Compare commits

..

30 Commits
0.9 ... v1.1.6

Author SHA1 Message Date
Mohamed ElKalioby
479a87456b Up 2 to 1.1.6 2019-03-24 16:34:46 +03:00
Mohamed El-Kalioby
f9f2d8c787 Merge pull request #2 from mahmoodnasr/master
Fixed A bug While Sending Emails Without MFA
2019-03-24 15:30:09 +02:00
Mahmood Nasr
3a9bfd79fa Fixed A bug While Sending Emails Without MFA 2019-03-24 16:22:11 +03:00
Mohamed El-Kalioby
c7e1de79e1 Merge pull request #1 from mahmoodnasr/master
User Model USERNAME_FIELD setted
2019-03-24 14:27:40 +02:00
Mahmood Nasr
dc9ac7895c User Model USERNAME_FIELD setted 2019-03-24 15:06:11 +03:00
Mohamed ElKalioby
82fd6f28bd Fixing model name 2019-03-19 12:58:58 +03:00
Mohamed El-Kalioby
9aafce4e00 Updated README.md 2019-03-15 14:11:33 +03:00
Mohamed ElKalioby
f2fa28a2d4 Allowing Session email address 2019-03-11 13:10:34 +03:00
Mohamed ElKalioby
c693007d62 Allowing Session email address 2019-03-11 13:07:05 +03:00
Mohamed El-Kalioby
e73bdef40a Update README.md 2019-02-11 11:59:07 +03:00
Mohamed El-Kalioby
5ff14d29d4 Update README.md 2019-01-28 10:19:58 +03:00
Mohamed El-Kalioby
166afeab36 Update README.md 2019-01-28 09:47:15 +03:00
Mohamed El-Kalioby
171270adfb Update README.md 2019-01-28 09:46:37 +03:00
Mohamed El-Kalioby
0fa8520e66 Trying Code Block 2019-01-26 00:12:20 +03:00
Mohamed El-Kalioby
6ccaec59bd Trying Code blick 2019-01-26 00:06:00 +03:00
Mohamed El-Kalioby
8c413083d5 Trying block code 2019-01-25 23:58:38 +03:00
Mohamed El-Kalioby
eb2095e650 change the mkdocs pat 2019-01-25 23:38:54 +03:00
Mohamed El-Kalioby
f89518e91d Adding mkdocs.yaml 2019-01-25 23:26:59 +03:00
Mohamed El-Kalioby
153be3a558 Adding more docs 2019-01-25 23:19:34 +03:00
Mohamed El-Kalioby
852c2d7e0c Adding Docs 2019-01-25 22:11:50 +03:00
Mohamed El-Kalioby
8fe3d4e496 Fixed Redirections, Removed the need for FIDO2_LOGIN_URL 2019-01-25 14:56:06 +03:00
Mohamed El-Kalioby
263a5e2b8c Fixing Setup file 2019-01-25 14:50:40 +03:00
Mohamed El-Kalioby
2af838bfd3 Updated README file 2019-01-24 19:44:24 +03:00
Mohamed ElKalioby
ce6a224818 New PyPi version 2019-01-23 16:16:28 +03:00
Mohamed El-Kalioby
5e699aa66a Added Image 2019-01-23 16:13:11 +03:00
Mohamed El-Kalioby
bed70d7c22 Update README.md 2019-01-23 16:00:21 +03:00
Mohamed ElKalioby
ad4ee7f4d2 Version 1 is released 2019-01-23 15:52:18 +03:00
Mohamed ElKalioby
7efd3ccc38 Finalzed Python 3 Support 2019-01-23 15:34:47 +03:00
Mohamed ElKalioby
6efd643022 Python3 Support 2019-01-23 10:42:50 +03:00
Mohamed El-Kalioby
b199c86993 Update README.md 2019-01-22 18:56:08 +03:00
19 changed files with 280 additions and 43 deletions

View File

@@ -1,12 +1,21 @@
# django-mfa2 # django-mfa2
A Django app that handles MFA, it supports TOTP, U2F, FIDO2 U2F (Web Authn), Email Tokens , and Trusted Devices A Django app that handles MFA, it supports TOTP, U2F, FIDO2 U2F (Web Authn), Email Tokens , and Trusted Devices
[![PyPI version](https://badge.fury.io/py/django-mfa2.svg)](https://badge.fury.io/py/django-mfa2)
For FIDO2, both security keys and android-safetynet are supported. Web Authencation API (WebAuthn) is state-of-the art techology that is expected to replace passwords.
