2018-07-08 16:06:19 +00:00
|
|
|
<?php
|
2018-08-23 18:53:55 +00:00
|
|
|
|
2021-02-05 22:11:55 +00:00
|
|
|
use MediaWiki\Block\BlockUser;
|
2020-09-20 22:31:41 +00:00
|
|
|
use MediaWiki\Extension\AbuseFilter\AbuseFilterServices;
|
2022-07-15 08:44:16 +00:00
|
|
|
use MediaWiki\Extension\AbuseFilter\FilterRunnerFactory;
|
2021-08-14 14:03:08 +00:00
|
|
|
use MediaWiki\Extension\AbuseFilter\Hooks\Handlers\FilteredActionsHandler;
|
2020-12-03 22:22:43 +00:00
|
|
|
use MediaWiki\Extension\AbuseFilter\Parser\AFPData;
|
2018-08-23 18:53:55 +00:00
|
|
|
use MediaWiki\MediaWikiServices;
|
2019-06-23 17:19:28 +00:00
|
|
|
use MediaWiki\Storage\PageEditStash;
|
2021-02-06 15:39:11 +00:00
|
|
|
use Psr\Log\LoggerInterface;
|
2021-02-05 22:11:55 +00:00
|
|
|
use Wikimedia\Timestamp\ConvertibleTimestamp;
|
2018-08-23 18:53:55 +00:00
|
|
|
|
2018-07-08 16:06:19 +00:00
|
|
|
/**
|
|
|
|
* Complete tests where filters are saved, actions are executed and the right
|
|
|
|
* consequences are expected to be taken
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
* http://www.gnu.org/copyleft/gpl.html
|
|
|
|
*
|
|
|
|
* @file
|
|
|
|
*
|
|
|
|
* @license GPL-2.0-or-later
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @group Test
|
|
|
|
* @group AbuseFilter
|
|
|
|
* @group AbuseFilterConsequences
|
|
|
|
* @group Database
|
2018-12-27 19:27:25 +00:00
|
|
|
* @group Large
|
2018-07-08 16:06:19 +00:00
|
|
|
*
|
2020-11-27 14:49:41 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\FilterRunner
|
2021-08-14 14:03:08 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Hooks\Handlers\FilteredActionsHandler
|
2020-01-11 17:05:30 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\VariableGenerator\VariableGenerator
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\VariableGenerator\RunVariableGenerator
|
2021-01-03 11:12:16 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\AbuseFilterPreAuthenticationProvider
|
2020-11-26 15:23:22 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\ChangeTags\ChangeTagger
|
2020-10-21 14:18:08 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\BlockAutopromoteStore
|
2020-12-18 14:05:33 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\Block
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\BlockAutopromote
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\BlockingConsequence
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\Consequence
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\Degroup
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\Disallow
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\RangeBlock
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\Tag
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\Throttle
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\Consequence\Warn
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\ConsequencesLookup
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Consequences\ConsequencesExecutor
|
2018-07-08 16:06:19 +00:00
|
|
|
*/
|
2021-10-11 21:32:14 +00:00
|
|
|
class AbuseFilterConsequencesTest extends MediaWikiIntegrationTestCase {
|
2020-09-16 09:15:38 +00:00
|
|
|
use AbuseFilterCreateAccountTestTrait;
|
|
|
|
use AbuseFilterUploadTestTrait;
|
|
|
|
|
2018-08-23 18:53:55 +00:00
|
|
|
/**
|
|
|
|
* @var User The user performing actions
|
|
|
|
*/
|
2019-08-26 13:01:09 +00:00
|
|
|
private $user;
|
2018-08-25 12:44:01 +00:00
|
|
|
/** Prefix for tables to emulate an external DB */
|
2020-01-21 11:13:11 +00:00
|
|
|
public const DB_EXTERNAL_PREFIX = 'external_';
|
2021-01-15 21:09:52 +00:00
|
|
|
/** @var string[] Tables to create in the external DB */
|
2018-08-25 12:44:01 +00:00
|
|
|
public static $externalTables = [
|
|
|
|
'abuse_filter',
|
|
|
|
'abuse_filter_action',
|
|
|
|
'abuse_filter_log',
|
|
|
|
'text',
|
|
|
|
];
|
2018-07-08 16:06:19 +00:00
|
|
|
|
|
|
|
/**
|
2022-07-15 08:44:16 +00:00
|
|
|
* @var array These tables will be deleted in parent::tearDown
|
2018-07-08 16:06:19 +00:00
|
|
|
*/
|
|
|
|
protected $tablesUsed = [
|
|
|
|
'abuse_filter',
|
|
|
|
'abuse_filter_action',
|
|
|
|
'abuse_filter_history',
|
|
|
|
'abuse_filter_log',
|
2018-11-09 21:58:40 +00:00
|
|
|
'page',
|
|
|
|
'ipblocks',
|
2018-12-27 19:27:25 +00:00
|
|
|
'logging',
|
2019-02-08 05:39:51 +00:00
|
|
|
'change_tag',
|
2018-08-25 12:44:01 +00:00
|
|
|
'user',
|
2020-09-16 09:15:38 +00:00
|
|
|
'text',
|
|
|
|
'image',
|
|
|
|
'oldimage',
|
2018-07-08 16:06:19 +00:00
|
|
|
];
|
|
|
|
|
2019-02-23 09:01:57 +00:00
|
|
|
// phpcs:disable Generic.Files.LineLength
|
2021-01-15 21:09:52 +00:00
|
|
|
/** @var array Filters that may be created, their key is the ID. */
|
2018-07-08 16:06:19 +00:00
|
|
|
protected static $filters = [
|
|
|
|
1 => [
|
|
|
|
'af_pattern' => 'added_lines irlike "foo"',
|
|
|
|
'af_public_comments' => 'Mock filter for edit',
|
|
|
|
'actions' => [
|
|
|
|
'warn' => [
|
|
|
|
'abusefilter-my-warning'
|
|
|
|
],
|
|
|
|
'tag' => [
|
|
|
|
'filtertag'
|
|
|
|
]
|
|
|
|
]
|
|
|
|
],
|
|
|
|
2 => [
|
2018-08-21 14:46:18 +00:00
|
|
|
'af_pattern' => 'action = "move" & moved_to_title contains "test" & moved_to_title === moved_to_text',
|
2018-07-08 16:06:19 +00:00
|
|
|
'af_public_comments' => 'Mock filter for move',
|
|
|
|
'af_hidden' => 1,
|
|
|
|
'actions' => [
|
|
|
|
'disallow' => [],
|
|
|
|
'block' => [
|
|
|
|
'blocktalk',
|
|
|
|
'8 hours',
|
|
|
|
'infinity'
|
|
|
|
]
|
|
|
|
]
|
|
|
|
],
|
|
|
|
3 => [
|
2018-08-21 14:46:18 +00:00
|
|
|
'af_pattern' => 'action = "delete" & "test" in lcase(page_prefixedtitle) & page_prefixedtitle === article_prefixedtext',
|
2018-07-08 16:06:19 +00:00
|
|
|
'af_public_comments' => 'Mock filter for delete',
|
2018-12-27 19:27:25 +00:00
|
|
|
'af_global' => 1,
|
2018-07-08 16:06:19 +00:00
|
|
|
'actions' => [
|
|
|
|
'degroup' => []
|
|
|
|
]
|
|
|
|
],
|
|
|
|
5 => [
|
|
|
|
'af_pattern' => 'user_name == "FilteredUser"',
|
|
|
|
'af_public_comments' => 'Mock filter',
|
|
|
|
'actions' => [
|
|
|
|
'tag' => [
|
|
|
|
'firstTag',
|
|
|
|
'secondTag'
|
|
|
|
]
|
|
|
|
]
|
|
|
|
],
|
|
|
|
6 => [
|
|
|
|
'af_pattern' => 'edit_delta === 7',
|
|
|
|
'af_public_comments' => 'Mock filter with edit_delta',
|
|
|
|
'af_hidden' => 1,
|
2018-12-27 19:27:25 +00:00
|
|
|
'af_global' => 1,
|
2018-07-08 16:06:19 +00:00
|
|
|
'actions' => [
|
2018-10-12 08:51:45 +00:00
|
|
|
'disallow' => [
|
|
|
|
'abusefilter-disallowed-really'
|
|
|
|
]
|
2018-07-08 16:06:19 +00:00
|
|
|
]
|
|
|
|
],
|
|
|
|
7 => [
|
2022-06-25 12:14:44 +00:00
|
|
|
'af_pattern' => 'timestamp === string(timestamp)',
|
2018-07-08 16:06:19 +00:00
|
|
|
'af_public_comments' => 'Mock filter with timestamp',
|
|
|
|
'actions' => [
|
|
|
|
'degroup' => []
|
|
|
|
]
|
|
|
|
],
|
|
|
|
8 => [
|
|
|
|
'af_pattern' => 'added_lines_pst irlike "\\[\\[Link\\|Link\\]\\]"',
|
|
|
|
'af_public_comments' => 'Mock filter with pst',
|
|
|
|
'actions' => [
|
|
|
|
'disallow' => [],
|
|
|
|
'block' => [
|
|
|
|
'NoTalkBlockSet',
|
|
|
|
'4 hours',
|
|
|
|
'4 hours'
|
|
|
|
]
|
|
|
|
]
|
|
|
|
],
|
|
|
|
9 => [
|
|
|
|
'af_pattern' => 'new_size > old_size',
|
|
|
|
'af_public_comments' => 'Mock filter with size',
|
|
|
|
'af_hidden' => 1,
|
|
|
|
'actions' => [
|
|
|
|
'disallow' => [],
|
|
|
|
'block' => [
|
|
|
|
'blocktalk',
|
|
|
|
'3 hours',
|
|
|
|
'3 hours'
|
|
|
|
]
|
|
|
|
]
|
|
|
|
],
|
|
|
|
10 => [
|
|
|
|
'af_pattern' => '1 == 1',
|
|
|
|
'af_public_comments' => 'Mock throttled filter',
|
|
|
|
'af_hidden' => 1,
|
|
|
|
'af_throttled' => 1,
|
|
|
|
'actions' => [
|
|
|
|
'tag' => [
|
|
|
|
'testTag'
|
|
|
|
],
|
|
|
|
'block' => [
|
|
|
|
'blocktalk',
|
|
|
|
'infinity',
|
|
|
|
'infinity'
|
|
|
|
]
|
|
|
|
]
|
|
|
|
],
|
|
|
|
11 => [
|
|
|
|
'af_pattern' => '1 == 1',
|
2018-12-27 19:27:25 +00:00
|
|
|
'af_public_comments' => 'Catch-all filter which throttles',
|
2018-07-08 16:06:19 +00:00
|
|
|
'actions' => [
|
|
|
|
'throttle' => [
|
|
|
|
11,
|
|
|
|
'1,3600',
|
2018-12-27 19:27:25 +00:00
|
|
|
'site'
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
|
|
|
'disallow' => []
|
|
|
|
]
|
|
|
|
],
|
|
|
|
12 => [
|
2018-08-21 14:46:18 +00:00
|
|
|
'af_pattern' => 'page_title == user_name & user_name === page_title',
|
2018-07-08 16:06:19 +00:00
