MediaWiki  1.28.3
LocalPasswordPrimaryAuthenticationProvider.php
Go to the documentation of this file.
1 <?php
22 namespace MediaWiki\Auth;
23 
24 use User;
25 
33 {
34 
36  protected $loginOnly = false;
37 
44  public function __construct( $params = [] ) {
45  parent::__construct( $params );
46  $this->loginOnly = !empty( $params['loginOnly'] );
47  }
48 
49  protected function getPasswordResetData( $username, $row ) {
50  $now = wfTimestamp();
51  $expiration = wfTimestampOrNull( TS_UNIX, $row->user_password_expires );
52  if ( $expiration === null || $expiration >= $now ) {
53  return null;
54  }
55 
56  $grace = $this->config->get( 'PasswordExpireGrace' );
57  if ( $expiration + $grace < $now ) {
58  $data = [
59  'hard' => true,
60  'msg' => \Status::newFatal( 'resetpass-expired' )->getMessage(),
61  ];
62  } else {
63  $data = [
64  'hard' => false,
65  'msg' => \Status::newFatal( 'resetpass-expired-soft' )->getMessage(),
66  ];
67  }
68 
69  return (object)$data;
70  }
71 
72  public function beginPrimaryAuthentication( array $reqs ) {
74  if ( !$req ) {
76  }
77 
78  if ( $req->username === null || $req->password === null ) {
80  }
81 
82  $username = User::getCanonicalName( $req->username, 'usable' );
83  if ( $username === false ) {
85  }
86 
87  $fields = [
88  'user_id', 'user_password', 'user_password_expires',
89  ];
90 
91  $dbr = wfGetDB( DB_REPLICA );
92  $row = $dbr->selectRow(
93  'user',
94  $fields,
95  [ 'user_name' => $username ],
96  __METHOD__
97  );
98  if ( !$row ) {
99  // Do not reveal whether its bad username or
100  // bad password to prevent username enumeration
101  // on private wikis. (T134100)
102  return $this->failResponse( $req );
103  }
104 
105  $oldRow = clone $row;
106  // Check for *really* old password hashes that don't even have a type
107  // The old hash format was just an md5 hex hash, with no type information
108  if ( preg_match( '/^[0-9a-f]{32}$/', $row->user_password ) ) {
109  if ( $this->config->get( 'PasswordSalt' ) ) {
110  $row->user_password = ":A:{$row->user_id}:{$row->user_password}";
111  } else {
112  $row->user_password = ":A:{$row->user_password}";
113  }
114  }
115 
116  $status = $this->checkPasswordValidity( $username, $req->password );
117  if ( !$status->isOK() ) {
118  // Fatal, can't log in
119  return AuthenticationResponse::newFail( $status->getMessage() );
120  }
121 
122  $pwhash = $this->getPassword( $row->user_password );
123  if ( !$pwhash->equals( $req->password ) ) {
124  if ( $this->config->get( 'LegacyEncoding' ) ) {
125  // Some wikis were converted from ISO 8859-1 to UTF-8, the passwords can't be converted
126  // Check for this with iconv
127  $cp1252Password = iconv( 'UTF-8', 'WINDOWS-1252//TRANSLIT', $req->password );
128  if ( $cp1252Password === $req->password || !$pwhash->equals( $cp1252Password ) ) {
129  return $this->failResponse( $req );
130  }
131  } else {
132  return $this->failResponse( $req );
133  }
134  }
135 
136  // @codeCoverageIgnoreStart
137  if ( $this->getPasswordFactory()->needsUpdate( $pwhash ) ) {
138  $pwhash = $this->getPasswordFactory()->newFromPlaintext( $req->password );
139  \DeferredUpdates::addCallableUpdate( function () use ( $pwhash, $oldRow ) {
140  $dbw = wfGetDB( DB_MASTER );
141  $dbw->update(
142  'user',
143  [ 'user_password' => $pwhash->toString() ],
144  [
145  'user_id' => $oldRow->user_id,
146  'user_password' => $oldRow->user_password
147  ],
148  __METHOD__
149  );
150  } );
151  }
152  // @codeCoverageIgnoreEnd
153 
154  $this->setPasswordResetFlag( $username, $status, $row );
155 
157  }
158 
159  public function testUserCanAuthenticate( $username ) {
161  if ( $username === false ) {
162  return false;
163  }
164 
165  $dbr = wfGetDB( DB_REPLICA );
166  $row = $dbr->selectRow(
167  'user',
168  [ 'user_password' ],
169  [ 'user_name' => $username ],
170  __METHOD__
171  );
172  if ( !$row ) {
173  return false;
174  }
175 
176  // Check for *really* old password hashes that don't even have a type
177  // The old hash format was just an md5 hex hash, with no type information
178  if ( preg_match( '/^[0-9a-f]{32}$/', $row->user_password ) ) {
179  return true;
180  }
181 
182  return !$this->getPassword( $row->user_password ) instanceof \InvalidPassword;
183  }
184 
185  public function testUserExists( $username, $flags = User::READ_NORMAL ) {
187  if ( $username === false ) {
188  return false;
189  }
190 
192  return (bool)wfGetDB( $db )->selectField(
193  [ 'user' ],
194  [ 'user_id' ],
195  [ 'user_name' => $username ],
196  __METHOD__,
197  $options
198  );
199  }
200 
202  AuthenticationRequest $req, $checkData = true
203  ) {
204  // We only want to blank the password if something else will accept the
205  // new authentication data, so return 'ignore' here.
