MediaWiki  master
ProtectionForm.php
Go to the documentation of this file.
1 <?php
31  protected $mRestrictions = [];
32 
34  protected $mReason = '';
35 
37  protected $mReasonSelection = '';
38 
40  protected $mCascade = false;
41 
43  protected $mExpiry = [];
44 
49  protected $mExpirySelection = [];
50 
52  protected $mPermErrors = [];
53 
55  protected $mApplicableTypes = [];
56 
58  protected $mExistingExpiry = [];
59 
61  private $mContext;
62 
64  // Set instance variables.
65  $this->mArticle = $article;
66  $this->mTitle = $article->getTitle();
67  $this->mApplicableTypes = $this->mTitle->getRestrictionTypes();
68  $this->mContext = $article->getContext();
69 
70  // Check if the form should be disabled.
71  // If it is, the form will be available in read-only to show levels.
72  $this->mPermErrors = $this->mTitle->getUserPermissionsErrors(
73  'protect',
74  $this->mContext->getUser(),
75  $this->mContext->getRequest()->wasPosted() ? 'secure' : 'full' // T92357
76  );
77  if ( wfReadOnly() ) {
78  $this->mPermErrors[] = [ 'readonlytext', wfReadOnlyReason() ];
79  }
80  $this->disabled = $this->mPermErrors != [];
81  $this->disabledAttrib = $this->disabled
82  ? [ 'disabled' => 'disabled' ]
83  : [];
84 
85  $this->loadData();
86  }
87 
91  function loadData() {
93  $this->mTitle->getNamespace(), $this->mContext->getUser()
94  );
95  $this->mCascade = $this->mTitle->areRestrictionsCascading();
96 
97  $request = $this->mContext->getRequest();
98  $this->mReason = $request->getText( 'mwProtect-reason' );
99  $this->mReasonSelection = $request->getText( 'wpProtectReasonSelection' );
100  $this->mCascade = $request->getBool( 'mwProtect-cascade', $this->mCascade );
101 
102  foreach ( $this->mApplicableTypes as $action ) {
103  // @todo FIXME: This form currently requires individual selections,
104  // but the db allows multiples separated by commas.
105 
106  // Pull the actual restriction from the DB
107  $this->mRestrictions[$action] = implode( '', $this->mTitle->getRestrictions( $action ) );
108 
109  if ( !$this->mRestrictions[$action] ) {
110  // No existing expiry
111  $existingExpiry = '';
112  } else {
113  $existingExpiry = $this->mTitle->getRestrictionExpiry( $action );
114  }
115  $this->mExistingExpiry[$action] = $existingExpiry;
116 
117  $requestExpiry = $request->getText( "mwProtect-expiry-$action" );
118  $requestExpirySelection = $request->getVal( "wpProtectExpirySelection-$action" );
119 
120  if ( $requestExpiry ) {
121  // Custom expiry takes precedence
122  $this->mExpiry[$action] = $requestExpiry;
123  $this->mExpirySelection[$action] = 'othertime';
124  } elseif ( $requestExpirySelection ) {
125  // Expiry selected from list
126  $this->mExpiry[$action] = '';
127  $this->mExpirySelection[$action] = $requestExpirySelection;
128  } elseif ( $existingExpiry ) {
129  // Use existing expiry in its own list item
130  $this->mExpiry[$action] = '';
131  $this->mExpirySelection[$action] = $existingExpiry;
132  } else {
133  // Catches 'infinity' - Existing expiry is infinite, use "infinite" in drop-down
134  // Final default: infinite
135  $this->mExpiry[$action] = '';
136  $this->mExpirySelection[$action] = 'infinite';
137  }
138 
139  $val = $request->getVal( "mwProtect-level-$action" );
140  if ( isset( $val ) && in_array( $val, $levels ) ) {
141  $this->mRestrictions[$action] = $val;
142  }
143  }
144  }
145 
