auth: Handle SSO_APPEND_DOMAIN in remote_user SSO for mobile.

Apparently, while the main code path through
login_or_register_remote_user was correctly calling
remote_user_to_email(username) to get a proper email address for
situations where auth username != email (i.e. when SSO_APPEND_DOMAIN
is set), we neglected to do so in the mobile_flow_otp corner case.

Fixes #11005.
This commit is contained in:
Tim Abbott 2018-12-10 10:33:52 -08:00
parent 8f0ccdf1c9
commit a1d99adce7
2 changed files with 50 additions and 6 deletions

View File

@ -1911,7 +1911,7 @@ class TestZulipRemoteUserBackend(ZulipTestCase):
@override_settings(SEND_LOGIN_EMAILS=True) @override_settings(SEND_LOGIN_EMAILS=True)
@override_settings(AUTHENTICATION_BACKENDS=('zproject.backends.ZulipRemoteUserBackend',)) @override_settings(AUTHENTICATION_BACKENDS=('zproject.backends.ZulipRemoteUserBackend',))
def test_login_mobile_flow_otp_success(self) -> None: def test_login_mobile_flow_otp_success_email(self) -> None:
user_profile = self.example_user('hamlet') user_profile = self.example_user('hamlet')
email = user_profile.email email = user_profile.email
user_profile.date_joined = timezone_now() - datetime.timedelta(seconds=61) user_profile.date_joined = timezone_now() - datetime.timedelta(seconds=61)
@ -1950,6 +1950,49 @@ class TestZulipRemoteUserBackend(ZulipTestCase):
self.assertEqual(len(mail.outbox), 1) self.assertEqual(len(mail.outbox), 1)
self.assertIn('Zulip on Android', mail.outbox[0].body) self.assertIn('Zulip on Android', mail.outbox[0].body)
@override_settings(SEND_LOGIN_EMAILS=True)
@override_settings(SSO_APPEND_DOMAIN="zulip.com")
@override_settings(AUTHENTICATION_BACKENDS=('zproject.backends.ZulipRemoteUserBackend',))
def test_login_mobile_flow_otp_success_username(self) -> None:
user_profile = self.example_user('hamlet')
email = user_profile.email
remote_user = email_to_username(email)
user_profile.date_joined = timezone_now() - datetime.timedelta(seconds=61)
user_profile.save()
mobile_flow_otp = '1234abcd' * 8
# Verify that the right thing happens with an invalid-format OTP
result = self.client_post('/accounts/login/sso/',
dict(mobile_flow_otp="1234"),
REMOTE_USER=remote_user,
HTTP_USER_AGENT = "ZulipAndroid")
self.assertIs(get_session_dict_user(self.client.session), None)
self.assert_json_error_contains(result, "Invalid OTP", 400)
result = self.client_post('/accounts/login/sso/',
dict(mobile_flow_otp="invalido" * 8),
REMOTE_USER=remote_user,
HTTP_USER_AGENT = "ZulipAndroid")
self.assertIs(get_session_dict_user(self.client.session), None)
self.assert_json_error_contains(result, "Invalid OTP", 400)
result = self.client_post('/accounts/login/sso/',
dict(mobile_flow_otp=mobile_flow_otp),
REMOTE_USER=remote_user,
HTTP_USER_AGENT = "ZulipAndroid")
self.assertEqual(result.status_code, 302)
redirect_url = result['Location']
parsed_url = urllib.parse.urlparse(redirect_url)
query_params = urllib.parse.parse_qs(parsed_url.query)
self.assertEqual(parsed_url.scheme, 'zulip')
self.assertEqual(query_params["realm"], ['http://zulip.testserver'])
self.assertEqual(query_params["email"], [self.example_email("hamlet")])
encrypted_api_key = query_params["otp_encrypted_api_key"][0]
hamlet_api_keys = get_all_api_keys(self.example_user('hamlet'))
self.assertIn(otp_decrypt_api_key(encrypted_api_key, mobile_flow_otp), hamlet_api_keys)
self.assertEqual(len(mail.outbox), 1)
self.assertIn('Zulip on Android', mail.outbox[0].body)
def test_redirect_to(self) -> None: def test_redirect_to(self) -> None:
"""This test verifies the behavior of the redirect_to logic in """This test verifies the behavior of the redirect_to logic in
login_or_register_remote_user.""" login_or_register_remote_user."""

View File

@ -142,11 +142,12 @@ def login_or_register_remote_user(request: HttpRequest, remote_username: Optiona
invalid_subdomain: bool=False, mobile_flow_otp: Optional[str]=None, invalid_subdomain: bool=False, mobile_flow_otp: Optional[str]=None,
is_signup: bool=False, is_signup: bool=False,
redirect_to: str='') -> HttpResponse: redirect_to: str='') -> HttpResponse:
email = remote_user_to_email(remote_username)
if user_profile is None or user_profile.is_mirror_dummy: if user_profile is None or user_profile.is_mirror_dummy:
# We have verified the user controls an email address # We have verified the user controls an email address, but
# (remote_username) but there's no associated Zulip user # there's no associated Zulip user account. Consider sending
# account. Consider sending the request to registration. # the request to registration.
return maybe_send_to_registration(request, remote_user_to_email(remote_username), return maybe_send_to_registration(request, email,
full_name, password_required=False, is_signup=is_signup) full_name, password_required=False, is_signup=is_signup)
# Otherwise, the user has successfully authenticated to an # Otherwise, the user has successfully authenticated to an
@ -158,7 +159,7 @@ def login_or_register_remote_user(request: HttpRequest, remote_username: Optiona
api_key = get_api_key(user_profile) api_key = get_api_key(user_profile)
params = { params = {
'otp_encrypted_api_key': otp_encrypt_api_key(api_key, mobile_flow_otp), 'otp_encrypted_api_key': otp_encrypt_api_key(api_key, mobile_flow_otp),
'email': remote_username, 'email': email,
'realm': user_profile.realm.uri, 'realm': user_profile.realm.uri,
} }
# We can't use HttpResponseRedirect, since it only allows HTTP(S) URLs # We can't use HttpResponseRedirect, since it only allows HTTP(S) URLs