MediaWiki  1.29.1
TemporaryPasswordPrimaryAuthenticationProvider.php
Go to the documentation of this file.
1 <?php
22 namespace MediaWiki\Auth;
23 
24 use User;
25 
39 {
41  protected $emailEnabled = null;
42 
44  protected $newPasswordExpiry = null;
45 
47  protected $passwordReminderResendTime = null;
48 
56  public function __construct( $params = [] ) {
57  parent::__construct( $params );
58 
59  if ( isset( $params['emailEnabled'] ) ) {
60  $this->emailEnabled = (bool)$params['emailEnabled'];
61  }
62  if ( isset( $params['newPasswordExpiry'] ) ) {
63  $this->newPasswordExpiry = (int)$params['newPasswordExpiry'];
64  }
65  if ( isset( $params['passwordReminderResendTime'] ) ) {
66  $this->passwordReminderResendTime = $params['passwordReminderResendTime'];
67  }
68  }
69 
70  public function setConfig( \Config $config ) {
71  parent::setConfig( $config );
72 
73  if ( $this->emailEnabled === null ) {
74  $this->emailEnabled = $this->config->get( 'EnableEmail' );
75  }
76  if ( $this->newPasswordExpiry === null ) {
77  $this->newPasswordExpiry = $this->config->get( 'NewPasswordExpiry' );
78  }
79  if ( $this->passwordReminderResendTime === null ) {
80  $this->passwordReminderResendTime = $this->config->get( 'PasswordReminderResendTime' );
81  }
82  }
83 
84  protected function getPasswordResetData( $username, $data ) {
85  // Always reset
86  return (object)[
87  'msg' => wfMessage( 'resetpass-temp-emailed' ),
88  'hard' => true,
89  ];
90  }
91 
93  switch ( $action ) {
95  return [ new PasswordAuthenticationRequest() ];
96 
99 
101  if ( isset( $options['username'] ) && $this->emailEnabled ) {
102  // Creating an account for someone else
104  } else {
105  // It's not terribly likely that an anonymous user will
106  // be creating an account for someone else.
107  return [];
108  }
109 
112 
113  default:
114  return [];
115  }
116  }
117 
118  public function beginPrimaryAuthentication( array $reqs ) {
120  if ( !$req || $req->username === null || $req->password === null ) {
122  }
123 
124  $username = User::getCanonicalName( $req->username, 'usable' );
125  if ( $username === false ) {
127  }
128 
129  $dbr = wfGetDB( DB_REPLICA );
130  $row = $dbr->selectRow(
131  'user',
132  [
133  'user_id', 'user_newpassword', 'user_newpass_time',
134  ],
135  [ 'user_name' => $username ],
136  __METHOD__
137  );
138  if ( !$row ) {
140  }
141 
142  $status = $this->checkPasswordValidity( $username, $req->password );
143  if ( !$status->isOK() ) {
144  // Fatal, can't log in
145  return AuthenticationResponse::newFail( $status->getMessage() );
146  }
147 
148  $pwhash = $this->getPassword( $row->user_newpassword );
149  if ( !$pwhash->equals( $req->password ) ) {
150  return $this->failResponse( $req );
151  }
152 
153  if ( !$this->isTimestampValid( $row->user_newpass_time ) ) {
154  return $this->failResponse( $req );
155  }
156 
157  // Add an extra log entry since a temporary password is
158  // an unusual way to log in, so its important to keep track
159  // of in case of abuse.
160  $this->logger->info( "{user} successfully logged in using temp password",
161  [
162  'user' => $username,
163  'requestIP' => $this->manager->getRequest()->getIP()
164  ]
165  );
166 
168 
170  }
171 
172  public function testUserCanAuthenticate( $username ) {
174  if ( $username === false ) {
175  return false;
176  }
177 
178  $dbr = wfGetDB( DB_REPLICA );
179  $row = $dbr->selectRow(
180  'user',
181  [ 'user_newpassword', 'user_newpass_time' ],
182  [ 'user_name' => $username ],
183  __METHOD__
184  );
185  if ( !$row ) {
186  return false;
187  }
188 
189  if ( $this->getPassword( $row->user_newpassword ) instanceof \InvalidPassword ) {
190  return false;
191  }
192 
193  if ( !$this->isTimestampValid( $row->user_newpass_time ) ) {
194  return false;
195  }
196 
197  return true;
198  }
199 
200  public function testUserExists( $username, $flags = User::READ_NORMAL ) {
202  if ( $username === false ) {
203  return false;
204  }
205 
207  return (bool)wfGetDB( $db )->selectField(
208  [ 'user' ],
209  [ 'user_id' ],
210  [ 'user_name' => $username ],
211  __METHOD__,
212  $options
213  );
214  }
215 
217  AuthenticationRequest $req, $checkData = true
218  ) {
219  if ( get_class( $req ) !== TemporaryPasswordAuthenticationRequest::class ) {
220  // We don't really ignore it, but this is what the caller expects.
