Passed
Push — dependabot/composer/php8/media... ( e6d0f9 )
by
unknown
34:23 queued 29:40
created
includes/Helpers/Interfaces/IOAuthProtocolHelper.php 1 patch
Indentation   +45 added lines, -45 removed lines patch added patch discarded remove patch
@@ -15,53 +15,53 @@
 block discarded – undo
15 15
 
16 16
 interface IOAuthProtocolHelper
17 17
 {
18
-    /**
19
-     * @return stdClass
20
-     *
21
-     * @throws Exception
22
-     * @throws CurlException
23
-     */
24
-    public function getRequestToken();
18
+	/**
19
+	 * @return stdClass
20
+	 *
21
+	 * @throws Exception
22
+	 * @throws CurlException
23
+	 */
24
+	public function getRequestToken();
25 25
 
26
-    /**
27
-     * @param string $requestToken
28
-     *
29
-     * @return string
30
-     */
31
-    public function getAuthoriseUrl($requestToken);
26
+	/**
27
+	 * @param string $requestToken
28
+	 *
29
+	 * @return string
30
+	 */
31
+	public function getAuthoriseUrl($requestToken);
32 32
 
33
-    /**
34
-     * @param string $oauthRequestToken
35
-     * @param string $oauthRequestSecret
36
-     * @param string $oauthVerifier
37
-     *
38
-     * @return stdClass
39
-     * @throws CurlException
40
-     * @throws Exception
41
-     */
42
-    public function callbackCompleted($oauthRequestToken, $oauthRequestSecret, $oauthVerifier);
33
+	/**
34
+	 * @param string $oauthRequestToken
35
+	 * @param string $oauthRequestSecret
36
+	 * @param string $oauthVerifier
37
+	 *
38
+	 * @return stdClass
39
+	 * @throws CurlException
40
+	 * @throws Exception
41
+	 */
42
+	public function callbackCompleted($oauthRequestToken, $oauthRequestSecret, $oauthVerifier);
43 43
 
44
-    /**
45
-     * @param string $oauthAccessToken
46
-     * @param string $oauthAccessSecret
47
-     *
48
-     * @return stdClass
49
-     * @throws CurlException
50
-     * @throws Exception
51
-     * @throws \MediaWiki\OAuthClient\Exception
52
-     */
53
-    public function getIdentityTicket($oauthAccessToken, $oauthAccessSecret);
44
+	/**
45
+	 * @param string $oauthAccessToken
46
+	 * @param string $oauthAccessSecret
47
+	 *
48
+	 * @return stdClass
49
+	 * @throws CurlException
50
+	 * @throws Exception
51
+	 * @throws \MediaWiki\OAuthClient\Exception
52
+	 */
53
+	public function getIdentityTicket($oauthAccessToken, $oauthAccessSecret);
54 54
 
55
-    /**
56
-     * @param array  $apiParams    array of parameters to send to the API
57
-     * @param string $accessToken  user's access token
58
-     * @param string $accessSecret user's secret
59
-     * @param string $method       HTTP method
60
-     *
61
-     * @return stdClass
62
-     * @throws ApplicationLogicException
63
-     * @throws CurlException
64
-     * @throws Exception
65
-     */
66
-    public function apiCall($apiParams, $accessToken, $accessSecret, $method = 'GET');
55
+	/**
56
+	 * @param array  $apiParams    array of parameters to send to the API
57
+	 * @param string $accessToken  user's access token
58
+	 * @param string $accessSecret user's secret
59
+	 * @param string $method       HTTP method
60
+	 *
61
+	 * @return stdClass
62
+	 * @throws ApplicationLogicException
63
+	 * @throws CurlException
64
+	 * @throws Exception
65
+	 */
66
+	public function apiCall($apiParams, $accessToken, $accessSecret, $method = 'GET');
67 67
 }
68 68
\ No newline at end of file
Please login to merge, or discard this patch.
includes/Providers/XffTrustProvider.php 1 patch
Indentation   +152 added lines, -152 removed lines patch added patch discarded remove patch
@@ -22,156 +22,156 @@
 block discarded – undo
22 22
  */
23 23
 class XffTrustProvider implements IXffTrustProvider
24 24
 {
25
-    /**
26
-     * Array of IP addresses which are TRUSTED proxies
27
-     * @var string[]
28
-     */
29
-    private $trustedCache;
30
-    /**
31
-     * Array of IP addresses which are UNTRUSTED proxies
32
-     * @var string[]
33
-     */
34
-    private $untrustedCache = array();
35
-    /** @var PDOStatement */
36
-    private $trustedQuery;
37
-    /**
38
-     * @var PdoDatabase
39
-     */
40
-    private $database;
41
-
42
-    /**
43
-     * Creates a new instance of the trust provider
44
-     *
45
-     * @param string[]    $squidIpList List of IP addresses to pre-approve
46
-     * @param PdoDatabase $database
47
-     */
48
-    public function __construct($squidIpList, PdoDatabase $database)
49
-    {
50
-        $this->trustedCache = $squidIpList;
51
-        $this->database = $database;
52
-    }
53
-
54
-    /**
55
-     * Returns a value if the IP address is a trusted proxy
56
-     *
57
-     * @param string $ip
58
-     *
59
-     * @return bool
60
-     */
61
-    public function isTrusted($ip)
62
-    {
63
-        if (in_array($ip, $this->trustedCache)) {
64
-            return true;
65
-        }
66
-
67
-        if (in_array($ip, $this->untrustedCache)) {
68
-            return false;
69
-        }
70
-
71
-        if ($this->trustedQuery === null) {
72
-            $query = "SELECT COUNT(id) FROM xfftrustcache WHERE ip = :ip;";
73
-            $this->trustedQuery = $this->database->prepare($query);
74
-        }
75
-
76
-        $this->trustedQuery->execute(array(":ip" => $ip));
77
-        $result = $this->trustedQuery->fetchColumn();
78
-        $this->trustedQuery->closeCursor();
79
-
80
-        if ($result == 0) {
81
-            $this->untrustedCache[] = $ip;
82
-
83
-            return false;
84
-        }
85
-
86
-        if ($result >= 1) {
87
-            $this->trustedCache[] = $ip;
88
-
89
-            return true;
90
-        }
91
-
92
-        // something weird has happened if we've got here.
93
-        // default to untrusted.
94
-        return false;
95
-    }
96
-
97
-    /**
98
-     * Gets the last trusted IP in the proxy chain.
99
-     *
100
-     * @param string $ip      The IP address from REMOTE_ADDR
101
-     * @param string $proxyIp The contents of the XFF header.
102
-     *
103
-     * @return string Trusted source IP address
104
-     */
105
-    public function getTrustedClientIp($ip, $proxyIp)
106
-    {
107
-        $clientIpAddress = $ip;
108
-        if ($proxyIp) {
109
-            $ipList = explode(",", $proxyIp);
110
-            $ipList[] = $clientIpAddress;
111
-            $ipList = array_reverse($ipList);
112
-
113
-            foreach ($ipList as $ipNumber => $ipAddress) {
114
-                if ($this->isTrusted(trim($ipAddress)) && $ipNumber < (count($ipList) - 1)) {
115
-                    continue;
116
-                }
117
-
118
-                $clientIpAddress = $ipAddress;
119
-                break;
120
-            }
121
-        }
122
-
123
-        return trim($clientIpAddress);
124
-    }
125
-
126
-    /**
127
-     * Takes an array( "low" => "high" ) values, and returns true if $needle is in at least one of them.
128
-     *
129
-     * @param array  $haystack
130
-     * @param string $ip
131
-     *
132
-     * @return bool
133
-     */
134
-    public function ipInRange($haystack, $ip)
135
-    {
136
-        $needle = ip2long($ip);
137
-
138
-        foreach ($haystack as $low => $high) {
139
-            if (ip2long($low) <= $needle && ip2long($high) >= $needle) {
140
-                return true;
141
-            }
142
-        }
143
-
144
-        return false;
145
-    }
146
-
147
-    /**
148
-     * Explodes a CIDR range into an array of addresses
149
-     *
150
-     * @param string $range A CIDR-format range
151
-     *
152
-     * @return array An array containing every IP address in the range
153
-     */
154
-    public function explodeCidr($range)
155
-    {
156
-        $cidrData = explode('/', $range);
157
-
158
-        if (!isset($cidrData[1])) {
159
-            return array($range);
160
-        }
161
-
162
-        $blow = (
163
-            str_pad(decbin(ip2long($cidrData[0])), 32, "0", STR_PAD_LEFT) &
164
-            str_pad(str_pad("", $cidrData[1], "1"), 32, "0")
165
-        );
166
-        $bhigh = ($blow | str_pad(str_pad("", $cidrData[1], "0"), 32, "1"));
167
-
168
-        $list = array();
169
-
170
-        $bindecBHigh = bindec($bhigh);
171
-        for ($x = bindec($blow); $x <= $bindecBHigh; $x++) {
172
-            $list[] = long2ip($x);
173
-        }
174
-
175
-        return $list;
176
-    }
25
+	/**
26
+	 * Array of IP addresses which are TRUSTED proxies
27
+	 * @var string[]
28
+	 */
29
+	private $trustedCache;
30
+	/**
31
+	 * Array of IP addresses which are UNTRUSTED proxies
32
+	 * @var string[]
33
+	 */
34
+	private $untrustedCache = array();
35
+	/** @var PDOStatement */
36
+	private $trustedQuery;
37
+	/**
38
+	 * @var PdoDatabase
39
+	 */
40
+	private $database;
41
+
42
+	/**
43
+	 * Creates a new instance of the trust provider
44
+	 *
45
+	 * @param string[]    $squidIpList List of IP addresses to pre-approve
46
+	 * @param PdoDatabase $database
47
+	 */
48
+	public function __construct($squidIpList, PdoDatabase $database)
49
+	{
50
+		$this->trustedCache = $squidIpList;
51
+		$this->database = $database;
52
+	}
53
+
54
+	/**
55
+	 * Returns a value if the IP address is a trusted proxy
56
+	 *
57
+	 * @param string $ip
58
+	 *
59
+	 * @return bool
60
+	 */
61
+	public function isTrusted($ip)
62
+	{
63
+		if (in_array($ip, $this->trustedCache)) {
64
+			return true;
65
+		}
66
+
67
+		if (in_array($ip, $this->untrustedCache)) {
68
+			return false;
69
+		}
70
+
71
+		if ($this->trustedQuery === null) {
72
+			$query = "SELECT COUNT(id) FROM xfftrustcache WHERE ip = :ip;";
73
+			$this->trustedQuery = $this->database->prepare($query);
74
+		}
75
+
76
+		$this->trustedQuery->execute(array(":ip" => $ip));
77
+		$result = $this->trustedQuery->fetchColumn();
78
+		$this->trustedQuery->closeCursor();
79
+
80
+		if ($result == 0) {
81
+			$this->untrustedCache[] = $ip;
82
+
83
+			return false;
84
+		}
85
+
86
+		if ($result >= 1) {
87
+			$this->trustedCache[] = $ip;
88
+
89
+			return true;
90
+		}
91
+
92
+		// something weird has happened if we've got here.
93
+		// default to untrusted.
94
+		return false;
95
+	}
96
+
97
+	/**
98
+	 * Gets the last trusted IP in the proxy chain.
99
+	 *
100
+	 * @param string $ip      The IP address from REMOTE_ADDR
101
+	 * @param string $proxyIp The contents of the XFF header.
102
+	 *
103
+	 * @return string Trusted source IP address
104
+	 */
105
+	public function getTrustedClientIp($ip, $proxyIp)
106
+	{
107
+		$clientIpAddress = $ip;
108
+		if ($proxyIp) {
109
+			$ipList = explode(",", $proxyIp);
110
+			$ipList[] = $clientIpAddress;
111
+			$ipList = array_reverse($ipList);
112
+
113
+			foreach ($ipList as $ipNumber => $ipAddress) {
114
+				if ($this->isTrusted(trim($ipAddress)) && $ipNumber < (count($ipList) - 1)) {
115
+					continue;
116
+				}
117
+
118
+				$clientIpAddress = $ipAddress;
119
+				break;
120
+			}
121
+		}
122
+
123
+		return trim($clientIpAddress);
124
+	}
125
+
126
+	/**
127
+	 * Takes an array( "low" => "high" ) values, and returns true if $needle is in at least one of them.
128
+	 *
129
+	 * @param array  $haystack
130
+	 * @param string $ip
131
+	 *
132
+	 * @return bool
133
+	 */
134
+	public function ipInRange($haystack, $ip)
135
+	{
136
+		$needle = ip2long($ip);
137
+
138
+		foreach ($haystack as $low => $high) {
139
+			if (ip2long($low) <= $needle && ip2long($high) >= $needle) {
140
+				return true;
141
+			}
142
+		}
143
+
144
+		return false;
145
+	}
146
+
147
+	/**
148
+	 * Explodes a CIDR range into an array of addresses
149
+	 *
150
+	 * @param string $range A CIDR-format range
151
+	 *
152
+	 * @return array An array containing every IP address in the range
153
+	 */
154
+	public function explodeCidr($range)
155
+	{
156
+		$cidrData = explode('/', $range);
157
+
158
+		if (!isset($cidrData[1])) {
159
+			return array($range);
160
+		}
161
+
162
+		$blow = (
163
+			str_pad(decbin(ip2long($cidrData[0])), 32, "0", STR_PAD_LEFT) &
164
+			str_pad(str_pad("", $cidrData[1], "1"), 32, "0")
165
+		);
166
+		$bhigh = ($blow | str_pad(str_pad("", $cidrData[1], "0"), 32, "1"));
167
+
168
+		$list = array();
169
+
170
+		$bindecBHigh = bindec($bhigh);
171
+		for ($x = bindec($blow); $x <= $bindecBHigh; $x++) {
172
+			$list[] = long2ip($x);
173
+		}
174
+
175
+		return $list;
176
+	}
177 177
 }
Please login to merge, or discard this patch.
smarty-plugins/modifier.timespan.php 1 patch
Indentation   +55 added lines, -55 removed lines patch added patch discarded remove patch
@@ -16,78 +16,78 @@
 block discarded – undo
16 16
  */
17 17
 function smarty_modifier_timespan($input)
18 18
 {
19
-    $remaining = abs(floor($input));
19
+	$remaining = abs(floor($input));
20 20
 
21
-    $seconds = $remaining % 60;
22
-    $remaining = $remaining - $seconds;
21
+	$seconds = $remaining % 60;
22
+	$remaining = $remaining - $seconds;
23 23
 
