isPartial(). */ private $isPartialRaw = false; /** @var AbstractRestriction[] */ private $blockRestrictions = []; /** @var string[] */ private $tags = []; /** @var int|null */ private $logDeletionFlags; /** * @param ServiceOptions $options * @param BlockRestrictionStore $blockRestrictionStore * @param BlockPermissionCheckerFactory $blockPermissionCheckerFactory * @param BlockUtils $blockUtils * @param HookContainer $hookContainer * @param DatabaseBlockStore $databaseBlockStore * @param LoggerInterface $logger * @param string|UserIdentity $target Target of the block * @param User $performer Performer of the block * @param string $expiry Expiry of the block (timestamp or 'infinity') * @param string $reason Reason of the block * @param bool[] $blockOptions Block options * Valid options: * - isCreateAccountBlocked : Are acount creations prevented? * - isEmailBlocked : Is emailing other users prevented? * - isHardBlock : Are registered users prevented from editing? * - isAutoblocking : Should this block spread to others to * limit block evasion? * - isUserTalkEditBlocked : Is editing blocked user's own talkpage allowed? * - isHideUser : Should blocked user's name be hiden (needs hideuser)? * - isPartial : Is this block partial? This is ignored when * blockRestrictions is not an empty array. * @param array $blockRestrictions Block restrictions * @param string[] $tags Tags that should be assigned to the log entry */ public function __construct( ServiceOptions $options, BlockRestrictionStore $blockRestrictionStore, BlockPermissionCheckerFactory $blockPermissionCheckerFactory, BlockUtils $blockUtils, HookContainer $hookContainer, DatabaseBlockStore $databaseBlockStore, LoggerInterface $logger, $target, User $performer, string $expiry, string $reason, array $blockOptions, array $blockRestrictions, array $tags ) { // Process dependencies $options->assertRequiredOptions( self::CONSTRUCTOR_OPTIONS ); $this->options = $options; $this->blockRestrictionStore = $blockRestrictionStore; $this->blockPermissionChecker = $blockPermissionCheckerFactory ->newBlockPermissionChecker( $target, $performer ); $this->blockUtils = $blockUtils; $this->hookRunner = new HookRunner( $hookContainer ); $this->databaseBlockStore = $databaseBlockStore; $this->logger = $logger; // Process block target list( $this->target, $rawTargetType ) = AbstractBlock::parseTarget( $target ); if ( $rawTargetType !== null ) { // Guard against invalid targets $this->targetType = $rawTargetType; } else { $this->targetType = -1; } // Process other block parameters $this->performer = $performer; $this->rawExpiry = $expiry; $this->expiryTime = self::parseExpiryInput( $this->rawExpiry ); $this->reason = $reason; $this->blockRestrictions = $blockRestrictions; $this->tags = $tags; // Process blockOptions foreach ( [ 'isCreateAccountBlocked', 'isEmailBlocked', 'isHardBlock', 'isAutoblocking', ] as $possibleBlockOption ) { if ( isset( $blockOptions[ $possibleBlockOption ] ) ) { $this->$possibleBlockOption = $blockOptions[ $possibleBlockOption ]; } } // This needs to be called after $this->blockRestrictions is set, as // $this->isPartial() makes use of it. if ( isset( $blockOptions['isPartial'] ) && !$this->isPartial() ) { $this->isPartialRaw = $blockOptions['isPartial']; } if ( !$this->isPartial() || in_array( NS_USER_TALK, $this->getNamespaceRestrictions() ) ) { // It is possible to block user talk edit. User talk edit is: // - always blocked if the config says so; // - otherwise blocked/unblocked if the option was passed in; // - otherwise defaults to not blocked. if ( !