PasswordsettingsAction aligned with FormAction
Also made some changes in the password "munging" function call common_munge_password to accept a profile instead of user ID (which was only there because stoneage StatusNet used the ID to generate a not-very-random salt, but nowadays we primarily use AuthCrypt plugin).
This commit is contained in:
parent
47ef917f62
commit
cfaaf3c13c
@ -615,12 +615,12 @@ EndCheckPassword: After checking a username/password pair
|
||||
- $authenticatedUser: User object if credentials match a user, else null.
|
||||
|
||||
StartChangePassword: Before changing a password
|
||||
- $user: user
|
||||
- Profile $target: The profile of the User that is changing password
|
||||
- $oldpassword: the user's old password
|
||||
- $newpassword: the desired new password
|
||||
|
||||
EndChangePassword: After changing a password
|
||||
- $user: user
|
||||
- Profile $target: The profile of the User that just changed its password
|
||||
|
||||
StartHashPassword: Generate a hashed version of the password (like a salted crypt)
|
||||
- &$hashed: Hashed version of the password, later put in the database
|
||||
|
@ -28,11 +28,7 @@
|
||||
* @link http://status.net/
|
||||
*/
|
||||
|
||||
if (!defined('STATUSNET') && !defined('LACONICA')) {
|
||||
exit(1);
|
||||
}
|
||||
|
||||
|
||||
if (!defined('STATUSNET')) { exit(1); }
|
||||
|
||||
/**
|
||||
* Change password
|
||||
@ -77,18 +73,8 @@ class PasswordsettingsAction extends SettingsAction
|
||||
$this->autofocus('oldpassword');
|
||||
}
|
||||
|
||||
/**
|
||||
* Content area of the page
|
||||
*
|
||||
* Shows a form for changing the password
|
||||
*
|
||||
* @return void
|
||||
*/
|
||||
|
||||
function showContent()
|
||||
{
|
||||
$user = common_current_user();
|
||||
|
||||
$this->elementStart('form', array('method' => 'POST',
|
||||
'id' => 'form_password',
|
||||
'class' => 'form_settings',
|
||||
@ -102,7 +88,7 @@ class PasswordsettingsAction extends SettingsAction
|
||||
|
||||
$this->elementStart('ul', 'form_data');
|
||||
// Users who logged in with OpenID won't have a pwd
|
||||
if ($user->password) {
|
||||
if ($this->scoped->hasPassword()) {
|
||||
$this->elementStart('li');
|
||||
// TRANS: Field label on page where to change password.
|
||||
$this->password('oldpassword', _('Old password'));
|
||||
@ -129,29 +115,8 @@ class PasswordsettingsAction extends SettingsAction
|
||||
$this->elementEnd('form');
|
||||
}
|
||||
|
||||
/**
|
||||
* Handle a post
|
||||
*
|
||||
* Validate input and save changes. Reload the form with a success
|
||||
* or error message.
|
||||
*
|
||||
* @return void
|
||||
*/
|
||||
function handlePost()
|
||||
protected function doPost()
|
||||
{
|
||||
// CSRF protection
|
||||
|
||||
$token = $this->trimmed('token');
|
||||
if (!$token || $token != common_session_token()) {
|
||||
// TRANS: Client error displayed when the session token does not match or is not given.
|
||||
$this->showForm(_('There was a problem with your session token. '.
|
||||
'Try again, please.'));
|
||||
return;
|
||||
}
|
||||
|
||||
$user = common_current_user();
|
||||
assert(!is_null($user)); // should already be checked
|
||||
|
||||
// FIXME: scrub input
|
||||
|
||||
$newpassword = $this->arg('newpassword');
|
||||
@ -161,49 +126,44 @@ class PasswordsettingsAction extends SettingsAction
|
||||
|
||||
if (strlen($newpassword) < 6) {
|
||||
// TRANS: Form validation error on page where to change password.
