8 if ( !class_exists( 'UtfNormal' ) ) {
9 require_once( dirname(__FILE__
) . '/normal/UtfNormal.php' );
12 define ( 'GAID_FOR_UPDATE', 1 );
14 # Title::newFromTitle maintains a cache to avoid
15 # expensive re-normalization of commonly used titles.
16 # On a batch operation this can become a memory leak
17 # if not bounded. After hitting this many titles,
19 define( 'MW_TITLECACHE_MAX', 1000 );
21 # Constants for pr_cascade bitfield
22 define( 'CASCADE', 1 );
26 * - Represents a title, which may contain an interwiki designation or namespace
27 * - Can fetch various kinds of data from the database, albeit inefficiently.
32 * Static cache variables
34 static private $titleCache=array();
35 static private $interwikiCache=array();
39 * All member variables should be considered private
40 * Please use the accessor functions
47 var $mTextform; # Text form (spaces not underscores) of the main part
48 var $mUrlform; # URL-encoded form of the main part
49 var $mDbkeyform; # Main part with underscores
50 var $mUserCaseDBKey; # DB key with the initial letter in the case specified by the user
51 var $mNamespace; # Namespace index, i.e. one of the NS_xxxx constants
52 var $mInterwiki; # Interwiki prefix (or null string)
53 var $mFragment; # Title fragment (i.e. the bit after the #)
54 var $mArticleID; # Article ID, fetched from the link cache on demand
55 var $mLatestID; # ID of most recent revision
56 var $mRestrictions; # Array of groups allowed to edit this article
57 var $mCascadeRestriction; # Cascade restrictions on this page to included templates and images?
58 var $mRestrictionsExpiry; # When do the restrictions on this page expire?
59 var $mHasCascadingRestrictions; # Are cascading restrictions in effect on this page?
60 var $mCascadeRestrictionSources;# Where are the cascading restrictions coming from on this page?
61 var $mRestrictionsLoaded; # Boolean for initialisation on demand
62 var $mPrefixedText; # Text form including namespace/interwiki, initialised on demand
63 var $mDefaultNamespace; # Namespace index when there is no namespace
64 # Zero except in {{transclusion}} tags
65 var $mWatched; # Is $wgUser watching this page? NULL if unfilled, accessed through userIsWatching()
73 /* private */ function __construct() {
74 $this->mInterwiki
= $this->mUrlform
=
75 $this->mTextform
= $this->mDbkeyform
= '';
76 $this->mArticleID
= -1;
77 $this->mNamespace
= NS_MAIN
;
78 $this->mRestrictionsLoaded
= false;
79 $this->mRestrictions
= array();
80 # Dont change the following, NS_MAIN is hardcoded in several place
82 $this->mDefaultNamespace
= NS_MAIN
;
83 $this->mWatched
= NULL;
84 $this->mLatestID
= false;
85 $this->mOldRestrictions
= false;
89 * Create a new Title from a prefixed DB key
90 * @param string $key The database key, which has underscores
91 * instead of spaces, possibly including namespace and
93 * @return Title the new object, or NULL on an error
95 public static function newFromDBkey( $key ) {
97 $t->mDbkeyform
= $key;
98 if( $t->secureAndSplit() )
105 * Create a new Title from text, such as what one would
106 * find in a link. Decodes any HTML entities in the text.
108 * @param string $text the link text; spaces, prefixes,
109 * and an initial ':' indicating the main namespace
111 * @param int $defaultNamespace the namespace to use if
112 * none is specified by a prefix
113 * @return Title the new object, or NULL on an error
115 public static function newFromText( $text, $defaultNamespace = NS_MAIN
) {
116 if( is_object( $text ) ) {
117 throw new MWException( 'Title::newFromText given an object' );
121 * Wiki pages often contain multiple links to the same page.
122 * Title normalization and parsing can become expensive on
123 * pages with many links, so we can save a little time by
126 * In theory these are value objects and won't get changed...
128 if( $defaultNamespace == NS_MAIN
&& isset( Title
::$titleCache[$text] ) ) {
129 return Title
::$titleCache[$text];
133 * Convert things like é ā or 〗 into real text...
135 $filteredText = Sanitizer
::decodeCharReferences( $text );
138 $t->mDbkeyform
= str_replace( ' ', '_', $filteredText );
139 $t->mDefaultNamespace
= $defaultNamespace;
141 static $cachedcount = 0 ;
142 if( $t->secureAndSplit() ) {
143 if( $defaultNamespace == NS_MAIN
) {
144 if( $cachedcount >= MW_TITLECACHE_MAX
) {
145 # Avoid memory leaks on mass operations...
146 Title
::$titleCache = array();
150 Title
::$titleCache[$text] =& $t;
160 * Create a new Title from URL-encoded text. Ensures that
161 * the given title's length does not exceed the maximum.
162 * @param string $url the title, as might be taken from a URL
163 * @return Title the new object, or NULL on an error
165 public static function newFromURL( $url ) {
166 global $wgLegalTitleChars;
169 # For compatibility with old buggy URLs. "+" is usually not valid in titles,
170 # but some URLs used it as a space replacement and they still come
171 # from some external search tools.
172 if ( strpos( $wgLegalTitleChars, '+' ) === false ) {
173 $url = str_replace( '+', ' ', $url );
176 $t->mDbkeyform
= str_replace( ' ', '_', $url );
177 if( $t->secureAndSplit() ) {
185 * Create a new Title from an article ID
187 * @todo This is inefficiently implemented, the page row is requested
188 * but not used for anything else
190 * @param int $id the page_id corresponding to the Title to create
191 * @return Title the new object, or NULL on an error
193 public static function newFromID( $id ) {
194 $fname = 'Title::newFromID';
195 $dbr = wfGetDB( DB_SLAVE
);
196 $row = $dbr->selectRow( 'page', array( 'page_namespace', 'page_title' ),
197 array( 'page_id' => $id ), $fname );
198 if ( $row !== false ) {
199 $title = Title
::makeTitle( $row->page_namespace
, $row->page_title
);
207 * Make an array of titles from an array of IDs
209 public static function newFromIDs( $ids ) {
210 $dbr = wfGetDB( DB_SLAVE
);
211 $res = $dbr->select( 'page', array( 'page_namespace', 'page_title' ),
212 'page_id IN (' . $dbr->makeList( $ids ) . ')', __METHOD__
);
215 while ( $row = $dbr->fetchObject( $res ) ) {
216 $titles[] = Title
::makeTitle( $row->page_namespace
, $row->page_title
);
222 * Create a new Title from a namespace index and a DB key.
223 * It's assumed that $ns and $title are *valid*, for instance when
224 * they came directly from the database or a special page name.
225 * For convenience, spaces are converted to underscores so that
226 * eg user_text fields can be used directly.
228 * @param int $ns the namespace of the article
229 * @param string $title the unprefixed database key form
230 * @return Title the new object
232 public static function &makeTitle( $ns, $title ) {
236 $t->mNamespace
= $ns = intval( $ns );
237 $t->mDbkeyform
= str_replace( ' ', '_', $title );
238 $t->mArticleID
= ( $ns >= 0 ) ?
-1 : 0;
239 $t->mUrlform
= wfUrlencode( $t->mDbkeyform
);
240 $t->mTextform
= str_replace( '_', ' ', $title );
245 * Create a new Title from a namespace index and a DB key.
246 * The parameters will be checked for validity, which is a bit slower
247 * than makeTitle() but safer for user-provided data.
249 * @param int $ns the namespace of the article
250 * @param string $title the database key form
251 * @return Title the new object, or NULL on an error
253 public static function makeTitleSafe( $ns, $title ) {
255 $t->mDbkeyform
= Title
::makeName( $ns, $title );
256 if( $t->secureAndSplit() ) {
264 * Create a new Title for the Main Page
265 * @return Title the new object
267 public static function newMainPage() {
268 return Title
::newFromText( wfMsgForContent( 'mainpage' ) );
272 * Extract a redirect destination from a string and return the
273 * Title, or null if the text doesn't contain a valid redirect
275 * @param string $text Text with possible redirect
278 public static function newFromRedirect( $text ) {
279 $redir = MagicWord
::get( 'redirect' );
280 if( $redir->matchStart( $text ) ) {
281 // Extract the first link and see if it's usable
283 if( preg_match( '!\[{2}(.*?)(?:\||\]{2})!', $text, $m ) ) {
284 // Strip preceding colon used to "escape" categories, etc.
285 // and URL-decode links
286 if( strpos( $m[1], '%' ) !== false ) {
287 // Match behavior of inline link parsing here;
288 // don't interpret + as " " most of the time!
289 // It might be safe to just use rawurldecode instead, though.
290 $m[1] = urldecode( ltrim( $m[1], ':' ) );
292 $title = Title
::newFromText( $m[1] );
293 // Redirects to Special:Userlogout are not permitted
294 if( $title instanceof Title
&& !$title->isSpecial( 'Userlogout' ) )
301 #----------------------------------------------------------------------------
303 #----------------------------------------------------------------------------
306 * Get the prefixed DB key associated with an ID
307 * @param int $id the page_id of the article
308 * @return Title an object representing the article, or NULL
309 * if no such article was found
313 function nameOf( $id ) {
314 $fname = 'Title::nameOf';
315 $dbr = wfGetDB( DB_SLAVE
);
317 $s = $dbr->selectRow( 'page', array( 'page_namespace','page_title' ), array( 'page_id' => $id ), $fname );
318 if ( $s === false ) { return NULL; }
320 $n = Title
::makeName( $s->page_namespace
, $s->page_title
);
325 * Get a regex character class describing the legal characters in a link
326 * @return string the list of characters, not delimited
328 public static function legalChars() {
329 global $wgLegalTitleChars;
330 return $wgLegalTitleChars;
334 * Get a string representation of a title suitable for
335 * including in a search index
337 * @param int $ns a namespace index
338 * @param string $title text-form main part
339 * @return string a stripped-down title string ready for the
342 public static function indexTitle( $ns, $title ) {
345 $lc = SearchEngine
::legalSearchChars() . '&#;';
346 $t = $wgContLang->stripForSearch( $title );
347 $t = preg_replace( "/[^{$lc}]+/", ' ', $t );
348 $t = $wgContLang->lc( $t );
351 $t = preg_replace( "/([{$lc}]+)'s( |$)/", "\\1 \\1's ", $t );
352 $t = preg_replace( "/([{$lc}]+)s'( |$)/", "\\1s ", $t );
354 $t = preg_replace( "/\\s+/", ' ', $t );
356 if ( $ns == NS_IMAGE
) {
357 $t = preg_replace( "/ (png|gif|jpg|jpeg|ogg)$/", "", $t );
363 * Make a prefixed DB key from a DB key and a namespace index
364 * @param int $ns numerical representation of the namespace
365 * @param string $title the DB key form the title
366 * @return string the prefixed form of the title
368 public static function makeName( $ns, $title ) {
371 $n = $wgContLang->getNsText( $ns );
372 return $n == '' ?