153  function getExpiry( $action ) {
154  if ( $this->mExpirySelection[$action] == 'existing' ) {
155  return $this->mExistingExpiry[$action];
156  } elseif ( $this->mExpirySelection[$action] == 'othertime' ) {
157  $value = $this->mExpiry[$action];
158  } else {
159  $value = $this->mExpirySelection[$action];
160  }
161  if ( wfIsInfinity( $value ) ) {
162  $time = 'infinity';
163  } else {
164  $unix = strtotime( $value );
165 
166  if ( !$unix || $unix === -1 ) {
167  return false;
168  }
169 
170  // @todo FIXME: Non-qualified absolute times are not in users specified timezone
171  // and there isn't notice about it in the ui
172  $time = wfTimestamp( TS_MW, $unix );
173  }
174  return $time;
175  }
176 
180  function execute() {
181  if ( MWNamespace::getRestrictionLevels( $this->mTitle->getNamespace() ) === [ '' ] ) {
182  throw new ErrorPageError( 'protect-badnamespace-title', 'protect-badnamespace-text' );
183  }
184 
185  if ( $this->mContext->getRequest()->wasPosted() ) {
186  if ( $this->save() ) {
187  $q = $this->mArticle->isRedirect() ? 'redirect=no' : '';
188  $this->mContext->getOutput()->redirect( $this->mTitle->getFullURL( $q ) );
189  }
190  } else {
191  $this->show();
192  }
193  }
194 
200  function show( $err = null ) {
201  $out = $this->mContext->getOutput();
202  $out->setRobotPolicy( 'noindex,nofollow' );
203  $out->addBacklinkSubtitle( $this->mTitle );
204 
205  if ( is_array( $err ) ) {
206  $out->wrapWikiMsg( "<p class='error'>\n$1\n</p>\n", $err );
207  } elseif ( is_string( $err ) ) {
208  $out->addHTML( "<p class='error'>{$err}</p>\n" );
209  }
210 
211  if ( $this->mTitle->getRestrictionTypes() === [] ) {
212  // No restriction types available for the current title
213  // this might happen if an extension alters the available types
214  $out->setPageTitle( $this->mContext->msg(
215  'protect-norestrictiontypes-title',
216  $this->mTitle->getPrefixedText()
217  ) );
218  $out->addWikiText( $this->mContext->msg( 'protect-norestrictiontypes-text' )->plain() );
219 
220  // Show the log in case protection was possible once
221  $this->showLogExtract( $out );
222  // return as there isn't anything else we can do
223  return;
224  }
225 
226  list( $cascadeSources, /* $restrictions */ ) = $this->mTitle->getCascadeProtectionSources();
227  if ( $cascadeSources && count( $cascadeSources ) > 0 ) {
228  $titles = '';
229 
230  foreach ( $cascadeSources as $title ) {
231  $titles .= '* [[:' . $title->getPrefixedText() . "]]\n";
232  }
233 
235  $out->wrapWikiMsg(
236  "<div id=\"mw-protect-cascadeon\">\n$1\n" . $titles . "</div>",
237  [ 'protect-cascadeon', count( $cascadeSources ) ]
238  );
239  }
240 
241  # Show an appropriate message if the user isn't allowed or able to change
242  # the protection settings at this time
243  if ( $this->disabled ) {
244  $out->setPageTitle(
245  $this->mContext->msg( 'protect-title-notallowed',
246  $this->mTitle->getPrefixedText() )
247  );
248  $out->addWikiText( $out->formatPermissionsErrorMessage( $this->mPermErrors, 'protect' ) );
249  } else {
250  $out->setPageTitle( $this->mContext->msg( 'protect-title', $this->mTitle->getPrefixedText() ) );
251  $out->addWikiMsg( 'protect-text',
252  wfEscapeWikiText( $this->mTitle->getPrefixedText() ) );
253  }
254 
255  $out->addHTML( $this->buildForm() );
256  $this->showLogExtract( $out );
257  }
258 
264  function save() {
265  # Permission check!
