This had gotten disabled during a conversion process of making mediawiki-ConfirmEdit a package I think These files will enable the math based captcha again --- modules/mediawiki-ConfirmEdit/README | 22 ++ .../mediawiki-ConfirmEdit/files/ConfirmEdit.php | 222 ++++++++++++++++++++ modules/mediawiki-ConfirmEdit/manifests/init.pp | 13 ++ modules/mediawiki/manifests/init.pp | 2 +- 4 files changed, 258 insertions(+), 1 deletions(-) create mode 100644 modules/mediawiki-ConfirmEdit/README create mode 100644 modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php create mode 100644 modules/mediawiki-ConfirmEdit/manifests/init.pp
diff --git a/modules/mediawiki-ConfirmEdit/README b/modules/mediawiki-ConfirmEdit/README new file mode 100644 index 0000000..b4f281e --- /dev/null +++ b/modules/mediawiki-ConfirmEdit/README @@ -0,0 +1,22 @@ +===================== +mediawiki-ConfirmEdit +===================== + +----------- +Usage +----------- + +The ConfirmEdit extension enables a simple text Captcha that will probably +catch most bots. It was designed largely by Brion Vibber. The FancyCaptcha and +reCAPTCHA addons create more complex image captchas. + +Captchas are a way of combating automated edits, helping to ensure that wiki +edits are being made by real humans rather than bots. This can be particularly +useful for reducing the problem of wiki spam, but captchas reduce accessibility +and cause inconvenience to human users. In addition, it will not completely +spam-proof your wiki (nor will it protect it from human spammers). You may wish +to use this in conjunction with other anti-spam features. Remember to clean up +any spam which might slip through the net (keep an eye on your 'recent changes' +page). Captcha's can also be used to foil automated login attempts that try to +guess passwords. + diff --git a/modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php b/modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php new file mode 100644 index 0000000..0c33bc9 --- /dev/null +++ b/modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php @@ -0,0 +1,222 @@ +<?php + + +/** + * Experimental captcha plugin framework. + * Not intended as a real production captcha system; derived classes + * can extend the base to produce their fancy images in place of the + * text-based test output here. + * + * Copyright (C) 2005-2007 Brion Vibber brion@wikimedia.org + * http://www.mediawiki.org/ + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License along + * with this program; if not, write to the Free Software Foundation, Inc., + * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + * http://www.gnu.org/copyleft/gpl.html + * + * @addtogroup Extensions + */ + +if ( !defined( 'MEDIAWIKI' ) ) { + exit; +} + +global $wgExtensionFunctions, $wgGroupPermissions; + +$wgExtensionFunctions[] = 'confirmEditSetup'; +$wgExtensionCredits['other'][] = array( + 'name' => 'ConfirmEdit', + 'author' => 'Brion Vibber', + 'svn-date' => '$LastChangedDate: 2008-07-02 23:09:26 +0000 (Wed, 02 Jul 2008) $', + 'svn-revision' => '$LastChangedRevision: 36959 $', + 'url' => 'http://www.mediawiki.org/wiki/Extension:ConfirmEdit', + 'description' => 'Simple captcha implementation', + 'descriptionmsg' => 'captcha-desc', +); + +/** + * The 'skipcaptcha' permission key can be given out to + * let known-good users perform triggering actions without + * having to go through the captcha. + * + * By default, sysops and registered bot accounts will be + * able to skip, while others have to go through it. + */ +$wgGroupPermissions['*' ]['skipcaptcha'] = false; +$wgGroupPermissions['user' ]['skipcaptcha'] = false; +$wgGroupPermissions['autoconfirmed']['skipcaptcha'] = false; +$wgGroupPermissions['bot' ]['skipcaptcha'] = true; // registered bots +$wgGroupPermissions['sysop' ]['skipcaptcha'] = true; +$wgAvailableRights[] = 'skipcaptcha'; + +/** + * List of IP ranges to allow to skip the captcha, similar to the group setting: + * "$wgGroupPermission[...]