In paragraph '1.2.1 Examples' the update_script sub page has been declared obsolete and provide a useless circular loop on the topic page. Please clean of reformulate the sentence. see -> https://www.mediawiki.org/w/index.php?title=Extension:SpamBlacklist/update_script&diff=prev&oldid=5951839 --Christian 🇫🇷 FR (talk) 13:55, 27 August 2023 (UTC)
Extension talk:SpamBlacklist
Appearance
Thanks for noticing. I just removed the looping link.
MW 1.39.3 HTTP 500 - MWExceptionHandler on edit submit
Fresh update:
MediaWiki | 1.39.3 |
PHP | 7.4.33 (apache2handler) |
MariaDB | 10.1.48-MariaDB-0ubuntu0.18.04.1 |
ICU | 65.1 |
Lua | 5.1.5 |
Pygments | 2.11.2 |
Version of SpamBlackList is the one bundled MW release.
SpamBlacklist | – | GPL-2.0-or-later | Strumento antispam basato sulle espressioni regolari per bloccare URL e indirizzi email di utenti registrati | Tim Starling, John Du Hart e Daniel Kinzler |
On action=sumbit (with or without VisualEditor), receiving HTTP 500, from debug it seems exception has been throwned after retrieving (and i assume execting) spam regex from https://meta.wikimedia.org/w/index.php?title=Spam_blacklist&action=raw&sb_ver=1
For the moment I've disabled the extension, and everything works fine. Any advice?
.. [objectcache] fetchOrRegenerate(<wiki_path>:pageimages-denylist): miss, new value computed [objectcache] fetchOrRegenerate(<wiki_path>:spamblacklist:spam:blacklist-regex): miss, new value computed [SpamBlacklist] Loading spam regex... [SpamBlacklist] Constructing spam blacklist [DBConnection] Wikimedia\Rdbms\LoadBalancer::getLocalConnection: reused a connection for localAutoCommit/0 [DBQuery] SqlBagOStuff::fetchBlobs [0s] localhost: SELECT keyname,value,exptime FROM `objectcache` WHERE keyname = 'global:blacklist_file_spam:https%3A//meta.wikimedia.org/w/index.php?title=Spam_blacklist&action=raw&sb_ver=1' AND (exptime >= '20230607074741') [DBConnection] Wikimedia\Rdbms\LoadBalancer::getLocalConnection: reused a connection for localAutoCommit/0 [DBQuery] SqlBagOStuff::fetchBlobs [0s] localhost: SELECT keyname,value,exptime FROM `objectcache` WHERE keyname = '<wiki_path>:filewarning_spam:https%3A//meta.wikimedia.org/w/index.php?title=Spam_blacklist&action=raw&sb_ver=1' AND (exptime >= '20230607074741') [SpamBlacklist] Loading spam blacklist from https://meta.wikimedia.org/w/index.php?title=Spam_blacklist&action=raw&sb_ver=1 [http] GET: https://meta.wikimedia.org/w/index.php?title=Spam_blacklist&action=raw&sb_ver=1 [exception] [4e67fd69d9fa28d9bf4cb940] /api.php PHP Fatal Error from line 49 of /var/www/<wiki_path>/includes/http/MWCallbackStream.php: Declaration of MWCallbackStream::write($string) must be compatible with Psr\Http\Message\StreamInterface::write(string $string): int #0 [internal function]: MWExceptionHandler::handleFatalError() #1 {main} [session] Saving all sessions on shutdown
I'm seeing lots of spam email addresses on valid domains but they have several dots/periods for example:
as.qwrdf.zxcv.s.a'@'validmail.com
I would like to just count the number of periods and limit it to one or two and block those. Detecting any pattern and limiting it might also come in handy
Of course this won't resolve the spam issue and the skilled spammers will adapt, but any help with the regex is appreciated.
I'm trying to trigger the blacklist on a test wiki on purpose. But I've never triggered the spam blacklist before, so I don't know how to trigger it. Can someone please tell me what I need to do in order to trigger the blacklist? I've added stuff to this blacklist. But I'm clearly doing something wrong.
The syntax is very important, try a much smaller test such as the ones here
Alright, I've added it, except for the penultimate line, as it wouldn't let me save those expressions to the blacklist. But I still can't seem to trigger the blacklist.
Check https://publictestwiki.com/wiki/Special:Log/spamblacklist and see if anyone is hitting it?
Not possible. No one on that wiki has access to that log. Or I would have checked it already.
SpamBlacklist uses $messageMemc as its cache which is set to deprecate in 1.35 and be removed in 1.36. I was dumb enough to check out 1.36 when it was alpha so I had to manually make this change. Strongly suggest the devs switch to $wgMemc and/or maybe use an existence check. For poor saps like me, simple fix is to sed -i s/messageMemc/wgMemc/ extensions/SpamBlacklist/includes/BaseBlacklist.php
Also thought I should note, the error you get with this appears infrequently when the spam filter is triggered, and the message
<code>BaseBlacklist.php: Call to a member function get() on null</code>
Hello pls add wonderphysio.com to blacklist.
best regards.
On this wiki?
fa.wiki
Ok. You need to file a request on phabricator for this or ask an local admin to add this to the local blacklist.
thanks have a nice time.
(Originally posted at w:en:Wikipedia talk:Spam blacklist#Nomenclature given Back Lives Matter.)
I work in IT & just saw a company email stating that many in the IT world are changing nomenclature to “safe list / block list”. It occurred to me that we should start a discussion about it here, in light of institutional racism. It may be that the underlying etymology was not racist, but I think contemporary usage requires rethinking. Peaceray (talk)
I am all for rethinking the naming of this and other extensions following this scheme including related system messages. I think it is best to create general task on Phabricator for this and once the English speakers agreed on the change subtasks for the affected extensions can be created to work on.
I was not aware that this was already added to Phabricator. Thanks for posting the respective IDs.
There are no older topics