221  return \StatusValue::newGood( 'ignored' );
222  }
223 
224  if ( !$checkData ) {
225  return \StatusValue::newGood();
226  }
227 
228  $username = User::getCanonicalName( $req->username, 'usable' );
229  if ( $username === false ) {
230  return \StatusValue::newGood( 'ignored' );
231  }
232 
233  $row = wfGetDB( DB_MASTER )->selectRow(
234  'user',
235  [ 'user_id', 'user_newpass_time' ],
236  [ 'user_name' => $username ],
237  __METHOD__
238  );
239 
240  if ( !$row ) {
241  return \StatusValue::newGood( 'ignored' );
242  }
243 
244  $sv = \StatusValue::newGood();
245  if ( $req->password !== null ) {
246  $sv->merge( $this->checkPasswordValidity( $username, $req->password ) );
247 
248  if ( $req->mailpassword ) {
249  if ( !$this->emailEnabled ) {
250  return \StatusValue::newFatal( 'passwordreset-emaildisabled' );
251  }
252 
253  // We don't check whether the user has an email address;
254  // that information should not be exposed to the caller.
255 
256  // do not allow temporary password creation within
257  // $wgPasswordReminderResendTime from the last attempt
258  if (
259  $this->passwordReminderResendTime
260  && $row->user_newpass_time
261  && time() < wfTimestamp( TS_UNIX, $row->user_newpass_time )
262  + $this->passwordReminderResendTime * 3600
263  ) {
264  // Round the time in hours to 3 d.p., in case someone is specifying
265  // minutes or seconds.
266  return \StatusValue::newFatal( 'throttled-mailpassword',
267  round( $this->passwordReminderResendTime, 3 ) );
268  }
269 
270  if ( !$req->caller ) {
271  return \StatusValue::newFatal( 'passwordreset-nocaller' );
272  }
273  if ( !\IP::isValid( $req->caller ) ) {
274  $caller = User::newFromName( $req->caller );
275  if ( !$caller ) {
276  return \StatusValue::newFatal( 'passwordreset-nosuchcaller', $req->caller );
277  }
278  }
279  }
280  }
281  return $sv;
282  }
283 
285  $username = $req->username !== null ? User::getCanonicalName( $req->username, 'usable' ) : false;
286  if ( $username === false ) {
287  return;
288  }
289 
290  $dbw = wfGetDB( DB_MASTER );
291 
292  $sendMail = false;
293  if ( $req->action !== AuthManager::ACTION_REMOVE &&
295  ) {
296  $pwhash = $this->getPasswordFactory()->newFromPlaintext( $req->password );
297  $newpassTime = $dbw->timestamp();
298  $sendMail = $req->mailpassword;
299  } else {
300  // Invalidate the temporary password when any other auth is reset, or when removing
301  $pwhash = $this->getPasswordFactory()->newFromCiphertext( null );
302  $newpassTime = null;
303  }
304 
305  $dbw->update(
306  'user',
307  [
308  'user_newpassword' => $pwhash->toString(),
309  'user_newpass_time' => $newpassTime,
310  ],
311  [ 'user_name' => $username ],
312  __METHOD__
313  );
314 
315  if ( $sendMail ) {
316  // Send email after DB commit
317  $dbw->onTransactionIdle(
318  function () use ( $req ) {
320  $this->sendPasswordResetEmail( $req );
321  },
322  __METHOD__
323  );
324  }
325  }
326 
327  public function accountCreationType() {
328  return self::TYPE_CREATE;
329  }
330 
331  public function testForAccountCreation( $user, $creator, array $reqs ) {
335  );
336 
338  if ( $req ) {
339  if ( $req->mailpassword ) {
340  if ( !$this->emailEnabled ) {
341  $ret->merge( \StatusValue::newFatal( 'emaildisabled' ) );
342  } elseif ( !$user->getEmail() ) {
343  $ret->merge( \StatusValue::newFatal( 'noemailcreate' ) );
344  }
345  }
346 
347  $ret->merge(
348  $this->checkPasswordValidity( $user->getName(), $req->password )
349  );
350  }
351  return $ret;
352  }
353 
354  public function beginPrimaryAccountCreation( $user, $creator, array $reqs ) {
358  );
359  if ( $req ) {
360  if ( $req->username !== null && $req->password !== null ) {
361  // Nothing we can do yet, because the user isn't in the DB yet
362  if ( $req->username !== $user->getName() ) {
363  $req = clone( $req );
364  $req->username = $user->getName();
365  }
366 
367  if ( $req->mailpassword ) {
368  // prevent EmailNotificationSecondaryAuthenticationProvider from sending another mail
369  $this->manager->setAuthenticationSessionData( 'no-email', true );
370  }
371 
373  $ret->createRequest = $req;
374  return $ret;
375  }
376  }
378  }
379 
380  public function finishAccountCreation( $user, $creator, AuthenticationResponse $res ) {
382  $req = $res->createRequest;
383  $mailpassword = $req->mailpassword;
384  $req->mailpassword = false; // providerChangeAuthenticationData would send the wrong email
385 
386  // Now that the user is in the DB, set the password on it.