![Andriod Fingerprint](https://cdn-images-1.medium.com/max/800/1*1FWkRE8D7NTA2Kn1DrPjPA.png)
For FIDO2, **security keys**, **Apple's Touch ID (Chrome)** and **android-safetynet** are supported.
In English :), It allows you to verify the user by security keys on PC, Laptops, Touch ID on Macboks (Chrome) and Fingerprint/PIN on Andriod Phones.
Trusted device is a mode for the user to add a device that doesn't support security keys like iOS and andriod without fingerprints or NFC. Trusted device is a mode for the user to add a device that doesn't support security keys like iOS and andriod without fingerprints or NFC.
`**Note**: U2F and FIDO2 can only be served under secure context (https)` **Note**: `U2F and FIDO2 can only be served under secure context (https)`
Package tested with Django 1.8, Django 2.1 on Python 2.7 and Python 3.5+ but it was not checked with any version in between but open for issues.
Depends on Depends on
@@ -37,11 +46,11 @@ Depends on
MFA_RECHECK_MAX=30 # Maximum in seconds MFA_RECHECK_MAX=30 # Maximum in seconds
MFA_QUICKLOGIN=True # Allow quick login for returning users by provide only their 2FA MFA_QUICKLOGIN=True # Allow quick login for returning users by provide only their 2FA
TOKEN_ISSUER_NAME="MDL" #TOTP Issuer name TOKEN_ISSUER_NAME="PROJECT_NAME" #TOTP Issuer name
U2F_APPID="https://localhost" #URL For U2F U2F_APPID="https://localhost" #URL For U2F
FIDO_SERVER_ID=u"localhost" # Server rp id for FIDO2 FIDO_SERVER_ID=u"localehost" # Server rp id for FIDO2, it the full domain of your project
FIDO_SERVER_NAME=u"MDL" FIDO_SERVER_NAME=u"PROJECT_NAME"
FIDO_LOGIN_URL=BASE_URL FIDO_LOGIN_URL=BASE_URL
``` ```
**Method Names** **Method Names**
@@ -51,6 +60,8 @@ Depends on
* Trusted_Devices * Trusted_Devices
* Email * Email
**Note**: Starting version 1.1, ~~FIDO_LOGIN_URL~~ isn't required for FIDO2 anymore.
1. Break your login function 1. Break your login function
Usually your login function will check for username and password, log the user in if the username and password are correct and create the user session, to support mfa, this has to change Usually your login function will check for username and password, log the user in if the username and password are correct and create the user session, to support mfa, this has to change
@@ -77,7 +88,7 @@ Depends on
import mfa.TrustedDevice import mfa.TrustedDevice
urls_patterns= [ urls_patterns= [
'...', '...',
url(r'^mfa/', include(mfa.urls)), url(r'^mfa/', include('mfa.urls')),
url(r'devices/add$', mfa.TrustedDevice.add,name="mfa_add_new_trusted_device"), # This short link to add new trusted device url(r'devices/add$', mfa.TrustedDevice.add,name="mfa_add_new_trusted_device"), # This short link to add new trusted device
'....', '....',
] ]
@@ -87,6 +98,47 @@ Depends on
If you will use Email Token method, then you have to provide template named `mfa_email_token_template.html` that will content the format of the email with parameter named `user` and `otp`. If you will use Email Token method, then you have to provide template named `mfa_email_token_template.html` that will content the format of the email with parameter named `user` and `otp`.
