def test_owner_can_set_2fa_single_member(self): org = self.create_organization(owner=self.owner) TotpInterface().enroll(self.owner) with self.options({"system.url-prefix": "http://example.com"}), self.tasks(): self.assert_can_enable_org_2fa(org, self.owner) assert len(mail.outbox) == 0
def test_flow_verify_and_link_without_password_need_2fa(self, email): assert not self.user.has_usable_password() self.create_member(organization=self.organization, user=self.user) TotpInterface().enroll(self.user) resp = self.client.post(self.path, {"init": True}) assert resp.status_code == 200 assert self.provider.TEMPLATE in resp.content.decode("utf-8") resp = self.client.post(self.auth_sso_path, {"email": "*****@*****.**"}) self.assertTemplateUsed(resp, "sentry/auth-confirm-account.html") assert resp.status_code == 200 assert resp.context["existing_user"] == self.user path = reverse( "sentry-idp-email-verification", args=[email.call_args.kwargs["context"]["verification_key"]], ) resp = self.client.get(path) assert resp.templates[0].name == "sentry/idp_account_verified.html" assert resp.status_code == 200 path = reverse("sentry-auth-organization", args=[self.organization.slug]) resp = self.client.post(path, follow=True) assert resp.redirect_chain == [ (reverse("sentry-2fa-dialog"), 302), ]
def test_org_requires_2fa_with_enrolled_user(self): self.org_require_2fa() user = self.create_user() self.create_member(user=user, organization=self.org, role="member") TotpInterface().enroll(user) assert self.has_object_perm("GET", self.org, user=user)
def test_require_2fa__delete_with_multiple_auth__ok(self, email_log): self._require_2fa_for_organization() new_options = settings.SENTRY_OPTIONS.copy() new_options["sms.twilio-account"] = "twilio-account" with self.settings(SENTRY_OPTIONS=new_options): # enroll in two auth methods interface = SmsInterface() interface.phone_number = "5551231234" interface.enroll(self.user) interface = TotpInterface() interface.enroll(self.user) auth = interface.authenticator url = reverse( "sentry-api-0-user-authenticator-details", kwargs={"user_id": self.user.id, "auth_id": auth.id}, ) resp = self.client.delete(url, format="json") assert resp.status_code == 204, (resp.status_code, resp.content) assert not Authenticator.objects.filter(id=auth.id).exists() self._assert_security_email_sent("mfa-removed", email_log)
def test_member_disable_all_2fa_blocked(self): TotpInterface().enroll(self.no_2fa_user) self.login_as(self.no_2fa_user) self.get_success_response(self.org_2fa.slug) Authenticator.objects.get(user=self.no_2fa_user).delete() self.assert_redirected_to_2fa()
def setUp(self): # 2FA enforced org self.org_2fa = self.create_organization(owner=self.create_user()) self.enable_org_2fa(self.org_2fa) self.no_2fa_user = self.create_user() self.create_member(organization=self.org_2fa, user=self.no_2fa_user, role="member") # 2FA not enforced org self.owner = self.create_user() self.organization = self.create_organization(owner=self.owner) self.manager = self.create_user() self.create_member(organization=self.organization, user=self.manager, role="manager") self.org_user = self.create_user() self.create_member(organization=self.organization, user=self.org_user, role="member") # 2FA enrolled user self.has_2fa = self.create_user() TotpInterface().enroll(self.has_2fa) self.create_member(organization=self.organization, user=self.has_2fa, role="manager") assert Authenticator.objects.user_has_2fa(self.has_2fa)
def test_member_disable_all_2fa_blocked(self): TotpInterface().enroll(self.no_2fa_user) self.login_as(self.no_2fa_user) self.assert_can_access_org_home() Authenticator.objects.get(user=self.no_2fa_user).delete() self.assert_redirected_to_2fa()
def test_new_member_must_enable_2fa(self): new_user = self.create_user() self.create_member(organization=self.org_2fa, user=new_user, role="member") self.login_as(new_user) self.get_error_response(self.org_2fa.slug, status_code=401) TotpInterface().enroll(new_user) self.get_success_response(self.org_2fa.slug)
def test_new_member_must_enable_2fa(self): new_user = self.create_user() self.create_member(organization=self.org_2fa, user=new_user, role="member") self.login_as(new_user) self.assert_cannot_access_org_details(self.path) TotpInterface().enroll(new_user) self.assert_can_access_org_details(self.path)
def test_member_disable_all_2fa_blocked(self): TotpInterface().enroll(self.no_2fa_user) self.login_as(self.no_2fa_user) self.get_success_response(self.org_2fa.slug) Authenticator.objects.get(user=self.no_2fa_user).delete() self.get_error_response(self.org_2fa.slug, status_code=401)