|
|
|
'af_public_comments' => 'Mock filter for userpage',
|
|
|
|
'actions' => [
|
|
|
|
'disallow' => [],
|
|
|
|
'block' => [
|
|
|
|
'blocktalk',
|
|
|
|
'8 hours',
|
|
|
|
'1 day'
|
|
|
|
],
|
|
|
|
'degroup' => []
|
|
|
|
]
|
|
|
|
],
|
|
|
|
13 => [
|
|
|
|
'af_pattern' => '2 == 2',
|
|
|
|
'af_public_comments' => 'Another throttled mock filter',
|
|
|
|
'af_throttled' => 1,
|
|
|
|
'actions' => [
|
|
|
|
'block' => [
|
|
|
|
'blocktalk',
|
|
|
|
'8 hours',
|
|
|
|
'1 day'
|
|
|
|
],
|
|
|
|
'degroup' => []
|
|
|
|
]
|
2018-08-20 14:24:23 +00:00
|
|
|
],
|
|
|
|
14 => [
|
|
|
|
'af_pattern' => '5/int(article_text) == 3',
|
|
|
|
'af_public_comments' => 'Filter with a possible division by zero',
|
2018-12-27 19:27:25 +00:00
|
|
|
'actions' => [
|
|
|
|
'disallow' => []
|
|
|
|
]
|
|
|
|
],
|
|
|
|
15 => [
|
|
|
|
'af_pattern' => 'action contains "createaccount"',
|
|
|
|
'af_public_comments' => 'Catch-all for account creations',
|
|
|
|
'af_hidden' => 1,
|
2018-08-20 14:24:23 +00:00
|
|
|
'actions' => [
|
|
|
|
'disallow' => []
|
|
|
|
]
|
2018-08-23 18:53:55 +00:00
|
|
|
],
|
2018-08-24 14:22:58 +00:00
|
|
|
18 => [
|
2018-08-25 12:44:01 +00:00
|
|
|
'af_pattern' => '1 == 1',
|
|
|
|
'af_public_comments' => 'Global filter',
|
|
|
|
'af_global' => 1,
|
2018-08-24 14:22:58 +00:00
|
|
|
'actions' => [
|
2018-08-25 12:44:01 +00:00
|
|
|
'warn' => [
|
|
|
|
'abusefilter-warning'
|
|
|
|
],
|
|
|
|
'disallow' => []
|
2018-08-24 14:22:58 +00:00
|
|
|
]
|
|
|
|
],
|
2018-08-25 12:44:01 +00:00
|
|
|
19 => [
|
|
|
|
'af_pattern' => 'user_name === "FilteredUser"',
|
|
|
|
'af_public_comments' => 'Another global filter',
|
|
|
|
'af_global' => 1,
|
|
|
|
'actions' => [
|
|
|
|
'tag' => [
|
|
|
|
'globalTag'
|
|
|
|
]
|
|
|
|
]
|
|
|
|
],
|
|
|
|
20 => [
|
|
|
|
'af_pattern' => 'page_title === "Cellar door"',
|
|
|
|
'af_public_comments' => 'Yet another global filter',
|
|
|
|
'af_global' => 1,
|
|
|
|
'actions' => [
|
|
|
|
'disallow' => [],
|
|
|
|
]
|
2018-07-16 12:10:36 +00:00
|
|
|
],
|
|
|
|
21 => [
|
|
|
|
'af_pattern' => '1==1',
|
|
|
|
'af_public_comments' => 'Dangerous filter',
|
|
|
|
'actions' => [
|
|
|
|
'blockautopromote' => []
|
|
|
|
]
|
2020-09-15 13:51:43 +00:00
|
|
|
],
|
|
|
|
22 => [
|
|
|
|
'af_pattern' => 'action contains "upload" & "Block me" in added_lines & file_size > 0 & ' .
|
|
|
|
'file_mime contains "/" & file_width + file_height > 0 & summary !== ""',
|
|
|
|
'af_public_comments' => 'Filter for uploads',
|
|
|
|
'actions' => [
|
|
|
|
'warn' => [
|
|
|
|
'abusefilter-random-upload'
|
|
|
|
],
|
|
|
|
'blockautopromote' => []
|
|
|
|
]
|
2018-09-26 11:38:51 +00:00
|
|
|
],
|
|
|
|
23 => [
|
|
|
|
'af_pattern' => '1 === 1',
|
|
|
|
'af_public_comments' => 'Catch-all for warning + disallow',
|
|
|
|
'actions' => [
|
|
|
|
'warn' => [
|
|
|
|
'abusefilter-my-warning'
|
|
|
|
],
|
|
|
|
'disallow' => [
|
|
|
|
'abusefilter-my-disallow'
|
|
|
|
]
|
|
|
|
]
|
|
|
|
],
|
2021-07-04 06:25:06 +00:00
|
|
|
24 => [
|
|
|
|
// We used this for testRevIdSet()
|
|
|
|
'af_pattern' => '1 == 1',
|
|
|
|
'af_public_comments' => 'Always matches, no actions',
|
|
|
|
'actions' => []
|
|
|
|
],
|
2018-07-08 16:06:19 +00:00
|
|
|
];
|
2019-02-23 09:01:57 +00:00
|
|
|
// phpcs:enable Generic.Files.LineLength
|
2018-07-08 16:06:19 +00:00
|
|
|
|
2018-08-25 12:44:01 +00:00
|
|
|
/**
|
|
|
|
* Add tables for global filters to the list of used tables
|
|
|
|
*
|
|
|
|
* @inheritDoc
|
|
|
|
*/
|
|
|
|
public function __construct( $name = null, array $data = [], $dataName = '' ) {
|
|
|
|
$prefixedTables = array_map(
|
2021-04-30 18:54:17 +00:00
|
|
|
static function ( $table ) {
|
2018-08-25 12:44:01 +00:00
|
|
|
return self::DB_EXTERNAL_PREFIX . $table;
|
|
|
|
},
|
|
|
|
self::$externalTables
|
|
|
|
);
|
|
|
|
$this->tablesUsed = array_merge( $this->tablesUsed, $prefixedTables );
|
|
|
|
parent::__construct( $name, $data, $dataName );
|
|
|
|
}
|
|
|
|
|
2018-07-08 16:06:19 +00:00
|
|
|
/**
|
2019-08-26 13:01:09 +00:00
|
|
|
* @inheritDoc
|
2018-07-08 16:06:19 +00:00
|
|
|
*/
|
2021-07-21 18:51:12 +00:00
|
|
|
protected function setUp(): void {
|
2018-07-08 16:06:19 +00:00
|
|
|
parent::setUp();
|
2022-07-15 08:44:16 +00:00
|
|
|
// Ensure that our user is a sysop
|
|
|
|
$this->user = $this->getServiceContainer()->getUserFactory()->newFromName( 'FilteredUser' );
|
2019-08-28 15:54:07 +00:00
|
|
|
$this->user->addToDatabase();
|
2022-07-15 08:44:16 +00:00
|
|
|
$this->getServiceContainer()->getUserGroupManager()->addUserToGroup( $this->user, 'sysop' );
|
2018-08-25 12:44:01 +00:00
|
|
|
|
2021-02-05 22:11:55 +00:00
|
|
|
// Pin time to avoid time shifts on relative block duration
|
|
|
|
ConvertibleTimestamp::setFakeTime( time() );
|
|
|
|
|
2018-07-08 16:06:19 +00:00
|
|
|
// Make sure that the config we're using is the one we're expecting
|
|
|
|
$this->setMwGlobals( [
|
2018-12-27 19:27:25 +00:00
|
|
|
// Exclude noisy creation log
|
|
|
|
'wgPageCreationLog' => false,
|
2018-07-08 16:06:19 +00:00
|
|
|
'wgAbuseFilterActions' => [
|
|
|
|
'throttle' => true,
|
|
|
|
'warn' => true,
|
|
|
|
'disallow' => true,
|
|
|
|
'blockautopromote' => true,
|
|
|
|
'block' => true,
|
|
|
|
'rangeblock' => true,
|
|
|
|
'degroup' => true,
|
|
|
|
'tag' => true
|
2018-08-25 12:44:01 +00:00
|
|
|
],
|
2019-08-26 11:26:44 +00:00
|
|
|
'wgMainCacheType' => 'hash',
|
2018-07-08 16:06:19 +00:00
|
|
|
] );
|
|
|
|
}
|
|
|
|
|
2019-05-24 14:54:29 +00:00
|
|
|
/**
|
|
|
|
* @inheritDoc
|
|
|
|
*/
|
2021-07-21 18:51:12 +00:00
|
|
|
protected function tearDown(): void {
|
2020-09-16 09:15:38 +00:00
|
|
|
$this->clearUploads();
|
2019-05-24 14:54:29 +00:00
|
|
|
parent::tearDown();
|
|
|
|
}
|
|
|
|
|
2018-12-27 19:27:25 +00:00
|
|
|
/**
|
|
|
|
* Creates new filters with the given ids, referred to self::$filters
|
|
|
|
*
|
|
|
|
* @param int[] $ids IDs of the filters to create
|
2018-08-25 12:44:01 +00:00
|
|
|
* @param bool $external Whether to create filters in the external table
|
2018-12-27 19:27:25 +00:00
|
|
|
*/
|
2019-08-26 13:01:09 +00:00
|
|
|
private function createFilters( $ids, $external = false ) {
|
2018-12-27 19:27:25 +00:00
|
|
|
global $wgAbuseFilterActions;
|
2018-08-25 12:44:01 +00:00
|
|
|
$tablePrefix = $external ? self::DB_EXTERNAL_PREFIX : '';
|
2018-12-27 19:27:25 +00:00
|
|
|
$defaultRowSection = [
|
|
|
|
'af_user_text' => 'FilterTester',
|
|
|
|
'af_user' => 0,
|
2019-08-26 13:01:09 +00:00
|
|
|
'af_timestamp' => $this->db->timestamp(),
|
2018-12-27 19:27:25 +00:00
|
|
|
'af_group' => 'default',
|
|
|
|
'af_comments' => '',
|
|
|
|
'af_hit_count' => 0,
|
|
|
|
'af_enabled' => 1,
|
|
|
|
'af_hidden' => 0,
|
|
|
|
'af_throttled' => 0,
|
|
|
|
'af_deleted' => 0,
|
|
|
|
'af_global' => 0
|
|
|
|
];
|
|
|
|
|
|
|
|
foreach ( $ids as $id ) {
|
|
|
|
$filter = self::$filters[$id] + $defaultRowSection;
|
|
|
|
$actions = $filter['actions'];
|
|
|
|
unset( $filter['actions'] );
|
|
|
|
$filter[ 'af_actions' ] = implode( ',', array_keys( $actions ) );
|
|
|
|
$filter[ 'af_id' ] = $id;
|
|
|
|
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->db->insert(
|
2018-08-25 12:44:01 +00:00
|
|
|
"{$tablePrefix}abuse_filter",
|
2018-12-27 19:27:25 +00:00
|
|
|
$filter,
|
|
|
|
__METHOD__
|
|
|
|
);
|
|
|
|
|
|
|
|
$actionsRows = [];
|
|
|
|
foreach ( array_filter( $wgAbuseFilterActions ) as $action => $_ ) {
|
|
|
|
if ( isset( $actions[$action] ) ) {
|
|
|
|
$parameters = $actions[$action];
|
|
|
|
|
|
|
|
$thisRow = [
|
|
|
|
'afa_filter' => $id,
|
|
|
|
'afa_consequence' => $action,
|
|
|
|
'afa_parameters' => implode( "\n", $parameters )
|
|
|
|
];
|
|
|
|
$actionsRows[] = $thisRow;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->db->insert(
|
2018-08-25 12:44:01 +00:00
|
|
|
"{$tablePrefix}abuse_filter_action",
|
2018-12-27 19:27:25 +00:00
|
|
|
$actionsRows,
|
|
|
|
__METHOD__
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-23 18:53:55 +00:00
|
|
|
/**
|
|
|
|
* @param Title $title Title of the page to edit
|
2022-07-15 08:44:16 +00:00
|
|
|
* @param Content $content The new content of the page
|
2018-08-23 18:53:55 +00:00
|
|
|
* @param string $summary The summary of the edit
|
|
|
|
* @return string The status of the operation, as returned by the API.
|
|
|
|
*/
|
2022-07-15 08:44:16 +00:00
|
|
|
private function stashEdit( Title $title, Content $content, string $summary ) {
|
2021-12-16 22:51:24 +00:00
|
|
|
$services = $this->getServiceContainer();
|
|
|
|
return $services->getPageEditStash()->parseAndCache(
|
|
|
|
$services->getWikiPageFactory()->newFromTitle( $title ),
|
2022-07-15 08:44:16 +00:00
|
|
|
$content,
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->user,
|
2019-06-23 17:19:28 +00:00
|
|
|
$summary
|
|
|
|
);
|
2018-08-23 18:53:55 +00:00
|
|
|
}
|
|
|
|
|
2018-07-08 16:06:19 +00:00
|
|
|
/**
|
|
|
|
* @param Title $title Title of the page to edit
|
2022-07-15 08:44:16 +00:00
|
|
|
* @param Content|string $oldText Old content of the page
|
|
|
|
* @param Content|string $newText The new content of the page
|
2018-07-08 16:06:19 +00:00
|
|
|
* @param string $summary The summary of the edit
|
2018-08-23 18:53:55 +00:00
|
|
|
* @param bool|null $fromStash Whether to stash the edit. Null means no stashing, false means
|
|
|
|
* stash the edit but don't reuse it for saving, true means stash and reuse.
|
2018-07-08 16:06:19 +00:00
|
|
|
* @return Status
|
|
|
|
*/
|
2019-08-26 13:01:09 +00:00
|
|
|
private function doEdit( Title $title, $oldText, $newText, $summary, $fromStash = null ) {
|
2021-12-16 22:51:24 +00:00
|
|
|
$services = $this->getServiceContainer();
|
|
|
|
$page = $services->getWikiPageFactory()->newFromTitle( $title );
|
2018-12-27 19:27:25 +00:00
|
|
|
if ( !$page->exists() ) {
|
2019-08-26 13:01:09 +00:00
|
|
|
$status = $this->editPage(
|
2021-07-04 06:25:06 +00:00
|
|
|
$page,
|
2019-08-26 13:01:09 +00:00
|
|
|
$oldText,
|
2022-06-28 20:46:45 +00:00
|
|
|
__METHOD__ . ' page creation'
|
2019-08-26 13:01:09 +00:00
|
|
|
);
|
|
|
|
if ( !$status->isGood() ) {
|
|
|
|
throw new Exception( "Could not create test page. $status" );
|
|
|
|
}
|
2022-07-15 08:44:16 +00:00
|
|
|
$page->clear();
|
2019-08-26 13:01:09 +00:00
|
|
|
$title->resetArticleID( -1 );
|
2018-12-27 19:27:25 +00:00
|
|
|
}
|
2018-07-08 16:06:19 +00:00
|
|
|
|
2018-08-23 18:53:55 +00:00
|
|
|
if ( $fromStash !== null ) {
|
|
|
|
// If we want to save from stash, submit the same text
|
|
|
|
$stashText = $newText;
|
|
|
|
if ( $fromStash === false ) {
|
|
|
|
// Otherwise, stash some random text which won't match the actual edit
|
|
|
|
$stashText = md5( uniqid( rand(), true ) );
|
|
|
|
}
|
2022-07-15 08:44:16 +00:00
|
|
|
$stashContent = $stashText instanceof Content ? $stashText : new WikitextContent( $stashText );
|
|
|
|
$stashResult = $this->stashEdit( $title, $stashContent, $summary );
|
2019-06-23 17:19:28 +00:00
|
|
|
if ( $stashResult !== PageEditStash::ERROR_NONE ) {
|
|
|
|
throw new MWException( "The edit cannot be stashed, got the following error: $stashResult" );
|
2018-08-23 18:53:55 +00:00
|
|
|
}
|
|
|
|
}
|
2018-07-08 16:06:19 +00:00
|
|
|
|
2022-07-15 08:44:16 +00:00
|
|
|
$content = $newText instanceof Content
|
|
|
|
? $newText
|
|
|
|
: ContentHandler::makeContent( $newText, $title );
|
2019-08-26 13:01:09 +00:00
|
|
|
$status = Status::newGood();
|
|
|
|
$context = RequestContext::getMain();
|
|
|
|
$context->setUser( $this->user );
|
2021-07-04 06:25:06 +00:00
|
|
|
$context->setWikiPage( $page );
|
2019-08-26 13:01:09 +00:00
|
|
|
|
2021-08-14 14:03:08 +00:00
|
|
|
$hooksHandler = new FilteredActionsHandler(
|
2021-12-16 22:51:24 +00:00
|
|
|
$services->getStatsdDataFactory(),
|
2021-08-14 14:03:08 +00:00
|
|
|
AbuseFilterServices::getFilterRunnerFactory(),
|
|
|
|
AbuseFilterServices::getVariableGeneratorFactory(),
|
|
|
|
AbuseFilterServices::getEditRevUpdater()
|
|
|
|
);
|
|
|
|
$hooksHandler->onEditFilterMergedContent( $context, $content, $status, $summary,
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->user, false );
|
|
|
|
|
|
|
|
if ( $status->isGood() ) {
|
|
|
|
// Edit the page in case the test will expect for it to exist
|
|
|
|
$this->editPage(
|
2021-07-04 06:25:06 +00:00
|
|
|
$page,
|
2019-08-26 13:01:09 +00:00
|
|
|
$newText,
|
|
|
|
$summary,
|
2022-06-28 20:46:45 +00:00
|
|
|
NS_MAIN,
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->user
|
|
|
|
);
|
2022-07-15 08:44:16 +00:00
|
|
|
$page->clear();
|
|
|
|
$title->resetArticleID( -1 );
|
2019-08-26 13:01:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return $status;
|
2018-07-08 16:06:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Executes an action to filter
|
|
|
|
*
|
|
|
|
* @param array $params Parameters of the action
|
2018-12-27 19:27:25 +00:00
|
|
|
* @return Status
|
2018-07-08 16:06:19 +00:00
|
|
|
*/
|
2018-12-27 19:27:25 +00:00
|
|
|
private function doAction( $params ) {
|
2022-07-15 08:44:16 +00:00
|
|
|
$target = Title::newFromTextThrow( $params['target'] );
|
2018-07-08 16:06:19 +00:00
|
|
|
|
2018-12-27 19:27:25 +00:00
|
|
|
switch ( $params['action'] ) {
|
2018-07-08 16:06:19 +00:00
|
|
|
case 'edit':
|
2018-12-27 19:27:25 +00:00
|
|
|
$status = $this->doEdit( $target, $params['oldText'], $params['newText'], $params['summary'] );
|
2018-07-08 16:06:19 +00:00
|
|
|
break;
|
2018-08-23 18:53:55 +00:00
|
|
|
case 'stashedit':
|
|
|
|
$stashStatus = $params['stashType'] === 'hit';
|
|
|
|
$status = $this->doEdit(
|
|
|
|
$target,
|
|
|
|
$params['oldText'],
|
|
|
|
$params['newText'],
|
|
|
|
$params['summary'],
|
|
|
|
$stashStatus
|
|
|
|
);
|
|
|
|
break;
|
2018-07-08 16:06:19 +00:00
|
|
|
case 'move':
|
2019-08-26 13:01:09 +00:00
|
|
|
// Ensure that the page exists
|
|
|
|
$this->getExistingTestPage( $target );
|
2019-04-17 13:16:58 +00:00
|
|
|
$newTitle = isset( $params['newTitle'] )
|
2022-07-15 08:44:16 +00:00
|
|
|
? Title::newFromTextThrow( $params['newTitle'] )
|
2019-04-17 13:16:58 +00:00
|
|
|
: $this->getNonExistingTestPage()->getTitle();
|
2021-08-10 20:06:39 +00:00
|
|
|
$status = $this->getServiceContainer()
|
|
|
|
->getMovePageFactory()
|
|
|
|
->newMovePage( $target, $newTitle )
|
|
|
|
->move( $this->user, 'AbuseFilter move test', false );
|
2018-07-08 16:06:19 +00:00
|
|
|
break;
|
|
|
|
case 'delete':
|
2019-08-26 13:01:09 +00:00
|
|
|
$page = $this->getExistingTestPage( $target );
|
2020-03-19 00:44:26 +00:00
|
|
|
$status = $page->doDeleteArticleReal(
|
|
|
|
'Testing deletion in AbuseFilter',
|
|
|
|
$this->user
|
|
|
|
);
|
2018-07-08 16:06:19 +00:00
|
|
|
break;
|
|
|
|
case 'createaccount':
|
2020-09-16 09:15:38 +00:00
|
|
|
$status = $this->createAccount( $params['username'] );
|
2018-07-08 16:06:19 +00:00
|
|
|
break;
|
2020-09-15 13:51:43 +00:00
|
|
|
case 'upload':
|
2020-09-16 09:15:38 +00:00
|
|
|
[ $status, $this->clearPath ] = $this->doUpload(
|
|
|
|
$this->user,
|
2020-09-15 13:51:43 +00:00
|
|
|
$params['target'],
|
|
|
|
$params['newText'] ?? 'AbuseFilter test upload',
|
|
|
|
$params['summary'] ?? 'Test'
|
|
|
|
);
|
|
|
|
break;
|
2018-12-27 19:27:25 +00:00
|
|
|
default:
|
2018-08-23 18:53:55 +00:00
|
|
|
throw new UnexpectedValueException( 'Unrecognized action ' . $params['action'] );
|
2018-07-08 16:06:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Clear cache since we'll need to retrieve some fresh data about the user
|
|
|
|
// like blocks and groups later when checking expected values
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->user->clearInstanceCache();
|
2018-07-08 16:06:19 +00:00
|
|
|
|
|
|
|
return $status;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-12-27 19:27:25 +00:00
|
|
|
* @param array[] $actionsParams Arrays of parameters for every action
|
|
|
|
* @return Status[]
|
2018-07-08 16:06:19 +00:00
|
|
|
*/
|
2018-12-27 19:27:25 +00:00
|
|
|
private function doActions( $actionsParams ) {
|
|
|
|
$ret = [];
|
|
|
|
foreach ( $actionsParams as $params ) {
|
|
|
|
$ret[] = $this->doAction( $params );
|
2018-07-08 16:06:19 +00:00
|
|
|
}
|
2018-12-27 19:27:25 +00:00
|
|
|
return $ret;
|
2018-07-08 16:06:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-12-27 19:27:25 +00:00
|
|
|
* Helper function to retrieve change tags applied to an edit or log entry
|
2018-07-08 16:06:19 +00:00
|
|
|
*
|
2018-12-27 19:27:25 +00:00
|
|
|
* @param array $actionParams As given by the data provider
|
|
|
|
* @return string[] The applied tags
|
2018-07-08 16:06:19 +00:00
|
|
|
*/
|
2018-12-27 19:27:25 +00:00
|
|
|
private function getActionTags( $actionParams ) {
|
2022-07-15 08:44:16 +00:00
|
|
|
$title = Title::newFromTextThrow( $actionParams['target'] );
|
2018-08-23 18:53:55 +00:00
|
|
|
if ( $actionParams['action'] === 'edit' || $actionParams['action'] === 'stashedit' ) {
|
2022-07-15 08:44:16 +00:00
|
|
|
return ChangeTags::getTags( $this->db, null, $title->getLatestRevID() );
|
2018-08-20 14:24:23 +00:00
|
|
|
}
|
2018-12-27 19:27:25 +00:00
|
|
|
|
2020-02-22 13:50:43 +00:00
|
|
|
$logType = $actionParams['action'] === 'createaccount' ? 'newusers' : $actionParams['action'];
|
2020-09-16 09:15:38 +00:00
|
|
|
$logAction = $logType === 'newusers' ? 'create2' : $logType;
|
2020-02-22 13:50:43 +00:00
|
|
|
$id = $this->db->selectField(
|
|
|
|
'logging',
|
|
|
|
'log_id',
|
|
|
|
[
|
2022-07-15 08:44:16 +00:00
|
|
|
'log_namespace' => $title->getNamespace(),
|
2020-02-22 13:50:43 +00:00
|
|
|
'log_title' => $title->getDBkey(),
|
|
|
|
'log_type' => $logType,
|
|
|
|
'log_action' => $logAction
|
|
|
|
],
|
|
|
|
__METHOD__,
|
|
|
|
[],
|
|
|
|
[ 'ORDER BY' => 'log_id DESC' ]
|
2018-12-27 19:27:25 +00:00
|
|
|
);
|
2020-02-22 13:50:43 +00:00
|
|
|
if ( !$id ) {
|
|
|
|
$this->fail( 'Could not find the action in the logging table.' );
|
2018-08-20 14:24:23 +00:00
|
|
|
}
|
2022-07-15 08:44:16 +00:00
|
|
|
return ChangeTags::getTags( $this->db, null, null, (int)$id );
|
2018-12-27 19:27:25 +00:00
|
|
|
}
|
2018-07-08 16:06:19 +00:00
|
|
|
|
2018-12-27 19:27:25 +00:00
|
|
|
/**
|
2019-02-23 09:01:57 +00:00
|
|
|
* Checks that consequences are effectively taken and builds an array of expected and actual
|
|
|
|
* consequences which can be compared.