1. To match the look and feel of your project, MFA includes `base.html` but it needs blocks named `head` & `content` to added its content to it. 1. To match the look and feel of your project, MFA includes `base.html` but it needs blocks named `head` & `content` to added its content to it.
1. Somewhere in your app, add a link to 'mfa_home' 1. Somewhere in your app, add a link to 'mfa_home'
```<l><a href="{% url 'mfa_home' %}">Security</a> </l>``` ```<li><a href="{% url 'mfa_home' %}">Security</a> </li>```
For Example, See https://github.com/mkalioby/AutoDeploy/commit/5f1d94b1804e0aa33c79e9e8530ce849d9eb78cc in AutDeploy Project For Example, See https://github.com/mkalioby/AutoDeploy/commit/5f1d94b1804e0aa33c79e9e8530ce849d9eb78cc in AutDeploy Project
# Going Passwordless
To be able to go passwordless for returning users, create a cookie named 'base_username' containing username as shown in snippet below
```python
response = render(request, 'Dashboard.html', context))
if request.session.get("mfa",{}).get("verified",False) and getattr(settings,"MFA_QUICKLOGIN",False):
if request.session["mfa"]["method"]!="Trusted Device":
response.set_cookie("base_username", request.user.username, path="/",max_age = 15*24*60*60)
return response
```
Second, update the GET part of your login view
```python
if "mfa" in settings.INSTALLED_APPS and getattr(settings,"MFA_QUICKLOGIN",False) and request.COOKIES.get('base_username'):
username=request.COOKIES.get('base_username')
from mfa.helpers import has_mfa
res = has_mfa(username = username,request=request,)
if res: return res
## continue and return the form.
```
# Checking MFA on Client Side
Sometimes you like to verify that the user is still there so simple you can ask django-mfa2 to check that for you
```html
{% include 'mfa_check.html' %}
```
````js
function success_func() {
//logic if mfa check succeeds
}
function fail_func() {
//logic if mfa check fails
}
function some_func() {
recheck_mfa(success_func,fail_func,MUST_BE_MFA)
//MUST_BE_MFA true or false, if the user must has with MFA
}
````

23
docs/change_login.md Normal file
View File

@@ -0,0 +1,23 @@
# Change of login function
## Break your login function
Usually your login function will check for username and password, log the user in if the username and password are correct and create the user session, to support mfa, this has to change
* authenticate the user
* if username and password are correct , check if the user has mfa or not
* if user has mfa then redirect to mfa page
* if user doesn't have mfa then call your function to create the user session
<code>
def login(request): # this function handles the login form POST
user = auth.authenticate(username=username, password=password)
if user is not None: # if the user object exist
from mfa.helpers import has_mfa
res = has_mfa(username = username,request=request) # has_mfa returns false or HttpResponseRedirect
if res:
return res
return log_user_in(request,username=user.username)
#log_user_in is a function that handles creatung user session, it should be in the setting file as MFA_CALLBACK
</code>

36
docs/index.md Normal file
View File

@@ -0,0 +1,36 @@
# django-mfa2
A Django app that handles MFA, it supports TOTP, U2F, FIDO2 U2F (Web Authn), Email Tokens , and Trusted Devices
[![PyPI version](https://badge.fury.io/py/django-mfa2.svg)](https://badge.fury.io/py/django-mfa2)
Web Authencation API (WebAuthn) is state-of-the art techology that is expected to replace passwords.
![Andriod Fingerprint](https://cdn-images-1.medium.com/max/800/1*1FWkRE8D7NTA2Kn1DrPjPA.png)
For FIDO2, both security keys and android-safetynet are supported.
In English :), It allows you to verify the user by security keys on PC, Laptops and Fingerprint/PIN on Andriod Phones.
Trusted device is a mode for the user to add a device that doesn't support security keys like iOS and andriod without fingerprints or NFC.
