version 1.58, 2004/07/02 08:07:17
|
version 1.61, 2004/08/24 15:53:21
|
Line 298 sub cleanDest {
|
Line 298 sub cleanDest {
|
} |
} |
if ($dest=~/[\#\?&%\"]/) { |
if ($dest=~/[\#\?&%\"]/) { |
$foundbad=1; |
$foundbad=1; |
$dest=~s/[\#\?&%]//g; |
$dest=~s/[\#\?&%\"]//g; |
} |
} |
if ($foundbad) { |
if ($foundbad) { |
$request->print("<p><font color=\"red\">".&mt('Invalid characters in requested name have been removed.')."</font></p>"); |
$request->print("<p><font color=\"red\">".&mt('Invalid characters in requested name have been removed.')."</font></p>"); |
Line 988 sub Copy2 {
|
Line 988 sub Copy2 {
|
unless (copy($oldfile, $newfile)) { |
unless (copy($oldfile, $newfile)) { |
$request->print('<font color="red"> '.&mt('copy Error').': '.$!.'</font>'); |
$request->print('<font color="red"> '.&mt('copy Error').': '.$!.'</font>'); |
return 0; |
return 0; |
|
} elsif (!chmod(0660, $newfile)) { |
|
$request->print('<font color="red"> '.&mt('chmod error').': '.$!.'</font>'); |
|
return 0; |
|
} elsif (-e $oldfile.'.meta' && |
|
!copy($oldfile.'.meta', $newfile.'.meta') && |
|
!chmod(0660, $newfile.'.meta')) { |
|
$request->print('<font color="red"> '.&mt('copy metadata error'). |
|
': '.$!.'</font>'); |
|
return 0; |
} else { |
} else { |
unless (chmod(0660, $newfile)) { |
|
$request->print('<font color="red"> '.&mt('chmod error').': '.$!.'</font>'); |
|
return 0; |
|
} |
|
return 1; |
return 1; |
} |
} |
} else { |
} else { |
Line 1166 sub handler {
|
Line 1171 sub handler {
|
|
|
$r=shift; |
$r=shift; |
|
|
|
&Apache::loncommon::get_unprocessed_cgi($ENV{'QUERY_STRING'},['decompress','action','filename','newfilename']); |
|
|
&Debug($r, "loncfile.pm - handler entered"); |
&Debug($r, "loncfile.pm - handler entered"); |
&Debug($r, " filename: ".$ENV{'form.filename'}); |
&Debug($r, " filename: ".$ENV{'form.filename'}); |
Line 1184 sub handler {
|
Line 1190 sub handler {
|
} elsif($ENV{'QUERY_STRING'} && $ENV{'form.phase'} ne 'two') { |
} elsif($ENV{'QUERY_STRING'} && $ENV{'form.phase'} ne 'two') { |
#Just hijack the script only the first time around to inject the |
#Just hijack the script only the first time around to inject the |
#correct information for further processing |
#correct information for further processing |
&Apache::loncommon::get_unprocessed_cgi($ENV{'QUERY_STRING'},['decompress']); |
|
$fn=&Apache::lonnet::unescape($ENV{'form.decompress'}); |
$fn=&Apache::lonnet::unescape($ENV{'form.decompress'}); |
$fn=&URLToPath($fn); |
$fn=&URLToPath($fn); |
$ENV{'form.action'}="decompress"; |
$ENV{'form.action'}="decompress"; |