266  if ( $this->disabled ) {
267  $this->show();
268  return false;
269  }
270 
271  $request = $this->mContext->getRequest();
272  $user = $this->mContext->getUser();
273  $out = $this->mContext->getOutput();
274  $token = $request->getVal( 'wpEditToken' );
275  if ( !$user->matchEditToken( $token, [ 'protect', $this->mTitle->getPrefixedDBkey() ] ) ) {
276  $this->show( [ 'sessionfailure' ] );
277  return false;
278  }
279 
280  # Create reason string. Use list and/or custom string.
281  $reasonstr = $this->mReasonSelection;
282  if ( $reasonstr != 'other' && $this->mReason != '' ) {
283  // Entry from drop down menu + additional comment
284  $reasonstr .= $this->mContext->msg( 'colon-separator' )->text() . $this->mReason;
285  } elseif ( $reasonstr == 'other' ) {
286  $reasonstr = $this->mReason;
287  }
288  $expiry = [];
289  foreach ( $this->mApplicableTypes as $action ) {
290  $expiry[$action] = $this->getExpiry( $action );
291  if ( empty( $this->mRestrictions[$action] ) ) {
292  continue; // unprotected
293  }
294  if ( !$expiry[$action] ) {
295  $this->show( [ 'protect_expiry_invalid' ] );
296  return false;
297  }
298  if ( $expiry[$action] < wfTimestampNow() ) {
299  $this->show( [ 'protect_expiry_old' ] );
300  return false;
301  }
302  }
303 
304  $this->mCascade = $request->getBool( 'mwProtect-cascade' );
305 
306  $status = $this->mArticle->doUpdateRestrictions(
307  $this->mRestrictions,
308  $expiry,
309  $this->mCascade,
310  $reasonstr,
311  $user
312  );
313 
314  if ( !$status->isOK() ) {
315  $this->show( $out->parseInline( $status->getWikiText() ) );
316  return false;
317  }
318 
325  $errorMsg = '';
326  if ( !Hooks::run( 'ProtectionForm::save', [ $this->mArticle, &$errorMsg, $reasonstr ] ) ) {
327  if ( $errorMsg == '' ) {
328  $errorMsg = [ 'hookaborted' ];
329  }
330  }
331  if ( $errorMsg != '' ) {
332  $this->show( $errorMsg );
333  return false;
334  }
335 
336  WatchAction::doWatchOrUnwatch( $request->getCheck( 'mwProtectWatch' ), $this->mTitle, $user );
337 
338  return true;
339  }
340 
346  function buildForm() {
348  $user = $context->getUser();
349  $output = $context->getOutput();
350  $lang = $context->getLanguage();
351  $cascadingRestrictionLevels = $context->getConfig()->get( 'CascadingRestrictionLevels' );
352  $out = '';
353  if ( !$this->disabled ) {
354  $output->addModules( 'mediawiki.legacy.protect' );
355  $output->addJsConfigVars( 'wgCascadeableLevels', $cascadingRestrictionLevels );
356  $out .= Xml::openElement( 'form', [ 'method' => 'post',
357  'action' => $this->mTitle->getLocalURL( 'action=protect' ),
358  'id' => 'mw-Protect-Form' ] );
359  }
360 
361  $out .= Xml::openElement( 'fieldset' ) .
362  Xml::element( 'legend', null, $context->msg( 'protect-legend' )->text() ) .
363  Xml::openElement( 'table', [ 'id' => 'mwProtectSet' ] ) .
364  Xml::openElement( 'tbody' );
365 
366  $scExpiryOptions = wfMessage( 'protect-expiry-options' )->inContentLanguage()->text();
367  $showProtectOptions = $scExpiryOptions !== '-' && !$this->disabled;
368 
369  // Not all languages have V_x <-> N_x relation
370  foreach ( $this->mRestrictions as $action => $selected ) {
371  // Messages:
372  // restriction-edit, restriction-move, restriction-create, restriction-upload
373  $msg = $context->msg( 'restriction-' . $action );
374  $out .= "<tr><td>" .
