summaryrefslogtreecommitdiff
path: root/lib/exe/xmlrpc.php
Commit message (Collapse)AuthorAge
* Replace old constructor call by __construct() in dokuwiki_xmlrpc_serverGerrit Uitslag2015-06-15
|
* PHPDocs and some improvementsGerrit Uitslag2014-10-02
|
* Many PHPDocs, some unused and dyn declared varsGerrit Uitslag2014-10-01
| | | | | | many PHPDocs some unused variables some dynamically declared variables declared
* introduced http_status() for sending HTTP status code FS#1698Andreas Gohr2013-02-16
| | | | | | | It seems, some servers require a special Status: header for sending the HTTP status code from PHP (F)CGI to the server. This patch introduces a new function (adopted from CodeIgniter) for simplifying the status handling.
* Added more detail error code for unauthorized calls in xmlrpc interface.Tim Roes2012-04-18
|
* removed requires, changed conf check in xmlrpc.phpDominik Eckelmann2012-03-22
|
* replaced $HTTP_RAW_POST_DATA with http_get_raw_post_data functionDominik Eckelmann2012-03-21
|
* Merge branch 'master' of https://github.com/splitbrain/dokuwikiDominik Eckelmann2012-03-14
|\ | | | | | | | | Conflicts: lib/exe/xmlrpc.php
| * increased XMLRPC API version for 1d667b4Andreas Gohr2012-02-01
| |
| * Fixed bug in XML-RPC search.Tim Roes2011-12-01
| | | | | | | | | | The score was randomly transfered as string or as integer. This way it will always be transfered as an integer.
| * Second part of the error codes. Forgot some :(Tim Roes2011-11-29
| | | | | | | | | | | | | | | | | | | | | | Added the new error codes and categories: --- 212 Not allowed to delete media == 230 Media edit error --- 231 Filename not given --- 232 File is still referenced --- 233 Could not delete file
| * Using sensefull error codes.Tim Roes2011-11-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Since there are currently a lot of error coded returning 1, that mean completly different thing, i guess it would be very nice to change this. A client should not be forced to parse the error message, the error code should be enough to explain the error. This change suggests some error codes, that have a hierarchical structure. In the following list the categories begin with = and the error codes actually used with -. = 100 Page errors == 110 Page access errors --- 111 User is not allowed to read the requested page --- 112 User is not allowed to edit the page == 120 Page existance errors --- 121 The requested page does not exist == 130 Page edit errors --- 131 Empty page id --- 132 Empty page content --- 133 Page is locked --- 134 Positive wordblock check = 200 Media errors == 210 Media access errors --- 211 User is not allowed to read media --- 215 User is not allowed to list media == 220 Media existance errors --- 221 The requested media does not exist = 300 Search errors == 310 Argument errors --- 311 The provided value is not a valid timestamp == 320 Search result errors --- 321 No chances in specified timeframe
| * Fixed XML-RPC getAttachment method. Tim Roes2011-11-27
| | | | | | Without creating an IXR_Base64 object, the file will be encoded as base64, but send as string. The client XML-RPC parser cannot detect that it is meant to be a base64 encoded file.
* | corrected commentDominik Eckelmann2012-02-05
| |
* | refactored RemoteAccessDenied to RemoteAccessDeniedExceptionDominik Eckelmann2012-01-08
| |
* | delegate file and date transformation to remote libraryDominik Eckelmann2012-01-08
| |
* | set login as public methodDominik Eckelmann2012-01-08
| |
* | transfered bugfix from dokuwiki 97a000f0551735b35606d94d59abc4ff440783a5Dominik Eckelmann2011-12-22
| |
* | removed dublicated contentDominik Eckelmann2011-11-28
|/
* Fix double-decoding in XMLRPC putAttachmentAdrian Lang2011-10-30
|
* Fix XML-RPC login method FS#2324Andreas Gohr2011-10-15
| | | | | | | | The login wasn't able to modify the session as it was already closed earlier. This patch also executes the correct event when logins via XMLRPC are done.
* Only send 401 if user is not logged in in XML-RPC FS#2133Michael Hamann2011-10-15
| | | | If the user is already logged in, a 403 is sent instead now.
* Send a 401 Unauthorized header in XML-RPC when access is deniedMichael Hamann2011-10-15
| | | | | | | This is far from perfect but should solve most issues in the recommended configuration where only authorized users have access. Sending proper status codes should be implemented when the API implementation refactoring is done.
* make use of auth_isMember() in XMLRPC authentication check FS#2287Andreas Gohr2011-07-10
|
* Merge branch 'master' into indexer_rewriteMichael Hamann2011-02-24
|\ | | | | | | | | | | | | Conflicts: inc/fulltext.php inc/indexer.php lib/exe/indexer.php
| * Use common media_save in media_upload and putAttachmentAdrian Lang2011-02-06
| | | | | | | | | | | | | | | | Changes: * XML-RPC now correctly allows leading and trailing _ * Error messages from XML-RPC are correct * MEDIA_UPLOAD_FINISH has a sixth param specifying the move function * Not having upload rights when using media_upload throws a msg
| * XML-RPC deleteAttachment now uses media_deleteAdrian Lang2011-02-06
| | | | | | | | | | | | | | | | Functionality changes: * deleteAttachment now triggers MEDIA_DELETE_FILE (closes FS#1568) * deletion success msg in mediamanager is correct, even when the ns dir was deleted * media_delete changed quite a bit
* | Merge branch 'master' into indexer_improvementsMichael Hamann2011-01-23
|\| | | | | | | | | | | | | Conflicts: inc/fulltext.php inc/indexer.php lib/exe/indexer.php
| * Fix several security issues in the XML-RPC interfaceMichael Hamann2011-01-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For locks and getRevisions there hasn't been any acl check. In many other cases the id hadn't been cleaned before the acl check was done which means that many acl rules that should be applied weren't applied. So e.g. when you have read permissions for the root namespace but not for a subnamespace you could add a leading ":" and the permissions for the root namespace will be used instead of the permissions for the subnamespace. This did not apply to writing pages and reading media files, but writing and deleting media files have been concerned as well as reading both plain and html versions of pages. This only concerns installations where XML-RPC is enabled (default is disabled) and XML-RPC is allowed for all or untrusted users.
