mirror of
https://we.phorge.it/source/phorge.git
synced 2024-11-26 00:32:42 +01:00
Allow configuration of a minimum password length, unify password reset
interfaces Summary: - We have a hard-coded minimum length of 3 right now (and 1 in the other interface), which is sort of silly. - Provide a more reasonable default, and allow it to be configured. - We have two password reset interfaces, one of which no longer actually requires you to verify you own the account. This is more than a bit derp. - Merge the interfaces into one, using either an email token or the account's current password to let you change the password. Test Plan: - Reset password on an account. - Changed password on an account. - Created a new account, logged in, set the password. - Tried to set a too-short password, got an error. Reviewers: btrahan, jungejason, nh Reviewed By: jungejason CC: aran, jungejason Maniphest Tasks: T766 Differential Revision: https://secure.phabricator.com/D1374
This commit is contained in:
parent
8b3ab97d64
commit
02fb5fea89
7 changed files with 82 additions and 158 deletions
|
@ -327,6 +327,10 @@ return array(
|
||||||
// information remains consistent across both systems.
|
// information remains consistent across both systems.
|
||||||
'account.editable' => true,
|
'account.editable' => true,
|
||||||
|
|
||||||
|
// When users set or reset a password, it must have at least this many
|
||||||
|
// characters.
|
||||||
|
'account.minimum-password-length' => 8,
|
||||||
|
|
||||||
|
|
||||||
// -- Facebook ------------------------------------------------------------ //
|
// -- Facebook ------------------------------------------------------------ //
|
||||||
|
|
||||||
|
|
|
@ -642,7 +642,6 @@ phutil_register_library_map(array(
|
||||||
'PhabricatorRepositorySymbol' => 'applications/repository/storage/symbol',
|
'PhabricatorRepositorySymbol' => 'applications/repository/storage/symbol',
|
||||||
'PhabricatorRepositoryTestCase' => 'applications/repository/storage/repository/__tests__',
|
'PhabricatorRepositoryTestCase' => 'applications/repository/storage/repository/__tests__',
|
||||||
'PhabricatorRepositoryType' => 'applications/repository/constants/repositorytype',
|
'PhabricatorRepositoryType' => 'applications/repository/constants/repositorytype',
|
||||||
'PhabricatorResetPasswordController' => 'applications/auth/controller/resetpassword',
|
|
||||||
'PhabricatorS3FileStorageEngine' => 'applications/files/engine/s3',
|
'PhabricatorS3FileStorageEngine' => 'applications/files/engine/s3',
|
||||||
'PhabricatorSQLPatchList' => 'infrastructure/setup/sql',
|
'PhabricatorSQLPatchList' => 'infrastructure/setup/sql',
|
||||||
'PhabricatorSearchAbstractDocument' => 'applications/search/index/abstractdocument',
|
'PhabricatorSearchAbstractDocument' => 'applications/search/index/abstractdocument',
|
||||||
|
@ -1292,7 +1291,6 @@ phutil_register_library_map(array(
|
||||||
'PhabricatorRepositorySvnCommitMessageParserWorker' => 'PhabricatorRepositoryCommitMessageParserWorker',
|
'PhabricatorRepositorySvnCommitMessageParserWorker' => 'PhabricatorRepositoryCommitMessageParserWorker',
|
||||||
'PhabricatorRepositorySymbol' => 'PhabricatorRepositoryDAO',
|
'PhabricatorRepositorySymbol' => 'PhabricatorRepositoryDAO',
|
||||||
'PhabricatorRepositoryTestCase' => 'PhabricatorTestCase',
|
'PhabricatorRepositoryTestCase' => 'PhabricatorTestCase',
|
||||||
'PhabricatorResetPasswordController' => 'PhabricatorAuthController',
|
|
||||||