375  Xml::openElement( 'fieldset' ) .
376  Xml::element( 'legend', null, $msg->exists() ? $msg->text() : $action ) .
377  Xml::openElement( 'table', [ 'id' => "mw-protect-table-$action" ] ) .
378  "<tr><td>" . $this->buildSelector( $action, $selected ) . "</td></tr><tr><td>";
379 
380  $mProtectexpiry = Xml::label(
381  $context->msg( 'protectexpiry' )->text(),
382  "mwProtectExpirySelection-$action"
383  );
384  $mProtectother = Xml::label(
385  $context->msg( 'protect-othertime' )->text(),
386  "mwProtect-$action-expires"
387  );
388 
389  $expiryFormOptions = new XmlSelect(
390  "wpProtectExpirySelection-$action",
391  "mwProtectExpirySelection-$action",
392  $this->mExpirySelection[$action]
393  );
394  $expiryFormOptions->setAttribute( 'tabindex', '2' );
395  if ( $this->disabled ) {
396  $expiryFormOptions->setAttribute( 'disabled', 'disabled' );
397  }
398 
399  if ( $this->mExistingExpiry[$action] ) {
400  if ( $this->mExistingExpiry[$action] == 'infinity' ) {
401  $existingExpiryMessage = $context->msg( 'protect-existing-expiry-infinity' );
402  } else {
403  $timestamp = $lang->userTimeAndDate( $this->mExistingExpiry[$action], $user );
404  $d = $lang->userDate( $this->mExistingExpiry[$action], $user );
405  $t = $lang->userTime( $this->mExistingExpiry[$action], $user );
406  $existingExpiryMessage = $context->msg(
407  'protect-existing-expiry',
408  $timestamp,
409  $d,
410  $t
411  );
412  }
413  $expiryFormOptions->addOption( $existingExpiryMessage->text(), 'existing' );
414  }
415 
416  $expiryFormOptions->addOption(
417  $context->msg( 'protect-othertime-op' )->text(),
418  'othertime'
419  );
420  foreach ( explode( ',', $scExpiryOptions ) as $option ) {
421  if ( strpos( $option, ":" ) === false ) {
422  $show = $value = $option;
423  } else {
424  list( $show, $value ) = explode( ":", $option );
425  }
426  $expiryFormOptions->addOption( $show, htmlspecialchars( $value ) );
427  }
428  # Add expiry dropdown
429  if ( $showProtectOptions && !$this->disabled ) {
430  $out .= "
431  <table><tr>
432  <td class='mw-label'>
433  {$mProtectexpiry}
434  </td>
435  <td class='mw-input'>" .
436  $expiryFormOptions->getHTML() .
437  "</td>
438  </tr></table>";
439  }
440  # Add custom expiry field
441  $attribs = [ 'id' => "mwProtect-$action-expires" ] + $this->disabledAttrib;
442  $out .= "<table><tr>
443  <td class='mw-label'>" .
444  $mProtectother .
445  '</td>
446  <td class="mw-input">' .
447  Xml::input( "mwProtect-expiry-$action", 50, $this->mExpiry[$action], $attribs ) .
448  '</td>
449  </tr></table>';
450  $out .= "</td></tr>" .
451  Xml::closeElement( 'table' ) .
452  Xml::closeElement( 'fieldset' ) .
453  "</td></tr>";
454  }
455  # Give extensions a chance to add items to the form
456  Hooks::run( 'ProtectionForm::buildForm', [ $this->mArticle, &$out ] );
457 
458  $out .= Xml::closeElement( 'tbody' ) . Xml::closeElement( 'table' );
459 
460  // JavaScript will add another row with a value-chaining checkbox
461  if ( $this->mTitle->exists() ) {
462  $out .= Xml::openElement( 'table', [ 'id' => 'mw-protect-table2' ] ) .