24
-    $minutes = $remaining % (60 * 60);
25
-    $remaining = $remaining - $minutes;
26
-    $minutes /= 60;
24
+	$minutes = $remaining % (60 * 60);
25
+	$remaining = $remaining - $minutes;
26
+	$minutes /= 60;
27 27
 
28
-    $hours = $remaining % (60 * 60 * 24);
29
-    $remaining = $remaining - $hours;
30
-    $hours /= (60 * 60);
28
+	$hours = $remaining % (60 * 60 * 24);
29
+	$remaining = $remaining - $hours;
30
+	$hours /= (60 * 60);
31 31
 
32
-    $days = $remaining % (60 * 60 * 24 * 7);
33
-    $weeks = $remaining - $days;
34
-    $days /= (60 * 60 * 24);
35
-    $weeks /= (60 * 60 * 24 * 7);
32
+	$days = $remaining % (60 * 60 * 24 * 7);
33
+	$weeks = $remaining - $days;
34
+	$days /= (60 * 60 * 24);
35
+	$weeks /= (60 * 60 * 24 * 7);
36 36
 
37
-    $stringval = '';
38
-    $trip = false;
37
+	$stringval = '';
38
+	$trip = false;
39 39
 
40
-    if ($weeks > 0) {
41
-        $stringval .= "${weeks}w ";
42
-    }
40
+	if ($weeks > 0) {
41
+		$stringval .= "${weeks}w ";
42
+	}
43 43
 
44
-    if ($days > 0) {
45
-        if ($stringval !== '') {
46
-            $trip = true;
47
-        }
44
+	if ($days > 0) {
45
+		if ($stringval !== '') {
46
+			$trip = true;
47
+		}
48 48
 
49
-        $stringval .= "${days}d ";
49
+		$stringval .= "${days}d ";
50 50
 
51
-        if ($trip) {
52
-            return trim($stringval);
53
-        }
54
-    }
51
+		if ($trip) {
52
+			return trim($stringval);
53
+		}
54
+	}
55 55
 
56
-    if ($hours > 0) {
57
-        if ($stringval !== '') {
58
-            $trip = true;
59
-        }
56
+	if ($hours > 0) {
57
+		if ($stringval !== '') {
58
+			$trip = true;
59
+		}
60 60
 
61
-        $stringval .= "${hours}h ";
61
+		$stringval .= "${hours}h ";
62 62
 
63
-        if ($trip) {
64
-            return trim($stringval);
65
-        }
66
-    }
63
+		if ($trip) {
64
+			return trim($stringval);
65
+		}
66
+	}
67 67
 
68
-    if ($minutes > 0) {
69
-        if ($stringval !== '') {
70
-            $trip = true;
71
-        }
68
+	if ($minutes > 0) {
69
+		if ($stringval !== '') {
70
+			$trip = true;
71
+		}
72 72
 
73
-        $stringval .= "${minutes}m ";
73
+		$stringval .= "${minutes}m ";
74 74
 
75
-        if ($trip) {
76
-            return trim($stringval);
77
-        }
78
-    }
75
+		if ($trip) {
76
+			return trim($stringval);
77
+		}
78
+	}
79 79
 
80
-    if ($seconds > 0) {
81
-        if ($stringval !== '') {
82
-            $trip = true;
83
-        }
80
+	if ($seconds > 0) {
81
+		if ($stringval !== '') {
82
+			$trip = true;
83
+		}
84 84
 
85
-        $stringval .= "${seconds}s ";
85
+		$stringval .= "${seconds}s ";
86 86
 
87
-        if ($trip) {
88
-            return trim($stringval);
89
-        }
90
-    }
87
+		if ($trip) {
88
+			return trim($stringval);
89
+		}
90
+	}
91 91
 
92
-    return trim($stringval);
92
+	return trim($stringval);
93 93
 }
94 94
\ No newline at end of file
Please login to merge, or discard this patch.
includes/Validation/ValidationError.php 1 patch
Indentation   +92 added lines, -92 removed lines patch added patch discarded remove patch
@@ -12,102 +12,102 @@
 block discarded – undo
12 12
 
13 13
 class ValidationError
14 14
 {
15
-    const NAME_EMPTY = "name_empty";
16
-    const NAME_TOO_LONG = "name_too_long";
17
-    const NAME_EXISTS = "name_exists";
18
-    const NAME_EXISTS_SUL = "name_exists_sul";
19
-    const NAME_NUMONLY = "name_numonly";
20
-    const NAME_INVALIDCHAR = "name_invalidchar";
21
-    const NAME_SANITISED = "name_sanitised";
22
-    const NAME_IP = "name_ip";
23
-    const EMAIL_EMPTY = "email_empty";
24
-    const EMAIL_WIKIMEDIA = "email_wikimedia";
25
-    const EMAIL_INVALID = "email_invalid";
26
-    const EMAIL_MISMATCH = "email_mismatch";
27
-    const OPEN_REQUEST_NAME = "open_request_name";
28
-    const BANNED = "banned";
29
-    const BANNED_TOR = "banned_tor";
30
-    /**
31
-     * @var array Error text for the above
32
-     */
33
-    private static $errorText = array(
34
-        self::NAME_EMPTY        => 'You\'ve not chosen a username!',
35
-        self::NAME_TOO_LONG     => 'Your chosen username is too long. Please choose a shorter one.',
36
-        self::NAME_EXISTS       => 'I\'m sorry, but the username you selected is already taken. Please try another. '
37
-            . 'Please note that Wikipedia automatically capitalizes the first letter of any user name, therefore '
38
-            . '[[User:example]] would become [[User:Example]].',
39
-        self::NAME_EXISTS_SUL   => 'I\'m sorry, but the username you selected is already taken. Please try another. '
40
-            . 'Please note that Wikipedia automatically capitalizes the first letter of any user name, therefore '
41
-            . '[[User:example]] would become [[User:Example]].',
42
-        self::NAME_NUMONLY      => 'The username you chose is invalid: it consists entirely of numbers. Please retry '
43
-            . 'with a valid username.',
44
-        self::NAME_INVALIDCHAR  => 'There appears to be an invalid character in your username. Please note that the '
45
-            . 'following characters are not allowed: <code># @ / &lt; &gt; [ ] | { }</code>',
46
-        self::NAME_SANITISED    => 'Your requested username has been automatically adjusted due to technical '
47
-            . 'restrictions. Underscores have been replaced with spaces, and the first character has been capitalised.',
48
-        self::NAME_IP           => 'The username you chose is invalid: it cannot be an IP address',
49
-        self::EMAIL_EMPTY       => 'You need to supply an email address.',
50
-        self::EMAIL_WIKIMEDIA   => 'Please provide your email address here.',
51
-        self::EMAIL_INVALID     => 'Invalid E-mail address supplied. Please check you entered it correctly.',
52
-        self::EMAIL_MISMATCH    => 'The email addresses you entered do not match. Please try again.',
53
-        self::OPEN_REQUEST_NAME => 'There is already an open request with this name in this system.',
54
-        self::BANNED            => 'Sorry, you are currently banned from requesting accounts using this tool.',
55
-        self::BANNED_TOR        => 'Tor exit nodes are currently banned from using this tool due to excessive abuse. '
56
-            . 'Please note that Tor is also currently banned from editing Wikipedia.',
57
-    );
58
-    /**
59
-     * Summary of $errorCode
60
-     * @var string
61
-     */
62
-    private $errorCode;
63
-    /**
64
-     * Summary of $isError
65
-     * @var bool
66
-     */
67
-    private $isError;
15
+	const NAME_EMPTY = "name_empty";
16
+	const NAME_TOO_LONG = "name_too_long";
17
+	const NAME_EXISTS = "name_exists";
18
+	const NAME_EXISTS_SUL = "name_exists_sul";
19
+	const NAME_NUMONLY = "name_numonly";
20
+	const NAME_INVALIDCHAR = "name_invalidchar";
21
+	const NAME_SANITISED = "name_sanitised";
22
+	const NAME_IP = "name_ip";
23
+	const EMAIL_EMPTY = "email_empty";
24
+	const EMAIL_WIKIMEDIA = "email_wikimedia";
25
+	const EMAIL_INVALID = "email_invalid";
26
+	const EMAIL_MISMATCH = "email_mismatch";
27
+	const OPEN_REQUEST_NAME = "open_request_name";
28
+	const BANNED = "banned";
29
+	const BANNED_TOR = "banned_tor";
30
+	/**
31
+	 * @var array Error text for the above
32
+	 */
33
+	private static $errorText = array(
34
+		self::NAME_EMPTY        => 'You\'ve not chosen a username!',
35
+		self::NAME_TOO_LONG     => 'Your chosen username is too long. Please choose a shorter one.',
36
+		self::NAME_EXISTS       => 'I\'m sorry, but the username you selected is already taken. Please try another. '
37
+			. 'Please note that Wikipedia automatically capitalizes the first letter of any user name, therefore '
38
+			. '[[User:example]] would become [[User:Example]].',
39
+		self::NAME_EXISTS_SUL   => 'I\'m sorry, but the username you selected is already taken. Please try another. '
40
+			. 'Please note that Wikipedia automatically capitalizes the first letter of any user name, therefore '
41
+			. '[[User:example]] would become [[User:Example]].',
42
+		self::NAME_NUMONLY      => 'The username you chose is invalid: it consists entirely of numbers. Please retry '
43
+			. 'with a valid username.',
44
+		self::NAME_INVALIDCHAR  => 'There appears to be an invalid character in your username. Please note that the '
45
+			. 'following characters are not allowed: <code># @ / &lt; &gt; [ ] | { }</code>',
46
+		self::NAME_SANITISED    => 'Your requested username has been automatically adjusted due to technical '
47
+			. 'restrictions. Underscores have been replaced with spaces, and the first character has been capitalised.',
48
+		self::NAME_IP           => 'The username you chose is invalid: it cannot be an IP address',
49
+		self::EMAIL_EMPTY       => 'You need to supply an email address.',
50
+		self::EMAIL_WIKIMEDIA   => 'Please provide your email address here.',
51
+		self::EMAIL_INVALID     => 'Invalid E-mail address supplied. Please check you entered it correctly.',
52
+		self::EMAIL_MISMATCH    => 'The email addresses you entered do not match. Please try again.',
53
+		self::OPEN_REQUEST_NAME => 'There is already an open request with this name in this system.',
54
+		self::BANNED            => 'Sorry, you are currently banned from requesting accounts using this tool.',
55
+		self::BANNED_TOR        => 'Tor exit nodes are currently banned from using this tool due to excessive abuse. '
56
+			. 'Please note that Tor is also currently banned from editing Wikipedia.',
57
+	);
58
+	/**
59
+	 * Summary of $errorCode
60
+	 * @var string
61
+	 */
62
+	private $errorCode;
63
+	/**
64
+	 * Summary of $isError
65
+	 * @var bool
66
+	 */
67
+	private $isError;
68 68
 
69
-    /**
70
-     * Summary of __construct
71
-     *
72
-     * @param string $errorCode
73
-     * @param bool   $isError
74
-     */
75
-    public function __construct($errorCode, $isError = true)
76
-    {
77
-        $this->errorCode = $errorCode;
78
-        $this->isError = $isError;
79
-    }
69
+	/**
70
+	 * Summary of __construct
71
+	 *
72
+	 * @param string $errorCode
73
+	 * @param bool   $isError
74
+	 */
75
+	public function __construct($errorCode, $isError = true)
76
+	{
77
+		$this->errorCode = $errorCode;
78
+		$this->isError = $isError;
79
+	}
80 80
 
81
-    /**
82
-     * Summary of getErrorCode
83
-     * @return string
84
-     */
85
-    public function getErrorCode()
86
-    {
87
-        return $this->errorCode;
88
-    }
81
+	/**
82
+	 * Summary of getErrorCode
83
+	 * @return string
84
+	 */
85
+	public function getErrorCode()
86
+	{
87
+		return $this->errorCode;
88
+	}
89 89
 
90
-    /**
91
-     * @return string
92
-     * @throws Exception
93
-     */
94
-    public function getErrorMessage()
95
-    {
96
-        $text = self::$errorText[$this->errorCode];
90
+	/**
91
+	 * @return string
92
+	 * @throws Exception
93
+	 */
94
+	public function getErrorMessage()
95
+	{
96
+		$text = self::$errorText[$this->errorCode];
97 97
 
98
-        if ($text == null) {
99
-            throw new Exception('Unknown validation error');
100
-        }
98
+		if ($text == null) {
99
+			throw new Exception('Unknown validation error');
100
+		}
101 101
 
