2008-06-27 06:18:51 +00:00
|
|
|
<?php
|
|
|
|
|
2016-12-07 23:32:41 +00:00
|
|
|
use MediaWiki\MediaWikiServices;
|
2016-05-15 15:35:33 +00:00
|
|
|
|
2008-06-27 06:18:51 +00:00
|
|
|
class AbuseFilterHooks {
|
2015-03-17 13:00:14 +00:00
|
|
|
const FETCH_ALL_TAGS_KEY = 'abusefilter-fetch-all-tags';
|
|
|
|
|
2015-09-28 18:03:35 +00:00
|
|
|
public static $successful_action_vars = false;
|
2012-02-10 23:41:05 +00:00
|
|
|
/** @var WikiPage|Article|bool */
|
2015-09-28 18:03:35 +00:00
|
|
|
public static $last_edit_page = false; // make sure edit filter & edit save hooks match
|
2011-08-26 20:12:34 +00:00
|
|
|
// So far, all of the error message out-params for these hooks accept HTML.
|
|
|
|
// Hooray!
|
2011-08-24 22:11:52 +00:00
|
|
|
|
2016-06-03 18:01:56 +00:00
|
|
|
/**
|
|
|
|
* Called right after configuration has been loaded.
|
|
|
|
*/
|
|
|
|
public static function onRegistration() {
|
2016-05-15 15:35:33 +00:00
|
|
|
global $wgAbuseFilterAvailableActions, $wgAbuseFilterRestrictedActions,
|
2017-08-08 12:03:56 +00:00
|
|
|
$wgAuthManagerAutoConfig;
|
2016-06-03 18:01:56 +00:00
|
|
|
|
|
|
|
if ( isset( $wgAbuseFilterAvailableActions ) || isset( $wgAbuseFilterRestrictedActions ) ) {
|
2017-04-15 16:34:16 +00:00
|
|
|
wfWarn( '$wgAbuseFilterAvailableActions and $wgAbuseFilterRestrictedActions have been '
|
|
|
|
. 'removed. Please use $wgAbuseFilterActions and $wgAbuseFilterRestrictions '
|
|
|
|
. 'instead. The format is the same except the action names are the keys of the '
|
2016-06-03 18:01:56 +00:00
|
|
|
. 'array and the values are booleans.' );
|
|
|
|
}
|
2016-05-15 15:35:33 +00:00
|
|
|
|
2017-08-08 12:03:56 +00:00
|
|
|
$wgAuthManagerAutoConfig['preauth'][AbuseFilterPreAuthenticationProvider::class] = [
|
|
|
|
'class' => AbuseFilterPreAuthenticationProvider::class,
|
|
|
|
'sort' => 5, // run after normal preauth providers to keep the log cleaner
|
|
|
|
];
|
2016-06-03 18:01:56 +00:00
|
|
|
}
|
|
|
|
|
2013-01-04 15:37:56 +00:00
|
|
|
/**
|
2016-04-07 05:06:02 +00:00
|
|
|
* Entry point for the EditFilterMergedContent hook.
|
2013-01-04 15:37:56 +00:00
|
|
|
*
|
|
|
|
* @param IContextSource $context the context of the edit
|
|
|
|
* @param Content $content the new Content generated by the edit
|
2015-09-28 18:03:35 +00:00
|
|
|
* @param Status $status Error message to return
|
2013-01-04 15:37:56 +00:00
|
|
|
* @param string $summary Edit summary for page
|
|
|
|
* @param User $user the user performing the edit
|
|
|
|
* @param bool $minoredit whether this is a minor edit according to the user.
|
2016-06-20 21:58:17 +00:00
|
|
|
* @return bool Always true
|
2013-01-04 15:37:56 +00:00
|
|
|
*/
|
|
|
|
public static function onEditFilterMergedContent( IContextSource $context, Content $content,
|
2017-07-08 18:49:13 +00:00
|
|
|
Status $status, $summary, User $user, $minoredit
|
|
|
|
) {
|
2016-05-13 04:17:51 +00:00
|
|
|
$text = AbuseFilter::contentToString( $content );
|
2013-01-04 15:37:56 +00:00
|
|
|
|
2016-06-20 21:58:17 +00:00
|
|
|
$filterStatus = self::filterEdit( $context, $content, $text, $status, $summary, $minoredit );
|
2015-09-28 18:03:35 +00:00
|
|
|
|
2016-06-20 21:58:17 +00:00
|
|
|
if ( !$filterStatus->isOK() ) {
|
2016-06-16 15:40:36 +00:00
|
|
|
// Produce a useful error message for API edits
|
2016-06-20 21:58:17 +00:00
|
|
|
$status->apiHookResult = self::getApiResult( $filterStatus );
|
2016-04-07 05:06:02 +00:00
|
|
|
}
|
|
|
|
|
2016-06-20 21:58:17 +00:00
|
|
|
return true;
|
2013-01-04 15:37:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2016-06-16 15:40:36 +00:00
|
|
|
* Implementation for EditFilterMergedContent hook.
|
2013-01-04 15:37:56 +00:00
|
|
|
*
|
|
|
|
* @param IContextSource $context the context of the edit
|
2016-09-13 07:44:34 +00:00
|
|
|
* @param Content $content the new Content generated by the edit
|
2013-01-04 15:37:56 +00:00
|
|
|
* @param string $text new page content (subject of filtering)
|
2015-09-28 18:03:35 +00:00
|
|
|
* @param Status $status Error message to return
|
2013-01-04 15:37:56 +00:00
|
|
|
* @param string $summary Edit summary for page
|
|
|
|
* @param bool $minoredit whether this is a minor edit according to the user.
|
2016-06-20 21:58:17 +00:00
|
|
|
* @return Status
|
2013-01-04 15:37:56 +00:00
|
|
|
*/
|
|
|
|
public static function filterEdit( IContextSource $context, $content, $text,
|
2017-07-08 18:49:13 +00:00
|
|
|
Status $status, $summary, $minoredit
|
|
|
|
) {
|
2013-07-04 00:25:25 +00:00
|
|
|
$title = $context->getTitle();
|
|
|
|
|
2012-02-10 23:41:05 +00:00
|
|
|
self::$successful_action_vars = false;
|
|
|
|
self::$last_edit_page = false;
|
|
|
|
|
2013-07-08 18:27:10 +00:00
|
|
|
$user = $context->getUser();
|
|
|
|
|
2016-09-13 08:40:21 +00:00
|
|
|
$oldcontent = null;
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2013-02-14 11:39:51 +00:00
|
|
|
if ( ( $title instanceof Title ) && $title->canExist() && $title->exists() ) {
|
2011-10-25 12:46:05 +00:00
|
|
|
// Make sure we load the latest text saved in database (bug 31656)
|
2013-01-04 15:37:56 +00:00
|
|
|
$page = $context->getWikiPage();
|
|
|
|
$revision = $page->getRevision();
|
2012-05-03 23:35:23 +00:00
|
|
|
if ( !$revision ) {
|
2016-06-20 21:58:17 +00:00
|
|
|
return Status::newGood();
|
2012-05-03 23:35:23 +00:00
|
|
|
}
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2015-11-23 09:59:11 +00:00
|
|
|
$oldcontent = $revision->getContent( Revision::RAW );
|
|
|
|
$oldtext = AbuseFilter::contentToString( $oldcontent );
|
2011-10-25 12:46:05 +00:00
|
|
|
|
2013-01-04 15:37:56 +00:00
|
|
|
// Cache article object so we can share a parse operation
|
|
|
|
$articleCacheKey = $title->getNamespace() . ':' . $title->getText();
|
|
|
|
AFComputedVariable::$articleCache[$articleCacheKey] = $page;
|
2014-09-10 21:33:27 +00:00
|
|
|
|
|
|
|
// Don't trigger for null edits.
