mPermErrors
) );
145 $wgOut->addWikiMsg( 'protect-text', $this->mTitle
->getPrefixedText() );
148 $wgOut->addHTML( $this->buildForm() );
150 $this->showLogExtract( $wgOut );
154 global $wgRequest, $wgUser, $wgOut;
156 if( $this->disabled
) {
161 $token = $wgRequest->getVal( 'wpEditToken' );
162 if( !$wgUser->matchEditToken( $token ) ) {
163 $this->show( wfMsg( 'sessionfailure' ) );
167 if ( strlen( $this->mExpiry
) == 0 ) {
168 $this->mExpiry
= 'infinite';
171 if ( $this->mExpiry
== 'infinite' ||
$this->mExpiry
== 'indefinite' ) {
172 $expiry = Block
::infinity();
174 # Convert GNU-style date, on error returns -1 for PHP <5.1 and false for PHP >=5.1
175 $expiry = strtotime( $this->mExpiry
);
177 if ( $expiry < 0 ||
$expiry === false ) {
178 $this->show( wfMsg( 'protect_expiry_invalid' ) );
182 // Fixme: non-qualified absolute times are not in users specified timezone
183 // and there isn't notice about it in the ui
184 $expiry = wfTimestamp( TS_MW
, $expiry );
186 if ( $expiry < wfTimestampNow() ) {
187 $this->show( wfMsg( 'protect_expiry_old' ) );
193 # They shouldn't be able to do this anyway, but just to make sure, ensure that cascading restrictions aren't being applied
194 # to a semi-protected page.
195 global $wgGroupPermissions;
197 $edit_restriction = $this->mRestrictions
['edit'];
199 if ($this->mCascade
&& ($edit_restriction != 'protect') &&
200 !(isset($wgGroupPermissions[$edit_restriction]['protect']) && $wgGroupPermissions[$edit_restriction]['protect'] ) )
201 $this->mCascade
= false;
203 if ($this->mTitle
->exists()) {
204 $ok = $this->mArticle
->updateRestrictions( $this->mRestrictions
, $this->mReason
, $this->mCascade
, $expiry );
206 $ok = $this->mTitle
->updateTitleProtection( $this->mRestrictions
['create'], $this->mReason
, $expiry );
210 throw new FatalError( "Unknown error at restriction save time." );
213 if( $wgRequest->getCheck( 'mwProtectWatch' ) ) {
214 $this->mArticle
->doWatch();
215 } elseif( $this->mTitle
->userIsWatching() ) {
216 $this->mArticle
->doUnwatch();
223 * Build the input form
225 * @return $out string HTML form
227 function buildForm() {
231 if( !$this->disabled
) {
232 $out .= $this->buildScript();
233 // The submission needs to reenable the move permission selector
234 // if it's in locked mode, or some browsers won't submit the data.
235 $out .= Xml
::openElement( 'form', array( 'method' => 'post', 'action' => $this->mTitle
->getLocalUrl( 'action=protect' ), 'id' => 'mw-Protect-Form', 'onsubmit' => 'protectEnable(true)' ) ) .
236 Xml
::hidden( 'wpEditToken',$wgUser->editToken() );
239 $out .= Xml
::openElement( 'fieldset' ) .
240 Xml
::element( 'legend', null, wfMsg( 'protect-legend' ) ) .
241 Xml
::openElement( 'table', array( 'id' => 'mwProtectSet' ) ) .
242 Xml
::openElement( 'tbody' ) .
245 foreach( $this->mRestrictions
as $action => $required ) {
246 /* Not all languages have V_x <-> N_x relation */
247 $label = Xml
::element( 'label',
248 array( 'for' => "mwProtect-level-$action" ),
249 wfMsg( 'restriction-' . $action ) );
250 $out .= "<th>$label</th>";
254 foreach( $this->mRestrictions
as $action => $selected ) {
256 $this->buildSelector( $action, $selected ) .
261 // JavaScript will add another row with a value-chaining checkbox
263 $out .= Xml
::closeElement( 'tbody' ) .
264 Xml
::closeElement( 'table' ) .
265 Xml
::openElement( 'table', array( 'id' => 'mw-protect-table2' ) ) .
266 Xml
::openElement( 'tbody' );
268 if( $this->mTitle
->exists() ) {
271 <td class="mw-input">' .
272 Xml
::checkLabel( wfMsg( 'protect-cascade' ), 'mwProtect-cascade', 'mwProtect-cascade', $this->mCascade
, $this->disabledAttrib
) .