**Note**: `U2F and FIDO2 can only be served under secure context (https)`
Package tested with Django 1.8, Django 2.1 on Python 2.7 and Python 3.5+ but it was not checked with any version in between but open for issues.
Depends on
* pyotp
* python-u2flib-server
* ua-parser
* user-agents
* python-jose
* fido2==0.5
# Example
For Example, See https://github.com/mkalioby/AutoDeploy/commit/5f1d94b1804e0aa33c79e9e8530ce849d9eb78cc in AutDeploy Project
# Table of Contents
* [Installation](installation.md)
* [Change Login Code](change_login.md)

58
docs/installation.md Normal file
View File

@@ -0,0 +1,58 @@
# Installation & Configuration
1. Install the package
```sh
pip install django-mfa2
```
1. in your settings.py add the application to your installed apps
```python
INSTALLED_APPS=(
'......',
'mfa',
'......')
```
1. Add the following settings to your file
```python
MFA_UNALLOWED_METHODS=() # Methods that shouldn't be allowed for the user
MFA_LOGIN_CALLBACK="" # A function that should be called by username to login the user in session
MFA_RECHECK=True # Allow random rechecking of the user
MFA_RECHECK_MIN=10 # Minimum interval in seconds
MFA_RECHECK_MAX=30 # Maximum in seconds
MFA_QUICKLOGIN=True # Allow quick login for returning users by provide only their 2FA
TOKEN_ISSUER_NAME="PROJECT_NAME" #TOTP Issuer name
U2F_APPID="https://localhost" #URL For U2
FIDO_SERVER_ID=u"localehost" # Server rp id for FIDO2, it the full domain of your project
FIDO_SERVER_NAME=u"PROJECT_NAME"
FIDO_LOGIN_URL=BASE_URL
```
**Method Names**
* U2F
* FIDO2
* TOTP
* Trusted_Devices
* Email
**Note**: Starting version 1.1, ~~FIDO_LOGIN_URL~~ isn't required for FIDO2 anymore.
1. Add mfa to urls.py
```python
import mfa
import mfa.TrustedDevice
urls_patterns= [
'...',
url(r'^mfa/', include('mfa.urls')),
url(r'devices/add$', mfa.TrustedDevice.add,name="mfa_add_new_trusted_device"), # This short link to add new trusted device
'....',
]
```
1. Provide `mfa_auth_base.html` in your templaes with block called 'head' and 'content'
The template will be included during the user login.
If you will use Email Token method, then you have to provide template named `mfa_email_token_template.html` that will content the format of the email with parameter named `user` and `otp`.
1. To match the look and feel of your project, MFA includes `base.html` but it needs blocks named `head` & `content` to added its content to it.
1. Somewhere in your app, add a link to 'mfa_home'
```<li><a href="{% url 'mfa_home' %}">Security</a> </li>```
Next, you need to [change your login code](change_login.md)

8
mfa/Common.py Normal file
View File

@@ -0,0 +1,8 @@
from django.conf import settings
from django.core.mail import EmailMessage
def send(to,subject,body):
From = "%s <%s>" % (settings.EMAIL_FROM, settings.EMAIL_HOST_USER)
email = EmailMessage(subject,body,From,to)
email.content_subtype = "html"
return email.send(False)

View File

@@ -5,19 +5,15 @@ from random import randint
from .models import * from .models import *
from django.template.context import RequestContext from django.template.context import RequestContext
from .views import login from .views import login
from .Common import send
def sendEmail(request,username,secret): def sendEmail(request,username,secret):
from django.contrib.auth import get_user_model from django.contrib.auth import get_user_model
User = get_user_model() User = get_user_model()