206  if ( $this->loginOnly ) {
207  return \StatusValue::newGood( 'ignored' );
208  }
209 
210  if ( get_class( $req ) === PasswordAuthenticationRequest::class ) {
211  if ( !$checkData ) {
212  return \StatusValue::newGood();
213  }
214 
215  $username = User::getCanonicalName( $req->username, 'usable' );
216  if ( $username !== false ) {
217  $row = wfGetDB( DB_MASTER )->selectRow(
218  'user',
219  [ 'user_id' ],
220  [ 'user_name' => $username ],
221  __METHOD__
222  );
223  if ( $row ) {
224  $sv = \StatusValue::newGood();
225  if ( $req->password !== null ) {
226  if ( $req->password !== $req->retype ) {
227  $sv->fatal( 'badretype' );
228  } else {
229  $sv->merge( $this->checkPasswordValidity( $username, $req->password ) );
230  }
231  }
232  return $sv;
233  }
234  }
235  }
236 
237  return \StatusValue::newGood( 'ignored' );
238  }
239 
241  $username = $req->username !== null ? User::getCanonicalName( $req->username, 'usable' ) : false;
242  if ( $username === false ) {
243  return;
244  }
245 
246  $pwhash = null;
247 
248  if ( $this->loginOnly ) {
249  $pwhash = $this->getPasswordFactory()->newFromCiphertext( null );
250  $expiry = null;
251  // @codeCoverageIgnoreStart
252  } elseif ( get_class( $req ) === PasswordAuthenticationRequest::class ) {
253  // @codeCoverageIgnoreEnd
254  $pwhash = $this->getPasswordFactory()->newFromPlaintext( $req->password );
255  $expiry = $this->getNewPasswordExpiry( $username );
256  }
257 
258  if ( $pwhash ) {
259  $dbw = wfGetDB( DB_MASTER );
260  $dbw->update(
261  'user',
262  [
263  'user_password' => $pwhash->toString(),
264  'user_password_expires' => $dbw->timestampOrNull( $expiry ),
265  ],
266  [ 'user_name' => $username ],
267  __METHOD__
268  );
269  }
270  }
271 
272  public function accountCreationType() {
273  return $this->loginOnly ? self::TYPE_NONE : self::TYPE_CREATE;
274  }
275 
276  public function testForAccountCreation( $user, $creator, array $reqs ) {
278 
280  if ( !$this->loginOnly && $req && $req->username !== null && $req->password !== null ) {
281  if ( $req->password !== $req->retype ) {
282  $ret->fatal( 'badretype' );
283  } else {
284  $ret->merge(
285  $this->checkPasswordValidity( $user->getName(), $req->password )
286  );
287  }
288  }
289  return $ret;
290  }
291 
292  public function beginPrimaryAccountCreation( $user, $creator, array $reqs ) {
293  if ( $this->accountCreationType() === self::TYPE_NONE ) {
294  throw new \BadMethodCallException( 'Shouldn\'t call this when accountCreationType() is NONE' );
295  }
296 
298  if ( $req ) {
299  if ( $req->username !== null && $req->password !== null ) {
300  // Nothing we can do besides claim it, because the user isn't in
301  // the DB yet
302  if ( $req->username !== $user->getName() ) {
303  $req = clone( $req );
304  $req->username = $user->getName();
305  }
307  $ret->createRequest = $req;
308  return $ret;
309  }
310  }
312  }
313 
314  public function finishAccountCreation( $user, $creator, AuthenticationResponse $res ) {
315  if ( $this->accountCreationType() === self::TYPE_NONE ) {
316  throw new \BadMethodCallException( 'Shouldn\'t call this when accountCreationType() is NONE' );
317  }
318 
319  // Now that the user is in the DB, set the password on it.
