2009-01-17 04:39:11 +01:00
|
|
|
#!/usr/bin/perl
|
|
|
|
package IkiWiki::Plugin::blogspam;
|
|
|
|
|
|
|
|
use warnings;
|
|
|
|
use strict;
|
|
|
|
use IkiWiki 3.00;
|
2010-09-14 21:23:16 +02:00
|
|
|
use Encode;
|
2009-01-17 04:39:11 +01:00
|
|
|
|
2015-01-02 19:55:10 +01:00
|
|
|
my $defaulturl='http://test.blogspam.net:9999/';
|
|
|
|
my $client;
|
2009-01-17 04:39:11 +01:00
|
|
|
|
|
|
|
sub import {
|
|
|
|
hook(type => "getsetup", id => "blogspam", call => \&getsetup);
|
2009-04-22 21:38:50 +02:00
|
|
|
hook(type => "checkconfig", id => "blogspam", call => \&checkconfig);
|
2009-01-17 04:39:11 +01:00
|
|
|
hook(type => "checkcontent", id => "blogspam", call => \&checkcontent);
|
|
|
|
}
|
|
|
|
|
|
|
|
sub getsetup () {
|
|
|
|
return
|
|
|
|
plugin => {
|
|
|
|
safe => 1,
|
|
|
|
rebuild => 0,
|
2010-02-12 04:24:15 +01:00
|
|
|
section => "auth",
|
2009-01-17 04:39:11 +01:00
|
|
|
},
|
|
|
|
blogspam_pagespec => {
|
|
|
|
type => 'pagespec',
|
|
|
|
example => 'postcomment(*)',
|
|
|
|
description => 'PageSpec of pages to check for spam',
|
|
|
|
link => 'ikiwiki/PageSpec',
|
|
|
|
safe => 1,
|
|
|
|
rebuild => 0,
|
|
|
|
},
|
|
|
|
blogspam_options => {
|
|
|
|
type => "string",
|
|
|
|
example => "blacklist=1.2.3.4,blacklist=8.7.6.5,max-links=10",
|
|
|
|
description => "options to send to blogspam server",
|
2015-01-02 19:55:10 +01:00
|
|
|
link => "http://blogspam.net/api/2.0/testComment.html#options",
|
2009-01-17 04:39:11 +01:00
|
|
|
safe => 1,
|
|
|
|
rebuild => 0,
|
|
|
|
},
|
|
|
|
blogspam_server => {
|
|
|
|
type => "string",
|
|
|
|
default => $defaulturl,
|
2015-01-02 19:55:10 +01:00
|
|
|
description => "blogspam server JSON url",
|
2009-01-17 04:39:11 +01:00
|
|
|
safe => 1,
|
|
|
|
rebuild => 0,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2009-04-22 19:33:20 +02:00
|
|
|
sub checkconfig () {
|
|
|
|
# This is done at checkconfig time because printing an error
|
|
|
|
# if the module is missing when a spam is posted would not
|
|
|
|
# let the admin know about the problem.
|
2009-01-17 20:56:48 +01:00
|
|
|
eval q{
|
2015-01-02 19:55:10 +01:00
|
|
|
use JSON;
|
|
|
|
use HTTP::Request;
|
2009-01-17 20:56:48 +01:00
|
|
|
};
|
2009-04-22 19:33:20 +02:00
|
|
|
error $@ if $@;
|
2015-01-02 19:55:10 +01:00
|
|
|
|
|
|
|
eval q{use LWPx::ParanoidAgent};
|
|
|
|
if (!$@) {
|
|
|
|
$client=LWPx::ParanoidAgent->new(agent => $config{useragent});
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
eval q{use LWP};
|
|
|
|
if ($@) {
|
|
|
|
error $@;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
$client=useragent();
|
|
|
|
}
|
2009-04-22 19:33:20 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
sub checkcontent (@) {
|
|
|
|
my %params=@_;
|
2010-06-23 22:32:20 +02:00
|
|
|
my $session=$params{session};
|
2009-01-17 04:39:11 +01:00
|
|
|
|
2011-01-24 21:59:15 +01:00
|
|
|
my $spec='!admin()';
|
|
|
|
if (exists $config{blogspam_pagespec} &&
|
|
|
|
length $config{blogspam_pagespec}) {
|
|
|
|
$spec.=" and (".$config{blogspam_pagespec}.")";
|
2009-01-17 04:39:11 +01:00
|
|
|
}
|
|
|
|
|
2011-01-24 21:59:15 +01:00
|
|
|
my $user=$session->param("name");
|
|
|
|
return undef unless pagespec_match($params{page}, $spec,
|
|
|
|
(defined $user ? (user => $user) : ()),
|
|
|
|
(defined $session->remote_addr() ? (ip => $session->remote_addr()) : ()),
|
|
|
|
location => $params{page});
|
|
|
|
|
2009-01-17 04:39:11 +01:00
|
|
|
my $url=$defaulturl;
|
2009-01-25 20:37:04 +01:00
|
|
|
$url = $config{blogspam_server} if exists $config{blogspam_server};
|
2010-09-14 21:23:16 +02:00
|
|
|
|
2009-01-25 20:37:04 +01:00
|
|
|
my @options = split(",", $config{blogspam_options})
|
|
|
|
if exists $config{blogspam_options};
