3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License as published by
5 * the Free Software Foundation; either version 2 of the License, or
6 * (at your option) any later version.
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
16 * http://www.gnu.org/copyleft/gpl.html
22 namespace MediaWiki\Auth
;
27 * A primary authentication provider that uses the temporary password field in
30 * A successful login will force a password reset.
32 * @note For proper operation, this should generally come before any other
33 * password-based authentication providers.
37 class TemporaryPasswordPrimaryAuthenticationProvider
38 extends AbstractPasswordPrimaryAuthenticationProvider
41 protected $emailEnabled = null;
44 protected $newPasswordExpiry = null;
47 protected $passwordReminderResendTime = null;
50 * @param array $params
51 * - emailEnabled: (bool) must be true for the option to email passwords to be present
52 * - newPasswordExpiry: (int) expiraton time of temporary passwords, in seconds
53 * - passwordReminderResendTime: (int) cooldown period in hours until a password reminder can
54 * be sent to the same user again,
56 public function __construct( $params = [] ) {
57 parent
::__construct( $params );
59 if ( isset( $params['emailEnabled'] ) ) {
60 $this->emailEnabled
= (bool)$params['emailEnabled'];
62 if ( isset( $params['newPasswordExpiry'] ) ) {
63 $this->newPasswordExpiry
= (int)$params['newPasswordExpiry'];
65 if ( isset( $params['passwordReminderResendTime'] ) ) {
66 $this->passwordReminderResendTime
= $params['passwordReminderResendTime'];
70 public function setConfig( \Config
$config ) {
71 parent
::setConfig( $config );
73 if ( $this->emailEnabled
=== null ) {
74 $this->emailEnabled
= $this->config
->get( 'EnableEmail' );
76 if ( $this->newPasswordExpiry
=== null ) {
77 $this->newPasswordExpiry
= $this->config
->get( 'NewPasswordExpiry' );
79 if ( $this->passwordReminderResendTime
=== null ) {
80 $this->passwordReminderResendTime
= $this->config
->get( 'PasswordReminderResendTime' );
84 protected function getPasswordResetData( $username, $data ) {
87 'msg' => wfMessage( 'resetpass-temp-emailed' ),
92 public function getAuthenticationRequests( $action, array $options ) {
94 case AuthManager
::ACTION_LOGIN
:
95 return [ new PasswordAuthenticationRequest() ];
97 case AuthManager
::ACTION_CHANGE
:
98 return [ TemporaryPasswordAuthenticationRequest
::newRandom() ];
100 case AuthManager
::ACTION_CREATE
:
101 if ( isset( $options['username'] ) && $this->emailEnabled
) {
102 // Creating an account for someone else
103 return [ TemporaryPasswordAuthenticationRequest
::newRandom() ];
105 // It's not terribly likely that an anonymous user will
106 // be creating an account for someone else.
110 case AuthManager
::ACTION_REMOVE
:
111 return [ new TemporaryPasswordAuthenticationRequest
];
118 public function beginPrimaryAuthentication( array $reqs ) {
119 $req = AuthenticationRequest
::getRequestByClass( $reqs, PasswordAuthenticationRequest
::class );
120 if ( !$req ||
$req->username
=== null ||
$req->password
=== null ) {
121 return AuthenticationResponse
::newAbstain();
124 $username = User
::getCanonicalName( $req->username
, 'usable' );
125 if ( $username === false ) {
126 return AuthenticationResponse
::newAbstain();
129 $dbw = wfGetDB( DB_MASTER
);
130 $row = $dbw->selectRow(
133 'user_id', 'user_newpassword', 'user_newpass_time',
135 [ 'user_name' => $username ],
139 return AuthenticationResponse
::newAbstain();
142 $status = $this->checkPasswordValidity( $username, $req->password
);
143 if ( !$status->isOk() ) {
144 // Fatal, can't log in
145 return AuthenticationResponse
::newFail( $status->getMessage() );
148 $pwhash = $this->getPassword( $row->user_newpassword
);
149 if ( !$pwhash->equals( $req->password
) ) {
150 return $this->failResponse( $req );
153 if ( !$this->isTimestampValid( $row->user_newpass_time
) ) {
154 return $this->failResponse( $req );
157 $this->setPasswordResetFlag( $username, $status );
159 return AuthenticationResponse
::newPass( $username );
162 public function testUserCanAuthenticate( $username ) {
163 $username = User
::getCanonicalName( $username, 'usable' );
164 if ( $username === false ) {
168 $dbw = wfGetDB( DB_MASTER
);
169 $row = $dbw->selectRow(
171 [ 'user_newpassword', 'user_newpass_time' ],
172 [ 'user_name' => $username ],
179 if ( $this->getPassword( $row->user_newpassword
) instanceof \InvalidPassword
) {
183 if ( !$this->isTimestampValid( $row->user_newpass_time
) ) {
190 public function testUserExists( $username, $flags = User
::READ_NORMAL
) {
191 $username = User
::getCanonicalName( $username, 'usable' );
192 if ( $username === false ) {
196 list( $db, $options ) = \DBAccessObjectUtils
::getDBOptions( $flags );
197 return (bool)wfGetDB( $db )->selectField(
200 [ 'user_name' => $username ],
206 public function providerAllowsAuthenticationDataChange(
207 AuthenticationRequest
$req, $checkData = true
209 if ( get_class( $req ) !== TemporaryPasswordAuthenticationRequest
::class ) {
210 // We don't really ignore it, but this is what the caller expects.
