@gmail.com", * Daniel Cannon (cannon dot danielc at gmail dot com) * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. * http://www.gnu.org/copyleft/gpl.html * * @file */ use MediaWiki\Logger\LoggerFactory; /** * Unit to authenticate log-in attempts to the current wiki. * * @ingroup API */ class ApiLogin extends ApiBase { public function __construct( ApiMain $main, $action ) { parent::__construct( $main, $action, 'lg' ); } /** * Executes the log-in attempt using the parameters passed. If * the log-in succeeds, it attaches a cookie to the session * and outputs the user id, username, and session token. If a * log-in fails, as the result of a bad password, a nonexistent * user, or any other reason, the host is cached with an expiry * and no log-in attempts will be accepted until that expiry * is reached. The expiry is $this->mLoginThrottle. */ public function execute() { // If we're in a mode that breaks the same-origin policy, no tokens can // be obtained if ( $this->lacksSameOriginSecurity() ) { $this->getResult()->addValue( null, 'login', array( 'result' => 'Aborted', 'reason' => 'Cannot log in when the same-origin policy is not applied', ) ); return; } $params = $this->extractRequestParams(); $result = array(); // Init session if necessary if ( session_id() == '' ) { wfSetupSession(); } $context = new DerivativeContext( $this->getContext() ); $context->setRequest( new DerivativeRequest( $this->getContext()->getRequest(), array( 'wpName' => $params['name'], 'wpPassword' => $params['password'], 'wpDomain' => $params['domain'], 'wpLoginToken' => $params['token'], 'wpRemember' => '' ) ) ); $loginForm = new LoginForm(); $loginForm->setContext( $context ); $authRes = $loginForm->authenticateUserData(); switch ( $authRes ) { case LoginForm::SUCCESS: $user = $context->getUser(); $this->getContext()->setUser( $user ); $user->setCookies( $this->getRequest(), null, true ); ApiQueryInfo::resetTokenCache(); // Run hooks. // @todo FIXME: Split back and frontend from this hook. // @todo FIXME: This hook should be placed in the backend $injected_html = ''; Hooks::run( 'UserLoginComplete', array( &$user, &$injected_html ) ); $result['result'] = 'Success'; $result['lguserid'] = intval( $user->getId() ); $result['lgusername'] = $user->getName(); $result['lgtoken'] = $user->getToken(); $result['cookieprefix'] = $this->getConfig()->get( 'CookiePrefix' ); $result['sessionid'] = session_id(); break; case LoginForm::NEED_TOKEN: $result['result'] = 'NeedToken'; $result['token'] = $loginForm->getLoginToken(); $result['cookieprefix'] = $this->getConfig()->get( 'CookiePrefix' ); $result['sessionid'] = session_id(); break; case LoginForm::WRONG_TOKEN: $result['result'] = 'WrongToken'; break; case LoginForm::NO_NAME: $result['result'] = 'NoName'; break; case LoginForm::ILLEGAL: $result['result'] = 'Illegal'; break; case LoginForm::WRONG_PLUGIN_PASS: $result['result'] = 'WrongPluginPass'; break; case LoginForm::NOT_EXISTS: $result['result'] = 'NotExists'; break; // bug 20223 - Treat a temporary password as wrong. Per SpecialUserLogin: // The e-mailed temporary password should not be used for actual logins. case LoginForm::RESET_PASS: case LoginForm::WRONG_PASS: $result['result'] = 'WrongPass'; break; case LoginForm::EMPTY_PASS: $result['result'] = 'EmptyPass'; break; case LoginForm::CREATE_BLOCKED: $result['result'] = 'CreateBlocked'; $result['details'] = 'Your IP address is blocked from account creation'; $block = $context->getUser()->getBlock(); if ( $block ) { $result = array_merge( $result, ApiQueryUserInfo::getBlockInfo( $block ) ); } break; case LoginForm::THROTTLED: $result['result'] = 'Throttled'; $throttle = $this->getConfig()->get( 'PasswordAttemptThrottle' ); $result['wait'] = intval( $throttle['seconds'] ); break; case LoginForm::USER_BLOCKED: $result['result'] = 'Blocked'; $block = User::newFromName( $params['name'] )->getBlock(); if ( $block ) { $result = array_merge( $result, ApiQueryUserInfo::getBlockInfo( $block ) ); } break; case LoginForm::ABORTED: $result['result'] = 'Aborted'; $result['reason'] = $loginForm->mAbortLoginErrorMsg; break; default: ApiBase::dieDebug( __METHOD__, "Unhandled case value: {$authRes}" ); } $this->getResult()->addValue( null, 'login', $result ); LoggerFactory::getInstance( 'authmanager' )->info( 'Login attempt', array( 'event' => 'login', 'successful' => $authRes === LoginForm::SUCCESS, 'status' => LoginForm::$statusCodes[$authRes], ) ); } public function mustBePosted() { return true; } public function isReadMode() { return false; } public function getAllowedParams() { return array( 'name' => null, 'password' => array( ApiBase::PARAM_TYPE => 'password', ), 'domain' => null, 'token' => null, ); } protected function getExamplesMessages() { return array( 'action=login&lgname=user&lgpassword=password' => 'apihelp-login-example-gettoken', 'action=login&lgname=user&lgpassword=password&lgtoken=123ABC' => 'apihelp-login-example-login', ); } public function getHelpUrls() { return 'https://www.mediawiki.org/wiki/API:Login'; } }