102
-        return $text;
103
-    }
102
+		return $text;
103
+	}
104 104
 
105
-    /**
106
-     * Summary of isError
107
-     * @return bool
108
-     */
109
-    public function isError()
110
-    {
111
-        return $this->isError;
112
-    }
105
+	/**
106
+	 * Summary of isError
107
+	 * @return bool
108
+	 */
109
+	public function isError()
110
+	{
111
+		return $this->isError;
112
+	}
113 113
 }
Please login to merge, or discard this patch.
includes/Validation/RequestValidationHelper.php 3 patches
Indentation   +425 added lines, -425 removed lines patch added patch discarded remove patch
@@ -31,429 +31,429 @@
 block discarded – undo
31 31
  */
32 32
 class RequestValidationHelper
33 33
 {
34
-    /** @var IBanHelper */
35
-    private $banHelper;
36
-    /** @var PdoDatabase */
37
-    private $database;
38
-    /** @var IAntiSpoofProvider */
39
-    private $antiSpoofProvider;
40
-    /** @var IXffTrustProvider */
41
-    private $xffTrustProvider;
42
-    /** @var HttpHelper */
43
-    private $httpHelper;
44
-    /**
45
-     * @var string
46
-     */
47
-    private $mediawikiApiEndpoint;
48
-    private $titleBlacklistEnabled;
49
-    /**
50
-     * @var TorExitProvider
51
-     */
52
-    private $torExitProvider;
53
-    /**
54
-     * @var SiteConfiguration
55
-     */
56
-    private $siteConfiguration;
57
-
58
-    private $validationRemoteTimeout = 5000;
59
-
60
-    /**
61
-     * Summary of __construct
62
-     *
63
-     * @param IBanHelper         $banHelper
64
-     * @param PdoDatabase        $database
65
-     * @param IAntiSpoofProvider $antiSpoofProvider
66
-     * @param IXffTrustProvider  $xffTrustProvider
67
-     * @param HttpHelper         $httpHelper
68
-     * @param TorExitProvider    $torExitProvider
69
-     * @param SiteConfiguration  $siteConfiguration
70
-     */
71
-    public function __construct(
72
-        IBanHelper $banHelper,
73
-        PdoDatabase $database,
74
-        IAntiSpoofProvider $antiSpoofProvider,
75
-        IXffTrustProvider $xffTrustProvider,
76
-        HttpHelper $httpHelper,
77
-        TorExitProvider $torExitProvider,
78
-        SiteConfiguration $siteConfiguration
79
-    ) {
80
-        $this->banHelper = $banHelper;
81
-        $this->database = $database;
82
-        $this->antiSpoofProvider = $antiSpoofProvider;
83
-        $this->xffTrustProvider = $xffTrustProvider;
84
-        $this->httpHelper = $httpHelper;
85
-
86
-        // FIXME: domains!
87
-        /** @var Domain $domain */
88
-        $domain = Domain::getById(1, $database);
89
-
90
-        $this->mediawikiApiEndpoint = $domain->getWikiApiPath();
91
-        $this->titleBlacklistEnabled = $siteConfiguration->getTitleBlacklistEnabled();
92
-        $this->torExitProvider = $torExitProvider;
93
-        $this->siteConfiguration = $siteConfiguration;
94
-    }
95
-
96
-    /**
97
-     * Summary of validateName
98
-     *
99
-     * @param Request $request
100
-     *
101
-     * @return ValidationError[]
102
-     */
103
-    public function validateName(Request $request)
104
-    {
105
-        $errorList = array();
106
-
107
-        // ERRORS
108
-        // name is empty
109
-        if (trim($request->getName()) == "") {
110
-            $errorList[ValidationError::NAME_EMPTY] = new ValidationError(ValidationError::NAME_EMPTY);
111
-        }
112
-
113
-        // name is too long
114
-        if (mb_strlen(trim($request->getName())) > 500) {
115
-            $errorList[ValidationError::NAME_EMPTY] = new ValidationError(ValidationError::NAME_TOO_LONG);
116
-        }
117
-
118
-        // username already exists
119
-        if ($this->userExists($request)) {
120
-            $errorList[ValidationError::NAME_EXISTS] = new ValidationError(ValidationError::NAME_EXISTS);
121
-        }
122
-
123
-        // username part of SUL account
124
-        if ($this->userSulExists($request)) {
125
-            // using same error slot as name exists - it's the same sort of error, and we probably only want to show one.
126
-            $errorList[ValidationError::NAME_EXISTS] = new ValidationError(ValidationError::NAME_EXISTS_SUL);
127
-        }
128
-
129
-        // username is numbers
130
-        if (preg_match("/^[0-9]+$/", $request->getName()) === 1) {
131
-            $errorList[ValidationError::NAME_NUMONLY] = new ValidationError(ValidationError::NAME_NUMONLY);
132
-        }
133
-
134
-        // username can't contain #@/<>[]|{}
135
-        if (preg_match("/[" . preg_quote("#@/<>[]|{}", "/") . "]/", $request->getName()) === 1) {
136
-            $errorList[ValidationError::NAME_INVALIDCHAR] = new ValidationError(ValidationError::NAME_INVALIDCHAR);
137
-        }
138
-
139
-        // username is an IP
140
-        if (filter_var($request->getName(), FILTER_VALIDATE_IP)) {
141
-            $errorList[ValidationError::NAME_IP] = new ValidationError(ValidationError::NAME_IP);
142
-        }
143
-
144
-        // existing non-closed request for this name
145
-        if ($this->nameRequestExists($request)) {
146
-            $errorList[ValidationError::OPEN_REQUEST_NAME] = new ValidationError(ValidationError::OPEN_REQUEST_NAME);
147
-        }
148
-
149
-        return $errorList;
150
-    }
151
-
152
-    /**
153
-     * Summary of validateEmail
154
-     *
155
-     * @param Request $request
156
-     * @param string  $emailConfirmation
157
-     *
158
-     * @return ValidationError[]
159
-     */
160
-    public function validateEmail(Request $request, $emailConfirmation)
161
-    {
162
-        $errorList = array();
163
-
164
-        // ERRORS
165
-
166
-        // email addresses must match
167
-        if ($request->getEmail() != $emailConfirmation) {
168
-            $errorList[ValidationError::EMAIL_MISMATCH] = new ValidationError(ValidationError::EMAIL_MISMATCH);
169
-        }
170
-
171
-        // email address must be validly formed
172
-        if (trim($request->getEmail()) == "") {
173
-            $errorList[ValidationError::EMAIL_EMPTY] = new ValidationError(ValidationError::EMAIL_EMPTY);
174
-        }
175
-
176
-        // email address must be validly formed
177
-        if (!filter_var($request->getEmail(), FILTER_VALIDATE_EMAIL)) {
178
-            if (trim($request->getEmail()) != "") {
179
-                $errorList[ValidationError::EMAIL_INVALID] = new ValidationError(ValidationError::EMAIL_INVALID);
180
-            }
181
-        }
182
-
183
-        // email address can't be wikimedia/wikipedia .com/org
184
-        if (preg_match('/.*@.*wiki(m.dia|p.dia)\.(org|com)/i', $request->getEmail()) === 1) {
185
-            $errorList[ValidationError::EMAIL_WIKIMEDIA] = new ValidationError(ValidationError::EMAIL_WIKIMEDIA);
186
-        }
187
-
188
-        return $errorList;
189
-    }
190
-
191
-    /**
192
-     * Summary of validateOther
193
-     *
194
-     * @param Request $request
195
-     *
196
-     * @return ValidationError[]
197
-     */
198
-    public function validateOther(Request $request)
199
-    {
200
-        $errorList = array();
201
-
202
-        $trustedIp = $this->xffTrustProvider->getTrustedClientIp($request->getIp(),
203
-            $request->getForwardedIp());
204
-
205
-        // ERRORS
206
-
207
-        // TOR nodes
208
-        if ($this->torExitProvider->isTorExit($trustedIp)) {
209
-            $errorList[ValidationError::BANNED] = new ValidationError(ValidationError::BANNED_TOR);
210
-        }
211
-
212
-        // Bans
213
-        if ($this->banHelper->isBlockBanned($request)) {
214
-            $errorList[ValidationError::BANNED] = new ValidationError(ValidationError::BANNED);
215
-        }
216
-
217
-        return $errorList;
218
-    }
219
-
220
-    public function postSaveValidations(Request $request)
221
-    {
222
-        // Antispoof check
223
-        $this->checkAntiSpoof($request);
224
-
225
-        // Blacklist check
226
-        $this->checkTitleBlacklist($request);
227
-
228
-        // Add comment for form override
229
-        $this->formOverride($request);
230
-
231
-        $bans = $this->banHelper->getBans($request);
232
-
233
-        foreach ($bans as $ban) {
234
-            if ($ban->getAction() == Ban::ACTION_DROP) {
235
-                $request->setStatus(RequestStatus::CLOSED);
236
-                $request->save();
237
-
238
-                Logger::closeRequest($request->getDatabase(), $request, 0, null);
239
-
240
-                $comment = new Comment();
241
-                $comment->setDatabase($this->database);
242
-                $comment->setRequest($request->getId());
243
-                $comment->setVisibility('user');
244
-                $comment->setUser(null);
245
-
246
-                $comment->setComment('Request dropped automatically due to matching rule.');
247
-                $comment->save();
248
-            }
249
-
250
-            if ($ban->getAction() == Ban::ACTION_DEFER) {
251
-                /** @var RequestQueue|false $targetQueue */
252
-                $targetQueue = RequestQueue::getById($ban->getTargetQueue(), $this->database);
253
-
254
-                if ($targetQueue === false ) {
255
-                    $comment = new Comment();
256
-                    $comment->setDatabase($this->database);
257
-                    $comment->setRequest($request->getId());
258
-                    $comment->setVisibility('user');
259
-                    $comment->setUser(null);
260
-
261
-                    $comment->setComment("This request would have been deferred automatically due to a matching rule, but the queue to defer to could not be found.");
262
-                    $comment->save();
263
-                }
264
-                else {
265
-                    $this->deferRequest($request, $targetQueue, 'Request deferred automatically due to matching rule.');
266
-                }
267
-            }
268
-        }
269
-    }
270
-
271
-    private function checkAntiSpoof(Request $request)
272
-    {
273
-        try {
274
-            if (count($this->antiSpoofProvider->getSpoofs($request->getName())) > 0) {
275
-                // If there were spoofs an Admin should handle the request.
276
-                // FIXME: domains!
277
-                $defaultQueue = RequestQueue::getDefaultQueue($this->database, 1, RequestQueue::DEFAULT_ANTISPOOF);
278
-                $this->deferRequest($request, $defaultQueue,
279
-                    'Request automatically deferred due to AntiSpoof hit');
280
-            }
281
-        }
282
-        catch (Exception $ex) {
283
-            $skippable = [
284
-                'Contains unassigned character',
285
-                'Contains incompatible mixed scripts',
286
-                'Does not contain any letters',
287
-                'Usernames must contain one or more characters',
288
-                'Usernames cannot contain characters from different writing systems',
289
-                'Usernames cannot contain the character'
290
-            ];
291
-
292
-            $skip = false;
293
-
294
-            foreach ($skippable as $s) {
295
-                if (strpos($ex->getMessage(), 'Encountered error while getting result: ' . $s) !== false) {
296
-                    $skip = true;
297
-                    break;
298
-                }
299
-            }
300
-
301
-            // Only log to disk if this *isn't* a "skippable" error.
302
-            if (!$skip) {
303
-                ExceptionHandler::logExceptionToDisk($ex, $this->siteConfiguration);
304
-            }
305
-        }
306
-    }
307
-
308
-    private function checkTitleBlacklist(Request $request)
309
-    {
310
-        if ($this->titleBlacklistEnabled == 1) {
311
-            try {
312
-                $apiResult = $this->httpHelper->get(
313
-                    $this->mediawikiApiEndpoint,
314
-                    array(
315
-                        'action'       => 'titleblacklist',
316
-                        'tbtitle'      => $request->getName(),
317
-                        'tbaction'     => 'new-account',
318
-                        'tbnooverride' => true,
319
-                        'format'       => 'php',
320
-                    ),
321
-                    [],
322
-                    $this->validationRemoteTimeout
323
-                );
324
-
325
-                $data = unserialize($apiResult);
326
-
327
-                $requestIsOk = $data['titleblacklist']['result'] == "ok";
328
-            }
329
-            catch (CurlException $ex) {
330
-                ExceptionHandler::logExceptionToDisk($ex, $this->siteConfiguration);
331
-
332
-                // Don't kill the request, just assume it's fine. Humans can deal with it later.
333
-                return;
334
-            }
335
-
336
-            if (!$requestIsOk) {
337
-                // FIXME: domains!
338
-                $defaultQueue = RequestQueue::getDefaultQueue($this->database, 1, RequestQueue::DEFAULT_TITLEBLACKLIST);
339
-
340
-                $this->deferRequest($request, $defaultQueue,
341
-                    'Request automatically deferred due to title blacklist hit');
342
-            }
343
-        }
344
-    }
345
-
346
-    private function userExists(Request $request)
347
-    {
348
-        try {
349
-            $userExists = $this->httpHelper->get(
350
-                $this->mediawikiApiEndpoint,
351
-                array(
352
-                    'action'  => 'query',
353
-                    'list'    => 'users',
354
-                    'ususers' => $request->getName(),
355
-                    'format'  => 'php',
356
-                ),
357
-                [],
358
-                $this->validationRemoteTimeout
359
-            );
360
-
361
-            $ue = unserialize($userExists);
362
-            if (!isset ($ue['query']['users']['0']['missing']) && isset ($ue['query']['users']['0']['userid'])) {
363
-                return true;
364
-            }
365
-        }
366
-        catch (CurlException $ex) {
367
-            ExceptionHandler::logExceptionToDisk($ex, $this->siteConfiguration);
368
-
369
-            // Don't kill the request, just assume it's fine. Humans can deal with it later.
370
-            return false;
371
-        }
372
-
373
-        return false;
374
-    }
375
-
376
-    private function userSulExists(Request $request)
377
-    {
378
-        $requestName = $request->getName();
379
-
380
-        try {
381
-            $userExists = $this->httpHelper->get(
382
-                $this->mediawikiApiEndpoint,
383
-                array(
384
-                    'action'  => 'query',
385
-                    'meta'    => 'globaluserinfo',
386
-                    'guiuser' => $requestName,
387
-                    'format'  => 'php',
388
-                ),
389
-                [],
390
-                $this->validationRemoteTimeout
391
-            );
392
-
393
-            $ue = unserialize($userExists);
394
-            if (isset ($ue['query']['globaluserinfo']['id'])) {
395
-                return true;
396
-            }
397
-        }
398
-        catch (CurlException $ex) {
399
-            ExceptionHandler::logExceptionToDisk($ex, $this->siteConfiguration);
400
-
401
-            // Don't kill the request, just assume it's fine. Humans can deal with it later.
402
-            return false;
403
-        }
404
-
405
-        return false;
406
-    }
407
-
408
-    /**
409
-     * Checks if a request with this name is currently open
410
-     *
411
-     * @param Request $request
412
-     *
413
-     * @return bool
414
-     */
415
-    private function nameRequestExists(Request $request)
416
-    {
417
-        $query = "SELECT COUNT(id) FROM request WHERE status != 'Closed' AND name = :name;";
418
-        $statement = $this->database->prepare($query);
419