463  Xml::openElement( 'tbody' );
464  $out .= '<tr>
465  <td></td>
466  <td class="mw-input">' .
468  $context->msg( 'protect-cascade' )->text(),
469  'mwProtect-cascade',
470  'mwProtect-cascade',
471  $this->mCascade, $this->disabledAttrib
472  ) .
473  "</td>
474  </tr>\n";
475  $out .= Xml::closeElement( 'tbody' ) . Xml::closeElement( 'table' );
476  }
477 
478  # Add manual and custom reason field/selects as well as submit
479  if ( !$this->disabled ) {
480  $mProtectreasonother = Xml::label(
481  $context->msg( 'protectcomment' )->text(),
482  'wpProtectReasonSelection'
483  );
484 
485  $mProtectreason = Xml::label(
486  $context->msg( 'protect-otherreason' )->text(),
487  'mwProtect-reason'
488  );
489 
490  $reasonDropDown = Xml::listDropDown( 'wpProtectReasonSelection',
491  wfMessage( 'protect-dropdown' )->inContentLanguage()->text(),
492  wfMessage( 'protect-otherreason-op' )->inContentLanguage()->text(),
493  $this->mReasonSelection,
494  'mwProtect-reason', 4 );
495 
496  $out .= Xml::openElement( 'table', [ 'id' => 'mw-protect-table3' ] ) .
497  Xml::openElement( 'tbody' );
498  $out .= "
499  <tr>
500  <td class='mw-label'>
501  {$mProtectreasonother}
502  </td>
503  <td class='mw-input'>
504  {$reasonDropDown}
505  </td>
506  </tr>
507  <tr>
508  <td class='mw-label'>
509  {$mProtectreason}
510  </td>
511  <td class='mw-input'>" .
512  Xml::input( 'mwProtect-reason', 60, $this->mReason, [ 'type' => 'text',
513  'id' => 'mwProtect-reason', 'maxlength' => 180 ] ) .
514  // Limited maxlength as the database trims at 255 bytes and other texts
515  // chosen by dropdown menus on this page are also included in this database field.
516  // The byte limit of 180 bytes is enforced in javascript
517  "</td>
518  </tr>";
519  # Disallow watching is user is not logged in
520  if ( $user->isLoggedIn() ) {
521  $out .= "
522  <tr>
523  <td></td>
524  <td class='mw-input'>" .
525  Xml::checkLabel( $context->msg( 'watchthis' )->text(),
526  'mwProtectWatch', 'mwProtectWatch',
527  $user->isWatched( $this->mTitle ) || $user->getOption( 'watchdefault' ) ) .
528  "</td>
529  </tr>";
530  }
531  $out .= "
532  <tr>
533  <td></td>
534  <td class='mw-submit'>" .
536  $context->msg( 'confirm' )->text(),
537  [ 'id' => 'mw-Protect-submit' ]
538  ) .
539  "</td>
540  </tr>\n";
541  $out .= Xml::closeElement( 'tbody' ) . Xml::closeElement( 'table' );
542  }
543  $out .= Xml::closeElement( 'fieldset' );
544 
545  if ( $user->isAllowed( 'editinterface' ) ) {
547  $context->msg( 'protect-dropdown' )->inContentLanguage()->getTitle(),
548  $context->msg( 'protect-edit-reasonlist' )->escaped(),
549  [],
550  [ 'action' => 'edit' ]
551  );
552  $out .= '<p class="mw-protect-editreasons">' . $link . '</p>';
553  }
554 
555  if ( !$this->disabled ) {
556  $out .= Html::hidden(
557  'wpEditToken',
558  $user->getEditToken( [ 'protect', $this->mTitle->getPrefixedDBkey() ] )
559  );
560  $out .= Xml::closeElement( 'form' );
561  }
562 
563  return $out;
564  }
565 
573  function buildSelector( $action, $selected ) {
574  // If the form is disabled, display all relevant levels. Otherwise,
575  // just show the ones this user can use.