$title : "$n:$title";
376 * Returns the URL associated with an interwiki prefix
377 * @param string $key the interwiki prefix (e.g. "MeatBall")
378 * @return the associated URL, containing "$1", which should be
379 * replaced by an article title
382 public function getInterwikiLink( $key ) {
383 global $wgMemc, $wgInterwikiExpiry;
384 global $wgInterwikiCache, $wgContLang;
385 $fname = 'Title::getInterwikiLink';
387 $key = $wgContLang->lc( $key );
389 $k = wfMemcKey( 'interwiki', $key );
390 if( array_key_exists( $k, Title
::$interwikiCache ) ) {
391 return Title
::$interwikiCache[$k]->iw_url
;
394 if ($wgInterwikiCache) {
395 return Title
::getInterwikiCached( $key );
398 $s = $wgMemc->get( $k );
399 # Ignore old keys with no iw_local
400 if( $s && isset( $s->iw_local
) && isset($s->iw_trans
)) {
401 Title
::$interwikiCache[$k] = $s;
405 $dbr = wfGetDB( DB_SLAVE
);
406 $res = $dbr->select( 'interwiki',
407 array( 'iw_url', 'iw_local', 'iw_trans' ),
408 array( 'iw_prefix' => $key ), $fname );
413 $s = $dbr->fetchObject( $res );
415 # Cache non-existence: create a blank object and save it to memcached
421 $wgMemc->set( $k, $s, $wgInterwikiExpiry );
422 Title
::$interwikiCache[$k] = $s;
428 * Fetch interwiki prefix data from local cache in constant database
430 * More logic is explained in DefaultSettings
432 * @return string URL of interwiki site
434 public static function getInterwikiCached( $key ) {
435 global $wgInterwikiCache, $wgInterwikiScopes, $wgInterwikiFallbackSite;
439 $db=dba_open($wgInterwikiCache,'r','cdb');
440 /* Resolve site name */
441 if ($wgInterwikiScopes>=3 and !$site) {
442 $site = dba_fetch('__sites:' . wfWikiID(), $db);
444 $site = $wgInterwikiFallbackSite;
446 $value = dba_fetch( wfMemcKey( $key ), $db);
447 if ($value=='' and $wgInterwikiScopes>=3) {
449 $value = dba_fetch("_{$site}:{$key}", $db);
451 if ($value=='' and $wgInterwikiScopes>=2) {
453 $value = dba_fetch("__global:{$key}", $db);
462 list($local,$url)=explode(' ',$value,2);
464 $s->iw_local
=(int)$local;
466 Title
::$interwikiCache[wfMemcKey( 'interwiki', $key )] = $s;
470 * Determine whether the object refers to a page within
473 * @return bool TRUE if this is an in-project interwiki link
474 * or a wikilink, FALSE otherwise
476 public function isLocal() {
477 if ( $this->mInterwiki
!= '' ) {
478 # Make sure key is loaded into cache
479 $this->getInterwikiLink( $this->mInterwiki
);
480 $k = wfMemcKey( 'interwiki', $this->mInterwiki
);
481 return (bool)(Title
::$interwikiCache[$k]->iw_local
);
488 * Determine whether the object refers to a page within
489 * this project and is transcludable.
491 * @return bool TRUE if this is transcludable
493 public function isTrans() {
494 if ($this->mInterwiki
== '')
496 # Make sure key is loaded into cache
497 $this->getInterwikiLink( $this->mInterwiki
);
498 $k = wfMemcKey( 'interwiki', $this->mInterwiki
);
499 return (bool)(Title
::$interwikiCache[$k]->iw_trans
);
503 * Escape a text fragment, say from a link, for a URL
505 static function escapeFragmentForURL( $fragment ) {
506 $fragment = str_replace( ' ', '_', $fragment );
507 $fragment = urlencode( Sanitizer
::decodeCharReferences( $fragment ) );
508 $replaceArray = array(
512 return strtr( $fragment, $replaceArray );
515 #----------------------------------------------------------------------------
517 #----------------------------------------------------------------------------
519 /** Simple accessors */
521 * Get the text form (spaces not underscores) of the main part
524 public function getText() { return $this->mTextform
; }
526 * Get the URL-encoded form of the main part
529 public function getPartialURL() { return $this->mUrlform
; }
531 * Get the main part with underscores
534 public function getDBkey() { return $this->mDbkeyform
; }
536 * Get the namespace index, i.e. one of the NS_xxxx constants
539 public function getNamespace() { return $this->mNamespace
; }
541 * Get the namespace text
544 public function getNsText() {
545 global $wgContLang, $wgCanonicalNamespaceNames;
547 if ( '' != $this->mInterwiki
) {
548 // This probably shouldn't even happen. ohh man, oh yuck.
549 // But for interwiki transclusion it sometimes does.
550 // Shit. Shit shit shit.
552 // Use the canonical namespaces if possible to try to
553 // resolve a foreign namespace.
554 if( isset( $wgCanonicalNamespaceNames[$this->mNamespace
] ) ) {
555 return $wgCanonicalNamespaceNames[$this->mNamespace
];
558 return $wgContLang->getNsText( $this->mNamespace
);
561 * Get the DB key with the initial letter case as specified by the user
563 function getUserCaseDBKey() {
564 return $this->mUserCaseDBKey
;
567 * Get the namespace text of the subject (rather than talk) page
570 public function getSubjectNsText() {
572 return $wgContLang->getNsText( Namespace::getSubject( $this->mNamespace
) );
576 * Get the namespace text of the talk page
579 public function getTalkNsText() {
581 return( $wgContLang->getNsText( Namespace::getTalk( $this->mNamespace
) ) );
585 * Could this title have a corresponding talk page?
588 public function canTalk() {
589 return( Namespace::canTalk( $this->mNamespace
) );
593 * Get the interwiki prefix (or null string)
596 public function getInterwiki() { return $this->mInterwiki
; }
598 * Get the Title fragment (i.e. the bit after the #) in text form
601 public function getFragment() { return $this->mFragment
; }
603 * Get the fragment in URL form, including the "#" character if there is one
606 public function getFragmentForURL() {
607 if ( $this->mFragment
== '' ) {
610 return '#' . Title
::escapeFragmentForURL( $this->mFragment
);
614 * Get the default namespace index, for when there is no namespace
617 public function getDefaultNamespace() { return $this->mDefaultNamespace
; }
620 * Get title for search index
621 * @return string a stripped-down title string ready for the
624 public function getIndexTitle() {
625 return Title
::indexTitle( $this->mNamespace
, $this->mTextform
);
629 * Get the prefixed database key form
630 * @return string the prefixed title, with underscores and
631 * any interwiki and namespace prefixes
633 public function getPrefixedDBkey() {
634 $s = $this->prefix( $this->mDbkeyform
);
635 $s = str_replace( ' ', '_', $s );
640 * Get the prefixed title with spaces.
641 * This is the form usually used for display
642 * @return string the prefixed title, with spaces
644 public function getPrefixedText() {
645 if ( empty( $this->mPrefixedText
) ) { // FIXME: bad usage of empty() ?
646 $s = $this->prefix( $this->mTextform
);
647 $s = str_replace( '_', ' ', $s );
648 $this->mPrefixedText
= $s;
650 return $this->mPrefixedText
;
654 * Get the prefixed title with spaces, plus any fragment
655 * (part beginning with '#')
656 * @return string the prefixed title, with spaces and
657 * the fragment, including '#'
659 public function getFullText() {
660 $text = $this->getPrefixedText();
661 if( '' != $this->mFragment
) {
662 $text .= '#' . $this->mFragment
;
668 * Get the base name, i.e. the leftmost parts before the /
669 * @return string Base name
671 public function getBaseText() {
672 global $wgNamespacesWithSubpages;
673 if( isset( $wgNamespacesWithSubpages[ $this->mNamespace
] ) && $wgNamespacesWithSubpages[ $this->mNamespace
] ) {
674 $parts = explode( '/', $this->getText() );
675 # Don't discard the real title if there's no subpage involved
676 if( count( $parts ) > 1 )
677 unset( $parts[ count( $parts ) - 1 ] );
678 return implode( '/', $parts );
680 return $this->getText();
685 * Get the lowest-level subpage name, i.e. the rightmost part after /
686 * @return string Subpage name
688 public function getSubpageText() {
689 global $wgNamespacesWithSubpages;
690 if( isset( $wgNamespacesWithSubpages[ $this->mNamespace
] ) && $wgNamespacesWithSubpages[ $this->mNamespace
] ) {
691 $parts = explode( '/', $this->mTextform
);
692 return( $parts[ count( $parts ) - 1 ] );
694 return( $this->mTextform
);
699 * Get a URL-encoded form of the subpage text
700 * @return string URL-encoded subpage name
702 public function getSubpageUrlForm() {
703 $text = $this->getSubpageText();
704 $text = wfUrlencode( str_replace( ' ', '_', $text ) );
705 $text = str_replace( '%28', '(', str_replace( '%29', ')', $text ) ); # Clean up the URL; per below, this might not be safe
710 * Get a URL-encoded title (not an actual URL) including interwiki
711 * @return string the URL-encoded form
713 public function getPrefixedURL() {
714 $s = $this->prefix( $this->mDbkeyform
);
715 $s = str_replace( ' ', '_', $s );
717 $s = wfUrlencode ( $s ) ;
719 # Cleaning up URL to make it look nice -- is this safe?
720 $s = str_replace( '%28', '(', $s );
721 $s = str_replace( '%29', ')', $s );
727 * Get a real URL referring to this title, with interwiki link and
730 * @param string $query an optional query string, not used
731 * for interwiki links
732 * @param string $variant language variant of url (for sr, zh..)
733 * @return string the URL
735 public function getFullURL( $query = '', $variant = false ) {
736 global $wgContLang, $wgServer, $wgRequest;
738 if ( '' == $this->mInterwiki
) {
739 $url = $this->getLocalUrl( $query, $variant );
741 // Ugly quick hack to avoid duplicate prefixes (bug 4571 etc)
742 // Correct fix would be to move the prepending elsewhere.
743 if ($wgRequest->getVal('action') != 'render') {
744 $url = $wgServer . $url;
747 $baseUrl = $this->getInterwikiLink( $this->mInterwiki
);
749 $namespace = wfUrlencode( $this->getNsText() );
750 if ( '' != $namespace ) {
751 # Can this actually happen? Interwikis shouldn't be parsed.
752 # Yes! It can in interwiki transclusion. But... it probably shouldn't.
755 $url = str_replace( '$1', $namespace . $this->mUrlform
, $baseUrl );
756 $url = wfAppendQuery( $url, $query );
759 # Finally, add the fragment.
760 $url .= $this->getFragmentForURL();
762 wfRunHooks( 'GetFullURL', array( &$this, &$url, $query ) );
767 * Get a URL with no fragment or server name. If this page is generated
768 * with action=render, $wgServer is prepended.
769 * @param string $query an optional query string; if not specified,
770 * $wgArticlePath will be used.
771 * @param string $variant language variant of url (for sr, zh..)
772 * @return string the URL
774 public function getLocalURL( $query = '', $variant = false ) {
775 global $wgArticlePath, $wgScript, $wgServer, $wgRequest;
776 global $wgVariantArticlePath, $wgContLang, $wgUser;
778 // internal links should point to same variant as current page (only anonymous users)
779 if($variant == false && $wgContLang->hasVariants() && !$wgUser->isLoggedIn()){
780 $pref = $wgContLang->getPreferredVariant(false);
781 if($pref != $wgContLang->getCode())
785 if ( $this->isExternal() ) {
786 $url = $this->getFullURL();
788 // This is currently only used for edit section links in the
789 // context of interwiki transclusion. In theory we should
790 // append the query to the end of any existing query string,
791 // but interwiki transclusion is already broken in that case.