'PhabricatorS3FileStorageEngine' => 'PhabricatorFileStorageEngine',
|
'PhabricatorS3FileStorageEngine' => 'PhabricatorFileStorageEngine',
|
||||||
'PhabricatorSearchAttachController' => 'PhabricatorSearchController',
|
'PhabricatorSearchAttachController' => 'PhabricatorSearchController',
|
||||||
'PhabricatorSearchBaseController' => 'PhabricatorController',
|
'PhabricatorSearchBaseController' => 'PhabricatorController',
|
||||||
|
|
|
@ -134,7 +134,6 @@ class AphrontDefaultApplicationConfiguration
|
||||||
'email/$' => 'PhabricatorEmailLoginController',
|
'email/$' => 'PhabricatorEmailLoginController',
|
||||||
'etoken/(?P<token>\w+)/$' => 'PhabricatorEmailTokenController',
|
'etoken/(?P<token>\w+)/$' => 'PhabricatorEmailTokenController',
|
||||||
'refresh/$' => 'PhabricatorRefreshCSRFController',
|
'refresh/$' => 'PhabricatorRefreshCSRFController',
|
||||||
'reset/$' => 'PhabricatorResetPasswordController',
|
|
||||||
'validate/$' => 'PhabricatorLoginValidateController',
|
'validate/$' => 'PhabricatorLoginValidateController',
|
||||||
),
|
),
|
||||||
|
|
||||||
|
|
|
@ -81,11 +81,17 @@ class PhabricatorEmailTokenController extends PhabricatorAuthController {
|
||||||
$request->setCookie('phusr', $target_user->getUsername());
|
$request->setCookie('phusr', $target_user->getUsername());
|
||||||
$request->setCookie('phsid', $session_key);
|
$request->setCookie('phsid', $session_key);
|
||||||
|
|
||||||
|
if (PhabricatorEnv::getEnvConfig('account.editable')) {
|
||||||
|
$next = '/settings/page/password/?token='.$token;
|
||||||
|
} else {
|
||||||
|
$next = '/';
|
||||||
|
}
|
||||||
|
|
||||||
$uri = new PhutilURI('/login/validate/');
|
$uri = new PhutilURI('/login/validate/');
|
||||||
$uri->setQueryParams(
|
$uri->setQueryParams(
|
||||||
array(
|
array(
|
||||||
'phusr' => $target_user->getUsername(),
|
'phusr' => $target_user->getUsername(),
|
||||||
'next' => '/login/reset/',
|
'next' => $next,
|
||||||
));
|
));
|
||||||
|
|
||||||
return id(new AphrontRedirectResponse())
|
return id(new AphrontRedirectResponse())
|
||||||
|
|
|
@ -1,108 +0,0 @@
|
||||||
<?php
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Copyright 2012 Facebook, Inc.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
class PhabricatorResetPasswordController extends PhabricatorAuthController {
|
|
||||||
|
|
||||||
public function processRequest() {
|
|
||||||
$request = $this->getRequest();
|
|
||||||
$user = $request->getUser();
|
|
||||||
|
|
||||||
if (!PhabricatorEnv::getEnvConfig('auth.password-auth-enabled')) {
|
|
||||||
return new Aphront400Response();
|
|
||||||
}
|
|
||||||
|
|
||||||
$errors = array();
|
|
||||||
|
|
||||||
$e_pass = true;
|
|
||||||
$e_confirm = true;
|
|
||||||
|
|
||||||
if ($request->isFormPost()) {
|
|
||||||
$e_pass = 'Error';
|
|
||||||
$e_confirm = 'Error';
|
|
||||||
|
|
||||||
$pass = $request->getStr('password');
|
|
||||||
$confirm = $request->getStr('confirm');
|
|
||||||
|
|
||||||
if (strlen($pass) < 3) {
|
|
||||||
$errors[] = 'That password is ridiculously short.';
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($pass !== $confirm) {
|
|
||||||
$errors[] = "Passwords do not match.";
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!$errors) {
|
|
||||||
|
|
||||||
// The CSRF token depends on the user's password hash. When we change
|
|
||||||
// it, we cause the CSRF check to fail. We don't need to do a CSRF
|
|
||||||
// check here because we've already performed one in the isFormPost()
|
|
||||||
// call earlier.