|
||||
$this->showForm(_('Password must be 6 or more characters.'));
|
||||
return;
|
||||
throw new ClientException(_('Password must be 6 or more characters.'));
|
||||
} else if (0 != strcmp($newpassword, $confirm)) {
|
||||
// TRANS: Form validation error on password change when password confirmation does not match.
|
||||
$this->showForm(_('Passwords do not match.'));
|
||||
return;
|
||||
throw new ClientException(_('Passwords do not match.'));
|
||||
}
|
||||
|
||||
if ($user->password) {
|
||||
$oldpassword = null;
|
||||
if ($this->scoped->hasPassword()) {
|
||||
$oldpassword = $this->arg('oldpassword');
|
||||
|
||||
if (!common_check_user($user->nickname, $oldpassword)) {
|
||||
if (!common_check_user($this->scoped->getNickname(), $oldpassword)) {
|
||||
// TRANS: Form validation error on page where to change password.
|
||||
$this->showForm(_('Incorrect old password.'));
|
||||
return;
|
||||
throw new ClientException(_('Incorrect old password.'));
|
||||
}
|
||||
}else{
|
||||
$oldpassword = null;
|
||||
}
|
||||
|
||||
$success = false;
|
||||
if(Event::handle('StartChangePassword', array($user, $oldpassword, $newpassword))){
|
||||
if (Event::handle('StartChangePassword', array($this->scoped, $oldpassword, $newpassword))) {
|
||||
//no handler changed the password, so change the password internally
|
||||
$user = $this->scoped->getUser();
|
||||
$original = clone($user);
|
||||
|
||||
$user->password = common_munge_password($newpassword, $user->id);
|
||||
$user->password = common_munge_password($newpassword, $this->scoped);
|
||||
|
||||
$val = $user->validate();
|
||||
if ($val !== true) {
|
||||
// TRANS: Form validation error on page where to change password.
|
||||
$this->showForm(_('Error saving user; invalid.'));
|
||||
return;
|
||||
throw new ServerException(_('Error saving user; invalid.'));
|
||||
}
|
||||
|
||||
if (!$user->update($original)) {
|
||||
// TRANS: Server error displayed on page where to change password when password change
|
||||
// TRANS: could not be made because of a server error.
|
||||
$this->serverError(_('Cannot save new password.'));
|
||||
throw new ServerException(_('Cannot save new password.'));
|
||||
}
|
||||
Event::handle('EndChangePassword', array($user));
|
||||
Event::handle('EndChangePassword', array($this->scoped));
|
||||
}
|
||||
|
||||
// TRANS: Form validation notice on page where to change password.
|
||||
$this->showForm(_('Password saved.'), true);
|
||||
return _('Password saved.');
|
||||
}
|
||||
}
|
||||
|
@ -325,7 +325,7 @@ class RecoverpasswordAction extends Action
|
||||
|
||||
$original = clone($user);
|
||||
|
||||
$user->password = common_munge_password($newpassword, $user->id);
|
||||
$user->password = common_munge_password($newpassword, $user->getProfile());
|
||||
|
||||
if (!$user->update($original)) {
|
||||
common_log_db_error($user, 'UPDATE', __FILE__);
|
||||
|
@ -138,6 +138,18 @@ class Profile extends Managed_DataObject
|
||||
return true;
|
||||
}
|
||||
|
||||
// Returns false if the user has no password (which will always
|
||||
// be the case for remote users). This can be the case for OpenID
|
||||
// logins or other mechanisms which don't store a password hash.