277 $attribs = array( 'id' => 'expires' ) +
$this->disabledAttrib
;
279 <td class='mw-label'>" .
280 Xml
::label( wfMsgExt( 'protectexpiry', array( 'parseinline' ) ), 'expires' ) .
282 <td class="mw-input">' .
283 Xml
::input( 'mwProtect-expiry', 60, $this->mExpiry
, $attribs ) .
287 if( !$this->disabled
) {
288 $id = 'mwProtect-reason';
290 <td class='mw-label'>" .
291 Xml
::label( wfMsg( 'protectcomment' ), $id ) .
293 <td class="mw-input">' .
294 Xml
::input( $id, 60, $this->mReason
, array( 'type' => 'text', 'id' => $id, 'maxlength' => 255 ) ) .
299 <td class='mw-input'>" .
300 Xml
::checkLabel( wfMsg( 'watchthis' ),
301 'mwProtectWatch', 'mwProtectWatch',
302 $this->mTitle
->userIsWatching() ||
$wgUser->getOption( 'watchdefault' ) ) .
307 <td class='mw-submit'>" .
308 Xml
::submitButton( wfMsg( 'confirm' ), array( 'id' => 'mw-Protect-submit' ) ) .
313 $out .= Xml
::closeElement( 'tbody' ) .
314 Xml
::closeElement( 'table' ) .
315 Xml
::closeElement( 'fieldset' );
317 if ( !$this->disabled
) {
318 $out .= Xml
::closeElement( 'form' ) .
319 $this->buildCleanupScript();
325 function buildSelector( $action, $selected ) {
326 global $wgRestrictionLevels, $wgUser;
327 $id = 'mwProtect-level-' . $action;
331 'size' => count( $wgRestrictionLevels ),
332 'onchange' => 'protectLevelsUpdate(this)',
333 ) +
$this->disabledAttrib
;
335 $out = Xml
::openElement( 'select', $attribs );
336 foreach( $wgRestrictionLevels as $key ) {
337 //don't let them choose levels above their own (aka so they can still unprotect and edit the page). but only when the form isn't disabled
338 if( $key == 'sysop' ) {
339 //special case, rewrite sysop to protect and editprotected
340 if( !$wgUser->isAllowed('protect') && !$wgUser->isAllowed('editprotected') && $this->disabled
)
343 if( !$wgUser->isAllowed($key) && !$this->disabled
)
346 $out .= Xml
::option( $this->getOptionLabel( $key ), $key, $key == $selected );
348 $out .= Xml
::closeElement( 'select' );
353 * Prepare the label for a protection selector option
355 * @param string $permission Permission required
358 private function getOptionLabel( $permission ) {
359 if( $permission == '' ) {
360 return wfMsg( 'protect-default' );
362 $key = "protect-level-{$permission}";
363 $msg = wfMsg( $key );
364 if( wfEmptyMsg( $key, $msg ) )
365 $msg = wfMsg( 'protect-fallback', $permission );
370 function buildScript() {
371 global $wgStylePath, $wgStyleVersion;
372 return Xml
::tags( 'script', array(
373 'type' => 'text/javascript',
374 'src' => $wgStylePath . "/common/protect.js?$wgStyleVersion" ), '' );
377 function buildCleanupScript() {
378 global $wgRestrictionLevels, $wgGroupPermissions;
379 $script = 'var wgCascadeableLevels=';
380 $CascadeableLevels = array();
381 foreach( $wgRestrictionLevels as $key ) {
382 if ( (isset($wgGroupPermissions[$key]['protect']) && $wgGroupPermissions[$key]['protect']) ||
$key == 'protect' ) {
383 $CascadeableLevels[] = "'" . Xml
::escapeJsString( $key ) . "'";
386 $script .= "[" . implode(',',$CascadeableLevels) . "];\n";
387 $script .= 'protectInitialize("mwProtectSet","' . Xml
::escapeJsString( wfMsg( 'protect-unchain' ) ) . '","' . count($this->mApplicableTypes
) . '")';
388 return Xml
::tags( 'script', array( 'type' => 'text/javascript' ), $script );
392 * @param OutputPage $out
395 function showLogExtract( &$out ) {
396 # Show relevant lines from the protection log:
397 $out->addHTML( Xml
::element( 'h2', null, LogPage
::logName( 'protect' ) ) );
398 LogEventsList
::showLogExtract( $out, 'protect', $this->mTitle
->getPrefixedText() );