[PATCH] Enabling confirm-edit again for smolt

Mike McGrath mmcgrath at redhat.com
Tue Aug 25 18:06:56 UTC 2009


This had gotten disabled during a conversion process of making mediawiki-ConfirmEdit a package I think
These files will enable the math based captcha again
---
 modules/mediawiki-ConfirmEdit/README               |   22 ++
 .../mediawiki-ConfirmEdit/files/ConfirmEdit.php    |  222 ++++++++++++++++++++
 modules/mediawiki-ConfirmEdit/manifests/init.pp    |   13 ++
 modules/mediawiki/manifests/init.pp                |    2 +-
 4 files changed, 258 insertions(+), 1 deletions(-)
 create mode 100644 modules/mediawiki-ConfirmEdit/README
 create mode 100644 modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php
 create mode 100644 modules/mediawiki-ConfirmEdit/manifests/init.pp

diff --git a/modules/mediawiki-ConfirmEdit/README b/modules/mediawiki-ConfirmEdit/README
new file mode 100644
index 0000000..b4f281e
--- /dev/null
+++ b/modules/mediawiki-ConfirmEdit/README
@@ -0,0 +1,22 @@
+=====================
+mediawiki-ConfirmEdit
+=====================
+
+-----------
+Usage
+-----------
+
+The ConfirmEdit extension enables a simple text Captcha that will probably
+catch most bots. It was designed largely by Brion Vibber. The FancyCaptcha and
+reCAPTCHA addons create more complex image captchas.
+
+Captchas are a way of combating automated edits, helping to ensure that wiki
+edits are being made by real humans rather than bots. This can be particularly
+useful for reducing the problem of wiki spam, but captchas reduce accessibility
+and cause inconvenience to human users. In addition, it will not completely
+spam-proof your wiki (nor will it protect it from human spammers). You may wish
+to use this in conjunction with other anti-spam features. Remember to clean up
+any spam which might slip through the net (keep an eye on your 'recent changes'
+page). Captcha's can also be used to foil automated login attempts that try to
+guess passwords.
+
diff --git a/modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php b/modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php
new file mode 100644
index 0000000..0c33bc9
--- /dev/null
+++ b/modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php
@@ -0,0 +1,222 @@
+<?php
+
+
+/**
+ * Experimental captcha plugin framework.
+ * Not intended as a real production captcha system; derived classes
+ * can extend the base to produce their fancy images in place of the
+ * text-based test output here.
+ *
+ * Copyright (C) 2005-2007 Brion Vibber <brion at wikimedia.org>
+ * http://www.mediawiki.org/
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License along
+ * with this program; if not, write to the Free Software Foundation, Inc.,
+ * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+ * http://www.gnu.org/copyleft/gpl.html
+ *
+ * @addtogroup Extensions
+ */
+
+if ( !defined( 'MEDIAWIKI' ) ) {
+	exit;
+}
+
+global $wgExtensionFunctions, $wgGroupPermissions;
+
+$wgExtensionFunctions[] = 'confirmEditSetup';
+$wgExtensionCredits['other'][] = array(
+	'name' => 'ConfirmEdit',
+	'author' => 'Brion Vibber',
+	'svn-date' => '$LastChangedDate: 2008-07-02 23:09:26 +0000 (Wed, 02 Jul 2008) $',
+	'svn-revision' => '$LastChangedRevision: 36959 $',
+	'url' => 'http://www.mediawiki.org/wiki/Extension:ConfirmEdit',
+	'description' => 'Simple captcha implementation',
+	'descriptionmsg' => 'captcha-desc',
+);
+
+/**
+ * The 'skipcaptcha' permission key can be given out to
+ * let known-good users perform triggering actions without
+ * having to go through the captcha.
+ *
+ * By default, sysops and registered bot accounts will be
+ * able to skip, while others have to go through it.
+ */
+$wgGroupPermissions['*'            ]['skipcaptcha'] = false;
+$wgGroupPermissions['user'         ]['skipcaptcha'] = false;
