- $authenticatedUser: User object if credentials match a user, else null.
StartChangePassword: Before changing a password
-- $user: user
+- Profile $target: The profile of the User that is changing password
- $oldpassword: the user's old password
- $newpassword: the desired new password
EndChangePassword: After changing a password
-- $user: user
+- Profile $target: The profile of the User that just changed its password
StartHashPassword: Generate a hashed version of the password (like a salted crypt)
- &$hashed: Hashed version of the password, later put in the database
* @link http://status.net/
*/
-if (!defined('STATUSNET') && !defined('LACONICA')) {
- exit(1);
-}
-
-
+if (!defined('STATUSNET')) { exit(1); }
/**
* Change password
$this->autofocus('oldpassword');
}
- /**
- * Content area of the page
- *
- * Shows a form for changing the password
- *
- * @return void
- */
-
function showContent()
{
- $user = common_current_user();
-
$this->elementStart('form', array('method' => 'POST',
'id' => 'form_password',
'class' => 'form_settings',
$this->elementStart('ul', 'form_data');
// Users who logged in with OpenID won't have a pwd
- if ($user->password) {
+ if ($this->scoped->hasPassword()) {
$this->elementStart('li');
// TRANS: Field label on page where to change password.
$this->password('oldpassword', _('Old password'));
$this->elementEnd('form');
}
- /**
- * Handle a post
- *
- * Validate input and save changes. Reload the form with a success
- * or error message.
- *
- * @return void
- */
- function handlePost()
+ protected function doPost()
{
- // CSRF protection
-
- $token = $this->trimmed('token');
- if (!$token || $token != common_session_token()) {
- // TRANS: Client error displayed when the session token does not match or is not given.
- $this->showForm(_('There was a problem with your session token. '.
- 'Try again, please.'));
- return;
- }
-
- $user = common_current_user();
- assert(!is_null($user)); // should already be checked
-
// FIXME: scrub input
$newpassword = $this->arg('newpassword');
if (strlen($newpassword) < 6) {
// TRANS: Form validation error on page where to change password.
- $this->showForm(_('Password must be 6 or more characters.'));
- return;
+ throw new ClientException(_('Password must be 6 or more characters.'));
} else if (0 != strcmp($newpassword, $confirm)) {
// TRANS: Form validation error on password change when password confirmation does not match.
- $this->showForm(_('Passwords do not match.'));
- return;
+ throw new ClientException(_('Passwords do not match.'));
}
- if ($user->password) {
+ $oldpassword = null;
+ if ($this->scoped->hasPassword()) {
$oldpassword = $this->arg('oldpassword');
- if (!common_check_user($user->nickname, $oldpassword)) {
+ if (!common_check_user($this->scoped->getNickname(), $oldpassword)) {
// TRANS: Form validation error on page where to change password.
- $this->showForm(_('Incorrect old password.'));
- return;
+ throw new ClientException(_('Incorrect old password.'));
}
- }else{
- $oldpassword = null;
}
- $success = false;
- if(Event::handle('StartChangePassword', array($user, $oldpassword, $newpassword))){
+ if (Event::handle('StartChangePassword', array($this->scoped, $oldpassword, $newpassword))) {
//no handler changed the password, so change the password internally
+ $user = $this->scoped->getUser();
$original = clone($user);
- $user->password = common_munge_password($newpassword, $user->id);
+ $user->password = common_munge_password($newpassword, $this->scoped);
$val = $user->validate();
if ($val !== true) {
// TRANS: Form validation error on page where to change password.
- $this->showForm(_('Error saving user; invalid.'));
- return;
+ throw new ServerException(_('Error saving user; invalid.'));
}
if (!$user->update($original)) {
// TRANS: Server error displayed on page where to change password when password change
// TRANS: could not be made because of a server error.
- $this->serverError(_('Cannot save new password.'));
+ throw new ServerException(_('Cannot save new password.'));
}
- Event::handle('EndChangePassword', array($user));
+ Event::handle('EndChangePassword', array($this->scoped));
}
// TRANS: Form validation notice on page where to change password.
- $this->showForm(_('Password saved.'), true);
+ return _('Password saved.');
}
}
$original = clone($user);
- $user->password = common_munge_password($newpassword, $user->id);
+ $user->password = common_munge_password($newpassword, $user->getProfile());
if (!$user->update($original)) {
common_log_db_error($user, 'UPDATE', __FILE__);
return true;
}
+ // Returns false if the user has no password (which will always
+ // be the case for remote users). This can be the case for OpenID
+ // logins or other mechanisms which don't store a password hash.
+ public function hasPassword()
+ {
+ try {
+ return !empty($this->getUser()->hasPassword());
+ } catch (NoSuchUserException $e) {
+ return false;
+ }
+ }
+
public function getObjectType()
{
// FIXME: More types... like peopletags and whatever
}
if (!empty($password)) { // may not have a password for OpenID users
- $user->password = common_munge_password($password, $id);
+ $user->password = common_munge_password($password);
}
$result = $user->insert();
return $this->getProfile()->isPrivateStream();
}
+ public function hasPassword()
+ {
+ return !empty($this->password);
+ }
+
public function delPref($namespace, $topic)
{
return $this->getProfile()->delPref($namespace, $topic);
}
}
- function onStartChangePassword($user,$oldpassword,$newpassword)
+ function onStartChangePassword(Profile $target ,$oldpassword, $newpassword)
{
if($this->password_changeable){
$user_username = new User_username();
- $user_username->user_id=$user->id;
+ $user_username->user_id = $target->getID();
$user_username->provider_name=$this->provider_name;
- if($user_username->find() && $user_username->fetch()){
+ if ($user_username->find(true)) {
$authenticated = $this->checkPassword($user_username->username, $oldpassword);
if($authenticated){
$result = $this->changePassword($user_username->username,$oldpassword,$newpassword);
/**
* Salted, hashed passwords are stored in the DB.
*/
-function common_munge_password($password, $id, Profile $profile=null)
+function common_munge_password($password, Profile $profile=null)
{
$hashed = null;
}
if ($user instanceof User && !empty($password)) {
- if (0 == strcmp(common_munge_password($password, $user->id),
- $user->password)) {
+ if (0 == strcmp(common_munge_password($password, $user->getProfile()), $user->password)) {
//internal checking passed
$authenticatedUser = $user;
}
* EVENTS
*/
- public function onStartChangePassword($user, $oldpassword, $newpassword)
+ public function onStartChangePassword(Profile $target, $oldpassword, $newpassword)
{
- if (!$this->checkPassword($user->nickname, $oldpassword)) {
+ if (!$this->checkPassword($target->getNickname(), $oldpassword)) {
// if we ARE in overwrite mode, test password with common_check_user
- if (!$this->overwrite || !common_check_user($user->nickname, $oldpassword)) {
+ if (!$this->overwrite || !common_check_user($target->getNickname(), $oldpassword)) {
// either we're not in overwrite mode, or the password was incorrect
return !$this->authoritative;
}
// oldpassword was apparently ok
}
- $changed = $this->changePassword($user->nickname, $oldpassword, $newpassword);
+ $changed = $this->changePassword($target->getNickname(), $oldpassword, $newpassword);
return (!$changed && empty($this->authoritative));
}
$orig = clone($this->user);
- $this->user->password = common_munge_password($this->password, $this->user->id);
+ $this->user->password = common_munge_password($this->password, $this->user->getProfile());
$this->user->update($orig);