* https://www.mediawiki.org/ * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. * http://www.gnu.org/copyleft/gpl.html * * @file */ namespace MediaWiki\Page; use InvalidArgumentException; use MediaWiki\CommentStore\CommentStore; use MediaWiki\Context\IContextSource; use MediaWiki\Exception\ErrorPageError; use MediaWiki\HookContainer\HookRunner; use MediaWiki\Html\Html; use MediaWiki\HTMLForm\HTMLForm; use MediaWiki\Language\Language; use MediaWiki\Logging\LogEventsList; use MediaWiki\Logging\LogPage; use MediaWiki\MediaWikiServices; use MediaWiki\Output\OutputPage; use MediaWiki\Permissions\Authority; use MediaWiki\Permissions\PermissionManager; use MediaWiki\Permissions\PermissionStatus; use MediaWiki\Permissions\RestrictionStore; use MediaWiki\Request\WebRequest; use MediaWiki\Title\Title; use MediaWiki\Title\TitleFormatter; use MediaWiki\Watchlist\WatchlistManager; use MediaWiki\Xml\Xml; use MediaWiki\Xml\XmlSelect; use Wikimedia\ParamValidator\TypeDef\ExpiryDef; /** * Handles the page protection UI and backend */ class ProtectionForm { /** @var array A map of action to restriction level, from request or default */ protected $mRestrictions = []; /** @var string The custom/additional protection reason */ protected $mReason = ''; /** @var string The reason selected from the list, blank for other/additional */ protected $mReasonSelection = ''; /** @var bool True if the restrictions are cascading, from request or existing protection */ protected $mCascade = false; /** @var array Map of action to "other" expiry time. Used in preference to mExpirySelection. */ protected $mExpiry = []; /** * @var array Map of action to value selected in expiry drop-down list. * Will be set to 'othertime' whenever mExpiry is set. */ protected $mExpirySelection = []; /** @var PermissionStatus Permissions errors for the protect action */ protected $mPermStatus; /** @var array Types (i.e. actions) for which levels can be selected */ protected $mApplicableTypes = []; /** @var array Map of action to the expiry time of the existing protection */ protected $mExistingExpiry = []; protected Article $mArticle; protected Title $mTitle; protected bool $disabled; protected array $disabledAttrib; private IContextSource $mContext; private WebRequest $mRequest; private Authority $mPerformer; private Language $mLang; private OutputPage $mOut; private PermissionManager $permManager; private HookRunner $hookRunner; private WatchlistManager $watchlistManager; private TitleFormatter $titleFormatter; private RestrictionStore $restrictionStore; public function __construct( Article $article ) { // Set instance variables. $this->mArticle = $article; $this->mTitle = $article->getTitle(); $this->mContext = $article->getContext(); $this->mRequest = $this->mContext->getRequest(); $this->mPerformer = $this->mContext->getAuthority(); $this->mOut = $this->mContext->getOutput(); $this->mLang = $this->mContext->getLanguage(); $services = MediaWikiServices::getInstance(); $this->permManager = $services->getPermissionManager(); $this->hookRunner = new HookRunner( $services->getHookContainer() ); $this->watchlistManager = $services->getWatchlistManager(); $this->titleFormatter = $services->getTitleFormatter(); $this->restrictionStore = $services->getRestrictionStore(); $this->mApplicableTypes = $this->restrictionStore->listApplicableRestrictionTypes( $this->mTitle ); // Check if the form should be disabled. // If it is, the form will be available in read-only to show levels. $this->mPermStatus = PermissionStatus::newEmpty(); if ( $this->mRequest->wasPosted() ) { $this->mPerformer->authorizeWrite( 'protect', $this->mTitle, $this->mPermStatus ); } else { $this->mPerformer->authorizeRead( 'protect', $this->mTitle, $this->mPermStatus ); } $readOnlyMode = $services->getReadOnlyMode(); if ( $readOnlyMode->isReadOnly() ) { $this->mPermStatus->fatal( 'readonlytext', $readOnlyMode->getReason() ); } $this->disabled = !$this->mPermStatus->isGood(); $this->disabledAttrib = $this->disabled ? [ 'disabled' => 'disabled' ] : []; $this->loadData(); } /** * Loads the current state of protection into the object. */ private function loadData() { $levels = $this->permManager->getNamespaceRestrictionLevels( $this->mTitle->getNamespace(), $this->mPerformer->getUser() ); $this->mCascade = $this->restrictionStore->areRestrictionsCascading( $this->mTitle ); $this->mReason = $this->mRequest->getText( 'mwProtect-reason' ); $this->mReasonSelection = $this->mRequest->getText( 'wpProtectReasonSelection' ); $this->mCascade = $this->mRequest->getBool( 'mwProtect-cascade', $this->mCascade ); foreach ( $this->mApplicableTypes as $action ) { // @todo FIXME: This form currently requires individual selections, // but the db allows multiples separated by commas. // Pull the actual restriction from the DB $this->mRestrictions[$action] = implode( '', $this->restrictionStore->getRestrictions( $this->mTitle, $action ) ); if ( !