+$wgGroupPermissions['autoconfirmed']['skipcaptcha'] = false;
+$wgGroupPermissions['bot'          ]['skipcaptcha'] = true; // registered bots
+$wgGroupPermissions['sysop'        ]['skipcaptcha'] = true;
+$wgAvailableRights[] = 'skipcaptcha';
+
+/**
+ * List of IP ranges to allow to skip the captcha, similar to the group setting:
+ * "$wgGroupPermission[...]['skipcaptcha'] = true"
+ *
+ * Specific IP addresses or CIDR-style ranges may be used,
+ * for instance:
+ * $wgCaptchaWhitelistIP = array('192.168.1.0/24', '10.1.0.0/16');
+ */
+$wgCaptchaWhitelistIP = false;
+
+global $wgCaptcha, $wgCaptchaClass, $wgCaptchaTriggers;
+$wgCaptcha = null;
+$wgCaptchaClass = 'SimpleCaptcha';
+
+/**
+ * Actions which can trigger a captcha
+ *
+ * If the 'edit' trigger is on, *every* edit will trigger the captcha.
+ * This may be useful for protecting against vandalbot attacks.
+ *
+ * If using the default 'addurl' trigger, the captcha will trigger on
+ * edits that include URLs that aren't in the current version of the page.
+ * This should catch automated linkspammers without annoying people when
+ * they make more typical edits.
+ *
+ * The captcha code should not use $wgCaptchaTriggers, but CaptchaTriggers()
+ * which also takes into account per namespace triggering.
+ */
+$wgCaptchaTriggers = array();
+$wgCaptchaTriggers['edit']          = true; // Would check on every edit
+$wgCaptchaTriggers['create']        = true; // Check on page creation.
+$wgCaptchaTriggers['addurl']        = true;  // Check on edits that add URLs
+$wgCaptchaTriggers['createaccount'] = true;  // Special:Userlogin&type=signup
+$wgCaptchaTriggers['badlogin']      = true;  // Special:Userlogin after failure
+
+/**
+ * You may wish to apply special rules for captcha triggering on some namespaces.
+ * $wgCaptchaTriggersOnNamespace[<namespace id>][<trigger>] forces an always on / 
+ * always off configuration with that trigger for the given namespace.
+ * Leave unset to use the global options ($wgCaptchaTriggers).
+ *
+ * Shall not be used with 'createaccount' (it is not checked).
+ */
+$wgCaptchaTriggersOnNamespace = array();
+
+#Example:
+#$wgCaptchaTriggersOnNamespace[NS_TALK]['create'] = false; //Allow creation of talk pages without captchas.
+#$wgCaptchaTriggersOnNamespace[NS_PROJECT]['edit'] = true; //Show captcha whenever editing Project pages.
+
+/**
+ * Indicate how to store per-session data required to match up the
+ * internal captcha data with the editor.
+ *
+ * 'CaptchaSessionStore' uses PHP's session storage, which is cookie-based
+ * and may fail for anons with cookies disabled.
+ *
+ * 'CaptchaCacheStore' uses $wgMemc, which avoids the cookie dependency
+ * but may be fragile depending on cache configuration.
+ */
+global $wgCaptchaStorageClass;
+$wgCaptchaStorageClass = 'CaptchaSessionStore';
+
+/**
+ * Number of seconds a captcha session should last in the data cache
+ * before expiring when managing through CaptchaCacheStore class.
+ *
+ * Default is a half hour.
+ */
+global $wgCaptchaSessionExpiration;
+$wgCaptchaSessionExpiration = 30 * 60;
+
+/**
+ * Number of seconds after a bad login that a captcha will be shown to
+ * that client on the login form to slow down password-guessing bots.
+ *
+ * Has no effect if 'badlogin' is disabled in $wgCaptchaTriggers or
+ * if there is not a caching engine enabled.
+ *
+ * Default is five minutes.
+ */
+global $wgCaptchaBadLoginExpiration;
+$wgCaptchaBadLoginExpiration = 5 * 60;
+
+/**
+ * Allow users who have confirmed their e-mail addresses to post
+ * URL links without being harassed by the captcha.
+ */
+global $ceAllowConfirmedEmail;
+$ceAllowConfirmedEmail = false;
+
+/** 
+ * Number of bad login attempts before triggering the captcha.  0 means the
+ * captcha is presented on the first login.
+ */
+global $wgCaptchaBadLoginAttempts;
