2007-09-14 05:12:21 +02:00
|
|
|
<?php
|
2016-06-15 06:03:16 +02:00
|
|
|
|
2016-06-23 01:37:22 +02:00
|
|
|
namespace SilverStripe\Security;
|
|
|
|
|
2016-08-19 00:51:35 +02:00
|
|
|
use SilverStripe\Control\Controller;
|
|
|
|
use SilverStripe\Control\Session;
|
|
|
|
use SilverStripe\Forms\Form;
|
2016-06-15 06:03:16 +02:00
|
|
|
use SilverStripe\ORM\ValidationResult;
|
2016-06-23 01:37:22 +02:00
|
|
|
use InvalidArgumentException;
|
|
|
|
|
2007-09-14 05:12:21 +02:00
|
|
|
/**
|
|
|
|
* Authenticator for the default "member" method
|
|
|
|
*
|
|
|
|
* @author Markus Lanthaler <markus@silverstripe.com>
|
|
|
|
*/
|
2016-11-29 00:31:16 +01:00
|
|
|
class MemberAuthenticator extends Authenticator
|
|
|
|
{
|
|
|
|
|
2016-11-22 22:29:15 +01:00
|
|
|
/**
|
|
|
|
* Contains encryption algorithm identifiers.
|
|
|
|
* If set, will migrate to new precision-safe password hashing
|
|
|
|
* upon login. See http://open.silverstripe.org/ticket/3004
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
private static $migrate_legacy_hashes = array(
|
|
|
|
'md5' => 'md5_v2.4',
|
|
|
|
'sha1' => 'sha1_v2.4'
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Attempt to find and authenticate member if possible from the given data
|
|
|
|
*
|
|
|
|
* @param array $data
|
|
|
|
* @param Form $form
|
|
|
|
* @param bool &$success Success flag
|
|
|
|
* @return Member Found member, regardless of successful login
|
|
|
|
*/
|
2016-11-29 00:31:16 +01:00
|
|
|
protected static function authenticate_member($data, $form, &$success)
|
|
|
|
{
|
2016-11-22 22:29:15 +01:00
|
|
|
// Default success to false
|
|
|
|
$success = false;
|
|
|
|
|
|
|
|
// Attempt to identify by temporary ID
|
|
|
|
$member = null;
|
|
|
|
$email = null;
|
|
|
|
if(!empty($data['tempid'])) {
|
|
|
|
// Find user by tempid, in case they are re-validating an existing session
|
|
|
|
$member = Member::member_from_tempid($data['tempid']);
|
2016-11-29 00:31:16 +01:00
|
|
|
if ($member) {
|
|
|
|
$email = $member->Email;
|
2016-11-22 22:29:15 +01:00
|
|
|
}
|
2016-11-29 00:31:16 +01:00
|
|
|
}
|
|
|
|
|
2016-11-22 22:29:15 +01:00
|
|
|
// Otherwise, get email from posted value instead
|
|
|
|
/** @skipUpgrade */
|
|
|
|
if(!$member && !empty($data['Email'])) {
|
|
|
|
$email = $data['Email'];
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check default login (see Security::setDefaultAdmin())
|
|
|
|
$asDefaultAdmin = $email === Security::default_admin_username();
|
|
|
|
if($asDefaultAdmin) {
|
|
|
|
// If logging is as default admin, ensure record is setup correctly
|
|
|
|
$member = Member::default_admin();
|
|
|
|
$success = !$member->isLockedOut() && Security::check_default_admin($email, $data['Password']);
|
|
|
|
//protect against failed login
|
|
|
|
if($success) {
|
|
|
|
return $member;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to identify user by email
|
|
|
|
if(!$member && $email) {
|
|
|
|
// Find user by email
|
|
|
|
$member = Member::get()
|
|
|
|
->filter(Member::config()->unique_identifier_field, $email)
|
|
|
|
->first();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate against member if possible
|
|
|
|
if($member && !$asDefaultAdmin) {
|
|
|
|
$result = $member->checkPassword($data['Password']);
|
|
|
|
$success = $result->valid();
|
|
|
|
} else {
|
|
|
|
$result = ValidationResult::create()->addError(_t('Member.ERRORWRONGCRED'));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Emit failure to member and form (if available)
|
|
|
|
if(!$success) {
|
|
|
|
if($member) $member->registerFailedLogin();
|
|
|
|
if($form) $form->setSessionValidationResult($result, true);
|
|
|
|
} else {
|
2016-11-29 00:31:16 +01:00
|
|
|
if ($member) {
|
|
|
|
$member->registerSuccessfulLogin();
|
|
|
|
}
|
2016-11-22 22:29:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return $member;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Log login attempt
|
|
|
|
* TODO We could handle this with an extension
|
|
|
|
*
|
|
|
|
* @param array $data
|
|
|
|
* @param Member $member
|
|
|
|
* @param bool $success
|
|
|
|
*/
|
2016-11-29 00:31:16 +01:00
|
|
|
protected static function record_login_attempt($data, $member, $success)
|
|
|
|
{
|
|
|
|
if (!Security::config()->login_recording) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-11-22 22:29:15 +01:00
|
|
|
// Check email is valid
|
|
|
|
/** @skipUpgrade */
|
