Skip to content
Snippets Groups Projects
Commit a150a956 authored by Piotr Gawron's avatar Piotr Gawron
Browse files

Merge branch '358-enforce-2fa' into 'master'

add setting and middleware to enforce 2fa #358

Closes #358

See merge request NCER-PD/scheduling-system!278
parents 4cddafc2 81982e39
No related branches found
No related tags found
1 merge request!278add setting and middleware to enforce 2fa #358
Pipeline #34513 passed
......@@ -9,6 +9,7 @@ smasch (1.0.0~alpha.1-0) unstable; urgency=low
(#285)
* small improvement: all configuration options that are not obligatory are
moved to configuration panel (#343)
* small improvement: 2FA can be configured to be required option (#358)
-- Piotr Gawron <piotr.gawron@uni.lu> Tue, 10 Nov 2020 14:00:00 +0200
......
......@@ -76,3 +76,7 @@ LOGGING = {
}
TWO_FACTOR_SMS_GATEWAY = "web.nexmo_gateway.Nexmo"
# whether 2 steps authentication is mandatory to access the system
FORCE_2FA = True
import logging
logger = logging.getLogger(__name__)
import logging
from django.contrib import messages
from django.shortcuts import redirect
logger = logging.getLogger(__name__)
class Force2FAMiddleware:
"""
Middleware restricting access to users with 2 factors authentication enabled
Redirects to 2fa section if not enabled
"""
def __init__(self, get_response):
self.get_response = get_response
def __call__(self, request):
"""
If user is authenticated and user is not verified (2fa not enabled) and we are in one of the 2fa setting pages
we redirect to the 2fa profile page
"""
if request.user.is_authenticated and not request.user.is_verified() and 'two_factor' not in request.path:
messages.add_message(request, messages.WARNING,
'2 factors authentication must be enabled to use this system')
return redirect('two_factor:profile')
return self.get_response(request)
......@@ -24,6 +24,9 @@ WSGI_APPLICATION = 'smash.wsgi.application'
SERVE_STATIC = False
# whether 2 steps authentication is mandatory to access the system
FORCE_2FA = False
# Application definition
INSTALLED_APPS = [
......@@ -145,3 +148,5 @@ from .local_settings import *
if not SERVE_STATIC:
MIDDLEWARE.remove('whitenoise.middleware.WhiteNoiseMiddleware')
if FORCE_2FA:
MIDDLEWARE.append('smash.middleware.force_2fa_middleware.Force2FAMiddleware')
# coding=utf-8
from unittest.mock import Mock
from django.http import HttpResponseRedirect
from django.test import TestCase
from smash.middleware.force_2fa_middleware import Force2FAMiddleware
NOT_REDIRECTED = "Not redirected"
class TestForce2FAMiddleware(TestCase):
def setUp(self):
self.middleware = Force2FAMiddleware(lambda x: NOT_REDIRECTED)
def test_verified(self):
"""
if user verified and we don't redirect
"""
request = Mock()
request.session = {}
request.user = Mock()
request.path = 'subjects'
request.user.is_authenticated = True
request.user.is_verified = lambda: True
result = self.middleware(request)
self.assertEqual(result, NOT_REDIRECTED)
def test_not_verified(self):
"""
if user not verified and not in 2fa section, we redirect to 2fa section
"""
request = Mock()
request.session = {}
request.user = Mock()
request.path = 'subjects'
request.user.is_authenticated = True
request.user.is_verified = lambda: False
result = self.middleware(request)
self.assertTrue(isinstance(result, HttpResponseRedirect))
self.assertEqual(result.url, '/account/two_factor/')
def test_not_verified_2fa_section(self):
"""
if user not verified but in 2fa section, we don't redirect
"""
request = Mock()
request.session = {}
request.user = Mock()
request.path = 'two_factor'
request.user.is_authenticated = True
request.user.is_verified = lambda: False
result = self.middleware(request)
self.assertEqual(result, NOT_REDIRECTED)
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment