mirror of
https://we.phorge.it/source/phorge.git
synced 2024-12-21 04:50:55 +01:00
Add bin/auth list-factors
and bin/auth strip
to remove multi-factor auth
Summary: Ref T4398. The major goals here is to let administrators strip auth factors in two cases: - A user lost their phone and needs access restored to their account; or - an install previously used an API-based factor like SMS, but want to stop supporting it (this isn't possible today). Test Plan: - Used `bin/auth list-factors` to show installed factors. - Used `bin/auth strip` with various mixtures of flags to selectively choose and strip factors from accounts. - Also ran `bin/auth refresh` to verify refreshing OAuth tokens works (small `OAuth` vs `OAuth2` tweak). Reviewers: btrahan Reviewed By: btrahan Subscribers: epriestley Maniphest Tasks: T4398 Differential Revision: https://secure.phabricator.com/D8909
This commit is contained in:
parent
d41416faf0
commit
535cfa3ebe
4 changed files with 198 additions and 2 deletions
|
@ -1219,8 +1219,10 @@ phutil_register_library_map(array(
|
||||||
'PhabricatorAuthListController' => 'applications/auth/controller/config/PhabricatorAuthListController.php',
|
'PhabricatorAuthListController' => 'applications/auth/controller/config/PhabricatorAuthListController.php',
|
||||||
'PhabricatorAuthLoginController' => 'applications/auth/controller/PhabricatorAuthLoginController.php',
|
'PhabricatorAuthLoginController' => 'applications/auth/controller/PhabricatorAuthLoginController.php',
|
||||||
'PhabricatorAuthManagementLDAPWorkflow' => 'applications/auth/management/PhabricatorAuthManagementLDAPWorkflow.php',
|
'PhabricatorAuthManagementLDAPWorkflow' => 'applications/auth/management/PhabricatorAuthManagementLDAPWorkflow.php',
|
||||||
|
'PhabricatorAuthManagementListFactorsWorkflow' => 'applications/auth/management/PhabricatorAuthManagementListFactorsWorkflow.php',
|
||||||
'PhabricatorAuthManagementRecoverWorkflow' => 'applications/auth/management/PhabricatorAuthManagementRecoverWorkflow.php',
|
'PhabricatorAuthManagementRecoverWorkflow' => 'applications/auth/management/PhabricatorAuthManagementRecoverWorkflow.php',
|
||||||
'PhabricatorAuthManagementRefreshWorkflow' => 'applications/auth/management/PhabricatorAuthManagementRefreshWorkflow.php',
|
'PhabricatorAuthManagementRefreshWorkflow' => 'applications/auth/management/PhabricatorAuthManagementRefreshWorkflow.php',
|
||||||
|
'PhabricatorAuthManagementStripWorkflow' => 'applications/auth/management/PhabricatorAuthManagementStripWorkflow.php',
|
||||||
'PhabricatorAuthManagementWorkflow' => 'applications/auth/management/PhabricatorAuthManagementWorkflow.php',
|
'PhabricatorAuthManagementWorkflow' => 'applications/auth/management/PhabricatorAuthManagementWorkflow.php',
|
||||||
'PhabricatorAuthNeedsApprovalController' => 'applications/auth/controller/PhabricatorAuthNeedsApprovalController.php',
|
'PhabricatorAuthNeedsApprovalController' => 'applications/auth/controller/PhabricatorAuthNeedsApprovalController.php',
|
||||||
'PhabricatorAuthNewController' => 'applications/auth/controller/config/PhabricatorAuthNewController.php',
|
'PhabricatorAuthNewController' => 'applications/auth/controller/config/PhabricatorAuthNewController.php',
|
||||||
|
@ -3982,8 +3984,10 @@ phutil_register_library_map(array(
|
||||||
'PhabricatorAuthListController' => 'PhabricatorAuthProviderConfigController',
|
'PhabricatorAuthListController' => 'PhabricatorAuthProviderConfigController',
|
||||||
'PhabricatorAuthLoginController' => 'PhabricatorAuthController',
|
'PhabricatorAuthLoginController' => 'PhabricatorAuthController',
|
||||||
'PhabricatorAuthManagementLDAPWorkflow' => 'PhabricatorAuthManagementWorkflow',
|
'PhabricatorAuthManagementLDAPWorkflow' => 'PhabricatorAuthManagementWorkflow',
|
||||||
|
'PhabricatorAuthManagementListFactorsWorkflow' => 'PhabricatorAuthManagementWorkflow',
|
||||||
'PhabricatorAuthManagementRecoverWorkflow' => 'PhabricatorAuthManagementWorkflow',
|
'PhabricatorAuthManagementRecoverWorkflow' => 'PhabricatorAuthManagementWorkflow',
|
||||||
'PhabricatorAuthManagementRefreshWorkflow' => 'PhabricatorAuthManagementWorkflow',
|
'PhabricatorAuthManagementRefreshWorkflow' => 'PhabricatorAuthManagementWorkflow',
|
||||||
|
'PhabricatorAuthManagementStripWorkflow' => 'PhabricatorAuthManagementWorkflow',
|
||||||
'PhabricatorAuthManagementWorkflow' => 'PhabricatorManagementWorkflow',
|
'PhabricatorAuthManagementWorkflow' => 'PhabricatorManagementWorkflow',
|
||||||
'PhabricatorAuthNeedsApprovalController' => 'PhabricatorAuthController',
|
'PhabricatorAuthNeedsApprovalController' => 'PhabricatorAuthController',
|
||||||
'PhabricatorAuthNewController' => 'PhabricatorAuthProviderConfigController',
|
'PhabricatorAuthNewController' => 'PhabricatorAuthProviderConfigController',
|
||||||
|
|
|
@ -0,0 +1,28 @@
|
||||||
|
<?php
|
||||||
|
|
||||||
|
final class PhabricatorAuthManagementListFactorsWorkflow
|
||||||
|
extends PhabricatorAuthManagementWorkflow {
|
||||||
|
|
||||||
|
protected function didConstruct() {
|
||||||
|
$this
|
||||||
|
->setName('list-factors')
|
||||||
|
->setExamples('**list-factors**')
|
||||||
|
->setSynopsis(pht('List available multi-factor authentication factors.'))