|
2018-12-27 19:27:25 +00:00
|
|
|
*
|
|
|
|
* @param Status $result As returned by self::doAction
|
|
|
|
* @param array $actionParams As it's given by data providers
|
2022-03-05 17:00:09 +00:00
|
|
|
* @param array $expectedConsequences
|
2018-12-27 19:27:25 +00:00
|
|
|
* @return array [ expected consequences, actual consequences ]
|
|
|
|
*/
|
2022-03-05 17:00:09 +00:00
|
|
|
private function checkConsequences( $result, $actionParams, $expectedConsequences ) {
|
2018-07-08 16:06:19 +00:00
|
|
|
$expectedErrors = [];
|
|
|
|
$testErrorMessage = false;
|
2022-03-05 17:00:09 +00:00
|
|
|
foreach ( $expectedConsequences as $consequence => $ids ) {
|
2018-07-08 16:06:19 +00:00
|
|
|
foreach ( $ids as $id ) {
|
|
|
|
$params = self::$filters[$id]['actions'][$consequence];
|
|
|
|
switch ( $consequence ) {
|
|
|
|
case 'warn':
|
|
|
|
// Aborts the hook with the warning message as error.
|
2022-03-05 17:00:09 +00:00
|
|
|
$expectedErrors[] = $params[0] ?? 'abusefilter-warning';
|
2018-07-08 16:06:19 +00:00
|
|
|
break;
|
|
|
|
case 'disallow':
|
2018-10-12 08:51:45 +00:00
|
|
|
// Aborts the hook with the disallow message error.
|
2022-03-05 17:00:09 +00:00
|
|
|
$expectedErrors[] = $params[0] ?? 'abusefilter-disallowed';
|
2018-07-08 16:06:19 +00:00
|
|
|
break;
|
|
|
|
case 'block':
|
|
|
|
// Aborts the hook with 'abusefilter-blocked-display' error. Should block
|
|
|
|
// the user with expected duration and options.
|
2019-08-26 13:01:09 +00:00
|
|
|
$userBlock = $this->user->getBlock( false );
|
2018-07-08 16:06:19 +00:00
|
|
|
|
|
|
|
if ( !$userBlock ) {
|
|
|
|
$testErrorMessage = "User isn't blocked.";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-12-27 19:27:25 +00:00
|
|
|
$shouldPreventTalkEdit = $params[0] === 'blocktalk';
|
2019-08-26 13:01:09 +00:00
|
|
|
$edittalkCheck = $userBlock->appliesToUsertalk( $this->user->getTalkPage() ) ===
|
2019-02-23 09:01:57 +00:00
|
|
|
$shouldPreventTalkEdit;
|
2018-07-08 16:06:19 +00:00
|
|
|
if ( !$edittalkCheck ) {
|
|
|
|
$testErrorMessage = 'The expected block option "edittalk" options does not ' .
|
|
|
|
'match the actual one.';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-02-05 22:11:55 +00:00
|
|
|
$expectedExpiry = BlockUser::parseExpiryInput( $params[2] );
|
|
|
|
$actualExpiry = $userBlock->getExpiry();
|
|
|
|
if ( !wfIsInfinity( $actualExpiry ) ) {
|
|
|
|
$actualExpiry = wfTimestamp( TS_MW, $actualExpiry );
|
|
|
|
}
|
|
|
|
if ( $expectedExpiry === false || $expectedExpiry !== $actualExpiry ) {
|
2018-08-16 17:08:13 +00:00
|
|
|
$testErrorMessage = "The expected block expiry ($expectedExpiry) does not " .
|
|
|
|
"match the actual one ($actualExpiry).";
|
2018-07-08 16:06:19 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2022-03-05 17:00:09 +00:00
|
|
|
$expectedErrors[] = 'abusefilter-blocked-display';
|
2018-07-08 16:06:19 +00:00
|
|
|
break;
|
|
|
|
case 'degroup':
|
|
|
|
// Aborts the hook with 'abusefilter-degrouped' error and degroups the user.
|
2022-03-05 17:00:09 +00:00
|
|
|
$expectedErrors[] = 'abusefilter-degrouped';
|
2021-05-06 13:35:35 +00:00
|
|
|
$ugm = MediaWikiServices::getInstance()->getUserGroupManager();
|
|
|
|
$groupCheck = !in_array( 'sysop', $ugm->getUserEffectiveGroups( $this->user ) );
|
2018-07-08 16:06:19 +00:00
|
|
|
if ( !$groupCheck ) {
|
|
|
|
$testErrorMessage = 'The user was not degrouped.';
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'tag':
|
2019-08-26 13:01:09 +00:00
|
|
|
// Only adds tags, to be retrieved in change_tag table.
|
2018-12-27 19:27:25 +00:00
|
|
|
$appliedTags = $this->getActionTags( $actionParams );
|
2018-11-27 17:56:02 +00:00
|
|
|
$tagCheck = count( array_diff( $params, $appliedTags ) ) === 0;
|
2018-07-08 16:06:19 +00:00
|
|
|
if ( !$tagCheck ) {
|
2018-12-27 19:27:25 +00:00
|
|
|
$expectedTags = implode( ', ', $params );
|
|
|
|
$actualTags = implode( ', ', $appliedTags );
|
2018-07-08 16:06:19 +00:00
|
|
|
|
2018-12-27 19:27:25 +00:00
|
|
|
$testErrorMessage = "Expected the action to have the following tags: $expectedTags. " .
|
2018-07-08 16:06:19 +00:00
|
|
|
"Got the following instead: $actualTags.";
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'throttle':
|
2018-12-27 19:27:25 +00:00
|
|
|
throw new UnexpectedValueException( 'Use self::testThrottleConsequence to test throttling' );
|
2018-07-16 12:10:36 +00:00
|
|
|
case 'blockautopromote':
|
|
|
|
// Aborts the hook with 'abusefilter-autopromote-blocked' error and prevent promotion.
|
2022-03-05 17:00:09 +00:00
|
|
|
$expectedErrors[] = 'abusefilter-autopromote-blocked';
|
2020-10-21 14:18:08 +00:00
|
|
|
$value = AbuseFilterServices::getBlockAutopromoteStore()
|
|
|
|
->getAutoPromoteBlockStatus( $this->user );
|
2019-07-06 23:35:03 +00:00
|
|
|
if ( !$value ) {
|
2018-07-16 12:10:36 +00:00
|
|
|
$testErrorMessage = "The key for blocking autopromotion wasn't set.";
|
|
|
|
}
|
|
|
|
break;
|
2018-12-27 19:27:25 +00:00
|
|
|
default:
|
2019-08-26 13:01:09 +00:00
|
|
|
throw new UnexpectedValueException( "Consequence not recognized: $consequence." );
|
2018-07-08 16:06:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if ( $testErrorMessage ) {
|
2018-12-08 15:29:46 +00:00
|
|
|
$this->fail( $testErrorMessage );
|
2018-07-08 16:06:19 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$errors = $result->getErrors();
|
|
|
|
|
|
|
|
$actual = [];
|
|
|
|
foreach ( $errors as $error ) {
|
Actually return errors for action=edit API
Setting 'apiHookResult' results in a "successful" response; if we want
to report an error, we need to use ApiMessage. We already were doing
this for action=upload. Now our action=edit API responses will be
consistent with MediaWiki and other extensions, and will be able to
take advantage of errorformat=html.
Since this breaks compatibility anyway, also remove some redundant
backwards-compatibility values from the output.
To avoid user interface regressions in VisualEditor, the changes
I3b9c4fef (in VE) and I106dbd3c (in MediaWiki) should be merged first.
Before:
{
"edit": {
"code": "abusefilter-disallowed",
"message": {
"key": "abusefilter-disallowed",
"params": [ ... ]
},
"abusefilter": { ... },
"info": "Hit AbuseFilter: Test filter disallow",
"warning": "This action has been automatically identified ...",
"result": "Failure"
}
}
After:
{
"errors": [
{
"code": "abusefilter-disallowed",
"data": {
"abusefilter": { ... },
},
"module": "edit",
"*": "This action has been automatically identified ..."
}
],
"*": "See http://localhost:3080/w/api.php for API usage. ..."
}
For comparison, a 'readonly' error:
{
"errors": [
{
"code": "readonly",
"data": {
"readonlyreason": "foo bar"
},
"module": "main",
"*": "The wiki is currently in read-only mode."
}
],
"*": "See http://localhost:3080/w/api.php for API usage. ..."
