32 lines
1.2 KiB
Python
32 lines
1.2 KiB
Python
|
"""passbook 2FA Middleware to force users with 2FA set up to verify"""
|
||
|
|
||
|
from django.shortcuts import redirect
|
||
|
from django.urls import reverse
|
||
|
from django.utils.http import urlencode
|
||
|
from django_otp import user_has_device
|
||
|
|
||
|
|
||
|
def tfa_force_verify(get_response):
|
||
|
"""Middleware to force 2FA Verification"""
|
||
|
def middleware(request):
|
||
|
"""Middleware to force 2FA Verification"""
|
||
|
|
||
|
# pylint: disable=too-many-boolean-expressions
|
||
|
if request.user.is_authenticated and \
|
||
|
user_has_device(request.user) and \
|
||
|
not request.user.is_verified() and \
|
||
|
request.path != reverse('passbook_tfa:tfa-verify') and \
|
||
|
request.path != reverse('account-logout') and \
|
||
|
not request.META.get('HTTP_AUTHORIZATION', '').startswith('Bearer'):
|
||
|
# User has 2FA set up but is not verified
|
||
|
|
||
|
# At this point the request is already forwarded to the target destination
|
||
|
# So we just add the current request's path as next parameter
|
||
|
args = '?%s' % urlencode({'next': request.get_full_path()})
|
||
|
return redirect(reverse('passbook_tfa:tfa-verify') + args)
|
||
|
|
||
|
response = get_response(request)
|
||
|
return response
|
||
|
|
||
|
return middleware
|