795 $dbkey = wfUrlencode( $this->getPrefixedDBkey() );
796 if ( $query == '' ) {
797 if($variant!=false && $wgContLang->hasVariants()){
798 if($wgVariantArticlePath==false) {
799 $variantArticlePath = "$wgScript?title=$1&variant=$2"; // default
801 $variantArticlePath = $wgVariantArticlePath;
803 $url = str_replace( '$2', urlencode( $variant ), $variantArticlePath );
804 $url = str_replace( '$1', $dbkey, $url );
807 $url = str_replace( '$1', $dbkey, $wgArticlePath );
810 global $wgActionPaths;
813 if( !empty( $wgActionPaths ) &&
814 preg_match( '/^(.*&|)action=([^&]*)(&(.*)|)$/', $query, $matches ) )
816 $action = urldecode( $matches[2] );
817 if( isset( $wgActionPaths[$action] ) ) {
818 $query = $matches[1];
819 if( isset( $matches[4] ) ) $query .= $matches[4];
820 $url = str_replace( '$1', $dbkey, $wgActionPaths[$action] );
821 if( $query != '' ) $url .= '?' . $query;
824 if ( $url === false ) {
825 if ( $query == '-' ) {
828 $url = "{$wgScript}?title={$dbkey}&{$query}";
832 // FIXME: this causes breakage in various places when we
833 // actually expected a local URL and end up with dupe prefixes.
834 if ($wgRequest->getVal('action') == 'render') {
835 $url = $wgServer . $url;
838 wfRunHooks( 'GetLocalURL', array( &$this, &$url, $query ) );
843 * Get an HTML-escaped version of the URL form, suitable for
844 * using in a link, without a server name or fragment
845 * @param string $query an optional query string
846 * @return string the URL
848 public function escapeLocalURL( $query = '' ) {
849 return htmlspecialchars( $this->getLocalURL( $query ) );
853 * Get an HTML-escaped version of the URL form, suitable for
854 * using in a link, including the server name and fragment
856 * @return string the URL
857 * @param string $query an optional query string
859 public function escapeFullURL( $query = '' ) {
860 return htmlspecialchars( $this->getFullURL( $query ) );
864 * Get the URL form for an internal link.
865 * - Used in various Squid-related code, in case we have a different
866 * internal hostname for the server from the exposed one.
868 * @param string $query an optional query string
869 * @param string $variant language variant of url (for sr, zh..)
870 * @return string the URL
872 public function getInternalURL( $query = '', $variant = false ) {
873 global $wgInternalServer;
874 $url = $wgInternalServer . $this->getLocalURL( $query, $variant );
875 wfRunHooks( 'GetInternalURL', array( &$this, &$url, $query ) );
880 * Get the edit URL for this Title
881 * @return string the URL, or a null string if this is an
884 public function getEditURL() {
885 if ( '' != $this->mInterwiki
) { return ''; }
886 $s = $this->getLocalURL( 'action=edit' );
892 * Get the HTML-escaped displayable text form.
893 * Used for the title field in <a> tags.
894 * @return string the text, including any prefixes
896 public function getEscapedText() {
897 return htmlspecialchars( $this->getPrefixedText() );
901 * Is this Title interwiki?
904 public function isExternal() { return ( '' != $this->mInterwiki
); }
907 * Is this page "semi-protected" - the *only* protection is autoconfirm?
909 * @param string Action to check (default: edit)
912 public function isSemiProtected( $action = 'edit' ) {
913 if( $this->exists() ) {
914 $restrictions = $this->getRestrictions( $action );
915 if( count( $restrictions ) > 0 ) {
916 foreach( $restrictions as $restriction ) {
917 if( strtolower( $restriction ) != 'autoconfirmed' )
926 # If it doesn't exist, it can't be protected
932 * Does the title correspond to a protected article?
933 * @param string $what the action the page is protected from,
934 * by default checks move and edit
937 public function isProtected( $action = '' ) {
938 global $wgRestrictionLevels;
940 # Special pages have inherent protection
941 if( $this->getNamespace() == NS_SPECIAL
)
944 # Check regular protection levels
945 if( $action == 'edit' ||
$action == '' ) {
946 $r = $this->getRestrictions( 'edit' );
947 foreach( $wgRestrictionLevels as $level ) {
948 if( in_array( $level, $r ) && $level != '' ) {
954 if( $action == 'move' ||
$action == '' ) {
955 $r = $this->getRestrictions( 'move' );
956 foreach( $wgRestrictionLevels as $level ) {
957 if( in_array( $level, $r ) && $level != '' ) {
967 * Is $wgUser is watching this page?
970 public function userIsWatching() {
973 if ( is_null( $this->mWatched
) ) {
974 if ( NS_SPECIAL
== $this->mNamespace ||
!$wgUser->isLoggedIn()) {
975 $this->mWatched
= false;
977 $this->mWatched
= $wgUser->isWatched( $this );
980 return $this->mWatched
;
984 * Can $wgUser perform $action on this page?
985 * This skips potentially expensive cascading permission checks.
987 * Suitable for use for nonessential UI controls in common cases, but
988 * _not_ for functional access control.
990 * May provide false positives, but should never provide a false negative.
992 * @param string $action action that permission needs to be checked for
995 public function quickUserCan( $action ) {
996 return $this->userCan( $action, false );
1000 * Determines if $wgUser is unable to edit this page because it has been protected
1001 * by $wgNamespaceProtection.
1005 public function isNamespaceProtected() {
1006 global $wgNamespaceProtection, $wgUser;
1007 if( isset( $wgNamespaceProtection[ $this->mNamespace
] ) ) {
1008 foreach( (array)$wgNamespaceProtection[ $this->mNamespace
] as $right ) {
1009 if( $right != '' && !$wgUser->isAllowed( $right ) )
1017 * Can $wgUser perform $action on this page?
1018 * @param string $action action that permission needs to be checked for
1019 * @param bool $doExpensiveQueries Set this to false to avoid doing unnecessary queries.
1022 public function userCan( $action, $doExpensiveQueries = true ) {
1024 return ( $this->getUserPermissionsErrorsInternal( $action, $wgUser, $doExpensiveQueries ) === array());
1028 * Can $user perform $action on this page? This *does not* check throttles
1029 * (User::pingLimiter()) yet; check that manually to be sure.
1031 * @param string $action action that permission needs to be checked for
1032 * @param bool $doExpensiveQueries Set this to false to avoid doing unnecessary queries.
1033 * @return array Array of arrays of the arguments to wfMsg to explain permissions problems.
1035 public function getUserPermissionsErrors( $action, $user, $doExpensiveQueries = true ) {
1036 $errors = $this->getUserPermissionsErrorsInternal( $action, $user, $doExpensiveQueries );
1041 if ( wfReadOnly() && $action != 'read' ) {
1043 $errors[] = array( 'readonlytext', $wgReadOnly );
1046 global $wgEmailConfirmToEdit, $wgUser;
1048 if ( $wgEmailConfirmToEdit && !$user->isEmailConfirmed() ) {
1049 $errors[] = array( 'confirmedittext' );
1052 if ( $user->isBlockedFrom( $this ) ) {
1053 $block = $user->mBlock
;
1055 // This is from OutputPage::blockedPage
1056 // Copied at r23888 by werdna
1058 $id = $user->blockedBy();
1059 $reason = $user->blockedFor();
1060 if( $reason == '' ) {
1061 $reason = wfMsg( 'blockednoreason' );
1065 if ( is_numeric( $id ) ) {
1066 $name = User
::whoIs( $id );
1071 $link = '[[' . $wgContLang->getNsText( NS_USER
) . ":{$name}|{$name}]]";
1072 $blockid = $block->mId
;
1073 $blockExpiry = $user->mBlock
->mExpiry
;
1074 $blockTimestamp = $wgLang->timeanddate( wfTimestamp( TS_MW
, $user->mBlock
->mTimestamp
), true );
1076 if ( $blockExpiry == 'infinity' ) {
1077 // Entry in database (table ipblocks) is 'infinity' but 'ipboptions' uses 'infinite' or 'indefinite'
1078 $scBlockExpiryOptions = wfMsg( 'ipboptions' );
1080 foreach ( explode( ',', $scBlockExpiryOptions ) as $option ) {
1081 if ( strpos( $option, ':' ) == false )
1084 list ($show, $value) = explode( ":", $option );
1086 if ( $value == 'infinite' ||
$value == 'indefinite' ) {
1087 $blockExpiry = $show;
1092 $blockExpiry = $wgLang->timeanddate( wfTimestamp( TS_MW
, $blockExpiry ), true );
1095 $intended = $user->mBlock
->mAddress
;
1097 $errors[] = array ( ($block->mAuto ?
'autoblockedtext' : 'blockedtext'), $link, $reason, $ip, $name, $blockid, $blockExpiry, $intended, $blockTimestamp );
1104 * Can $user perform $action on this page? This is an internal function,
1105 * which checks ONLY that previously checked by userCan (i.e. it leaves out
1106 * checks on wfReadOnly() and blocks)
1108 * @param string $action action that permission needs to be checked for
1109 * @param bool $doExpensiveQueries Set this to false to avoid doing unnecessary queries.
1110 * @return array Array of arrays of the arguments to wfMsg to explain permissions problems.
1112 private function getUserPermissionsErrorsInternal( $action, $user, $doExpensiveQueries = true ) {
1113 wfProfileIn( __METHOD__
);
1117 // Use getUserPermissionsErrors instead
1118 if ( !wfRunHooks( 'userCan', array( &$this, &$user, $action, &$result ) ) ) {
1119 return $result ?
array() : array( array( 'badaccess-group0' ) );
1122 if (!wfRunHooks( 'getUserPermissionsErrors', array( &$this, &$user, $action, &$result ) ) ) {
1123 if ($result != array() && is_array($result) && !is_array($result[0]))
1124 $errors[] = $result; # A single array representing an error
1125 else if (is_array($result) && is_array($result[0]))
1126 $errors = array_merge( $errors, $result ); # A nested array representing multiple errors
1127 else if ($result != '' && $result != null && $result !== true && $result !== false)
1128 $errors[] = array($result); # A string representing a message-id
1129 else if ($result === false )
1130 $errors[] = array('badaccess-group0'); # a generic "We don't want them to do that"
1133 if( NS_SPECIAL
== $this->mNamespace
) {
1134 $errors[] = array('ns-specialprotected');
1137 if ( $this->isNamespaceProtected() ) {
1138 $ns = $this->getNamespace() == NS_MAIN
1139 ?
wfMsg( 'nstab-main' )
1140 : $this->getNsText();
1141 $errors[] = (NS_MEDIAWIKI
== $this->mNamespace
1142 ?
array('protectedinterface')
1143 : array( 'namespaceprotected', $ns ) );
1146 if( $this->mDbkeyform
== '_' ) {
1147 # FIXME: Is this necessary? Shouldn't be allowed anyway...
1148 $errors[] = array('badaccess-group0');
1151 # protect css/js subpages of user pages
1152 # XXX: this might be better using restrictions
1153 # XXX: Find a way to work around the php bug that prevents using $this->userCanEditCssJsSubpage() from working
1154 if( $this->isCssJsSubpage()
1155 && !$user->isAllowed('editusercssjs')
1156 && !preg_match('/^'.preg_quote($user->getName(), '/').'\//', $this->mTextform
) ) {
1157 $errors[] = array('customcssjsprotected');
1160 if ( $doExpensiveQueries && !$this->isCssJsSubpage() ) {
1161 # We /could/ use the protection level on the source page, but it's fairly ugly
1162 # as we have to establish a precedence hierarchy for pages included by multiple
1163 # cascade-protected pages. So just restrict it to people with 'protect' permission,
1164 # as they could remove the protection anyway.
