Skip to content

Commit 99737c0

Browse files
akxpennersr
andauthored
Prepare for 0.12.0 (#204)
* Add migration management command from pennersr/django-allauth#3420 * Add minimal smoke test for management command * Bump version * Update changelog * Update readme --------- Co-authored-by: Raymond Penners <[email protected]>
1 parent 006e5f7 commit 99737c0

File tree

8 files changed

+107
-15
lines changed

8 files changed

+107
-15
lines changed

CHANGELOG.rst

+23-5
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,36 @@
33
Changelog
44
#########
55

6-
0.12.0 - Unreleased
7-
===================
6+
0.12.0 - January 2025
7+
=====================
8+
9+
Note
10+
----
11+
12+
This may be the last version of django-allauth-2fa under this stewardship;
13+
allauth contains its own ``allauth.mfa`` package that should be used instead
14+
for versions of Allauth >= 0.58.0. The dependency range for ``allauth`` in this
15+
version has been updated accordingly; this release will conflict with newer versions
16+
of ``allauth`` on purpose.
17+
18+
See https://github.com/valohai/django-allauth-2fa/issues/189 for discussion.
19+
20+
You can use the experimental ``allauth_2fa_migrate`` management command to create
21+
``allauth.mfa`` Authenticator objects from your ``allauth_2fa`` data before switching
22+
your production environment over to ``allauth.mfa``.
823

924
Possibly breaking changes
1025
-------------------------
1126

1227
* You can't write to `allauth_2fa.app_settings` variables anymore;
1328
instead modify the underlying `django.conf.settings` settings.
1429

15-
New features
16-
------------
17-
* Add flag to make the required entry of an otp code for device removal optional (#169)
30+
New features and fixes
31+
----------------------
32+
33+
* Add flag to make the required entry of an OTP code for device removal optional (#169)
34+
* Add setting to allow generating a different number of backup tokens (#192)
35+
* Potential bugfix for ``redirect_field_name`` AttributeError (#196)
1836

1937
0.11.1 - July 13, 2023
2038
======================

README.rst

+21-6
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,12 @@ Welcome to django-allauth-2fa!
1010
.. image:: https://readthedocs.org/projects/django-allauth-2fa/badge/?version=latest
1111
:target: https://django-allauth-2fa.readthedocs.io/
1212

13-
django-allauth-2fa adds `two-factor authentication`_ to `django-allauth`_.
13+
django-allauth-2fa adds `two-factor authentication`_ to
14+
versions of `django-allauth`_ older than 0.58.0.
15+
16+
For newer versions, you should use django-allauth's `built-in MFA support`_.
17+
Please see `issue #189`_ for more information.
18+
1419
django-allauth is a set of `Django`_ applications which help with
1520
authentication, registration, and other account management tasks.
1621

@@ -22,6 +27,8 @@ Documentation
2227
.. _two-factor authentication: https://en.wikipedia.org/wiki/Multi-factor_authentication
2328
.. _django-allauth: https://github.com/pennersr/django-allauth
2429
.. _Django: https://www.djangoproject.com/
30+
.. _built-in MFA support: https://docs.allauth.org/en/latest/mfa/introduction.html
31+
.. _issue #189: https://github.com/valohai/django-allauth-2fa/issues/189
2532

2633
Features
2734
--------
@@ -33,6 +40,12 @@ Features
3340
Compatibility
3441
-------------
3542

43+
django-allauth-2fa is _not_ compatible with django-allauth versions newer than
44+
0.58.0.
45+
46+
django-allauth has a built-in MFA implementation since version 0.56.0,
47+
which is likely preferable to this one.
48+
3649
django-allauth-2fa attempts to maintain compatibility with supported versions of
3750
Django, django-allauth, and django-otp.
3851

@@ -41,18 +54,20 @@ Current versions supported together is:
4154
======== ============== ============== ========================
4255
Django django-allauth django-otp Python
4356
======== ============== ============== ========================
44-
4.1 0.53.0 1.2 3.8, 3.9, 3.10, 3.11
45-
4.2 0.53.0 1.2 3.8, 3.9, 3.10, 3.11
57+
4.1 0.57.2 1.2 3.8, 3.9, 3.10, 3.11
58+
4.2 0.57.2 1.2 3.8, 3.9, 3.10, 3.11
4659
======== ============== ============== ========================
4760

4861
Contributing
4962
------------
5063

5164
django-allauth-2fa was initially created by
5265
`Víðir Valberg Guðmundsson (@valberg)`_, was maintained by
53-
`Percipient Networks`_ for many years, and is now maintained by
54-
`Valohai`_. Please feel free to contribute if you find
55-
django-allauth-2fa useful!
66+
`Percipient Networks`_ for many years, and finally by
67+
`Valohai`_.
68+
69+
Please feel free to contribute if you find django-allauth-2fa useful,
70+
but do note that you should likely be using allauth.mfa instead.
5671