|
|
|
$email = isset($data['Email']) ? $data['Email'] : null;
|
|
|
|
if(is_array($email)) {
|
|
|
|
throw new InvalidArgumentException("Bad email passed to MemberAuthenticator::authenticate(): $email");
|
|
|
|
}
|
|
|
|
|
|
|
|
$attempt = new LoginAttempt();
|
|
|
|
if($success) {
|
|
|
|
// successful login (member is existing with matching password)
|
|
|
|
$attempt->MemberID = $member->ID;
|
|
|
|
$attempt->Status = 'Success';
|
|
|
|
|
|
|
|
// Audit logging hook
|
|
|
|
$member->extend('authenticated');
|
|
|
|
} else {
|
|
|
|
// Failed login - we're trying to see if a user exists with this email (disregarding wrong passwords)
|
|
|
|
$attempt->Status = 'Failure';
|
|
|
|
if($member) {
|
|
|
|
// Audit logging hook
|
|
|
|
$attempt->MemberID = $member->ID;
|
|
|
|
$member->extend('authenticationFailed');
|
|
|
|
} else {
|
|
|
|
// Audit logging hook
|
|
|
|
Member::singleton()->extend('authenticationFailedUnknownUser', $data);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
$attempt->Email = $email;
|
|
|
|
$attempt->IP = Controller::curr()->getRequest()->getIP();
|
|
|
|
$attempt->write();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Method to authenticate an user
|
|
|
|
*
|
|
|
|
* @param array $data Raw data to authenticate the user
|
|
|
|
* @param Form $form Optional: If passed, better error messages can be
|
|
|
|
* produced by using
|
|
|
|
* {@link Form::sessionMessage()}
|
|
|
|
* @return bool|Member Returns FALSE if authentication fails, otherwise
|
|
|
|
* the member object
|
|
|
|
* @see Security::setDefaultAdmin()
|
|
|
|
*/
|
2016-11-29 00:31:16 +01:00
|
|
|
public static function authenticate($data, Form $form = null)
|
|
|
|
{
|
2016-11-22 22:29:15 +01:00
|
|
|
// Find authenticated member
|
|
|
|
$member = static::authenticate_member($data, $form, $success);
|
|
|
|
|
|
|
|
// Optionally record every login attempt as a {@link LoginAttempt} object
|
|
|
|
static::record_login_attempt($data, $member, $success);
|
|
|
|
|
|
|
|
// Legacy migration to precision-safe password hashes.
|
|
|
|
// A login-event with cleartext passwords is the only time
|
|
|
|
// when we can rehash passwords to a different hashing algorithm,
|
|
|
|
// bulk-migration doesn't work due to the nature of hashing.
|
|
|
|
// See PasswordEncryptor_LegacyPHPHash class.
|
|
|
|
if($success && $member && isset(self::$migrate_legacy_hashes[$member->PasswordEncryption])) {
|
|
|
|
$member->Password = $data['Password'];
|
|
|
|
$member->PasswordEncryption = self::$migrate_legacy_hashes[$member->PasswordEncryption];
|
|
|
|
$member->write();
|
|
|
|
}
|
2016-11-29 00:31:16 +01:00
|
|
|
|
|
|
|
if ($success) {
|
|
|
|
Session::clear('BackURL');
|
|
|
|
}
|
|
|
|
|
2016-11-22 22:29:15 +01:00
|
|
|
return $success ? $member : null;
|
|
|
|
}
|
2016-11-29 00:31:16 +01:00
|
|
|
|
|
|
|
|
2016-11-22 22:29:15 +01:00
|
|
|
/**
|
|
|
|
* Method that creates the login form for this authentication method
|
|
|
|
*
|
|
|
|
* @param Controller $controller The parent controller, necessary to create the
|
|
|
|
* appropriate form action tag
|
|
|
|
* @return Form Returns the login form to use with this authentication
|
|
|
|
* method
|
|
|
|
*/
|
2016-11-29 00:31:16 +01:00
|
|
|
public static function get_login_form(Controller $controller)
|
|
|
|
{
|
2016-11-22 22:29:15 +01:00
|
|
|
/** @skipUpgrade */
|
|
|
|
return MemberLoginForm::create($controller, "LoginForm");
|
|
|
|
}
|
2016-11-29 00:31:16 +01:00
|
|
|
|
|
|
|
public static function get_cms_login_form(Controller $controller)
|
|
|
|
{
|
2016-11-22 22:29:15 +01:00
|
|
|
/** @skipUpgrade */
|
|
|
|
return CMSMemberLoginForm::create($controller, "LoginForm");
|
|
|
|
}
|
2016-11-29 00:31:16 +01:00
|
|
|
|
|
|
|
public static function supports_cms()
|
|
|
|
{
|
2016-11-22 22:29:15 +01:00
|
|
|
// Don't automatically support subclasses of MemberAuthenticator
|
|
|
|
return get_called_class() === __CLASS__;
|
|
|
|
}
|
2016-11-29 00:31:16 +01:00
|
|
|
|
|
|
|
|
2016-11-22 22:29:15 +01:00
|
|
|
/**
|
|
|
|
* Get the name of the authentication method
|
|
|
|
*
|
|
|
|
* @return string Returns the name of the authentication method.
|
|
|
|
*/
|
2016-11-29 00:31:16 +01:00
|
|
|
public static function get_name()
|
|
|
|
{
|
2016-11-22 22:29:15 +01:00
|
|
|
return _t('MemberAuthenticator.TITLE', "E-mail & Password");
|
|
|
|
}
|
2007-09-14 05:12:21 +02:00
|
|
|
}
|