πŸ‡³πŸ‡±Netherlands @Ewout Goosmann

Account created on 15 January 2015, over 9 years ago
  • Owner and developer at EphexΒ  …
#

Recent comments

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

Thank you for clarifying. I added the other issue as related issue in case some one else is using the patch in the other issue.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

Can you ensure that your JavaScript cache has been cleared? If you inspect the source, you should be able to find the following line:

input.value = config.key.split("").reverse().join("").match(/.{1,2}/g).map((value) => value.split("").reverse().join("")).join("");

If you can't find that line, search for

input.value = config.key;

If you can find that one, it means that you are still using the old JavaScript.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

Good to hear that the patch is working fine and that it's included in the latest release :)

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

Thanks @jurveen and @Volker23 for testing. Hopefully the spam will stop with this patch.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

This patch will do some shuffling logic on the antibot key which is needed to submit the form. Which means that the real antibot key is not in the drupalSettings anymore. Only a shuffled version of it is in the drupalSettings. The unlock method in the antibot.js file (which is responsible for adding the key) is now also "unshuffling" the antibot key to the real one before adding it to the form.

I'm not sure if this is preventing the bot from filling in the form, so please share you findings.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

I did some more research and now I'm sure the hidden fields are submitted, but no event was logged. Even the initial attach method isn't called, implying that the bot is not loading and/or executing JavaScript.

I saw that the antbot_key is stored in the drupalSettings and is readable in the markup even without JavaScript. A possible solution is that the antibot key must be "transformed" server-side before attaching it to drupalSettings and to use JavaScript on the client-side to undo the "transformation" when the unlock function is called.

Maybe I can look into this later today.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

Hmm, it looks like the spambots aren't triggering any of the events that should unlock the webform, or they aren't submitting the hidden field which contains the logged events.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

I got the same issue. I have just patched the antibot module on one of my sites, so it will log the events which triggers the unlock function. Hopefully it will tell us something useful.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

@slattery Thank you for the patch. It applied successfully, but unfortunately it doesn't solve the problem I still don't see any enabled switches (read: default values) when I select more than one option the first time.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

Thank you for your fast response Berdir.

Your explanation sounds right. What about letting the simplenews module replace the tokens first, before the token filter module is going to replace other tokens?

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

Ewout Goosmann β†’ made their first commit to this issue’s fork.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

I just ran into the same issue and can confirm that this patch is working.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

I can also confirm that the patch is working.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

This patch should solve the deprecation warning about the deprecated function.

I have used https://www.php.net/manual/en/function.mb-convert-encoding.php#127529 to fix this.

πŸ‡³πŸ‡±Netherlands Ewout Goosmann

This patch should solve the deprecation warning about using "static" in callables.

See https://php.watch/versions/8.2/partially-supported-callable-deprecation

Production build 0.69.0 2024