1165 list( $cascadingSources, $restrictions ) = $this->getCascadeProtectionSources();
1166 # Cascading protection depends on more than this page...
1167 # Several cascading protected pages may include this page...
1168 # Check each cascading level
1169 # This is only for protection restrictions, not for all actions
1170 if( $cascadingSources > 0 && isset($restrictions[$action]) ) {
1171 foreach( $restrictions[$action] as $right ) {
1172 $right = ( $right == 'sysop' ) ?
'protect' : $right;
1173 if( '' != $right && !$user->isAllowed( $right ) ) {
1175 foreach( $cascadingSources as $page )
1176 $pages .= '* [[:' . $page->getPrefixedText() . "]]\n";
1177 $errors[] = array( 'cascadeprotected', count( $cascadingSources ), $pages );
1183 foreach( $this->getRestrictions($action) as $right ) {
1184 // Backwards compatibility, rewrite sysop -> protect
1185 if ( $right == 'sysop' ) {
1188 if( '' != $right && !$user->isAllowed( $right ) ) {
1189 $errors[] = array( 'protectedpagetext', $right );
1193 if ($action == 'protect') {
1194 if ($this->getUserPermissionsErrors('edit', $user) != array()) {
1195 $errors[] = array( 'protect-cantedit' ); // If they can't edit, they shouldn't protect.
1199 if ($action == 'create') {
1200 $title_protection = $this->getTitleProtection();
1202 if (is_array($title_protection)) {
1203 extract($title_protection);
1205 if ($pt_create_perm == 'sysop')
1206 $pt_create_perm = 'protect';
1208 if ($pt_create_perm == '' ||
!$user->isAllowed($pt_create_perm)) {
1209 $errors[] = array ( 'titleprotected', User
::whoIs($pt_user), $pt_reason );
1213 if( ( $this->isTalkPage() && !$user->isAllowed( 'createtalk' ) ) ||
1214 ( !$this->isTalkPage() && !$user->isAllowed( 'createpage' ) ) ) {
1215 $errors[] = $user->isAnon() ?
array ('nocreatetext') : array ('nocreate-loggedin');
1217 } elseif( $action == 'move' && !( $this->isMovable() && $user->isAllowed( 'move' ) ) ) {
1218 $errors[] = $user->isAnon() ?
array ( 'movenologintext' ) : array ('movenotallowed');
1219 } elseif ( !$user->isAllowed( $action ) ) {
1222 global $wgGroupPermissions;
1223 foreach( $wgGroupPermissions as $key => $value ) {
1224 if( isset( $value[$action] ) && $value[$action] == true ) {
1225 $groupName = User
::getGroupName( $key );
1226 $groupPage = User
::getGroupPage( $key );
1228 $groups[] = '[['.$groupPage->getPrefixedText().'|'.$groupName.']]';
1230 $groups[] = $groupName;
1234 $n = count( $groups );
1235 $groups = implode( ', ', $groups );
1240 $return = array( "badaccess-group$n", $groups );
1243 $return = array( 'badaccess-groups', $groups );
1245 $errors[] = $return;
1248 wfProfileOut( __METHOD__
);
1253 * Is this title subject to title protection?
1254 * @return mixed An associative array representing any existent title
1255 * protection, or false if there's none.
1257 private function getTitleProtection() {
1258 // Can't protect pages in special namespaces
1259 if ( $this->getNamespace() < 0 ) {
1263 $dbr = wfGetDB( DB_SLAVE
);
1264 $res = $dbr->select( 'protected_titles', '*',
1265 array ('pt_namespace' => $this->getNamespace(), 'pt_title' => $this->getDBKey()) );
1267 if ($row = $dbr->fetchRow( $res )) {
1274 public function updateTitleProtection( $create_perm, $reason, $expiry ) {
1275 global $wgGroupPermissions,$wgUser,$wgContLang;
1277 if ($create_perm == implode(',',$this->getRestrictions('create'))
1278 && $expiry == $this->mRestrictionsExpiry
) {
1283 list ($namespace, $title) = array( $this->getNamespace(), $this->getDBKey() );
1285 $dbw = wfGetDB( DB_MASTER
);
1287 $encodedExpiry = Block
::encodeExpiry($expiry, $dbw );
1289 $expiry_description = '';
1290 if ( $encodedExpiry != 'infinity' ) {
1291 $expiry_description = ' (' . wfMsgForContent( 'protect-expiring', $wgContLang->timeanddate( $expiry ) ).')';
1294 # Update protection table
1295 if ($create_perm != '' ) {
1296 $dbw->replace( 'protected_titles', array(array('pt_namespace', 'pt_title')),
1297 array( 'pt_namespace' => $namespace, 'pt_title' => $title
1298 , 'pt_create_perm' => $create_perm
1299 , 'pt_timestamp' => Block
::encodeExpiry(wfTimestampNow(), $dbw)
1300 , 'pt_expiry' => $encodedExpiry
1301 , 'pt_user' => $wgUser->getId(), 'pt_reason' => $reason ), __METHOD__
);
1303 $dbw->delete( 'protected_titles', array( 'pt_namespace' => $namespace,
1304 'pt_title' => $title ), __METHOD__
);
1306 # Update the protection log
1307 $log = new LogPage( 'protect' );
1309 if( $create_perm ) {
1310 $log->addEntry( $this->mRestrictions
['create'] ?
'modify' : 'protect', $this, trim( $reason . " [create=$create_perm] $expiry_description" ) );
1312 $log->addEntry( 'unprotect', $this, $reason );
1319 * Remove any title protection (due to page existing
1321 public function deleteTitleProtection() {
1322 $dbw = wfGetDB( DB_MASTER
);
1324 $dbw->delete( 'protected_titles',
1325 array ('pt_namespace' => $this->getNamespace(), 'pt_title' => $this->getDBKey()), __METHOD__
);
1329 * Can $wgUser edit this page?
1331 * @deprecated use userCan('edit')
1333 public function userCanEdit( $doExpensiveQueries = true ) {
1334 return $this->userCan( 'edit', $doExpensiveQueries );
1338 * Can $wgUser create this page?
1340 * @deprecated use userCan('create')
1342 public function userCanCreate( $doExpensiveQueries = true ) {
1343 return $this->userCan( 'create', $doExpensiveQueries );
1347 * Can $wgUser move this page?
1349 * @deprecated use userCan('move')
1351 public function userCanMove( $doExpensiveQueries = true ) {
1352 return $this->userCan( 'move', $doExpensiveQueries );
1356 * Would anybody with sufficient privileges be able to move this page?
1357 * Some pages just aren't movable.
1361 public function isMovable() {
1362 return Namespace::isMovable( $this->getNamespace() )
1363 && $this->getInterwiki() == '';
1367 * Can $wgUser read this page?
1369 * @todo fold these checks into userCan()
1371 public function userCanRead() {
1375 wfRunHooks( 'userCan', array( &$this, &$wgUser, 'read', &$result ) );
1376 if ( $result !== null ) {
1380 if( $wgUser->isAllowed( 'read' ) ) {
1383 global $wgWhitelistRead;
1386 * Always grant access to the login page.
1387 * Even anons need to be able to log in.
1389 if( $this->isSpecial( 'Userlogin' ) ||
$this->isSpecial( 'Resetpass' ) ) {
1394 * Bail out if there isn't whitelist
1396 if( !is_array($wgWhitelistRead) ) {
1401 * Check for explicit whitelisting
1403 $name = $this->getPrefixedText();
1404 if( in_array( $name, $wgWhitelistRead, true ) )
1408 * Old settings might have the title prefixed with
1409 * a colon for main-namespace pages
1411 if( $this->getNamespace() == NS_MAIN
) {
1412 if( in_array( ':' . $name, $wgWhitelistRead ) )
1417 * If it's a special page, ditch the subpage bit
1420 if( $this->getNamespace() == NS_SPECIAL
) {
1421 $name = $this->getDBKey();
1422 list( $name, /* $subpage */) = SpecialPage
::resolveAliasWithSubpage( $name );
1423 if ( $name === false ) {
1424 # Invalid special page, but we show standard login required message
1428 $pure = SpecialPage
::getTitleFor( $name )->getPrefixedText();
1429 if( in_array( $pure, $wgWhitelistRead, true ) )
1438 * Is this a talk page of some sort?
1441 public function isTalkPage() {
1442 return Namespace::isTalk( $this->getNamespace() );
1446 * Is this a subpage?
1449 public function isSubpage() {
1450 global $wgNamespacesWithSubpages;
1452 if( isset( $wgNamespacesWithSubpages[ $this->mNamespace
] ) ) {
1453 return ( strpos( $this->getText(), '/' ) !== false && $wgNamespacesWithSubpages[ $this->mNamespace
] == true );
1460 * Could this page contain custom CSS or JavaScript, based
1465 public function isCssOrJsPage() {
1466 return $this->mNamespace
== NS_MEDIAWIKI
1467 && preg_match( '!\.(?:css|js)$!u', $this->mTextform
) > 0;
1471 * Is this a .css or .js subpage of a user page?
1474 public function isCssJsSubpage() {
1475 return ( NS_USER
== $this->mNamespace
and preg_match("/\\/.*\\.(?:css|js)$/", $this->mTextform
) );
1478 * Is this a *valid* .css or .js subpage of a user page?
1479 * Check that the corresponding skin exists
1481 public function isValidCssJsSubpage() {
1482 if ( $this->isCssJsSubpage() ) {
1483 $skinNames = Skin
::getSkinNames();
1484 return array_key_exists( $this->getSkinFromCssJsSubpage(), $skinNames );
1490 * Trim down a .css or .js subpage title to get the corresponding skin name
1492 public function getSkinFromCssJsSubpage() {
1493 $subpage = explode( '/', $this->mTextform
);
1494 $subpage = $subpage[ count( $subpage ) - 1 ];
1495 return( str_replace( array( '.css', '.js' ), array( '', '' ), $subpage ) );
1498 * Is this a .css subpage of a user page?
1501 public function isCssSubpage() {
1502 return ( NS_USER
== $this->mNamespace
and preg_match("/\\/.*\\.css$/", $this->mTextform
) );
1505 * Is this a .js subpage of a user page?
1508 public function isJsSubpage() {
1509 return ( NS_USER
== $this->mNamespace
and preg_match("/\\/.*\\.js$/", $this->mTextform
) );
1512 * Protect css/js subpages of user pages: can $wgUser edit
1516 * @todo XXX: this might be better using restrictions
1518 public function userCanEditCssJsSubpage() {
1520 return ( $wgUser->isAllowed('editusercssjs') or preg_match('/^'.preg_quote($wgUser->getName(), '/').'\//', $this->mTextform
) );
1524 * Cascading protection: Return true if cascading restrictions apply to this page, false if not.
1526 * @return bool If the page is subject to cascading restrictions.
1528 public function isCascadeProtected() {
1529 list( $sources, /* $restrictions */ ) = $this->getCascadeProtectionSources( false );
1530 return ( $sources > 0 );
1534 * Cascading protection: Get the source of any cascading restrictions on this page.
