load();
$vars['USER_EDITCOUNT'] = $user->getEditCount();
$vars['USER_AGE'] = time() - wfTimestampOrNull( TS_UNIX, $user->getRegistration() );
$vars['USER_NAME'] = $user->getName();
$vars['USER_GROUPS'] = implode(',', $user->getEffectiveGroups() );
$vars['USER_EMAILCONFIRM'] = $user->getEmailAuthenticationTimestamp();
// More to come
return $vars;
}
public static function ajaxCheckSyntax( $filter ) {
$result = self::checkSyntax( $filter );
$ok = ($result === true);
if ($ok) {
return "OK";
} else {
return "ERR: $result";
}
}
public static function disableConditionLimit() {
// For use in batch scripts and the like
self::$condLimitEnabled = false;
}
public static function generateTitleVars( $title, $prefix ) {
$vars = array();
$vars[$prefix."_ARTICLEID"] = $title->getArticleId();
$vars[$prefix."_NAMESPACE"] = $title->getNamespace();
$vars[$prefix."_TEXT"] = $title->getText();
$vars[$prefix."_PREFIXEDTEXT"] = $title->getPrefixedText();
if ($title->mRestrictionsLoaded) {
// Don't bother if they're unloaded
foreach( $title->mRestrictions as $action => $rights ) {
$rights = count($rights) ? $rights : array();
$vars[$prefix."_RESTRICTIONS_".$action] = implode(',', $rights );
}
}
// Find last 5 authors
$dbr = wfGetDB( DB_SLAVE );
$res = $dbr->select( 'revision', 'distinct rev_user_text', array('rev_page' => $title->getArticleId() ), __METHOD__, array( 'order by' => 'rev_timestamp desc', 'limit' => 10 ) );
$users = array();
while ($user = $dbr->fetchRow($res)) {
$users[] = $user[0];
}
$vars[$prefix."_RECENT_CONTRIBUTORS"] = implode(',', $users);
return $vars;
}
public static function checkSyntax( $filter ) {
global $wgAbuseFilterParserClass;
$parser = new $wgAbuseFilterParserClass;
return $parser->checkSyntax( $filter );
}
public static function evaluateExpression( $expr, $vars = array() ) {
global $wgAbuseFilterParserClass;
$parser = new $wgAbuseFilterParserClass;
$parser->setVars( $vars );
return $parser->evaluateExpression( $expr );
}
public static function ajaxEvaluateExpression( $expr ) {
return self::evaluateExpression( $expr );
}
public static function checkConditions( $conds, $vars ) {
global $wgAbuseFilterParserClass;
wfProfileIn( __METHOD__ );
try {
$parser = new $wgAbuseFilterParserClass;
$parser->setVars( $vars );
$result = $parser->parse( $conds, self::$condCount );
} catch (Exception $excep) {
// Sigh.
$result = false;
}
wfProfileOut( __METHOD__ );
return $result;
}
public static function filterAction( $vars, $title ) {
global $wgUser,$wgMemc;
// Fetch from the database.
$dbr = wfGetDB( DB_SLAVE );
$res = $dbr->select( 'abuse_filter', '*', array( 'af_enabled' => 1 ) );
$blocking_filters = array();
$log_entries = array();
$log_template = array( 'afl_user' => $wgUser->getId(), 'afl_user_text' => $wgUser->getName(),
'afl_var_dump' => serialize( $vars ), 'afl_timestamp' => $dbr->timestamp(wfTimestampNow()),
'afl_namespace' => $title->getNamespace(), 'afl_title' => $title->getDbKey(), 'afl_ip' => wfGetIp() );
$doneActionsByFilter = array();
$filter_matched = array();
while ( $row = $dbr->fetchObject( $res ) ) {
if ( self::checkConditions( $row->af_pattern, $vars ) ) {
$blocking_filters[$row->af_id] = $row;
$newLog = $log_template;
$newLog['afl_filter'] = $row->af_id;
$newLog['afl_action'] = $vars['ACTION'];
$log_entries[] = $newLog;
$doneActionsByFilter[$row->af_id] = array();
$filter_matched[$row->af_id] = true;
} else {
$filter_matched[$row->af_id] = false;
}
}
//// Clean up from checking all the filters
// Don't store stats if the cond limit is disabled.
