$value ) { $this->$name = $value; } } /** * Check if the given local page title is a spam regex source. * @param Title $title * @return bool */ function isLocalSource( $title ) { global $wgDBname; if( $title->getNamespace() == NS_MEDIAWIKI ) { $sources = array( "Spam-blacklist", "Spam-whitelist" ); if( in_array( $title->getDBkey(), $sources ) ) { return true; } } $thisHttp = $title->getFullUrl( 'action=raw' ); $thisHttpRegex = '/^' . preg_quote( $thisHttp, '/' ) . '(?:&.*)?$/'; foreach( $this->files as $fileName ) { if ( preg_match( '/^DB: (\w*) (.*)$/', $fileName, $matches ) ) { if ( $wgDBname == $matches[1] ) { $sources[] = $matches[2]; if( $matches[2] == $title->getPrefixedDbKey() ) { // Local DB fetch of this page... return true; } } } elseif( preg_match( $thisHttpRegex, $fileName ) ) { // Raw view of this page return true; } } return false; } /** * @deprecated back-compat */ function getRegexes() { return $this->getBlacklists(); } /** * Fetch local and (possibly cached) remote blacklists. * Will be cached locally across multiple invocations. * @return array set of regular expressions, potentially empty. */ function getBlacklists() { if( $this->regexes === false ) { $this->regexes = array_merge( $this->getLocalBlacklists(), $this->getSharedBlacklists() ); } return $this->regexes; } /** * Fetch (possibly cached) remote blacklists. * @return array */ function getSharedBlacklists() { global $wgMemc, $wgDBname; $fname = 'SpamBlacklist::getRegex'; wfProfileIn( $fname ); wfDebugLog( 'SpamBlacklist', "Loading spam regex..." ); if ( count( $this->files ) == 0 ){ # No lists wfDebugLog( 'SpamBlacklist', "no files specified\n" ); wfProfileOut( $fname ); return array(); } // This used to be cached per-site, but that could be bad on a shared // server where not all wikis have the same configuration. $cachedRegexes = $wgMemc->get( "$wgDBname:spam_blacklist_regexes" ); if( is_array( $cachedRegexes ) ) { wfDebugLog( 'SpamBlacklist', "Got shared spam regexes from cache\n" ); wfProfileOut( $fname ); return $cachedRegexes; } $regexes = $this->buildSharedBlacklists(); $wgMemc->set( "$wgDBname:spam_blacklist_regexes", $regexes, $this->expiryTime ); return $regexes; } function clearCache() { global $wgMemc, $wgDBname; $wgMemc->delete( "$wgDBname:spam_blacklist_regexes" ); wfDebugLog( 'SpamBlacklist', "Spam blacklist local cache cleared.\n" ); } function buildSharedBlacklists() { $regexes = array(); # Load lists wfDebugLog( 'SpamBlacklist', "Constructing spam blacklist\n" ); foreach ( $this->files as $fileName ) { if ( preg_match( '/^DB: ([\w-]*) (.*)$/', $fileName, $matches ) ) { $text = $this->getArticleText( $matches[1], $matches[2] ); } elseif ( preg_match( '/^http:\/\//', $fileName ) ) { $text = $this->getHttpText( $fileName ); } else { $text = file_get_contents( $fileName ); wfDebugLog( 'SpamBlacklist', "got from file $fileName\n" ); } // Build a separate batch of regexes from each source. // While in theory we could squeeze a little efficiency // out of combining multiple sources in one regex, if // there's a bad line in one of them we'll gain more // from only having to break that set into smaller pieces. $regexes = array_merge( $regexes, SpamRegexBatch::regexesFromText( $text, $fileName ) ); } return $regexes; } function getHttpText( $fileName ) { global $wgDBname, $messageMemc; # HTTP request # To keep requests to a minimum, we save results into $messageMemc, which is # similar to $wgMemc except almost certain to exist. By default, it is stored # in the database # # There are two keys, when the warning key expires, a random thread will refresh # the real key. This reduces the chance of multiple requests under high traffic # conditions. $key = "spam_blacklist_file:$fileName"; $warningKey = "$wgDBname:spamfilewarning:$fileName"; $httpText = $messageMemc->get( $key ); $warning = $messageMemc->get( $warningKey ); if ( !is_string( $httpText ) || ( !$warning && !mt_rand( 0, $this->warningChance ) ) ) { wfDebugLog( 'SpamBlacklist', "Loading spam blacklist from $fileName\n" ); $httpText = $this->getHTTP( $fileName ); if( $httpText === false ) { wfDebugLog( 'SpamBlacklist', "Error loading blacklist from $fileName\n" ); } $messageMemc->set( $warningKey, 1, $this->warningTime ); $messageMemc->set( $key, $httpText, $this->expiryTime ); } else { wfDebugLog( 'SpamBlacklist', "Got spam blacklist from HTTP cache for $fileName\n" ); } return $httpText; } function getLocalBlacklists() { return SpamRegexBatch::regexesFromMessage( 'spam-blacklist' ); } function getWhitelists() { return SpamRegexBatch::regexesFromMessage( 'spam-whitelist' ); } /** * @param Title $title * @param string $text Text of section, or entire text if $editPage!