|
2016-09-13 08:40:21 +00:00
|
|
|
if ( $content && $oldcontent ) {
|
2014-09-10 21:33:27 +00:00
|
|
|
// Compare Content objects if available
|
2016-09-13 08:40:21 +00:00
|
|
|
if ( $content->equals( $oldcontent ) ) {
|
|
|
|
return Status::newGood();
|
|
|
|
}
|
2014-09-10 21:33:27 +00:00
|
|
|
} elseif ( strcmp( $oldtext, $text ) == 0 ) {
|
|
|
|
// Otherwise, compare strings
|
2016-06-20 21:58:17 +00:00
|
|
|
return Status::newGood();
|
2014-09-10 21:33:27 +00:00
|
|
|
}
|
2013-01-04 15:37:56 +00:00
|
|
|
} else {
|
|
|
|
$page = null;
|
|
|
|
}
|
|
|
|
|
2016-06-13 11:53:50 +00:00
|
|
|
// Load vars for filters to check
|
|
|
|
$vars = self::newVariableHolderForEdit(
|
2016-09-13 08:40:21 +00:00
|
|
|
$user, $title, $page, $summary, $content, $oldcontent, $text
|
2013-03-06 06:21:55 +00:00
|
|
|
);
|
2012-11-16 17:06:34 +00:00
|
|
|
|
2011-11-09 08:36:26 +00:00
|
|
|
$filter_result = AbuseFilter::filterAction( $vars, $title );
|
2013-01-08 14:52:49 +00:00
|
|
|
if ( !$filter_result->isOK() ) {
|
|
|
|
$status->merge( $filter_result );
|
2015-09-28 18:03:35 +00:00
|
|
|
|
2016-06-20 21:58:17 +00:00
|
|
|
return $filter_result;
|
2008-06-27 09:26:54 +00:00
|
|
|
}
|
2012-02-10 23:41:05 +00:00
|
|
|
|
|
|
|
self::$successful_action_vars = $vars;
|
2013-01-04 15:37:56 +00:00
|
|
|
self::$last_edit_page = $page;
|
2012-02-10 23:41:05 +00:00
|
|
|
|
2016-06-20 21:58:17 +00:00
|
|
|
return Status::newGood();
|
2012-02-10 23:41:05 +00:00
|
|
|
}
|
|
|
|
|
2016-06-13 11:53:50 +00:00
|
|
|
/**
|
|
|
|
* @param User $user
|
|
|
|
* @param Title $title
|
|
|
|
* @param WikiPage|null $page
|
|
|
|
* @param string $summary
|
2016-09-13 08:40:21 +00:00
|
|
|
* @param Content $newcontent
|
|
|
|
* @param Content|null $oldcontent
|
2016-06-13 11:53:50 +00:00
|
|
|
* @param string $text
|
|
|
|
* @return AbuseFilterVariableHolder
|
|
|
|
* @throws MWException
|
|
|
|
*/
|
|
|
|
private static function newVariableHolderForEdit(
|
2016-09-13 08:40:21 +00:00
|
|
|
User $user, Title $title, $page, $summary, Content $newcontent,
|
|
|
|
$oldcontent = null, $text
|
2016-06-13 11:53:50 +00:00
|
|
|
) {
|
|
|
|
$vars = new AbuseFilterVariableHolder();
|
|
|
|
$vars->addHolders(
|
|
|
|
AbuseFilter::generateUserVars( $user ),
|
|
|
|
AbuseFilter::generateTitleVars( $title, 'ARTICLE' )
|
|
|
|
);
|
|
|
|
$vars->setVar( 'action', 'edit' );
|
|
|
|
$vars->setVar( 'summary', $summary );
|
2016-09-13 08:40:21 +00:00
|
|
|
if ( $oldcontent instanceof Content ) {
|
|
|
|
$oldmodel = $oldcontent->getModel();
|
|
|
|
$oldtext = AbuseFilter::contentToString( $oldcontent );
|
|
|
|
} else {
|
|
|
|
$oldmodel = '';
|
|
|
|
$oldtext = '';
|
|
|
|
}
|
|
|
|
$vars->setVar( 'old_content_model', $oldmodel );
|
|
|
|
$vars->setVar( 'new_content_model', $newcontent->getModel() );
|
2016-06-13 11:53:50 +00:00
|
|
|
$vars->setVar( 'old_wikitext', $oldtext );
|
|
|
|
$vars->setVar( 'new_wikitext', $text );
|
|
|
|
// TODO: set old_content and new_content vars, use them
|
|
|
|
$vars->addHolders( AbuseFilter::getEditVars( $title, $page ) );
|
|
|
|
|
|
|
|
return $vars;
|
|
|
|
}
|
|
|
|
|
2016-04-07 05:06:02 +00:00
|
|
|
/**
|
|
|
|
* @param Status $status Error message details
|
|
|
|
* @return array API result
|
|
|
|
*/
|
2016-06-20 21:58:17 +00:00
|
|
|
private static function getApiResult( Status $status ) {
|
|
|
|
global $wgFullyInitialised;
|
|
|
|
|
|
|
|
$params = $status->getErrorsArray()[0];
|
|
|
|
$key = array_shift( $params );
|
|
|
|
|
|
|
|
$warning = wfMessage( $key )->params( $params );
|
|
|
|
if ( !$wgFullyInitialised ) {
|
|
|
|
// This could happen for account autocreation checks
|
|
|
|
$warning = $warning->inContentLanguage();
|
2016-04-07 05:06:02 +00:00
|
|
|
}
|
|
|
|
|
2016-06-20 21:58:17 +00:00
|
|
|
$filterDescription = $params[0];
|
|
|
|
$filter = $params[1];
|
|
|
|
|
|
|
|
// The value is a nested structure keyed by filter id, which doesn't make sense when we only
|
|
|
|
// return the result from one filter. Flatten it to a plain array of actions.
