*/ class MemberAuthenticator extends Authenticator { /** * Contains encryption algorithm identifiers. * If set, will migrate to new precision-safe password hashing * upon login. See http://open.silverstripe.org/ticket/3004 * * @var array */ private static $migrate_legacy_hashes = array( 'md5' => 'md5_v2.4', 'sha1' => 'sha1_v2.4' ); /** * Attempt to find and authenticate member if possible from the given data * * @param array $data * @param Form $form * @param bool &$success Success flag * @return Member Found member, regardless of successful login */ protected static function authenticate_member($data, $form, &$success) { // Default success to false $success = false; // Attempt to identify by temporary ID $member = null; $email = null; if (!empty($data['tempid'])) { // Find user by tempid, in case they are re-validating an existing session $member = Member::member_from_tempid($data['tempid']); if ($member) { $email = $member->Email; } } // Otherwise, get email from posted value instead /** @skipUpgrade */ if (!$member && !empty($data['Email'])) { $email = $data['Email']; } // Check default login (see Security::setDefaultAdmin()) $asDefaultAdmin = $email === Security::default_admin_username(); if ($asDefaultAdmin) { // If logging is as default admin, ensure record is setup correctly $member = Member::default_admin(); $success = !$member->isLockedOut() && Security::check_default_admin($email, $data['Password']); //protect against failed login if ($success) { return $member; } } // Attempt to identify user by email if (!$member && $email) { // Find user by email $member = Member::get() ->filter(Member::config()->unique_identifier_field, $email) ->first(); } // Validate against member if possible if ($member && !$asDefaultAdmin) { $result = $member->checkPassword($data['Password']); $success = $result->isValid(); } else { $result = ValidationResult::create()->addError(_t( 'SilverStripe\\Security\\Member.ERRORWRONGCRED', 'The provided details don\'t seem to be correct. Please try again.' )); } // Emit failure to member and form (if available) if (!$success) { if ($member) { $member->registerFailedLogin(); } if ($form) { $form->setSessionValidationResult($result, true); } } else { if ($member) { $member->registerSuccessfulLogin(); } } return $member; } /** * Log login attempt * TODO We could handle this with an extension * * @param array $data * @param Member $member * @param bool $success */ protected static function record_login_attempt($data, $member, $success) { if (!Security::config()->login_recording) { return; } // Check email is valid /** @skipUpgrade */ $email = isset($data['Email']) ? $data['Email'] : null; if (is_array($email)) { throw new InvalidArgumentException("Bad email passed to MemberAuthenticator::authenticate(): $email"); } $attempt = new LoginAttempt(); if ($success) { // successful login (member is existing with matching password) $attempt->MemberID = $member->ID; $attempt->Status = 'Success'; // Audit logging hook $member->extend('authenticated'); } else { // Failed login - we're trying to see if a user exists with this email (disregarding wrong passwords) $attempt->Status = 'Failure'; if ($member) { // Audit logging hook $attempt->MemberID = $member->ID; $member->extend('authenticationFailed'); } else { // Audit logging hook Member::singleton()->extend('authenticationFailedUnknownUser', $data); } } $attempt->Email = $email; $attempt->IP = Controller::curr()->getRequest()->getIP(); $attempt->write(); } /** * Method to authenticate an user * * @param array $data Raw data to authenticate the user * @param Form $form Optional: If passed, better error messages can be * produced by using * {@link Form::sessionMessage()} * @return bool|Member Returns FALSE if authentication fails, otherwise * the member object * @see Security::setDefaultAdmin() */ public static function authenticate($data, Form $form = null) { // Find authenticated member $member = static::authenticate_member($data, $form, $success); // Optionally record every login attempt as a {@link LoginAttempt} object static::record_login_attempt($data, $member, $success); // Legacy migration to precision-safe password hashes. // A login-event with cleartext passwords is the only time // when we can rehash passwords to a different hashing algorithm, // bulk-migration doesn't work due to the nature of hashing. // See PasswordEncryptor_LegacyPHPHash class. if ($success && $member && isset(self::$migrate_legacy_hashes[$member->PasswordEncryption])) { $member->Password = $data['Password']; $member->PasswordEncryption = self::$migrate_legacy_hashes[$member->PasswordEncryption]; $member->write(); } if ($success) { Session::clear('BackURL'); } return $success ? $member : null; } /** * Method that creates the login form for this authentication method * * @param Controller $controller The parent controller, necessary to create the * appropriate form action tag * @return Form Returns the login form to use with this authentication * method */ public static function get_login_form(Controller $controller) { /** @skipUpgrade */ return MemberLoginForm::create($controller, self::class, "LoginForm"); } public static function get_cms_login_form(Controller $controller) { /** @skipUpgrade */ return CMSMemberLoginForm::create($controller, self::class, "LoginForm"); } public static function supports_cms() { // Don't automatically support subclasses of MemberAuthenticator return get_called_class() === __CLASS__; } }