-        $statement->execute(array(':name' => $request->getName()));
420
-
421
-        if (!$statement) {
422
-            return false;
423
-        }
424
-
425
-        return $statement->fetchColumn() > 0;
426
-    }
427
-
428
-    private function deferRequest(Request $request, RequestQueue $targetQueue, $deferComment): void
429
-    {
430
-        $request->setQueue($targetQueue->getId());
431
-        $request->save();
432
-
433
-        $logTarget = $targetQueue->getLogName();
434
-
435
-        Logger::deferRequest($this->database, $request, $logTarget);
436
-
437
-        $comment = new Comment();
438
-        $comment->setDatabase($this->database);
439
-        $comment->setRequest($request->getId());
440
-        $comment->setVisibility('user');
441
-        $comment->setUser(null);
442
-
443
-        $comment->setComment($deferComment);
444
-        $comment->save();
445
-    }
446
-
447
-    private function formOverride(Request $request)
448
-    {
449
-        $form = $request->getOriginFormObject();
450
-        if($form === null || $form->getOverrideQueue() === null) {
451
-            return;
452
-        }
453
-
454
-        /** @var RequestQueue $targetQueue */
455
-        $targetQueue = RequestQueue::getById($form->getOverrideQueue(), $request->getDatabase());
456
-
457
-        $this->deferRequest($request, $targetQueue, 'Request deferred automatically due to request submission through a request form with a default queue set.');
458
-    }
34
+	/** @var IBanHelper */
35
+	private $banHelper;
36
+	/** @var PdoDatabase */
37
+	private $database;
38
+	/** @var IAntiSpoofProvider */
39
+	private $antiSpoofProvider;
40
+	/** @var IXffTrustProvider */
41
+	private $xffTrustProvider;
42
+	/** @var HttpHelper */
43
+	private $httpHelper;
44
+	/**
45
+	 * @var string
46
+	 */
47
+	private $mediawikiApiEndpoint;
48
+	private $titleBlacklistEnabled;
49
+	/**
50
+	 * @var TorExitProvider
51
+	 */
52
+	private $torExitProvider;
53
+	/**
54
+	 * @var SiteConfiguration
55
+	 */
56
+	private $siteConfiguration;
57
+
58
+	private $validationRemoteTimeout = 5000;
59
+
60
+	/**
61
+	 * Summary of __construct
62
+	 *
63
+	 * @param IBanHelper         $banHelper
64
+	 * @param PdoDatabase        $database
65
+	 * @param IAntiSpoofProvider $antiSpoofProvider
66
+	 * @param IXffTrustProvider  $xffTrustProvider
67
+	 * @param HttpHelper         $httpHelper
68
+	 * @param TorExitProvider    $torExitProvider
69
+	 * @param SiteConfiguration  $siteConfiguration
70
+	 */
71
+	public function __construct(
72
+		IBanHelper $banHelper,
73
+		PdoDatabase $database,
74
+		IAntiSpoofProvider $antiSpoofProvider,
75
+		IXffTrustProvider $xffTrustProvider,
76
+		HttpHelper $httpHelper,
77
+		TorExitProvider $torExitProvider,
78
+		SiteConfiguration $siteConfiguration
79
+	) {
80
+		$this->banHelper = $banHelper;
81
+		$this->database = $database;
82
+		$this->antiSpoofProvider = $antiSpoofProvider;
83
+		$this->xffTrustProvider = $xffTrustProvider;
84
+		$this->httpHelper = $httpHelper;
85
+
86
+		// FIXME: domains!
87
+		/** @var Domain $domain */
88
+		$domain = Domain::getById(1, $database);
89
+
90
+		$this->mediawikiApiEndpoint = $domain->getWikiApiPath();
91
+		$this->titleBlacklistEnabled = $siteConfiguration->getTitleBlacklistEnabled();
92
+		$this->torExitProvider = $torExitProvider;
93
+		$this->siteConfiguration = $siteConfiguration;
94
+	}
95
+
96
+	/**
97
+	 * Summary of validateName
98
+	 *
99
+	 * @param Request $request
100
+	 *
101
+	 * @return ValidationError[]
102
+	 */
103
+	public function validateName(Request $request)
104
+	{
105
+		$errorList = array();
106
+
107
+		// ERRORS
108
+		// name is empty
109
+		if (trim($request->getName()) == "") {
110
+			$errorList[ValidationError::NAME_EMPTY] = new ValidationError(ValidationError::NAME_EMPTY);
111
+		}
112
+
113
+		// name is too long
114
+		if (mb_strlen(trim($request->getName())) > 500) {
115
+			$errorList[ValidationError::NAME_EMPTY] = new ValidationError(ValidationError::NAME_TOO_LONG);
116
+		}
117
+
118
+		// username already exists
119
+		if ($this->userExists($request)) {
120
+			$errorList[ValidationError::NAME_EXISTS] = new ValidationError(ValidationError::NAME_EXISTS);
121
+		}
122
+
123
+		// username part of SUL account
124
+		if ($this->userSulExists($request)) {
125
+			// using same error slot as name exists - it's the same sort of error, and we probably only want to show one.
126
+			$errorList[ValidationError::NAME_EXISTS] = new ValidationError(ValidationError::NAME_EXISTS_SUL);
127
+		}
128
+
129
+		// username is numbers
130
+		if (preg_match("/^[0-9]+$/", $request->getName()) === 1) {
131
+			$errorList[ValidationError::NAME_NUMONLY] = new ValidationError(ValidationError::NAME_NUMONLY);
132
+		}
133
+
134
+		// username can't contain #@/<>[]|{}
135
+		if (preg_match("/[" . preg_quote("#@/<>[]|{}", "/") . "]/", $request->getName()) === 1) {
136
+			$errorList[ValidationError::NAME_INVALIDCHAR] = new ValidationError(ValidationError::NAME_INVALIDCHAR);
137
+		}
138
+
139
+		// username is an IP
140
+		if (filter_var($request->getName(), FILTER_VALIDATE_IP)) {
141
+			$errorList[ValidationError::NAME_IP] = new ValidationError(ValidationError::NAME_IP);
142
+		}
143
+
144
+		// existing non-closed request for this name
145
+		if ($this->nameRequestExists($request)) {
146
+			$errorList[ValidationError::OPEN_REQUEST_NAME] = new ValidationError(ValidationError::OPEN_REQUEST_NAME);
147
+		}
148
+
149
+		return $errorList;
150
+	}
151
+
152
+	/**
153
+	 * Summary of validateEmail
154
+	 *
155
+	 * @param Request $request
156
+	 * @param string  $emailConfirmation
157
+	 *
158
+	 * @return ValidationError[]
159
+	 */
160
+	public function validateEmail(Request $request, $emailConfirmation)
161
+	{
162
+		$errorList = array();
163
+
164
+		// ERRORS
165
+
166
+		// email addresses must match
167
+		if ($request->getEmail() != $emailConfirmation) {
168
+			$errorList[ValidationError::EMAIL_MISMATCH] = new ValidationError(ValidationError::EMAIL_MISMATCH);
169
+		}
170
+
171
+		// email address must be validly formed
172
+		if (trim($request->getEmail()) == "") {
173
+			$errorList[ValidationError::EMAIL_EMPTY] = new ValidationError(ValidationError::EMAIL_EMPTY);
174
+		}
175
+
176
+		// email address must be validly formed
177
+		if (!filter_var($request->getEmail(), FILTER_VALIDATE_EMAIL)) {
178
+			if (trim($request->getEmail()) != "") {
179
+				$errorList[ValidationError::EMAIL_INVALID] = new ValidationError(ValidationError::EMAIL_INVALID);
180
+			}
181
+		}
182
+
183
+		// email address can't be wikimedia/wikipedia .com/org
184
+		if (preg_match('/.*@.*wiki(m.dia|p.dia)\.(org|com)/i', $request->getEmail()) === 1) {
185
+			$errorList[ValidationError::EMAIL_WIKIMEDIA] = new ValidationError(ValidationError::EMAIL_WIKIMEDIA);
186
+		}
187
+
188
+		return $errorList;
189
+	}
190
+
191
+	/**
192
+	 * Summary of validateOther
193
+	 *
194
+	 * @param Request $request
195
+	 *
196
+	 * @return ValidationError[]
197
+	 */
198
+	public function validateOther(Request $request)
199
+	{
200
+		$errorList = array();
201
+
202
+		$trustedIp = $this->xffTrustProvider->getTrustedClientIp($request->getIp(),
203
+			$request->getForwardedIp());
204
+
205
+		// ERRORS
206
+
207
+		// TOR nodes
208
+		if ($this->torExitProvider->isTorExit($trustedIp)) {
209
+			$errorList[ValidationError::BANNED] = new ValidationError(ValidationError::BANNED_TOR);
210
+		}
211
+
212
+		// Bans
213
+		if ($this->banHelper->isBlockBanned($request)) {
214
+			$errorList[ValidationError::BANNED] = new ValidationError(ValidationError::BANNED);
215
+		}
216
+
217
+		return $errorList;
218
+	}
219
+
220
+	public function postSaveValidations(Request $request)
221
+	{
222
+		// Antispoof check
223
+		$this->checkAntiSpoof($request);
224
+
225
+		// Blacklist check
226
+		$this->checkTitleBlacklist($request);
227
+
228
+		// Add comment for form override
229
+		$this->formOverride($request);
230
+
231
+		$bans = $this->banHelper->getBans($request);
232
+
233
+		foreach ($bans as $ban) {
234
+			if ($ban->getAction() == Ban::ACTION_DROP) {
235
+				$request->setStatus(RequestStatus::CLOSED);
236
+				$request->save();
237
+
238
+				Logger::closeRequest($request->getDatabase(), $request, 0, null);
239
+
240
+				$comment = new Comment();
241
+				$comment->setDatabase($this->database);
242
+				$comment->setRequest($request->getId());
243
+				$comment->setVisibility('user');
244
+				$comment->setUser(null);
245
+
246
+				$comment->setComment('Request dropped automatically due to matching rule.');
247
+				$comment->save();
248
+			}
249
+
250
+			if ($ban->getAction() == Ban::ACTION_DEFER) {
251
+				/** @var RequestQueue|false $targetQueue */
252
+				$targetQueue = RequestQueue::getById($ban->getTargetQueue(), $this->database);
253
+
254
+				if ($targetQueue === false ) {
255
+					$comment = new Comment();
256
+					$comment->setDatabase($this->database);
257
+					$comment->setRequest($request->getId());
258
+					$comment->setVisibility('user');
259
+					$comment->setUser(null);
260
+
261
+					$comment->setComment("This request would have been deferred automatically due to a matching rule, but the queue to defer to could not be found.");
262
+					$comment->save();
263
+				}
264
+				else {
265
+					$this->deferRequest($request, $targetQueue, 'Request deferred automatically due to matching rule.');
266
+				}
267
+			}
268
+		}
269
+	}
270
+
271
+	private function checkAntiSpoof(Request $request)
272
+	{
273
+		try {
274
+			if (count($this->antiSpoofProvider->getSpoofs($request->getName())) > 0) {
275
+				// If there were spoofs an Admin should handle the request.
276
+				// FIXME: domains!
277
+				$defaultQueue = RequestQueue::getDefaultQueue($this->database, 1, RequestQueue::DEFAULT_ANTISPOOF);
278
+				$this->deferRequest($request, $defaultQueue,
279
+					'Request automatically deferred due to AntiSpoof hit');
280
+			}
281
+		}
282
+		catch (Exception $ex) {
283
+			$skippable = [
284
+				'Contains unassigned character',
285
+				'Contains incompatible mixed scripts',
286
+				'Does not contain any letters',
287
+				'Usernames must contain one or more characters',
288
+				'Usernames cannot contain characters from different writing systems',
289
+				'Usernames cannot contain the character'
290
+			];
291
+
292
+			$skip = false;
293
+
294
+			foreach ($skippable as $s) {
295
+				if (strpos($ex->getMessage(), 'Encountered error while getting result: ' . $s) !== false) {
296
+					$skip = true;
297
+					break;
298
+				}
299
+			}
300
+
301
+			// Only log to disk if this *isn't* a "skippable" error.
302
+			if (!$skip) {
303
+				ExceptionHandler::logExceptionToDisk($ex, $this->siteConfiguration);
304
+			}
305
+		}
306
+	}
307
+
308
+	private function checkTitleBlacklist(Request $request)
309
+	{
310
+		if ($this->titleBlacklistEnabled == 1) {
311
+			try {
312
+				$apiResult = $this->httpHelper->get(
313
+					$this->mediawikiApiEndpoint,
314
+					array(
315
+						'action'       => 'titleblacklist',
316
+						'tbtitle'      => $request->getName(),
317
+						'tbaction'     => 'new-account',
318
+						'tbnooverride' => true,
319
+						'format'       => 'php',
320
+					),
321
+					[],
322
+					$this->validationRemoteTimeout
323
+				);
324
+
325
+				$data = unserialize($apiResult);
326
+
327
+				$requestIsOk = $data['titleblacklist']['result'] == "ok";
328
+			}
329
+			catch (CurlException $ex) {
330
+				ExceptionHandler::logExceptionToDisk($ex, $this->siteConfiguration);
331
+
332
+				// Don't kill the request, just assume it's fine. Humans can deal with it later.
333
+				return;
334
+			}
335
+
336
+			if (!$requestIsOk) {
337
+				// FIXME: domains!
338
+				$defaultQueue = RequestQueue::getDefaultQueue($this->database, 1, RequestQueue::DEFAULT_TITLEBLACKLIST);
339
+
340
+				$this->deferRequest($request, $defaultQueue,
341
+					'Request automatically deferred due to title blacklist hit');
342
+			}
343
+		}
344
+	}
345
+
346
+	private function userExists(Request $request)
347
+	{
348
+		try {
349
+			$userExists = $this->httpHelper->get(
350
+				$this->mediawikiApiEndpoint,
351
+				array(
352
+					'action'  => 'query',
353
+					'list'    => 'users',
354
+					'ususers' => $request->getName(),
355
+					'format'  => 'php',
356
+				),
357
+				[],
358
+				$this->validationRemoteTimeout
359
+			);
360
+
361
+			$ue = unserialize($userExists);
362
+			if (!isset ($ue['query']['users']['0']['missing']) && isset ($ue['query']['users']['0']['userid'])) {
363
+				return true;
364
+			}
365
+		}
366
+		catch (CurlException $ex) {
367
+			ExceptionHandler::logExceptionToDisk($ex, $this->siteConfiguration);
368
+
369
+			// Don't kill the request, just assume it's fine. Humans can deal with it later.
370
+			return false;
371
+		}
372
+
373
+		return false;
374
+	}
375
+
376
+	private function userSulExists(Request $request)
377
+	{
378
+		$requestName = $request->getName();
379
+
380
+		try {
381
+			$userExists = $this->httpHelper->get(
382
+				$this->mediawikiApiEndpoint,
383
+				array(
384
+					'action'  => 'query',
385
+					'meta'    => 'globaluserinfo',
386
+					'guiuser' => $requestName,
387
+					'format'  => 'php',
388
+				),
389
+				[],
390
+				$this->validationRemoteTimeout
391
+			);
392
+
393
+			$ue = unserialize($userExists);
394
+			if (isset ($ue['query']['globaluserinfo']['id'])) {
395
+				return true;
396
+			}
397
+		}
398
+		catch (CurlException $ex) {
399
+			ExceptionHandler::logExceptionToDisk($ex, $this->siteConfiguration);
400
+
401
+			// Don't kill the request, just assume it's fine. Humans can deal with it later.
402
+			return false;
403
+		}
404
+
405
+		return false;
406
+	}
407
+
408
+	/**
409
+	 * Checks if a request with this name is currently open
410
+	 *
411
+	 * @param Request $request
412
+	 *
413
+	 * @return bool
414
+	 */
415
+	private function nameRequestExists(Request $request)
416
+	{
417
+		$query = "SELECT COUNT(id) FROM request WHERE status != 'Closed' AND name = :name;";
418
+		$statement = $this->database->prepare($query);
419
+		$statement->execute(array(':name' => $request->getName()));
420
+
421
+		if (!$statement) {
422
+			return false;
423
+		}
424
+
425
+		return $statement->fetchColumn() > 0;
426
+	}
427
+
428
+	private function deferRequest(Request $request, RequestQueue $targetQueue, $deferComment): void
429
+	{
430
+		$request->setQueue($targetQueue->getId());
431
+		$request->save();
432
+
433
+		$logTarget = $targetQueue->getLogName();
434
+
435
+		Logger::deferRequest($this->database, $request, $logTarget);
436
+
437
+		$comment = new Comment();
438
+		$comment->setDatabase($this->database);
439
+		$comment->setRequest($request->getId());
440
+		$comment->setVisibility('user');
441
+		$comment->setUser(null);
442
+
443
+		$comment->setComment($deferComment);
444
+		$comment->save();
445
+	}
446
+
447
+	private function formOverride(Request $request)
448
+	{
449
+		$form = $request->getOriginFormObject();
450
+		if($form === null || $form->getOverrideQueue() === null) {
451
+			return;
452
+		}
453
+
454
+		/** @var RequestQueue $targetQueue */
455
+		$targetQueue = RequestQueue::getById($form->getOverrideQueue(), $request->getDatabase());
456
+
457
+		$this->deferRequest($request, $targetQueue, 'Request deferred automatically due to request submission through a request form with a default queue set.');
458
+	}
459 459
 }
Please login to merge, or discard this patch.
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -251,7 +251,7 @@  discard block
 block discarded – undo
251 251
                 /** @var RequestQueue|false $targetQueue */
252 252
                 $targetQueue = RequestQueue::getById($ban->getTargetQueue(), $this->database);
253 253
 