|
|
|
|
$actionsTaken = array_values( array_unique(
|
|
|
|
call_user_func_array( 'array_merge', array_values( $status->getValue() ) )
|
|
|
|
) );
|
|
|
|
$code = ( $actionsTaken === [ 'warn' ] ) ? 'abusefilter-warning' : 'abusefilter-disallowed';
|
|
|
|
|
|
|
|
ApiResult::setIndexedTagName( $params, 'param' );
|
2017-06-15 14:23:34 +00:00
|
|
|
return [
|
2016-04-07 05:06:02 +00:00
|
|
|
'code' => $code,
|
2017-06-15 14:23:34 +00:00
|
|
|
'message' => [
|
2016-06-20 21:58:17 +00:00
|
|
|
'key' => $key,
|
|
|
|
'params' => $params,
|
2017-06-15 14:23:34 +00:00
|
|
|
],
|
|
|
|
'abusefilter' => [
|
2016-06-20 21:58:17 +00:00
|
|
|
'id' => $filter,
|
|
|
|
'description' => $filterDescription,
|
|
|
|
'actions' => $actionsTaken,
|
2017-06-15 14:23:34 +00:00
|
|
|
],
|
2016-06-20 21:58:17 +00:00
|
|
|
// For backwards-compatibility
|
2016-04-07 05:06:02 +00:00
|
|
|
'info' => 'Hit AbuseFilter: ' . $filterDescription,
|
2016-06-20 21:58:17 +00:00
|
|
|
'warning' => $warning->parse(),
|
2017-06-15 14:23:34 +00:00
|
|
|
];
|
2016-04-07 05:06:02 +00:00
|
|
|
}
|
|
|
|
|
2016-06-13 11:53:50 +00:00
|
|
|
/**
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param Article|WikiPage &$article
|
|
|
|
* @param User &$user
|
2016-10-09 17:20:42 +00:00
|
|
|
* @param string $content Content
|
2016-06-13 11:53:50 +00:00
|
|
|
* @param string $summary
|
|
|
|
* @param bool $minoredit
|
|
|
|
* @param bool $watchthis
|
|
|
|
* @param string $sectionanchor
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param int &$flags
|
2016-06-13 11:53:50 +00:00
|
|
|
* @param Revision $revision
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param Status &$status
|
2017-08-04 23:14:10 +00:00
|
|
|
* @param int $baseRevId
|
2016-06-13 11:53:50 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
2016-10-09 17:20:42 +00:00
|
|
|
public static function onPageContentSaveComplete(
|
|
|
|
&$article, &$user, $content, $summary, $minoredit, $watchthis, $sectionanchor,
|
|
|
|
&$flags, $revision, &$status, $baseRevId
|
2012-02-10 23:41:05 +00:00
|
|
|
) {
|
2015-09-28 18:03:35 +00:00
|
|
|
if ( !self::$successful_action_vars || !$revision ) {
|
2012-02-10 23:41:05 +00:00
|
|
|
self::$successful_action_vars = false;
|
2015-09-28 18:03:35 +00:00
|
|
|
|
2012-02-10 23:41:05 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-06-13 11:53:50 +00:00
|
|
|
/** @var AbuseFilterVariableHolder $vars */
|
2012-02-10 23:41:05 +00:00
|
|
|
$vars = self::$successful_action_vars;
|
|
|
|
|
2015-09-28 18:03:35 +00:00
|
|
|
if ( $vars->getVar( 'article_prefixedtext' )->toString() !==
|
2013-03-19 00:26:20 +00:00
|
|
|
$article->getTitle()->getPrefixedText()
|
2012-02-10 23:41:05 +00:00
|
|
|
) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( !self::identicalPageObjects( $article, self::$last_edit_page ) ) {
|
|
|
|
return true; // this isn't the edit $successful_action_vars was set for
|
|
|
|
}
|
|
|
|
self::$last_edit_page = false;
|
|
|
|
|
2015-09-28 18:03:35 +00:00
|
|
|
if ( $vars->getVar( 'local_log_ids' ) ) {
|
2012-02-10 23:41:05 +00:00
|
|
|
// Now actually do our storage
|
2015-09-28 18:03:35 +00:00
|
|
|
$log_ids = $vars->getVar( 'local_log_ids' )->toNative();
|
2012-02-10 23:41:05 +00:00
|
|
|
$dbw = wfGetDB( DB_MASTER );
|
|
|
|
|
2015-09-28 18:03:35 +00:00
|
|
|
if ( count( $log_ids ) ) {
|
2012-02-10 23:41:05 +00:00
|
|
|
$dbw->update( 'abuse_filter_log',
|
2017-06-15 14:23:34 +00:00
|
|
|
[ 'afl_rev_id' => $revision->getId() ],
|
|
|
|
[ 'afl_id' => $log_ids ],
|
2012-02-10 23:41:05 +00:00
|
|
|
__METHOD__
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-28 18:03:35 +00:00
|
|
|
if ( $vars->getVar( 'global_log_ids' ) ) {
|
|
|
|
$log_ids = $vars->getVar( 'global_log_ids' )->toNative();
|
2012-02-10 23:41:05 +00:00
|
|
|
|
2015-09-28 18:03:35 +00:00
|
|
|
if ( count( $log_ids ) ) {
|
2013-09-13 21:35:40 +00:00
|
|
|
global $wgAbuseFilterCentralDB;
|
2017-06-15 14:23:34 +00:00
|
|
|
$fdb = wfGetDB( DB_MASTER, [], $wgAbuseFilterCentralDB );
|
2013-09-13 21:35:40 +00:00
|
|
|
|
2012-02-10 23:41:05 +00:00
|
|
|
$fdb->update( 'abuse_filter_log',
|
2017-06-15 14:23:34 +00:00
|
|
|
[ 'afl_rev_id' => $revision->getId() ],
|
2017-08-07 23:22:48 +00:00
|
|
|
[ 'afl_id' => $log_ids, 'afl_wiki' => wfWikiID() ],
|
2012-02-10 23:41:05 +00:00
|
|
|
__METHOD__
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if two article objects are identical or have an identical WikiPage
|
2017-08-04 23:14:10 +00:00
|
|
|
* @param Article|WikiPage $page1
|
|
|
|
* @param Article|WikiPage $page2
|
2012-09-02 11:07:02 +00:00
|
|
|
* @return bool
|
2012-02-10 23:41:05 +00:00
|
|
|
*/
|
|
|
|
protected static function identicalPageObjects( $page1, $page2 ) {
|
2017-08-08 12:03:56 +00:00
|
|
|
$wpage1 = ( $page1 instanceof Article ) ? $page1->getPage() : $page1;
|
|
|
|
$wpage2 = ( $page2 instanceof Article ) ? $page2->getPage() : $page2;
|
2015-09-28 18:03:35 +00:00
|
|
|
|
2017-08-08 12:03:56 +00:00
|
|
|
return $wpage1 === $wpage2;
|
2012-02-10 23:41:05 +00:00
|
|
|
}
|
|
|
|
|
2012-03-11 20:32:31 +00:00
|
|
|
/**
|
2017-08-04 23:14:10 +00:00
|
|
|
* @param User $user
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param array &$promote
|
2012-03-11 20:32:31 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
2008-06-27 06:18:51 +00:00
|
|
|
public static function onGetAutoPromoteGroups( $user, &$promote ) {
|
2015-08-06 00:17:38 +00:00
|
|
|
if ( $promote ) {
|
|
|
|
$key = AbuseFilter::autoPromoteBlockKey( $user );
|
2016-05-14 12:05:24 +00:00
|
|
|
$blocked = (bool)ObjectCache::getInstance( 'hash' )->getWithSetCallback(
|
2016-04-30 21:30:46 +00:00
|
|
|
$key,
|
|
|
|
30,
|
|
|
|
function () use ( $key ) {
|
2016-05-14 12:05:24 +00:00
|
|
|
return (int)ObjectCache::getMainStashInstance()->get( $key );
|
2016-04-30 21:30:46 +00:00
|