=false * @param string $section Section number or name * @param EditPage $editPage EditPage if EditFilterMerged was called, false otherwise * @return True if the edit should not be allowed, false otherwise * If the return value is true, an error will have been sent to $wgOut */ function filter( &$title, $text, $section, $editPage = false ) { global $wgArticle, $wgVersion, $wgOut, $wgParser, $wgUser; $fname = 'wfSpamBlacklistFilter'; wfProfileIn( $fname ); # Call the rest of the hook chain first if ( $this->previousFilter ) { $f = $this->previousFilter; if ( $f( $title, $text, $section ) ) { wfProfileOut( $fname ); return true; } } $this->title = $title; $this->text = $text; $this->section = $section; $text = str_replace( '.', '.', $text ); //@bug 12896 $blacklists = $this->getBlacklists(); $whitelists = $this->getWhitelists(); if ( count( $blacklists ) ) { # Run parser to strip SGML comments and such out of the markup # This was being used to circumvent the filter (see bug 5185) if ( $editPage ) { $editInfo = $editPage->mArticle->prepareTextForEdit( $text ); $out = $editInfo->output; } else { $options = new ParserOptions(); $text = $wgParser->preSaveTransform( $text, $title, $wgUser, $options ); $out = $wgParser->parse( $text, $title, $options ); } $links = implode( "\n", array_keys( $out->getExternalLinks() ) ); # Strip whitelisted URLs from the match if( is_array( $whitelists ) ) { wfDebugLog( 'SpamBlacklist', "Excluding whitelisted URLs from " . count( $whitelists ) . " regexes: " . implode( ', ', $whitelists ) . "\n" ); foreach( $whitelists as $regex ) { wfSuppressWarnings(); $newLinks = preg_replace( $regex, '', $links ); wfRestoreWarnings(); if( is_string( $newLinks ) ) { // If there wasn't a regex error, strip the matching URLs $links = $newLinks; } } } # Do the match wfDebugLog( 'SpamBlacklist', "Checking text against " . count( $blacklists ) . " regexes: " . implode( ', ', $blacklists ) . "\n" ); $retVal = false; foreach( $blacklists as $regex ) { wfSuppressWarnings(); $check = preg_match( $regex, $links, $matches ); wfRestoreWarnings(); if( $check ) { wfDebugLog( 'SpamBlacklist', "Match!\n" ); if ( $editPage ) { $editPage->spamPage( $matches[0] ); } else { EditPage::spamPage( $matches[0] ); } $retVal = true; break; } } } else { $retVal = false; } wfProfileOut( $fname ); return $retVal; } /** * Fetch an article from this or another local MediaWiki database. * This is probably *very* fragile, and shouldn't be used perhaps. * @param string $db * @param string $article */ function getArticleText( $db, $article ) { wfDebugLog( 'SpamBlacklist', "Fetching local spam blacklist from '$article' on '$db'...\n" ); global $wgDBname; $dbr = wfGetDB( DB_READ ); $dbr->selectDB( $db ); $text = false; if ( $dbr->tableExists( 'page' ) ) { // 1.5 schema $dbw =& wfGetDB( DB_READ ); $dbw->selectDB( $db ); $revision = Revision::newFromTitle( Title::newFromText( $article ) ); if ( $revision ) { $text = $revision->getText(); } $dbw->selectDB( $wgDBname ); } else { // 1.4 schema $title = Title::newFromText( $article ); $text = $dbr->selectField( 'cur', 'cur_text', array( 'cur_namespace' => $title->getNamespace(), 'cur_title' => $title->getDBkey() ), 'SpamBlacklist::getArticleText' ); } $dbr->selectDB( $wgDBname ); return strval( $text ); } function getHTTP( $url ) { // Use wfGetHTTP from MW 1.5 if it is available global $IP; include_once( "$IP/includes/HttpFunctions.php" ); wfSuppressWarnings(); if ( function_exists( 'wfGetHTTP' ) ) { $text = wfGetHTTP( $url ); } else { $url_fopen = ini_set( 'allow_url_fopen', 1 ); $text = file_get_contents( $url ); ini_set( 'allow_url_fopen', $url_fopen ); } wfRestoreWarnings(); return $text; } /** * Confirm that a local blacklist page being saved is valid, * and toss back a warning to the user if it isn't. * This is an EditFilter hook. */ function validate( $editPage, $text, $section, &$hookError ) { $thisPageName = $editPage->mTitle->getPrefixedDBkey(); if( !$this->isLocalSource( $editPage->mTitle ) ) { wfDebugLog( 'SpamBlacklist', "Spam blacklist validator: [[$thisPageName]] not a local blacklist\n" ); return true; } $lines = explode( "\n", $text ); $badLines = SpamRegexBatch::getBadLines( $lines ); if( $badLines ) { wfDebugLog( 'SpamBlacklist', "Spam blacklist validator: [[$thisPageName]] given invalid input lines: " . implode( ', ', $badLines ) . "\n" ); $badList = "*" . implode( "\n*", array_map( 'wfEscapeWikiText', $badLines ) ) . "\n"; $hookError = "