}
Bug: T229539
Depends-On: I106dbd3cbdbf7082b1d1f1c1106ece6b19c22a86
Depends-On: I3b9c4fefc0869ef7999c21cef754434febd852ec
Change-Id: I5424de387cbbcc9c85026b8cfeaf01635eee34a0
2019-08-01 01:48:08 +00:00
|
|
|
// We don't use any of the "API" stuff in ApiMessage here, but this is the most
|
|
|
|
// convenient way to get a Message from a StatusValue error structure.
|
|
|
|
$msg = ApiMessage::create( $error )->getKey();
|
2018-07-08 16:06:19 +00:00
|
|
|
if ( strpos( $msg, 'abusefilter' ) !== false ) {
|
|
|
|
$actual[] = $msg;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-05 17:00:09 +00:00
|
|
|
sort( $expectedErrors );
|
2018-07-16 12:10:36 +00:00
|
|
|
sort( $actual );
|
2022-03-05 17:00:09 +00:00
|
|
|
return [ $expectedErrors, $actual ];
|
2018-12-27 19:27:25 +00:00
|
|
|
}
|
|
|
|
|
2022-07-15 14:02:56 +00:00
|
|
|
/**
|
|
|
|
* @param array $actionParams
|
|
|
|
* @param array $expectedConsequences
|
|
|
|
*/
|
|
|
|
private function assertAbuseLog( $actionParams, $expectedConsequences ): void {
|
|
|
|
$consequencesByFilter = [];
|
|
|
|
foreach ( $expectedConsequences as $consequence => $ids ) {
|
|
|
|
foreach ( $ids as $id ) {
|
|
|
|
$consequencesByFilter[$id][] = $consequence;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
foreach ( $consequencesByFilter as $filter => $consequences ) {
|
|
|
|
$action = $actionParams['action'];
|
|
|
|
if ( $action === 'stashedit' ) {
|
|
|
|
$action = 'edit';
|
|
|
|
}
|
|
|
|
$title = Title::newFromTextThrow( $actionParams['target'] );
|
|
|
|
|
|
|
|
$row = $this->db->selectRow(
|
|
|
|
'abuse_filter_log',
|
|
|
|
'*',
|
|
|
|
[
|
|
|
|
'afl_filter_id' => $filter,
|
|
|
|
'afl_global' => 0,
|
|
|
|
],
|
|
|
|
__METHOD__,
|
|
|
|
[ 'ORDER BY' => 'afl_id DESC' ]
|
|
|
|
);
|
|
|
|
$this->assertNotFalse( $row );
|
|
|
|
|
|
|
|
$dumpStr = FormatJson::encode( $row );
|
|
|
|
$this->assertSame( $action, $row->afl_action, $dumpStr );
|
|
|
|
$this->assertNull( $row->afl_wiki, $dumpStr );
|
|
|
|
if ( $action === 'createaccount' ) {
|
|
|
|
$this->assertSame( $actionParams['username'], $row->afl_user_text, $dumpStr );
|
|
|
|
$this->assertSame( -1, (int)$row->afl_namespace, $dumpStr );
|
|
|
|
} else {
|
|
|
|
$this->assertSame( 'FilteredUser', $row->afl_user_text, $dumpStr );
|
|
|
|
$this->assertSame( $title->getNamespace(), (int)$row->afl_namespace, $dumpStr );
|
|
|
|
$this->assertSame( $title->getDBkey(), $row->afl_title, $dumpStr );
|
|
|
|
}
|
|
|
|
if (
|
|
|
|
in_array( 'disallow', $consequences )
|
|
|
|
&& array_intersect( $consequences, [ 'block', 'blockautopromote', 'degroup' ] )
|
|
|
|
) {
|
|
|
|
$consequences = array_diff( $consequences, [ 'disallow' ] );
|
|
|
|
}
|
|
|
|
$this->assertArrayEquals(
|
|
|
|
$consequences,
|
|
|
|
explode( ',', $row->afl_actions ),
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
$dumpStr
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-27 19:27:25 +00:00
|
|
|
/**
|
|
|
|
* Creates new filters, execute an action and check the consequences
|
|
|
|
*
|
|
|
|
* @param int[] $createIds IDs of the filters to create
|
|
|
|
* @param array $actionParams Details of the action we need to execute to trigger filters
|
2022-03-05 17:00:09 +00:00
|
|
|
* @param array $expectedConsequences The consequences we're expecting
|
2018-12-27 19:27:25 +00:00
|
|
|
* @dataProvider provideFilters
|
2022-07-15 14:02:56 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\AbuseLogger
|
2018-12-27 19:27:25 +00:00
|
|
|
*/
|
2022-03-05 17:00:09 +00:00
|
|
|
public function testFilterConsequences( $createIds, $actionParams, $expectedConsequences ) {
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->createFilters( $createIds );
|
2018-12-27 19:27:25 +00:00
|
|
|
$result = $this->doAction( $actionParams );
|
2022-03-05 17:00:09 +00:00
|
|
|
list( $expected, $actual ) = $this->checkConsequences( $result, $actionParams, $expectedConsequences );
|
2018-12-27 19:27:25 +00:00
|
|
|
|
2018-07-08 16:06:19 +00:00
|
|
|
$this->assertEquals(
|
|
|
|
$expected,
|
|
|
|
$actual,
|
2019-08-26 13:01:09 +00:00
|
|
|
'The error messages obtained by performing the action do not match.'
|
2018-07-08 16:06:19 +00:00
|
|
|
);
|
2022-07-15 14:02:56 +00:00
|
|
|
|
|
|
|
$this->assertAbuseLog( $actionParams, $expectedConsequences );
|
2018-07-08 16:06:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2018-12-27 19:27:25 +00:00
|
|
|
* Data provider for testFilterConsequences. For every test case, we pass
|
2018-08-20 14:24:23 +00:00
|
|
|
* - an array with the IDs of the filters to be created (listed in self::$filters),
|
|
|
|
* - an array with details of the action to execute in order to trigger the filters,
|
|
|
|
* - an array of expected consequences of the form
|
|
|
|
* [ 'consequence name' => [ IDs of the filter to take its parameters from ] ]
|
|
|
|
* Such IDs may be more than one if we have a warning that is shown twice.
|
2018-07-08 16:06:19 +00:00
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function provideFilters() {
|
|
|
|
return [
|
2018-12-08 15:29:46 +00:00
|
|
|
'Basic test for "edit" action' => [
|
2018-07-08 16:06:19 +00:00
|
|
|
[ 1, 2 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Test page',
|
2018-07-08 16:06:19 +00:00
|
|
|
'oldText' => 'Some old text for the test.',
|
|
|
|
'newText' => 'I like foo',
|
|
|
|
'summary' => 'Test AbuseFilter for edit action.'
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
[ 'warn' => [ 1 ] ]
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-12-08 15:29:46 +00:00
|
|
|
'Basic test for "move" action' => [
|
2018-07-08 16:06:19 +00:00
|
|
|
[ 2 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'move',
|
|
|
|
'target' => 'Test page',
|
2018-07-08 16:06:19 +00:00
|
|
|
'newTitle' => 'Another test page'
|
|
|
|
],
|
2022-03-05 17:00:09 +00:00
|
|
|
[ 'block' => [ 2 ] ]
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-12-08 15:29:46 +00:00
|
|
|
'Basic test for "delete" action' => [
|
2018-07-08 16:06:19 +00:00
|
|
|
[ 2, 3 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'delete',
|
|
|
|
'target' => 'Test page'
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
[ 'degroup' => [ 3 ] ]
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
'Basic test for "createaccount", no consequences.' => [
|
2021-01-09 23:26:29 +00:00
|
|
|
[ 1, 2, 3 ],
|
2018-07-08 16:06:19 +00:00
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'createaccount',
|
|
|
|
'target' => 'User:AnotherUser',
|
2018-07-08 16:06:19 +00:00
|
|
|
'username' => 'AnotherUser'
|
|
|
|
],
|
|
|
|
[]
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
'Basic test for "createaccount", disallowed.' => [
|
|
|
|
[ 15 ],
|
|
|
|
[
|
|
|
|
'action' => 'createaccount',
|
|
|
|
'target' => 'User:AnotherUser',
|
|
|
|
'username' => 'AnotherUser'
|
|
|
|
],
|
|
|
|
[ 'disallow' => [ 15 ] ]
|
|
|
|
],
|
|
|
|
'Check that all tags are applied' => [
|
2018-07-08 16:06:19 +00:00
|
|
|
[ 5 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'User:FilteredUser',
|
2018-07-08 16:06:19 +00:00
|
|
|
'oldText' => 'Hey.',
|
|
|
|
'newText' => 'I am a very nice user, really!',
|
|
|
|
'summary' => ''
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
[ 'tag' => [ 5 ] ]
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
'Check that degroup and block are executed together' => [
|
2018-07-08 16:06:19 +00:00
|
|
|
[ 2, 3, 7, 8 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Link',
|
2018-07-08 16:06:19 +00:00
|
|
|
'oldText' => 'What is a link?',
|
|
|
|
'newText' => 'A link is something like this: [[Link|]].',
|
|
|
|
'summary' => 'Explaining'
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
[ 'degroup' => [ 7 ], 'block' => [ 8 ] ]
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
'Check that the block duration is the longer one' => [
|
2018-07-08 16:06:19 +00:00
|
|
|
[ 8, 9 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Whatever',
|
2018-07-08 16:06:19 +00:00
|
|
|
'oldText' => 'Whatever is whatever',
|
|
|
|
'newText' => 'Whatever is whatever, whatever it is. BTW, here is a [[Link|]]',
|
|
|
|
'summary' => 'Whatever'
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
[ 'disallow' => [ 8 ], 'block' => [ 8 ] ]
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
'Check that throttled filters only execute "safe" actions' => [
|
2018-07-08 16:06:19 +00:00
|
|
|
[ 10 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Buffalo',
|
2018-07-08 16:06:19 +00:00
|
|
|
'oldText' => 'Buffalo',
|
|
|
|
'newText' => 'Buffalo buffalo Buffalo buffalo buffalo buffalo Buffalo buffalo.',
|
|
|
|
'summary' => 'Buffalo!'
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
[ 'tag' => [ 10 ] ]
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
'Check that degroup and block are both executed and degroup warning is shown twice' => [
|
2018-07-08 16:06:19 +00:00
|
|
|
[ 1, 3, 7, 12 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'User:FilteredUser',
|
2018-07-08 16:06:19 +00:00
|
|
|
'oldText' => '',
|
|
|
|
'newText' => 'A couple of lines about me...',
|
|
|
|
'summary' => 'My user page'
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
[ 'block' => [ 12 ], 'degroup' => [ 7, 12 ] ]
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
'Check that every throttled filter only executes "safe" actions' => [
|
2018-07-08 16:06:19 +00:00
|
|
|
[ 10, 13 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Tyger! Tyger! Burning bright',
|
2018-07-08 16:06:19 +00:00
|
|
|
'oldText' => 'In the forests of the night',
|
|
|
|
'newText' => 'What immortal hand or eye',
|
|
|
|
'summary' => 'Could frame thy fearful symmetry?'