|
|
}
|
|
|
|
);
|
|
|
|
|
|
|
|
if ( $blocked ) {
|
2017-06-15 14:23:34 +00:00
|
|
|
$promote = [];
|
2015-08-06 00:17:38 +00:00
|
|
|
}
|
2008-06-27 06:18:51 +00:00
|
|
|
}
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2008-06-27 06:18:51 +00:00
|
|
|
return true;
|
|
|
|
}
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2017-01-02 11:41:29 +00:00
|
|
|
/**
|
|
|
|
* @param Title $oldTitle
|
|
|
|
* @param Title $newTitle
|
|
|
|
* @param User $user
|
|
|
|
* @param string $reason
|
|
|
|
* @param Status $status
|
|
|
|
* @return bool
|
|
|
|
*/
|
2015-09-28 18:03:35 +00:00
|
|
|
public static function onMovePageCheckPermissions( Title $oldTitle, Title $newTitle,
|
|
|
|
User $user, $reason, Status $status
|
|
|
|
) {
|
2014-10-27 17:55:33 +00:00
|
|
|
$vars = new AbuseFilterVariableHolder;
|
|
|
|
$vars->addHolders(
|
|
|
|
AbuseFilter::generateUserVars( $user ),
|
|
|
|
AbuseFilter::generateTitleVars( $oldTitle, 'MOVED_FROM' ),
|
|
|
|
AbuseFilter::generateTitleVars( $newTitle, 'MOVED_TO' )
|
|
|
|
);
|
|
|
|
$vars->setVar( 'SUMMARY', $reason );
|
|
|
|
$vars->setVar( 'ACTION', 'move' );
|
|
|
|
|
|
|
|
$result = AbuseFilter::filterAction( $vars, $oldTitle );
|
|
|
|
$status->merge( $result );
|
|
|
|
|
|
|
|
return $result->isOK();
|
|
|
|
}
|
|
|
|
|
2012-03-11 20:32:31 +00:00
|
|
|
/**
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param WikiPage &$article
|
|
|
|
* @param User &$user
|
|
|
|
* @param string &$reason
|
|
|
|
* @param string &$error
|
|
|
|
* @param Status &$status
|
2012-03-11 20:32:31 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
2013-01-08 14:52:49 +00:00
|
|
|
public static function onArticleDelete( &$article, &$user, &$reason, &$error, &$status ) {
|
2009-02-26 12:15:14 +00:00
|
|
|
$vars = new AbuseFilterVariableHolder;
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2013-03-06 06:21:55 +00:00
|
|
|
$vars->addHolders(
|
2016-07-23 09:30:17 +00:00
|
|
|
AbuseFilter::generateUserVars( $user ),
|
2013-03-06 06:21:55 +00:00
|
|
|
AbuseFilter::generateTitleVars( $article->getTitle(), 'ARTICLE' )
|
|
|
|
);
|
|
|
|
|
2009-02-26 12:15:14 +00:00
|
|
|
$vars->setVar( 'SUMMARY', $reason );
|
|
|
|
$vars->setVar( 'ACTION', 'delete' );
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2012-03-11 20:32:31 +00:00
|
|
|
$filter_result = AbuseFilter::filterAction( $vars, $article->getTitle() );
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2013-01-08 14:52:49 +00:00
|
|
|
$status->merge( $filter_result );
|
2015-01-26 19:34:46 +00:00
|
|
|
$error = $filter_result->isOK() ? '' : $filter_result->getHTML();
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2013-01-08 14:52:49 +00:00
|
|
|
return $filter_result->isOK();
|
2008-06-27 06:18:51 +00:00
|
|
|
}
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2012-03-11 20:32:31 +00:00
|
|
|
/**
|
2017-08-04 23:14:10 +00:00
|
|
|
* @param RecentChange $recentChange
|
2012-03-11 20:32:31 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
2009-01-28 19:08:18 +00:00
|
|
|
public static function onRecentChangeSave( $recentChange ) {
|
2009-10-07 13:57:06 +00:00
|
|
|
$title = Title::makeTitle(
|
2012-03-11 20:32:31 +00:00
|
|
|
$recentChange->getAttribute( 'rc_namespace' ),
|
|
|
|
$recentChange->getAttribute( 'rc_title' )
|
2009-10-07 13:57:06 +00:00
|
|
|
);
|
2010-02-13 14:10:36 +00:00
|
|
|
$action = $recentChange->mAttribs['rc_log_type'] ?
|
2009-02-07 09:34:11 +00:00
|
|
|
$recentChange->mAttribs['rc_log_type'] : 'edit';
|
2017-06-15 14:23:34 +00:00
|
|
|
$actionID = implode( '-', [
|
2015-09-28 18:03:35 +00:00
|
|
|
$title->getPrefixedText(), $recentChange->mAttribs['rc_user_text'], $action
|
2017-06-15 14:23:34 +00:00
|
|
|
] );
|
2009-01-23 19:23:19 +00:00
|
|
|
|
2016-09-25 19:51:56 +00:00
|
|
|
if ( isset( AbuseFilter::$tagsToSet[$actionID] ) ) {
|
|
|
|
$recentChange->addTags( AbuseFilter::$tagsToSet[$actionID] );
|
2009-01-28 19:08:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-03-17 13:00:14 +00:00
|
|
|
/**
|
|
|
|
* Purge all cache related to tags, both within AbuseFilter and in core
|
|
|
|
*/
|
|
|
|
public static function purgeTagCache() {
|
|
|
|
ChangeTags::purgeTagCacheAll();
|
|
|
|
|
|
|
|
$services = MediaWikiServices::getInstance();
|
|
|
|
$cache = $services->getMainWANObjectCache();
|
|
|
|
|
|
|
|
$cache->delete(
|
|
|
|
$cache->makeKey( self::FETCH_ALL_TAGS_KEY, 0 )
|
|
|
|
);
|
|
|
|
|
|
|
|
$cache->delete(
|
|
|
|
$cache->makeKey( self::FETCH_ALL_TAGS_KEY, 1 )
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2012-03-11 20:32:31 +00:00
|
|
|
/**
|
2015-01-29 13:07:04 +00:00
|
|
|
* @param array $tags
|
|
|
|
* @param bool $enabled
|
2012-03-11 20:32:31 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
2015-01-29 13:07:04 +00:00
|
|
|
private static function fetchAllTags( array &$tags, $enabled ) {
|
2015-03-17 13:00:14 +00:00
|
|
|
$services = MediaWikiServices::getInstance();
|
|
|
|
$cache = $services->getMainWANObjectCache();
|
2015-09-25 14:24:51 +00:00
|
|
|
|
2015-03-17 13:00:14 +00:00
|
|
|
$tags = $cache->getWithSetCallback(
|
|
|
|
// Key to store the cached value under
|
2017-07-08 18:49:13 +00:00
|
|
|
$cache->makeKey( self::FETCH_ALL_TAGS_KEY, (int)$enabled ),
|
2009-01-28 19:08:18 +00:00
|
|
|
|
2015-03-17 13:00:14 +00:00
|
|
|
// Time-to-live (in seconds)
|
|
|
|
$cache::TTL_MINUTE,
|
2009-01-28 19:08:18 +00:00
|
|
|
|
2015-03-17 13:00:14 +00:00
|
|
|
// Function that derives the new key value
|
|
|
|
function ( $oldValue, &$ttl, array &$setOpts ) use ( $enabled, $tags ) {
|
|
|
|
global $wgAbuseFilterCentralDB, $wgAbuseFilterIsCentral;
|
2009-01-28 19:08:18 +00:00
|
|
|
|
2015-03-17 13:00:14 +00:00
|
|
|
$dbr = wfGetDB( DB_REPLICA );
|
|
|
|
// Account for any snapshot/replica DB lag
|
|
|
|
$setOpts += Database::getCacheSetOptions( $dbr );
