MediaWiki REL1_32
SpamBlacklist.php
Go to the documentation of this file.
1<?php
2
3if ( !defined( 'MEDIAWIKI' ) ) {
4 exit;
5}
6
7use \MediaWiki\MediaWikiServices;
9
11 const STASH_TTL = 180;
12 const STASH_AGE_DYING = 150;
13
18 private $urlChangeLog = [];
19
25 protected function getBlacklistType() {
26 return 'spam';
27 }
28
37 protected function antiSpoof( $text ) {
38 $text = str_replace( '.', '.', $text );
39 return $text;
40 }
41
55 function filter( array $links, Title $title = null, $preventLog = false, $mode = 'check' ) {
56 $statsd = MediaWikiServices::getInstance()->getStatsdDataFactory();
57 $cache = ObjectCache::getLocalClusterInstance();
58
59 // If there are no new links, and we are logging,
60 // mark all of the current links as being removed.
61 if ( !$links && $this->isLoggingEnabled() ) {
62 $this->logUrlChanges( $this->getCurrentLinks( $title ), [], [] );
63 }
64
65 if ( !$links ) {
66 return false;
67 }
68
69 sort( $links );
70 $key = $cache->makeKey(
71 'blacklist',
72 $this->getBlacklistType(),
73 'pass',
74 sha1( implode( "\n", $links ) ),
75 md5( (string)$title )
76 );
77 // Skip blacklist checks if nothing matched during edit stashing...
78 $knownNonMatchAsOf = $cache->get( $key );
79 if ( $mode === 'check' ) {
80 if ( $knownNonMatchAsOf ) {
81 $statsd->increment( 'spamblacklist.check-stash.hit' );
82
83 return false;
84 } else {
85 $statsd->increment( 'spamblacklist.check-stash.miss' );
86 }
87 } elseif ( $mode === 'stash' ) {
88 if ( $knownNonMatchAsOf && ( time() - $knownNonMatchAsOf ) < self::STASH_AGE_DYING ) {
89 return false; // OK; not about to expire soon
90 }
91 }
92
93 $blacklists = $this->getBlacklists();
94 $whitelists = $this->getWhitelists();
95
96 if ( count( $blacklists ) ) {
97 // poor man's anti-spoof, see bug 12896
98 $newLinks = array_map( [ $this, 'antiSpoof' ], $links );
99
100 $oldLinks = [];
101 if ( $title !== null ) {
102 $oldLinks = $this->getCurrentLinks( $title );
103 $addedLinks = array_diff( $newLinks, $oldLinks );
104 } else {
105 // can't load old links, so treat all links as added.
106 $addedLinks = $newLinks;
107 }
108
109 wfDebugLog( 'SpamBlacklist', "Old URLs: " . implode( ', ', $oldLinks ) );
110 wfDebugLog( 'SpamBlacklist', "New URLs: " . implode( ', ', $newLinks ) );
111 wfDebugLog( 'SpamBlacklist', "Added URLs: " . implode( ', ', $addedLinks ) );
112
113 if ( !$preventLog ) {
114 $this->logUrlChanges( $oldLinks, $newLinks, $addedLinks );
115 }
116
117 $links = implode( "\n", $addedLinks );
118
119 # Strip whitelisted URLs from the match
120 if ( is_array( $whitelists ) ) {
121 wfDebugLog( 'SpamBlacklist', "Excluding whitelisted URLs from " . count( $whitelists ) .
122 " regexes: " . implode( ', ', $whitelists ) . "\n" );
123 foreach ( $whitelists as $regex ) {
125 $newLinks = preg_replace( $regex, '', $links );
127 if ( is_string( $newLinks ) ) {
128 // If there wasn't a regex error, strip the matching URLs
129 $links = $newLinks;
130 }
131 }
132 }
133
134 # Do the match
135 wfDebugLog( 'SpamBlacklist', "Checking text against " . count( $blacklists ) .