['skipcaptcha'] = true" + * + * Specific IP addresses or CIDR-style ranges may be used, + * for instance: + * $wgCaptchaWhitelistIP = array('192.168.1.0/24', '10.1.0.0/16'); + */ +$wgCaptchaWhitelistIP = false; + +global $wgCaptcha, $wgCaptchaClass, $wgCaptchaTriggers; +$wgCaptcha = null; +$wgCaptchaClass = 'SimpleCaptcha'; + +/** + * Actions which can trigger a captcha + * + * If the 'edit' trigger is on, *every* edit will trigger the captcha. + * This may be useful for protecting against vandalbot attacks. + * + * If using the default 'addurl' trigger, the captcha will trigger on + * edits that include URLs that aren't in the current version of the page. + * This should catch automated linkspammers without annoying people when + * they make more typical edits. + * + * The captcha code should not use $wgCaptchaTriggers, but CaptchaTriggers() + * which also takes into account per namespace triggering. + */ +$wgCaptchaTriggers = array(); +$wgCaptchaTriggers['edit'] = true; // Would check on every edit +$wgCaptchaTriggers['create'] = true; // Check on page creation. +$wgCaptchaTriggers['addurl'] = true; // Check on edits that add URLs +$wgCaptchaTriggers['createaccount'] = true; // Special:Userlogin&type=signup +$wgCaptchaTriggers['badlogin'] = true; // Special:Userlogin after failure + +/** + * You may wish to apply special rules for captcha triggering on some namespaces. + * $wgCaptchaTriggersOnNamespace[<namespace id>][<trigger>] forces an always on / + * always off configuration with that trigger for the given namespace. + * Leave unset to use the global options ($wgCaptchaTriggers). + * + * Shall not be used with 'createaccount' (it is not checked). + */ +$wgCaptchaTriggersOnNamespace = array(); + +#Example: +#$wgCaptchaTriggersOnNamespace[NS_TALK]['create'] = false; //Allow creation of talk pages without captchas. +#$wgCaptchaTriggersOnNamespace[NS_PROJECT]['edit'] = true; //Show captcha whenever editing Project pages. + +/** + * Indicate how to store per-session data required to match up the + * internal captcha data with the editor. + * + * 'CaptchaSessionStore' uses PHP's session storage, which is cookie-based + * and may fail for anons with cookies disabled. + * + * 'CaptchaCacheStore' uses $wgMemc, which avoids the cookie dependency + * but may be fragile depending on cache configuration. + */ +global $wgCaptchaStorageClass; +$wgCaptchaStorageClass = 'CaptchaSessionStore'; + +/** + * Number of seconds a captcha session should last in the data cache + * before expiring when managing through CaptchaCacheStore class. + * + * Default is a half hour. + */ +global $wgCaptchaSessionExpiration; +$wgCaptchaSessionExpiration = 30 * 60; + +/** + * Number of seconds after a bad login that a captcha will be shown to + * that client on the login form to slow down password-guessing bots. + * + * Has no effect if 'badlogin' is disabled in $wgCaptchaTriggers or + * if there is not a caching engine enabled. + * + * Default is five minutes. + */ +global $wgCaptchaBadLoginExpiration; +$wgCaptchaBadLoginExpiration = 5 * 60; + +/** + * Allow users who have confirmed their e-mail addresses to post + * URL links without being harassed by the captcha. + */ +global $ceAllowConfirmedEmail; +$ceAllowConfirmedEmail = false; + +/** + * Number of bad login attempts before triggering the captcha. 0 means the + * captcha is presented on the first login. + */ +global $wgCaptchaBadLoginAttempts; +$wgCaptchaBadLoginAttempts = 3; + +/** + * Regex to whitelist URLs to known-good sites... + * For instance: + * $wgCaptchaWhitelist = '#^https?://([a-z0-9-]+\.)?