254
-                if ($targetQueue === false ) {
254
+                if ($targetQueue === false) {
255 255
                     $comment = new Comment();
256 256
                     $comment->setDatabase($this->database);
257 257
                     $comment->setRequest($request->getId());
@@ -447,7 +447,7 @@  discard block
 block discarded – undo
447 447
     private function formOverride(Request $request)
448 448
     {
449 449
         $form = $request->getOriginFormObject();
450
-        if($form === null || $form->getOverrideQueue() === null) {
450
+        if ($form === null || $form->getOverrideQueue() === null) {
451 451
             return;
452 452
         }
453 453
 
Please login to merge, or discard this patch.
Braces   +1 added lines, -2 removed lines patch added patch discarded remove patch
@@ -260,8 +260,7 @@
 block discarded – undo
260 260
 
261 261
                     $comment->setComment("This request would have been deferred automatically due to a matching rule, but the queue to defer to could not be found.");
262 262
                     $comment->save();
263
-                }
264
-                else {
263
+                } else {
265 264
                     $this->deferRequest($request, $targetQueue, 'Request deferred automatically due to matching rule.');
266 265
                 }
267 266
             }
Please login to merge, or discard this patch.
includes/WebStart.php 2 patches
Braces   +1 added lines, -2 removed lines patch added patch discarded remove patch
@@ -82,8 +82,7 @@
 block discarded – undo
82 82
 
83 83
                 if ($siteConfiguration->getTitleBlacklistEnabled()) {
84 84
                     $page->setBlacklistHelper(new BlacklistHelper($page->getHttpHelper(), $database, $siteConfiguration));
85
-                }
86
-                else {
85
+                } else {
87 86
                     $page->setBlacklistHelper(new FakeBlacklistHelper());
88 87
                 }
89 88
 
Please login to merge, or discard this patch.
Indentation   +204 added lines, -204 removed lines patch added patch discarded remove patch
@@ -33,208 +33,208 @@
 block discarded – undo
33 33
  */
34 34
 class WebStart extends ApplicationBase
35 35
 {
36
-    /**
37
-     * @var IRequestRouter $requestRouter The request router to use. Note that different entry points have different
38
-     *                                    routers and hence different URL mappings
39
-     */
40
-    private $requestRouter;
41
-    /**
42
-     * @var bool $isPublic Determines whether to use public interface objects or internal interface objects
43
-     */
44
-    private bool $isPublic = false;
45
-
46
-    /**
47
-     * WebStart constructor.
48
-     *
49
-     * @param SiteConfiguration $configuration The site configuration
50
-     * @param IRequestRouter    $router        The request router to use
51
-     */
52
-    public function __construct(SiteConfiguration $configuration, IRequestRouter $router)
53
-    {
54
-        parent::__construct($configuration);
55
-
56
-        $this->requestRouter = $router;
57
-    }
58
-
59
-    /**
60
-     * @param ITask             $page
61
-     * @param SiteConfiguration $siteConfiguration
62
-     * @param PdoDatabase       $database
63
-     *
64
-     * @return void
65
-     */
66
-    protected function setupHelpers(
67
-        ITask $page,
68
-        SiteConfiguration $siteConfiguration,
69
-        PdoDatabase $database
70
-    ) {
71
-        parent::setupHelpers($page, $siteConfiguration, $database);
72
-
73
-        if ($page instanceof PageBase) {
74
-            $page->setTokenManager(new TokenManager());
75
-            $page->setCspManager(new ContentSecurityPolicyManager($siteConfiguration));
76
-
77
-            if ($page instanceof InternalPageBase) {
78
-                $page->setTypeAheadHelper(new TypeAheadHelper());
79
-
80
-                $identificationVerifier = new IdentificationVerifier($page->getHttpHelper(), $siteConfiguration, $database);
81
-                $page->setSecurityManager(new SecurityManager($identificationVerifier, new RoleConfiguration()));
82
-
83
-                if ($siteConfiguration->getTitleBlacklistEnabled()) {
84
-                    $page->setBlacklistHelper(new BlacklistHelper($page->getHttpHelper(), $database, $siteConfiguration));
85
-                }
86
-                else {
87
-                    $page->setBlacklistHelper(new FakeBlacklistHelper());
88
-                }
89
-
90
-                $page->setDomainAccessManager(new DomainAccessManager($page->getSecurityManager()));
91
-            }
92
-        }
93
-    }
94
-
95
-    /**
96
-     * Application entry point.
97
-     *
98
-     * Sets up the environment and runs the application, performing any global cleanup operations when done.
99
-     */
100
-    public function run()
101
-    {
102
-        try {
103
-            if ($this->setupEnvironment()) {
104
-                $this->main();
105
-            }
106
-        }
107
-        catch (EnvironmentException $ex) {
108
-            ob_end_clean();
109
-            print Offline::getOfflineMessage($this->isPublic(), $this->getConfiguration(), $ex->getMessage());
110
-        }
111
-            /** @noinspection PhpRedundantCatchClauseInspection */
112
-        catch (ReadableException $ex) {
113
-            ob_end_clean();
114
-            print $ex->getReadableError();
115
-        }
116
-        finally {
117
-            $this->cleanupEnvironment();
118
-        }
119
-    }
120
-
121
-    /**
122
-     * Environment setup
123
-     *
124
-     * This method initialises the tool environment. If the tool cannot be initialised correctly, it will return false
125
-     * and shut down prematurely.
126
-     *
127
-     * @return bool
128
-     * @throws EnvironmentException
129
-     */
130
-    protected function setupEnvironment()
131
-    {
132
-        // initialise global exception handler
133
-        set_exception_handler(array(ExceptionHandler::class, 'exceptionHandler'));
134
-        set_error_handler(array(ExceptionHandler::class, 'errorHandler'), E_RECOVERABLE_ERROR);
135
-
136
-        // start output buffering if necessary
137
-        if (ob_get_level() === 0) {
138
-            ob_start();
139
-        }
140
-
141
-        // initialise super-global providers
142
-        WebRequest::setGlobalStateProvider(new GlobalStateProvider());
143
-
144
-        if (Offline::isOffline($this->getConfiguration())) {
145
-            print Offline::getOfflineMessage($this->isPublic(), $this->getConfiguration());
146
-            ob_end_flush();
147
-
148
-            return false;
149
-        }
150
-
151
-        // Call parent setup
152
-        if (!parent::setupEnvironment()) {
153
-            return false;
154
-        }
155
-
156
-        // Start up sessions
157
-        ini_set('session.cookie_path', $this->getConfiguration()->getCookiePath());
158
-        ini_set('session.name', $this->getConfiguration()->getCookieSessionName());
159
-        Session::start();
160
-
161
-        // Check the user is allowed to be logged in still. This must be before we call any user-loading functions and
162
-        // get the current user cached.
163
-        // I'm not sure if this function call being here is particularly a good thing, but it's part of starting up a
164
-        // session I suppose.
165
-        $this->checkForceLogout();
166
-
167
-        // environment initialised!
168
-        return true;
169
-    }
170
-
171
-    /**
172
-     * Main application logic
173
-     */
174
-    protected function main()
175
-    {
176
-        // Get the right route for the request
177
-        $page = $this->requestRouter->route();
178
-
179
-        $siteConfiguration = $this->getConfiguration();
180
-        $database = PdoDatabase::getDatabaseConnection($this->getConfiguration());
181
-
182
-        $this->setupHelpers($page, $siteConfiguration, $database);
183
-
184
-        // run the route code for the request.
185
-        $page->execute();
186
-    }
187
-
188
-    /**
189
-     * Any cleanup tasks should go here
190
-     *
191
-     * Note that we need to be very careful here, as exceptions may have been thrown and handled.
192
-     * This should *only* be for cleaning up, no logic should go here.
193
-     */
194
-    protected function cleanupEnvironment()
195
-    {
196
-        // Clean up anything we splurged after sending the page.
197
-        if (ob_get_level() > 0) {
198
-            for ($i = ob_get_level(); $i > 0; $i--) {
199
-                ob_end_clean();
200
-            }
201
-        }
202
-    }
203
-
204
-    private function checkForceLogout()
205
-    {
206
-        $database = PdoDatabase::getDatabaseConnection($this->getConfiguration());
207
-
208
-        $sessionUserId = WebRequest::getSessionUserId();
209
-        iF ($sessionUserId === null) {
210
-            return;
211
-        }
212
-
213
-        // Note, User::getCurrent() caches it's result, which we *really* don't want to trigger.
214
-        $currentUser = User::getById($sessionUserId, $database);
215
-
216
-        if ($currentUser === false) {
217
-            // Umm... this user has a session cookie with a userId set, but no user exists...
218
-            Session::restart();
219
-
220
-            $currentUser = User::getCurrent($database);
221
-        }
222
-
223
-        if ($currentUser->getForceLogout()) {
224
-            Session::restart();
225
-
226
-            $currentUser->setForceLogout(false);
227
-            $currentUser->save();
228
-        }
229
-    }
230
-
231
-    public function isPublic(): bool
232
-    {
233
-        return $this->isPublic;
234
-    }
235
-
236
-    public function setPublic(bool $isPublic): void
237
-    {
238
-        $this->isPublic = $isPublic;
239
-    }
36
+	/**
37
+	 * @var IRequestRouter $requestRouter The request router to use. Note that different entry points have different
38
+	 *                                    routers and hence different URL mappings
39
+	 */
40
+	private $requestRouter;
41
+	/**
42
+	 * @var bool $isPublic Determines whether to use public interface objects or internal interface objects
43
+	 */
44
+	private bool $isPublic = false;
45
+
46
+	/**
47
+	 * WebStart constructor.
48
+	 *
49
+	 * @param SiteConfiguration $configuration The site configuration
50
+	 * @param IRequestRouter    $router        The request router to use
51
+	 */
52
+	public function __construct(SiteConfiguration $configuration, IRequestRouter $router)
53
+	{
54
+		parent::__construct($configuration);
55
+
56
+		$this->requestRouter = $router;
57
+	}
58
+
59
+	/**
60
+	 * @param ITask             $page
61
+	 * @param SiteConfiguration $siteConfiguration
62
+	 * @param PdoDatabase       $database
63
+	 *
64
+	 * @return void
65
+	 */
66
+	protected function setupHelpers(
67
+		ITask $page,
68
+		SiteConfiguration $siteConfiguration,
69
+		PdoDatabase $database
70
+	) {
71
+		parent::setupHelpers($page, $siteConfiguration, $database);
72
+
73
+		if ($page instanceof PageBase) {
74
+			$page->setTokenManager(new TokenManager());
75
+			$page->setCspManager(new ContentSecurityPolicyManager($siteConfiguration));
76
+
77
+			if ($page instanceof InternalPageBase) {
78
+				$page->setTypeAheadHelper(new TypeAheadHelper());
79
+
80
+				$identificationVerifier = new IdentificationVerifier($page->getHttpHelper(), $siteConfiguration, $database);
81
+				$page->setSecurityManager(new SecurityManager($identificationVerifier, new RoleConfiguration()));
82
+
83
+				if ($siteConfiguration->getTitleBlacklistEnabled()) {
84
+					$page->setBlacklistHelper(new BlacklistHelper($page->getHttpHelper(), $database, $siteConfiguration));
85
+				}
86
+				else {
87
+					$page->setBlacklistHelper(new FakeBlacklistHelper());
88
+				}
89
+
90
+				$page->setDomainAccessManager(new DomainAccessManager($page->getSecurityManager()));
91
+			}
92
+		}
93
+	}
94
+
95
+	/**
96
+	 * Application entry point.
97
+	 *
98
+	 * Sets up the environment and runs the application, performing any global cleanup operations when done.
99
+	 */
100
+	public function run()
101
+	{
102
+		try {
103
+			if ($this->setupEnvironment()) {
104
+				$this->main();
105
+			}
106
+		}
107
+		catch (EnvironmentException $ex) {
108
+			ob_end_clean();
109
+			print Offline::getOfflineMessage($this->isPublic(), $this->getConfiguration(), $ex->getMessage());
110
+		}
111
+			/** @noinspection PhpRedundantCatchClauseInspection */
112
+		catch (ReadableException $ex) {
113
+			ob_end_clean();
114
+			print $ex->getReadableError();
115
+		}
116
+		finally {
117
+			$this->cleanupEnvironment();
118
+		}
119
+	}
120
+
121
+	/**
122
+	 * Environment setup
123
+	 *
124
+	 * This method initialises the tool environment. If the tool cannot be initialised correctly, it will return false
125
+	 * and shut down prematurely.
126
+	 *
127
+	 * @return bool
128
+	 * @throws EnvironmentException
129
+	 */
130
+	protected function setupEnvironment()
131
+	{
132
+		// initialise global exception handler
133
+		set_exception_handler(array(ExceptionHandler::class, 'exceptionHandler'));
134
+		set_error_handler(array(ExceptionHandler::class, 'errorHandler'), E_RECOVERABLE_ERROR);
135
+
136
+		// start output buffering if necessary
137
+		if (ob_get_level() === 0) {
138
+			ob_start();
139
+		}
140
+
141
+		// initialise super-global providers
142
+		WebRequest::setGlobalStateProvider(new GlobalStateProvider());
143
+
144
+		if (Offline::isOffline($this->getConfiguration())) {
145
+			print Offline::getOfflineMessage($this->isPublic(), $this->getConfiguration());
146
+			ob_end_flush();
147
+
148
+			return false;
149
+		}
150
+
151
+		// Call parent setup
152
+		if (!parent::setupEnvironment()) {
153
+			return false;
154
+		}
155
+
156
+		// Start up sessions
157
+		ini_set('session.cookie_path', $this->getConfiguration()->getCookiePath());
158
+		ini_set('session.name', $this->getConfiguration()->getCookieSessionName());
159
+		Session::start();
160
+
161
+		// Check the user is allowed to be logged in still. This must be before we call any user-loading functions and
162
+		// get the current user cached.
163
+		// I'm not sure if this function call being here is particularly a good thing, but it's part of starting up a
164
+		// session I suppose.
165
+		$this->checkForceLogout();
166
+
167
+		// environment initialised!
168
+		return true;
169
+	}
170
+
171
+	/**
172
+	 * Main application logic
173
+	 */
174
+	protected function main()
175
+	{
176
+		// Get the right route for the request
177
+		$page = $this->requestRouter->route();
178
+
179
+		$siteConfiguration = $this->getConfiguration();
180
+		$database = PdoDatabase::getDatabaseConnection($this->getConfiguration());
181
+
182
+		$this->setupHelpers($page, $siteConfiguration, $database);
183
+
184
+		// run the route code for the request.
185
+		$page->execute();
186
+	}
187
+
188
+	/**
189
+	 * Any cleanup tasks should go here
190
+	 *
191
+	 * Note that we need to be very careful here, as exceptions may have been thrown and handled.
192
+	 * This should *only* be for cleaning up, no logic should go here.
193
+	 */
194
+	protected function cleanupEnvironment()
195
+	{
196
+		// Clean up anything we splurged after sending the page.
197
+		if (ob_get_level() > 0) {
198
+			for ($i = ob_get_level(); $i > 0; $i--) {
199
+				ob_end_clean();
200
+			}
201
+		}
202
+	}
203
+
204
+	private function checkForceLogout()
205
+	{
206
+		$database = PdoDatabase::getDatabaseConnection($this->getConfiguration());
207
+
208
+		$sessionUserId = WebRequest::getSessionUserId();
209
+		iF ($sessionUserId === null) {
210
+			return;
211
+		}
212
+
213
+		// Note, User::getCurrent() caches it's result, which we *really* don't want to trigger.
214
+		$currentUser = User::getById($sessionUserId, $database);
215
+
216
+		if ($currentUser === false) {
217
+			// Umm... this user has a session cookie with a userId set, but no user exists...
218
+			Session::restart();
219
+
220
+			$currentUser = User::getCurrent($database);
221
+		}
222
+
223
+		if ($currentUser->getForceLogout()) {
224
+			Session::restart();
225
+
226
+			$currentUser->setForceLogout(false);
227
+			$currentUser->save();
228
+		}
229
+	}
230
+
231
+	public function isPublic(): bool
232
+	{
233
+		return $this->isPublic;
234
+	}
235
+
236
+	public function setPublic(bool $isPublic): void
237
+	{
238
+		$this->isPublic = $isPublic;
239
+	}
240 240
 }
Please login to merge, or discard this patch.
includes/Pages/PageWelcomeTemplateManagement.php 2 patches
Indentation   +191 added lines, -191 removed lines patch added patch discarded remove patch
@@ -22,258 +22,258 @@
 block discarded – undo
22 22
 
