$user->getName(), 'password' => $password, 'retype' => $password, 'email' => $email, 'realname' => '', ]; self::$userToCreate = $user; $reqs = AuthManager::singleton()->getAuthenticationRequests( AuthManager::ACTION_CREATE ); $reqs = AuthenticationRequest::loadRequestsFromSubmission( $reqs, $data ); $res = AuthManager::singleton()->beginAccountCreation( $user, $reqs, 'null:' ); self::$userToCreate = null; switch ( $res->status ) { case AuthenticationResponse::PASS: break; case AuthenticationResponse::FAIL: // Unless things are misconfigured, this will handle errors such as username taken, // invalid user name or too short password. The WebAPI is prechecking these to // provide nicer error messages. $reason = $res->message->inLanguage( 'en' )->useDatabase( false )->text(); throw new MWException( "Account creation failed: $reason" ); default: // Just in case it was a Secondary that failed $user->clearInstanceCache( 'name' ); if ( $user->getId() ) { self::deleteUser( $user, 'force' ); } throw new MWException( 'AuthManager does not support such simplified account creation' ); } // User now has an id, but we must clear the cache to see it. Without this the group // addition below would not be saved in the database. $user->clearInstanceCache( 'name' ); // group-translate-sandboxed group-translate-sandboxed-member $user->addGroup( 'translate-sandboxed' ); return $user; } /** * Deletes a sandboxed user without doing much validation. * * @param User $user * @param string $force If set to 'force' will skip the little validation we have. * @throws MWException */ public static function deleteUser( User $user, $force = '' ) { $uid = $user->getId(); $username = $user->getName(); if ( $force !== 'force' && !self::isSandboxed( $user ) ) { throw new MWException( 'Not a sandboxed user' ); } // Delete from database $dbw = wfGetDB( DB_MASTER ); $dbw->delete( 'user', [ 'user_id' => $uid ], __METHOD__ ); $dbw->delete( 'user_groups', [ 'ug_user' => $uid ], __METHOD__ ); $dbw->delete( 'user_properties', [ 'up_user' => $uid ], __METHOD__ ); if ( class_exists( ActorMigration::class ) ) { $m = ActorMigration::newMigration(); // Assume no joins are needed for logging or recentchanges $dbw->delete( 'logging', $m->getWhere( $dbw, 'log_user', $user )['conds'], __METHOD__ ); $dbw->delete( 'recentchanges', $m->getWhere( $dbw, 'rc_user', $user )['conds'], __METHOD__ ); } else { $dbw->delete( 'logging', [ 'log_user' => $uid ], __METHOD__ ); $dbw->delete( 'recentchanges', [ 'rc_user' => $uid, 'rc_user_text' => $username ], __METHOD__ ); } // If someone tries to access still object still, they will get anon user // data. $user->clearInstanceCache( 'defaults' ); // Nobody should access the user by id anymore, but in case they do, purge // the cache so they wont get stale data $user->invalidateCache(); // In case we create an user with same name as was deleted during the same // request, we must also reset this cache or the User class will try to load // stuff for the old id, which is no longer present since we just deleted // the cache above. But it would have the side effect or overwriting all // member variables with null data. This used to manifest as a bug where // inserting a new user fails because the mName properpty is set to null, // which is then converted as the ip of the current user, and trying to // add that twice results in a name conflict. It was fun to debug. User::resetIdByNameCache(); } /** * Get all sandboxed users. * @return UserArray List of users. */ public static function getUsers() { $dbw = TranslateUtils::getSafeReadDB(); if ( is_callable( [ User::class, 'getQueryInfo' ] ) ) { $userQuery = User::getQueryInfo(); } else { $userQuery = [ 'tables' => [ 'user' ], 'fields' => User::selectFields(), 'joins' => [], ]; } $tables = array_merge( $userQuery['tables'], [ 'user_groups' ] ); $fields = $userQuery['fields']; $conds = [ 'ug_group' => 'translate-sandboxed', ]; $joins = [ 'user_groups' => [ 'JOIN', 'ug_user = user_id' ], ] + $userQuery['joins']; $res = $dbw->select( $tables, $fields, $conds, __METHOD__, [], $joins ); return