576  $levels = MWNamespace::getRestrictionLevels( $this->mTitle->getNamespace(),
577  $this->disabled ? null : $this->mContext->getUser()
578  );
579 
580  $id = 'mwProtect-level-' . $action;
581 
582  $select = new XmlSelect( $id, $id, $selected );
583  $select->setAttribute( 'size', count( $levels ) );
584  if ( $this->disabled ) {
585  $select->setAttribute( 'disabled', 'disabled' );
586  }
587 
588  foreach ( $levels as $key ) {
589  $select->addOption( $this->getOptionLabel( $key ), $key );
590  }
591 
592  return $select->getHTML();
593  }
594 
601  private function getOptionLabel( $permission ) {
602  if ( $permission == '' ) {
603  return $this->mContext->msg( 'protect-default' )->text();
604  } else {
605  // Messages: protect-level-autoconfirmed, protect-level-sysop
606  $msg = $this->mContext->msg( "protect-level-{$permission}" );
607  if ( $msg->exists() ) {
608  return $msg->text();
609  }
610  return $this->mContext->msg( 'protect-fallback', $permission )->text();
611  }
612  }
613 
620  function showLogExtract( &$out ) {
621  # Show relevant lines from the protection log:
622  $protectLogPage = new LogPage( 'protect' );
623  $out->addHTML( Xml::element( 'h2', null, $protectLogPage->getName()->text() ) );
624  LogEventsList::showLogExtract( $out, 'protect', $this->mTitle );
625  # Let extensions add other relevant log extracts
626  Hooks::run( 'ProtectionForm::showLogExtract', [ $this->mArticle, $out ] );
627  }
628 }
deferred txt A few of the database updates required by various functions here can be deferred until after the result page is displayed to the user For updating the view updating the linked to tables after a etc PHP does not yet have any way to tell the server to actually return and disconnect while still running these but it might have such a feature in the future We handle these by creating a deferred update object and putting those objects on a global list
Definition: deferred.txt:11
this hook is for auditing only or null if authentication failed before getting that far or null if we can t even determine that probably a stub it is not rendered in wiki pages or galleries in category pages allow injecting custom HTML after the section Any uses of the hook need to handle escaping see BaseTemplate::getToolbox and BaseTemplate::makeListItem for details on the format of individual items inside of this array or by returning and letting standard HTTP rendering take place modifiable or by returning false and taking over the output $out
Definition: hooks.txt:776
save()
Save submitted protection form.
buildForm()
Build the input form.
$context
Definition: load.php:43
static element($element, $attribs=null, $contents= '', $allowShortTag=true)
Format an XML element with given attributes and, optionally, text content.
Definition: Xml.php:39
processing should stop and the error should be shown to the user * false
Definition: hooks.txt:189
buildSelector($action, $selected)
Build protection level selector.
if(!isset($args[0])) $lang
static hidden($name, $value, array $attribs=[])
Convenience function to produce an input element with type=hidden.
Definition: Html.php:749
Class for generating HTML <select> or <datalist> elements.
Definition: XmlSelect.php:26
string $mReasonSelection
The reason selected from the list, blank for other/additional.
Class for viewing MediaWiki article and history.
Definition: Article.php:34
Using a hook running we can avoid having all this option specific stuff in our mainline code Using the function array $article
Definition: hooks.txt:78
$value
static input($name, $size=false, $value=false, $attribs=[])
Convenience function to build an HTML text input field.