(wikimedia|wikipedia).org/#i'; + * Local admins can define a whitelist under [[MediaWiki:captcha-addurl-whitelist]] + */ +$wgCaptchaWhitelist = false; + +/** + * Additional regexes to check for. Use full regexes; can match things + * other than URLs such as junk edits. + * + * If the new version matches one and the old version doesn't, + * toss up the captcha screen. + * + * @fixme Add a message for local admins to add items as well. + */ +$wgCaptchaRegexes = array(); + +/** Register special page */ +$wgSpecialPages['Captcha'] = array( /*class*/'CaptchaSpecialPage', /*name*/'Captcha' ); + +$wgConfirmEditIP = dirname( __FILE__ ); +$wgExtensionMessagesFiles['ConfirmEdit'] = "$wgConfirmEditIP/ConfirmEdit.i18n.php"; + +if ( defined( 'MW_SUPPORTS_EDITFILTERMERGED' ) ) { + $wgHooks['EditFilterMerged'][] = 'ConfirmEditHooks::confirmEditMerged'; +} else { + $wgHooks['EditFilter'][] = 'ConfirmEditHooks::confirmEdit'; +} +$wgHooks['UserCreateForm'][] = 'ConfirmEditHooks::injectUserCreate'; +$wgHooks['AbortNewAccount'][] = 'ConfirmEditHooks::confirmUserCreate'; +$wgHooks['LoginAuthenticateAudit'][] = 'ConfirmEditHooks::triggerUserLogin'; +$wgHooks['UserLoginForm'][] = 'ConfirmEditHooks::injectUserLogin'; +$wgHooks['AbortLogin'][] = 'ConfirmEditHooks::confirmUserLogin'; +# Register API hook +$wgHooks['APIEditBeforeSave'][] = 'ConfirmEditHooks::confirmEditAPI'; + +$wgAutoloadClasses['ConfirmEditHooks'] + = $wgAutoloadClasses['SimpleCaptcha'] + = $wgAutoloadClasses['CaptchaSessionStore'] + = $wgAutoloadClasses['CaptchaCacheStore'] + = $wgAutoloadClasses['CaptchaSpecialPage'] + = "$wgConfirmEditIP/ConfirmEdit_body.php"; + +/** + * Set up $wgWhitelistRead + */ +function confirmEditSetup() { + global $wgGroupPermissions, $wgCaptchaTriggers; + if( !$wgGroupPermissions['*']['read'] && $wgCaptchaTriggers['badlogin'] ) { + // We need to ensure that the captcha interface is accessible + // so that unauthenticated users can actually get in after a + // mistaken password typing. + global $wgWhitelistRead; + $image = Title::makeTitle( NS_SPECIAL, 'Captcha/image' ); + $help = Title::makeTitle( NS_SPECIAL, 'Captcha/help' ); + $wgWhitelistRead[] = $image->getPrefixedText(); + $wgWhitelistRead[] = $help->getPrefixedText(); + } +} + + diff --git a/modules/mediawiki-ConfirmEdit/manifests/init.pp b/modules/mediawiki-ConfirmEdit/manifests/init.pp new file mode 100644 index 0000000..5755cf0 --- /dev/null +++ b/modules/mediawiki-ConfirmEdit/manifests/init.pp @@ -0,0 +1,13 @@ +# mediawiki-ConfirmEdit + +class mediawiki-ConfirmEdit::ConfirmEdit { + package { 'mediawiki-ConfirmEdit' : + ensure => present, + require => Package['mediawiki'] + } + + file { '/usr/share/mediawiki/extensions/ConfirmEdit/ConfirmEdit.php': + require => Package['mediawiki-ConfirmEdit'], + source => 'puppet:///mediawiki-ConfirmEdit/ConfirmEdit.php' + } +} diff --git a/modules/mediawiki/manifests/init.pp b/modules/mediawiki/manifests/init.pp index 6175a45..9606c56 100644 --- a/modules/mediawiki/manifests/init.pp +++ b/modules/mediawiki/manifests/init.pp @@ -1,6 +1,7 @@ class mediawiki::app { include httpd::base include httpd::php + include mediawiki-ConfirmEdit::ConfirmEdit
package { "mediawiki": ensure => installed, @@ -14,7 +15,6 @@ class mediawiki::app { "mediawiki-Boilerplate", "mediawiki-Cite", "mediawiki-Click", - "mediawiki-ConfirmEdit", "mediawiki-HNP", "mediawiki-Lockdown", "mediawiki-ParserFunctions",
On Tuesday 25 August 2009 01:06:56 pm Mike McGrath wrote:
This had gotten disabled during a conversion process of making mediawiki-ConfirmEdit a package I think These files will enable the math based captcha again
+1
modules/mediawiki-ConfirmEdit/README | 22 ++ .../mediawiki-ConfirmEdit/files/ConfirmEdit.php | 222 ++++++++++++++++++++ modules/mediawiki-ConfirmEdit/manifests/init.pp | 13 ++ modules/mediawiki/manifests/init.pp | 2 +- 4 files changed, 258 insertions(+), 1 deletions(-) create mode 100644 modules/mediawiki-ConfirmEdit/README create mode 100644 modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php create mode 100644 modules/mediawiki-ConfirmEdit/manifests/init.pp
diff --git a/modules/mediawiki-ConfirmEdit/README b/modules/mediawiki-ConfirmEdit/README new file mode 100644 index 0000000..b4f281e --- /dev/null +++ b/modules/mediawiki-ConfirmEdit/README @@ -0,0 +1,22 @@ +===================== +mediawiki-ConfirmEdit +=====================
+----------- +Usage +-----------
+The ConfirmEdit extension enables a simple text Captcha that will probably +catch most bots. It was designed largely by Brion Vibber. The FancyCaptcha and +reCAPTCHA addons create more complex image captchas.