" . wfMsgExt( 'spam-invalid-lines', array( 'parsemag' ), count( $badLines ) ) . $badList . "
\n" . "
\n"; return true; } else { wfDebugLog( 'SpamBlacklist', "Spam blacklist validator: [[$thisPageName]] ok or empty blacklist\n" ); return true; } } function onArticleSave( &$article, &$user, $text, $summary, $isminor, $iswatch, $section ) { if( $this->isLocalSource( $article->getTitle() ) ) { $this->clearCache(); } return true; } } class SpamRegexBatch { /** * Build a set of regular expressions matching URLs with the list of regex fragments. * Returns an empty list if the input list is empty. * * @param array $lines list of fragments which will match in URLs * @param int $batchSize largest allowed batch regex; * if 0, will produce one regex per line * @return array * @private * @static */ function buildRegexes( $lines, $batchSize=4096 ) { # Make regex # It's faster using the S modifier even though it will usually only be run once //$regex = 'https?://+[a-z0-9_\-.]*(' . implode( '|', $lines ) . ')'; //return '/' . str_replace( '/', '\/', preg_replace('|\\\*/|', '/', $regex) ) . '/Si'; $regexes = array(); $regexStart = '/https?:\/\/+[a-z0-9_\-.]*('; $regexEnd = ($batchSize > 0 ) ? ')/Si' : ')/i'; $build = false; foreach( $lines as $line ) { // FIXME: not very robust size check, but should work. :) if( $build === false ) { $build = $line; } elseif( strlen( $build ) + strlen( $line ) > $batchSize ) { $regexes[] = $regexStart . str_replace( '/', '\/', preg_replace('|\\\*/|', '/', $build) ) . $regexEnd; $build = $line; } else { $build .= '|'; $build .= $line; } } if( $build !== false ) { $regexes[] = $regexStart . str_replace( '/', '\/', preg_replace('|\\\*/|', '/', $build) ) . $regexEnd; } return $regexes; } /** * Confirm that a set of regexes is either empty or valid. * @param array $lines set of regexes * @return bool true if ok, false if contains invalid lines * @private * @static */ function validateRegexes( $regexes ) { foreach( $regexes as $regex ) { wfSuppressWarnings(); $ok = preg_match( $regex, '' ); wfRestoreWarnings(); if( $ok === false ) { return false; } } return true; } /** * Strip comments and whitespace, then remove blanks * @private * @static */ function stripLines( $lines ) { return array_filter( array_map( 'trim', preg_replace( '/#.*$/', '', $lines ) ) ); } /** * Do a sanity check on the batch regex. * @param lines unsanitized input lines * @param string $fileName optional for debug reporting * @return array of regexes * @private * @static */ function buildSafeRegexes( $lines, $fileName=false ) { $lines = SpamRegexBatch::stripLines( $lines ); $regexes = SpamRegexBatch::buildRegexes( $lines ); if( SpamRegexBatch::validateRegexes( $regexes ) ) { return $regexes; } else { // _Something_ broke... rebuild line-by-line; it'll be // slower if there's a lot of blacklist lines, but one // broken line won't take out hundreds of its brothers. if( $fileName ) { wfDebugLog( 'SpamBlacklist', "Spam blacklist warning: bogus line in $fileName\n" ); } return SpamRegexBatch::buildRegexes( $lines, 0 ); } } /** * @param array $lines * @return array of input lines which produce invalid input, or empty array if no problems * @static */ function getBadLines( $lines ) { $lines = SpamRegexBatch::stripLines( $lines ); $regexes = SpamRegexBatch::buildRegexes( $lines ); if( SpamRegexBatch::validateRegexes( $regexes ) ) { // No problems! return array(); } $badLines = array(); foreach( $lines as $line ) { $regexes = SpamRegexBatch::buildRegexes( array( $line ) ); if( !SpamRegexBatch::validateRegexes( $regexes ) ) { $badLines[] = $line; } } return $badLines; } /** * Build a set of regular expressions from the given multiline input text, * with empty lines and comments stripped. * * @param string $source * @param string $fileName optional, for reporting of bad files * @return array of regular expressions, potentially empty * @static */ function regexesFromText( $source, $fileName=false ) { $lines = explode( "\n", $source ); return SpamRegexBatch::buildSafeRegexes( $lines, $fileName ); } /** * Build a set of regular expressions from a MediaWiki message. * Will be correctly empty if the message isn't present. * @param string $source * @return array of regular expressions, potentially empty * @static */ function regexesFromMessage( $message ) { $source = wfMsgForContent( $message ); if( $source && !wfEmptyMsg( $message, $source ) ) { return SpamRegexBatch::regexesFromText( $source ); } else { return array(); } } }