23 23
 class PageWelcomeTemplateManagement extends InternalPageBase
24 24
 {
25
-    /**
26
-     * Main function for this page, when no specific actions are called.
27
-     * @return void
28
-     */
29
-    protected function main()
30
-    {
31
-        $database = $this->getDatabase();
32
-        $templateList = WelcomeTemplate::getAll($database, 1); // FIXME: domains
33
-        $preferenceManager = PreferenceManager::getForCurrent($database);
25
+	/**
26
+	 * Main function for this page, when no specific actions are called.
27
+	 * @return void
28
+	 */
29
+	protected function main()
30
+	{
31
+		$database = $this->getDatabase();
32
+		$templateList = WelcomeTemplate::getAll($database, 1); // FIXME: domains
33
+		$preferenceManager = PreferenceManager::getForCurrent($database);
34 34
 
35
-        $this->setHtmlTitle('Welcome Templates');
35
+		$this->setHtmlTitle('Welcome Templates');
36 36
 
37
-        $this->assignCSRFToken();
37
+		$this->assignCSRFToken();
38 38
 
39
-        $user = User::getCurrent($database);
39
+		$user = User::getCurrent($database);
40 40
 
41
-        $currentTemplate = $preferenceManager->getPreference(PreferenceManager::PREF_WELCOMETEMPLATE);
42
-        $this->assign('currentTemplate', $currentTemplate);
41
+		$currentTemplate = $preferenceManager->getPreference(PreferenceManager::PREF_WELCOMETEMPLATE);
42
+		$this->assign('currentTemplate', $currentTemplate);
43 43
 
44
-        $this->assign('canEdit', $this->barrierTest('edit', $user));
45
-        $this->assign('canAdd', $this->barrierTest('add', $user));
46
-        $this->assign('canSelect', $this->barrierTest('select', $user));
44
+		$this->assign('canEdit', $this->barrierTest('edit', $user));
45
+		$this->assign('canAdd', $this->barrierTest('add', $user));
46
+		$this->assign('canSelect', $this->barrierTest('select', $user));
47 47
 
48
-        $this->assign('templateList', $templateList);
49
-        $this->setTemplate('welcome-template/list.tpl');
50
-    }
48
+		$this->assign('templateList', $templateList);
49
+		$this->setTemplate('welcome-template/list.tpl');
50
+	}
51 51
 
52
-    /**
53
-     * Handles the requests for selecting a template to use.
54
-     *
55
-     * @throws ApplicationLogicException
56
-     */
57
-    protected function select()
58
-    {
59
-        // get rid of GETs
60
-        if (!WebRequest::wasPosted()) {
61
-            $this->redirect('welcomeTemplates');
62
-        }
52
+	/**
53
+	 * Handles the requests for selecting a template to use.
54
+	 *
55
+	 * @throws ApplicationLogicException
56
+	 */
57
+	protected function select()
58
+	{
59
+		// get rid of GETs
60
+		if (!WebRequest::wasPosted()) {
61
+			$this->redirect('welcomeTemplates');
62
+		}
63 63
 
64
-        $this->validateCSRFToken();
64
+		$this->validateCSRFToken();
65 65
 
66
-        $database = $this->getDatabase();
67
-        $user = User::getCurrent($database);
68
-        $preferenceManager = PreferenceManager::getForCurrent($database);
66
+		$database = $this->getDatabase();
67
+		$user = User::getCurrent($database);
68
+		$preferenceManager = PreferenceManager::getForCurrent($database);
69 69
 
70
-        if (WebRequest::postBoolean('disable')) {
71
-            $preferenceManager->setLocalPreference(PreferenceManager::PREF_WELCOMETEMPLATE, null);
70
+		if (WebRequest::postBoolean('disable')) {
71
+			$preferenceManager->setLocalPreference(PreferenceManager::PREF_WELCOMETEMPLATE, null);
72 72
 
73
-            SessionAlert::success('Disabled automatic user welcoming.');
74
-            $this->redirect('welcomeTemplates');
73
+			SessionAlert::success('Disabled automatic user welcoming.');
74
+			$this->redirect('welcomeTemplates');
75 75
 
76
-            return;
77
-        }
76
+			return;
77
+		}
78 78
 
79
-        $templateId = WebRequest::postInt('template');
80
-        /** @var false|WelcomeTemplate $template */
81
-        $template = WelcomeTemplate::getById($templateId, $database);
79
+		$templateId = WebRequest::postInt('template');
80
+		/** @var false|WelcomeTemplate $template */
81
+		$template = WelcomeTemplate::getById($templateId, $database);
82 82
 
83
-        if ($template === false || $template->isDeleted()) {
84
-            throw new ApplicationLogicException('Unknown template');
85
-        }
83
+		if ($template === false || $template->isDeleted()) {
84
+			throw new ApplicationLogicException('Unknown template');
85
+		}
86 86
 
87
-        $preferenceManager->setLocalPreference(PreferenceManager::PREF_WELCOMETEMPLATE, $template->getId());
87
+		$preferenceManager->setLocalPreference(PreferenceManager::PREF_WELCOMETEMPLATE, $template->getId());
88 88
 
89
-        SessionAlert::success("Updated selected welcome template for automatic welcoming.");
89
+		SessionAlert::success("Updated selected welcome template for automatic welcoming.");
90 90
 
91
-        $this->redirect('welcomeTemplates');
92
-    }
91
+		$this->redirect('welcomeTemplates');
92
+	}
93 93
 
94
-    /**
95
-     * Handles the requests for viewing a template.
96
-     *
97
-     * @throws ApplicationLogicException
98
-     */
99
-    protected function view()
100
-    {
101
-        $this->setHtmlTitle('View Welcome Template');
94
+	/**
95
+	 * Handles the requests for viewing a template.
96
+	 *
97
+	 * @throws ApplicationLogicException
98
+	 */
99
+	protected function view()
100
+	{
101
+		$this->setHtmlTitle('View Welcome Template');
102 102
 
103
-        $database = $this->getDatabase();
103
+		$database = $this->getDatabase();
104 104
 
105
-        $templateId = WebRequest::getInt('template');
105
+		$templateId = WebRequest::getInt('template');
106 106
 
107
-        /** @var false|WelcomeTemplate $template */
108
-        $template = WelcomeTemplate::getById($templateId, $database);
107
+		/** @var false|WelcomeTemplate $template */
108
+		$template = WelcomeTemplate::getById($templateId, $database);
109 109
 
110
-        if ($template === false) {
111
-            throw new ApplicationLogicException('Cannot find requested template');
112
-        }
110
+		if ($template === false) {
111
+			throw new ApplicationLogicException('Cannot find requested template');
112
+		}
113 113
 
114
-        $currentUser = User::getCurrent($database);
114
+		$currentUser = User::getCurrent($database);
115 115
 
116
-        // This includes a section header, because we use the "new section" API call.
117
-        $wikiText = "== " . $template->getSectionHeader() . "==\n" . $template->getBotCodeForWikiSave('Example User', $currentUser->getOnWikiName());
116
+		// This includes a section header, because we use the "new section" API call.
117
+		$wikiText = "== " . $template->getSectionHeader() . "==\n" . $template->getBotCodeForWikiSave('Example User', $currentUser->getOnWikiName());
118 118
 
119
-        $oauth = new OAuthUserHelper($currentUser, $database, $this->getOauthProtocolHelper(),
120
-            $this->getSiteConfiguration());
121
-        $mediaWikiHelper = new MediaWikiHelper($oauth, $this->getSiteConfiguration());
119
+		$oauth = new OAuthUserHelper($currentUser, $database, $this->getOauthProtocolHelper(),
120
+			$this->getSiteConfiguration());
121
+		$mediaWikiHelper = new MediaWikiHelper($oauth, $this->getSiteConfiguration());
122 122
 
123
-        $templateHtml = $mediaWikiHelper->getHtmlForWikiText($wikiText);
123
+		$templateHtml = $mediaWikiHelper->getHtmlForWikiText($wikiText);
124 124
         
125
-        // Add site to relevant links, since the MediaWiki parser returns, eg, `/wiki/Help:Introduction`
126
-        // and we want to link to <https://en.wikipedia.org/wiki/Help:Introduction> rather than
127
-        // <https://accounts.wmflabs.org/wiki/Help:Introduction>
128
-        // The code currently assumes that the template was parsed for enwiki, and will need to be
129
-        // updated once other wikis are supported.
130
-        $templateHtml = preg_replace('/(<a href=")(\/wiki\/)/', '$1//en.wikipedia.org$2', $templateHtml);
131
-
132
-        $this->assign('templateHtml', $templateHtml);
133
-        $this->assign('template', $template);
134
-        $this->setTemplate('welcome-template/view.tpl');
135
-    }
136
-
137
-    /**
138
-     * Handler for the add action to create a new welcome template
139
-     *
140
-     * @throws Exception
141
-     */
142
-    protected function add()
143
-    {
144
-        $this->assign('createmode', true);
125
+		// Add site to relevant links, since the MediaWiki parser returns, eg, `/wiki/Help:Introduction`
126
+		// and we want to link to <https://en.wikipedia.org/wiki/Help:Introduction> rather than
127
+		// <https://accounts.wmflabs.org/wiki/Help:Introduction>
128
+		// The code currently assumes that the template was parsed for enwiki, and will need to be
129
+		// updated once other wikis are supported.
130
+		$templateHtml = preg_replace('/(<a href=")(\/wiki\/)/', '$1//en.wikipedia.org$2', $templateHtml);
131
+
132
+		$this->assign('templateHtml', $templateHtml);
133
+		$this->assign('template', $template);
134
+		$this->setTemplate('welcome-template/view.tpl');
135
+	}
136
+
137
+	/**
138
+	 * Handler for the add action to create a new welcome template
139
+	 *
140
+	 * @throws Exception
141
+	 */
142
+	protected function add()
143
+	{
144
+		$this->assign('createmode', true);
145 145
 