|
|
||||||
|
|
||||||
$unguarded = AphrontWriteGuard::beginScopedUnguardedWrites();
|
|
||||||
$user->setPassword($pass);
|
|
||||||
$user->save();
|
|
||||||
unset($unguarded);
|
|
||||||
|
|
||||||
return id(new AphrontRedirectResponse())
|
|
||||||
->setURI('/');
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($errors) {
|
|
||||||
$error_view = new AphrontErrorView();
|
|
||||||
$error_view->setTitle('Password Reset Failed');
|
|
||||||
$error_view->setErrors($errors);
|
|
||||||
} else {
|
|
||||||
$error_view = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
$form = new AphrontFormView();
|
|
||||||
$form
|
|
||||||
->setUser($user)
|
|
||||||
->setAction('/login/reset/')
|
|
||||||
->appendChild(
|
|
||||||
id(new AphrontFormPasswordControl())
|
|
||||||
->setLabel('New Password')
|
|
||||||
->setName('password')
|
|
||||||
->setError($e_pass))
|
|
||||||
->appendChild(
|
|
||||||
id(new AphrontFormPasswordControl())
|
|
||||||
->setLabel('Confirm Password')
|
|
||||||
->setName('confirm')
|
|
||||||
->setError($e_confirm))
|
|
||||||
->appendChild(
|
|
||||||
id(new AphrontFormSubmitControl())
|
|
||||||
->setValue('Reset Password')
|
|
||||||
->addCancelButton('/', 'Skip'));
|
|
||||||
|
|
||||||
$panel = new AphrontPanelView();
|
|
||||||
$panel->setWidth(AphrontPanelView::WIDTH_FORM);
|
|
||||||
$panel->setHeader('Reset Password');
|
|
||||||
$panel->appendChild($form);
|
|
||||||
|
|
||||||
return $this->buildStandardPageResponse(
|
|
||||||
array(
|
|
||||||
$error_view,
|
|
||||||
$panel,
|
|
||||||
),
|
|
||||||
array(
|
|
||||||
'title' => 'Reset Password',
|
|
||||||
));
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
|
@ -1,23 +0,0 @@
|
||||||
<?php
|
|
||||||
/**
|
|
||||||
* This file is automatically generated. Lint this module to rebuild it.
|
|
||||||
* @generated
|
|
||||||
*/
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
phutil_require_module('phabricator', 'aphront/response/400');
|
|
||||||
phutil_require_module('phabricator', 'aphront/response/redirect');
|
|
||||||
phutil_require_module('phabricator', 'aphront/writeguard');
|
|
||||||
phutil_require_module('phabricator', 'applications/auth/controller/base');
|
|
||||||
phutil_require_module('phabricator', 'infrastructure/env');
|
|
||||||
phutil_require_module('phabricator', 'view/form/base');
|
|
||||||
phutil_require_module('phabricator', 'view/form/control/password');
|
|
||||||
phutil_require_module('phabricator', 'view/form/control/submit');
|
|
||||||
phutil_require_module('phabricator', 'view/form/error');
|
|
||||||
phutil_require_module('phabricator', 'view/layout/panel');
|
|
||||||
|
|
||||||
phutil_require_module('phutil', 'utils');
|
|
||||||
|
|
||||||
|
|
||||||
phutil_require_source('PhabricatorResetPasswordController.php');
|
|
|
@ -32,31 +32,65 @@ class PhabricatorUserPasswordSettingsPanelController
|
||||||
return new Aphront400Response();
|
return new Aphront400Response();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
$min_len = PhabricatorEnv::getEnvConfig('account.minimum-password-length');
|
||||||
|
$min_len = (int)$min_len;
|
||||||
|
|
||||||
|
// NOTE: To change your password, you need to prove you own the account,
|
||||||
|
// either by providing the old password or by carrying a token to
|
||||||
|
// the workflow from a password reset email.
|
||||||
|
|
||||||
|
$token = $request->getStr('token');
|
||||||
|
if ($token) {
|
||||||
|
$valid_token = $user->validateEmailToken($token);
|
||||||
|
} else {
|
||||||
|
$valid_token = false;
|
||||||
|
}
|
||||||
|
|
||||||
|
$e_old = true;
|
||||||
|
$e_new = true;
|
||||||
|
$e_conf = true;
|
||||||
|
|
||||||
$errors = array();
|
$errors = array();
|
||||||
if ($request->isFormPost()) {
|
if ($request->isFormPost()) {
|
||||||
if ($user->comparePassword($request->getStr('old_pw'))) {
|
if (!$valid_token) {
|
||||||
$pass = $request->getStr('new_pw');
|
if (!$user->comparePassword($request->getStr('old_pw'))) {
|
||||||
$conf = $request->getStr('conf_pw');
|
$errors[] = 'The old password you entered is incorrect.';
|
||||||
if ($pass === $conf) {
|
$e_old = 'Invalid';
|
||||||
if (strlen($pass)) {
|
|
||||||
$user->setPassword($pass);
|
|
||||||
// This write is unguarded because the CSRF token has already
|
|
||||||
// been checked in the call to $request->isFormPost() and
|
|
||||||
// the CSRF token depends on the password hash, so when it
|
|
||||||
// is changed here the CSRF token check will fail.