def test_cannot_reset_member_2fa__org_requires_2fa(self): self.login_as(self.owner) TotpInterface().enroll(self.owner) self.org.update(flags=F("flags").bitor(Organization.flags.require_2fa)) assert self.org.flags.require_2fa.is_set is True self.assert_cannot_remove_authenticators()
def test_member_disable_all_2fa_blocked(self): TotpInterface().enroll(self.no_2fa_user) self.login_as(self.no_2fa_user) self.assert_can_access_org_details(self.path) Authenticator.objects.get(user=self.no_2fa_user).delete() self.assert_cannot_access_org_details(self.path)
def test_new_member_must_enable_2fa(self): new_user = self.create_user() self.create_member(organization=self.org_2fa, user=new_user, role="member") self.login_as(new_user) self.assert_redirected_to_2fa() TotpInterface().enroll(new_user) self.get_success_response(self.org_2fa.slug)
def test_manager_can_set_2fa(self): org = self.create_organization(owner=self.owner) self.create_member(organization=org, user=self.manager, role="manager") self.assert_cannot_enable_org_2fa(org, self.manager, 400) TotpInterface().enroll(self.manager) with self.options({"system.url-prefix": "http://example.com"}), self.tasks(): self.assert_can_enable_org_2fa(org, self.manager) self.assert_2fa_email_equal(mail.outbox, [self.owner.email])
def _create_user_and_member(self, has_2fa=False, has_user_email=True, has_member_email=False): user = self._create_user(has_email=has_user_email) if has_2fa: TotpInterface().enroll(user) if has_member_email: email = uuid4().hex member = self.create_member(organization=self.org, user=user, email=email) else: member = self.create_member(organization=self.org, user=user) return user, member
def test_bulk_users_have_2fa(self): user1 = self.create_user("*****@*****.**") user2 = self.create_user("*****@*****.**") TotpInterface().enroll(user1) assert Authenticator.objects.bulk_users_have_2fa([user1.id, user2.id, 9999]) == { user1.id: True, user2.id: False, 9999: False, }
def add_2fa_users_to_org(self, organization, num_of_users=10, num_with_2fa=5): non_compliant_members = [] for num in range(0, num_of_users): user = self.create_user("*****@*****.**" % num) self.create_member(organization=organization, user=user) if num_with_2fa: TotpInterface().enroll(user) num_with_2fa -= 1 else: non_compliant_members.append(user.email) return non_compliant_members
def test_correct_redirect_as_2fa_user_no_membership(self): user = self.create_user("*****@*****.**") RecoveryCodeInterface().enroll(user) TotpInterface().enroll(user) resp = self.client.post( self.path, {"username": user, "password": "******", "op": "login"}, follow=True ) assert resp.redirect_chain == [("/auth/2fa/", 302)]
def setUp(self): self.owner = self.create_user() self.org = self.create_organization(owner=self.owner) self.member = self.create_user() self.member_om = self.create_member( organization=self.org, user=self.member, role="member", teams=[] ) self.login_as(self.member) totp = TotpInterface() totp.enroll(self.member) self.interface_id = totp.authenticator.id assert Authenticator.objects.filter(user=self.member).exists()
def test_user_has_2fa(self): user = self.create_user("*****@*****.**") assert Authenticator.objects.user_has_2fa(user) is False assert Authenticator.objects.filter(user=user).count() == 0 RecoveryCodeInterface().enroll(user) assert Authenticator.objects.user_has_2fa(user) is False assert Authenticator.objects.filter(user=user).count() == 1 TotpInterface().enroll(user) assert Authenticator.objects.user_has_2fa(user) is True assert Authenticator.objects.filter(user=user).count() == 2
def test_get_authenticator_details(self): interface = TotpInterface() interface.enroll(self.user) auth = interface.authenticator resp = self.get_success_response(self.user.id, auth.id) assert resp.data["isEnrolled"] assert resp.data["id"] == "totp" assert resp.data["authId"] == str(auth.id) # should not have these because enrollment assert "totp_secret" not in resp.data assert "form" not in resp.data assert "qrcode" not in resp.data
def test_owner_can_set_org_2fa(self): org = self.create_organization(owner=self.owner) TotpInterface().enroll(self.owner) user_emails_without_2fa = self.add_2fa_users_to_org(org) with self.options({"system.url-prefix": "http://example.com"}), self.tasks(): self.assert_can_enable_org_2fa(org, self.owner) self.assert_2fa_email_equal(mail.outbox, user_emails_without_2fa) mail.outbox = [] with self.options({"system.url-prefix": "http://example.com"}), self.tasks(): response = self.api_disable_org_2fa(org, self.owner) assert response.status_code == 200 assert not Organization.objects.get(id=org.id).flags.require_2fa assert len(mail.outbox) == 0