|
2015-09-25 14:24:51 +00:00
|
|
|
|
2015-03-17 13:00:14 +00:00
|
|
|
# This is a pretty awful hack.
|
|
|
|
|
|
|
|
$where = [ 'afa_consequence' => 'tag', 'af_deleted' => false ];
|
|
|
|
if ( $enabled ) {
|
|
|
|
$where['af_enabled'] = true;
|
|
|
|
}
|
|
|
|
$res = $dbr->select(
|
|
|
|
[ 'abuse_filter_action', 'abuse_filter' ],
|
|
|
|
'afa_parameters',
|
|
|
|
$where,
|
|
|
|
__METHOD__,
|
|
|
|
[],
|
|
|
|
[ 'abuse_filter' => [ 'INNER JOIN', 'afa_filter=af_id' ] ]
|
2015-09-25 14:24:51 +00:00
|
|
|
);
|
2015-03-17 13:00:14 +00:00
|
|
|
|
|
|
|
foreach ( $res as $row ) {
|
|
|
|
$tags = array_filter(
|
|
|
|
array_merge( explode( "\n", $row->afa_parameters ), $tags )
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( $wgAbuseFilterCentralDB && !$wgAbuseFilterIsCentral ) {
|
2017-08-30 02:51:39 +00:00
|
|
|
$dbr = wfGetDB( DB_REPLICA, [], $wgAbuseFilterCentralDB );
|
2015-03-17 13:00:14 +00:00
|
|
|
$where['af_global'] = 1;
|
|
|
|
$res = $dbr->select(
|
|
|
|
[ 'abuse_filter_action', 'abuse_filter' ],
|
|
|
|
'afa_parameters',
|
|
|
|
$where,
|
|
|
|
__METHOD__,
|
|
|
|
[],
|
|
|
|
[ 'abuse_filter' => [ 'INNER JOIN', 'afa_filter=af_id' ] ]
|
|
|
|
);
|
|
|
|
|
|
|
|
foreach ( $res as $row ) {
|
|
|
|
$tags = array_filter(
|
|
|
|
array_merge( explode( "\n", $row->afa_parameters ), $tags )
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $tags;
|
2015-09-25 14:24:51 +00:00
|
|
|
}
|
2015-03-17 13:00:14 +00:00
|
|
|
);
|
2015-09-25 14:24:51 +00:00
|
|
|
|
2009-01-28 19:08:18 +00:00
|
|
|
return true;
|
|
|
|
}
|
2009-01-29 00:37:53 +00:00
|
|
|
|
2015-01-29 13:07:04 +00:00
|
|
|
/**
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param string[] &$tags
|
2015-01-29 13:07:04 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function onListDefinedTags( array &$tags ) {
|
|
|
|
return self::fetchAllTags( $tags, false );
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param string[] &$tags
|
2015-01-29 13:07:04 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function onChangeTagsListActive( array &$tags ) {
|
|
|
|
return self::fetchAllTags( $tags, true );
|
|
|
|
}
|
|
|
|
|
2011-02-10 17:32:57 +00:00
|
|
|
/**
|
2017-01-02 11:41:29 +00:00
|
|
|
* @param DatabaseUpdater|null $updater
|
2012-03-11 20:32:31 +00:00
|
|
|
* @throws MWException
|
2011-02-10 17:32:57 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
2010-10-03 15:51:04 +00:00
|
|
|
public static function onLoadExtensionSchemaUpdates( $updater = null ) {
|
2017-08-07 23:11:38 +00:00
|
|
|
$dir = dirname( __DIR__ );
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2011-12-27 16:35:30 +00:00
|
|
|
if ( $updater->getDB()->getType() == 'mysql' || $updater->getDB()->getType() == 'sqlite' ) {
|
|
|
|
if ( $updater->getDB()->getType() == 'mysql' ) {
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [ 'addTable', 'abuse_filter',
|
|
|
|
"$dir/abusefilter.tables.sql", true ] );
|
|
|
|
$updater->addExtensionUpdate( [ 'addTable', 'abuse_filter_history',
|
|
|
|
"$dir/db_patches/patch-abuse_filter_history.sql", true ] );
|
2011-11-08 03:07:01 +00:00
|
|
|
} else {
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [ 'addTable', 'abuse_filter',
|
|
|
|
"$dir/abusefilter.tables.sqlite.sql", true ] );
|
|
|
|
$updater->addExtensionUpdate( [ 'addTable', 'abuse_filter_history',
|
|
|
|
"$dir/db_patches/patch-abuse_filter_history.sqlite.sql", true ] );
|
2010-10-03 15:51:04 +00:00
|
|
|
}
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [
|
2015-09-28 18:03:35 +00:00
|
|
|
'addField', 'abuse_filter_history', 'afh_changed_fields',
|
|
|
|
"$dir/db_patches/patch-afh_changed_fields.sql", true
|
2017-06-15 14:23:34 +00:00
|
|
|
] );
|
|
|
|
$updater->addExtensionUpdate( [ 'addField', 'abuse_filter', 'af_deleted',
|
|
|
|
"$dir/db_patches/patch-af_deleted.sql", true ] );
|
|
|
|
$updater->addExtensionUpdate( [ 'addField', 'abuse_filter', 'af_actions',
|
|
|
|
"$dir/db_patches/patch-af_actions.sql", true ] );
|
|
|
|
$updater->addExtensionUpdate( [ 'addField', 'abuse_filter', 'af_global',
|
|
|
|
"$dir/db_patches/patch-global_filters.sql", true ] );
|
|
|
|
$updater->addExtensionUpdate( [ 'addField', 'abuse_filter_log', 'afl_rev_id',
|
|
|
|
"$dir/db_patches/patch-afl_action_id.sql", true ] );
|
2011-12-27 16:35:30 +00:00
|
|
|
if ( $updater->getDB()->getType() == 'mysql' ) {
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [ 'addIndex', 'abuse_filter_log',
|
|
|
|
'filter_timestamp', "$dir/db_patches/patch-fix-indexes.sql", true ] );
|
2011-12-27 16:35:30 +00:00
|
|
|
} else {
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [
|
2015-09-28 18:03:35 +00:00
|
|
|
'addIndex', 'abuse_filter_log', 'afl_filter_timestamp',
|
|
|
|