146
-        if (WebRequest::wasPosted()) {
147
-            $this->validateCSRFToken();
148
-            $database = $this->getDatabase();
146
+		if (WebRequest::wasPosted()) {
147
+			$this->validateCSRFToken();
148
+			$database = $this->getDatabase();
149 149
 
150
-            $userCode = WebRequest::postString('usercode');
151
-            $botCode = WebRequest::postString('botcode');
150
+			$userCode = WebRequest::postString('usercode');
151
+			$botCode = WebRequest::postString('botcode');
152 152
 
153
-            $this->validate($userCode, $botCode);
153
+			$this->validate($userCode, $botCode);
154 154
 
155
-            $template = new WelcomeTemplate();
156
-            $template->setDatabase($database);
157
-            $template->setUserCode($userCode);
158
-            $template->setBotCode($botCode);
159
-            $template->setDomain(1); // FIXME: domains!
160
-            $template->save();
155
+			$template = new WelcomeTemplate();
156
+			$template->setDatabase($database);
157
+			$template->setUserCode($userCode);
158
+			$template->setBotCode($botCode);
159
+			$template->setDomain(1); // FIXME: domains!
160
+			$template->save();
161 161
 
162
-            Logger::welcomeTemplateCreated($database, $template);
162
+			Logger::welcomeTemplateCreated($database, $template);
163 163
 
164
-            $this->getNotificationHelper()->welcomeTemplateCreated($template);
164
+			$this->getNotificationHelper()->welcomeTemplateCreated($template);
165 165
 
166
-            SessionAlert::success("Template successfully created.");
166
+			SessionAlert::success("Template successfully created.");
167 167
 
168
-            $this->redirect('welcomeTemplates');
169
-        }
170
-        else {
171
-            $this->assignCSRFToken();
172
-            $this->assign('template', new WelcomeTemplate());
173
-            $this->setTemplate("welcome-template/edit.tpl");
174
-        }
175
-    }
168
+			$this->redirect('welcomeTemplates');
169
+		}
170
+		else {
171
+			$this->assignCSRFToken();
172
+			$this->assign('template', new WelcomeTemplate());
173
+			$this->setTemplate("welcome-template/edit.tpl");
174
+		}
175
+	}
176 176
 
177
-    /**
178
-     * Handler for editing templates
179
-     */
180
-    protected function edit()
181
-    {
182
-        $database = $this->getDatabase();
177
+	/**
178
+	 * Handler for editing templates
179
+	 */
180
+	protected function edit()
181
+	{
182
+		$database = $this->getDatabase();
183 183
 
184
-        $templateId = WebRequest::getInt('template');
184
+		$templateId = WebRequest::getInt('template');
185 185
 
186
-        /** @var false|WelcomeTemplate $template */
187
-        $template = WelcomeTemplate::getById($templateId, $database);
186
+		/** @var false|WelcomeTemplate $template */
187
+		$template = WelcomeTemplate::getById($templateId, $database);
188 188
 
189
-        if ($template === false) {
190
-            throw new ApplicationLogicException('Cannot find requested template');
191
-        }
189
+		if ($template === false) {
190
+			throw new ApplicationLogicException('Cannot find requested template');
191
+		}
192 192
 
193
-        if ($template->isDeleted()) {
194
-            throw new ApplicationLogicException('The specified template has been deleted');
195
-        }
193
+		if ($template->isDeleted()) {
194
+			throw new ApplicationLogicException('The specified template has been deleted');
195
+		}
196 196
 
197
-        $this->assign('createmode', false);
197
+		$this->assign('createmode', false);
198 198
 
199
-        if (WebRequest::wasPosted()) {
200
-            $this->validateCSRFToken();
199
+		if (WebRequest::wasPosted()) {
200
+			$this->validateCSRFToken();
201 201
 
202
-            $userCode = WebRequest::postString('usercode');
203
-            $botCode = WebRequest::postString('botcode');
202
+			$userCode = WebRequest::postString('usercode');
203
+			$botCode = WebRequest::postString('botcode');
204 204
 
205
-            $this->validate($userCode, $botCode);
205
+			$this->validate($userCode, $botCode);
206 206
 
207
-            $template->setUserCode($userCode);
208
-            $template->setBotCode($botCode);
209
-            $template->setUpdateVersion(WebRequest::postInt('updateversion'));
210
-            $template->save();
207
+			$template->setUserCode($userCode);
208
+			$template->setBotCode($botCode);
209
+			$template->setUpdateVersion(WebRequest::postInt('updateversion'));
210
+			$template->save();
211 211
 
212
-            Logger::welcomeTemplateEdited($database, $template);
212
+			Logger::welcomeTemplateEdited($database, $template);
213 213
 
214
-            SessionAlert::success("Template updated.");
214
+			SessionAlert::success("Template updated.");
215 215
 
216
-            $this->getNotificationHelper()->welcomeTemplateEdited($template);
216
+			$this->getNotificationHelper()->welcomeTemplateEdited($template);
217 217
 
218
-            $this->redirect('welcomeTemplates');
219
-        }
220
-        else {
221
-            $this->assignCSRFToken();
222
-            $this->assign('template', $template);
223
-            $this->setTemplate('welcome-template/edit.tpl');
224
-        }
225
-    }
218
+			$this->redirect('welcomeTemplates');
219
+		}
220
+		else {
221
+			$this->assignCSRFToken();
222
+			$this->assign('template', $template);
223
+			$this->setTemplate('welcome-template/edit.tpl');
224
+		}
225
+	}
226 226
 
227
-    protected function delete()
228
-    {
229
-        if (!WebRequest::wasPosted()) {
230
-            $this->redirect('welcomeTemplates');
231
-            return;
232
-        }
227
+	protected function delete()
228
+	{
229
+		if (!WebRequest::wasPosted()) {
230
+			$this->redirect('welcomeTemplates');
231
+			return;
232
+		}
233 233
 
234
-        $this->validateCSRFToken();
234
+		$this->validateCSRFToken();
235 235
 
236
-        $database = $this->getDatabase();
236
+		$database = $this->getDatabase();
237 237
 
238
-        $templateId = WebRequest::postInt('template');
239
-        $updateVersion = WebRequest::postInt('updateversion');
238
+		$templateId = WebRequest::postInt('template');
239
+		$updateVersion = WebRequest::postInt('updateversion');
240 240
 
241
-        /** @var false|WelcomeTemplate $template */
242
-        $template = WelcomeTemplate::getById($templateId, $database);
241
+		/** @var false|WelcomeTemplate $template */
242
+		$template = WelcomeTemplate::getById($templateId, $database);
243 243
 
244
-        if ($template === false || $template->isDeleted()) {
245
-            throw new ApplicationLogicException('Cannot find requested template');
246
-        }
244
+		if ($template === false || $template->isDeleted()) {
245
+			throw new ApplicationLogicException('Cannot find requested template');
246
+		}
247 247
 
248
-        // set the update version to the version sent by the client (optimisticly lock from initial page load)
249
-        $template->setUpdateVersion($updateVersion);
248
+		// set the update version to the version sent by the client (optimisticly lock from initial page load)
249
+		$template->setUpdateVersion($updateVersion);
250 250
 
251
-        $database
252
-            ->prepare("UPDATE userpreference SET value = NULL, updateversion = updateversion + 1 WHERE preference = :pref and value = :id;")
253
-            ->execute([
254
-                ':id'   => $templateId,
255
-                ':pref' => PreferenceManager::PREF_WELCOMETEMPLATE
256
-            ]);
251
+		$database
252
+			->prepare("UPDATE userpreference SET value = NULL, updateversion = updateversion + 1 WHERE preference = :pref and value = :id;")
253
+			->execute([
254
+				':id'   => $templateId,
255
+				':pref' => PreferenceManager::PREF_WELCOMETEMPLATE
256
+			]);
257 257
 
258
-        Logger::welcomeTemplateDeleted($database, $template);
258
+		Logger::welcomeTemplateDeleted($database, $template);
259 259
 
260
-        $template->delete();
260
+		$template->delete();
261 261
 
262
-        $this->redirect('welcomeTemplates');
262
+		$this->redirect('welcomeTemplates');
263 263
 
264
-        SessionAlert::success(
265
-            "Template deleted. Any users who were using this template have had automatic welcoming disabled.");
266
-        $this->getNotificationHelper()->welcomeTemplateDeleted($templateId);
267
-    }
264
+		SessionAlert::success(
265
+			"Template deleted. Any users who were using this template have had automatic welcoming disabled.");
266
+		$this->getNotificationHelper()->welcomeTemplateDeleted($templateId);
267
+	}
268 268
 
269
-    private function validate($userCode, $botCode)
270
-    {
271
-        if ($userCode === null) {
272
-            throw new ApplicationLogicException('User code cannot be null');
273
-        }
269
+	private function validate($userCode, $botCode)
270
+	{
271
+		if ($userCode === null) {
272
+			throw new ApplicationLogicException('User code cannot be null');
273
+		}
274 274
 
275
-        if ($botCode === null) {
276
-            throw new ApplicationLogicException('Bot code cannot be null');
277
-        }
278
-    }
275
+		if ($botCode === null) {
276
+			throw new ApplicationLogicException('Bot code cannot be null');
277
+		}
278
+	}
279 279
 }
Please login to merge, or discard this patch.
Braces   +2 added lines, -4 removed lines patch added patch discarded remove patch
@@ -166,8 +166,7 @@  discard block
 block discarded – undo
166 166
             SessionAlert::success("Template successfully created.");
167 167
 
168 168
             $this->redirect('welcomeTemplates');
169
-        }
170
-        else {
169
+        } else {
171 170
             $this->assignCSRFToken();
172 171
             $this->assign('template', new WelcomeTemplate());
173 172
             $this->setTemplate("welcome-template/edit.tpl");
@@ -216,8 +215,7 @@  discard block
 block discarded – undo
216 215
             $this->getNotificationHelper()->welcomeTemplateEdited($template);
217 216
 
218 217
             $this->redirect('welcomeTemplates');
219
-        }
220
-        else {
218
+        } else {
221 219
             $this->assignCSRFToken();
222 220
             $this->assign('template', $template);
223 221
             $this->setTemplate('welcome-template/edit.tpl');
Please login to merge, or discard this patch.
includes/Pages/PageXffDemo.php 1 patch
Indentation   +132 added lines, -132 removed lines patch added patch discarded remove patch
@@ -13,136 +13,136 @@
 block discarded – undo
13 13
 