136 " regexes: " . implode( ', ', $blacklists ) . "\n" );
137 $retVal = false;
138 foreach ( $blacklists as $regex ) {
140 $matches = [];
141 $check = ( preg_match_all( $regex, $links, $matches ) > 0 );
143 if ( $check ) {
144 wfDebugLog( 'SpamBlacklist', "Match!\n" );
145 global $wgRequest;
146 $ip = $wgRequest->getIP();
147 $fullUrls = [];
148 $fullLineRegex = substr( $regex, 0, strrpos( $regex, '/' ) ) . '.*/Sim';
149 preg_match_all( $fullLineRegex, $links, $fullUrls );
150 $imploded = implode( ' ', $fullUrls[0] );
151 wfDebugLog( 'SpamBlacklistHit', "$ip caught submitting spam: $imploded\n" );
152 if ( !$preventLog ) {
153 $this->logFilterHit( $title, $imploded ); // Log it
154 }
155 if ( $retVal === false ) {
156 $retVal = [];
157 }
158 $retVal = array_merge( $retVal, $fullUrls[1] );
159 }
160 }
161 if ( is_array( $retVal ) ) {
162 $retVal = array_unique( $retVal );
163 }
164 } else {
165 $retVal = false;
166 }
167
168 if ( $retVal === false ) {
169 // Cache the typical negative results
170 $cache->set( $key, time(), self::STASH_TTL );
171 if ( $mode === 'stash' ) {
172 $statsd->increment( 'spamblacklist.check-stash.store' );
173 }
174 }
175
176 return $retVal;
177 }
178
179 public function isLoggingEnabled() {
180 global $wgSpamBlacklistEventLogging;
181 return $wgSpamBlacklistEventLogging && class_exists( 'EventLogging' );
182 }
183
191 public function logUrlChanges( $oldLinks, $newLinks, $addedLinks ) {
192 if ( !$this->isLoggingEnabled() ) {
193 return;
194 }
195
196 $removedLinks = array_diff( $oldLinks, $newLinks );
197 foreach ( $addedLinks as $url ) {
198 $this->logUrlChange( $url, 'insert' );
199 }
200
201 foreach ( $removedLinks as $url ) {
202 $this->logUrlChange( $url, 'remove' );
203 }
204 }
205
213 public function doLogging( User $user, Title $title, $revId ) {
214 if ( !$this->isLoggingEnabled() ) {
215 return;
216 }
217
218 $baseInfo = [
219 'revId' => $revId,
220 'pageId' => $title->getArticleID(),
221 'pageNamespace' => $title->getNamespace(),
222 'userId' => $user->getId(),
223 'userText' => $user->getName(),
224 ];
225 $changes = $this->urlChangeLog;
226 // Empty the changes queue in case this function gets called more than once
227 $this->urlChangeLog = [];
228
229 DeferredUpdates::addCallableUpdate( function () use ( $changes, $baseInfo ) {
230 foreach ( $changes as $change ) {
231 EventLogging::logEvent(
232 'ExternalLinksChange',
233 15716074,
234 $baseInfo + $change
235 );
236 }
237 } );
238 }
239
246 private function logUrlChange( $url, $action ) {
247 $parsed = wfParseUrl( $url );
248 if ( !isset( $parsed['host'] ) ) {
249 wfDebugLog( 'SpamBlacklist', "Unable to parse $url" );
250 return;
251 }
252 $info = [
253 'action' => $action,
254 'protocol' => $parsed['scheme'],
255 'domain' => $parsed['host'],
256 'path' => isset( $parsed['path'] ) ? $parsed['path'] : '',
257 'query' => isset( $parsed['query'] ) ? $parsed['query'] : '',
258 'fragment' => isset( $parsed['fragment'] ) ? $parsed['fragment'] : '',
259 ];
260
261 $this->urlChangeLog[] = $info;
262 }
263
272 function getCurrentLinks( Title $title ) {
273 $cache = ObjectCache::getMainWANInstance();
274 $fname = __METHOD__;
275 return $cache->getWithSetCallback(
276 // Key is warmed via warmCachesForFilter() from ApiStashEdit
277 $cache->makeKey( 'external-link-list', $title->getLatestRevID() ),
278 $cache::TTL_MINUTE,
279 function ( $oldValue, &$ttl, array &$setOpts ) use ( $title, $fname ) {
281 $setOpts += Database::getCacheSetOptions( $dbr );
282
283 return $dbr->selectFieldValues(
284 'externallinks',
285 'el_to',
286 [ 'el_from' => $title->getArticleID() ], // should be zero queries
287 $fname
288 );
289 }
290 );
291 }
292
293 public function warmCachesForFilter( Title $title, array $entries ) {
294 $this->filter( $entries, $title, true /* no logging */, 'stash' );
295 }
296
302 public function getRegexStart() {