"$dir/db_patches/patch-fix-indexes.sqlite.sql", true
|
2017-06-15 14:23:34 +00:00
|
|
|
] );
|
2011-12-27 16:35:30 +00:00
|
|
|
}
|
2012-05-06 06:44:45 +00:00
|
|
|
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [ 'addField', 'abuse_filter',
|
|
|
|
'af_group', "$dir/db_patches/patch-af_group.sql", true ] );
|
2012-08-03 21:55:35 +00:00
|
|
|
|
|
|
|
if ( $updater->getDB()->getType() == 'mysql' ) {
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [
|
2015-09-28 18:03:35 +00:00
|
|
|
'addIndex', 'abuse_filter_log', 'wiki_timestamp',
|
|
|
|
"$dir/db_patches/patch-global_logging_wiki-index.sql", true
|
2017-06-15 14:23:34 +00:00
|
|
|
] );
|
2012-08-03 21:55:35 +00:00
|
|
|
} else {
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [
|
2015-09-28 18:03:35 +00:00
|
|
|
'addIndex', 'abuse_filter_log', 'afl_wiki_timestamp',
|
|
|
|
"$dir/db_patches/patch-global_logging_wiki-index.sqlite.sql", true
|
2017-06-15 14:23:34 +00:00
|
|
|
] );
|
2012-08-03 21:55:35 +00:00
|
|
|
}
|
|
|
|
|
2014-01-30 20:27:52 +00:00
|
|
|
if ( $updater->getDB()->getType() == 'mysql' ) {
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [
|
2015-09-28 18:03:35 +00:00
|
|
|
'modifyField', 'abuse_filter_log', 'afl_namespace',
|
|
|
|
"$dir/db_patches/patch-afl-namespace_int.sql", true
|
2017-06-15 14:23:34 +00:00
|
|
|
] );
|
2014-01-30 20:27:52 +00:00
|
|
|
} else {
|
2016-06-17 01:17:30 +00:00
|
|
|
/*
|
2015-09-28 18:03:35 +00:00
|
|
|
$updater->addExtensionUpdate( array(
|
2017-07-08 18:49:13 +00:00
|
|
|
'modifyField',
|
|
|
|
'abuse_filter_log',
|
|
|
|
'afl_namespace',
|
|
|
|
"$dir/db_patches/patch-afl-namespace_int.sqlite.sql",
|
|
|
|
true
|
2015-09-28 18:03:35 +00:00
|
|
|
) );
|
|
|
|
*/
|
|
|
|
/* @todo Modify a column in sqlite, which do not support such
|
|
|
|
* things create backup, drop, create with new schema, copy,
|
|
|
|
* drop backup or simply see
|
|
|
|
* https://www.mediawiki.org/wiki/Manual:SQLite#About_SQLite :
|
|
|
|
* Several extensions are known to have database update or
|
|
|
|
* installation issues with SQLite: AbuseFilter, ...
|
|
|
|
*/
|
2014-01-30 20:27:52 +00:00
|
|
|
}
|
2011-12-27 16:35:30 +00:00
|
|
|
} elseif ( $updater->getDB()->getType() == 'postgres' ) {
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'addTable', 'abuse_filter', "$dir/abusefilter.tables.pg.sql", true ] );
|
|
|
|
$updater->addExtensionUpdate( [
|
2015-09-28 18:03:35 +00:00
|
|
|
'addTable', 'abuse_filter_history',
|
|
|
|
"$dir/db_patches/patch-abuse_filter_history.pg.sql", true
|
2017-06-15 14:23:34 +00:00
|
|
|
] );
|
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'addPgField', 'abuse_filter', 'af_actions', "TEXT NOT NULL DEFAULT ''" ] );
|
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'addPgField', 'abuse_filter', 'af_deleted', 'SMALLINT NOT NULL DEFAULT 0' ] );
|
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'addPgField', 'abuse_filter', 'af_global', 'SMALLINT NOT NULL DEFAULT 0' ] );
|
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'addPgField', 'abuse_filter_log', 'afl_wiki', 'TEXT' ] );
|
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'addPgField', 'abuse_filter_log', 'afl_deleted', 'SMALLINT' ] );
|
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'changeField', 'abuse_filter_log', 'afl_filter', 'TEXT', '' ] );
|
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'addPgExtIndex', 'abuse_filter_log', 'abuse_filter_log_ip', "(afl_ip)" ] );
|
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'addPgExtIndex', 'abuse_filter_log', 'abuse_filter_log_wiki', "(afl_wiki)" ] );
|
|
|
|
$updater->addExtensionUpdate( [
|
|
|
|
'changeField', 'abuse_filter_log', 'afl_namespace', "INTEGER" ] );
|
2011-12-27 16:35:30 +00:00
|
|
|
}
|
|
|
|
|
2017-06-15 14:23:34 +00:00
|
|
|
$updater->addExtensionUpdate( [ [ __CLASS__, 'createAbuseFilterUser' ] ] );
|
2012-03-19 09:50:48 +00:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Updater callback to create the AbuseFilter user after the user tables have been updated.
|
2017-01-02 11:41:29 +00:00
|
|
|
* @param DatabaseUpdater $updater
|
2012-03-19 09:50:48 +00:00
|
|
|
*/
|
|
|
|
public static function createAbuseFilterUser( $updater ) {
|
2015-09-17 15:31:51 +00:00
|
|
|
$username = wfMessage( 'abusefilter-blocker' )->inContentLanguage()->text();
|
|
|
|
$user = User::newFromName( $username );
|
2011-12-27 16:35:30 +00:00
|
|
|
|
2012-01-18 02:37:14 +00:00
|
|
|
if ( $user && !$updater->updateRowExists( 'create abusefilter-blocker-user' ) ) {
|
2017-08-08 12:03:56 +00:00
|
|
|
$user = User::newSystemUser( $username, [ 'steal' => true ] );
|
2017-10-21 06:09:36 +00:00
|
|
|
$updater->insertUpdateRow( 'create abusefilter-blocker-user' );
