2020-05-24 23:13:21 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
module Spam
|
|
|
|
class SpamVerdictService
|
|
|
|
include AkismetMethods
|
|
|
|
include SpamConstants
|
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
def initialize(user:, target:, options:, context: {}, extra_features: {})
|
2020-05-24 23:13:21 +05:30
|
|
|
@target = target
|
2020-06-23 00:09:42 +05:30
|
|
|
@user = user
|
2020-05-24 23:13:21 +05:30
|
|
|
@options = options
|
2021-06-08 01:23:25 +05:30
|
|
|
@context = context
|
2022-10-11 01:57:18 +05:30
|
|
|
@extra_features = extra_features
|
2020-05-24 23:13:21 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def execute
|
2021-06-08 01:23:25 +05:30
|
|
|
spamcheck_result = nil
|
|
|
|
spamcheck_attribs = {}
|
|
|
|
spamcheck_error = false
|
|
|
|
|
|
|
|
external_spam_check_round_trip_time = Benchmark.realtime do
|
|
|
|
spamcheck_result, spamcheck_attribs, spamcheck_error = spamcheck_verdict
|
|
|
|
end
|
|
|
|
|
|
|
|
label = spamcheck_error ? 'ERROR' : spamcheck_result.to_s.upcase
|
|
|
|
|
2023-01-13 00:05:48 +05:30
|
|
|
histogram.observe({ result: label }, external_spam_check_round_trip_time)
|
2021-06-08 01:23:25 +05:30
|
|
|
|
|
|
|
# assign result to a var for logging it before reassigning to nil when monitorMode is true
|
|
|
|
original_spamcheck_result = spamcheck_result
|
|
|
|
|
|
|
|
spamcheck_result = nil if spamcheck_attribs&.fetch("monitorMode", "false") == "true"
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
akismet_result = akismet_verdict
|
|
|
|
|
|
|
|
# filter out anything we don't recognise, including nils.
|
2021-06-08 01:23:25 +05:30
|
|
|
valid_results = [spamcheck_result, akismet_result].compact.select { |r| SUPPORTED_VERDICTS.key?(r) }
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
# Treat nils - such as service unavailable - as ALLOW
|
|
|
|
return ALLOW unless valid_results.any?
|
|
|
|
|
|
|
|
# Favour the most restrictive result.
|
2022-05-07 20:08:51 +05:30
|
|
|
verdict = valid_results.min_by { |v| SUPPORTED_VERDICTS[v][:priority] }
|
|
|
|
|
|
|
|
# The target can override the verdict via the `allow_possible_spam` feature flag
|
|
|
|
verdict = OVERRIDE_VIA_ALLOW_POSSIBLE_SPAM if override_via_allow_possible_spam?(verdict: verdict)
|
2021-06-08 01:23:25 +05:30
|
|
|
|
|
|
|
logger.info(class: self.class.name,
|
|
|
|
akismet_verdict: akismet_verdict,
|
|
|
|
spam_check_verdict: original_spamcheck_result,
|
|
|
|
extra_attributes: spamcheck_attribs,
|
|
|
|
spam_check_rtt: external_spam_check_round_trip_time.real,
|
2022-05-07 20:08:51 +05:30
|
|
|
final_verdict: verdict,
|
2021-06-08 01:23:25 +05:30
|
|
|
username: user.username,
|
|
|
|
user_id: user.id,
|
|
|
|
target_type: target.class.to_s,
|
|
|
|
project_id: target.project_id
|
|
|
|
)
|
|
|
|
|
2022-05-07 20:08:51 +05:30
|
|
|
verdict
|
2020-06-23 00:09:42 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
attr_reader :user, :target, :options, :context, :extra_features
|
2020-06-23 00:09:42 +05:30
|
|
|
|
|
|
|
def akismet_verdict
|
2020-05-24 23:13:21 +05:30
|
|
|
if akismet.spam?
|
2020-06-23 00:09:42 +05:30
|
|
|
Gitlab::Recaptcha.enabled? ? CONDITIONAL_ALLOW : DISALLOW
|
2020-05-24 23:13:21 +05:30
|
|
|
else
|
|
|
|
ALLOW
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-06-08 01:23:25 +05:30
|
|
|
def spamcheck_verdict
|
2020-06-23 00:09:42 +05:30
|
|
|
return unless Gitlab::CurrentSettings.spam_check_endpoint_enabled
|
|
|
|
|
|
|
|
begin
|
2022-10-11 01:57:18 +05:30
|
|
|
result, attribs, _error = spamcheck_client.spam?(spammable: target, user: user, context: context,
|
|
|
|
extra_features: extra_features)
|
2021-06-08 01:23:25 +05:30
|
|
|
# @TODO log if error is not nil https://gitlab.com/gitlab-org/gitlab/-/issues/329545
|
|
|
|
|
2021-12-11 22:18:48 +05:30
|
|
|
return [nil, attribs] unless result
|
|
|
|
|
|
|
|
[result, attribs]
|
2021-06-08 01:23:25 +05:30
|
|
|
|
|
|
|
rescue StandardError => e
|
2022-10-11 01:57:18 +05:30
|
|
|
Gitlab::ErrorTracking.log_exception(e, error: ERROR_TYPE)
|
2021-06-08 01:23:25 +05:30
|
|
|
|
|
|
|
# Default to ALLOW if any errors occur
|
|
|
|
[ALLOW, attribs, true]
|
2020-06-23 00:09:42 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-07 20:08:51 +05:30
|
|
|
def override_via_allow_possible_spam?(verdict:)
|
|
|
|
# If the verdict is already going to allow (because current verdict's priority value is greater
|
|
|
|
# than the override verdict's priority value), then we don't need to override it.
|
|
|
|
return false if SUPPORTED_VERDICTS[verdict][:priority] > SUPPORTED_VERDICTS[OVERRIDE_VIA_ALLOW_POSSIBLE_SPAM][:priority]
|
|
|
|
|
|
|
|
target.allow_possible_spam?
|
|
|
|
end
|
|
|
|
|
2021-06-08 01:23:25 +05:30
|
|
|
def spamcheck_client
|
|
|
|
@spamcheck_client ||= Gitlab::Spamcheck::Client.new
|
|
|
|
end
|
|
|
|
|
|
|
|
def logger
|
|
|
|
@logger ||= Gitlab::AppJsonLogger.build
|
2020-06-23 00:09:42 +05:30
|
|
|
end
|
|
|
|
|
2021-06-08 01:23:25 +05:30
|
|
|
def histogram
|
|
|
|
@histogram ||= Gitlab::Metrics.histogram(:gitlab_spamcheck_request_duration_seconds, 'Request duration to the anti-spam service')
|
2020-06-23 00:09:42 +05:30
|
|
|
end
|
2020-05-24 23:13:21 +05:30
|
|
|
end
|
|
|
|
end
|