303 return '/(?:https?:)?\/\/+[a-z0-9_\-.]*(';
304 }
305
312 public function getRegexEnd( $batchSize ) {
313 return ')' . parent::getRegexEnd( $batchSize );
314 }
322 public function logFilterHit( $title, $url ) {
323 global $wgUser, $wgLogSpamBlacklistHits;
324 if ( $wgLogSpamBlacklistHits ) {
325 $logEntry = new ManualLogEntry( 'spamblacklist', 'hit' );
326 $logEntry->setPerformer( $wgUser );
327 $logEntry->setTarget( $title );
328 $logEntry->setParameters( [
329 '4::url' => $url,
330 ] );
331 $logid = $logEntry->insert();
332 $log = new LogPage( 'spamblacklist' );
333 if ( $log->isRestricted() ) {
334 // Make sure checkusers can see this action if the log is restricted
335 // (which is the default)
336 if ( ExtensionRegistry::getInstance()->isLoaded( 'CheckUser' )
337 && class_exists( 'CheckUserHooks' )
338 ) {
339 $rc = $logEntry->getRecentChange( $logid );
340 CheckUserHooks::updateCheckUserData( $rc );
341 }
342 } else {
343 // If the log is unrestricted, publish normally to RC,
344 // which will also update checkuser
345 $logEntry->publish( $logid, "rc" );
346 }
347 }
348 }
349}
wfParseUrl( $url)
parse_url() work-alike, but non-broken.
wfGetDB( $db, $groups=[], $wiki=false)
Get a Database object.
wfRestoreWarnings()
wfSuppressWarnings( $end=false)
Reference-counted warning suppression.
wfDebugLog( $logGroup, $text, $dest='all', array $context=[])
Send a line to a supplementary debug log file, if configured, or main debug log if not.
if(defined( 'MW_SETUP_CALLBACK')) $fname
Customization point after all loading (constants, functions, classes, DefaultSettings,...
Definition Setup.php:121
if(! $wgDBerrorLogTZ) $wgRequest
Definition Setup.php:747
Base class for different kinds of blacklists.
getBlacklists()
Fetch local and (possibly cached) remote blacklists.
getWhitelists()
Returns the (local) whitelist.
Class to simplify the use of log pages.
Definition LogPage.php:33
Class for creating new log entries and inserting them into the database.
Definition LogEntry.php:437
logUrlChange( $url, $action)
Queue log data about change for a url addition or removal.
getCurrentLinks(Title $title)
Look up the links currently in the article, so we can ignore them on a second run.
filter(array $links, Title $title=null, $preventLog=false, $mode='check')
doLogging(User $user, Title $title, $revId)
Actually push the url change events post-save.
getRegexStart()
Returns the start of the regex for matches.
warmCachesForFilter(Title $title, array $entries)
logFilterHit( $title, $url)
Logs the filter hit to Special:Log if $wgLogSpamBlacklistHits is enabled.
logUrlChanges( $oldLinks, $newLinks, $addedLinks)
Diff added/removed urls and generate events for them.
getBlacklistType()
Returns the code for the blacklist implementation.
antiSpoof( $text)
Apply some basic anti-spoofing to the links before they get filtered, see.
array[] $urlChangeLog
Changes to external links, for logging purposes.
getRegexEnd( $batchSize)
Returns the end of the regex for matches.
Represents a title within MediaWiki.
Definition Title.php:39
The User object encapsulates all of the user-specific settings (user_id, name, rights,...
Definition User.php:47
Relational database abstraction object.
Definition Database.php:48
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency which acts as the top level factory for services in MediaWiki which can be used to gain access to default instances of various services MediaWikiServices however also allows new services to be defined and default services to be redefined Services are defined or redefined by providing a callback function
Definition injection.txt:30
$cache
Definition mcc.php:33
The wiki should then use memcached to cache various data To use multiple just add more items to the array To increase the weight of a make its entry a array("192.168.0.1:11211", 2))
const DB_REPLICA
Definition defines.php:25