1536 * @param $get_pages bool Whether or not to retrieve the actual pages that the restrictions have come from.
1537 * @return array( mixed title array, restriction array)
1538 * Array of the Title objects of the pages from which cascading restrictions have come, false for none, or true if such restrictions exist, but $get_pages was not set.
1539 * The restriction array is an array of each type, each of which contains an array of unique groups
1541 public function getCascadeProtectionSources( $get_pages = true ) {
1542 global $wgEnableCascadingProtection, $wgRestrictionTypes;
1544 # Define our dimension of restrictions types
1545 $pagerestrictions = array();
1546 foreach( $wgRestrictionTypes as $action )
1547 $pagerestrictions[$action] = array();
1549 if (!$wgEnableCascadingProtection)
1550 return array( false, $pagerestrictions );
1552 if ( isset( $this->mCascadeSources
) && $get_pages ) {
1553 return array( $this->mCascadeSources
, $this->mCascadingRestrictions
);
1554 } else if ( isset( $this->mHasCascadingRestrictions
) && !$get_pages ) {
1555 return array( $this->mHasCascadingRestrictions
, $pagerestrictions );
1558 wfProfileIn( __METHOD__
);
1560 $dbr = wfGetDb( DB_SLAVE
);
1562 if ( $this->getNamespace() == NS_IMAGE
) {
1563 $tables = array ('imagelinks', 'page_restrictions');
1564 $where_clauses = array(
1565 'il_to' => $this->getDBkey(),
1567 'pr_cascade' => 1 );
1569 $tables = array ('templatelinks', 'page_restrictions');
1570 $where_clauses = array(
1571 'tl_namespace' => $this->getNamespace(),
1572 'tl_title' => $this->getDBkey(),
1574 'pr_cascade' => 1 );
1578 $cols = array('pr_page', 'page_namespace', 'page_title', 'pr_expiry', 'pr_type', 'pr_level' );
1579 $where_clauses[] = 'page_id=pr_page';
1582 $cols = array( 'pr_expiry' );
1585 $res = $dbr->select( $tables, $cols, $where_clauses, __METHOD__
);
1587 $sources = $get_pages ?
array() : false;
1588 $now = wfTimestampNow();
1589 $purgeExpired = false;
1591 while( $row = $dbr->fetchObject( $res ) ) {
1592 $expiry = Block
::decodeExpiry( $row->pr_expiry
);
1593 if( $expiry > $now ) {
1595 $page_id = $row->pr_page
;
1596 $page_ns = $row->page_namespace
;
1597 $page_title = $row->page_title
;
1598 $sources[$page_id] = Title
::makeTitle($page_ns, $page_title);
1599 # Add groups needed for each restriction type if its not already there
1600 # Make sure this restriction type still exists
1601 if ( isset($pagerestrictions[$row->pr_type
]) && !in_array($row->pr_level
, $pagerestrictions[$row->pr_type
]) ) {
1602 $pagerestrictions[$row->pr_type
][]=$row->pr_level
;
1608 // Trigger lazy purge of expired restrictions from the db
1609 $purgeExpired = true;
1612 if( $purgeExpired ) {
1613 Title
::purgeExpiredRestrictions();
1616 wfProfileOut( __METHOD__
);
1619 $this->mCascadeSources
= $sources;
1620 $this->mCascadingRestrictions
= $pagerestrictions;
1622 $this->mHasCascadingRestrictions
= $sources;
1625 return array( $sources, $pagerestrictions );
1628 function areRestrictionsCascading() {
1629 if (!$this->mRestrictionsLoaded
) {
1630 $this->loadRestrictions();
1633 return $this->mCascadeRestriction
;
1637 * Loads a string into mRestrictions array
1638 * @param resource $res restrictions as an SQL result.
1640 private function loadRestrictionsFromRow( $res, $oldFashionedRestrictions = NULL ) {
1641 $dbr = wfGetDb( DB_SLAVE
);
1643 $this->mRestrictions
['edit'] = array();
1644 $this->mRestrictions
['move'] = array();
1646 # Backwards-compatibility: also load the restrictions from the page record (old format).
1648 if ( $oldFashionedRestrictions == NULL ) {
1649 $oldFashionedRestrictions = $dbr->selectField( 'page', 'page_restrictions', array( 'page_id' => $this->getArticleId() ), __METHOD__
);
1652 if ($oldFashionedRestrictions != '') {
1654 foreach( explode( ':', trim( $oldFashionedRestrictions ) ) as $restrict ) {
1655 $temp = explode( '=', trim( $restrict ) );
1656 if(count($temp) == 1) {
1657 // old old format should be treated as edit/move restriction
1658 $this->mRestrictions
["edit"] = explode( ',', trim( $temp[0] ) );
1659 $this->mRestrictions
["move"] = explode( ',', trim( $temp[0] ) );
1661 $this->mRestrictions
[$temp[0]] = explode( ',', trim( $temp[1] ) );
1665 $this->mOldRestrictions
= true;
1666 $this->mCascadeRestriction
= false;
1667 $this->mRestrictionsExpiry
= Block
::decodeExpiry('');
1671 if( $dbr->numRows( $res ) ) {
1672 # Current system - load second to make them override.
1673 $now = wfTimestampNow();
1674 $purgeExpired = false;
1676 while ($row = $dbr->fetchObject( $res ) ) {
1677 # Cycle through all the restrictions.
1679 // This code should be refactored, now that it's being used more generally,
1680 // But I don't really see any harm in leaving it in Block for now -werdna
1681 $expiry = Block
::decodeExpiry( $row->pr_expiry
);
1683 // Only apply the restrictions if they haven't expired!
1684 if ( !$expiry ||
$expiry > $now ) {
1685 $this->mRestrictionsExpiry
= $expiry;
1686 $this->mRestrictions
[$row->pr_type
] = explode( ',', trim( $row->pr_level
) );
1688 $this->mCascadeRestriction |
= $row->pr_cascade
;
1690 // Trigger a lazy purge of expired restrictions
1691 $purgeExpired = true;
1695 if( $purgeExpired ) {
1696 Title
::purgeExpiredRestrictions();
1700 $this->mRestrictionsLoaded
= true;
1703 public function loadRestrictions( $oldFashionedRestrictions = NULL ) {
1704 if( !$this->mRestrictionsLoaded
) {
1705 if ($this->exists()) {
1706 $dbr = wfGetDB( DB_SLAVE
);
1708 $res = $dbr->select( 'page_restrictions', '*',
1709 array ( 'pr_page' => $this->getArticleId() ), __METHOD__
);
1711 $this->loadRestrictionsFromRow( $res, $oldFashionedRestrictions );
1713 $title_protection = $this->getTitleProtection();
1715 if (is_array($title_protection)) {
1716 extract($title_protection);
1718 $now = wfTimestampNow();
1719 $expiry = Block
::decodeExpiry($pt_expiry);
1721 if (!$expiry ||
$expiry > $now) {
1722 // Apply the restrictions
1723 $this->mRestrictionsExpiry
= $expiry;
1724 $this->mRestrictions
['create'] = explode(',', trim($pt_create_perm) );
1725 } else { // Get rid of the old restrictions
1726 Title
::purgeExpiredRestrictions();
1729 $this->mRestrictionsLoaded
= true;
1735 * Purge expired restrictions from the page_restrictions table
1737 static function purgeExpiredRestrictions() {
1738 $dbw = wfGetDB( DB_MASTER
);
1739 $dbw->delete( 'page_restrictions',
1740 array( 'pr_expiry < ' . $dbw->addQuotes( $dbw->timestamp() ) ),
1743 $dbw->delete( 'protected_titles',
1744 array( 'pt_expiry < ' . $dbw->addQuotes( $dbw->timestamp() ) ),
1749 * Accessor/initialisation for mRestrictions
1751 * @param string $action action that permission needs to be checked for
1752 * @return array the array of groups allowed to edit this article
1754 public function getRestrictions( $action ) {
1755 if( !$this->mRestrictionsLoaded
) {
1756 $this->loadRestrictions();
1758 return isset( $this->mRestrictions
[$action] )
1759 ?
$this->mRestrictions
[$action]
1764 * Is there a version of this page in the deletion archive?
1765 * @return int the number of archived revisions
1767 public function isDeleted() {
1768 $fname = 'Title::isDeleted';
1769 if ( $this->getNamespace() < 0 ) {
1772 $dbr = wfGetDB( DB_SLAVE
);
1773 $n = $dbr->selectField( 'archive', 'COUNT(*)', array( 'ar_namespace' => $this->getNamespace(),
1774 'ar_title' => $this->getDBkey() ), $fname );
1775 if( $this->getNamespace() == NS_IMAGE
) {
1776 $n +
= $dbr->selectField( 'filearchive', 'COUNT(*)',
1777 array( 'fa_name' => $this->getDBkey() ), $fname );
1784 * Get the article ID for this Title from the link cache,
1785 * adding it if necessary
1786 * @param int $flags a bit field; may be GAID_FOR_UPDATE to select
1788 * @return int the ID
1790 public function getArticleID( $flags = 0 ) {
1791 $linkCache =& LinkCache
::singleton();
1792 if ( $flags & GAID_FOR_UPDATE
) {
1793 $oldUpdate = $linkCache->forUpdate( true );
1794 $this->mArticleID
= $linkCache->addLinkObj( $this );
1795 $linkCache->forUpdate( $oldUpdate );
1797 if ( -1 == $this->mArticleID
) {
1798 $this->mArticleID
= $linkCache->addLinkObj( $this );
1801 return $this->mArticleID
;
1804 public function getLatestRevID() {
1805 if ($this->mLatestID
!== false)
1806 return $this->mLatestID
;
1808 $db = wfGetDB(DB_SLAVE
);
1809 return $this->mLatestID
= $db->selectField( 'revision',
1811 array('rev_page' => $this->getArticleID()),
1812 'Title::getLatestRevID' );
1816 * This clears some fields in this object, and clears any associated
1817 * keys in the "bad links" section of the link cache.
1819 * - This is called from Article::insertNewArticle() to allow
1820 * loading of the new page_id. It's also called from
1821 * Article::doDeleteArticle()
1823 * @param int $newid the new Article ID
1825 public function resetArticleID( $newid ) {
1826 $linkCache =& LinkCache
::singleton();
1827 $linkCache->clearBadLink( $this->getPrefixedDBkey() );
1829 if ( 0 == $newid ) { $this->mArticleID
= -1; }
1830 else { $this->mArticleID
= $newid; }
1831 $this->mRestrictionsLoaded
= false;
1832 $this->mRestrictions
= array();
1836 * Updates page_touched for this page; called from LinksUpdate.php
1837 * @return bool true if the update succeded
1839 public function invalidateCache() {
1840 global $wgUseFileCache;
1842 if ( wfReadOnly() ) {
1846 $dbw = wfGetDB( DB_MASTER
);
1847 $success = $dbw->update( 'page',
1849 'page_touched' => $dbw->timestamp()
1850 ), array( /* WHERE */
1851 'page_namespace' => $this->getNamespace() ,
1852 'page_title' => $this->getDBkey()
1853 ), 'Title::invalidateCache'
1856 if ($wgUseFileCache) {
1857 $cache = new HTMLFileCache($this);
1858 @unlink
($cache->fileCacheName());
1865 * Prefix some arbitrary text with the namespace or interwiki prefix
1868 * @param string $name the text
1869 * @return string the prefixed text
1872 /* private */ function prefix( $name ) {
1874 if ( '' != $this->mInterwiki
) {
1875 $p = $this->mInterwiki
. ':';
1877 if ( 0 != $this->mNamespace
) {
1878 $p .= $this->getNsText() . ':';
1884 * Secure and split - main initialisation function for this object
1886 * Assumes that mDbkeyform has been set, and is urldecoded
1887 * and uses underscores, but not otherwise munged. This function
1888 * removes illegal characters, splits off the interwiki and
1889 * namespace prefixes, sets the other forms, and canonicalizes
1891 * @return bool true on success
1893 private function secureAndSplit() {
1894 global $wgContLang, $wgLocalInterwiki, $wgCapitalLinks;
1897 static $rxTc = false;
1899 # Matching titles will be held as illegal.