def test_correct_redirect_as_2fa_user_invited_member(self): user = self.create_user("*****@*****.**") RecoveryCodeInterface().enroll(user) TotpInterface().enroll(user) self.create_member(organization=self.organization, user=user) member = OrganizationMember.objects.get(organization=self.organization, user=user) member.email = "*****@*****.**" member.save() resp = self.client.post( self.path, {"username": user, "password": "******", "op": "login"}, follow=True ) assert resp.redirect_chain == [("/auth/2fa/", 302)]
def test_list_all_authenticators(self): user = self.create_user(email="*****@*****.**", is_superuser=True) self.login_as(user=user, superuser=True) url = reverse("sentry-api-0-user-authenticator-index", kwargs={"user_id": "me"}) resp = self.client.get(url, format="json") assert resp.status_code == 200 interface = [i for i in resp.data if i["id"] == "totp"][0] assert not interface["isEnrolled"] # Enroll in Totp - should still be listed TotpInterface().enroll(user) resp = self.client.get(url, format="json") assert resp.status_code == 200 interface = [i for i in resp.data if i["id"] == "totp"][0] assert interface["isEnrolled"]
def test_login_valid_credentials_2fa_redirect(self): user = self.create_user("*****@*****.**") RecoveryCodeInterface().enroll(user) TotpInterface().enroll(user) self.create_member(organization=self.organization, user=user) self.client.get(self.path) resp = self.client.post( self.path, { "username": user.username, "password": "******", "op": "login" }, ) assert resp.url == "/auth/2fa/" assert resp.status_code == 302
def test_require_2fa__cannot_delete_last_auth(self): self._require_2fa_for_organization() # enroll in one auth method interface = TotpInterface() interface.enroll(self.user) auth = interface.authenticator with self.tasks(): resp = self.get_error_response(self.user.id, auth.id, method="delete", status_code=403) assert b"requires 2FA" in resp.content assert Authenticator.objects.filter(id=auth.id).exists() assert len(mail.outbox) == 0
def test_require_2fa__can_delete_last_auth_superuser(self): self._require_2fa_for_organization() superuser = self.create_user(email="*****@*****.**", is_superuser=True) self.login_as(user=superuser, superuser=True) # enroll in one auth method interface = TotpInterface() interface.enroll(self.user) auth = interface.authenticator with self.tasks(): self.get_success_response(self.user.id, auth.id, method="delete", status_code=204) assert_security_email_sent("mfa-removed") assert not Authenticator.objects.filter(id=auth.id).exists()
def test_get_authenticator_details(self): interface = TotpInterface() interface.enroll(self.user) auth = interface.authenticator url = reverse( "sentry-api-0-user-authenticator-details", kwargs={"user_id": self.user.id, "auth_id": auth.id}, ) resp = self.client.get(url) assert resp.status_code == 200 assert resp.data["isEnrolled"] assert resp.data["id"] == "totp" assert resp.data["authId"] == six.text_type(auth.id) # should not have these because enrollment assert "totp_secret" not in resp.data assert "form" not in resp.data assert "qrcode" not in resp.data
def test_require_2fa__cannot_delete_last_auth(self, email_log): self._require_2fa_for_organization() # enroll in one auth method interface = TotpInterface() interface.enroll(self.user) auth = interface.authenticator url = reverse( "sentry-api-0-user-authenticator-details", kwargs={"user_id": self.user.id, "auth_id": auth.id}, ) resp = self.client.delete(url, format="json") assert resp.status_code == 403, (resp.status_code, resp.content) assert b"requires 2FA" in resp.content assert Authenticator.objects.filter(id=auth.id).exists() assert email_log.info.call_count == 0
def test_require_2fa__delete_with_multiple_auth__ok(self): self._require_2fa_for_organization() new_options = settings.SENTRY_OPTIONS.copy() new_options["sms.twilio-account"] = "twilio-account" with self.settings(SENTRY_OPTIONS=new_options): # enroll in two auth methods interface = SmsInterface() interface.phone_number = "5551231234" interface.enroll(self.user) interface = TotpInterface() interface.enroll(self.user) auth = interface.authenticator with self.tasks(): self.get_success_response(self.user.id, auth.id, method="delete") assert not Authenticator.objects.filter(id=auth.id).exists() assert_security_email_sent("mfa-removed")