| * Remove enc=utf-8 in VIM modeline as it is not allowed in VIM 7.3Michael Hamann2010-11-29
| | | | | | | | | | | | As of VIM 7.3 it is no longer possible to specify the encoding in the modeline. This gives an error message whenever such a file is opened, thus this commit removes the enc setting from the modeline.
| * Added XMLRPC dokuwiki:appendPageHakan Sandell2010-11-13
| |
* | Indexer v3 Rewrite part two, update uses of indexerTom N Harris2010-12-29
| |
* | Use a different indexer version when external tokenizer is enabledTom N Harris2010-11-17
|/
* Add title index to the indexer files, improve indexer callsAdrian Lang2010-06-16
|
* added cleanID to xmlrpc call wiki.getBackLinksDominik Eckelmann2010-05-26
|
* Adding getTitle to the XML-RPC APIGeorges-Etienne Legendre2010-04-18
|
* Fix #1943: full text search XML-RPC call should return the $pages instead of ↵Georges-Etienne Legendre2010-04-18
| | | | $data
* Use md5sum of id and client ip as temporary filename in XML-RPCMichael Hamann2010-03-16
| | | | | | | | | | | | Before this patch the temporary filename was the uncleaned id. This allowed everyone with upload-privileges (on the whole wiki) and XML-RPC privileges on a XML-RPC-enabled DokuWiki to (over)write any file PHP is allowed to write with any content he wants. If you have XML-RPC enabled and users with XML-RPC and upload privileges you don't trust in a way you would allow them to write any file PHP may write, consider this as an important security fix. By default XML-RPC is disabled, so if you don't know what I'm talking about you are probably not affected by the problem.
* Merge branch 'requireall'Andreas Gohr2010-03-12
|\ | | | | | | | | Conflicts: inc/fulltext.php
| * removed require's in lib/exe/*Andreas Gohr2010-02-01
| |
* | Move & rename HTML_PAGE_FROMTEMPLATE to common.phpAdrian Lang2010-03-10
| | | | | | | | | | The new COMMON_PAGE_FROMTEMPLATE is triggered by pageTemplate AFTER the template has been read but before performing the template replacements.
* | added dokuwiki.search XMLRPC call FS#1882Andreas Gohr2010-02-28
|/
* do not trim XMLRPC values FS#1824Andreas Gohr2009-12-19
| | | | | | | | Ignore-this: f43d3f070cfae4040e0e70648d0e541a The XMLRPC backend will not trim whitespaces or newlines from string values anymore. darcs-hash:20091219151652-7ad00-94d6cb26ff6396e09f107cf09dccb5423680c5c9.gz
* Security Fix: do not allow skipacl in XMLRPCAndreas Gohr2009-11-16
| | | | | | | | | | | | | Ignore-this: 517a7546aab86c5370cccf1aa2171490 Parameters passed to dokuwiki.getPagelist and wiki.getAttachments could contain the option "skipacl" which would prevent ACL checking. This could leak information about usually non-readable files (like filenames, sizes and so on). The content of the files was not accessible. XMLRPC is disabled by default. darcs-hash:20091116220523-7ad00-0fa8a9a7a52076619c6836738f9a1f00a6dafe27.gz
* restrict XMLRPC to configurable groups and usersAndreas Gohr2009-05-16
| | | | | | | | | Ignore-this: 1370cee84d44bb35ae7c0c988ed8f1ff This patch adds a config option to define users or groups that may access the XMLRPC API. ACLs are still checked on top of this intial access control. darcs-hash:20090516114351-7ad00-155fb6c74c29f5f84e79544a534369eec0403ff0.gz
* removed debug statementsAndreas Gohr2009-03-08
| | | | | | Ignore-this: c7d706a81320fb2bf80a399e5fcc259a darcs-hash:20090308112249-7ad00-488e7b5cc87ad3727a161b9625892709d4f25fc0.gz
* Support login in XMLRCP and added API version infoAndreas Gohr2009-03-03
| | | | | | | | | | | | A simple version number was added to the XMLRPC API to make it easy for clients to check if the remote endpoint supports certain features. The login function will take credentials and set cookies on successful login. This is useful when HTTP Basic auth is not available. darcs-hash:20090303193608-7ad00-45b1cd7a5165656796df25ed5c4ebc6e8ef7f95a.gz
* Fixed media size in getRecentMediaChanges XML-RPC call.michael2009-02-27
| | | | | | Ignore-this: 6477d59a1da2f51295326537fa8e14bf darcs-hash:20090227220304-074e0-24e77eb6641c0b43c30a941146487facf2f2277f.gz
* streamlined media listingAndreas Gohr2009-02-23
| | | | | | | Some parameters of media_search where changed, parts using this function need to be identified and fixed. darcs-hash:20090223172746-7ad00-d07951739fba17d0c8925b28b947f7cbb7fc7e1a.gz
* XMLRPC lock or unlock a whole bunch of pagesAndreas Gohr2009-02-20
| | | | | | Ignore-this: d7bb2a80532df444e1ee8e60e3a7b653 darcs-hash:20090220184624-7ad00-2ed594f166e29bcc69d7ecbfe017251764981dd8.gz