Definition: Xml.php:275
array $mApplicableTypes
Types (i.e.
array $mRestrictions
A map of action to restriction level, from request or default.
array $mPermErrors
Permissions errors for the protect action.
static getRestrictionLevels($index, User $user=null)
Determine which restriction levels it makes sense to use in a namespace, optionally filtered by a use...
static submitButton($value, $attribs=[])
Convenience function to build an HTML submit button When $wgUseMediaWikiUIEverywhere is true it will ...
Definition: Xml.php:460
see documentation in includes Linker php for Linker::makeImageLink & $time
Definition: hooks.txt:1629
static label($label, $id, $attribs=[])
Convenience function to build an HTML form label.
Definition: Xml.php:359
static showLogExtract(&$out, $types=[], $page= '', $user= '', $param=[])
Show log extract.
the value to return A Title object or null for latest to be modified or replaced by the hook handler or if authentication is not possible after cache objects are set for highlighting & $link
Definition: hooks.txt:2621
array $mExpiry
Map of action to "other" expiry time.
Class to simplify the use of log pages.
Definition: LogPage.php:32
getContext()
Gets the context this Article is executed in.
Definition: Article.php:2040
wfTimestamp($outputtype=TS_UNIX, $ts=0)
Get a timestamp string in one of various formats.
getRequest()
Get the WebRequest object.
static closeElement($element)
Shortcut to close an XML element.
Definition: Xml.php:118
wfEscapeWikiText($text)
Escapes the given text so that it may be output using addWikiText() without any linking, formatting, etc.
wfReadOnly()
Check whether the wiki is in read-only mode.
An error page which can definitely be safely rendered using the OutputPage.
if($limit) $timestamp
static openElement($element, $attribs=null)
This opens an XML element.
Definition: Xml.php:109
wfTimestampNow()
Convenience function; returns MediaWiki timestamp for the present time.
string $mReason
The custom/additional protection reason.
getTitle()
Get the title object of the article.
Definition: Article.php:166
wfIsInfinity($str)
Determine input string is represents as infinity.
IContextSource $mContext
loadData()
Loads the current state of protection into the object.
null means default in associative array with keys and values unescaped Should be merged with default with a value of false meaning to suppress the attribute in associative array with keys and values unescaped just before the function returns a value If you return an< a > element with HTML attributes $attribs and contents $html will be returned If you return $ret will be returned after processing after in associative array form externallinks including delete and has completed for all link tables whether this was an auto creation default is conds Array Extra conditions for the No matching items in log is displayed if loglist is empty msgKey Array If you want a nice box with a set this to the key of the message First element is the message additional optional elements are parameters for the key that are processed with wfMessage() -> params() ->parseAsBlock()-offset Set to overwrite offset parameter in $wgRequest set to ''to unsetoffset-wrap String Wrap the message in html(usually something like"&lt
Allows to change the fields on the form that will be generated are created Can be used to omit specific feeds from being outputted You must not use this hook to add use OutputPage::addFeedLink() instead.&$feedLinks conditions will AND in the final query as a Content object as a Content object $title
Definition: hooks.txt:312
static linkKnown($target, $html=null, $customAttribs=[], $query=[], $options=[ 'known'])
Identical to link(), except $options defaults to 'known'.
Definition: Linker.php:255
static run($event, array $args=[], $deprecatedVersion=null)
Call hook functions defined in Hooks::register and $wgHooks.
Definition: Hooks.php:131
show($err=null)
Show the input form with optional error message.