388 
389  if ( $mailpassword ) {
390  // Send email after DB commit
391  wfGetDB( DB_MASTER )->onTransactionIdle(
392  function () use ( $user, $creator, $req ) {
393  $this->sendNewAccountEmail( $user, $creator, $req->password );
394  },
395  __METHOD__
396  );
397  }
398 
399  return $mailpassword ? 'byemail' : null;
400  }
401 
407  protected function isTimestampValid( $timestamp ) {
408  $time = wfTimestampOrNull( TS_MW, $timestamp );
409  if ( $time !== null ) {
410  $expiry = wfTimestamp( TS_UNIX, $time ) + $this->newPasswordExpiry;
411  if ( time() >= $expiry ) {
412  return false;
413  }
414  }
415  return true;
416  }
417 
425  protected function sendNewAccountEmail( User $user, User $creatingUser, $password ) {
426  $ip = $creatingUser->getRequest()->getIP();
427  // @codeCoverageIgnoreStart
428  if ( !$ip ) {
429  return \Status::newFatal( 'badipaddress' );
430  }
431  // @codeCoverageIgnoreEnd
432 
433  \Hooks::run( 'User::mailPasswordInternal', [ &$creatingUser, &$ip, &$user ] );
434 
435  $mainPageUrl = \Title::newMainPage()->getCanonicalURL();
436  $userLanguage = $user->getOption( 'language' );
437  $subjectMessage = wfMessage( 'createaccount-title' )->inLanguage( $userLanguage );
438  $bodyMessage = wfMessage( 'createaccount-text', $ip, $user->getName(), $password,
439  '<' . $mainPageUrl . '>', round( $this->newPasswordExpiry / 86400 ) )
440  ->inLanguage( $userLanguage );
441 
442  $status = $user->sendMail( $subjectMessage->text(), $bodyMessage->text() );
443 
444  // TODO show 'mailerror' message on error, 'accmailtext' success message otherwise?
445  // @codeCoverageIgnoreStart
446  if ( !$status->isGood() ) {
447  $this->logger->warning( 'Could not send account creation email: ' .
448  $status->getWikiText( false, false, 'en' ) );
449  }
450  // @codeCoverageIgnoreEnd
451 
452  return $status;
453  }
454 
460  $user = User::newFromName( $req->username );
461  if ( !$user ) {
462  return \Status::newFatal( 'noname' );
463  }
464  $userLanguage = $user->getOption( 'language' );
465  $callerIsAnon = \IP::isValid( $req->caller );
466  $callerName = $callerIsAnon ? $req->caller : User::newFromName( $req->caller )->getName();
467  $passwordMessage = wfMessage( 'passwordreset-emailelement', $user->getName(),
468  $req->password )->inLanguage( $userLanguage );
469  $emailMessage = wfMessage( $callerIsAnon ? 'passwordreset-emailtext-ip'
470  : 'passwordreset-emailtext-user' )->inLanguage( $userLanguage );
471  $emailMessage->params( $callerName, $passwordMessage->text(), 1,
472  '<' . \Title::newMainPage()->getCanonicalURL() . '>',
473  round( $this->newPasswordExpiry / 86400 ) );
474  $emailTitle = wfMessage( 'passwordreset-emailtitle' )->inLanguage( $userLanguage );
475  return $user->sendMail( $emailTitle->text(), $emailMessage->text() );
476  }
477 }
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\$emailEnabled
bool $emailEnabled
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:41
MediaWiki\Auth\PrimaryAuthenticationProvider\TYPE_CREATE
const TYPE_CREATE
Provider can create accounts.