211 return \StatusValue
::newGood( 'ignored' );
215 return \StatusValue
::newGood();
218 $username = User
::getCanonicalName( $req->username
, 'usable' );
219 if ( $username === false ) {
220 return \StatusValue
::newGood( 'ignored' );
223 $row = wfGetDB( DB_MASTER
)->selectRow(
225 [ 'user_id', 'user_newpass_time' ],
226 [ 'user_name' => $username ],
231 return \StatusValue
::newGood( 'ignored' );
234 $sv = \StatusValue
::newGood();
235 if ( $req->password
!== null ) {
236 $sv->merge( $this->checkPasswordValidity( $username, $req->password
) );
238 if ( $req->mailpassword
) {
239 if ( !$this->emailEnabled
&& !$req->hasBackchannel
) {
240 return \StatusValue
::newFatal( 'passwordreset-emaildisabled' );
243 // We don't check whether the user has an email address;
244 // that information should not be exposed to the caller.
246 // do not allow temporary password creation within
247 // $wgPasswordReminderResendTime from the last attempt
249 $this->passwordReminderResendTime
250 && $row->user_newpass_time
251 && time() < wfTimestamp( TS_UNIX
, $row->user_newpass_time
)
252 +
$this->passwordReminderResendTime
* 3600
254 // Round the time in hours to 3 d.p., in case someone is specifying
255 // minutes or seconds.
256 return \StatusValue
::newFatal( 'throttled-mailpassword',
257 round( $this->passwordReminderResendTime
, 3 ) );
260 if ( !$req->caller
) {
261 return \StatusValue
::newFatal( 'passwordreset-nocaller' );
263 if ( !\IP
::isValid( $req->caller
) ) {
264 $caller = User
::newFromName( $req->caller
);
266 return \StatusValue
::newFatal( 'passwordreset-nosuchcaller', $req->caller
);
274 public function providerChangeAuthenticationData( AuthenticationRequest
$req ) {
275 $username = $req->username
!== null ? User
::getCanonicalName( $req->username
, 'usable' ) : false;
276 if ( $username === false ) {
280 $dbw = wfGetDB( DB_MASTER
);
283 if ( $req->action
!== AuthManager
::ACTION_REMOVE
&&
284 get_class( $req ) === TemporaryPasswordAuthenticationRequest
::class
286 $pwhash = $this->getPasswordFactory()->newFromPlaintext( $req->password
);
287 $newpassTime = $dbw->timestamp();
288 $sendMail = $req->mailpassword
;
290 // Invalidate the temporary password when any other auth is reset, or when removing
291 $pwhash = $this->getPasswordFactory()->newFromCiphertext( null );
298 'user_newpassword' => $pwhash->toString(),
299 'user_newpass_time' => $newpassTime,
301 [ 'user_name' => $username ],
306 $this->sendPasswordResetEmail( $req );
310 public function accountCreationType() {
311 return self
::TYPE_CREATE
;
314 public function testForAccountCreation( $user, $creator, array $reqs ) {
315 /** @var TemporaryPasswordAuthenticationRequest $req */
316 $req = AuthenticationRequest
::getRequestByClass(
317 $reqs, TemporaryPasswordAuthenticationRequest
::class
320 $ret = \StatusValue
::newGood();
322 if ( $req->mailpassword
&& !$req->hasBackchannel
) {
323 if ( !$this->emailEnabled
) {
324 $ret->merge( \StatusValue
::newFatal( 'emaildisabled' ) );
325 } elseif ( !$user->getEmail() ) {
326 $ret->merge( \StatusValue
::newFatal( 'noemailcreate' ) );
331 $this->checkPasswordValidity( $user->getName(), $req->password
)
337 public function beginPrimaryAccountCreation( $user, $creator, array $reqs ) {
338 /** @var TemporaryPasswordAuthenticationRequest $req */
339 $req = AuthenticationRequest
::getRequestByClass(
340 $reqs, TemporaryPasswordAuthenticationRequest
::class
343 if ( $req->username
!== null && $req->password
!== null ) {
344 // Nothing we can do yet, because the user isn't in the DB yet
345 if ( $req->username
!== $user->getName() ) {
346 $req = clone( $req );
347 $req->username
= $user->getName();
350 if ( $req->mailpassword
) {
351 // prevent EmailNotificationSecondaryAuthenticationProvider from sending another mail
352 $this->manager
->setAuthenticationSessionData( 'no-email', true );
355 $ret = AuthenticationResponse
::newPass( $req->username
);
356 $ret->createRequest
= $req;
360 return AuthenticationResponse
::newAbstain();
363 public function finishAccountCreation( $user, $creator, AuthenticationResponse
$res ) {
364 /** @var TemporaryPasswordAuthenticationRequest $req */
365 $req = $res->createRequest
;
366 $mailpassword = $req->mailpassword
;
367 $req->mailpassword
= false; // providerChangeAuthenticationData would send the wrong email
369 // Now that the user is in the DB, set the password on it.