// It's probably a batch process or similar.
if (!self::$condLimitEnabled)
self::recordStats( $filter_matched );
if (count($blocking_filters) == 0 ) {
// No problems.
return true;
}
// Retrieve the consequences.
$res = $dbr->select( 'abuse_filter_action', '*', array( 'afa_filter' => array_keys( $blocking_filters ) ), __METHOD__, array( "ORDER BY" => " (afa_consequence in ('throttle','warn'))-(afa_consequence in ('disallow')) desc" ) );
// We want throttles, warnings first, as they have a bit of a special treatment. We want disallow last.
$actions_done = array();
$throttled_filters = array();
$display = '';
while ( $row = $dbr->fetchObject( $res ) ) {
// Don't do the same action-parameters twice
$action_key = md5( $row->afa_consequence . $row->afa_parameters );
// Skip if we've already done this action-parameter, or a passive action has sufficed.
$skipAction = ( in_array( $action_key, $actions_done ) || in_array( $row->afa_filter, $throttled_filters ) );
// Don't disallow if we've already done something active. It produces two messages, where one would suffice.
if ($row->afa_consequence == 'disallow' && !$skipAction) {
$doneActiveActions = array_diff( $doneActionsByFilter[$row->afa_filter], array( 'throttle', 'warn' /* passive actions */ ) );
$skipAction = (bool)count($doneActiveActions);
}
if ( !$skipAction ) {
// Unpack parameters
$parameters = explode( "\n", $row->afa_parameters );
// Take the action.
$result = self::takeConsequenceAction( $row->afa_consequence, $parameters, $title, $vars, $display, $continue, $blocking_filters[$row->afa_filter]->af_public_comments );
// Don't do it twice.
$doneActionsByFilter[$row->afa_filter][] = $row->afa_consequence;
$actions_done[] = $action_key;
// Only execute other actions for a filter if that filter's rate limiter has been tripped.
if (!$result) {
$throttled_filters[] = $row->afa_filter;
}
} else {
// Ignore it, until we hit the rate limit.
}
}
$dbw = wfGetDB( DB_MASTER );
// Log it
foreach( $log_entries as $index => $entry ) {
$log_entries[$index]['afl_actions'] = implode( ',', $doneActionsByFilter[$entry['afl_filter']] );
// Increment the hit counter
$dbw->update( 'abuse_filter', array( 'af_hit_count=af_hit_count+1' ), array( 'af_id' => $entry['afl_filter'] ), __METHOD__ );
}
$dbw->insert( 'abuse_filter_log', $log_entries, __METHOD__ );
return $display;
}
public static function takeConsequenceAction( $action, $parameters, $title, $vars, &$display, &$continue, $rule_desc ) {
switch ($action) {
case 'warn':
wfLoadExtensionMessages( 'AbuseFilter' );
if (!$_SESSION['abusefilter-warned']) {
$_SESSION['abusefilter-warned'] = true;
// Threaten them a little bit
if (strlen($parameters[0])) {
$display .= call_user_func_array( 'wfMsgNoTrans', $parameters ) . "\n";
} else {
// Generic message.
$display .= wfMsgNoTrans( 'abusefilter-warning', $rule_desc ) ."
\n";
}
return false; // Don't apply the other stuff yet.
} else {
// We already warned them
$_SESSION['abusefilter-warned'] = false;
}
break;
case 'disallow':
wfLoadExtensionMessages( 'AbuseFilter' );
// Don't let them do it
if (strlen($parameters[0])) {
$display .= call_user_func_array( 'wfMsgNoTrans', $parameters ) . "\n";
} else {
// Generic message.
$display .= wfMsgNoTrans( 'abusefilter-disallowed', $rule_desc ) ."
\n";
}
break;
case 'block':
wfLoadExtensionMessages( 'AbuseFilter' );
global $wgUser;
$filterUser = AbuseFilter::getFilterUser();
// Create a block.