Definition: PrimaryAuthenticationProvider.php:77
MediaWiki\$action
String $action
Cache what action this request is.
Definition: MediaWiki.php:47
MediaWiki\Auth\AbstractPasswordPrimaryAuthenticationProvider\getPassword
getPassword( $hash)
Get a Password object from the hash.
Definition: AbstractPasswordPrimaryAuthenticationProvider.php:67
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\finishAccountCreation
finishAccountCreation( $user, $creator, AuthenticationResponse $res)
Post-creation callback.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:380
MediaWiki\Auth\AbstractPasswordPrimaryAuthenticationProvider\failResponse
failResponse(PasswordAuthenticationRequest $req)
Return the appropriate response for failure.
Definition: AbstractPasswordPrimaryAuthenticationProvider.php:83
MediaWiki\Auth\AbstractPasswordPrimaryAuthenticationProvider
Basic framework for a primary authentication provider that uses passwords.
Definition: AbstractPasswordPrimaryAuthenticationProvider.php:33
Title\newMainPage
static newMainPage()
Create a new Title for the Main Page.
Definition: Title.php:559
wfTimestamp
wfTimestamp( $outputtype=TS_UNIX, $ts=0)
Get a timestamp string in one of various formats.
Definition: GlobalFunctions.php:1994
$status
this hook is for auditing only RecentChangesLinked and Watchlist RecentChangesLinked and Watchlist Do not use this to implement individual filters if they are compatible with the ChangesListFilter and ChangesListFilterGroup structure use sub classes of those in conjunction with the ChangesListSpecialPageStructuredFilters hook This hook can be used to implement filters that do not implement that or custom behavior that is not an individual filter e g Watchlist and Watchlist you will want to construct new ChangesListBooleanFilter or ChangesListStringOptionsFilter objects When constructing you specify which group they belong to You can reuse existing or create your you must register them with $special registerFilterGroup removed from all revisions and log entries to which it was applied This gives extensions a chance to take it off their books as the deletion has already been partly carried out by this point or something similar the user will be unable to create the tag set $status
Definition: hooks.txt:1049
use
as see the revision history and available at free of to any person obtaining a copy of this software and associated documentation to deal in the Software without including without limitation the rights to use
Definition: MIT-LICENSE.txt:10
$user
please add to it if you re going to add events to the MediaWiki code where normally authentication against an external auth plugin would be creating a account $user
Definition: hooks.txt:246
$req
this hook is for auditing only $req
Definition: hooks.txt:990
StatusValue\newFatal
static newFatal( $message)
Factory function for fatal errors.
Definition: StatusValue.php:63
$params
$params
Definition: styleTest.css.php:40
User\newFromName
static newFromName( $name, $validate='valid')
Static factory method for creation from username.
Definition: User.php:556
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\beginPrimaryAccountCreation
beginPrimaryAccountCreation( $user, $creator, array $reqs)
Start an account creation flow.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:354
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\accountCreationType
accountCreationType()
Fetch the account-creation type.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:327
$res
$res
Definition: database.txt:21
DBAccessObjectUtils\getDBOptions
static getDBOptions( $bitfield)
Get an appropriate DB index, options, and fallback DB index for a query.
Definition: DBAccessObjectUtils.php:52
InvalidPassword
Represents an invalid password hash.
Definition: InvalidPassword.php:32
User
User
Definition: All_system_messages.txt:425
MediaWiki\Auth\AuthenticationRequest\getRequestByClass
static getRequestByClass(array $reqs, $class, $allowSubclasses=false)
Select a request by class name.
Definition: AuthenticationRequest.php:253
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\sendPasswordResetEmail
sendPasswordResetEmail(TemporaryPasswordAuthenticationRequest $req)
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:459
php
injection txt This is an overview of how MediaWiki makes use of dependency injection The design described here grew from the discussion of RFC T384 The term dependency this means that anything an object needs to operate should be injected from the the object itself should only know narrow no concrete implementation of the logic it relies on The requirement to inject everything typically results in an architecture that based on two main types of and essentially stateless service objects that use other service objects to operate on the value objects As of the beginning MediaWiki is only starting to use the DI approach Much of the code still relies on global state or direct resulting in a highly cyclical dependency which acts as the top level factory for services in MediaWiki which can be used to gain access to default instances of various services MediaWikiServices however also allows new services to be defined and default services to be redefined Services are defined or redefined by providing a callback the instantiator that will return a new instance of the service When it will create an instance of MediaWikiServices and populate it with the services defined in the files listed by thereby bootstrapping the DI framework Per $wgServiceWiringFiles lists includes ServiceWiring php
Definition: injection.txt:35
User\getRequest
getRequest()
Get the WebRequest object to use with this object.