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
[ 'tag' => [ 10 ] ]
|
2018-08-20 14:24:23 +00:00
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
'Check that runtime exceptions (division by zero) are correctly handled' => [
|
2018-08-20 14:24:23 +00:00
|
|
|
[ 14 ],
|
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'edit',
|
|
|
|
'target' => '0',
|
2018-08-20 14:24:23 +00:00
|
|
|
'oldText' => 'Old text',
|
|
|
|
'newText' => 'New text',
|
|
|
|
'summary' => 'Some summary'
|
|
|
|
],
|
|
|
|
[]
|
|
|
|
],
|
2018-07-16 12:10:36 +00:00
|
|
|
'Test for blockautopromote action.' => [
|
|
|
|
[ 21 ],
|
|
|
|
[
|
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Rainbow',
|
|
|
|
'oldText' => '',
|
|
|
|
'newText' => '...',
|
|
|
|
'summary' => ''
|
|
|
|
],
|
|
|
|
[ 'blockautopromote' => [ 21 ] ],
|
|
|
|
],
|
2022-07-15 14:02:56 +00:00
|
|
|
'No consequences' => [
|
|
|
|
[ 8 ],
|
2018-08-20 14:24:23 +00:00
|
|
|
[
|
2018-12-27 19:27:25 +00:00
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Anything',
|
2018-08-20 14:24:23 +00:00
|
|
|
'oldText' => 'Bar',
|
|
|
|
'newText' => 'Foo',
|
|
|
|
'summary' => ''
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
[]
|
2018-08-20 14:24:23 +00:00
|
|
|
],
|
2020-09-15 13:51:43 +00:00
|
|
|
'Test upload action' => [
|
|
|
|
[ 5 ],
|
|
|
|
[
|
|
|
|
'action' => 'upload',
|
2022-07-15 08:44:16 +00:00
|
|
|
'target' => 'File:MyFile.svg',
|
2020-09-15 13:51:43 +00:00
|
|
|
],
|
|
|
|
[ 'tag' => [ 5 ] ]
|
|
|
|
],
|
|
|
|
'Test upload action 2' => [
|
|
|
|
[ 22 ],
|
|
|
|
[
|
|
|
|
'action' => 'upload',
|
2022-07-15 08:44:16 +00:00
|
|
|
'target' => 'File:MyFile.svg',
|
2020-09-15 13:51:43 +00:00
|
|
|
'newText' => 'Block me please!',
|
|
|
|
'summary' => 'Asking to be blocked'
|
|
|
|
],
|
|
|
|
[ 'warn' => [ 22 ] ]
|
|
|
|
],
|
2018-12-27 19:27:25 +00:00
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check an array of results from self::doAction to ensure that all but the last actions have been
|
|
|
|
* executed (i.e. no errors).
|
|
|
|
* @param Status[] $results As returned by self::doActions
|
|
|
|
* @return Status The Status of the last action, to be later checked with self::checkConsequences
|
|
|
|
*/
|
|
|
|
private function checkThrottleConsequence( $results ) {
|
|
|
|
$finalRes = array_pop( $results );
|
|
|
|
foreach ( $results as $result ) {
|
|
|
|
if ( !$result->isGood() ) {
|
2019-02-23 09:01:57 +00:00
|
|
|
$this->fail( 'Only the last actions should have triggered a filter; the other ones ' .
|
2021-02-06 15:39:11 +00:00
|
|
|
'should have been allowed.' );
|
2018-12-27 19:27:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $finalRes;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Like self::testFilterConsequences but for throttle, which deserves a special treatment
|
|
|
|
*
|
|
|
|
* @param int[] $createIds IDs of the filters to create
|
|
|
|
* @param array[] $actionsParams Details of the action we need to execute to trigger filters
|
|
|
|
* @param array $consequences The consequences we're expecting
|
|
|
|
* @dataProvider provideThrottleFilters
|
2022-07-15 14:02:56 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\AbuseLogger
|
2018-12-27 19:27:25 +00:00
|
|
|
*/
|
|
|
|
public function testThrottle( $createIds, $actionsParams, $consequences ) {
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->createFilters( $createIds );
|
2021-07-29 14:12:06 +00:00
|
|
|
$results = $this->doActions( $actionsParams );
|
2018-12-27 19:27:25 +00:00
|
|
|
$res = $this->checkThrottleConsequence( $results );
|
|
|
|
$lastParams = array_pop( $actionsParams );
|
|
|
|
list( $expected, $actual ) = $this->checkConsequences( $res, $lastParams, $consequences );
|
|
|
|
|
|
|
|
$this->assertEquals(
|
|
|
|
$expected,
|
|
|
|
$actual,
|
2019-08-26 13:01:09 +00:00
|
|
|
'The error messages obtained by performing the action do not match.'
|
2018-12-27 19:27:25 +00:00
|
|
|
);
|
2022-07-15 14:02:56 +00:00
|
|
|
|
|
|
|
$this->assertAbuseLog( $lastParams, $consequences );
|
2018-12-27 19:27:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Data provider for testThrottle. For every test case, we pass
|
|
|
|
* - an array with the IDs of the filters to be created (listed in self::$filters),
|
2019-02-23 09:01:57 +00:00
|
|
|
* - an array of array, where every sub-array holds the details of the action to execute in
|
|
|
|
* order to trigger the filters, each one like in self::provideFilters
|
2018-12-27 19:27:25 +00:00
|
|
|
* - an array of expected consequences for the last action (i.e. after throttling) of the form
|
|
|
|
* [ 'consequence name' => [ IDs of the filter to take its parameters from ] ]
|
|
|
|
* Such IDs may be more than one if we have a warning that is shown twice.
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function provideThrottleFilters() {
|
|
|
|
return [
|
|
|
|
'Basic test for throttling edits' => [
|
|
|
|
[ 11 ],
|
|
|
|
[
|
|
|
|
[
|
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Throttle',
|
|
|
|
'oldText' => 'What is throttle?',
|
|
|
|
'newText' => 'Throttle is something that should happen...',
|
|
|
|
'summary' => 'Throttle'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Throttle',
|
|
|
|
'oldText' => 'Throttle is something that should happen...',
|
|
|
|
'newText' => '... Right now!',
|
|
|
|
'summary' => 'Throttle'
|
|
|
|
]
|
|
|
|
],
|
|
|
|
[ 'disallow' => [ 11 ] ]
|
|
|
|
],
|
|
|
|
'Basic test for throttling "move"' => [
|
|
|
|
[ 11 ],
|
|
|
|
[
|
|
|
|
[
|
|
|
|
'action' => 'move',
|
|
|
|
'target' => 'Throttle test',
|
|
|
|
'newTitle' => 'Another throttle test'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
'action' => 'move',
|
|
|
|
'target' => 'Another throttle test',
|
|
|
|
'newTitle' => 'Yet another throttle test'
|
|
|
|
],
|
|
|
|
],
|
|
|
|
[ 'disallow' => [ 11 ] ]
|
|
|
|
],
|
|
|
|
'Basic test for throttling "delete"' => [
|
|
|
|
[ 11 ],
|
|
|
|
[
|
|
|
|
[
|
|
|
|
'action' => 'delete',
|
|
|
|
'target' => 'Test page'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
'action' => 'delete',
|
|
|
|
'target' => 'Test page'
|
|
|
|
]
|
|
|
|
],
|
|
|
|
[ 'disallow' => [ 11 ] ]
|
|
|
|
],
|
|
|
|
'Basic test for throttling "createaccount"' => [
|
|
|
|
[ 11 ],
|
|
|
|
[
|
|
|
|
[
|
|
|
|
'action' => 'createaccount',
|
|
|
|
'target' => 'User:AnotherUser',
|
|
|
|
'username' => 'AnotherUser'
|
|
|
|
],
|
|
|
|
[
|
|
|
|
'action' => 'createaccount',
|
|
|
|
'target' => 'User:YetAnotherUser',
|
|
|
|
'username' => 'YetAnotherUser'
|
|
|
|
]
|
|
|
|
],
|
|
|
|
[ 'disallow' => [ 11 ] ]
|
2018-09-26 11:38:51 +00:00
|
|
|
]
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Like self::testFilterConsequences but for warn, which deserves a special treatment.
|
|
|
|
* Data provider passes parameters for a single action, which we repeat twice
|
|
|
|
*
|
|
|
|
* @param int[] $createIds IDs of the filters to create
|
|
|
|
* @param array[] $actionParams Details of the action we need to execute to trigger filters
|
|
|
|
* @param int[] $warnIDs IDs of the filters which will warn us
|
|
|
|
* @param array $consequences The consequences we're expecting
|
|
|
|
* @dataProvider provideWarnFilters
|
2022-07-15 14:02:56 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\AbuseLogger
|
2018-09-26 11:38:51 +00:00
|
|
|
*/
|
|
|
|
public function testWarn( $createIds, $actionParams, $warnIDs, $consequences ) {
|
|
|
|
$this->createFilters( $createIds );
|
|
|
|
$params = [ $actionParams, $actionParams ];
|
|
|
|
list( $warnedStatus, $finalStatus ) = $this->doActions( $params );
|
|
|
|
|
|
|
|
list( $expectedWarn, $actualWarn ) = $this->checkConsequences(
|
|
|
|
$warnedStatus,
|
|
|
|
$actionParams,
|
|
|
|
[ 'warn' => $warnIDs ]
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->assertSame(
|
|
|
|
$expectedWarn,
|
|
|
|
$actualWarn,
|
|
|
|
'The error messages for the first action do not match.'
|
|
|
|
);
|
|
|
|
|
|
|
|
list( $expectedFinal, $actualFinal ) = $this->checkConsequences(
|
|
|
|
$finalStatus,
|
|
|
|
$actionParams,
|
|
|
|
$consequences
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->assertSame(
|
|
|
|
$expectedFinal,
|
|
|
|
$actualFinal,
|
|
|
|
'The error messages for the second action do not match.'
|
|
|
|
);
|
2022-07-15 14:02:56 +00:00
|
|
|
|
|
|
|
$this->assertAbuseLog( $actionParams, $consequences );
|
2018-09-26 11:38:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Data provider for testWarn. For every test case, we pass
|
|
|
|
* - an array with the IDs of the filters to be created (listed in self::$filters),
|
|
|
|
* - an array with action parameters, like in self::provideFilters. This will be executed twice.
|
|
|
|
* - an array of IDs of the filter which should give a warning
|
|
|
|
* - an array of expected consequences for the last action (i.e. after throttling) of the form
|
|
|
|
* [ 'consequence name' => [ IDs of the filter to take its parameters from ] ]
|
|
|
|
* Such IDs may be more than one if we have a warning that is shown twice.