1901 # Any character not allowed is forbidden...
1902 '[^' . Title
::legalChars() . ']' .
1903 # URL percent encoding sequences interfere with the ability
1904 # to round-trip titles -- you can't link to them consistently.
1905 '|%[0-9A-Fa-f]{2}' .
1906 # XML/HTML character references produce similar issues.
1907 '|&[A-Za-z0-9\x80-\xff]+;' .
1909 '|&#x[0-9A-Fa-f]+;' .
1913 $this->mInterwiki
= $this->mFragment
= '';
1914 $this->mNamespace
= $this->mDefaultNamespace
; # Usually NS_MAIN
1916 $dbkey = $this->mDbkeyform
;
1918 # Strip Unicode bidi override characters.
1919 # Sometimes they slip into cut-n-pasted page titles, where the
1920 # override chars get included in list displays.
1921 $dbkey = str_replace( "\xE2\x80\x8E", '', $dbkey ); // 200E LEFT-TO-RIGHT MARK
1922 $dbkey = str_replace( "\xE2\x80\x8F", '', $dbkey ); // 200F RIGHT-TO-LEFT MARK
1924 # Clean up whitespace
1926 $dbkey = preg_replace( '/[ _]+/', '_', $dbkey );
1927 $dbkey = trim( $dbkey, '_' );
1929 if ( '' == $dbkey ) {
1933 if( false !== strpos( $dbkey, UTF8_REPLACEMENT
) ) {
1934 # Contained illegal UTF-8 sequences or forbidden Unicode chars.
1938 $this->mDbkeyform
= $dbkey;
1940 # Initial colon indicates main namespace rather than specified default
1941 # but should not create invalid {ns,title} pairs such as {0,Project:Foo}
1942 if ( ':' == $dbkey{0} ) {
1943 $this->mNamespace
= NS_MAIN
;
1944 $dbkey = substr( $dbkey, 1 ); # remove the colon but continue processing
1945 $dbkey = trim( $dbkey, '_' ); # remove any subsequent whitespace
1948 # Namespace or interwiki prefix
1952 if ( preg_match( "/^(.+?)_*:_*(.*)$/S", $dbkey, $m ) ) {
1954 if ( $ns = $wgContLang->getNsIndex( $p )) {
1955 # Ordinary namespace
1957 $this->mNamespace
= $ns;
1958 } elseif( $this->getInterwikiLink( $p ) ) {
1960 # Can't make a local interwiki link to an interwiki link.
1961 # That's just crazy!
1967 $this->mInterwiki
= $wgContLang->lc( $p );
1969 # Redundant interwiki prefix to the local wiki
1970 if ( 0 == strcasecmp( $this->mInterwiki
, $wgLocalInterwiki ) ) {
1971 if( $dbkey == '' ) {
1972 # Can't have an empty self-link
1975 $this->mInterwiki
= '';
1977 # Do another namespace split...
1981 # If there's an initial colon after the interwiki, that also
1982 # resets the default namespace
1983 if ( $dbkey !== '' && $dbkey[0] == ':' ) {
1984 $this->mNamespace
= NS_MAIN
;
1985 $dbkey = substr( $dbkey, 1 );
1988 # If there's no recognized interwiki or namespace,
1989 # then let the colon expression be part of the title.
1994 # We already know that some pages won't be in the database!
1996 if ( '' != $this->mInterwiki || NS_SPECIAL
== $this->mNamespace
) {
1997 $this->mArticleID
= 0;
1999 $fragment = strstr( $dbkey, '#' );
2000 if ( false !== $fragment ) {
2001 $this->setFragment( $fragment );
2002 $dbkey = substr( $dbkey, 0, strlen( $dbkey ) - strlen( $fragment ) );
2003 # remove whitespace again: prevents "Foo_bar_#"
2004 # becoming "Foo_bar_"
2005 $dbkey = preg_replace( '/_*$/', '', $dbkey );
2008 # Reject illegal characters.
2010 if( preg_match( $rxTc, $dbkey ) ) {
2015 * Pages with "/./" or "/../" appearing in the URLs will
2016 * often be unreachable due to the way web browsers deal
2017 * with 'relative' URLs. Forbid them explicitly.
2019 if ( strpos( $dbkey, '.' ) !== false &&
2020 ( $dbkey === '.' ||
$dbkey === '..' ||
2021 strpos( $dbkey, './' ) === 0 ||
2022 strpos( $dbkey, '../' ) === 0 ||
2023 strpos( $dbkey, '/./' ) !== false ||
2024 strpos( $dbkey, '/../' ) !== false ) )
2030 * Magic tilde sequences? Nu-uh!
2032 if( strpos( $dbkey, '~~~' ) !== false ) {
2037 * Limit the size of titles to 255 bytes.
2038 * This is typically the size of the underlying database field.
2039 * We make an exception for special pages, which don't need to be stored
2040 * in the database, and may edge over 255 bytes due to subpage syntax
2041 * for long titles, e.g. [[Special:Block/Long name]]
2043 if ( ( $this->mNamespace
!= NS_SPECIAL
&& strlen( $dbkey ) > 255 ) ||
2044 strlen( $dbkey ) > 512 )
2050 * Normally, all wiki links are forced to have
2051 * an initial capital letter so [[foo]] and [[Foo]]
2052 * point to the same place.
2054 * Don't force it for interwikis, since the other
2055 * site might be case-sensitive.
2057 $this->mUserCaseDBKey
= $dbkey;
2058 if( $wgCapitalLinks && $this->mInterwiki
== '') {
2059 $dbkey = $wgContLang->ucfirst( $dbkey );
2063 * Can't make a link to a namespace alone...
2064 * "empty" local links can only be self-links
2065 * with a fragment identifier.
2068 $this->mInterwiki
== '' &&
2069 $this->mNamespace
!= NS_MAIN
) {
2072 // Allow IPv6 usernames to start with '::' by canonicalizing IPv6 titles.
2073 // IP names are not allowed for accounts, and can only be referring to
2074 // edits from the IP. Given '::' abbreviations and caps/lowercaps,
2075 // there are numerous ways to present the same IP. Having sp:contribs scan
2076 // them all is silly and having some show the edits and others not is
2077 // inconsistent. Same for talk/userpages. Keep them normalized instead.
2078 $dbkey = ($this->mNamespace
== NS_USER ||
$this->mNamespace
== NS_USER_TALK
) ?
2079 IP
::sanitizeIP( $dbkey ) : $dbkey;
2080 // Any remaining initial :s are illegal.
2081 if ( $dbkey !== '' && ':' == $dbkey{0} ) {
2086 $this->mDbkeyform
= $dbkey;
2087 $this->mUrlform
= wfUrlencode( $dbkey );
2089 $this->mTextform
= str_replace( '_', ' ', $dbkey );
2095 * Set the fragment for this title
2096 * This is kind of bad, since except for this rarely-used function, Title objects
2097 * are immutable. The reason this is here is because it's better than setting the
2098 * members directly, which is what Linker::formatComment was doing previously.
2100 * @param string $fragment text
2101 * @todo clarify whether access is supposed to be public (was marked as "kind of public")
2103 public function setFragment( $fragment ) {
2104 $this->mFragment
= str_replace( '_', ' ', substr( $fragment, 1 ) );
2108 * Get a Title object associated with the talk page of this article
2109 * @return Title the object for the talk page
2111 public function getTalkPage() {
2112 return Title
::makeTitle( Namespace::getTalk( $this->getNamespace() ), $this->getDBkey() );
2116 * Get a title object associated with the subject page of this
2119 * @return Title the object for the subject page
2121 public function getSubjectPage() {
2122 return Title
::makeTitle( Namespace::getSubject( $this->getNamespace() ), $this->getDBkey() );
2126 * Get an array of Title objects linking to this Title
2127 * Also stores the IDs in the link cache.
2129 * WARNING: do not use this function on arbitrary user-supplied titles!
2130 * On heavily-used templates it will max out the memory.
2132 * @param string $options may be FOR UPDATE
2133 * @return array the Title objects linking here
2135 public function getLinksTo( $options = '', $table = 'pagelinks', $prefix = 'pl' ) {
2136 $linkCache =& LinkCache
::singleton();
2139 $db = wfGetDB( DB_MASTER
);
2141 $db = wfGetDB( DB_SLAVE
);
2144 $res = $db->select( array( 'page', $table ),
2145 array( 'page_namespace', 'page_title', 'page_id' ),
2147 "{$prefix}_from=page_id",
2148 "{$prefix}_namespace" => $this->getNamespace(),
2149 "{$prefix}_title" => $this->getDbKey() ),
2150 'Title::getLinksTo',
2154 if ( $db->numRows( $res ) ) {
2155 while ( $row = $db->fetchObject( $res ) ) {
2156 if ( $titleObj = Title
::makeTitle( $row->page_namespace
, $row->page_title
) ) {
2157 $linkCache->addGoodLinkObj( $row->page_id
, $titleObj );
2158 $retVal[] = $titleObj;
2162 $db->freeResult( $res );
2167 * Get an array of Title objects using this Title as a template
2168 * Also stores the IDs in the link cache.
2170 * WARNING: do not use this function on arbitrary user-supplied titles!
2171 * On heavily-used templates it will max out the memory.
2173 * @param string $options may be FOR UPDATE
2174 * @return array the Title objects linking here
2176 public function getTemplateLinksTo( $options = '' ) {
2177 return $this->getLinksTo( $options, 'templatelinks', 'tl' );
2181 * Get an array of Title objects referring to non-existent articles linked from this page
2183 * @todo check if needed (used only in SpecialBrokenRedirects.php, and should use redirect table in this case)
2184 * @param string $options may be FOR UPDATE
2185 * @return array the Title objects
2187 public function getBrokenLinksFrom( $options = '' ) {
2188 if ( $this->getArticleId() == 0 ) {
2189 # All links from article ID 0 are false positives
2194 $db = wfGetDB( DB_MASTER
);
2196 $db = wfGetDB( DB_SLAVE
);
2199 $res = $db->safeQuery(
2200 "SELECT pl_namespace, pl_title
2203 ON pl_namespace=page_namespace
2204 AND pl_title=page_title
2206 AND page_namespace IS NULL
2208 $db->tableName( 'pagelinks' ),
2209 $db->tableName( 'page' ),
2210 $this->getArticleId(),
2214 if ( $db->numRows( $res ) ) {
2215 while ( $row = $db->fetchObject( $res ) ) {
2216 $retVal[] = Title
::makeTitle( $row->pl_namespace
, $row->pl_title
);
2219 $db->freeResult( $res );
2225 * Get a list of URLs to purge from the Squid cache when this
2228 * @return array the URLs
2230 public function getSquidURLs() {
2234 $this->getInternalURL(),
2235 $this->getInternalURL( 'action=history' )
2238 // purge variant urls as well
2239 if($wgContLang->hasVariants()){
2240 $variants = $wgContLang->getVariants();
2241 foreach($variants as $vCode){
2242 if($vCode==$wgContLang->getCode()) continue; // we don't want default variant
2243 $urls[] = $this->getInternalURL('',$vCode);
2250 public function purgeSquid() {
2252 if ( $wgUseSquid ) {
2253 $urls = $this->getSquidURLs();
2254 $u = new SquidUpdate( $urls );
2260 * Move this page without authentication
2261 * @param Title &$nt the new page Title
2263 public function moveNoAuth( &$nt ) {
2264 return $this->moveTo( $nt, false );
2268 * Check whether a given move operation would be valid.