+Captchas are a way of combating automated edits, helping to ensure that wiki +edits are being made by real humans rather than bots. This can be particularly +useful for reducing the problem of wiki spam, but captchas reduce accessibility +and cause inconvenience to human users. In addition, it will not completely +spam-proof your wiki (nor will it protect it from human spammers). You may wish +to use this in conjunction with other anti-spam features. Remember to clean up +any spam which might slip through the net (keep an eye on your 'recent changes' +page). Captcha's can also be used to foil automated login attempts that try to +guess passwords.
diff --git a/modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php b/modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php new file mode 100644 index 0000000..0c33bc9 --- /dev/null +++ b/modules/mediawiki-ConfirmEdit/files/ConfirmEdit.php @@ -0,0 +1,222 @@ +<?php
+/**
- Experimental captcha plugin framework.
- Not intended as a real production captcha system; derived classes
- can extend the base to produce their fancy images in place of the
- text-based test output here.
- Copyright (C) 2005-2007 Brion Vibber brion@wikimedia.org
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 2 of the License, or
- (at your option) any later version.
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
- You should have received a copy of the GNU General Public License along
- with this program; if not, write to the Free Software Foundation, Inc.,
- 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- @addtogroup Extensions
- */
+if ( !defined( 'MEDIAWIKI' ) ) {
- exit;
+}
+global $wgExtensionFunctions, $wgGroupPermissions;
+$wgExtensionFunctions[] = 'confirmEditSetup'; +$wgExtensionCredits['other'][] = array(
- 'name' => 'ConfirmEdit',
- 'author' => 'Brion Vibber',
- 'svn-date' => '$LastChangedDate: 2008-07-02 23:09:26 +0000 (Wed, 02 Jul
- $', + 'svn-revision' => '$LastChangedRevision: 36959 $',
- 'url' => 'http://www.mediawiki.org/wiki/Extension:ConfirmEdit',
- 'description' => 'Simple captcha implementation',
- 'descriptionmsg' => 'captcha-desc',
+);
+/**
- The 'skipcaptcha' permission key can be given out to
- let known-good users perform triggering actions without
- having to go through the captcha.
- By default, sysops and registered bot accounts will be
- able to skip, while others have to go through it.
- */
+$wgGroupPermissions['*' ]['skipcaptcha'] = false; +$wgGroupPermissions['user' ]['skipcaptcha'] = false; +$wgGroupPermissions['autoconfirmed']['skipcaptcha'] = false; +$wgGroupPermissions['bot' ]['skipcaptcha'] = true; // registered bots +$wgGroupPermissions['sysop' ]['skipcaptcha'] = true; +$wgAvailableRights[] = 'skipcaptcha';
+/**
- List of IP ranges to allow to skip the captcha, similar to the group
setting: + * "$wgGroupPermission[...]['skipcaptcha'] = true"
- Specific IP addresses or CIDR-style ranges may be used,
- for instance:
- $wgCaptchaWhitelistIP = array('192.168.1.0/24', '10.1.0.0/16');
- */
+$wgCaptchaWhitelistIP = false;
+global $wgCaptcha, $wgCaptchaClass, $wgCaptchaTriggers; +$wgCaptcha = null; +$wgCaptchaClass = 'SimpleCaptcha';
+/**
- Actions which can trigger a captcha
- If the 'edit' trigger is on, *every* edit will trigger the captcha.