|
|
||||||
$unguarded = AphrontWriteGuard::beginScopedUnguardedWrites();
|
|
||||||
$user->save();
|
|
||||||
unset($unguarded);
|
|
||||||
return id(new AphrontRedirectResponse())
|
|
||||||
->setURI('/settings/page/password/?saved=true');
|
|
||||||
} else {
|
|
||||||
$errors[] = 'Your new password is too short.';
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$errors[] = 'New password and confirmation do not match.';
|
|
||||||
}
|
}
|
||||||
} else {
|
}
|
||||||
$errors[] = 'The old password you entered is incorrect.';
|
|
||||||
|
$pass = $request->getStr('new_pw');
|
||||||
|
$conf = $request->getStr('conf_pw');
|
||||||
|
|
||||||
|
if (strlen($pass) < $min_len) {
|
||||||
|
$errors[] = 'Your new password is too short.';
|
||||||
|
$e_new = 'Too Short';
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($pass !== $conf) {
|
||||||
|
$errors[] = 'New password and confirmation do not match.';
|
||||||
|
$e_conf = 'Invalid';
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!$errors) {
|
||||||
|
$user->setPassword($pass);
|
||||||
|
// This write is unguarded because the CSRF token has already
|
||||||
|
// been checked in the call to $request->isFormPost() and
|
||||||
|
// the CSRF token depends on the password hash, so when it
|
||||||
|
// is changed here the CSRF token check will fail.
|
||||||
|
$unguarded = AphrontWriteGuard::beginScopedUnguardedWrites();
|
||||||
|
$user->save();
|
||||||
|
unset($unguarded);
|
||||||
|
|
||||||
|
if ($valid_token) {
|
||||||
|
// If this is a password set/reset, kick the user to the home page
|
||||||
|
// after we update their account.
|
||||||
|
$next = '/';
|
||||||
|
} else {
|
||||||
|
$next = '/settings/page/password/?saved=true';
|
||||||
|
}
|
||||||
|
|
||||||
|
return id(new AphrontRedirectResponse())->setURI($next);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -74,22 +108,36 @@ class PhabricatorUserPasswordSettingsPanelController
|
||||||
$notice->setErrors($errors);
|
$notice->setErrors($errors);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
$len_caption = null;
|
||||||
|
if ($min_len) {
|
||||||
|
$len_caption = 'Minimum password length: '.$min_len.' characters.';
|
||||||
|
}
|
||||||
|
|
||||||
$form = new AphrontFormView();
|
$form = new AphrontFormView();
|
||||||
$form
|
$form
|
||||||
->setUser($user)
|
->setUser($user)
|
||||||
->appendChild(
|
->addHiddenInput('token', $token);
|
||||||
|
|
||||||
|
if (!$valid_token) {
|
||||||
|
$form->appendChild(
|
||||||
id(new AphrontFormPasswordControl())
|
id(new AphrontFormPasswordControl())
|
||||||
->setLabel('Old Password')
|
->setLabel('Old Password')
|
||||||
|
->setError($e_old)
|
||||||
->setName('old_pw'));
|
->setName('old_pw'));
|
||||||
|
}
|
||||||
|
|
||||||
$form
|
$form
|
||||||
->appendChild(
|
->appendChild(
|
||||||
id(new AphrontFormPasswordControl())
|
id(new AphrontFormPasswordControl())
|
||||||
->setLabel('New Password')
|
->setLabel('New Password')
|
||||||
|
->setError($e_new)
|
||||||
->setName('new_pw'));
|
->setName('new_pw'));
|
||||||
$form
|
$form
|
||||||
->appendChild(
|
->appendChild(
|
||||||
id(new AphrontFormPasswordControl())
|
id(new AphrontFormPasswordControl())
|
||||||
->setLabel('Confirm Password')
|
->setLabel('Confirm Password')
|
||||||
|
->setCaption($len_caption)
|
||||||
|
->setError($e_conf)
|
||||||
->setName('conf_pw'));
|
->setName('conf_pw'));
|
||||||
$form
|
$form
|
||||||
->appendChild(
|
->appendChild(
|
||||||
|
|
Loading…
Reference in a new issue