Definition: User.php:3587
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\__construct
__construct( $params=[])
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:56
MediaWiki\Auth\AuthenticationResponse\newAbstain
static newAbstain()
Definition: AuthenticationResponse.php:170
MediaWiki\Auth\PasswordAuthenticationRequest
This is a value object for authentication requests with a username and password.
Definition: PasswordAuthenticationRequest.php:29
Config
Interface for configuration instances.
Definition: Config.php:28
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\getPasswordResetData
getPasswordResetData( $username, $data)
Get password reset data, if any.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:84
wfGetDB
wfGetDB( $db, $groups=[], $wiki=false)
Get a Database object.
Definition: GlobalFunctions.php:3060
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\testUserExists
testUserExists( $username, $flags=User::READ_NORMAL)
Test whether the named user exists.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:200
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\setConfig
setConfig(\Config $config)
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:70
MediaWiki\Auth\AuthenticationResponse
This is a value object to hold authentication response data.
Definition: AuthenticationResponse.php:37
wfTimestampOrNull
wfTimestampOrNull( $outputtype=TS_UNIX, $ts=null)
Return a formatted timestamp, or null if input is null.
Definition: GlobalFunctions.php:2010
$time
see documentation in includes Linker php for Linker::makeImageLink & $time
Definition: hooks.txt:1769
DB_REPLICA
const DB_REPLICA
Definition: defines.php:25
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\$newPasswordExpiry
int $newPasswordExpiry
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:44
DB_MASTER
const DB_MASTER
Definition: defines.php:26
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\providerChangeAuthenticationData
providerChangeAuthenticationData(AuthenticationRequest $req)
Change or remove authentication data (e.g.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:284
list
deferred txt A few of the database updates required by various functions here can be deferred until after the result page is displayed to the user For updating the view updating the linked to tables after a etc PHP does not yet have any way to tell the server to actually return and disconnect while still running these but it might have such a feature in the future We handle these by creating a deferred update object and putting those objects on a global list
Definition: deferred.txt:11
MediaWiki\Auth\AuthManager\ACTION_CREATE
const ACTION_CREATE
Create a new user.
Definition: AuthManager.php:89
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\isTimestampValid
isTimestampValid( $timestamp)
Check that a temporary password is still valid (hasn't expired).
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:407
StatusValue\newGood
static newGood( $value=null)
Factory function for good results.
Definition: StatusValue.php:76
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider
A primary authentication provider that uses the temporary password field in the 'user' table.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:37
MediaWiki\Auth\AuthManager\ACTION_CHANGE
const ACTION_CHANGE
Change a user's credentials.
Definition: AuthManager.php:99
$ret
null means default in associative array with keys and values unescaped Should be merged with default with a value of false meaning to suppress the attribute in associative array with keys and values unescaped noclasses & $ret
Definition: hooks.txt:1956
MediaWiki\Auth\AbstractPasswordPrimaryAuthenticationProvider\setPasswordResetFlag
setPasswordResetFlag( $username, Status $status, $data=null)
Check if the password should be reset.
Definition: AbstractPasswordPrimaryAuthenticationProvider.php:118
IP\isValid
static isValid( $ip)
Validate an IP address.
Definition: IP.php:113
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\testUserCanAuthenticate
testUserCanAuthenticate( $username)
Test whether the named user can authenticate with this provider.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:172
MediaWiki\Auth\AbstractPasswordPrimaryAuthenticationProvider\checkPasswordValidity
checkPasswordValidity( $username, $password)
Check that the password is valid.
Definition: AbstractPasswordPrimaryAuthenticationProvider.php:103
MediaWiki\Auth\AuthManager\ACTION_REMOVE
const ACTION_REMOVE
Remove a user's credentials.
Definition: AuthManager.php:101
$dbr
if(! $regexes) $dbr
Definition: cleanup.php:94
MediaWiki\Auth\AuthenticationResponse\newFail
static newFail(Message $msg)
Definition: AuthenticationResponse.php:146
User\getCanonicalName
static getCanonicalName( $name, $validate='valid')
Given unvalidated user input, return a canonical username, or false if the username is invalid.