+$wgCaptchaBadLoginAttempts = 3;
+
+/**
+ * Regex to whitelist URLs to known-good sites...
+ * For instance:
+ * $wgCaptchaWhitelist = '#^https?://([a-z0-9-]+\\.)?(wikimedia|wikipedia)\.org/#i';
+ * Local admins can define a whitelist under [[MediaWiki:captcha-addurl-whitelist]]
+ */
+$wgCaptchaWhitelist = false;
+
+/**
+ * Additional regexes to check for. Use full regexes; can match things
+ * other than URLs such as junk edits.
+ *
+ * If the new version matches one and the old version doesn't,
+ * toss up the captcha screen.
+ *
+ * @fixme Add a message for local admins to add items as well.
+ */
+$wgCaptchaRegexes = array();
+
+/** Register special page */
+$wgSpecialPages['Captcha'] = array( /*class*/'CaptchaSpecialPage', /*name*/'Captcha' );
+
+$wgConfirmEditIP = dirname( __FILE__ );
+$wgExtensionMessagesFiles['ConfirmEdit'] = "$wgConfirmEditIP/ConfirmEdit.i18n.php";
+
+if ( defined( 'MW_SUPPORTS_EDITFILTERMERGED' ) ) {
+	$wgHooks['EditFilterMerged'][] = 'ConfirmEditHooks::confirmEditMerged';
+} else {
+	$wgHooks['EditFilter'][] = 'ConfirmEditHooks::confirmEdit';
+}
+$wgHooks['UserCreateForm'][] = 'ConfirmEditHooks::injectUserCreate';
+$wgHooks['AbortNewAccount'][] = 'ConfirmEditHooks::confirmUserCreate';
+$wgHooks['LoginAuthenticateAudit'][] = 'ConfirmEditHooks::triggerUserLogin';
+$wgHooks['UserLoginForm'][] = 'ConfirmEditHooks::injectUserLogin';
+$wgHooks['AbortLogin'][] = 'ConfirmEditHooks::confirmUserLogin';
+# Register API hook
+$wgHooks['APIEditBeforeSave'][] = 'ConfirmEditHooks::confirmEditAPI';
+
+$wgAutoloadClasses['ConfirmEditHooks'] 
+	= $wgAutoloadClasses['SimpleCaptcha'] 
+	= $wgAutoloadClasses['CaptchaSessionStore']
+	= $wgAutoloadClasses['CaptchaCacheStore']
+	= $wgAutoloadClasses['CaptchaSpecialPage']
+	= "$wgConfirmEditIP/ConfirmEdit_body.php";
+
+/**
+ * Set up $wgWhitelistRead
+ */
+function confirmEditSetup() {
+	global $wgGroupPermissions, $wgCaptchaTriggers;
+	if( !$wgGroupPermissions['*']['read'] && $wgCaptchaTriggers['badlogin'] ) {
+		// We need to ensure that the captcha interface is accessible
+		// so that unauthenticated users can actually get in after a
+		// mistaken password typing.
+		global $wgWhitelistRead;
+		$image = Title::makeTitle( NS_SPECIAL, 'Captcha/image' );
+		$help = Title::makeTitle( NS_SPECIAL, 'Captcha/help' );
+		$wgWhitelistRead[] = $image->getPrefixedText();
+		$wgWhitelistRead[] = $help->getPrefixedText();
+	}
+}
+
+
diff --git a/modules/mediawiki-ConfirmEdit/manifests/init.pp b/modules/mediawiki-ConfirmEdit/manifests/init.pp
new file mode 100644
index 0000000..5755cf0
--- /dev/null
+++ b/modules/mediawiki-ConfirmEdit/manifests/init.pp
@@ -0,0 +1,13 @@
+# mediawiki-ConfirmEdit
+
+class mediawiki-ConfirmEdit::ConfirmEdit {
+    package { 'mediawiki-ConfirmEdit' : 
+            ensure => present,
+            require => Package['mediawiki']
+     }
+
+    file { '/usr/share/mediawiki/extensions/ConfirmEdit/ConfirmEdit.php':
+        require => Package['mediawiki-ConfirmEdit'],
+        source => 'puppet:///mediawiki-ConfirmEdit/ConfirmEdit.php'
+    }
+}
diff --git a/modules/mediawiki/manifests/init.pp b/modules/mediawiki/manifests/init.pp
index 6175a45..9606c56 100644
--- a/modules/mediawiki/manifests/init.pp
+++ b/modules/mediawiki/manifests/init.pp
@@ -1,6 +1,7 @@
 class mediawiki::app {
     include httpd::base
     include httpd::php
+    include mediawiki-ConfirmEdit::ConfirmEdit
 
     package { "mediawiki":
         ensure => installed,
@@ -14,7 +15,6 @@ class mediawiki::app {
         "mediawiki-Boilerplate",
         "mediawiki-Cite",
         "mediawiki-Click",
-        "mediawiki-ConfirmEdit",
         "mediawiki-HNP",
         "mediawiki-Lockdown",
         "mediawiki-ParserFunctions",
-- 
1.6.2.5




More information about the Fedora-infrastructure-list mailing list