|
||||||
|
->setArguments(array());
|
||||||
|
}
|
||||||
|
|
||||||
|
public function execute(PhutilArgumentParser $args) {
|
||||||
|
$factors = PhabricatorAuthFactor::getAllFactors();
|
||||||
|
|
||||||
|
$console = PhutilConsole::getConsole();
|
||||||
|
foreach ($factors as $factor) {
|
||||||
|
$console->writeOut(
|
||||||
|
"%s\t%s\n",
|
||||||
|
$factor->getFactorKey(),
|
||||||
|
$factor->getFactorName());
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -96,10 +96,10 @@ final class PhabricatorAuthManagementRefreshWorkflow
|
||||||
}
|
}
|
||||||
|
|
||||||
$provider = $providers[$key];
|
$provider = $providers[$key];
|
||||||
if (!($provider instanceof PhabricatorAuthProviderOAuth)) {
|
if (!($provider instanceof PhabricatorAuthProviderOAuth2)) {
|
||||||
$console->writeOut(
|
$console->writeOut(
|
||||||
"> %s\n",
|
"> %s\n",
|
||||||
pht("Skipping, provider is not an OAuth provider."));
|
pht("Skipping, provider is not an OAuth2 provider."));
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,164 @@
|
||||||
|
<?php
|
||||||
|
|
||||||
|
final class PhabricatorAuthManagementStripWorkflow
|
||||||
|
extends PhabricatorAuthManagementWorkflow {
|
||||||
|
|
||||||
|
protected function didConstruct() {
|
||||||
|
$this
|
||||||
|
->setName('strip')
|
||||||
|
->setExamples('**strip** [--user username] [--type type]')
|
||||||
|
->setSynopsis(
|
||||||
|
pht(
|
||||||
|
'Remove multi-factor authentication from an account.'))
|
||||||
|
->setArguments(
|
||||||
|
array(
|
||||||
|
array(
|
||||||
|
'name' => 'user',
|
||||||
|
'param' => 'username',
|
||||||
|
'repeat' => true,
|
||||||
|
'help' => pht('Strip factors from specified users.'),
|
||||||
|
),
|
||||||
|
array(
|
||||||
|
'name' => 'all-users',
|
||||||
|
'help' => pht('Strip factors from all users.'),
|
||||||
|
),
|
||||||
|
array(
|
||||||
|
'name' => 'type',
|
||||||
|
'param' => 'factortype',
|
||||||
|
'repeat' => true,
|
||||||
|
'help' => pht('Strip a specific factor type.'),
|
||||||
|
),
|
||||||
|
array(
|
||||||
|
'name' => 'all-types',
|
||||||
|
'help' => pht('Strip all factors, regardless of type.'),
|
||||||
|
),
|
||||||
|
array(
|
||||||
|
'name' => 'force',
|
||||||
|
'help' => pht('Strip factors without prompting.'),
|
||||||
|
),
|
||||||
|
array(
|
||||||
|
'name' => 'dry-run',
|
||||||
|
'help' => pht('Show factors, but do not strip them.'),
|
||||||
|
),
|
||||||
|
));
|
||||||
|
}
|
||||||
|
|
||||||
|
public function execute(PhutilArgumentParser $args) {
|
||||||
|
$usernames = $args->getArg('user');
|
||||||
|
$all_users = $args->getArg('all-users');
|
||||||
|
|
||||||
|
if ($usernames && $all_users) {
|
||||||
|
throw new PhutilArgumentUsageException(
|
||||||
|
pht(
|
||||||
|
'Specify either specific users with --user, or all users with '.