$block = new Block;
$block->mAddress = $wgUser->getName();
$block->mUser = $wgUser->getId();
$block->mBy = User::idFromName( wfMsgForContent( 'abusefilter-blocker' ) ); // Let's say the site owner blocked them
$block->mByName = wfMsgForContent( 'abusefilter-blocker' );
$block->mReason = wfMsgForContent( 'abusefilter-blockreason', $rule_desc );
$block->mTimestamp = wfTimestampNow();
$block->mEnableAutoblock = 1;
$block->mAngryAutoblock = 1; // Block lots of IPs
$block->mCreateAccount = 1;
$block->mExpiry = 'infinity';
$block->insert();
// Log it
# Prepare log parameters
$logParams = array();
$logParams[] = 'indefinite';
$logParams[] = 'nocreate, angry-autoblock';
$log = new LogPage( 'block' );
$log->addEntry( 'block', Title::makeTitle( NS_USER, $wgUser->getName() ),
wfMsgForContent( 'abusefilter-blockreason', $rule_desc ), $logParams, self::getFilterUser() );
$display .= wfMsgNoTrans( 'abusefilter-blocked-display', $rule_desc ) ."
\n";
break;
case 'throttle':
$throttleId = array_shift( $parameters );
list( $rateCount, $ratePeriod ) = explode( ',', array_shift( $parameters ) );
$hitThrottle = false;
// The rest are throttle-types.
foreach( $parameters as $throttleType ) {
$hitThrottle = $hitThrottle || self::isThrottled( $throttleId, $throttleType, $title, $rateCount, $ratePeriod );
}
return $hitThrottle;
break;
case 'degroup':
wfLoadExtensionMessages( 'AbuseFilter' );
global $wgUser;
if (!$wgUser->isAnon()) {
// Remove all groups from the user. Ouch.
$groups = $wgUser->getGroups();
foreach( $groups as $group ) {
$wgUser->removeGroup( $group );
}
$display .= wfMsgNoTrans( 'abusefilter-degrouped', $rule_desc ) ."
\n";
// Log it.
$log = new LogPage( 'rights' );
$log->addEntry( 'rights',
$wgUser->getUserPage(),
wfMsgForContent( 'abusefilter-degroupreason', $rule_desc ),
array(
implode( ', ', $groups ),
wfMsgForContent( 'rightsnone' )
)
, self::getFilterUser() );
}
break;
case 'blockautopromote':
global $wgUser, $wgMemc;
if (!$wgUser->isAnon()) {
wfLoadExtensionMessages( 'AbuseFilter' );
$blockPeriod = (int)mt_rand( 3*86400, 7*86400 ); // Block for 3-7 days.
$wgMemc->set( self::autoPromoteBlockKey( $wgUser ), true, $blockPeriod );
$display .= wfMsgNoTrans( 'abusefilter-autopromote-blocked', $rule_desc ) ."
\n";
}
break;
case 'flag':
// Do nothing. Here for completeness.
break;
}
return true;
}
public static function isThrottled( $throttleId, $types, $title, $rateCount, $ratePeriod ) {
global $wgMemc;
$key = self::throttleKey( $throttleId, $types, $title );
$count = $wgMemc->get( $key );
if ($count > 0) {
$wgMemc->incr( $key );
if ($count > $rateCount) {
//die( "Hit rate limiter: $count actions, against limit of $rateCount actions in $ratePeriod seconds (key is $key).\n" );
$wgMemc->delete( $key );
return true; // THROTTLED
}
} else {
$wgMemc->add( $key, 1, $ratePeriod );
}
return false; // NOT THROTTLED
}
public static function throttleIdentifier( $type, $title ) {
global $wgUser;
switch ($type) {
case 'ip':
$identifier = wfGetIp();
break;
case 'user':
$identifier = $wgUser->getId();
break;
case 'range':
$identifier = substr(IP::toHex(wfGetIp()),0,4);
break;
case 'creationdate':
$reg = $wgUser->getRegistration();
$identifier = $reg - ($reg % 86400);
break;
case 'editcount':
// Hack for detecting different single-purpose accounts.