|
|
|
|
# Promote user so it doesn't look too crazy.
|
|
|
|
$user->addGroup( 'sysop' );
|
2009-03-23 14:18:35 +00:00
|
|
|
}
|
2009-01-29 00:37:53 +00:00
|
|
|
}
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2012-03-11 20:32:31 +00:00
|
|
|
/**
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param int $id
|
2017-08-04 23:14:10 +00:00
|
|
|
* @param Title $nt
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param array &$tools
|
2017-08-08 12:03:56 +00:00
|
|
|
* @param SpecialPage $sp for context
|
2012-03-11 20:32:31 +00:00
|
|
|
*/
|
2017-08-08 12:03:56 +00:00
|
|
|
public static function onContributionsToolLinks( $id, $nt, &$tools, SpecialPage $sp ) {
|
|
|
|
if ( $sp->getUser()->isAllowed( 'abusefilter-log' ) ) {
|
|
|
|
$linkRenderer = $sp->getLinkRenderer();
|
|
|
|
$tools['abuselog'] = $linkRenderer->makeLink(
|
2015-09-28 18:03:35 +00:00
|
|
|
SpecialPage::getTitleFor( 'AbuseLog' ),
|
2017-08-08 12:03:56 +00:00
|
|
|
$sp->msg( 'abusefilter-log-linkoncontribs' )->text(),
|
|
|
|
[ 'title' => $sp->msg( 'abusefilter-log-linkoncontribs-text',
|
|
|
|
$nt->getText() )->text() ],
|
2017-06-15 14:23:34 +00:00
|
|
|
[ 'wpSearchUser' => $nt->getText() ]
|
2015-09-28 18:03:35 +00:00
|
|
|
);
|
2009-04-24 01:53:12 +00:00
|
|
|
}
|
2009-10-07 13:57:06 +00:00
|
|
|
}
|
|
|
|
|
2012-03-11 20:32:31 +00:00
|
|
|
/**
|
2016-08-03 14:30:18 +00:00
|
|
|
* Filter an upload.
|
|
|
|
*
|
2016-06-17 15:23:42 +00:00
|
|
|
* @param UploadBase $upload
|
|
|
|
* @param User $user
|
|
|
|
* @param array $props
|
|
|
|
* @param string $comment
|
|
|
|
* @param string $pageText
|
2016-06-20 21:58:17 +00:00
|
|
|
* @param array|ApiMessage &$error
|
2016-06-17 15:23:42 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function onUploadVerifyUpload( UploadBase $upload, User $user,
|
|
|
|
array $props, $comment, $pageText, &$error
|
|
|
|
) {
|
|
|
|
return self::filterUpload( 'upload', $upload, $user, $props, $comment, $pageText, $error );
|
|
|
|
}
|
|
|
|
|
2016-08-03 14:30:18 +00:00
|
|
|
/**
|
|
|
|
* Filter an upload to stash. If a filter doesn't need to check the page contents or
|
|
|
|
* upload comment, it can use `action='stashupload'` to provide better experience to e.g.
|
|
|
|
* UploadWizard (rejecting files immediately, rather than after the user adds the details).
|
|
|
|
*
|
|
|
|
* @param UploadBase $upload
|
|
|
|
* @param User $user
|
|
|
|
* @param array $props
|
|
|
|
* @param array|ApiMessage &$error
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function onUploadStashFile( UploadBase $upload, User $user,
|
|
|
|
array $props, &$error
|
|
|
|
) {
|
|
|
|
return self::filterUpload( 'stashupload', $upload, $user, $props, null, null, $error );
|
|
|
|
}
|
|
|
|
|
2016-06-17 15:23:42 +00:00
|
|
|
/**
|
2017-08-08 12:03:56 +00:00
|
|
|
* Implementation for UploadStashFile and UploadVerifyUpload hooks.
|
2016-06-17 15:23:42 +00:00
|
|
|
*
|
|
|
|
* @param string $action 'upload' or 'stashupload'
|
|
|
|
* @param UploadBase $upload
|
|
|
|
* @param User $user User performing the action
|
|
|
|
* @param array $props File properties, as returned by FSFile::getPropsFromPath()
|
|
|
|
* @param string|null $summary Upload log comment (also used as edit summary)
|
|
|
|
* @param string|null $text File description page text (only used for new uploads)
|
2016-06-20 21:58:17 +00:00
|
|
|
* @param array|ApiMessage &$error
|
2016-06-17 15:23:42 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function filterUpload( $action, UploadBase $upload, User $user,
|
|
|
|
array $props, $summary, $text, &$error
|
|
|
|
) {
|
|
|
|
$title = $upload->getTitle();
|
2013-06-11 13:21:26 +00:00
|
|
|
|
2016-06-17 15:23:42 +00:00
|
|
|
$vars = new AbuseFilterVariableHolder;
|
2013-03-06 06:21:55 +00:00
|
|
|
$vars->addHolders(
|
2016-06-17 15:23:42 +00:00
|
|
|
AbuseFilter::generateUserVars( $user ),
|
2016-04-02 22:04:19 +00:00
|
|
|
AbuseFilter::generateTitleVars( $title, 'ARTICLE' )
|
2009-10-07 13:57:06 +00:00
|
|
|
);
|
2016-06-17 15:23:42 +00:00
|
|
|
$vars->setVar( 'ACTION', $action );
|
2013-02-28 01:25:59 +00:00
|
|
|
|
2015-11-23 09:55:06 +00:00
|
|
|
// We use the hexadecimal version of the file sha1.
|
|
|
|
// Use UploadBase::getTempFileSha1Base36 so that we don't have to calculate the sha1 sum again
|
2015-09-28 18:03:35 +00:00
|
|
|
$sha1 = Wikimedia\base_convert( $upload->getTempFileSha1Base36(), 36, 16, 40 );
|
2013-02-28 01:25:59 +00:00
|
|
|
|
|
|
|
$vars->setVar( 'file_sha1', $sha1 );
|
2015-01-08 04:56:35 +00:00
|
|
|
$vars->setVar( 'file_size', $upload->getFileSize() );
|
2009-10-07 13:57:06 +00:00
|
|
|
|
Add more file_* variables for file metadata
* file_mime
The MIME type of the file, e.g. 'image/png'.
* file_mediatype
The media type of the file, one of 'UNKNOWN', 'BITMAP', 'DRAWING',
'AUDIO', 'VIDEO', 'MULTIMEDIA', 'OFFICE', 'TEXT', 'EXECUTABLE', 'ARCHIVE'.
* file_width
Width of the image in pixels, or 0 if it's inapplicable (e.g. for
audio files).
* file_height
Height of the image in pixels, or 0 if it's inapplicable (e.g. for
audio files).
* file_bits_per_channel
Bits per color channel of the image, or 0 if it's inapplicable (e.g.
for audio files). The most common value is 8.
