Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
bugzilla
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
etersoft
bugzilla
Commits
69ec0a28
Commit
69ec0a28
authored
Jul 21, 2005
by
lpsolit%gmail.com
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Bug 301458: Move url_decode out of CGI.pl - Patch by Frédéric Buclin…
Bug 301458: Move url_decode out of CGI.pl - Patch by Frédéric Buclin <LpSolit@gmail.com> r=mkanat a=myk
parent
b8a33eb3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
30 additions
and
9 deletions
+30
-9
Util.pm
Bugzilla/Util.pm
+28
-0
CGI.pl
CGI.pl
+0
-8
query.cgi
query.cgi
+2
-1
No files found.
Bugzilla/Util.pm
View file @
69ec0a28
...
...
@@ -131,6 +131,13 @@ sub xml_quote {
return
$var
;
}
sub
url_decode
{
my
(
$todecode
)
=
(
@_
);
$todecode
=~
tr
/+/
/
;
# pluses become spaces
$todecode
=~
s/%([0-9a-fA-F]{2})/pack("c",hex($1))/ge
;
return
$todecode
;
}
sub
i_am_cgi
()
{
# I use SERVER_SOFTWARE because it's required to be
# defined for all requests in the CGI spec.
...
...
@@ -391,6 +398,9 @@ Bugzilla::Util - Generic utility functions for bugzilla
value_quote($var);
xml_quote($var);
# Functions for decoding
$rv = url_decode($var);
# Functions that tell you about your environment
my $is_cgi = i_am_cgi();
...
...
@@ -416,6 +426,9 @@ Bugzilla::Util - Generic utility functions for bugzilla
# Cryptographic Functions
$crypted_password = bz_crypt($password);
# Validation Functions
check_email_syntax($email);
=head1 DESCRIPTION
This package contains various utility functions which do not belong anywhere
...
...
@@ -498,6 +511,10 @@ This is similar to C<html_quote>, except that ' is escaped to '. This
is kept separate from html_quote partly for compatibility with previous code
(for ') and partly for future handling of non-ASCII characters.
=item C<url_decode($val)>
Converts the %xx encoding from the given URL back to its original form.
=item C<i_am_cgi()>
Tells you whether or not you are being run as a CGI script in a web
...
...
@@ -638,3 +655,14 @@ characters of the password to anyone who views the encrypted version.
=end undocumented
=back
=head2 Validation
=over 4
=item C<check_email_syntax($email)>
Do a syntax checking for a legal email address. An error is thrown
if the validation fails.
=back
CGI.pl
View file @
69ec0a28
...
...
@@ -55,14 +55,6 @@ use vars qw($template $vars);
# Implementations of several of the below were blatently stolen from CGI.pm,
# by Lincoln D. Stein.
# Get rid of all the %xx encoding and the like from the given URL.
sub
url_decode
{
my
(
$todecode
)
=
(
@_
);
$todecode
=~
tr
/+/
/
;
# pluses become spaces
$todecode
=~
s/%([0-9a-fA-F]{2})/pack("c",hex($1))/ge
;
return
$todecode
;
}
# check and see if a given field exists, is non-empty, and is set to a
# legal value. assume a browser bug and abort appropriately if not.
# if $legalsRef is not passed, just check to make sure the value exists and
...
...
query.cgi
View file @
69ec0a28
...
...
@@ -33,6 +33,7 @@ require "CGI.pl";
use
Bugzilla::
Constants
;
use
Bugzilla::
Search
;
use
Bugzilla::
User
;
use
Bugzilla::
Util
;
use
vars
qw(
@CheckOptionValues
...
...
@@ -165,7 +166,7 @@ sub PrefillForm {
my
$name
=
$el
[
0
];
my
$value
;
if
(
$#el
>
0
)
{
$value
=
url_decode
(
$el
[
1
]);
$value
=
Bugzilla::Util::
url_decode
(
$el
[
1
]);
}
else
{
$value
=
""
;
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment