X-Git-Url: https://git.toastfreeware.priv.at/toast/cookiecaptcha.git/blobdiff_plain/84c2f656b749d97903f78cf4d77a254107ee83a2..7334011d30d93c36176d149b48a8e19d63c25106:/ConfirmEdit_body.php diff --git a/ConfirmEdit_body.php b/ConfirmEdit_body.php index 8c0d780..4ec7ff5 100644 --- a/ConfirmEdit_body.php +++ b/ConfirmEdit_body.php @@ -39,8 +39,8 @@ class ConfirmEditHooks { return self::getInstance()->triggerUserLogin( $user, $password, $retval ); } - static function injectUserLogin( &$template ) { - return self::getInstance()->injectUserLogin( $template ); + static function injectUserLogin( &$sp ) { + return self::getInstance()->injectUserLogin( $sp ); } static function confirmUserLogin( $u, $pass, &$retval ) { @@ -144,18 +144,18 @@ class SimpleCaptcha { * @param SimpleTemplate $template * @return bool true to keep running callbacks */ - function injectUserCreate( &$template ) { + function injectUserCreate( &$sp ) { global $wgCaptchaTriggers, $wgOut, $wgUser; if ( $wgCaptchaTriggers['createaccount'] ) { if ( $wgUser->isAllowed( 'skipcaptcha' ) ) { wfDebug( "ConfirmEdit: user group allows skipping captcha on account creation\n" ); return true; } - $template->set( 'header', + $sp->mFormHeader .= "
" . $wgOut->parse( $this->getMessage( 'createaccount' ) ) . $this->getForm() . - "
\n" ); + "\n"; } return true; } @@ -163,18 +163,17 @@ class SimpleCaptcha { /** * Inject a captcha into the user login form after a failed * password attempt as a speedbump for mass attacks. - * @fixme if multiple thingies insert a header, could break * @param SimpleTemplate $template * @return bool true to keep running callbacks */ - function injectUserLogin( &$template ) { + function injectUserLogin( &$sp ) { if ( $this->isBadLoginTriggered() ) { global $wgOut; - $template->set( 'header', + $sp->mFormHeader .= "
" . $wgOut->parse( $this->getMessage( 'badlogin' ) ) . $this->getForm() . - "
\n" ); + "\n"; } return true; } @@ -190,7 +189,7 @@ class SimpleCaptcha { */ function triggerUserLogin( $user, $password, $retval ) { global $wgCaptchaTriggers, $wgCaptchaBadLoginExpiration, $wgMemc; - if ( $retval == LoginForm::WRONG_PASS && $wgCaptchaTriggers['badlogin'] ) { + if ( $retval == Login::WRONG_PASS && $wgCaptchaTriggers['badlogin'] ) { $key = $this->badLoginKey(); $count = $wgMemc->get( $key ); if ( !$count ) { @@ -557,7 +556,7 @@ class SimpleCaptcha { if ( !$this->passCaptcha() ) { $message = wfMsg( 'captcha-badlogin-fail' ); // Emulate a bad-password return to confuse the shit out of attackers - $retval = LoginForm::WRONG_PASS; + $retval = Login::WRONG_PASS; return false; } }