|
2009-01-17 04:39:11 +01:00
|
|
|
|
|
|
|
# Allow short comments and whitespace-only edits, unless the user
|
|
|
|
# has overridden min-words themselves.
|
|
|
|
push @options, "min-words=0"
|
|
|
|
unless grep /^min-words=/i, @options;
|
|
|
|
# Wiki pages can have a lot of urls, unless the user specifically
|
|
|
|
# wants to limit them.
|
|
|
|
push @options, "exclude=lotsaurls"
|
|
|
|
unless grep /^max-links/i, @options;
|
|
|
|
# Unless the user specified a size check, disable such checking.
|
|
|
|
push @options, "exclude=size"
|
|
|
|
unless grep /^(?:max|min)-size/i, @options;
|
|
|
|
# This test has absurd false positives on words like "alpha"
|
|
|
|
# and "buy".
|
|
|
|
push @options, "exclude=stopwords";
|
|
|
|
|
2009-01-23 03:10:05 +01:00
|
|
|
my %req=(
|
2010-06-23 22:32:20 +02:00
|
|
|
ip => $session->remote_addr(),
|
2010-09-14 21:23:16 +02:00
|
|
|
comment => encode_utf8(defined $params{diff} ? $params{diff} : $params{content}),
|
|
|
|
subject => encode_utf8(defined $params{subject} ? $params{subject} : ""),
|
|
|
|
name => encode_utf8(defined $params{author} ? $params{author} : ""),
|
|
|
|
link => encode_utf8(exists $params{url} ? $params{url} : ""),
|
2009-01-17 04:39:11 +01:00
|
|
|
options => join(",", @options),
|
2010-09-14 21:23:16 +02:00
|
|
|
site => encode_utf8($config{url}),
|
2009-01-17 04:39:11 +01:00
|
|
|
version => "ikiwiki ".$IkiWiki::version,
|
2009-01-23 03:10:05 +01:00
|
|
|
);
|
2015-01-02 19:55:10 +01:00
|
|
|
eval q{use JSON; use HTTP::Request}; # errors handled in checkconfig()
|
|
|
|
my $res = $client->request(
|
|
|
|
HTTP::Request->new(
|
|
|
|
'POST',
|
|
|
|
$url,
|
|
|
|
[ 'Content-Type' => 'application/json' ],
|
|
|
|
to_json(\%req),
|
|
|
|
),
|
|
|
|
);
|
2009-01-17 04:39:11 +01:00
|
|
|
|
2015-01-02 19:55:10 +01:00
|
|
|
if (! ref $res || ! $res->is_success()) {
|
2009-01-17 04:39:11 +01:00
|
|
|
debug("failed to get response from blogspam server ($url)");
|
|
|
|
return undef;
|
|
|
|
}
|
2015-01-02 19:55:10 +01:00
|
|
|
my $details = from_json($res->content);
|
|
|
|
if ($details->{result} eq 'SPAM') {
|
2009-01-19 20:11:15 +01:00
|
|
|
eval q{use Data::Dumper};
|
2015-01-02 19:55:10 +01:00
|
|
|
debug("blogspam server reports $details->{reason}: ".Dumper(\%req));
|
|
|
|
return gettext("Sorry, but that looks like spam to <a href=\"http://blogspam.net/\">blogspam</a>: ").$details->{reason};
|
2009-01-17 04:39:11 +01:00
|
|
|
}
|
2015-01-02 19:55:10 +01:00
|
|
|
elsif ($details->{result} ne 'OK') {
|
|
|
|
debug("blogspam server failure: ".$res->content);
|
2009-01-17 04:39:11 +01:00
|
|
|
return undef;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
return undef;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
1
|