check admins' two-factor requirements in the disable API as well
Signed-off-by: Nicola Murino <nicola.murino@gmail.com>
This commit is contained in:
parent
9a6a65931e
commit
76ffa107dd
2 changed files with 31 additions and 0 deletions
|
@ -100,6 +100,13 @@ func disableAdmin2FA(w http.ResponseWriter, r *http.Request) {
|
||||||
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
if admin.Username == claims.Username {
|
||||||
|
if admin.Filters.RequireTwoFactor {
|
||||||
|
err := util.NewValidationError("two-factor authentication must be enabled")
|
||||||
|
sendAPIResponse(w, r, err, "", getRespStatus(err))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
admin.Filters.RecoveryCodes = nil
|
admin.Filters.RecoveryCodes = nil
|
||||||
admin.Filters.TOTPConfig = dataprovider.AdminTOTPConfig{
|
admin.Filters.TOTPConfig = dataprovider.AdminTOTPConfig{
|
||||||
Enabled: false,
|
Enabled: false,
|
||||||
|
|
|
@ -3689,6 +3689,30 @@ func TestAdminTwoFactorRequirements(t *testing.T) {
|
||||||
assert.Contains(t, string(bodyResp), "two-factor authentication must be enabled")
|
assert.Contains(t, string(bodyResp), "two-factor authentication must be enabled")
|
||||||
err = resp.Body.Close()
|
err = resp.Body.Close()
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
// try to disable 2FA using the dedicated API
|
||||||
|
req, err = http.NewRequest(http.MethodPut, fmt.Sprintf("%v%v", httpBaseURL, path.Join(adminPath, altAdminUsername, "2fa", "disable")), nil)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
setBearerForReq(req, token)
|
||||||
|
resp, err = httpclient.GetHTTPClient().Do(req)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Equal(t, http.StatusBadRequest, resp.StatusCode)
|
||||||
|
bodyResp, err = io.ReadAll(resp.Body)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.Contains(t, string(bodyResp), "two-factor authentication must be enabled")
|
||||||
|
err = resp.Body.Close()
|
||||||
|
assert.NoError(t, err)
|
||||||
|
// disabling 2FA using another admin should work
|
||||||
|
token, err = getJWTAPITokenFromTestServer(defaultTokenAuthUser, defaultTokenAuthPass)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
req, err = http.NewRequest(http.MethodPut, path.Join(adminPath, altAdminUsername, "2fa", "disable"), nil)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
setBearerForReq(req, token)
|
||||||
|
rr = executeRequest(req)
|
||||||
|
checkResponseCode(t, http.StatusOK, rr)
|
||||||
|
// check
|
||||||
|
admin, _, err = httpdtest.GetAdminByUsername(altAdminUsername, http.StatusOK)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.False(t, admin.Filters.TOTPConfig.Enabled)
|
||||||
|
|
||||||
_, err = httpdtest.RemoveAdmin(admin, http.StatusOK)
|
_, err = httpdtest.RemoveAdmin(admin, http.StatusOK)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
|
Loading…
Reference in a new issue