$this->options->get( 'BlockAllowsUTEdit' ) ) { $this->isUserTalkEditBlocked = true; } else { $this->isUserTalkEditBlocked = $blockOptions['isUserTalkEditBlocked'] ?? false; } } else { // It is not possible to block user talk edit. If the option // was passed, an error will be thrown in ::placeBlockUnsafe. // Otherwise, set to not blocked. if ( !isset( $blockOptions['isUserTalkEditBlocked'] ) || !$blockOptions['isUserTalkEditBlocked'] ) { $this->isUserTalkEditBlocked = false; } } if ( isset( $blockOptions['isHideUser'] ) && $this->targetType === AbstractBlock::TYPE_USER ) { $this->isHideUser = $blockOptions['isHideUser']; } } /** * @unstable This method might be removed without prior notice (see T271101) * @param int $flags One of LogPage::* constants */ public function setLogDeletionFlags( int $flags ) : void { $this->logDeletionFlags = $flags; } /** * Convert a submitted expiry time, which may be relative ("2 weeks", etc) or absolute * ("24 May 2034", etc), into an absolute timestamp we can put into the database. * * @todo strtotime() only accepts English strings. This means the expiry input * can only be specified in English. * @see https://www.php.net/manual/en/function.strtotime.php * * @param string $expiry Whatever was typed into the form * * @return string|false Timestamp (format TS_MW) or 'infinity' or false on error. */ public static function parseExpiryInput( string $expiry ) { if ( wfIsInfinity( $expiry ) ) { return 'infinity'; } // ConvertibleTimestamp::time() used so we can fake the current time in tests $expiry = strtotime( $expiry, ConvertibleTimestamp::time() ); if ( $expiry < 0 || $expiry === false ) { return false; } return wfTimestamp( TS_MW, $expiry ); } /** * Is the to-be-placed block partial? * * @return bool */ private function isPartial() : bool { return $this->blockRestrictions !== [] || $this->isPartialRaw; } /** * Configure DatabaseBlock according to class properties * * @param DatabaseBlock|null $sourceBlock Copy any options from this block, * null to construct a new one. * * @return DatabaseBlock */ private function configureBlock( $sourceBlock = null ) : DatabaseBlock { if ( $sourceBlock === null ) { $block = new DatabaseBlock(); } else { $block = clone $sourceBlock; } $isSitewide = !$this->isPartial(); $block->setTarget( $this->target ); $block->setBlocker( $this->performer ); $block->setReason( $this->reason ); $block->setExpiry( $this->expiryTime ); $block->isCreateAccountBlocked( $this->isCreateAccountBlocked ); $block->isEmailBlocked( $this->isEmailBlocked ); $block->isHardblock( $this->isHardBlock ); $block->isAutoblocking( $this->isAutoblocking ); $block->isSitewide( $isSitewide ); $block->isUsertalkEditAllowed( !$this->isUserTalkEditBlocked ); $block->setHideName( $this->isHideUser ); if ( $block->getId() === null ) { // Block wasn't inserted into the DB yet $block->setRestrictions( $this->blockRestrictions ); } else { // Block is in the DB, we need to set restrictions through a service $block->setRestrictions( $this->blockRestrictionStore->setBlockId( $block->getId(), $this->blockRestrictions ) ); } return $block; } /** * Places a block with checking permissions * * @param bool $reblock Should this reblock? * * @return Status */ public function placeBlock( bool $reblock = false ) : Status { $priorBlock = DatabaseBlock::newFromTarget( $this->target ); $priorHideUser = $priorBlock instanceof DatabaseBlock && $priorBlock->getHideName(); if ( $this->blockPermissionChecker ->checkBasePermissions( $this->isHideUser || $priorHideUser ) !== true ) { return Status::newFatal( $priorHideUser ? 'cant-see-hidden-user' : 'badaccess-group0' ); } $blockCheckResult = $this->blockPermissionChecker->checkBlockPermissions(); if ( $blockCheckResult !