user=User.objects.get(username=username) key = getattr(User, 'USERNAME_FIELD', 'username')
print secret kwargs = {key: username}
user = User.objects.get(**kwargs)
res=render_to_response("mfa_email_token_template.html",{"request":request,"user":user,'otp':secret}) res=render_to_response("mfa_email_token_template.html",{"request":request,"user":user,'otp':secret})
from django.conf import settings return send([user.email],"OTP", res.content)
from django.core.mail import EmailMessage
From = "%s <%s>" % (settings.EMAIL_FROM, settings.EMAIL_HOST_USER)
email = EmailMessage("OTP",res.content,From,[user.email] )
email.content_subtype = "html"
return email.send(False)
def start(request): def start(request):
context = csrf(request) context = csrf(request)
@@ -34,7 +30,7 @@ def start(request):
context["invalid"] = True context["invalid"] = True
else: else:
request.session["email_secret"] = str(randint(0,100000)) request.session["email_secret"] = str(randint(0,100000))
if sendEmail(request, request.session["base_username"], request.session["email_secret"]): if sendEmail(request, request.user.username, request.session["email_secret"]):
context["sent"] = True context["sent"] = True
return render_to_response("Email/Add.html", context, context_instance=RequestContext(request)) return render_to_response("Email/Add.html", context, context_instance=RequestContext(request))
def auth(request): def auth(request):

View File

@@ -12,7 +12,7 @@ from django.conf import settings
from .models import * from .models import *
from fido2.utils import websafe_decode,websafe_encode from fido2.utils import websafe_decode,websafe_encode
from fido2.ctap2 import AttestedCredentialData from fido2.ctap2 import AttestedCredentialData
from views import login from .views import login
import datetime import datetime
from django.utils import timezone from django.utils import timezone
@@ -112,6 +112,6 @@ def authenticate_complete(request):
mfa["next_check"] = int((datetime.datetime.now()+ datetime.timedelta( mfa["next_check"] = int((datetime.datetime.now()+ datetime.timedelta(
seconds=random.randint(settings.MFA_RECHECK_MIN, settings.MFA_RECHECK_MAX))).strftime("%s")) seconds=random.randint(settings.MFA_RECHECK_MIN, settings.MFA_RECHECK_MAX))).strftime("%s"))
request.session["mfa"] = mfa request.session["mfa"] = mfa
login(request) res=login(request)
return HttpResponse(simplejson.dumps({'status':"OK","redirect":settings.FIDO_LOGIN_URL}),content_type="application/json") return HttpResponse(simplejson.dumps({'status':"OK","redirect":res["location"]}),content_type="application/json")
return HttpResponse(simplejson.dumps({'status': "err"}),content_type="application/json") return HttpResponse(simplejson.dumps({'status': "err"}),content_type="application/json")

View File

@@ -105,8 +105,13 @@ def start(request):
def send_email(request): def send_email(request):
body=render(request,"TrustedDevices/email.html",{}).content body=render(request,"TrustedDevices/email.html",{}).content
from Registry_app.Common import send from .Common import send
if send(request.user.email,"Add Trusted Device Link",body,delay=False): e=request.user.email
if e=="":
e=request.session.get("user",{}).get("email","")
if e=="":
res = "User has no email on the system."
elif send([e],"Add Trusted Device Link",body):
res="Sent Successfully" res="Sent Successfully"
else: else:
res="Error occured, please try again later." res="Error occured, please try again later."

