Skip to content

Commit 5147ff2

Browse files
authored
chore: remove 2fa conditionals (#15142)
1 parent 5261657 commit 5147ff2

File tree

3 files changed

+19
-58
lines changed

3 files changed

+19
-58
lines changed

tests/unit/accounts/test_security_policy.py

-30
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@
2121

2222
from warehouse.accounts import security_policy
2323
from warehouse.accounts.interfaces import IUserService
24-
from warehouse.admin.flags import AdminFlagValue
2524
from warehouse.utils.security_policy import AuthenticationMethod
2625

2726

@@ -602,32 +601,10 @@ def test_permits_with_unverified_email(self, monkeypatch, policy_class):
602601
policy = policy_class()
603602
assert not policy.permits(request, context, "myperm")
604603

605-
# TODO: remove this test when we remove the conditional
606-
def test_permits_manage_projects_without_2fa_for_older_users(
607-
self, monkeypatch, policy_class
608-
):
609-
monkeypatch.setattr(security_policy, "User", pretend.stub)
610-
611-
request = pretend.stub(
612-
flags=pretend.stub(enabled=lambda flag: False),
613-
identity=pretend.stub(
614-
__principals__=lambda: ["user:5"],
615-
has_primary_verified_email=True,
616-
has_two_factor=False,
617-
date_joined=datetime(2019, 1, 1),
618-
),
619-
matched_route=pretend.stub(name="manage.projects"),
620-
)
621-
context = pretend.stub(__acl__=[(Allow, "user:5", "myperm")])
622-
623-
policy = policy_class()
624-
assert policy.permits(request, context, "myperm")
625-
626604
def test_permits_manage_projects_with_2fa(self, monkeypatch, policy_class):
627605
monkeypatch.setattr(security_policy, "User", pretend.stub)
628606

629607
request = pretend.stub(
630-
flags=pretend.stub(enabled=pretend.call_recorder(lambda *a: True)),
631608
identity=pretend.stub(
632609
__principals__=lambda: ["user:5"],
633610
has_primary_verified_email=True,
@@ -640,9 +617,6 @@ def test_permits_manage_projects_with_2fa(self, monkeypatch, policy_class):
640617

641618
policy = policy_class()
642619
assert policy.permits(request, context, "myperm")
643-
assert request.flags.enabled.calls == [
644-
pretend.call(AdminFlagValue.TWOFA_REQUIRED_EVERYWHERE)
645-
]
646620

647621
def test_deny_manage_projects_without_2fa(self, monkeypatch, policy_class):
648622
monkeypatch.setattr(security_policy, "User", pretend.stub)
@@ -697,7 +671,6 @@ def test_permits_2fa_routes_without_2fa(
697671
monkeypatch.setattr(security_policy, "User", pretend.stub)
698672

699673
request = pretend.stub(
700-
flags=pretend.stub(enabled=pretend.call_recorder(lambda *a: False)),
701674
identity=pretend.stub(
702675
__principals__=lambda: ["user:5"],
703676
has_primary_verified_email=True,
@@ -711,6 +684,3 @@ def test_permits_2fa_routes_without_2fa(
711684

712685
policy = policy_class()
713686
assert policy.permits(request, context, "myperm")
714-
assert request.flags.enabled.calls == [
715-
pretend.call(AdminFlagValue.TWOFA_REQUIRED_EVERYWHERE)
716-
]

warehouse/accounts/security_policy.py

+19-27
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@
2424

2525
from warehouse.accounts.interfaces import IPasswordBreachedService, IUserService
2626
from warehouse.accounts.models import DisableReason, User
27-
from warehouse.admin.flags import AdminFlagValue
2827
from warehouse.cache.http import add_vary_callback
2928
from warehouse.email import send_password_compromised_email_hibp
3029
from warehouse.errors import (
@@ -293,33 +292,26 @@ def _check_for_mfa(request, context) -> WarehouseDenied | None:
293292
"manage.account.webauthn-provision",
294293
]
295294

296-
# If flag is active, require 2FA for management and upload.
297-
if request.flags.enabled(AdminFlagValue.TWOFA_REQUIRED_EVERYWHERE) or (
298-
# Start enforcement from 2023-08-08, but we should remove this check
299-
# at the end of 2023.
300-
request.identity.date_joined
301-
and request.identity.date_joined > datetime.datetime(2023, 8, 8)
295+
if (
296+
request.matched_route.name.startswith("manage")
297+
and request.matched_route.name != "manage.account"
298+
and not any(
299+
request.matched_route.name.startswith(route) for route in _exempt_routes
300+
)
301+
and not request.identity.has_two_factor
302302
):
303-
if (
304-
request.matched_route.name.startswith("manage")
305-
and request.matched_route.name != "manage.account"
306-
and not any(
307-
request.matched_route.name.startswith(route) for route in _exempt_routes
308-
)
309-
and not request.identity.has_two_factor
310-
):
311-
return WarehouseDenied(
312-
"You must enable two factor authentication to manage other settings",
313-
reason="manage_2fa_required",
314-
)
303+
return WarehouseDenied(
304+
"You must enable two factor authentication to manage other settings",
305+
reason="manage_2fa_required",
306+
)
315307

316-
if (
317-
request.matched_route.name == "forklift.legacy.file_upload"
318-
and not request.identity.has_two_factor
319-
):
320-
return WarehouseDenied(
321-
"You must enable two factor authentication to upload",
322-
reason="upload_2fa_required",
323-
)
308+
if (
309+
request.matched_route.name == "forklift.legacy.file_upload"
310+
and not request.identity.has_two_factor
311+
):
312+
return WarehouseDenied(
313+
"You must enable two factor authentication to upload",
314+
reason="upload_2fa_required",
315+
)
324316

325317
return None

warehouse/admin/flags.py

-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,6 @@ class AdminFlagValue(enum.Enum):
2828
DISALLOW_GITHUB_OIDC = "disallow-github-oidc"
2929
DISALLOW_GOOGLE_OIDC = "disallow-google-oidc"
3030
READ_ONLY = "read-only"
31-
TWOFA_REQUIRED_EVERYWHERE = "2fa-required"
3231

3332

3433
class AdminFlag(db.ModelBase):

0 commit comments

Comments
 (0)