|
||||
public function hasPassword()
|
||||
{
|
||||
try {
|
||||
return !empty($this->getUser()->hasPassword());
|
||||
} catch (NoSuchUserException $e) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public function getObjectType()
|
||||
{
|
||||
// FIXME: More types... like peopletags and whatever
|
||||
|
@ -299,7 +299,7 @@ class User extends Managed_DataObject
|
||||
}
|
||||
|
||||
if (!empty($password)) { // may not have a password for OpenID users
|
||||
$user->password = common_munge_password($password, $id);
|
||||
$user->password = common_munge_password($password);
|
||||
}
|
||||
|
||||
$result = $user->insert();
|
||||
@ -1015,6 +1015,11 @@ class User extends Managed_DataObject
|
||||
return $this->getProfile()->isPrivateStream();
|
||||
}
|
||||
|
||||
public function hasPassword()
|
||||
{
|
||||
return !empty($this->password);
|
||||
}
|
||||
|
||||
public function delPref($namespace, $topic)
|
||||
{
|
||||
return $this->getProfile()->delPref($namespace, $topic);
|
||||
|
@ -201,13 +201,13 @@ abstract class AuthenticationPlugin extends Plugin
|
||||
}
|
||||
}
|
||||
|
||||
function onStartChangePassword($user,$oldpassword,$newpassword)
|
||||
function onStartChangePassword(Profile $target ,$oldpassword, $newpassword)
|
||||
{
|
||||
if($this->password_changeable){
|
||||
$user_username = new User_username();
|
||||
$user_username->user_id=$user->id;
|
||||
$user_username->user_id = $target->getID();
|
||||
$user_username->provider_name=$this->provider_name;
|
||||
if($user_username->find() && $user_username->fetch()){
|
||||
if ($user_username->find(true)) {
|
||||
$authenticated = $this->checkPassword($user_username->username, $oldpassword);
|
||||
if($authenticated){
|
||||
$result = $this->changePassword($user_username->username,$oldpassword,$newpassword);
|
||||
|
@ -210,7 +210,7 @@ function common_language()
|
||||
/**
|
||||
* Salted, hashed passwords are stored in the DB.
|
||||
*/
|
||||
function common_munge_password($password, $id, Profile $profile=null)
|
||||
function common_munge_password($password, Profile $profile=null)
|
||||
{
|
||||
$hashed = null;
|
||||
|
||||
@ -245,8 +245,7 @@ function common_check_user($nickname, $password)
|
||||
}
|
||||
|
||||
if ($user instanceof User && !empty($password)) {
|
||||
if (0 == strcmp(common_munge_password($password, $user->id),
|
||||
$user->password)) {
|
||||
if (0 == strcmp(common_munge_password($password, $user->getProfile()), $user->password)) {
|
||||
//internal checking passed
|
||||
$authenticatedUser = $user;
|
||||
}
|
||||
|
@ -110,17 +110,17 @@ class AuthCryptPlugin extends AuthenticationPlugin
|
||||
* EVENTS
|
||||
*/
|
||||
|
||||
public function onStartChangePassword($user, $oldpassword, $newpassword)
|
||||
public function onStartChangePassword(Profile $target, $oldpassword, $newpassword)
|
||||
{
|
||||
if (!$this->checkPassword($user->nickname, $oldpassword)) {
|
||||
if (!$this->checkPassword($target->getNickname(), $oldpassword)) {
|
||||
// if we ARE in overwrite mode, test password with common_check_user
|
||||
if (!$this->overwrite || !common_check_user($user->nickname, $oldpassword)) {
|
||||
if (!$this->overwrite || !common_check_user($target->getNickname(), $oldpassword)) {
|
||||
// either we're not in overwrite mode, or the password was incorrect
|
||||
return !$this->authoritative;
|
||||
}
|
||||
// oldpassword was apparently ok
|
||||
}
|
||||
$changed = $this->changePassword($user->nickname, $oldpassword, $newpassword);
|
||||
$changed = $this->changePassword($target->getNickname(), $oldpassword, $newpassword);
|
||||
|
||||
return (!$changed && empty($this->authoritative));
|
||||
}
|
||||
|
@ -157,7 +157,7 @@ class ConfirmfirstemailAction extends Action
|
||||
|
||||
$orig = clone($this->user);
|
||||
|
||||
$this->user->password = common_munge_password($this->password, $this->user->id);
|
||||
$this->user->password = common_munge_password($this->password, $this->user->getProfile());
|
||||
|
||||
$this->user->update($orig);
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user