mirror of
https://gerrit.wikimedia.org/r/mediawiki/extensions/OATHAuth
synced 2024-12-02 20:06:22 +00:00
Merge "Fix disabling TOTP keys with scratch tokens" into REL1_42
This commit is contained in:
commit
8afe7f91c7
|
@ -189,11 +189,9 @@ class TOTPKey implements IAuthKey {
|
||||||
'clientip' => $clientIP,
|
'clientip' => $clientIP,
|
||||||
] );
|
] );
|
||||||
|
|
||||||
$userRepo = OATHAuthServices::getInstance()->getUserRepository();
|
OATHAuthServices::getInstance()
|
||||||
// TODO: support for multiple keys
|
->getUserRepository()
|
||||||
$user->setKeys( [ $this ] );
|
->updateKey( $user, $this );
|
||||||
$userRepo->persist( $user, $clientIP );
|
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -194,6 +194,35 @@ class OATHUserRepository implements LoggerAwareInterface {
|
||||||
return $key;
|
return $key;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Saves an existing key in the database.
|
||||||
|
*
|
||||||
|
* @param OATHUser $user
|
||||||
|
* @param IAuthKey $key
|
||||||
|
* @return void
|
||||||
|
*/
|
||||||
|
public function updateKey( OATHUser $user, IAuthKey $key ): void {
|
||||||
|
$keyId = $key->getId();
|
||||||
|
if ( !$keyId ) {
|
||||||
|
throw new InvalidArgumentException( 'updateKey() can only be used with already existing keys' );
|
||||||
|
}
|
||||||
|
|
||||||
|
$userId = $this->centralIdLookupFactory->getLookup()
|
||||||
|
->centralIdFromLocalUser( $user->getUser() );
|
||||||
|
|
||||||
|
$dbw = $this->dbProvider->getPrimaryDatabase( 'virtual-oathauth' );
|
||||||
|
$dbw->newUpdateQueryBuilder()
|
||||||
|
->table( 'oathauth_devices' )
|
||||||
|
->set( [ 'oad_data' => FormatJson::encode( $key->jsonSerialize() ) ] )
|
||||||
|
->where( [ 'oad_user' => $userId, 'oad_id' => $keyId ] )
|
||||||
|
->execute();
|
||||||
|
|
||||||
|
$this->logger->info( 'OATHAuth key {keyId} updated for {user}', [
|
||||||
|
'keyId' => $keyId,
|
||||||
|
'user' => $user->getUser()->getName(),
|
||||||
|
] );
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @param OATHUser $user
|
* @param OATHUser $user
|
||||||
* @param IAuthKey $key
|
* @param IAuthKey $key
|
||||||
|
|
104
tests/phpunit/integration/HTMLForm/TOTPDisableFormTest.php
Normal file
104
tests/phpunit/integration/HTMLForm/TOTPDisableFormTest.php
Normal file
|
@ -0,0 +1,104 @@
|
||||||
|
<?php
|
||||||
|
/**
|
||||||
|
* This program is free software; you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License as published by
|
||||||
|
* the Free Software Foundation; either version 2 of the License, or
|
||||||
|
* (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License along
|
||||||
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
||||||
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
||||||
|
* http://www.gnu.org/copyleft/gpl.html
|
||||||
|
*
|
||||||
|
* @file
|
||||||
|
*/
|
||||||
|
|
||||||
|
namespace MediaWiki\Extension\OATHAuth\Tests\Integration\HTMLForm;
|
||||||
|
|
||||||
|
use Base32\Base32;
|
||||||
|
use jakobo\HOTP\HOTP;
|
||||||
|
use MediaWiki\Context\RequestContext;
|
||||||
|
use MediaWiki\Extension\OATHAuth\HTMLForm\TOTPDisableForm;
|
||||||
|
use MediaWiki\Extension\OATHAuth\Key\TOTPKey;
|
||||||
|
use MediaWiki\Extension\OATHAuth\OATHAuthServices;
|
||||||
|
use MediaWikiIntegrationTestCase;
|
||||||
|
use Wikimedia\TestingAccessWrapper;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author Taavi Väänänen <hi@taavi.wtf>
|
||||||
|
* @group Database
|
||||||
|
* @coversDefaultClass \MediaWiki\Extension\OATHAuth\HTMLForm\TOTPDisableForm
|
||||||
|
*/
|
||||||
|
class TOTPDisableFormTest extends MediaWikiIntegrationTestCase {
|
||||||
|
/**
|
||||||
|
* @return array
|
||||||
|
* @phan-return array{0:TOTPDisableForm,1:TOTPKey,2:MediaWiki\Extension\OATHAuth\OATHUser}
|
||||||
|
*/
|
||||||
|
private function setupFormAndKey(): array {
|
||||||
|
$user = $this->getTestUser()->getUser();
|
||||||
|
$repository = OATHAuthServices::getInstance( $this->getServiceContainer() )
|
||||||
|
->getUserRepository();
|
||||||
|
$oathUser = $repository->findByUser( $user );
|
||||||
|
$module = OATHAuthServices::getInstance( $this->getServiceContainer() )
|
||||||
|