design txt This is a brief overview of the new design More thorough and up to date information is available on the documentation wiki at etc Handles the details of getting and saving to the user table of the and dealing with sessions and cookies OutputPage Encapsulates the entire HTML page that will be sent in response to any server request It is used by calling its functions to add text
Definition: design.txt:12
addModules($modules)
This document is intended to provide useful advice for parties seeking to redistribute MediaWiki to end users It s targeted particularly at maintainers for Linux since it s been observed that distribution packages of MediaWiki often break We ve consistently had to recommend that users seeking support use official tarballs instead of their distribution s and this often solves whatever problem the user is having It would be nice if this could such as
Definition: distributors.txt:9
please add to it if you re going to add events to the MediaWiki code where normally authentication against an external auth plugin would be creating a local account $user
Definition: hooks.txt:242
this hook is for auditing only RecentChangesLinked and Watchlist RecentChangesLinked and Watchlist e g Watchlist removed from all revisions and log entries to which it was applied This gives extensions a chance to take it off their books as the deletion has already been partly carried out by this point or something similar the user will be unable to create the tag set and then return false from the hook function Ensure you consume the ChangeTagAfterDelete hook to carry out custom deletion actions as context called by AbstractContent::getParserOutput May be used to override the normal model specific rendering of page content as context as context the output can only depend on parameters provided to this hook not on global state indicating whether full HTML should be generated If generation of HTML may be but other information should still be present in the ParserOutput object & $output
Definition: hooks.txt:1020
getOptionLabel($permission)
Prepare the label for a protection selector option.
const TS_MW
MediaWiki concatenated string timestamp (YYYYMMDDHHMMSS)
execute()
Main entry point for action=protect and action=unprotect.
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency which acts as the top level factory for services in MediaWiki which can be used to gain access to default instances of various services MediaWikiServices however also allows new services to be defined and default services to be redefined Services are defined or redefined by providing a callback the instantiator that will return a new instance of the service When it will create an instance of MediaWikiServices and populate it with the services defined in the files listed by thereby bootstrapping the DI framework Per $wgServiceWiringFiles lists includes ServiceWiring php
Definition: injection.txt:35
__construct(Article $article)
error also a ContextSource you ll probably need to make sure the header is varied on $request
Definition: hooks.txt:2458
wfReadOnlyReason()
Check if the site is in read-only mode and return the message if so.
array $mExpirySelection
Map of action to value selected in expiry drop-down list.
linkcache txt The LinkCache class maintains a list of article titles and the information about whether or not the article exists in the database This is used to mark up links when displaying a page If the same link appears more than once on any page then it only has to be looked up once In most cases link lookups are done in batches with the LinkBatch class or the equivalent in so the link cache is mostly useful for short snippets of parsed and for links in the navigation areas of the skin The link cache was formerly used to track links used in a document for the purposes of updating the link tables This application is now deprecated To create a you can use the following $titles
Definition: linkcache.txt:17
array $mExistingExpiry
Map of action to the expiry time of the existing protection.
showLogExtract(&$out)
Show protection long extracts for this page.
bool $mCascade
True if the restrictions are cascading, from request or existing protection.
this hook is for auditing only RecentChangesLinked and Watchlist RecentChangesLinked and Watchlist e g Watchlist removed from all revisions and log entries to which it was applied This gives extensions a chance to take it off their books as the deletion has already been partly carried out by this point or something similar the user will be unable to create the tag set $status
Definition: hooks.txt:1020
static checkLabel($label, $name, $id, $checked=false, $attribs=[])
Convenience function to build an HTML checkbox with a label.
Definition: Xml.php:420
addJsConfigVars($keys, $value=null)
Add one or more variables to be set in mw.config in JavaScript.
Handles the page protection UI and backend.
null means default in associative array with keys and values unescaped Should be merged with default with a value of false meaning to suppress the attribute in associative array with keys and values unescaped noclasses just before the function returns a value If you return an< a > element with HTML attributes $attribs and contents $html will be returned If you return $ret will be returned and may include noclasses after processing & $attribs
Definition: hooks.txt:1816
getExpiry($action)
Get the expiry time for a given action, by combining the relevant inputs.
static doWatchOrUnwatch($watch, Title $title, User $user)
Watch or unwatch a page.
Definition: WatchAction.php:83
static listDropDown($name= '', $list= '', $other= '', $selected= '', $class= '', $tabindex=null)
Build a drop-down box from a textual list.
Definition: Xml.php:508