$this->mRestrictions[$action] ) { // No existing expiry $existingExpiry = ''; } else { $existingExpiry = $this->restrictionStore->getRestrictionExpiry( $this->mTitle, $action ); } $this->mExistingExpiry[$action] = $existingExpiry; $requestExpiry = $this->mRequest->getText( "mwProtect-expiry-$action" ); $requestExpirySelection = $this->mRequest->getVal( "wpProtectExpirySelection-$action" ); if ( $requestExpiry ) { // Custom expiry takes precedence $this->mExpiry[$action] = $requestExpiry; $this->mExpirySelection[$action] = 'othertime'; } elseif ( $requestExpirySelection ) { // Expiry selected from list $this->mExpiry[$action] = ''; $this->mExpirySelection[$action] = $requestExpirySelection; } elseif ( $existingExpiry ) { // Use existing expiry in its own list item $this->mExpiry[$action] = ''; $this->mExpirySelection[$action] = $existingExpiry; } else { // Catches 'infinity' - Existing expiry is infinite, use "infinite" in drop-down // Final default: infinite $this->mExpiry[$action] = ''; $this->mExpirySelection[$action] = 'infinite'; } $val = $this->mRequest->getVal( "mwProtect-level-$action" ); if ( $val !== null && in_array( $val, $levels ) ) { $this->mRestrictions[$action] = $val; } } } /** * Get the expiry time for a given action, by combining the relevant inputs. * * @param string $action * @return string|false 14-char timestamp or "infinity", or false if the input was invalid * @todo Non-qualified absolute times are not in users specified timezone * and there isn't notice about it in the UI */ private function getExpiry( $action ) { if ( $this->mExpirySelection[$action] == 'existing' ) { return $this->mExistingExpiry[$action]; } elseif ( $this->mExpirySelection[$action] == 'othertime' ) { $value = $this->mExpiry[$action]; } else { $value = $this->mExpirySelection[$action]; } try { return ExpiryDef::normalizeExpiry( $value, TS_MW ); } catch ( InvalidArgumentException $e ) { return false; } } /** * Main entry point for action=protect and action=unprotect */ public function execute() { if ( $this->permManager->getNamespaceRestrictionLevels( $this->mTitle->getNamespace() ) === [ '' ] ) { throw new ErrorPageError( 'protect-badnamespace-title', 'protect-badnamespace-text' ); } if ( $this->mRequest->wasPosted() ) { if ( $this->save() ) { $q = $this->mArticle->getPage()->isRedirect() ? 'redirect=no' : ''; $this->mOut->redirect( $this->mTitle->getFullURL( $q ) ); } } else { $this->show(); } } /** * Show the input form with optional error message * * @param string|string[]|null $err Error message or null if there's no error * @phan-param string|non-empty-array|null $err */ private function show( $err = null ) { $out = $this->mOut; $out->setRobotPolicy( 'noindex,nofollow' ); $out->addBacklinkSubtitle( $this->mTitle ); if ( is_array( $err ) ) { $out->addHTML( Html::errorBox( $out->msg( ...$err )->parse() ) ); } elseif ( is_string( $err ) ) { $out->addHTML( Html::errorBox( $err ) ); } if ( $this->mApplicableTypes === [] ) { // No restriction types available for the current title // this might happen if an extension alters the available types $out->setPageTitleMsg( $this->mContext->msg( 'protect-norestrictiontypes-title' )->plaintextParams( $this->mTitle->getPrefixedText() ) ); $out->addWikiTextAsInterface( $this->mContext->msg( 'protect-norestrictiontypes-text' )->plain() ); // Show the log in case protection was possible once $this->showLogExtract(); // return as there isn't anything else we can do return; } [ $cascadeSources, /* $restrictions */ ] = $this->restrictionStore->getCascadeProtectionSources( $this->mTitle ); if ( count( $cascadeSources ) > 0 ) { $titles = ''; foreach ( $cascadeSources as $pageIdentity ) { $titles .= '* [[:' . $this->titleFormatter->getPrefixedText( $pageIdentity ) . "]]\n"; } /** @todo FIXME: i18n issue, should use formatted number. */ $out->wrapWikiMsg( "
' . $link . '
'; } $htmlForm = HTMLForm::factory( 'ooui', $fields, $this->mContext ); $htmlForm ->setMethod( 'post' ) ->setId( 'mw-Protect-Form' ) ->setTableId( 'mw-protect-table2' ) ->setAction( $this->mTitle->getLocalURL( 'action=protect' ) ) ->setSubmitID( 'mw-Protect-submit' ) ->setSubmitTextMsg( 'confirm' ) ->setTokenSalt( [ 'protect', $this->mTitle->getPrefixedDBkey() ] ) ->suppressDefaultSubmit( $this->disabled ) ->setWrapperLegendMsg( 'protect-legend' ) ->prepareForm(); return $htmlForm->getHTML( false ) . $out; } /** * Prepare the label for a protection selector option * * @param string $permission Permission required * @return string */ private function getOptionLabel( $permission ) { if ( $permission == '' ) { return $this->mContext->msg( 'protect-default' )->text(); } else { // Messages: protect-level-autoconfirmed, protect-level-sysop $msg = $this->mContext->msg( "protect-level-{$permission}" ); if ( $msg->exists() ) { return $msg->text(); } return $this->mContext->msg( 'protect-fallback', $permission )->text(); } } /** * Show protection long extracts for this page */ private function showLogExtract() { # Show relevant lines from the protection log: $protectLogPage = new LogPage( 'protect' ); $this->mOut->addHTML( Xml::element( 'h2', null, $protectLogPage->getName()->text() ) ); /** @phan-suppress-next-line PhanTypeMismatchPropertyByRef */ LogEventsList::showLogExtract( $this->mOut, 'protect', $this->mTitle ); # Let extensions add other relevant log extracts $this->hookRunner->onProtectionForm__showLogExtract( $this->mArticle, $this->mOut ); } }