14 14
 class PageXffDemo extends InternalPageBase
15 15
 {
16
-    use RequestData;
17
-
18
-    /**
19
-     * @inheritDoc
20
-     */
21
-    protected function main()
22
-    {
23
-        $this->setTemplate('xffdemo.tpl');
24
-
25
-        // requestHasForwardedIp == false
26
-        // requestProxyData
27
-        // requestRealIp == proxy
28
-        // requestForwardedIp == xff header
29
-        // forwardedOrigin  == top of the chain, assuming xff is trusted
30
-
31
-
32
-        $this->assign('demo2', [
33
-            [
34
-                'trust' => true,
35
-                'trustedlink' => true,
36
-                'ip' => '172.16.0.164',
37
-                'routable' => false,
38
-
39
-            ], [
40
-                'trust' => true,
41
-                'ip' => '198.51.100.123',
42
-                'routable' => true,
43
-                'rdns' => 'trustedproxy.example.com',
44
-
45
-            ], [
46
-                'trust' => true,
47
-                'ip' => '192.0.2.1',
48
-                'routable' => true,
49
-                'rdns' => 'client.users.example.org',
50
-                'location' => [
51
-                    'cityName' => 'San Francisco',
52
-                    'regionName' => 'California',
53
-                    'countryName' => 'United States'
54
-                ],
55
-                'showlinks' => true
56
-            ]
57
-        ]);
58
-
59
-        $this->assign('demo3', [
60
-            [
61
-                'trust' => true,
62
-                'trustedlink' => true,
63
-                'ip' => '172.16.0.164',
64
-                'routable' => false,
65
-
66
-            ], [
67
-                'trust' => false,
68
-                'ip' => '198.51.100.234',
69
-                'routable' => true,
70
-                'rdns' => 'sketchyproxy.example.com',
71
-                'showlinks' => true
72
-
73
-            ], [
74
-                'trust' => false,
75
-                'ip' => '192.0.2.1',
76
-                'routable' => true,
77
-                'rdns' => 'client.users.example.org',
78
-                'location' => [
79
-                    'cityName' => 'San Francisco',
80
-                    'regionName' => 'California',
81
-                    'countryName' => 'United States'
82
-                ],
83
-                'showlinks' => true
84
-            ]
85
-        ]);
86
-
87
-        $this->assign('demo4', [
88
-            [
89
-                'trust' => true,
90
-                'trustedlink' => true,
91
-                'ip' => '172.16.0.164',
92
-                'routable' => false,
93
-
94
-            ], [
95
-                'trust' => true,
96
-                'ip' => '198.51.100.123',
97
-                'routable' => true,
98
-                'rdns' => 'trustedproxy.example.com',
99
-            ], [
100
-                'trust' => false,
101
-                'ip' => '198.51.100.234',
102
-                'routable' => true,
103
-                'rdns' => 'sketchyproxy.example.com',
104
-                'showlinks' => true
105
-            ], [
106
-                'trust' => false,
107
-                'trustedlink' => true,
108
-                'ip' => '198.51.100.124',
109
-                'routable' => true,
110
-                'rdns' => 'trustedproxy2.example.com',
111
-                'showlinks' => true
112
-            ], [
113
-                'trust' => false,
114
-                'ip' => '192.0.2.1',
115
-                'routable' => true,
116
-                'rdns' => 'client.users.example.org',
117
-                'location' => [
118
-                    'cityName' => 'San Francisco',
119
-                    'regionName' => 'California',
120
-                    'countryName' => 'United States'
121
-                ],
122
-                'showlinks' => true
123
-            ]
124
-        ]);
125
-
126
-        $this->assign('demo1', [
127
-            [
128
-                'trust' => true,
129
-                'trustedlink' => true,
130
-                'ip' => '172.16.0.164',
131
-                'routable' => false,
132
-
133
-            ], [
134
-                'trust' => true,
135
-                'trustedlink' => true,
136
-                'ip' => '192.0.2.1',
137
-                'routable' => true,
138
-                'rdns' => 'client.users.example.org',
139
-                'location' => [
140
-                    'cityName' => 'San Francisco',
141
-                    'regionName' => 'California',
142
-                    'countryName' => 'United States'
143
-                ],
144
-                'showlinks' => true
145
-            ]
146
-        ]);
147
-    }
16
+	use RequestData;
17
+
18
+	/**
19
+	 * @inheritDoc
20
+	 */
21
+	protected function main()
22
+	{
23
+		$this->setTemplate('xffdemo.tpl');
24
+
25
+		// requestHasForwardedIp == false
26
+		// requestProxyData
27
+		// requestRealIp == proxy
28
+		// requestForwardedIp == xff header
29
+		// forwardedOrigin  == top of the chain, assuming xff is trusted
30
+
31
+
32
+		$this->assign('demo2', [
33
+			[
34
+				'trust' => true,
35
+				'trustedlink' => true,
36
+				'ip' => '172.16.0.164',
37
+				'routable' => false,
38
+
39
+			], [
40
+				'trust' => true,
41
+				'ip' => '198.51.100.123',
42
+				'routable' => true,
43
+				'rdns' => 'trustedproxy.example.com',
44
+
45
+			], [
46
+				'trust' => true,
47
+				'ip' => '192.0.2.1',
48
+				'routable' => true,
49
+				'rdns' => 'client.users.example.org',
50
+				'location' => [
51
+					'cityName' => 'San Francisco',
52
+					'regionName' => 'California',
53
+					'countryName' => 'United States'
54
+				],
55
+				'showlinks' => true
56
+			]
57
+		]);
58
+
59
+		$this->assign('demo3', [
60
+			[
61
+				'trust' => true,
62
+				'trustedlink' => true,
63
+				'ip' => '172.16.0.164',
64
+				'routable' => false,
65
+
66
+			], [
67
+				'trust' => false,
68
+				'ip' => '198.51.100.234',
69
+				'routable' => true,
70
+				'rdns' => 'sketchyproxy.example.com',
71
+				'showlinks' => true
72
+
73
+			], [
74
+				'trust' => false,
75
+				'ip' => '192.0.2.1',
76
+				'routable' => true,
77
+				'rdns' => 'client.users.example.org',
78
+				'location' => [
79
+					'cityName' => 'San Francisco',
80
+					'regionName' => 'California',
81
+					'countryName' => 'United States'
82
+				],
83
+				'showlinks' => true
84
+			]
85
+		]);
86
+
87
+		$this->assign('demo4', [
88
+			[
89
+				'trust' => true,
90
+				'trustedlink' => true,
91
+				'ip' => '172.16.0.164',
92
+				'routable' => false,
93
+
94
+			], [
95
+				'trust' => true,
96
+				'ip' => '198.51.100.123',
97
+				'routable' => true,
98
+				'rdns' => 'trustedproxy.example.com',
99
+			], [
100
+				'trust' => false,
101
+				'ip' => '198.51.100.234',
102
+				'routable' => true,
103
+				'rdns' => 'sketchyproxy.example.com',
104
+				'showlinks' => true
105
+			], [
106
+				'trust' => false,
107
+				'trustedlink' => true,
108
+				'ip' => '198.51.100.124',
109
+				'routable' => true,
110
+				'rdns' => 'trustedproxy2.example.com',
111
+				'showlinks' => true
112
+			], [
113
+				'trust' => false,
114
+				'ip' => '192.0.2.1',
115
+				'routable' => true,
116
+				'rdns' => 'client.users.example.org',
117
+				'location' => [
118
+					'cityName' => 'San Francisco',
119
+					'regionName' => 'California',
120
+					'countryName' => 'United States'
121
+				],
122
+				'showlinks' => true
123
+			]
124
+		]);
125
+
126
+		$this->assign('demo1', [
127
+			[
128
+				'trust' => true,
129
+				'trustedlink' => true,
130
+				'ip' => '172.16.0.164',
131
+				'routable' => false,
132
+
133
+			], [
134
+				'trust' => true,
135
+				'trustedlink' => true,
136
+				'ip' => '192.0.2.1',
137
+				'routable' => true,
138
+				'rdns' => 'client.users.example.org',
139
+				'location' => [
140
+					'cityName' => 'San Francisco',
141
+					'regionName' => 'California',
142
+					'countryName' => 'United States'
143
+				],
144
+				'showlinks' => true
145
+			]
146
+		]);
147
+	}
148 148
 }
Please login to merge, or discard this patch.
includes/Pages/PageErrorLogViewer.php 2 patches
Indentation   +123 added lines, -123 removed lines patch added patch discarded remove patch
@@ -14,127 +14,127 @@
 block discarded – undo
14 14
 
15 15
 class PageErrorLogViewer extends InternalPageBase
16 16
 {
17
-    /**
18
-     * @inheritDoc
19
-     */
20
-    protected function main()
21
-    {
22
-        $this->setHtmlTitle('Exception viewer');
23
-
24
-        $user = User::getCurrent($this->getDatabase());
25
-        $this->assign('canView', $this->barrierTest('view', $user));
26
-        $this->assign('canRemove', $this->barrierTest('remove', $user));
27
-
28
-        // Get the list of exception logs from the error log directory
29
-        $errorLogDirectory = $this->getSiteConfiguration()->getErrorLog();
30
-        $files = scandir($errorLogDirectory);
31
-
32
-        // Exclude the files we know should be there
33
-        $filteredFiles = array_filter($files, function($file) {
34
-            return !in_array($file, ['.', '..', 'README.md']);
35
-        });
36
-
37
-        $exceptionDetails = array_map(function($item) use ($errorLogDirectory) {
38
-            $filename = realpath($errorLogDirectory) . DIRECTORY_SEPARATOR . $item;
39
-
40
-            return [
41
-                'id'   => str_replace('.log', '', $item),
42
-                'date' => date('Y-m-d H:i:s', filemtime($filename)),
43
-                'data' => str_replace($this->getSiteConfiguration()->getFilePath(), '.',
44
-                    unserialize(file_get_contents($filename))),
45
-            ];
46
-        }, $filteredFiles);
47
-
48
-        $this->assign('exceptionEntries', $exceptionDetails);
49
-        $this->setTemplate('errorlog/main.tpl');
50
-    }
51
-
52
-    protected function view()
53
-    {
54
-        $this->setHtmlTitle('Exception viewer');
55
-
56
-        $requestedErrorId = WebRequest::getString('id');
57
-        $safeFilename = $this->safetyCheck($requestedErrorId);
58
-
59
-        if ($safeFilename === false) {
60
-            $this->redirect('errorLog');
61
-
62
-            return;
63
-        }
64
-
65
-        // note: at this point we've done sufficient sanity checks that we can be confident this value is safe to echo
66
-        // back to the user.
67
-        $this->assign('id', $requestedErrorId);
68
-        $this->assign('date', date('Y-m-d H:i:s', filemtime($safeFilename)));
69
-
70
-        $data = unserialize(file_get_contents($safeFilename));
71
-        $this->assign('server', $data['server']);
72
-        $this->assign('get', $data['get']);
73
-        $this->assign('post', $data['post']);
74
-
75
-        $this->assign('globalHandler', $data['globalHandler']);
76
-
77
-        $exceptionList = [];
78
-        $current = $data;
79
-        do {
80
-            $ex = [
81
-                'exception' => $current['exception'],
82
-                'message'   => str_replace($this->getSiteConfiguration()->getFilePath(), '.', $current['message']),
83
-                'stack'     => str_replace($this->getSiteConfiguration()->getFilePath(), '.', $current['stack']),
84
-            ];
85
-            $exceptionList[] = $ex;
86
-
87
-            $current = $current['previous'];
88
-        }
89
-        while ($current !== null);
90
-
91
-        $this->assign('exceptionList', $exceptionList);
92
-
93
-        $this->setTemplate('errorlog/details.tpl');
94
-    }
95
-
96
-    public function remove()
97
-    {
98
-        $safeFilename = $this->safetyCheck(WebRequest::getString('id'));
99
-
100
-        if ($safeFilename === false) {
101
-            $this->redirect('errorLog');
102
-
103
-            return;
104
-        }
105
-
106
-        unlink($safeFilename);
107
-
108
-        $this->redirect('errorLog');
109
-
110
-        return;
111
-    }
112
-
113
-    /**
114
-     * @param string|null $requestedErrorId
115
-     *
116
-     * @return bool|string
117
-     */
118
-    protected function safetyCheck(?string $requestedErrorId)
119
-    {
120
-        if ($requestedErrorId === null) {
121
-            return false;
122
-        }
123
-
124
-        // security - only allow hex-encoded filenames, as this is what is generated.
125
-        // This is prefixed with the configured directory. Path traversal is protected against due to . and / not being
126
-        // part of the hex character set.
127
-        if (!preg_match('/^[a-f0-9]{40}$/', $requestedErrorId)) {
128
-            return false;
129
-        }
130
-
131
-        $errorLogDirectory = $this->getSiteConfiguration()->getErrorLog();
132
-        $filename = realpath($errorLogDirectory) . DIRECTORY_SEPARATOR . $requestedErrorId . '.log';
133
-
134
-        if (!file_exists($filename)) {
135
-            return false;
136
-        }
137
-
138
-        return $filename;
139
-    }
17
+	/**
18
+	 * @inheritDoc
19
+	 */
20
+	protected function main()
21
+	{
22
+		$this->setHtmlTitle('Exception viewer');
23
+
24
+		$user = User::getCurrent($this->getDatabase());
25
+		$this->assign('canView', $this->barrierTest('view', $user));
26
+		$this->assign('canRemove', $this->barrierTest('remove', $user));
27
+
28
+		// Get the list of exception logs from the error log directory
29
+		$errorLogDirectory = $this->getSiteConfiguration()->getErrorLog();
30
+		$files = scandir($errorLogDirectory);
31
+
32
+		// Exclude the files we know should be there
33
+		$filteredFiles = array_filter($files, function($file) {
34
+			return !in_array($file, ['.', '..', 'README.md']);
35
+		});
36
+
37
+		$exceptionDetails = array_map(function($item) use ($errorLogDirectory) {
38
+			$filename = realpath($errorLogDirectory) . DIRECTORY_SEPARATOR . $item;
39
+
40
+			return [
41
+				'id'   => str_replace('.log', '', $item),
42
+				'date' => date('Y-m-d H:i:s', filemtime($filename)),
43
+				'data' => str_replace($this->getSiteConfiguration()->getFilePath(), '.',
44
+					unserialize(file_get_contents($filename))),
45
+			];
46
+		}, $filteredFiles);
47
+
48
+		$this->assign('exceptionEntries', $exceptionDetails);
49
+		$this->setTemplate('errorlog/main.tpl');
50
+	}
51
+
52
+	protected function view()
53
+	{
54
+		$this->setHtmlTitle('Exception viewer');
55
+
56
+		$requestedErrorId = WebRequest::getString('id');
57
+		$safeFilename = $this->safetyCheck($requestedErrorId);
58
+
59
+		if ($safeFilename === false) {
60
+			$this->redirect('errorLog');
61
+
62
+			return;
63
+		}
64
+
65
+		// note: at this point we've done sufficient sanity checks that we can be confident this value is safe to echo
66
+		// back to the user.
67
+		$this->assign('id', $requestedErrorId);
68
+		$this->assign('date', date('Y-m-d H:i:s', filemtime($safeFilename)));
69
+
70
+		$data = unserialize(file_get_contents($safeFilename));
71
+		$this->assign('server', $data['server']);
72
+		$this->assign('get', $data['get']);
73
+		$this->assign('post', $data['post']);
74
+
75
+		$this->assign('globalHandler', $data['globalHandler']);
76
+
77
+		$exceptionList = [];
78
+		$current = $data;
79
+		do {
80
+			$ex = [
81
+				'exception' => $current['exception'],
82
+				'message'   => str_replace($this->getSiteConfiguration()->getFilePath(), '.', $current['message']),
83
+				'stack'     => str_replace($this->getSiteConfiguration()->getFilePath(), '.', $current['stack']),
84
+			];
85
+			$exceptionList[] = $ex;
86
+
87
+			$current = $current['previous'];
88
+		}
89
+		while ($current !== null);
90
+
91
+		$this->assign('exceptionList', $exceptionList);
92
+
93
+		$this->setTemplate('errorlog/details.tpl');
94
+	}
95
+
96
+	public function remove()
97
+	{
98
+		$safeFilename = $this->safetyCheck(WebRequest::getString('id'));
99
+
100
+		if ($safeFilename === false) {
101
+			$this->redirect('errorLog');
102
+
103
+			return;
104
+		}
105
+
106
+		unlink($safeFilename);
107
+
108
+		$this->redirect('errorLog');
109
+
110
+		return;
111
+	}
112
+
113
+	/**
114
+	 * @param string|null $requestedErrorId
115
+	 *
116
+	 * @return bool|string
117
+	 */
118
+	protected function safetyCheck(?string $requestedErrorId)
119
+	{
120
+		if ($requestedErrorId === null) {
121
+			return false;
122
+		}
123
+
124
+		// security - only allow hex-encoded filenames, as this is what is generated.
125
+		// This is prefixed with the configured directory. Path traversal is protected against due to . and / not being
126
+		// part of the hex character set.
127
+		if (!preg_match('/^[a-f0-9]{40}$/', $requestedErrorId)) {
128
+			return false;
129
+		}
130
+
131
+		$errorLogDirectory = $this->getSiteConfiguration()->getErrorLog();
132
+		$filename = realpath($errorLogDirectory) . DIRECTORY_SEPARATOR . $requestedErrorId . '.log';
133
+
134
+		if (!file_exists($filename)) {
135
+			return false;
136
+		}
137
+
138
+		return $filename;
139
+	}
140 140
 }
141 141
\ No newline at end of file
Please login to merge, or discard this patch.
Braces   +4 added lines, -2 removed lines patch added patch discarded remove patch
@@ -30,11 +30,13 @@
 block discarded – undo
30 30
         $files = scandir($errorLogDirectory);
31 31
 
32 32
         // Exclude the files we know should be there
33
-        $filteredFiles = array_filter($files, function($file) {
33
+        $filteredFiles = array_filter($files, function($file)
34
+        {
34 35
             return !in_array($file, ['.', '..', 'README.md']);
35 36
         });
36 37
 
37
-        $exceptionDetails = array_map(function($item) use ($errorLogDirectory) {
38
+        $exceptionDetails = array_map(function($item) use ($errorLogDirectory)
39
+        {
38 40
             $filename = realpath($errorLogDirectory) . DIRECTORY_SEPARATOR . $item;
39 41
 
40 42
             return [
Please login to merge, or discard this patch.