2020-05-24 23:13:21 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
module Spam
|
|
|
|
class SpamActionService
|
|
|
|
include SpamConstants
|
|
|
|
|
|
|
|
attr_accessor :target, :request, :options
|
|
|
|
attr_reader :spam_log
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
def initialize(spammable:, request:, user:, context: {})
|
2020-05-24 23:13:21 +05:30
|
|
|
@target = spammable
|
|
|
|
@request = request
|
2020-06-23 00:09:42 +05:30
|
|
|
@user = user
|
|
|
|
@context = context
|
2020-05-24 23:13:21 +05:30
|
|
|
@options = {}
|
|
|
|
|
|
|
|
if @request
|
|
|
|
@options[:ip_address] = @request.env['action_dispatch.remote_ip'].to_s
|
|
|
|
@options[:user_agent] = @request.env['HTTP_USER_AGENT']
|
|
|
|
@options[:referrer] = @request.env['HTTP_REFERRER']
|
|
|
|
else
|
|
|
|
@options[:ip_address] = @target.ip_address
|
|
|
|
@options[:user_agent] = @target.user_agent
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
def execute(api: false, recaptcha_verified:, spam_log_id:)
|
2020-05-24 23:13:21 +05:30
|
|
|
if recaptcha_verified
|
|
|
|
# If it's a request which is already verified through reCAPTCHA,
|
|
|
|
# update the spam log accordingly.
|
|
|
|
SpamLog.verify_recaptcha!(user_id: user.id, id: spam_log_id)
|
|
|
|
else
|
|
|
|
return if allowlisted?(user)
|
|
|
|
return unless request
|
|
|
|
return unless check_for_spam?
|
|
|
|
|
|
|
|
perform_spam_service_check(api)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
delegate :check_for_spam?, to: :target
|
|
|
|
|
|
|
|
private
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
attr_reader :user, :context
|
|
|
|
|
2020-05-24 23:13:21 +05:30
|
|
|
def allowlisted?(user)
|
|
|
|
user.respond_to?(:gitlab_employee) && user.gitlab_employee?
|
|
|
|
end
|
|
|
|
|
|
|
|
def perform_spam_service_check(api)
|
|
|
|
# since we can check for spam, and recaptcha is not verified,
|
|
|
|
# ask the SpamVerdictService what to do with the target.
|
|
|
|
spam_verdict_service.execute.tap do |result|
|
|
|
|
case result
|
2020-06-23 00:09:42 +05:30
|
|
|
when CONDITIONAL_ALLOW
|
|
|
|
# at the moment, this means "ask for reCAPTCHA"
|
2020-05-24 23:13:21 +05:30
|
|
|
create_spam_log(api)
|
|
|
|
|
|
|
|
break if target.allow_possible_spam?
|
|
|
|
|
|
|
|
target.needs_recaptcha!
|
|
|
|
when DISALLOW
|
|
|
|
# TODO: remove `unless target.allow_possible_spam?` once this flag has been passed to `SpamVerdictService`
|
|
|
|
# https://gitlab.com/gitlab-org/gitlab/-/issues/214739
|
|
|
|
target.spam! unless target.allow_possible_spam?
|
|
|
|
create_spam_log(api)
|
|
|
|
when ALLOW
|
|
|
|
target.clear_spam_flags!
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def create_spam_log(api)
|
|
|
|
@spam_log = SpamLog.create!(
|
|
|
|
{
|
|
|
|
user_id: target.author_id,
|
|
|
|
title: target.spam_title,
|
|
|
|
description: target.spam_description,
|
|
|
|
source_ip: options[:ip_address],
|
|
|
|
user_agent: options[:user_agent],
|
2020-06-23 00:09:42 +05:30
|
|
|
noteable_type: notable_type,
|
2020-05-24 23:13:21 +05:30
|
|
|
via_api: api
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
target.spam_log = spam_log
|
|
|
|
end
|
|
|
|
|
|
|
|
def spam_verdict_service
|
|
|
|
SpamVerdictService.new(target: target,
|
2020-06-23 00:09:42 +05:30
|
|
|
user: user,
|
2020-05-24 23:13:21 +05:30
|
|
|
request: @request,
|
2020-06-23 00:09:42 +05:30
|
|
|
options: options,
|
|
|
|
context: context.merge(target_type: notable_type))
|
|
|
|
end
|
|
|
|
|
|
|
|
def notable_type
|
|
|
|
@notable_type ||= target.class.to_s
|
2020-05-24 23:13:21 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|