5772
#. Check for open issues or open a fresh issue to start a discussion
5873
around a feature idea or a bug.

allauth_2fa/__init__.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
from __future__ import annotations
22

3-
__version__ = "0.11.0"
3+
__version__ = "0.12.0"

allauth_2fa/management/__init__.py

Whitespace-only changes.

allauth_2fa/management/commands/__init__.py

Whitespace-only changes.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
from __future__ import annotations
2+
3+
import base64
4+
5+
from allauth.mfa.adapter import get_adapter
6+
from allauth.mfa.models import Authenticator
7+
from django.core.management.base import BaseCommand
8+
from django_otp.plugins.otp_static.models import StaticDevice
9+
from django_otp.plugins.otp_totp.models import TOTPDevice
10+
11+
12+
class Command(BaseCommand):
13+
def handle(self, **options):
14+
adapter = get_adapter()
15+
authenticators = []
16+
for totp in TOTPDevice.objects.filter(confirmed=True).iterator():
17+
recovery_codes = set()
18+
for sdevice in StaticDevice.objects.filter(
19+
confirmed=True,
20+
user_id=totp.user_id,
21+
).iterator():
22+
recovery_codes.update(sdevice.token_set.values_list("token", flat=True))
23+
secret = base64.b32encode(bytes.fromhex(totp.key)).decode("ascii")
24+
totp_authenticator = Authenticator(
25+
user_id=totp.user_id,
26+
type=Authenticator.Type.TOTP,
27+
data={"secret": adapter.encrypt(secret)},
28+
)
29+
authenticators.append(totp_authenticator)
30+
authenticators.append(
31+
Authenticator(
32+
user_id=totp.user_id,
33+
type=Authenticator.Type.RECOVERY_CODES,
34+
data={
35+
"migrated_codes": [adapter.encrypt(c) for c in recovery_codes],
36+
},
37+
),
38+
)
39+
Authenticator.objects.bulk_create(authenticators)
40+
self.stdout.write(f"Created {len(authenticators)} Authenticators")

tests/settings.py

+1
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@
4646
# Enable allauth.
4747
"allauth",
4848
"allauth.account",
49+
"allauth.mfa", # For testing the migration.
4950
# Required to render the default template for 'account_login'.
5051
"allauth.socialaccount",
5152
# Configure the django-otp package.

tests/test_allauth_2fa.py

+21-3
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
from django.conf import settings
1010
from django.contrib.auth import get_user_model
1111
from django.contrib.auth.models import AbstractUser
12+
from django.core.management import call_command
1213
from django.forms import BaseForm
1314
from django.test import override_settings
1415
from django.urls import reverse
@@ -48,6 +49,13 @@ def pytest_generate_tests(metafunc):
4849
metafunc.parametrize("adapter", ADAPTER_CLASSES, indirect=True)
4950

5051

52+
def create_totp_and_static(user: AbstractUser) -> tuple[TOTPDevice, StaticDevice]:
53+
totp_model = user.totpdevice_set.create()
54+
static_model = user.staticdevice_set.create()
55+
static_model.token_set.create(token=StaticToken.random_token())
56+
return totp_model, static_model
57+
58+
5159
@pytest.fixture(autouse=True)
5260
def adapter(request, settings):
5361
settings.ACCOUNT_ADAPTER = request.param
@@ -65,9 +73,7 @@ def john() -> AbstractUser:
6573

6674
@pytest.fixture()
6775
def john_with_totp(john: AbstractUser) -> tuple[AbstractUser, TOTPDevice, StaticDevice]:
68-
totp_model = john.totpdevice_set.create()
69-
static_model = john.staticdevice_set.create()
70-
static_model.token_set.create(token=StaticToken.random_token())
76+
totp_model, static_model = create_totp_and_static(john)
7177
return john, totp_model, static_model
7278

7379

@@ -404,3 +410,15 @@ def test_view_missing_attribute(request, view_cls) -> None:
404410

405411
# Ensure the function doesn't fail when the attribute is missing.
406412
assert OTPAdapter().get_2fa_authenticate_url(request) is not None
413+
414+
415+
def test_migration_management_command():
416+
from allauth.mfa.models import Authenticator
417+
418+
for x in range(10):
419+
user = get_user_model().objects.create(username=f"user{x}")
420+
create_totp_and_static(user)
421+
call_command("allauth_2fa_migrate")
422+
auth_qs = Authenticator.objects
423+
assert auth_qs.filter(type=Authenticator.Type.RECOVERY_CODES).count() == 10
424+
assert auth_qs.filter(type=Authenticator.Type.TOTP).count() == 10

0 commit comments

Comments
 (0)