->getModuleRegistry()
|
||||||
|
->getModuleByKey( 'totp' );
|
||||||
|
|
||||||
|
$key = $repository->createKey(
|
||||||
|
$oathUser,
|
||||||
|
$module,
|
||||||
|
TOTPKey::newFromRandom()->jsonSerialize(),
|
||||||
|
'127.0.0.1'
|
||||||
|
);
|
||||||
|
|
||||||
|
$form = new TOTPDisableForm(
|
||||||
|
$oathUser,
|
||||||
|
$repository,
|
||||||
|
$module,
|
||||||
|
RequestContext::getMain(),
|
||||||
|
);
|
||||||
|
|
||||||
|
return [ $form, $key, $oathUser ];
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @covers ::onSubmit
|
||||||
|
*/
|
||||||
|
public function testSubmitInvalidCode(): void {
|
||||||
|
[ $form ] = $this->setupFormAndKey();
|
||||||
|
$this->assertEquals(
|
||||||
|
[ 'oathauth-failedtovalidateoath' ],
|
||||||
|
$form->onSubmit( [ 'token' => 'wrong' ] ),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @covers ::onSubmit
|
||||||
|
*/
|
||||||
|
public function testSubmitCorrectToken(): void {
|
||||||
|
[ $form, $key, $oathUser ] = $this->setupFormAndKey();
|
||||||
|
|
||||||
|
$secret = TestingAccessWrapper::newFromObject( $key )->secret;
|
||||||
|
$correctToken = HOTP::generateByTime(
|
||||||
|
Base32::decode( $secret['secret'] ),
|
||||||
|
$secret['period'],
|
||||||
|
)->toHOTP( 6 );
|
||||||
|
|
||||||
|
$this->assertTrue( $form->onSubmit( [ 'token' => $correctToken ] ) );
|
||||||
|
$this->assertEquals( [], $oathUser->getKeys() );
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @covers ::onSubmit
|
||||||
|
*/
|
||||||
|
public function testSubmitScratchToken(): void {
|
||||||
|
[ $form, $key, $oathUser ] = $this->setupFormAndKey();
|
||||||
|
|
||||||
|
$this->assertTrue( $form->onSubmit( [ 'token' => $key->getScratchTokens()[0] ] ) );
|
||||||
|
$this->assertEquals( [], $oathUser->getKeys() );
|
||||||
|
}
|
||||||
|
}
|
|
@ -29,6 +29,7 @@ use MediaWiki\User\CentralId\CentralIdLookupFactory;
|
||||||
use MediaWikiIntegrationTestCase;
|
use MediaWikiIntegrationTestCase;
|
||||||
use Psr\Log\LoggerInterface;
|
use Psr\Log\LoggerInterface;
|
||||||
use Wikimedia\Rdbms\IConnectionProvider;
|
use Wikimedia\Rdbms\IConnectionProvider;
|
||||||
|
use Wikimedia\TestingAccessWrapper;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author Taavi Väänänen <hi@taavi.wtf>
|
* @author Taavi Väänänen <hi@taavi.wtf>
|
||||||
|
@ -39,6 +40,7 @@ class OATHUserRepositoryTest extends MediaWikiIntegrationTestCase {
|
||||||
/**
|
/**
|
||||||
* @covers ::findByUser
|
* @covers ::findByUser
|
||||||
* @covers ::createKey
|
* @covers ::createKey
|
||||||
|
* @covers ::updateKey
|
||||||
* @covers ::remove
|
* @covers ::remove
|
||||||
*/
|
*/
|
||||||
public function testLookupCreateRemoveKey(): void {
|
public function testLookupCreateRemoveKey(): void {
|
||||||
|
@ -73,6 +75,7 @@ class OATHUserRepositoryTest extends MediaWikiIntegrationTestCase {
|
||||||
$this->assertEquals( [], $oathUser->getKeys() );
|
$this->assertEquals( [], $oathUser->getKeys() );
|
||||||
$this->assertNull( $oathUser->getModule() );
|
$this->assertNull( $oathUser->getModule() );
|
||||||
|
|
||||||
|
/** @var TOTPKey $key */
|
||||||
$key = $repository->createKey(
|
$key = $repository->createKey(
|
||||||
$oathUser,
|
$oathUser,
|
||||||
$module,
|
$module,
|
||||||
|
@ -93,6 +96,15 @@ class OATHUserRepositoryTest extends MediaWikiIntegrationTestCase {
|
||||||
// Test looking it up again from the database
|
// Test looking it up again from the database
|
||||||
$this->assertArrayEquals( [ $key ], $repository->findByUser( $user )->getKeys() );
|
$this->assertArrayEquals( [ $key ], $repository->findByUser( $user )->getKeys() );
|
||||||
|
|
||||||
|
// Use a scratch code, which causes the key to be updated.
|
||||||
|
TestingAccessWrapper::newFromObject( $key )->recoveryCodes = [ 'new scratch tokens' ];
|
||||||
|
$repository->updateKey( $oathUser, $key );
|
||||||
|
|
||||||
|
$this->assertEquals(
|
||||||
|
[ 'new scratch tokens' ],
|
||||||
|
$repository->findByUser( $user )->getKeys()[0]->getScratchTokens()
|
||||||
|
);
|
||||||
|
|
||||||
$repository->removeKey(
|
$repository->removeKey(
|
||||||
$oathUser,
|
$oathUser,
|
||||||
$key,
|
$key,
|
||||||
|
|
Loading…
Reference in a new issue