- This may be useful for protecting against vandalbot attacks.
- If using the default 'addurl' trigger, the captcha will trigger on
- edits that include URLs that aren't in the current version of the page.
- This should catch automated linkspammers without annoying people when
- they make more typical edits.
- The captcha code should not use $wgCaptchaTriggers, but
CaptchaTriggers() + * which also takes into account per namespace triggering.
- */
+$wgCaptchaTriggers = array(); +$wgCaptchaTriggers['edit'] = true; // Would check on every edit +$wgCaptchaTriggers['create'] = true; // Check on page creation. +$wgCaptchaTriggers['addurl'] = true; // Check on edits that add URLs +$wgCaptchaTriggers['createaccount'] = true; // Special:Userlogin&type=signup +$wgCaptchaTriggers['badlogin'] = true; // Special:Userlogin after failure + +/**
- You may wish to apply special rules for captcha triggering on some
namespaces. + * $wgCaptchaTriggersOnNamespace[<namespace id>][<trigger>] forces an always on / + * always off configuration with that trigger for the given namespace. + * Leave unset to use the global options ($wgCaptchaTriggers).
- Shall not be used with 'createaccount' (it is not checked).
- */
+$wgCaptchaTriggersOnNamespace = array();
+#Example: +#$wgCaptchaTriggersOnNamespace[NS_TALK]['create'] = false; //Allow creation of talk pages without captchas. +#$wgCaptchaTriggersOnNamespace[NS_PROJECT]['edit'] = true; //Show captcha whenever editing Project pages. + +/**
- Indicate how to store per-session data required to match up the
- internal captcha data with the editor.
- 'CaptchaSessionStore' uses PHP's session storage, which is cookie-based
- and may fail for anons with cookies disabled.
- 'CaptchaCacheStore' uses $wgMemc, which avoids the cookie dependency
- but may be fragile depending on cache configuration.
- */
+global $wgCaptchaStorageClass; +$wgCaptchaStorageClass = 'CaptchaSessionStore';
+/**
- Number of seconds a captcha session should last in the data cache
- before expiring when managing through CaptchaCacheStore class.
- Default is a half hour.
- */
+global $wgCaptchaSessionExpiration; +$wgCaptchaSessionExpiration = 30 * 60;
+/**
- Number of seconds after a bad login that a captcha will be shown to
- that client on the login form to slow down password-guessing bots.
- Has no effect if 'badlogin' is disabled in $wgCaptchaTriggers or
- if there is not a caching engine enabled.
- Default is five minutes.
- */
+global $wgCaptchaBadLoginExpiration; +$wgCaptchaBadLoginExpiration = 5 * 60;
+/**
- Allow users who have confirmed their e-mail addresses to post
- URL links without being harassed by the captcha.
- */
+global $ceAllowConfirmedEmail; +$ceAllowConfirmedEmail = false;
+/**
- Number of bad login attempts before triggering the captcha. 0 means
the + * captcha is presented on the first login.
- */
+global $wgCaptchaBadLoginAttempts; +$wgCaptchaBadLoginAttempts = 3;
+/**
- Regex to whitelist URLs to known-good sites...
- For instance:
- $wgCaptchaWhitelist =
'#^https?://([a-z0-9-]+\.)?(wikimedia|wikipedia).org/#i'; + * Local admins can define a whitelist under [[MediaWiki:captcha-addurl-whitelist]]
- */
+$wgCaptchaWhitelist = false;
+/**
- Additional regexes to check for. Use full regexes; can match things
- other than URLs such as junk edits.
- If the new version matches one and the old version doesn't,
- toss up the captcha screen.
- @fixme Add a message for local admins to add items as well.