370 $this->providerChangeAuthenticationData( $req );
372 if ( $mailpassword ) {
373 $this->sendNewAccountEmail( $user, $creator, $req->password
);
376 return $mailpassword ?
'byemail' : null;
380 * Check that a temporary password is still valid (hasn't expired).
381 * @param string $timestamp A timestamp in MediaWiki (TS_MW) format
384 protected function isTimestampValid( $timestamp ) {
385 $time = wfTimestampOrNull( TS_MW
, $timestamp );
386 if ( $time !== null ) {
387 $expiry = wfTimestamp( TS_UNIX
, $time ) +
$this->newPasswordExpiry
;
388 if ( time() >= $expiry ) {
396 * Send an email about the new account creation and the temporary password.
397 * @param User $user The new user account
398 * @param User $creatingUser The user who created the account (can be anonymous)
399 * @param string $password The temporary password
402 protected function sendNewAccountEmail( User
$user, User
$creatingUser, $password ) {
403 $ip = $creatingUser->getRequest()->getIP();
404 // @codeCoverageIgnoreStart
406 return \Status
::newFatal( 'badipaddress' );
408 // @codeCoverageIgnoreEnd
410 \Hooks
::run( 'User::mailPasswordInternal', [ &$creatingUser, &$ip, &$user ] );
412 $mainPageUrl = \Title
::newMainPage()->getCanonicalURL();
413 $userLanguage = $user->getOption( 'language' );
414 $subjectMessage = wfMessage( 'createaccount-title' )->inLanguage( $userLanguage );
415 $bodyMessage = wfMessage( 'createaccount-text', $ip, $user->getName(), $password,
416 '<' . $mainPageUrl . '>', round( $this->newPasswordExpiry
/ 86400 ) )
417 ->inLanguage( $userLanguage );
419 $status = $user->sendMail( $subjectMessage->text(), $bodyMessage->text() );
421 // TODO show 'mailerror' message on error, 'accmailtext' success message otherwise?
422 // @codeCoverageIgnoreStart
423 if ( !$status->isGood() ) {
424 $this->logger
->warning( 'Could not send account creation email: ' .
425 $status->getWikiText( false, false, 'en' ) );
427 // @codeCoverageIgnoreEnd
433 * @param TemporaryPasswordAuthenticationRequest $req
436 protected function sendPasswordResetEmail( TemporaryPasswordAuthenticationRequest
$req ) {
437 $user = User
::newFromName( $req->username
);
439 return \Status
::newFatal( 'noname' );
441 $userLanguage = $user->getOption( 'language' );
442 $callerIsAnon = \IP
::isValid( $req->caller
);
443 $callerName = $callerIsAnon ?
$req->caller
: User
::newFromName( $req->caller
)->getName();
444 $passwordMessage = wfMessage( 'passwordreset-emailelement', $user->getName(),
445 $req->password
)->inLanguage( $userLanguage );
446 $emailMessage = wfMessage( $callerIsAnon ?
'passwordreset-emailtext-ip'
447 : 'passwordreset-emailtext-user' )->inLanguage( $userLanguage );
448 $emailMessage->params( $callerName, $passwordMessage->text(), 1,
449 '<' . \Title
::newMainPage()->getCanonicalURL() . '>',
450 round( $this->newPasswordExpiry
/ 86400 ) );
451 $emailTitle = wfMessage( 'passwordreset-emailtitle' )->inLanguage( $userLanguage );
452 return $user->sendMail( $emailTitle->text(), $emailMessage->text() );