== true ) { return Status::newFatal( $blockCheckResult ); } if ( $this->isEmailBlocked && !$this->blockPermissionChecker->checkEmailPermissions() ) { // TODO: Maybe not ignore the error here? $this->isEmailBlocked = false; } if ( $this->tags !== [] ) { // TODO: Use DI, see T245964 $status = ChangeTags::canAddTagsAccompanyingChange( $this->tags, $this->performer ); if ( !$status->isOK() ) { return $status; } } return $this->placeBlockUnsafe( $reblock ); } /** * Places a block without any sort of permissions checks. * * @param bool $reblock Should this reblock? * * @return Status */ public function placeBlockUnsafe( bool $reblock = false ) : Status { $status = $this->blockUtils->validateTarget( $this->target ); if ( !$status->isOK() ) { return $status; } if ( $this->isUserTalkEditBlocked === null ) { return Status::newFatal( 'ipb-prevent-user-talk-edit' ); } if ( // There should be some expiry strlen( $this->rawExpiry ) === 0 || // can't be a larger string as 50 (it should be a time format in any way) strlen( $this->rawExpiry ) > 50 || // the time can't be parsed !$this->expiryTime ) { return Status::newFatal( 'ipb_expiry_invalid' ); } if ( $this->expiryTime < wfTimestampNow() ) { return Status::newFatal( 'ipb_expiry_old' ); } if ( $this->isHideUser ) { if ( $this->isPartial() ) { return Status::newFatal( 'ipb_hide_partial' ); } if ( !wfIsInfinity( $this->rawExpiry ) ) { return Status::newFatal( 'ipb_expiry_temp' ); } $hideUserContribLimit = $this->options->get( 'HideUserContribLimit' ); if ( $hideUserContribLimit !== false && $this->target->getEditCount() > $hideUserContribLimit ) { return Status::newFatal( 'ipb_hide_invalid', Message::numParam( $hideUserContribLimit ) ); } } if ( $this->isPartial() ) { if ( $this->blockRestrictions === [] && !$this->isEmailBlocked && !$this->isCreateAccountBlocked && !$this->isUserTalkEditBlocked ) { return Status::newFatal( 'ipb-empty-block' ); } } return $this->placeBlockInternal( $reblock ); } /** * Places a block without any sort of sanity/permission checks, hooks can still * abort the block through, as well as already existing block. * * @param bool $reblock Should this reblock? * * @return Status */ private function placeBlockInternal( bool $reblock = true ) : Status { $block = $this->configureBlock(); $denyReason = [ 'hookaborted' ]; if ( !$this->hookRunner->onBlockIp( $block, $this->performer, $denyReason ) ) { $status = Status::newGood(); foreach ( $denyReason as $key ) { $status->fatal( $key ); } return $status; } // Try to insert block. Is there a conflicting block? $insertStatus = $this->databaseBlockStore->insertBlock( $block ); $priorBlock = DatabaseBlock::newFromTarget( $this->target ); $isReblock = false; if ( !$insertStatus ) { // Reblock if the caller wants so if ( $reblock ) { if ( $priorBlock === null ) { $this->logger->warning( 'Block could not be inserted. No existing block was found.' ); return Status::newFatal( 'ipb-block-not-found', $block->getTarget() ); } if ( $block->equals( $priorBlock ) ) { // Block settings are equal => user is already blocked return Status::newFatal( 'ipb_already_blocked', $block->getTarget() ); } $currentBlock = $this->configureBlock( $priorBlock ); $this->databaseBlockStore->updateBlock( $currentBlock ); // TODO handle failure $isReblock = true; $block = $currentBlock; } else { return Status::newFatal( 'ipb_already_blocked', $block->getTarget() ); } } // Set *_deleted fields if requested if ( $this->isHideUser ) { // This should only be the case of $this->target is a user, so we can // safely call ->getId() RevisionDeleteUser::suppressUserName( $this->target, $this->target->getId() ); } $this->hookRunner->onBlockIpComplete( $block, $this->performer, $priorBlock ); // DatabaseBlock constructor sanitizes certain block options on insert $this->isEmailBlocked = $block->isEmailBlocked(); $this->isAutoblocking = $block->isAutoblocking(); $this->log( $block, $isReblock ); return Status::newGood(); } /** * Build namespace restrictions array from $this->blockRestrictions * * Returns an array of namespace IDs. * * @return int[] */ private function getNamespaceRestrictions() : array { $namespaceRestrictions = []; foreach ( $this->blockRestrictions as $restriction ) { if ( $restriction instanceof NamespaceRestriction ) { $namespaceRestrictions[] = $restriction->getValue(); } } return $namespaceRestrictions; } /** * Build an array of page restrictions from $this->blockRestrictions * * Returns an array of stringified full page titles. * * @return string[] */ private function getPageRestrictions() : array { $pageRestrictions = []; foreach ( $this->blockRestrictions as $restriction ) { if ( $restriction instanceof PageRestriction ) { $pageRestrictions[] = $restriction->getTitle()->getFullText(); } } return $pageRestrictions; } /** * Prepare $logParams * * Helper method for $this->log() * * @return array */ private function constructLogParams() : array { $logExpiry = wfIsInfinity( $this->rawExpiry ) ? 'infinity' : $this->rawExpiry; $logParams = [ '5::duration' => $logExpiry, '6::flags' => $this->blockLogFlags(), 'sitewide' => !$this->isPartial() ]; if ( $this->isPartial() ) { $pageRestrictions = $this->getPageRestrictions(); $namespaceRestrictions = $this->getNamespaceRestrictions(); if ( count( $pageRestrictions ) > 0 ) { $logParams['7::restrictions']['pages'] = $pageRestrictions; } if ( count( $namespaceRestrictions ) > 0 ) { $logParams['7::restrictions']['namespaces'] = $namespaceRestrictions; } } return $logParams; } /** * Log the block to Special:Log * * @param DatabaseBlock $block * @param bool $isReblock */ private function log( DatabaseBlock $block, bool $isReblock ) { $logType = $this->isHideUser ? 'suppress' : 'block'; $logAction = $isReblock ? 'reblock' : 'block'; $logEntry = new ManualLogEntry( $logType, $logAction ); $logEntry->setTarget( Title::makeTitle( NS_USER, $this->target ) ); $logEntry->setComment( $this->reason ); $logEntry->setPerformer( $this->performer ); $logEntry->setParameters( $this->constructLogParams() ); // Relate log ID to block ID (T27763) $logEntry->setRelations( [ 'ipb_id' => $block->getId() ] ); $logEntry->addTags( $this->tags ); if ( $this->logDeletionFlags !== null ) { $logEntry->setDeleted( $this->logDeletionFlags ); } $logId = $logEntry->insert(); $logEntry->publish( $logId ); } /** * Return a comma-delimited list of flags to be passed to the log * reader for this block, to provide more information in the logs. * * @return string */ private function blockLogFlags() : string { $flags = []; if ( $this->targetType != AbstractBlock::TYPE_USER && !$this->isHardBlock ) { // For grepping: message block-log-flags-anononly $flags[] = 'anononly'; } if ( $this->isCreateAccountBlocked ) { // For grepping: message block-log-flags-nocreate $flags[] = 'nocreate'; } if ( $this->targetType == AbstractBlock::TYPE_USER && !$this->isAutoblocking ) { // For grepping: message block-log-flags-noautoblock $flags[] = 'noautoblock'; } if ( $this->isEmailBlocked ) { // For grepping: message block-log-flags-noemail $flags[] = 'noemail'; } if ( $this->options->get( 'BlockAllowsUTEdit' ) && $this->isUserTalkEditBlocked ) { // For grepping: message block-log-flags-nousertalk $flags[] = 'nousertalk'; } if ( $this->isHideUser ) { // For grepping: message block-log-flags-hiddenname $flags[] = 'hiddenname'; } return implode( ',', $flags ); } }