$identifier = $wgUser->getEditCount();
break;
case 'site':
return 1;
break;
case 'page':
return $title->getPrefixedText();
break;
}
return $identifier;
}
public static function throttleKey( $throttleId, $type, $title ) {
$identifier = '';
$types = explode(',', $type);
$identifiers = array();
foreach( $types as $subtype ) {
$identifiers[] = self::throttleIdentifier( $subtype, $title );
}
$identifier = implode( ':', $identifiers );
return wfMemcKey( 'abusefilter', 'throttle', $throttleId, $type, $identifier );
}
public static function autoPromoteBlockKey( $user ) {
return wfMemcKey( 'abusefilter', 'block-autopromote', $user->getId() );
}
public static function recordStats( $filters ) {
global $wgAbuseFilterConditionLimit,$wgMemc;
$overflow_triggered = (self::$condCount > $wgAbuseFilterConditionLimit);
$filter_triggered = count($blocking_filters);
$overflow_key = self::filterLimitReachedKey();
$total_key = self::filterUsedKey();
$total = $wgMemc->get( $total_key );
$storage_period = self::$statsStoragePeriod; // One day.
if (!$total || $total > 1000) {
$wgMemc->set( $total_key, 1, $storage_period );
if ($overflow_triggered) {
$wgMemc->set( $overflow_key, 1, $storage_period );
} else {
$wgMemc->set( $overflow_key, 0, $storage_period );
}
$anyMatch = false;
foreach( $filters as $filter => $matched ) {
$filter_key = self::filterMatchesKey( $filter );
if ($matched) {
$anyMatch = true;
$wgMemc->set( $filter_key, 1, $storage_period );
} else {
$wgMemc->set( $filter_key, 0, $storage_period );
}
}
if ($anyMatch) {
$wgMemc->set( self::filterMatchesKey(), 1, $storage_period );
} else {
$wgMemc->set( self::filterMatchesKey(), 0, $storage_period );
}
return;
}
$wgMemc->incr( $total_key );
if ($overflow_triggered) {
$wgMemc->incr( $overflow_key );
}
$anyMatch = false;
global $wgAbuseFilterEmergencyDisableThreshold, $wgAbuseFilterEmergencyDisableCount;
foreach( $filters as $filter => $matched ) {
if ($matched) {
$anyMatch = true;
$match_count = $wgMemc->get( self::filterMatchesKey( $filter ) );
if ($match_count > 0) {
$wgMemc->incr( self::filterMatchesKey( $filter ) );
} else {
$wgMemc->set( self::filterMatchesKey( $filter ), 1, self::$statsStoragePeriod );
}
if ($match_count > $wgAbuseFilterEmergencyDisableCount && ($match_count / $total) > $wgAbuseFilterEmergencyDisableThreshold) {
// More than X matches, constituting more than Y% of last Z edits. Disable it.
$dbw = wfGetDB( DB_MASTER );
$dbw->update( 'abuse_filter', array( 'af_enabled' => 0, 'af_throttled' => 1 ), array( 'af_id' => $filter ), __METHOD__ );
}
}
}
if ($anyMatch) {
$wgMemc->incr( self::filterMatchesKey() );
}
}
public static function filterLimitReachedKey() {
return wfMemcKey( 'abusefilter', 'stats', 'overflow' );
}
public static function filterUsedKey() {
return wfMemcKey( 'abusefilter', 'stats', 'total' );
}
public static function filterMatchesKey( $filter = null ) {
return wfMemcKey( 'abusefilter', 'stats', 'matches', $filter );
}
public static function getFilterUser() {
wfLoadExtensionMessages( 'AbuseFilter' );
$user = User::newFromName( wfMsgForContent( 'abusefilter-blocker' ) );
$user->load();
if ($user->getId() && $user->mPassword == '') {
// Already set up.
return $user;
}
// Not set up. Create it.
if (!$user->getId()) {
$user->addToDatabase();
$user->saveSettings();
} else {
// Take over the account
$user->setPassword( null );
$user->setEmail( null );
$user->saveSettings();
}
# Promote user so it doesn't look too crazy.
$user->addGroup( 'sysop' );
# Increment site_stats.ss_users
$ssu = new SiteStatsUpdate( 0, 0, 0, 0, 1 );
$ssu->doUpdate();
return $user;
}
}