mirror of
https://gerrit.wikimedia.org/r/mediawiki/extensions/OATHAuth
synced 2024-12-18 11:00:35 +00:00
4fee32d2f3
Bug: T242031 Change-Id: I4d4922b9e17d9272e59d6a8af3cb4e2acd48dd9f
50 lines
1.6 KiB
PHP
50 lines
1.6 KiB
PHP
<?php
|
|
|
|
use MediaWiki\Extension\OATHAuth\OATHAuthServices;
|
|
use MediaWiki\MediaWikiServices;
|
|
use MediaWiki\Session\SessionManager;
|
|
|
|
if ( getenv( 'MW_INSTALL_PATH' ) ) {
|
|
$IP = getenv( 'MW_INSTALL_PATH' );
|
|
} else {
|
|
$IP = __DIR__ . '/../../..';
|
|
}
|
|
require_once "$IP/maintenance/Maintenance.php";
|
|
|
|
class DisableOATHAuthForUser extends Maintenance {
|
|
public function __construct() {
|
|
parent::__construct();
|
|
$this->addDescription( 'Remove OATHAuth from a specific user' );
|
|
$this->addArg( 'user', 'The username to remove OATHAuth from.' );
|
|
$this->requireExtension( 'OATHAuth' );
|
|
}
|
|
|
|
public function execute() {
|
|
$username = $this->getArg( 0 );
|
|
|
|
$user = MediaWikiServices::getInstance()->getUserFactory()
|
|
->newFromName( $username );
|
|
if ( $user === null || $user->getId() === 0 ) {
|
|
$this->fatalError( "User $username doesn't exist!" );
|
|
}
|
|
|
|
$repo = OATHAuthServices::getInstance()->getUserRepository();
|
|
$oathUser = $repo->findByUser( $user );
|
|
if ( !$oathUser->isTwoFactorAuthEnabled() ) {
|
|
$this->fatalError( "User $username doesn't have OATHAuth enabled!" );
|
|
}
|
|
|
|
$repo->remove( $oathUser, 'Maintenance script', false );
|
|
// Kill all existing sessions.
|
|
// If this request to disable 2FA was social-engineered by an attacker,
|
|
// the legitimate user will hopefully log in again to the wiki, and notice that the second factor
|
|
// is missing or different, and alert the operators.
|
|
SessionManager::singleton()->invalidateSessionsForUser( $user );
|
|
|
|
$this->output( "OATHAuth disabled for $username.\n" );
|
|
}
|
|
}
|
|
|
|
$maintClass = DisableOATHAuthForUser::class;
|
|
require_once RUN_MAINTENANCE_IF_MAIN;
|