auth(2fa): block setup after enable to avoid secret reissue
All checks were successful
CI / test (push) Successful in 43s
All checks were successful
CI / test (push) Successful in 43s
This commit is contained in:
@@ -260,6 +260,8 @@ def get_access_session_info(token: str) -> tuple[str, datetime] | None:
|
|||||||
|
|
||||||
async def setup_twofa(db: AsyncSession, user: User) -> tuple[str, str]:
|
async def setup_twofa(db: AsyncSession, user: User) -> tuple[str, str]:
|
||||||
if user.twofa_enabled and user.twofa_secret:
|
if user.twofa_enabled and user.twofa_secret:
|
||||||
|
raise HTTPException(status_code=status.HTTP_400_BAD_REQUEST, detail="2FA is already enabled")
|
||||||
|
if user.twofa_secret:
|
||||||
secret = user.twofa_secret
|
secret = user.twofa_secret
|
||||||
else:
|
else:
|
||||||
secret = generate_totp_secret()
|
secret = generate_totp_secret()
|
||||||
|
|||||||
@@ -553,6 +553,8 @@ Response:
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
|
If 2FA is already enabled for the account, returns `400` (`"2FA is already enabled"`).
|
||||||
|
|
||||||
### POST `/api/v1/auth/2fa/enable`
|
### POST `/api/v1/auth/2fa/enable`
|
||||||
|
|
||||||
Auth required.
|
Auth required.
|
||||||
|
|||||||
@@ -38,7 +38,7 @@ Legend:
|
|||||||
29. Archive - `DONE`
|
29. Archive - `DONE`
|
||||||
30. Blacklist - `DONE`
|
30. Blacklist - `DONE`
|
||||||
31. Privacy - `PARTIAL` (avatar/last-seen/group-invites + PM policy `everyone|contacts|nobody`; policy behavior covered by integration tests, remaining UX/matrix hardening)
|
31. Privacy - `PARTIAL` (avatar/last-seen/group-invites + PM policy `everyone|contacts|nobody`; policy behavior covered by integration tests, remaining UX/matrix hardening)
|
||||||
32. Security - `PARTIAL` (sessions + revoke + 2FA base + access-session visibility; revoke-all now force-disconnects active realtime sessions; UX/TOTP recovery flow ongoing)
|
32. Security - `PARTIAL` (sessions + revoke + 2FA base + access-session visibility; revoke-all now force-disconnects active realtime sessions; 2FA setup now blocked after enable to prevent secret re-issuance; UX/TOTP recovery flow ongoing)
|
||||||
33. Realtime Events - `DONE` (connect/disconnect/send/receive/typing/read/delivered/online/offline + chat/message updates)
|
33. Realtime Events - `DONE` (connect/disconnect/send/receive/typing/read/delivered/online/offline + chat/message updates)
|
||||||
34. Sync - `PARTIAL` (cross-device via backend state + realtime; reconciliation improved for loaded chats/messages, chat-info panel now hot-refreshes on `chat_updated`)
|
34. Sync - `PARTIAL` (cross-device via backend state + realtime; reconciliation improved for loaded chats/messages, chat-info panel now hot-refreshes on `chat_updated`)
|
||||||
35. Additional - `PARTIAL` (drafts/link preview partial/autoload media basic)
|
35. Additional - `PARTIAL` (drafts/link preview partial/autoload media basic)
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
from sqlalchemy import select
|
from sqlalchemy import select
|
||||||
|
|
||||||
from app.auth.models import EmailVerificationToken
|
from app.auth.models import EmailVerificationToken
|
||||||
|
from app.utils.totp import _totp_code
|
||||||
|
|
||||||
|
|
||||||
async def test_register_verify_login_and_me(client, db_session):
|
async def test_register_verify_login_and_me(client, db_session):
|
||||||
@@ -115,3 +116,35 @@ async def test_revoke_all_sessions_invalidates_access_and_refresh(client, db_ses
|
|||||||
|
|
||||||
refresh_response = await client.post("/api/v1/auth/refresh", json={"refresh_token": refresh_token})
|
refresh_response = await client.post("/api/v1/auth/refresh", json={"refresh_token": refresh_token})
|
||||||
assert refresh_response.status_code == 401
|
assert refresh_response.status_code == 401
|
||||||
|
|
||||||
|
|
||||||
|
async def test_twofa_setup_is_blocked_when_already_enabled(client, db_session):
|
||||||
|
payload = {
|
||||||
|
"email": "dana@example.com",
|
||||||
|
"name": "Dana",
|
||||||
|
"username": "dana",
|
||||||
|
"password": "strongpass123",
|
||||||
|
}
|
||||||
|
await client.post("/api/v1/auth/register", json=payload)
|
||||||
|
token_row = await db_session.execute(select(EmailVerificationToken).order_by(EmailVerificationToken.id.desc()))
|
||||||
|
verify_token = token_row.scalar_one().token
|
||||||
|
await client.post("/api/v1/auth/verify-email", json={"token": verify_token})
|
||||||
|
|
||||||
|
login_response = await client.post(
|
||||||
|
"/api/v1/auth/login",
|
||||||
|
json={"email": payload["email"], "password": payload["password"]},
|
||||||
|
)
|
||||||
|
assert login_response.status_code == 200
|
||||||
|
access_token = login_response.json()["access_token"]
|
||||||
|
headers = {"Authorization": f"Bearer {access_token}"}
|
||||||
|
|
||||||
|
setup_response = await client.post("/api/v1/auth/2fa/setup", headers=headers)
|
||||||
|
assert setup_response.status_code == 200
|
||||||
|
secret = setup_response.json()["secret"]
|
||||||
|
code = _totp_code(secret)
|
||||||
|
|
||||||
|
enable_response = await client.post("/api/v1/auth/2fa/enable", headers=headers, json={"code": code})
|
||||||
|
assert enable_response.status_code == 200
|
||||||
|
|
||||||
|
setup_again_response = await client.post("/api/v1/auth/2fa/setup", headers=headers)
|
||||||
|
assert setup_again_response.status_code == 400
|
||||||
|
|||||||
Reference in New Issue
Block a user