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function provideWarnFilters() {
|
|
|
|
return [
|
|
|
|
'Basic test for warning and then tag' => [
|
|
|
|
[ 1 ],
|
|
|
|
[
|
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Foo',
|
|
|
|
'oldText' => 'Neutral text',
|
|
|
|
'newText' => 'First foo version',
|
|
|
|
'summary' => ''
|
|
|
|
],
|
|
|
|
[ 1 ],
|
|
|
|
[ 'tag' => [ 1 ] ],
|
2018-07-08 16:06:19 +00:00
|
|
|
],
|
2018-09-26 11:38:51 +00:00
|
|
|
'Basic test for warning on "move"' => [
|
|
|
|
[ 23 ],
|
|
|
|
[
|
|
|
|
'action' => 'move',
|
|
|
|
'target' => 'Test warn',
|
|
|
|
'newTitle' => 'Another warn test'
|
|
|
|
],
|
|
|
|
[ 23 ],
|
|
|
|
[ 'disallow' => [ 23 ] ]
|
|
|
|
],
|
|
|
|
'Basic test for warning on "delete"' => [
|
|
|
|
[ 23 ],
|
|
|
|
[
|
|
|
|
'action' => 'delete',
|
|
|
|
'target' => 'Warned'
|
|
|
|
],
|
|
|
|
[ 23 ],
|
|
|
|
[ 'disallow' => [ 23 ] ]
|
|
|
|
],
|
|
|
|
'Basic test for warning on "createaccount"' => [
|
|
|
|
[ 23 ],
|
|
|
|
[
|
|
|
|
'action' => 'createaccount',
|
|
|
|
'target' => 'User:AnotherWarnedUser',
|
|
|
|
'username' => 'AnotherWarnedUser'
|
|
|
|
],
|
|
|
|
[ 23 ],
|
|
|
|
[ 'disallow' => [ 23 ] ]
|
|
|
|
]
|
2018-07-08 16:06:19 +00:00
|
|
|
];
|
|
|
|
}
|
2018-12-28 16:01:19 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param int[] $createIds IDs of the filters to create
|
|
|
|
* @param array $actionParams Details of the action we need to execute to trigger filters
|
|
|
|
* @param string[] $usedVars The variables effectively computed by filters in $createIds.
|
|
|
|
* We'll search these in the stored dump.
|
2021-01-02 13:41:31 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\Variables\VariablesBlobStore
|
2018-12-28 16:01:19 +00:00
|
|
|
* @dataProvider provideFiltersAndVariables
|
|
|
|
*/
|
|
|
|
public function testVarDump( $createIds, $actionParams, $usedVars ) {
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->createFilters( $createIds );
|
2018-12-28 16:01:19 +00:00
|
|
|
// We don't care about consequences here
|
2018-08-23 18:53:55 +00:00
|
|
|
$this->doAction( $actionParams );
|
2018-12-28 16:01:19 +00:00
|
|
|
|
|
|
|
// We just take a dump from a single filters, as they're all identical for the same action
|
2019-08-26 13:01:09 +00:00
|
|
|
$dumpID = $this->db->selectField(
|
2018-12-28 16:01:19 +00:00
|
|
|
'abuse_filter_log',
|
|
|
|
'afl_var_dump',
|
|
|
|
'',
|
|
|
|
__METHOD__,
|
|
|
|
[ 'ORDER BY' => 'afl_timestamp DESC' ]
|
|
|
|
);
|
|
|
|
|
2020-09-29 14:52:05 +00:00
|
|
|
$vars = AbuseFilterServices::getVariablesBlobStore()->loadVarDump( $dumpID )->getVars();
|
2018-12-28 16:01:19 +00:00
|
|
|
|
|
|
|
$interestingVars = array_intersect_key( $vars, array_fill_keys( $usedVars, true ) );
|
|
|
|
|
|
|
|
sort( $usedVars );
|
|
|
|
ksort( $interestingVars );
|
|
|
|
$this->assertEquals(
|
|
|
|
$usedVars,
|
|
|
|
array_keys( $interestingVars ),
|
|
|
|
"The saved variables aren't the expected ones."
|
|
|
|
);
|
|
|
|
$this->assertContainsOnlyInstancesOf(
|
|
|
|
AFPData::class,
|
|
|
|
$interestingVars,
|
|
|
|
'Some variables have not been computed.'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Data provider for testVarDump
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function provideFiltersAndVariables() {
|
|
|
|
return [
|
|
|
|
[
|
|
|
|
[ 1, 2 ],
|
|
|
|
[
|
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Test page',
|
|
|
|
'oldText' => 'Some old text for the test.',
|
|
|
|
'newText' => 'I like foo',
|
|
|
|
'summary' => 'Test AbuseFilter for edit action.'
|
|
|
|
],
|
|
|
|
[ 'added_lines', 'action' ]
|
|
|
|
],
|
2018-08-23 18:53:55 +00:00
|
|
|
[
|
|
|
|
[ 1, 2 ],
|
|
|
|
[
|
|
|
|
'action' => 'stashedit',
|
|
|
|
'target' => 'Test page',
|
|
|
|
'oldText' => 'Some old text for the test.',
|
|
|
|
'newText' => 'I like foo',
|
|
|
|
'summary' => 'Test AbuseFilter for edit action.',
|
|
|
|
'stashType' => 'hit'
|
|
|
|
],
|
|
|
|
[ 'added_lines', 'action' ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 1, 2 ],
|
|
|
|
[
|
|
|
|
'action' => 'stashedit',
|
|
|
|
'target' => 'Test page',
|
|
|
|
'oldText' => 'Some old text for the test.',
|
|
|
|
'newText' => 'I like foo',
|
|
|
|
'summary' => 'Test AbuseFilter for edit action.',
|
|
|
|
'stashType' => 'miss'
|
|
|
|
],
|
|
|
|
[ 'added_lines', 'action' ]
|
|
|
|
],
|
2018-12-28 16:01:19 +00:00
|
|
|
[
|
|
|
|
[ 2 ],
|
|
|
|
[
|
|
|
|
'action' => 'move',
|
|
|
|
'target' => 'Test page',
|
|
|
|
'newTitle' => 'Another test page'
|
|
|
|
],
|
|
|
|
[ 'action', 'moved_to_title' ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 2, 3 ],
|
|
|
|
[
|
|
|
|
'action' => 'delete',
|
|
|
|
'target' => 'Test page'
|
|
|
|
],
|
|
|
|
[ 'action', 'page_prefixedtitle' ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 15 ],
|
|
|
|
[
|
|
|
|
'action' => 'createaccount',
|
|
|
|
'target' => 'User:AnotherUser',
|
|
|
|
'username' => 'AnotherUser'
|
|
|
|
],
|
|
|
|
[ 'action' ]
|
|
|
|
],
|
2018-08-23 18:53:55 +00:00
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Same as testFilterConsequences but only for stashed edits
|
|
|
|
*
|
|
|
|
* @param string $type Either "hit" or "miss". The former saves the edit from stash, the second
|
|
|
|
* stashes the edit but doesn't reuse it.
|
|
|
|
* @param int[] $createIds IDs of the filters to create
|
|
|
|
* @param array $actionParams Details of the action we need to execute to trigger filters
|
|
|
|
* @param array $consequences The consequences we're expecting
|
|
|
|
* @dataProvider provideStashedEdits
|
2022-07-15 14:02:56 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\AbuseLogger
|
2018-08-23 18:53:55 +00:00
|
|
|
*/
|
|
|
|
public function testStashedEdit( $type, $createIds, $actionParams, $consequences ) {
|
|
|
|
if ( $type !== 'hit' && $type !== 'miss' ) {
|
|
|
|
throw new InvalidArgumentException( '$type must be either "hit" or "miss"' );
|
|
|
|
}
|
|
|
|
// Add some info in actionParams identical for all tests
|
|
|
|
$actionParams['action'] = 'stashedit';
|
|
|
|
$actionParams['stashType'] = $type;
|
|
|
|
|
2021-02-06 15:39:11 +00:00
|
|
|
$loggerMock = $this->createMock( LoggerInterface::class );
|
|
|
|
$loggerCalls = [];
|
|
|
|
$loggerMock->method( 'debug' )
|
2021-04-30 18:54:17 +00:00
|
|
|
->willReturnCallback( static function ( $msg, $args ) use ( &$loggerCalls ) {
|
2021-02-06 15:39:11 +00:00
|
|
|
if ( isset( $args['logtype'] ) ) {
|
|
|
|
$loggerCalls[] = $args['logtype'];
|
|
|
|
}
|
|
|
|
} );
|
2018-08-23 18:53:55 +00:00
|
|
|
$this->setLogger( 'StashEdit', $loggerMock );
|
|
|
|
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->createFilters( $createIds );
|
2018-08-23 18:53:55 +00:00
|
|
|
$result = $this->doAction( $actionParams );
|
|
|
|
|
|
|
|
// Check that we stored the edit and then hit/missed the cache
|
2021-02-06 15:39:11 +00:00
|
|
|
if ( !in_array( 'store', $loggerCalls, true ) ) {
|
2018-08-23 18:53:55 +00:00
|
|
|
$this->fail( 'Did not store the edit in cache as expected for a stashed edit.' );
|
2021-02-06 15:39:11 +00:00
|
|
|
} elseif ( !in_array( $type, $loggerCalls, true ) ) {
|
2018-08-23 18:53:55 +00:00
|
|
|
$this->fail( "Did not $type the cache as expected for a stashed edit." );
|
|
|
|
}
|
|
|
|
|
|
|
|
list( $expected, $actual ) = $this->checkConsequences( $result, $actionParams, $consequences );
|
|
|
|
|
|
|
|
$this->assertEquals(
|
|
|
|
$expected,
|
|
|
|
$actual,
|
2019-08-26 13:01:09 +00:00
|
|
|
'The error messages obtained by performing the action do not match.'
|
2018-08-23 18:53:55 +00:00
|
|
|
);
|
2022-07-15 14:02:56 +00:00
|
|
|
|
|
|
|
$this->assertAbuseLog( $actionParams, $consequences );
|
2018-08-23 18:53:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Data provider for testStashedEdit
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function provideStashedEdits() {
|
|
|
|
$sets = [
|
|
|
|
[
|
|
|
|
[ 1, 2 ],
|
|
|
|
[
|
|
|
|
'target' => 'Test page',
|
|
|
|
'oldText' => 'Some old text for the test.',
|
|
|
|
'newText' => 'I like foo',
|
|
|
|
'summary' => 'Test AbuseFilter for edit action.'
|
|
|
|
],
|
|
|
|
[ 'warn' => [ 1 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 5 ],
|
|
|
|
[
|
|
|
|
'target' => 'User:FilteredUser',
|
|
|
|
'oldText' => 'Hey.',
|
|
|
|
'newText' => 'I am a very nice user, really!',
|
|
|
|
'summary' => ''
|
|
|
|
],
|
|
|
|
[ 'tag' => [ 5 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 6 ],
|
|
|
|
[
|
|
|
|
'target' => 'Help:Help',
|
|
|
|
'oldText' => 'Some help.',
|
|
|
|
'newText' => 'Some help for you',
|
|
|
|
'summary' => 'Help! I need somebody'
|
|
|
|
],
|
|
|
|
[ 'disallow' => [ 6 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 2, 3, 7, 8 ],
|
|
|
|
[
|
|
|
|
'target' => 'Link',
|
|
|
|
'oldText' => 'What is a link?',
|
|
|
|
'newText' => 'A link is something like this: [[Link|]].',
|
|
|
|
'summary' => 'Explaining'
|
|
|
|
],
|
|
|
|
[ 'degroup' => [ 7 ], 'block' => [ 8 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 8, 9 ],
|
|
|
|
[
|
|
|
|
'target' => 'Whatever',
|
|
|
|
'oldText' => 'Whatever is whatever',
|
|
|
|
'newText' => 'Whatever is whatever, whatever it is. BTW, here is a [[Link|]]',
|
|
|
|
'summary' => 'Whatever'
|
|
|
|
],
|
|
|
|
[ 'disallow' => [ 8 ], 'block' => [ 8 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 10 ],
|
|
|
|
[
|
|
|
|
'target' => 'Buffalo',
|
|
|
|
'oldText' => 'Buffalo',
|
|
|
|
'newText' => 'Buffalo buffalo Buffalo buffalo buffalo buffalo Buffalo buffalo.',
|
|
|
|
'summary' => 'Buffalo!'
|
|
|
|
],
|
|
|
|
[ 'tag' => [ 10 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 1, 3, 7, 12 ],
|
|
|
|
[
|
|
|
|
'target' => 'User:FilteredUser',
|
|
|
|
'oldText' => '',
|
|
|
|
'newText' => 'A couple of lines about me...',
|
|
|
|
'summary' => 'My user page'
|
|
|
|
],
|
|
|
|
[ 'block' => [ 12 ], 'degroup' => [ 7, 12 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 10, 13 ],
|
|
|
|
[
|
|
|
|
'target' => 'Tyger! Tyger! Burning bright',
|
|
|
|
'oldText' => 'In the forests of the night',
|
|
|
|
'newText' => 'What immortal hand or eye',
|
|
|
|
'summary' => 'Could frame thy fearful symmetry?'
