FIX: SSO code should respect IP address filters

This commit is contained in:
Robin Ward 2015-02-23 15:58:45 -05:00
parent d63aed69f7
commit ca5730018a
6 changed files with 33 additions and 15 deletions

View file

@ -273,7 +273,7 @@ class Admin::UsersController < Admin::AdminController
return render nothing: true, status: 404 unless SiteSetting.enable_sso
sso = DiscourseSingleSignOn.parse("sso=#{params[:sso]}&sig=#{params[:sig]}")
user = sso.lookup_or_create_user
user = sso.lookup_or_create_user(request.remote_ip)
render_serialized(user, AdminDetailedUserSerializer, root: false)
end

View file

@ -66,7 +66,8 @@ class SessionController < ApplicationController
sso.expire_nonce!
begin
if user = sso.lookup_or_create_user
if user = sso.lookup_or_create_user(request.remote_ip)
if SiteSetting.must_approve_users? && !user.approved?
render text: I18n.t("sso.account_not_approved"), status: 403
else
@ -145,8 +146,7 @@ class SessionController < ApplicationController
end
if ScreenedIpAddress.block_login?(user, request.remote_ip)
not_allowed_from_ip_address(user)
return
return not_allowed_from_ip_address(user)
end
(user.active && user.email_confirmed?) ? login(user) : not_activated(user)

View file

@ -42,13 +42,13 @@ class DiscourseSingleSignOn < SingleSignOn
"SSO_NONCE_#{nonce}"
end
def lookup_or_create_user
def lookup_or_create_user(ip_address)
sso_record = SingleSignOnRecord.find_by(external_id: external_id)
if sso_record && user = sso_record.user
sso_record.last_payload = unsigned_payload
else
user = match_email_or_create_user
user = match_email_or_create_user(ip_address)
sso_record = user.single_sign_on_record
end
@ -67,6 +67,7 @@ class DiscourseSingleSignOn < SingleSignOn
user.custom_fields[k] = v
end
user.ip_address = ip_address
user.admin = admin unless admin.nil?
user.moderator = moderator unless moderator.nil?
@ -79,16 +80,17 @@ class DiscourseSingleSignOn < SingleSignOn
private
def match_email_or_create_user
def match_email_or_create_user(ip_address)
user = User.find_by_email(email)
try_name = name.blank? ? nil : name
try_username = username.blank? ? nil : username
user_params = {
email: email,
name: User.suggest_name(try_name || try_username || email),
username: UserNameSuggester.suggest(try_username || try_name || email),
email: email,
name: User.suggest_name(try_name || try_username || email),
username: UserNameSuggester.suggest(try_username || try_name || email),
ip_address: ip_address
}
if user || user = User.create!(user_params)

View file

@ -499,7 +499,7 @@ describe Admin::UsersController do
sso.external_id = "1"
user = DiscourseSingleSignOn.parse(sso.payload)
.lookup_or_create_user
.lookup_or_create_user('127.0.0.1')
sso.name = "Bill"

View file

@ -67,6 +67,21 @@ describe SessionController do
expect(logged_on_user.single_sign_on_record.external_username).to eq('sam')
end
it 'respects IP restrictions' do
sso = get_sso('/a/')
sso.external_id = '666' # the number of the beast
sso.email = 'bob@bob.com'
sso.name = 'Sam Saffron'
sso.username = 'sam'
screened_ip = Fabricate(:screened_ip_address)
ActionDispatch::Request.any_instance.stubs(:remote_ip).returns(screened_ip.ip_address)
get :sso_login, Rack::Utils.parse_query(sso.payload)
logged_on_user = Discourse.current_user_provider.new(request.env).current_user
expect(logged_on_user).to eq(nil)
end
it 'allows you to create an admin account' do
sso = get_sso('/a/')
sso.external_id = '666' # the number of the beast
@ -409,7 +424,6 @@ describe SessionController do
context 'when admins are restricted by ip address' do
let(:permitted_ip_address) { '111.234.23.11' }
before do
Fabricate(:screened_ip_address, ip_address: permitted_ip_address, action_type: ScreenedIpAddress.actions[:allow_admin])
end

View file

@ -48,6 +48,8 @@ describe DiscourseSingleSignOn do
expect(sso.email).to eq "sam@sam.com"
end
let(:ip_address) { "127.0.0.1" }
it "can lookup or create user when name is blank" do
# so we can create system messages
Fabricate(:admin)
@ -56,7 +58,7 @@ describe DiscourseSingleSignOn do
sso.name = ""
sso.email = "test@test.com"
sso.external_id = "A"
user = sso.lookup_or_create_user
user = sso.lookup_or_create_user(ip_address)
expect(user).to_not be_nil
end
@ -123,7 +125,7 @@ describe DiscourseSingleSignOn do
it "deal with no avatar url passed for an existing user with an avatar" do
# Deliberately not setting avatar_url.
user = sso.lookup_or_create_user
user = sso.lookup_or_create_user(ip_address)
expect(user).to_not be_nil
end
@ -133,7 +135,7 @@ describe DiscourseSingleSignOn do
sso.avatar_url = "http://example.com/a_different_image.png"
sso.avatar_force_update = true
user = sso.lookup_or_create_user
user = sso.lookup_or_create_user(ip_address)
expect(user).to_not be_nil
end
end