-
-
Notifications
You must be signed in to change notification settings - Fork 449
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
YubiKeys offer a OTP, similar to token generator application. The key is generated by a hardware device, generating a 44 character OTP, which is to be by YubiCloud (or locally if needed be).
- Loading branch information
Showing
9 changed files
with
218 additions
and
26 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -14,16 +14,14 @@ | |
from urllib import urlencode | ||
|
||
try: | ||
from unittest.mock import patch, Mock, ANY, call | ||
import unittest2 as unittest | ||
except ImportError: | ||
from mock import patch, Mock, ANY, call | ||
import unittest | ||
|
||
try: | ||
from django.contrib.auth import get_user_model | ||
from unittest.mock import patch, Mock, ANY, call | ||
except ImportError: | ||
from django.contrib.auth.models import User | ||
else: | ||
User = get_user_model() | ||
from mock import patch, Mock, ANY, call | ||
|
||
import django | ||
from django import forms | ||
|
@@ -35,10 +33,22 @@ | |
from django.test.utils import override_settings | ||
from django.utils import translation, six | ||
|
||
try: | ||
from django.contrib.auth import get_user_model | ||
except ImportError: | ||
from django.contrib.auth.models import User | ||
else: | ||
User = get_user_model() | ||
|
||
from django_otp import DEVICE_ID_SESSION_KEY, devices_for_user | ||
from django_otp.oath import totp | ||
from django_otp.util import random_hex | ||
|
||
try: | ||
from otp_yubikey.models import ValidationService, RemoteYubikeyDevice | ||
except ImportError: | ||
ValidationService = RemoteYubikeyDevice = None | ||
|
||
import qrcode.image.svg | ||
|
||
from two_factor.admin import patch_admin, unpatch_admin | ||
|
@@ -258,7 +268,7 @@ def test_setup_generator(self): | |
data={'setup_view-current_step': 'generator', | ||
'generator-token': '123456'}) | ||
self.assertEqual(response.context_data['wizard']['form'].errors, | ||
{'token': ['Please enter a valid token.']}) | ||
{'token': ['Entered token is not valid.']}) | ||
|
||
key = response.context_data['keys'].get('generator') | ||
bin_key = unhexlify(key.encode()) | ||
|
@@ -299,7 +309,7 @@ def test_setup_phone_call(self, fake): | |
response = self._post(data={'setup_view-current_step': 'validation', | ||
'validation-token': '666'}) | ||
self.assertEqual(response.context_data['wizard']['form'].errors, | ||
{'token': ['Entered token is not valid']}) | ||
{'token': ['Entered token is not valid.']}) | ||
|
||
# submitting correct token should finish the setup | ||
token = fake.return_value.make_call.call_args[1]['token'] | ||
|
@@ -336,7 +346,7 @@ def test_setup_phone_sms(self, fake): | |
response = self._post(data={'setup_view-current_step': 'validation', | ||
'validation-token': '666'}) | ||
self.assertEqual(response.context_data['wizard']['form'].errors, | ||
{'token': ['Entered token is not valid']}) | ||
{'token': ['Entered token is not valid.']}) | ||
|
||
# submitting correct token should finish the setup | ||
token = fake.return_value.send_sms.call_args[1]['token'] | ||
|
@@ -518,7 +528,7 @@ def test_setup(self, fake): | |
response = self._post({'phone_setup_view-current_step': 'validation', | ||
'validation-token': '123456'}) | ||
self.assertEqual(response.context_data['wizard']['form'].errors, | ||
{'token': ['Entered token is not valid']}) | ||
{'token': ['Entered token is not valid.']}) | ||
|
||
response = self._post({'phone_setup_view-current_step': 'validation', | ||
'validation-token': totp(device.bin_key)}) | ||
|
@@ -841,3 +851,67 @@ def test_status_mutiple(self): | |
call_command('status', '[email protected]', '[email protected]', stdout=stdout) | ||
self.assertEqual(stdout.getvalue(), '[email protected]: enabled\n' | ||
'[email protected]: disabled\n') | ||
|
||
|
||
@unittest.skipUnless(ValidationService, 'No YubiKey support') | ||
class YubiKeyTest(UserMixin, TestCase): | ||
@patch('otp_yubikey.models.RemoteYubikeyDevice.verify_token') | ||
def test_setup(self, verify_token): | ||
user = self.create_user() | ||
self.login_user() | ||
verify_token.return_value = [True, False] # only first try is valid | ||
|
||
# Should be able to select YubiKey method | ||
response = self.client.post(reverse('two_factor:setup'), | ||
data={'setup_view-current_step': 'welcome'}) | ||
self.assertContains(response, 'YubiKey') | ||
|
||
# Without ValidationService it won't work | ||
with self.assertRaisesMessage(KeyError, "No ValidationService found with name 'default'"): | ||
self.client.post(reverse('two_factor:setup'), | ||
data={'setup_view-current_step': 'method', | ||
'method-method': 'yubikey'}) | ||
|
||
# With a ValidationService, should be able to input a YubiKey | ||
ValidationService.objects.create(name='default', param_sl='', param_timeout='') | ||
|
||
response = self.client.post(reverse('two_factor:setup'), | ||
data={'setup_view-current_step': 'method', | ||
'method-method': 'yubikey'}) | ||
self.assertContains(response, 'YubiKey:') | ||
|
||
# Should call verify_token and create the device on finish | ||
token = 'jlvurcgekuiccfcvgdjffjldedjjgugk' | ||
response = self.client.post(reverse('two_factor:setup'), | ||
data={'setup_view-current_step': 'yubikey', | ||
'yubikey-token': token}) | ||
self.assertRedirects(response, reverse('two_factor:setup_complete')) | ||
verify_token.assert_called_with(token) | ||
|
||
yubikeys = user.remoteyubikeydevice_set.all() | ||
self.assertEqual(len(yubikeys), 1) | ||
self.assertEqual(yubikeys[0].name, 'default') | ||
|
||
@patch('otp_yubikey.models.RemoteYubikeyDevice.verify_token') | ||
def test_login(self, verify_token): | ||
user = self.create_user() | ||
verify_token.return_value = [True, False] # only first try is valid | ||
service = ValidationService.objects.create(name='default', param_sl='', param_timeout='') | ||
user.remoteyubikeydevice_set.create(service=service, name='default') | ||
|
||
# Input type should be text, not numbers like other tokens | ||
response = self.client.post(reverse('two_factor:login'), | ||
data={'auth-username': '[email protected]', | ||
'auth-password': 'secret', | ||
'login_view-current_step': 'auth'}) | ||
self.assertContains(response, 'YubiKey:') | ||
self.assertIsInstance(response.context_data['wizard']['form'].fields['otp_token'], | ||
forms.CharField) | ||
|
||
# Should call verify_token | ||
token = 'cjikftknbiktlitnbltbitdncgvrbgic' | ||
response = self.client.post(reverse('two_factor:login'), | ||
data={'token-otp_token': token, | ||
'login_view-current_step': 'token'}) | ||
self.assertRedirects(response, str(settings.LOGIN_REDIRECT_URL)) | ||
verify_token.assert_called_with(token) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.