Standardised file description headers; second part
[lhc/web/wiklou.git] / includes / specials / SpecialUserlogout.php
index 9e2c921..39b5b28 100644 (file)
@@ -1,5 +1,6 @@
 <?php
 /**
+ * Implements Special:Upload
  *
  * This program is free software; you can redistribute it and/or modify
  * it under the terms of the GNU General Public License as published by
  * with this program; if not, write to the Free Software Foundation, Inc.,
  * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  * http://www.gnu.org/copyleft/gpl.html
- */
-
-/**
+ *
  * @file
  * @ingroup SpecialPage
  */
 
 /**
- * constructor
+ * Implements Special:Userlogout
+ *
+ * @ingroup SpecialPage
  */
-function wfSpecialUserlogout() {
-       global $wgUser, $wgOut;
-
-       /**
-        * Some satellite ISPs use broken precaching schemes that log people out straight after
-        * they're logged in (bug 17790). Luckily, there's a way to detect such requests.
-        */
-       if ( isset( $_SERVER['REQUEST_URI'] ) && strpos( $_SERVER['REQUEST_URI'], '&amp;' ) !== false ) {
-               wfDebug( "Special:Userlogout request {$_SERVER['REQUEST_URI']} looks suspicious, denying.\n" );
-               wfHttpError( 400, wfMsg( 'loginerror' ), wfMsg( 'suspicious-userlogout' ) );
-               return;
+class SpecialUserlogout extends UnlistedSpecialPage {
+
+       function __construct() {
+               parent::__construct( 'Userlogout' );
        }
-       
-       $oldName = $wgUser->getName();
-       $wgUser->logout();
-       $wgOut->setRobotPolicy( 'noindex,nofollow' );
 
-       // Hook.
-       $injected_html = '';
-       wfRunHooks( 'UserLogoutComplete', array(&$wgUser, &$injected_html, $oldName) );
+       function execute( $par ) {
+               global $wgUser, $wgOut;
 
-       $wgOut->addHTML( wfMsgExt( 'logouttext', array( 'parse' ) ) . $injected_html );
-       $wgOut->returnToMain();
+               /**
+                * Some satellite ISPs use broken precaching schemes that log people out straight after
+                * they're logged in (bug 17790). Luckily, there's a way to detect such requests.
+                */
+               if ( isset( $_SERVER['REQUEST_URI'] ) && strpos( $_SERVER['REQUEST_URI'], '&amp;' ) !== false ) {
+                       wfDebug( "Special:Userlogout request {$_SERVER['REQUEST_URI']} looks suspicious, denying.\n" );
+                       wfHttpError( 400, wfMsg( 'loginerror' ), wfMsg( 'suspicious-userlogout' ) );
+                       return;
+               }
+
+               $this->setHeaders();
+               $this->outputHeader();
+
+               $oldName = $wgUser->getName();
+               $wgUser->logout();
+
+               $wgOut->addWikiMsg( 'logouttext' );
+
+               // Hook.
+               $injected_html = '';
+               wfRunHooks( 'UserLogoutComplete', array( &$wgUser, &$injected_html, $oldName ) );
+               $wgOut->addHTML( $injected_html );
+
+               $wgOut->returnToMain();
+       }
 }