2269 * Returns true if ok, or a message key string for an error message
2270 * if invalid. (Scarrrrry ugly interface this.)
2271 * @param Title &$nt the new title
2272 * @param bool $auth indicates whether $wgUser's permissions
2274 * @return mixed true on success, message name on failure
2276 public function isValidMoveOperation( &$nt, $auth = true ) {
2277 if( !$this or !$nt ) {
2278 return 'badtitletext';
2280 if( $this->equals( $nt ) ) {
2283 if( !$this->isMovable() ||
!$nt->isMovable() ) {
2284 return 'immobile_namespace';
2287 $oldid = $this->getArticleID();
2288 $newid = $nt->getArticleID();
2290 if ( strlen( $nt->getDBkey() ) < 1 ) {
2291 return 'articleexists';
2293 if ( ( '' == $this->getDBkey() ) ||
2295 ( '' == $nt->getDBkey() ) ) {
2296 return 'badarticleerror';
2300 !$this->userCan( 'edit' ) ||
!$nt->userCan( 'edit' ) ||
2301 !$this->userCan( 'move' ) ||
!$nt->userCan( 'move' ) ) ) {
2302 return 'protectedpage';
2307 if( !wfRunHooks( 'AbortMove', array( $this, $nt, $wgUser, &$err ) ) ) {
2308 return 'hookaborted';
2311 # The move is allowed only if (1) the target doesn't exist, or
2312 # (2) the target is a redirect to the source, and has no history
2313 # (so we can undo bad moves right after they're done).
2315 if ( 0 != $newid ) { # Target exists; check for validity
2316 if ( ! $this->isValidMoveTarget( $nt ) ) {
2317 return 'articleexists';
2320 $tp = $nt->getTitleProtection();
2321 if ( $tp and !$wgUser->isAllowed( $tp['pt_create_perm'] ) ) {
2322 return 'cantmove-titleprotected';
2329 * Move a title to a new location
2330 * @param Title &$nt the new title
2331 * @param bool $auth indicates whether $wgUser's permissions
2333 * @param string $reason The reason for the move
2334 * @param bool $createRedirect Whether to create a redirect from the old title to the new title.
2335 * Ignored if the user doesn't have the suppressredirect right.
2336 * @return mixed true on success, message name on failure
2338 public function moveTo( &$nt, $auth = true, $reason = '', $createRedirect = true ) {
2339 $err = $this->isValidMoveOperation( $nt, $auth );
2340 if( is_string( $err ) ) {
2344 $pageid = $this->getArticleID();
2345 if( $nt->exists() ) {
2346 $this->moveOverExistingRedirect( $nt, $reason, $createRedirect );
2347 $pageCountChange = ($createRedirect ?
0 : -1);
2348 } else { # Target didn't exist, do normal move.
2349 $this->moveToNewTitle( $nt, $reason, $createRedirect );
2350 $pageCountChange = ($createRedirect ?
1 : 0);
2352 $redirid = $this->getArticleID();
2354 // Category memberships include a sort key which may be customized.
2355 // If it's left as the default (the page title), we need to update
2356 // the sort key to match the new title.
2358 // Be careful to avoid resetting cl_timestamp, which may disturb
2359 // time-based lists on some sites.
2361 // Warning -- if the sort key is *explicitly* set to the old title,
2362 // we can't actually distinguish it from a default here, and it'll
2363 // be set to the new title even though it really shouldn't.
2364 // It'll get corrected on the next edit, but resetting cl_timestamp.
2365 $dbw = wfGetDB( DB_MASTER
);
2366 $dbw->update( 'categorylinks',
2368 'cl_sortkey' => $nt->getPrefixedText(),
2369 'cl_timestamp=cl_timestamp' ),
2371 'cl_from' => $pageid,
2372 'cl_sortkey' => $this->getPrefixedText() ),
2377 $oldnamespace = $this->getNamespace() & ~
1;
2378 $newnamespace = $nt->getNamespace() & ~
1;
2379 $oldtitle = $this->getDBkey();
2380 $newtitle = $nt->getDBkey();
2382 if( $oldnamespace != $newnamespace ||
$oldtitle != $newtitle ) {
2383 WatchedItem
::duplicateEntries( $this, $nt );
2386 # Update search engine
2387 $u = new SearchUpdate( $pageid, $nt->getPrefixedDBkey() );
2389 $u = new SearchUpdate( $redirid, $this->getPrefixedDBkey(), '' );
2393 if( $this->isContentPage() && !$nt->isContentPage() ) {
2394 # No longer a content page
2395 # Not viewed, edited, removing
2396 $u = new SiteStatsUpdate( 0, 1, -1, $pageCountChange );
2397 } elseif( !$this->isContentPage() && $nt->isContentPage() ) {
2398 # Now a content page
2399 # Not viewed, edited, adding
2400 $u = new SiteStatsUpdate( 0, 1, +
1, $pageCountChange );
2401 } elseif( $pageCountChange ) {
2403 $u = new SiteStatsUpdate( 0, 0, 0, 1 );
2410 # Update message cache for interface messages
2411 if( $nt->getNamespace() == NS_MEDIAWIKI
) {
2412 global $wgMessageCache;
2413 $newarticle = new Article( $nt );
2414 $wgMessageCache->replace( $nt->getDBkey(), $newarticle->getContent() );
2418 wfRunHooks( 'TitleMoveComplete', array( &$this, &$nt, &$wgUser, $pageid, $redirid ) );
2423 * Move page to a title which is at present a redirect to the
2426 * @param Title &$nt the page to move to, which should currently
2428 * @param string $reason The reason for the move
2429 * @param bool $createRedirect Whether to leave a redirect at the old title.
2430 * Ignored if the user doesn't have the suppressredirect right
2432 private function moveOverExistingRedirect( &$nt, $reason = '', $createRedirect = true ) {
2433 global $wgUseSquid, $wgUser;
2434 $fname = 'Title::moveOverExistingRedirect';
2435 $comment = wfMsgForContent( '1movedto2_redir', $this->getPrefixedText(), $nt->getPrefixedText() );
2438 $comment .= ": $reason";
2441 $now = wfTimestampNow();
2442 $newid = $nt->getArticleID();
2443 $oldid = $this->getArticleID();
2444 $dbw = wfGetDB( DB_MASTER
);
2445 $linkCache =& LinkCache
::singleton();
2447 # Delete the old redirect. We don't save it to history since
2448 # by definition if we've got here it's rather uninteresting.
2449 # We have to remove it so that the next step doesn't trigger
2450 # a conflict on the unique namespace+title index...
2451 $dbw->delete( 'page', array( 'page_id' => $newid ), $fname );
2453 # Save a null revision in the page's history notifying of the move
2454 $nullRevision = Revision
::newNullRevision( $dbw, $oldid, $comment, true );
2455 $nullRevId = $nullRevision->insertOn( $dbw );
2457 # Change the name of the target page:
2458 $dbw->update( 'page',
2460 'page_touched' => $dbw->timestamp($now),
2461 'page_namespace' => $nt->getNamespace(),
2462 'page_title' => $nt->getDBkey(),
2463 'page_latest' => $nullRevId,
2465 /* WHERE */ array( 'page_id' => $oldid ),
2468 $linkCache->clearLink( $nt->getPrefixedDBkey() );
2470 # Recreate the redirect, this time in the other direction.
2471 if($createRedirect ||
!$wgUser->isAllowed('suppressredirect'))
2473 $mwRedir = MagicWord
::get( 'redirect' );
2474 $redirectText = $mwRedir->getSynonym( 0 ) . ' [[' . $nt->getPrefixedText() . "]]\n";
2475 $redirectArticle = new Article( $this );
2476 $newid = $redirectArticle->insertOn( $dbw );
2477 $redirectRevision = new Revision( array(
2479 'comment' => $comment,
2480 'text' => $redirectText ) );
2481 $redirectRevision->insertOn( $dbw );
2482 $redirectArticle->updateRevisionOn( $dbw, $redirectRevision, 0 );
2483 $linkCache->clearLink( $this->getPrefixedDBkey() );
2485 # Now, we record the link from the redirect to the new title.
2486 # It should have no other outgoing links...
2487 $dbw->delete( 'pagelinks', array( 'pl_from' => $newid ), $fname );
2488 $dbw->insert( 'pagelinks',
2490 'pl_from' => $newid,
2491 'pl_namespace' => $nt->getNamespace(),
2492 'pl_title' => $nt->getDbKey() ),
2497 $log = new LogPage( 'move' );
2498 $log->addEntry( 'move_redir', $this, $reason, array( 1 => $nt->getPrefixedText() ) );
2501 if ( $wgUseSquid ) {
2502 $urls = array_merge( $nt->getSquidURLs(), $this->getSquidURLs() );
2503 $u = new SquidUpdate( $urls );
2509 * Move page to non-existing title.
2510 * @param Title &$nt the new Title
2511 * @param string $reason The reason for the move
2512 * @param bool $createRedirect Whether to create a redirect from the old title to the new title
2513 * Ignored if the user doesn't have the suppressredirect right
2515 private function moveToNewTitle( &$nt, $reason = '', $createRedirect = true ) {
2516 global $wgUseSquid, $wgUser;
2517 $fname = 'MovePageForm::moveToNewTitle';
2518 $comment = wfMsgForContent( '1movedto2', $this->getPrefixedText(), $nt->getPrefixedText() );
2520 $comment .= ": $reason";
2523 $newid = $nt->getArticleID();
2524 $oldid = $this->getArticleID();
2525 $dbw = wfGetDB( DB_MASTER
);
2526 $now = $dbw->timestamp();
2527 $linkCache =& LinkCache
::singleton();
2529 # Save a null revision in the page's history notifying of the move
2530 $nullRevision = Revision
::newNullRevision( $dbw, $oldid, $comment, true );
2531 $nullRevId = $nullRevision->insertOn( $dbw );
2534 $dbw->update( 'page',
2536 'page_touched' => $now,
2537 'page_namespace' => $nt->getNamespace(),
2538 'page_title' => $nt->getDBkey(),
2539 'page_latest' => $nullRevId,
2541 /* WHERE */ array( 'page_id' => $oldid ),
2545 $linkCache->clearLink( $nt->getPrefixedDBkey() );
2547 if($createRedirect ||
!$wgUser->isAllowed('suppressredirect'))
2550 $mwRedir = MagicWord
::get( 'redirect' );
2551 $redirectText = $mwRedir->getSynonym( 0 ) . ' [[' . $nt->getPrefixedText() . "]]\n";
2552 $redirectArticle = new Article( $this );
2553 $newid = $redirectArticle->insertOn( $dbw );
2554 $redirectRevision = new Revision( array(
2556 'comment' => $comment,
2557 'text' => $redirectText ) );
2558 $redirectRevision->insertOn( $dbw );
2559 $redirectArticle->updateRevisionOn( $dbw, $redirectRevision, 0 );
2560 $linkCache->clearLink( $this->getPrefixedDBkey() );
2561 # Record the just-created redirect's linking to the page
2562 $dbw->insert( 'pagelinks',
2564 'pl_from' => $newid,
2565 'pl_namespace' => $nt->getNamespace(),
2566 'pl_title' => $nt->getDBkey() ),
2571 $log = new LogPage( 'move' );
2572 $log->addEntry( 'move', $this, $reason, array( 1 => $nt->getPrefixedText()) );
2574 # Purge caches as per article creation
2575 Article
::onArticleCreate( $nt );
2577 # Purge old title from squid
2578 # The new title, and links to the new title, are purged in Article::onArticleCreate()
2579 $this->purgeSquid();
2583 * Checks if $this can be moved to a given Title
2584 * - Selects for update, so don't call it unless you mean business
2586 * @param Title &$nt the new title to check
2588 public function isValidMoveTarget( $nt ) {
2590 $fname = 'Title::isValidMoveTarget';
2591 $dbw = wfGetDB( DB_MASTER
);
2594 $id = $nt->getArticleID();
2595 $obj = $dbw->selectRow( array( 'page', 'revision', 'text'),
2596 array( 'page_is_redirect','old_text','old_flags' ),
2597 array( 'page_id' => $id, 'page_latest=rev_id', 'rev_text_id=old_id' ),
2598 $fname, 'FOR UPDATE' );
2600 if ( !$obj ||
0 == $obj->page_is_redirect
) {
2602 wfDebug( __METHOD__
. ": not a redirect\n" );
2605 $text = Revision
::getRevisionText( $obj );
2607 # Does the redirect point to the source?
2608 # Or is it a broken self-redirect, usually caused by namespace collisions?
2610 if ( preg_match( "/\\[\\[\\s*([^\\]\\|]*)]]/", $text, $m ) ) {
2611 $redirTitle = Title
::newFromText( $m[1] );
2612 if( !is_object( $redirTitle ) ||
2613 ( $redirTitle->getPrefixedDBkey() != $this->getPrefixedDBkey() &&
2614 $redirTitle->getPrefixedDBkey() != $nt->getPrefixedDBkey() ) ) {
2615 wfDebug( __METHOD__
. ": redirect points to other page\n" );
2620 wfDebug( __METHOD__
. ": failsafe\n" );
2624 # Does the article have a history?
2625 $row = $dbw->selectRow( array( 'page', 'revision'),
2627 array( 'page_namespace' => $nt->getNamespace(),
2628 'page_title' => $nt->getDBkey(),
2629 'page_id=rev_page AND page_latest != rev_id'
2630 ), $fname, 'FOR UPDATE'
2633 # Return true if there was no history
2634 return $row === false;
2638 * Can this title be added to a user's watchlist?
2642 public function isWatchable() {
2643 return !$this->isExternal()
2644 && Namespace::isWatchable( $this->getNamespace() );
2648 * Get categories to which this Title belongs and return an array of
2649 * categories' names.
2651 * @return array an array of parents in the form:
2652 * $parent => $currentarticle
2654 public function getParentCategories() {
2657 $titlekey = $this->getArticleId();
2658 $dbr = wfGetDB( DB_SLAVE
);
2659 $categorylinks = $dbr->tableName( 'categorylinks' );
2662 $sql = "SELECT * FROM $categorylinks"
2663 ." WHERE cl_from='$titlekey'"
2664 ." AND cl_from <> '0'"
2665 ." ORDER BY cl_sortkey";
2667 $res = $dbr->query ( $sql ) ;
2669 if($dbr->numRows($res) > 0) {
2670 while ( $x = $dbr->fetchObject ( $res ) )
2671 //$data[] = Title::newFromText($wgContLang->getNSText ( NS_CATEGORY ).':'.$x->cl_to);
2672 $data[$wgContLang->getNSText ( NS_CATEGORY
).':'.$x->cl_to
] = $this->getFullText();
2673 $dbr->freeResult ( $res ) ;
2681 * Get a tree of parent categories
2682 * @param array $children an array with the children in the keys, to check for circular refs
2685 public function getParentCategoryTree( $children = array() ) {
2686 $parents = $this->getParentCategories();
2688 if($parents != '') {
2689 foreach($parents as $parent => $current) {
2690 if ( array_key_exists( $parent, $children ) ) {
2691 # Circular reference
2692 $stack[$parent] = array();
2694 $nt = Title
::newFromText($parent);
2696 $stack[$parent] = $nt->getParentCategoryTree( $children +
array($parent => 1) );
2708 * Get an associative array for selecting this title from
2713 public function pageCond() {
2714 return array( 'page_namespace' => $this->mNamespace
, 'page_title' => $this->mDbkeyform
);
2718 * Get the revision ID of the previous revision
2720 * @param integer $revision Revision ID. Get the revision that was before this one.
2721 * @return integer $oldrevision|false
2723 public function getPreviousRevisionID( $revision ) {
2724 $dbr = wfGetDB( DB_SLAVE
);
2725 return $dbr->selectField( 'revision', 'rev_id',
2726 'rev_page=' . intval( $this->getArticleId() ) .
2727 ' AND rev_id<' . intval( $revision ) . ' ORDER BY rev_id DESC' );
2731 * Get the revision ID of the next revision
2733 * @param integer $revision Revision ID. Get the revision that was after this one.
2734 * @return integer $oldrevision|false
2736 public function getNextRevisionID( $revision ) {
2737 $dbr = wfGetDB( DB_SLAVE
);
2738 return $dbr->selectField( 'revision', 'rev_id',
2739 'rev_page=' . intval( $this->getArticleId() ) .
2740 ' AND rev_id>' . intval( $revision ) . ' ORDER BY rev_id' );
2744 * Get the number of revisions between the given revision IDs.
2746 * @param integer $old Revision ID.
2747 * @param integer $new Revision ID.
2748 * @return integer Number of revisions between these IDs.
2750 public function countRevisionsBetween( $old, $new ) {
2751 $dbr = wfGetDB( DB_SLAVE
);
2752 return $dbr->selectField( 'revision', 'count(*)',
2753 'rev_page = ' . intval( $this->getArticleId() ) .
2754 ' AND rev_id > ' . intval( $old ) .
2755 ' AND rev_id < ' . intval( $new ) );
2759 * Compare with another title.
2761 * @param Title $title
2764 public function equals( $title ) {
2765 // Note: === is necessary for proper matching of number-like titles.
2766 return $this->getInterwiki() === $title->getInterwiki()
2767 && $this->getNamespace() == $title->getNamespace()
2768 && $this->getDbkey() === $title->getDbkey();
2772 * Return a string representation of this title
2776 public function __toString() {
2777 return $this->getPrefixedText();
2781 * Check if page exists
2784 public function exists() {
2785 return $this->getArticleId() != 0;
2789 * Do we know that this title definitely exists, or should we otherwise
2790 * consider that it exists?
2794 public function isAlwaysKnown() {
2795 // If the page is form Mediawiki:message/lang, calling wfMsgWeirdKey causes
2796 // the full l10n of that language to be loaded. That takes much memory and
2797 // isn't needed. So we strip the language part away.
2798 // Also, extension messages which are not loaded, are shown as red, because
2799 // we don't call MessageCache::loadAllMessages.
2800 list( $basename, /* rest */ ) = explode( '/', $this->mDbkeyform
, 2 );
2801 return $this->isExternal()
2802 ||
( $this->mNamespace
== NS_MAIN
&& $this->mDbkeyform
== '' )
2803 ||
( $this->mNamespace
== NS_MEDIAWIKI
&& wfMsgWeirdKey( $basename ) );
2807 * Update page_touched timestamps and send squid purge messages for
2808 * pages linking to this title. May be sent to the job queue depending
2809 * on the number of links. Typically called on create and delete.
2811 public function touchLinks() {
2812 $u = new HTMLCacheUpdate( $this, 'pagelinks' );
2815 if ( $this->getNamespace() == NS_CATEGORY
) {
2816 $u = new HTMLCacheUpdate( $this, 'categorylinks' );
2822 * Get the last touched timestamp
2824 public function getTouched() {
2825 $dbr = wfGetDB( DB_SLAVE
);
2826 $touched = $dbr->selectField( 'page', 'page_touched',
2828 'page_namespace' => $this->getNamespace(),
2829 'page_title' => $this->getDBkey()
2835 public function trackbackURL() {
2836 global $wgTitle, $wgScriptPath, $wgServer;
2838 return "$wgServer$wgScriptPath/trackback.php?article="
2839 . htmlspecialchars(urlencode($wgTitle->getPrefixedDBkey()));
2842 public function trackbackRDF() {
2843 $url = htmlspecialchars($this->getFullURL());
2844 $title = htmlspecialchars($this->getText());
2845 $tburl = $this->trackbackURL();
2848 <rdf:RDF xmlns:rdf=\"http://www.w3.org/1999/02/22-rdf-syntax-ns#\"
2849 xmlns:dc=\"http://purl.org/dc/elements/1.1/\"
2850 xmlns:trackback=\"http://madskills.com/public/xml/rss/module/trackback/\">
2853 dc:identifier=\"$url\"
2855 trackback:ping=\"$tburl\" />
2860 * Generate strings used for xml 'id' names in monobook tabs
2863 public function getNamespaceKey() {
2865 switch ($this->getNamespace()) {
2868 return 'nstab-main';
2871 return 'nstab-user';
2873 return 'nstab-media';
2875 return 'nstab-special';
2877 case NS_PROJECT_TALK
:
2878 return 'nstab-project';
2881 return 'nstab-image';
2883 case NS_MEDIAWIKI_TALK
:
2884 return 'nstab-mediawiki';
2886 case NS_TEMPLATE_TALK
:
2887 return 'nstab-template';
2890 return 'nstab-help';
2892 case NS_CATEGORY_TALK
:
2893 return 'nstab-category';
2895 return 'nstab-' . $wgContLang->lc( $this->getSubjectNsText() );
2900 * Returns true if this title resolves to the named special page
2901 * @param string $name The special page name
2903 public function isSpecial( $name ) {
2904 if ( $this->getNamespace() == NS_SPECIAL
) {
2905 list( $thisName, /* $subpage */ ) = SpecialPage
::resolveAliasWithSubpage( $this->getDBkey() );
2906 if ( $name == $thisName ) {
2914 * If the Title refers to a special page alias which is not the local default,
2915 * returns a new Title which points to the local default. Otherwise, returns $this.
2917 public function fixSpecialName() {
2918 if ( $this->getNamespace() == NS_SPECIAL
) {
2919 $canonicalName = SpecialPage
::resolveAlias( $this->mDbkeyform
);
2920 if ( $canonicalName ) {
2921 $localName = SpecialPage
::getLocalNameFor( $canonicalName );
2922 if ( $localName != $this->mDbkeyform
) {
2923 return Title
::makeTitle( NS_SPECIAL
, $localName );
2931 * Is this Title in a namespace which contains content?
2932 * In other words, is this a content page, for the purposes of calculating
2937 public function isContentPage() {
2938 return Namespace::isContent( $this->getNamespace() );