320  $this->providerChangeAuthenticationData( $res->createRequest );
321 
322  return null;
323  }
324 }
deferred txt A few of the database updates required by various functions here can be deferred until after the result page is displayed to the user For updating the view updating the linked to tables after a etc PHP does not yet have any way to tell the server to actually return and disconnect while still running these but it might have such a feature in the future We handle these by creating a deferred update object and putting those objects on a global list
Definition: deferred.txt:11
wfGetDB($db, $groups=[], $wiki=false)
Get a Database object.
the array() calling protocol came about after MediaWiki 1.4rc1.
null means default in associative array with keys and values unescaped Should be merged with default with a value of false meaning to suppress the attribute in associative array with keys and values unescaped noclasses & $ret
Definition: hooks.txt:1940
Apache License January AND DISTRIBUTION Definitions License shall mean the terms and conditions for use
static getCanonicalName($name, $validate= 'valid')
Given unvalidated user input, return a canonical username, or false if the username is invalid...
Definition: User.php:1046
providerAllowsAuthenticationDataChange(AuthenticationRequest $req, $checkData=true)
Validate a change of authentication data (e.g.
static newFatal($message)
Factory function for fatal errors.
Definition: StatusValue.php:63
setPasswordResetFlag($username, Status $status, $data=null)
Check if the password should be reset.
A primary authentication provider that uses the password field in the 'user' table.
testForAccountCreation($user, $creator, array $reqs)
Determine whether an account creation may begin.
it s the revision text itself In either if gzip is the revision text is gzipped $flags
Definition: hooks.txt:2707
This is a value object to hold authentication response data.
const DB_MASTER
Definition: defines.php:23
const TS_UNIX
Unix time - the number of seconds since 1970-01-01 00:00:00 UTC.
Definition: defines.php:6
wfTimestamp($outputtype=TS_UNIX, $ts=0)
Get a timestamp string in one of various formats.
testUserCanAuthenticate($username)
Test whether the named user can authenticate with this provider.
this hook is for auditing only RecentChangesLinked and Watchlist RecentChangesLinked and Watchlist e g Watchlist removed from all revisions and log entries to which it was applied This gives extensions a chance to take it off their books as the deletion has already been partly carried out by this point or something similar the user will be unable to create the tag set and then return false from the hook function Ensure you consume the ChangeTagAfterDelete hook to carry out custom deletion actions as context called by AbstractContent::getParserOutput May be used to override the normal model specific rendering of page content as context as context $options
Definition: hooks.txt:1050
$res
Definition: database.txt:21
$params
Basic framework for a primary authentication provider that uses passwords.
static newGood($value=null)
Factory function for good results.
Definition: StatusValue.php:76
static getDBOptions($bitfield)
Get an appropriate DB index, options, and fallback DB index for a query.
please add to it if you re going to add events to the MediaWiki code where normally authentication against an external auth plugin would be creating a local account $user
Definition: hooks.txt:246
finishAccountCreation($user, $creator, AuthenticationResponse $res)
Post-creation callback.
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency which acts as the top level factory for services in MediaWiki which can be used to gain access to default instances of various services MediaWikiServices however also allows new services to be defined and default services to be redefined Services are defined or redefined by providing a callback the instantiator that will return a new instance of the service When it will create an instance of MediaWikiServices and populate it with the services defined in the files listed by thereby bootstrapping the DI framework Per $wgServiceWiringFiles lists includes ServiceWiring php
Definition: injection.txt:35
this hook is for auditing only $req
Definition: hooks.txt:1011
this hook is for auditing only or null if authentication failed before getting that far $username
Definition: hooks.txt:806
providerChangeAuthenticationData(AuthenticationRequest $req)
Change or remove authentication data (e.g.
you have access to all of the normal MediaWiki so you can get a DB use the etc For full docs on the Maintenance class
Definition: maintenance.txt:52
static getRequestByClass(array $reqs, $class, $allowSubclasses=false)
Select a request by class name.
this hook is for auditing only RecentChangesLinked and Watchlist RecentChangesLinked and Watchlist e g Watchlist removed from all revisions and log entries to which it was applied This gives extensions a chance to take it off their books as the deletion has already been partly carried out by this point or something similar the user will be unable to create the tag set $status
Definition: hooks.txt:1050
beginPrimaryAccountCreation($user, $creator, array $reqs)
Start an account creation flow.
static addCallableUpdate($callable, $stage=self::POSTSEND, IDatabase $dbw=null)
Add a callable update.
getNewPasswordExpiry($username)
Get expiration date for a new password, if any.
const DB_REPLICA
Definition: defines.php:22
failResponse(PasswordAuthenticationRequest $req)
Return the appropriate response for failure.
wfTimestampOrNull($outputtype=TS_UNIX, $ts=null)
Return a formatted timestamp, or null if input is null.
testUserExists($username, $flags=User::READ_NORMAL)
Test whether the named user exists.
This is a value object for authentication requests.