Definition: User.php:1076
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\$passwordReminderResendTime
int $passwordReminderResendTime
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:47
MediaWiki\Auth\TemporaryPasswordAuthenticationRequest
This represents the intention to set a temporary password for the user.
Definition: TemporaryPasswordAuthenticationRequest.php:31
MediaWiki\Auth\AuthManager\ACTION_LOGIN
const ACTION_LOGIN
Log in with an existing (not necessarily local) user.
Definition: AuthManager.php:84
MediaWiki\Auth\AbstractPasswordPrimaryAuthenticationProvider\getPasswordFactory
getPasswordFactory()
Get the PasswordFactory.
Definition: AbstractPasswordPrimaryAuthenticationProvider.php:54
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\providerAllowsAuthenticationDataChange
providerAllowsAuthenticationDataChange(AuthenticationRequest $req, $checkData=true)
Validate a change of authentication data (e.g.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:216
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\sendNewAccountEmail
sendNewAccountEmail(User $user, User $creatingUser, $password)
Send an email about the new account creation and the temporary password.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:425
wfMessage
either a unescaped string or a HtmlArmor object after in associative array form externallinks including delete and has completed for all link tables whether this was an auto creation default is conds Array Extra conditions for the No matching items in log is displayed if loglist is empty msgKey Array If you want a nice box with a set this to the key of the message First element is the message additional optional elements are parameters for the key that are processed with wfMessage() -> params() ->parseAsBlock() - offset Set to overwrite offset parameter in $wgRequest set to '' to unset offset - wrap String Wrap the message in html(usually something like "&lt
class
you have access to all of the normal MediaWiki so you can get a DB use the etc For full docs on the Maintenance class
Definition: maintenance.txt:52
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\beginPrimaryAuthentication
beginPrimaryAuthentication(array $reqs)
Start an authentication flow.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:118
MediaWiki\Auth\TemporaryPasswordAuthenticationRequest\newRandom
static newRandom()
Return an instance with a new, random password.
Definition: TemporaryPasswordAuthenticationRequest.php:65
User
The User object encapsulates all of the user-specific settings (user_id, name, rights,...
Definition: User.php:50
Hooks\run
static run( $event, array $args=[], $deprecatedVersion=null)
Call hook functions defined in Hooks::register and $wgHooks.
Definition: Hooks.php:131
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\testForAccountCreation
testForAccountCreation( $user, $creator, array $reqs)
Determine whether an account creation may begin.
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:331
$username
this hook is for auditing only or null if authentication failed before getting that far $username
Definition: hooks.txt:783
MediaWiki\Auth
Definition: AbstractAuthenticationProvider.php:22
MediaWiki\Auth\AuthenticationResponse\newPass
static newPass( $username=null)
Definition: AuthenticationResponse.php:134
$options
this hook is for auditing only RecentChangesLinked and Watchlist RecentChangesLinked and Watchlist Do not use this to implement individual filters if they are compatible with the ChangesListFilter and ChangesListFilterGroup structure use sub classes of those in conjunction with the ChangesListSpecialPageStructuredFilters hook This hook can be used to implement filters that do not implement that or custom behavior that is not an individual filter e g Watchlist and Watchlist you will want to construct new ChangesListBooleanFilter or ChangesListStringOptionsFilter objects When constructing you specify which group they belong to You can reuse existing or create your you must register them with $special registerFilterGroup removed from all revisions and log entries to which it was applied This gives extensions a chance to take it off their books as the deletion has already been partly carried out by this point or something similar the user will be unable to create the tag set and then return false from the hook function Ensure you consume the ChangeTagAfterDelete hook to carry out custom deletion actions as context called by AbstractContent::getParserOutput May be used to override the normal model specific rendering of page content as context as context $options
Definition: hooks.txt:1049
MediaWiki\Auth\AbstractAuthenticationProvider\$config
Config $config
Definition: AbstractAuthenticationProvider.php:38
$flags
it s the revision text itself In either if gzip is the revision text is gzipped $flags
Definition: hooks.txt:2749
MediaWiki\Auth\AuthenticationRequest
This is a value object for authentication requests.
Definition: AuthenticationRequest.php:37
array
the array() calling protocol came about after MediaWiki 1.4rc1.
MediaWiki\Auth\TemporaryPasswordPrimaryAuthenticationProvider\getAuthenticationRequests
getAuthenticationRequests( $action, array $options)
{{{Return the applicable list of AuthenticationRequests.Possible values for $action depend on whether...
Definition: TemporaryPasswordPrimaryAuthenticationProvider.php:92