Bug: T131643
Change-Id: Id355515a18d3674393332c0f4094e34f9f522623
2016-04-04 19:12:08 +00:00
|
|
|
$vars->setVar( 'file_mime', $props['mime'] );
|
|
|
|
$vars->setVar( 'file_mediatype', MimeMagic::singleton()->getMediaType( null, $props['mime'] ) );
|
|
|
|
$vars->setVar( 'file_width', $props['width'] );
|
|
|
|
$vars->setVar( 'file_height', $props['height'] );
|
|
|
|
$vars->setVar( 'file_bits_per_channel', $props['bits'] );
|
|
|
|
|
2016-06-17 15:23:42 +00:00
|
|
|
// We only have the upload comment and page text when using the UploadVerifyUpload hook
|
|
|
|
if ( $summary !== null && $text !== null ) {
|
|
|
|
// This block is adapted from self::filterEdit()
|
|
|
|
if ( $title->exists() ) {
|
|
|
|
$page = WikiPage::factory( $title );
|
|
|
|
$revision = $page->getRevision();
|
|
|
|
if ( !$revision ) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
$oldcontent = $revision->getContent( Revision::RAW );
|
|
|
|
$oldtext = AbuseFilter::contentToString( $oldcontent );
|
|
|
|
|
|
|
|
// Cache article object so we can share a parse operation
|
|
|
|
$articleCacheKey = $title->getNamespace() . ':' . $title->getText();
|
|
|
|
AFComputedVariable::$articleCache[$articleCacheKey] = $page;
|
|
|
|
|
|
|
|
// Page text is ignored for uploads when the page already exists
|
|
|
|
$text = $oldtext;
|
|
|
|
} else {
|
|
|
|
$page = null;
|
|
|
|
$oldtext = '';
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load vars for filters to check
|
|
|
|
$vars->setVar( 'summary', $summary );
|
|
|
|
$vars->setVar( 'minor_edit', false );
|
|
|
|
$vars->setVar( 'old_wikitext', $oldtext );
|
|
|
|
$vars->setVar( 'new_wikitext', $text );
|
|
|
|
// TODO: set old_content and new_content vars, use them
|
|
|
|
$vars->addHolders( AbuseFilter::getEditVars( $title, $page ) );
|
|
|
|
}
|
|
|
|
|
2009-07-21 16:29:12 +00:00
|
|
|
$filter_result = AbuseFilter::filterAction( $vars, $title );
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2013-02-28 01:25:59 +00:00
|
|
|
if ( !$filter_result->isOK() ) {
|
2016-06-20 21:58:17 +00:00
|
|
|
$messageAndParams = $filter_result->getErrorsArray()[0];
|
|
|
|
$apiResult = self::getApiResult( $filter_result );
|
|
|
|
$error = ApiMessage::create(
|
|
|
|
$messageAndParams,
|
|
|
|
$apiResult['code'],
|
|
|
|
$apiResult
|
|
|
|
);
|
2013-02-28 01:25:59 +00:00
|
|
|
}
|
2009-10-07 13:57:06 +00:00
|
|
|
|
2013-01-08 14:52:49 +00:00
|
|
|
return $filter_result->isOK();
|
2009-10-07 13:57:06 +00:00
|
|
|
}
|
2011-08-26 20:12:34 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Adds global variables to the Javascript as needed
|
|
|
|
*
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param array &$vars
|
2011-08-26 20:12:34 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function onMakeGlobalVariablesScript( array &$vars ) {
|
2014-02-07 15:05:52 +00:00
|
|
|
if ( isset( AbuseFilter::$editboxName ) && AbuseFilter::$editboxName !== null ) {
|
2011-08-26 20:26:57 +00:00
|
|
|
$vars['abuseFilterBoxName'] = AbuseFilter::$editboxName;
|
2011-08-26 20:12:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if ( AbuseFilterViewExamine::$examineType !== null ) {
|
2017-06-15 14:23:34 +00:00
|
|
|
$vars['abuseFilterExamine'] = [
|
2011-08-26 20:26:57 +00:00
|
|
|
'type' => AbuseFilterViewExamine::$examineType,
|
|
|
|
'id' => AbuseFilterViewExamine::$examineId,
|
2017-06-15 14:23:34 +00:00
|
|
|
];
|
2011-08-26 20:12:34 +00:00
|
|
|
}
|
2015-09-28 18:03:35 +00:00
|
|
|
|
2011-08-26 20:12:34 +00:00
|
|
|
return true;
|
|
|
|
}
|
2013-07-02 01:43:18 +00:00
|
|
|
|
2014-07-10 03:57:02 +00:00
|
|
|
/**
|
|
|
|
* Tables that Extension:UserMerge needs to update
|
|
|
|
*
|
2017-10-06 18:52:31 +00:00
|
|
|
* @param array &$updateFields
|
2014-07-10 03:57:02 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function onUserMergeAccountFields( array &$updateFields ) {
|
2017-06-15 14:23:34 +00:00
|
|
|
$updateFields[] = [ 'abuse_filter', 'af_user', 'af_user_text' ];
|
|
|
|
$updateFields[] = [ 'abuse_filter_log', 'afl_user', 'afl_user_text' ];
|
|
|
|
$updateFields[] = [ 'abuse_filter_history', 'afh_user', 'afh_user_text' ];
|
2014-07-10 03:57:02 +00:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-01-27 01:37:58 +00:00
|
|
|
/**
|
|
|
|
* Warms the cache for getLastPageAuthors() - T116557
|
|
|
|
*
|
|
|
|
* @param WikiPage $page
|
|
|
|
* @param Content $content
|
|
|
|
* @param ParserOutput $output
|
2016-06-13 11:53:50 +00:00
|
|
|
* @param string $summary
|
|
|
|
* @param User $user
|
2016-01-27 01:37:58 +00:00
|
|
|
*/
|
|
|
|
public static function onParserOutputStashForEdit(
|
2016-06-13 11:53:50 +00:00
|
|
|
WikiPage $page, Content $content, ParserOutput $output, $summary = '', $user = null
|
2016-01-27 01:37:58 +00:00
|
|
|
) {
|
2016-06-13 11:53:50 +00:00
|
|
|
$revision = $page->getRevision();
|
|
|
|
if ( !$revision ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
$text = AbuseFilter::contentToString( $content );
|
|
|
|
$oldcontent = $revision->getContent( Revision::RAW );
|
|
|
|
$user = $user ?: RequestContext::getMain()->getUser();
|
|
|
|
|
2016-06-27 18:30:29 +00:00
|
|
|
// Cache any resulting filter matches.
|
|
|
|
// Do this outside the synchronous stash lock to avoid any chance of slowdown.
|
|
|
|
DeferredUpdates::addCallableUpdate(
|
2016-09-13 08:40:21 +00:00
|
|
|
function () use ( $user, $page, $summary, $content, $oldcontent, $text ) {
|
2016-06-27 18:30:29 +00:00
|
|
|
$vars = self::newVariableHolderForEdit(
|
2016-09-13 08:40:21 +00:00
|
|
|
$user, $page->getTitle(), $page, $summary, $content, $oldcontent, $text
|
2016-06-27 18:30:29 +00:00
|
|
|
);
|
|
|
|
AbuseFilter::filterAction( $vars, $page->getTitle(), 'default', $user, 'stash' );
|
|
|
|
},
|
|
|
|
DeferredUpdates::PRESEND
|
2016-06-13 11:53:50 +00:00
|
|
|
);
|
2016-01-27 01:37:58 +00:00
|
|
|
}
|
2008-06-27 06:18:51 +00:00
|
|
|
}
|