- */
+$wgCaptchaRegexes = array();
+/** Register special page */ +$wgSpecialPages['Captcha'] = array( /*class*/'CaptchaSpecialPage', /*name*/'Captcha' ); + +$wgConfirmEditIP = dirname( __FILE__ ); +$wgExtensionMessagesFiles['ConfirmEdit'] = "$wgConfirmEditIP/ConfirmEdit.i18n.php"; + +if ( defined( 'MW_SUPPORTS_EDITFILTERMERGED' ) ) {
- $wgHooks['EditFilterMerged'][] = 'ConfirmEditHooks::confirmEditMerged';
+} else {
- $wgHooks['EditFilter'][] = 'ConfirmEditHooks::confirmEdit';
+} +$wgHooks['UserCreateForm'][] = 'ConfirmEditHooks::injectUserCreate'; +$wgHooks['AbortNewAccount'][] = 'ConfirmEditHooks::confirmUserCreate'; +$wgHooks['LoginAuthenticateAudit'][] = 'ConfirmEditHooks::triggerUserLogin'; +$wgHooks['UserLoginForm'][] = 'ConfirmEditHooks::injectUserLogin'; +$wgHooks['AbortLogin'][] = 'ConfirmEditHooks::confirmUserLogin'; +# Register API hook +$wgHooks['APIEditBeforeSave'][] = 'ConfirmEditHooks::confirmEditAPI';
+$wgAutoloadClasses['ConfirmEditHooks']
- = $wgAutoloadClasses['SimpleCaptcha']
- = $wgAutoloadClasses['CaptchaSessionStore']
- = $wgAutoloadClasses['CaptchaCacheStore']
- = $wgAutoloadClasses['CaptchaSpecialPage']
- = "$wgConfirmEditIP/ConfirmEdit_body.php";
+/**
- Set up $wgWhitelistRead
- */
+function confirmEditSetup() {
- global $wgGroupPermissions, $wgCaptchaTriggers;
- if( !$wgGroupPermissions['*']['read'] && $wgCaptchaTriggers['badlogin'] )
{ + // We need to ensure that the captcha interface is accessible
// so that unauthenticated users can actually get in after a
// mistaken password typing.
global $wgWhitelistRead;
$image = Title::makeTitle( NS_SPECIAL, 'Captcha/image' );
$help = Title::makeTitle( NS_SPECIAL, 'Captcha/help' );
$wgWhitelistRead[] = $image->getPrefixedText();
$wgWhitelistRead[] = $help->getPrefixedText();
- }
+}
diff --git a/modules/mediawiki-ConfirmEdit/manifests/init.pp b/modules/mediawiki-ConfirmEdit/manifests/init.pp new file mode 100644 index 0000000..5755cf0 --- /dev/null +++ b/modules/mediawiki-ConfirmEdit/manifests/init.pp @@ -0,0 +1,13 @@ +# mediawiki-ConfirmEdit
+class mediawiki-ConfirmEdit::ConfirmEdit {
- package { 'mediawiki-ConfirmEdit' :
ensure => present,
require => Package['mediawiki']
}
- file { '/usr/share/mediawiki/extensions/ConfirmEdit/ConfirmEdit.php':
require => Package['mediawiki-ConfirmEdit'],
source => 'puppet:///mediawiki-ConfirmEdit/ConfirmEdit.php'
- }
+} diff --git a/modules/mediawiki/manifests/init.pp b/modules/mediawiki/manifests/init.pp index 6175a45..9606c56 100644 --- a/modules/mediawiki/manifests/init.pp +++ b/modules/mediawiki/manifests/init.pp @@ -1,6 +1,7 @@ class mediawiki::app { include httpd::base include httpd::php
include mediawiki-ConfirmEdit::ConfirmEdit
package { "mediawiki": ensure => installed,
@@ -14,7 +15,6 @@ class mediawiki::app { "mediawiki-Boilerplate", "mediawiki-Cite", "mediawiki-Click",
"mediawiki-ConfirmEdit", "mediawiki-HNP", "mediawiki-Lockdown", "mediawiki-ParserFunctions",
On Tue, Aug 25, 2009 at 12:06 PM, Mike McGrathmmcgrath@redhat.com wrote:
This had gotten disabled during a conversion process of making mediawiki-ConfirmEdit a package I think These files will enable the math based captcha again
Read through and didn't see any problems
+1
infrastructure@lists.fedoraproject.org