UserArray::newFromResult( $res ); } /** * Removes the user from the sandbox. * @param User $user * @throws MWException */ public static function promoteUser( User $user ) { global $wgTranslateSandboxPromotedGroup; if ( !self::isSandboxed( $user ) ) { throw new MWException( 'Not a sandboxed user' ); } $user->removeGroup( 'translate-sandboxed' ); if ( $wgTranslateSandboxPromotedGroup ) { $user->addGroup( $wgTranslateSandboxPromotedGroup ); } $user->setOption( 'translate-sandbox-reminders', '' ); $user->saveSettings(); } /** * Sends a reminder to the user. * @param User $sender * @param User $target * @param string $type 'reminder' or 'promotion' * @throws MWException * @since 2013.12 */ public static function sendEmail( User $sender, User $target, $type ) { global $wgNoReplyAddress; $targetLang = $target->getOption( 'language' ); switch ( $type ) { case 'reminder': if ( !self::isSandboxed( $target ) ) { throw new MWException( 'Not a sandboxed user' ); } $subjectMsg = 'tsb-reminder-title-generic'; $bodyMsg = 'tsb-reminder-content-generic'; $targetSpecialPage = 'TranslationStash'; break; case 'promotion': $subjectMsg = 'tsb-email-promoted-subject'; $bodyMsg = 'tsb-email-promoted-body'; $targetSpecialPage = 'Translate'; break; case 'rejection': $subjectMsg = 'tsb-email-rejected-subject'; $bodyMsg = 'tsb-email-rejected-body'; $targetSpecialPage = 'TwnMainPage'; break; default: throw new MWException( "'$type' is an invalid type of translate sandbox email" ); } $subject = wfMessage( $subjectMsg )->inLanguage( $targetLang )->text(); $body = wfMessage( $bodyMsg, $target->getName(), SpecialPage::getTitleFor( $targetSpecialPage )->getCanonicalURL(), $sender->getName() )->inLanguage( $targetLang )->text(); $params = [ 'user' => $target->getId(), 'to' => MailAddress::newFromUser( $target ), 'from' => MailAddress::newFromUser( $sender ), 'replyto' => new MailAddress( $wgNoReplyAddress ), 'subj' => $subject, 'body' => $body, 'emailType' => $type, ]; JobQueueGroup::singleton()->push( TranslateSandboxEmailJob::newJob( $params ) ); } /** * Shortcut for checking if given user is in the sandbox. * @param User $user * @return bool * @since 2013.06 */ public static function isSandboxed( User $user ) { if ( in_array( 'translate-sandboxed', $user->getGroups(), true ) ) { return true; } return false; } /** * Hook: UserGetRights * @param User $user * @param array &$rights * @return true */ public static function enforcePermissions( User $user, array &$rights ) { global $wgTranslateUseSandbox; if ( !$wgTranslateUseSandbox ) { return true; } if ( !self::isSandboxed( $user ) ) { return true; } // right-translate-sandboxaction action-translate-sandboxaction $rights = [ 'editmyoptions', 'editmyprivateinfo', 'read', 'readapi', 'translate-sandboxaction', 'viewmyprivateinfo', 'writeapi', ]; // Do not let other hooks add more actions return false; } /// Hook: UserGetRights public static function allowAccountCreation( $user, &$rights ) { if ( self::$userToCreate && $user->equals( self::$userToCreate ) ) { $rights[] = 'createaccount'; } } /// Hook: onGetPreferences public static function onGetPreferences( $user, &$preferences ) { $preferences['translate-sandbox'] = $preferences['translate-sandbox-reminders'] = [ 'type' => 'api' ]; return true; } /** * Whitelisting for certain API modules. See also enforcePermissions. * Hook: ApiCheckCanExecute * @param ApiBase $module * @param User $user * @param string &$message * @return bool */ public static function onApiCheckCanExecute( ApiBase $module, User $user, &$message ) { $whitelist = [ // Obviously this is needed to get out of the sandbox 'ApiTranslationStash', // Used by UniversalLanguageSelector for example 'ApiOptions' ]; if ( self::isSandboxed( $user ) ) { $class = get_class( $module ); if ( $module->isWriteMode() && !in_array( $class, $whitelist, true ) ) { $message = ApiMessage::create( 'apierror-writeapidenied' ); if ( $message->getApiCode() === 'apierror-writeapidenied' ) { // Backwards compatibility for pre-1.29 MediaWiki $message = 'writerequired'; } return false; } } return true; } }