|
|
|
|
],
|
|
|
|
[ 'tag' => [ 10 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 14 ],
|
|
|
|
[
|
|
|
|
'target' => '0',
|
|
|
|
'oldText' => 'Old text',
|
|
|
|
'newText' => 'New text',
|
|
|
|
'summary' => 'Some summary'
|
|
|
|
],
|
|
|
|
[]
|
|
|
|
],
|
2018-12-28 16:01:19 +00:00
|
|
|
];
|
2018-08-23 18:53:55 +00:00
|
|
|
|
|
|
|
$finalSets = [];
|
|
|
|
foreach ( $sets as $set ) {
|
2019-06-14 00:08:41 +00:00
|
|
|
// Test both successfully saving a stashed edit and stashing the edit but re-executing filters
|
2018-08-23 18:53:55 +00:00
|
|
|
$finalSets[] = array_merge( [ 'miss' ], $set );
|
|
|
|
$finalSets[] = array_merge( [ 'hit' ], $set );
|
|
|
|
}
|
|
|
|
return $finalSets;
|
2018-12-28 16:01:19 +00:00
|
|
|
}
|
2018-08-24 14:22:58 +00:00
|
|
|
|
2018-08-25 12:44:01 +00:00
|
|
|
/**
|
|
|
|
* Tests for global filters, defined on a central wiki and executed on another (e.g. a filter
|
|
|
|
* defined on meta but triggered on another wiki using meta's global filters).
|
|
|
|
* We emulate an external database by using different tables prefixed with
|
|
|
|
* self::DB_EXTERNAL_PREFIX
|
|
|
|
*
|
|
|
|
* @param int[] $createIds IDs of the filters to create
|
|
|
|
* @param array $actionParams Details of the action we need to execute to trigger filters
|
|
|
|
* @param array $consequences The consequences we're expecting
|
|
|
|
* @dataProvider provideGlobalFilters
|
2022-07-15 14:02:56 +00:00
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\AbuseLogger
|
2018-08-25 12:44:01 +00:00
|
|
|
*/
|
|
|
|
public function testGlobalFilters( $createIds, $actionParams, $consequences ) {
|
2022-07-08 22:20:36 +00:00
|
|
|
// cannot access temporary tables of other sessions
|
|
|
|
$this->markTestSkippedIfDbType( 'postgres' );
|
2022-07-14 14:53:09 +00:00
|
|
|
// Read from wrong table: unittest_external_abuse_filter
|
|
|
|
$this->markTestSkippedIfDbType( 'sqlite' );
|
2020-05-17 15:38:20 +00:00
|
|
|
|
|
|
|
$this->setMwGlobals( [
|
|
|
|
'wgAbuseFilterCentralDB' => $this->db->getDBname() . '-' . $this->dbPrefix() .
|
|
|
|
self::DB_EXTERNAL_PREFIX,
|
|
|
|
'wgAbuseFilterIsCentral' => false,
|
|
|
|
] );
|
2019-08-26 13:01:09 +00:00
|
|
|
$this->createFilters( $createIds, true );
|
2018-08-25 12:44:01 +00:00
|
|
|
|
|
|
|
$result = $this->doAction( $actionParams );
|
|
|
|
|
|
|
|
list( $expected, $actual ) = $this->checkConsequences( $result, $actionParams, $consequences );
|
|
|
|
|
|
|
|
// First check that the filter work as expected
|
|
|
|
$this->assertEquals(
|
|
|
|
$expected,
|
|
|
|
$actual,
|
2019-08-26 13:01:09 +00:00
|
|
|
'The error messages obtained by performing the action do not match.'
|
2018-08-25 12:44:01 +00:00
|
|
|
);
|
|
|
|
|
|
|
|
// Check that the hits were logged on the "external" DB
|
2019-02-06 16:07:01 +00:00
|
|
|
$loggedFilters = $this->db->selectFieldValues(
|
2018-08-25 12:44:01 +00:00
|
|
|
self::DB_EXTERNAL_PREFIX . 'abuse_filter_log',
|
2019-02-06 16:07:01 +00:00
|
|
|
'afl_filter_id',
|
2018-08-25 12:44:01 +00:00
|
|
|
[ 'afl_wiki IS NOT NULL' ],
|
|
|
|
__METHOD__
|
|
|
|
);
|
2019-02-06 16:07:01 +00:00
|
|
|
|
|
|
|
// Use assertEquals because selectFieldValues returns an array of strings
|
2018-08-25 12:44:01 +00:00
|
|
|
$this->assertEquals(
|
|
|
|
$createIds,
|
2018-09-11 16:57:49 +00:00
|
|
|
$loggedFilters,
|
2018-08-25 12:44:01 +00:00
|
|
|
'Some filter hits were not logged in the external DB.'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Data provider for testGlobalFilters
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function provideGlobalFilters() {
|
|
|
|
return [
|
|
|
|
[
|
|
|
|
[ 18 ],
|
|
|
|
[
|
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'Global',
|
|
|
|
'oldText' => 'Old text',
|
|
|
|
'newText' => 'New text',
|
|
|
|
'summary' => ''
|
|
|
|
],
|
2022-03-05 17:00:09 +00:00
|
|
|
[ 'warn' => [ 18 ] ]
|
2018-08-25 12:44:01 +00:00
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 19 ],
|
|
|
|
[
|
|
|
|
'action' => 'edit',
|
|
|
|
'target' => 'A global page',
|
|
|
|
'oldText' => 'Foo',
|
|
|
|
'newText' => 'Bar',
|
|
|
|
'summary' => 'Baz'
|
|
|
|
],
|
|
|
|
[ 'tag' => [ 19 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 18 ],
|
|
|
|
[
|
|
|
|
'action' => 'move',
|
|
|
|
'target' => 'Cellar door',
|
|
|
|
'newTitle' => 'Attic door'
|
|
|
|
],
|
|
|
|
[ 'warn' => [ 18 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 19, 20 ],
|
|
|
|
[
|
|
|
|
'action' => 'delete',
|
|
|
|
'target' => 'Cellar door',
|
|
|
|
],
|
|
|
|
[ 'disallow' => [ 20 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 19 ],
|
|
|
|
[
|
|
|
|
'action' => 'stashedit',
|
|
|
|
'target' => 'Cellar door',
|
|
|
|
'oldText' => '',
|
|
|
|
'newText' => 'Too many doors',
|
|
|
|
'summary' => '',
|
|
|
|
'stashType' => 'hit'
|
|
|
|
],
|
|
|
|
[ 'tag' => [ 19 ] ]
|
|
|
|
],
|
|
|
|
[
|
|
|
|
[ 18 ],
|
|
|
|
[
|
|
|
|
'action' => 'createaccount',
|
2019-08-26 13:01:09 +00:00
|
|
|
'target' => 'User:AbuseFilterGlobalUser',
|
|
|
|
'username' => 'AbuseFilterGlobalUser'
|
2018-08-25 12:44:01 +00:00
|
|
|
],
|
|
|
|
[ 'warn' => [ 18 ] ]
|
|
|
|
]
|
|
|
|
];
|
|
|
|
}
|
2021-07-04 06:25:06 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Make sure that after an edit is saved, if a filter was hit the afl_rev_id is updated
|
|
|
|
* to reflect the new edit
|
|
|
|
*
|
|
|
|
* Regression tests for T286140
|
|
|
|
*/
|
|
|
|
public function testRevIdSet() {
|
|
|
|
// Filter 24 has no actions and always matches
|
|
|
|
$this->createFilters( [ 24 ] );
|
|
|
|
|
2022-06-28 20:46:45 +00:00
|
|
|
$targetTitle = Title::makeTitle( NS_MAIN, 'TestRevIdSet' );
|
2021-07-04 06:25:06 +00:00
|
|
|
$startingRevId = $targetTitle->getLatestRevID( Title::READ_LATEST );
|
|
|
|
|
|
|
|
$this->doEdit( $targetTitle, 'Old text', 'New text', 'Summary' );
|
|
|
|
$latestRevId = $targetTitle->getLatestRevID( Title::READ_LATEST );
|
|
|
|
|
|
|
|
$this->assertNotSame(
|
|
|
|
$startingRevId,
|
|
|
|
$latestRevId,
|
|
|
|
'Edit should have been properly saved'
|
|
|
|
);
|
|
|
|
|
|
|
|
// Check the database for the filter hit
|
|
|
|
// We don't have an easy way to retrieve the afl_id for this relevant hit,
|
|
|
|
// so instead find the latest row for this filter
|
|
|
|
$filterHit = $this->db->selectRow(
|
|
|
|
'abuse_filter_log',
|
|
|
|
'*',
|
|
|
|
[ 'afl_filter_id' => 24 ],
|
|
|
|
__METHOD__,
|
|
|
|
[ 'ORDER BY' => 'afl_id DESC' ]
|
|
|
|
);
|
|
|
|
|
|
|
|
// Helpful for debugging
|
|
|
|
$filterHitStr = FormatJson::encode( $filterHit );
|
|
|
|
$this->assertSame(
|
|
|
|
$latestRevId,
|
|
|
|
(int)( $filterHit->afl_rev_id ),
|
|
|
|
"AbuseLog entry updated with the revision id (full filter hit: $filterHitStr)"
|
|
|
|
);
|
|
|
|
}
|
2022-07-15 08:44:16 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Test a null edit.
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\VariableGenerator\RunVariableGenerator
|
|
|
|
*/
|
|
|
|
public function testNullEdit() {
|
|
|
|
$this->setService(
|
|
|
|
FilterRunnerFactory::SERVICE_NAME,
|
|
|
|
$this->createNoOpMock( FilterRunnerFactory::class )
|
|
|
|
);
|
|
|
|
// Filter 24 has no actions and always matches
|
|
|
|
$this->createFilters( [ 24 ] );
|
|
|
|
|
|
|
|
$targetTitle = Title::makeTitle( NS_MAIN, 'TestNullEdit' );
|
|
|
|
$text = 'Some text';
|
|
|
|
$status = $this->doEdit( $targetTitle, $text, $text, 'Summary' );
|
|
|
|
$this->assertStatusGood( $status );
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test a content model change.
|
|
|
|
* @covers \MediaWiki\Extension\AbuseFilter\VariableGenerator\RunVariableGenerator
|
|
|
|
*/
|
|
|
|
public function testContentModelChange() {
|
|
|
|
// Filter 23 always matches and disables
|
|
|
|
$this->createFilters( [ 23 ] );
|
|
|
|
|
|
|
|
$targetTitle = Title::makeTitle( NS_MAIN, 'TestContentModelChange' );
|
|
|
|
|
|
|
|
$text = FormatJson::encode( [ 'key' => 'value' ] );
|
|
|
|
$oldContent = new JsonContent( $text );
|
|
|
|
$newContent = new WikitextContent( $text );
|
|
|
|
|
|
|
|
$status = $this->doEdit( $targetTitle, $oldContent, $newContent, 'Summary' );
|
|
|
|
$this->assertStatusNotOK( $status );
|
|
|
|
}
|
2018-07-08 16:06:19 +00:00
|
|
|
}
|