View File

@@ -41,14 +41,14 @@ def validate(request,username):
import datetime, random import datetime, random
data = simplejson.loads(request.POST["response"]) data = simplejson.loads(request.POST["response"])
print "Checking Errors"
res= check_errors(request,data) res= check_errors(request,data)
if res!=True: if res!=True:
return res return res
print "Checking Challenge"
challenge = request.session.pop('_u2f_challenge_') challenge = request.session.pop('_u2f_challenge_')
device, c, t = complete_authentication(challenge, data, [settings.U2F_APPID]) device, c, t = complete_authentication(challenge, data, [settings.U2F_APPID])
print device
key=User_Keys.objects.get(username=username,properties__shas="$.device.publicKey=%s"%device["publicKey"]) key=User_Keys.objects.get(username=username,properties__shas="$.device.publicKey=%s"%device["publicKey"])
key.last_used=timezone.now() key.last_used=timezone.now()
key.save() key.save()

View File

@@ -1 +1,10 @@
import urls # @property
# def urls():
# import django
# if django.VERSION < (1, 9):
# from .mfa_urls import url_patterns
# return url_patterns, 'mfa', ''
# else:
# from .mfa_urls import url_patterns
# return url_patterns,'mfa'
#

4
mfa/apps.py Normal file
View File

@@ -0,0 +1,4 @@
from django.apps import AppConfig
class myAppNameConfig(AppConfig):
name = 'mfa'
verbose_name = 'A Much Better Name'

View File

@@ -1,8 +1,6 @@
import pyotp import pyotp
from .models import * from .models import *
import TrustedDevice from . import TrustedDevice, U2F, FIDO2, totp
import U2F, FIDO2
import totp
import simplejson import simplejson
from django.shortcuts import HttpResponse from django.shortcuts import HttpResponse
from mfa.views import verify,goto from mfa.views import verify,goto

View File

@@ -5,8 +5,13 @@ from django.db import models, migrations
import jsonfield.fields import jsonfield.fields
class Migration(migrations.Migration): def modify_json(apps, schema_editor):
from django.conf import settings
if "mysql" in settings.DATABASES.get("default", {}).get("engine", ""):
migrations.RunSQL("alter table mfa_user_keys modify column properties json;")
class Migration(migrations.Migration):
dependencies = [ dependencies = [
('mfa', '0004_user_keys_enabled'), ('mfa', '0004_user_keys_enabled'),
] ]
@@ -21,5 +26,5 @@ class Migration(migrations.Migration):
name='properties', name='properties',
field=jsonfield.fields.JSONField(null=True), field=jsonfield.fields.JSONField(null=True),
), ),
migrations.RunSQL("alter table mfa_user_keys modify column properties json;") migrations.RunPython(modify_json)
] ]

View File

@@ -2,8 +2,7 @@ from django.db import models
from jsonfield import JSONField from jsonfield import JSONField
from jose import jwt from jose import jwt
from django.conf import settings from django.conf import settings
from jsonLookup import hasLookup,shasLookup from jsonLookup import shasLookup
JSONField.register_lookup(hasLookup)
JSONField.register_lookup(shasLookup) JSONField.register_lookup(shasLookup)
class User_Keys(models.Model): class User_Keys(models.Model):
@@ -18,4 +17,9 @@ class User_Keys(models.Model):
if self.key_type == "Trusted Device" and self.properties.get("signature","") == "": if self.key_type == "Trusted Device" and self.properties.get("signature","") == "":
self.properties["signature"]= jwt.encode({"username": self.username, "key": self.properties["key"]}, settings.SECRET_KEY) self.properties["signature"]= jwt.encode({"username": self.username, "key": self.properties["key"]}, settings.SECRET_KEY)
super(User_Keys, self).save(force_insert=force_insert, force_update=force_update, using=using, update_fields=update_fields) super(User_Keys, self).save(force_insert=force_insert, force_update=force_update, using=using, update_fields=update_fields)
def __unicode__(self):
return "%s -- %s"%(self.username,self.key_type)
def __str__(self):
return self.__unicode__()
class Meta:
app_label='mfa'

View File

@@ -1,6 +1,7 @@
from django.conf.urls import url from django.conf.urls import url
from . import views,totp,U2F,TrustedDevice,helpers,FIDO2,Email
from . import views,totp,U2F,TrustedDevice,helpers,FIDO2,Email
app_name='mfa'