|
||||||
|
'--all-users, but not both.'));
|
||||||
|
} else if (!$usernames && !$all_users) {
|
||||||
|
throw new PhutilArgumentUsageException(
|
||||||
|
pht(
|
||||||
|
'Use --user to specify which user to strip factors from, or '.
|
||||||
|
'--all-users to strip factors from all users.'));
|
||||||
|
} else if ($usernames) {
|
||||||
|
$users = id(new PhabricatorPeopleQuery())
|
||||||
|
->setViewer($this->getViewer())
|
||||||
|
->withUsernames($usernames)
|
||||||
|
->execute();
|
||||||
|
|
||||||
|
$users_by_username = mpull($users, null, 'getUsername');
|
||||||
|
foreach ($usernames as $username) {
|
||||||
|
if (empty($users_by_username[$username])) {
|
||||||
|
throw new PhutilArgumentUsageException(
|
||||||
|
pht(
|
||||||
|
'No user exists with username "%s".',
|
||||||
|
$username));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
$users = null;
|
||||||
|
}
|
||||||
|
|
||||||
|
$types = $args->getArg('type');
|
||||||
|
$all_types = $args->getArg('all-types');
|
||||||
|
if ($types && $all_types) {
|
||||||
|
throw new PhutilArgumentUsageException(
|
||||||
|
pht(
|
||||||
|
'Specify either specific factors with --type, or all factors with '.
|
||||||
|
'--all-types, but not both.'));
|
||||||
|
} else if (!$types && !$all_types) {
|
||||||
|
throw new PhutilArgumentUsageException(
|
||||||
|
pht(
|
||||||
|
'Use --type to specify which factor to strip, or --all-types to '.
|
||||||
|
'strip all factors. Use `auth list-factors` to show the available '.
|
||||||
|
'factor types.'));
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($users && $types) {
|
||||||
|
$factors = id(new PhabricatorAuthFactorConfig())->loadAllWhere(
|
||||||
|
'userPHID IN (%Ls) AND factorKey IN (%Ls)',
|
||||||
|
mpull($users, 'getPHID'),
|
||||||
|
$types);
|
||||||
|
} else if ($users) {
|
||||||
|
$factors = id(new PhabricatorAuthFactorConfig())->loadAllWhere(
|
||||||
|
'userPHID IN (%Ls)',
|
||||||
|
mpull($users, 'getPHID'));
|
||||||
|
} else if ($types) {
|
||||||
|
$factors = id(new PhabricatorAuthFactorConfig())->loadAllWhere(
|
||||||
|
'factorKey IN (%Ls)',
|
||||||
|
$types);
|
||||||
|
} else {
|
||||||
|
$factors = id(new PhabricatorAuthFactorConfig())->loadAll();
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!$factors) {
|
||||||
|
throw new PhutilArgumentUsageException(
|
||||||
|
pht('There are no matching factors to strip.'));
|
||||||
|
}
|
||||||
|
|
||||||
|
$handles = id(new PhabricatorHandleQuery())
|
||||||
|
->setViewer($this->getViewer())
|
||||||
|
->withPHIDs(mpull($factors, 'getUserPHID'))
|
||||||
|
->execute();
|
||||||
|
|
||||||
|
$console = PhutilConsole::getConsole();
|
||||||
|
|
||||||
|
$console->writeOut("%s\n\n", pht("These auth factors will be stripped:"));
|
||||||
|
|
||||||
|
foreach ($factors as $factor) {
|
||||||
|
$impl = $factor->getImplementation();
|
||||||
|
$console->writeOut(
|
||||||
|
" %s\t%s\t%s\n",
|
||||||
|
$handles[$factor->getUserPHID()]->getName(),
|
||||||
|
$factor->getFactorKey(),
|
||||||
|
($impl
|
||||||
|
? $impl->getFactorName()
|
||||||
|
: '?'));
|
||||||
|
}
|
||||||
|
|
||||||
|
$is_dry_run = $args->getArg('dry-run');
|
||||||
|
if ($is_dry_run) {
|
||||||
|
$console->writeOut(
|
||||||
|
"\n%s\n",
|
||||||
|
pht('End of dry run.'));
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
$force = $args->getArg('force');
|
||||||
|
if (!$force) {
|
||||||
|
if (!$console->confirm(pht('Strip these authentication factors?'))) {
|
||||||
|
throw new PhutilArgumentUsageException(
|
||||||
|
pht('User aborted the workflow.'));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
$console->writeOut("%s\n", pht('Stripping authentication factors...'));
|
||||||
|
|
||||||
|
foreach ($factors as $factor) {
|
||||||
|
$factor->delete();
|
||||||
|
}
|
||||||
|
|
||||||
|
$console->writeOut("%s\n", pht('Done.'));
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
Loading…
Reference in a new issue