urlpatterns = [ urlpatterns = [
url(r'totp/start/', totp.start , name="start_new_otop"), url(r'totp/start/', totp.start , name="start_new_otop"),
url(r'totp/getToken', totp.getToken , name="get_new_otop"), url(r'totp/getToken', totp.getToken , name="get_new_otop"),

View File

@@ -1,11 +1,14 @@
from django.shortcuts import render,render_to_response from django.shortcuts import render,render_to_response
from django.http import HttpResponse,HttpResponseRedirect from django.http import HttpResponse,HttpResponseRedirect
from .models import * from .models import *
try:
from django.urls import reverse
except:
from django.core.urlresolvers import reverse from django.core.urlresolvers import reverse
from django.template.context_processors import csrf from django.template.context_processors import csrf
from django.template.context import RequestContext from django.template.context import RequestContext
from django.conf import settings from django.conf import settings
import TrustedDevice from . import TrustedDevice
from user_agents import parse from user_agents import parse
def index(request): def index(request):
keys=[] keys=[]
@@ -24,7 +27,7 @@ def verify(request,username):
#request.session["base_password"] = password #request.session["base_password"] = password
keys=User_Keys.objects.filter(username=username,enabled=1) keys=User_Keys.objects.filter(username=username,enabled=1)
methods=list(set([k.key_type for k in keys])) methods=list(set([k.key_type for k in keys]))
print methods
if "Trusted Device" in methods and not request.session.get("checked_trusted_device",False): if "Trusted Device" in methods and not request.session.get("checked_trusted_device",False):
if TrustedDevice.verify(request): if TrustedDevice.verify(request):
return login(request) return login(request)

8
mkdocs.yml Normal file
View File

@@ -0,0 +1,8 @@
site_name: MkLorum
nav:
- Home: index.md
- Installation: installation.md
- Code Changes: change_login.md
theme: readthedocs
markdown_extensions:
- fenced_code

2
setup.cfg Normal file
View File

@@ -0,0 +1,2 @@
[bdist_wheel]
universal = 1

View File

@@ -4,17 +4,19 @@ from setuptools import find_packages, setup
setup( setup(
name='django-mfa2', name='django-mfa2',
version='0.9.0', version='1.1.6',
description='Allows user to add 2FA to their accounts', description='Allows user to add 2FA to their accounts',
long_description=open("README.md").read(),
long_description_content_type="text/markdown",
author='Mohamed El-Kalioby', author='Mohamed El-Kalioby',
author_email = 'mkalioby@mkalioby.com', author_email = 'mkalioby@mkalioby.com',
url = 'https://github.com/mkalioby/django-mfa2/', url = 'https://github.com/mkalioby/django-mfa2/',
download_url='https://github.com/mkalioby/django-mfa2/', download_url='https://github.com/mkalioby/django-mfa2/',
license='MIT', license='MIT',
packages=find_packages(), packages=find_packages(),
install_requires=[ install_requires=[
'Django>=1.7', 'django >= 1.7',
'jsonfield', 'jsonfield',
'simplejson', 'simplejson',
'pyotp', 'pyotp',
@@ -22,9 +24,32 @@ setup(
'ua-parser', 'ua-parser',
'user-agents', 'user-agents',
'python-jose', 'python-jose',
'fido2==0.5' 'fido2 == 0.5',
'jsonLookup' 'jsonLookup'
], ],
python_requires=">=2.7, !=3.0.*, !=3.1.*, !=3.2.*, !=3.3.*",
include_package_data=True, include_package_data=True,
zip_safe=False, # because we're including static files zip_safe=False, # because we're including static files
classifiers=[
"Development Status :: 5 - Production/Stable",
"Environment :: Web Environment",
"Framework :: Django",
"Framework :: Django :: 1.7",
"Framework :: Django :: 1.8",
"Framework :: Django :: 1.9",
"Framework :: Django :: 1.10",
"Framework :: Django :: 1.11",
"Framework :: Django :: 2.0",
"Framework :: Django :: 2.1",
"Intended Audience :: Developers",
"Operating System :: OS Independent",
"Programming Language :: Python",
"Programming Language :: Python :: 2",
"Programming Language :: Python :: 2.7",
"Programming Language :: Python :: 3",
"Programming Language :: Python :: 3.4",
"Programming Language :: Python :: 3.5",
"Programming Language :: Python :: 3.6",
"Topic :: Software Development :: Libraries :: Python Modules",
]
) )