mirror of
https://github.com/getredash/redash.git
synced 2025-12-19 17:37:19 -05:00
The previous implementation of remote header login did not support the multiorg mode of Re:Dash. These changes modify the trusted header authentication to expose a per-organization login endpoint that logs users in the specified organization. The feature itself is not that interesting as multiorg is pretty much impossible to use in a standalone Re:Dash installation. What's more interesting is that all tests are executed in multiorg mode. It's not possible to write tests for the trusted header authentication if the method does not support multiorg mode. To make benefits of these changes more concrete, some tests were written to test the basic functionality of trusted header authentication.
271 lines
11 KiB
Python
271 lines
11 KiB
Python
import os
|
|
import time
|
|
|
|
from flask import request
|
|
from mock import patch
|
|
from sqlalchemy.orm.exc import NoResultFound
|
|
from tests import BaseTestCase
|
|
|
|
from redash import models, settings
|
|
from redash.authentication import (api_key_load_user_from_request,
|
|
get_login_url, hmac_load_user_from_request,
|
|
sign)
|
|
from redash.authentication.google_oauth import (create_and_login_user,
|
|
verify_profile)
|
|
|
|
|
|
class TestApiKeyAuthentication(BaseTestCase):
|
|
#
|
|
# This is a bad way to write these tests, but the way Flask works doesn't make it easy to write them properly...
|
|
#
|
|
def setUp(self):
|
|
super(TestApiKeyAuthentication, self).setUp()
|
|
self.api_key = '10'
|
|
self.query = self.factory.create_query(api_key=self.api_key)
|
|
models.db.session.flush()
|
|
self.query_url = '/{}/api/queries/{}'.format(self.factory.org.slug, self.query.id)
|
|
self.queries_url = '/{}/api/queries'.format(self.factory.org.slug)
|
|
|
|
def test_no_api_key(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.query_url)
|
|
self.assertIsNone(api_key_load_user_from_request(request))
|
|
|
|
def test_wrong_api_key(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.query_url, query_string={'api_key': 'whatever'})
|
|
self.assertIsNone(api_key_load_user_from_request(request))
|
|
|
|
def test_correct_api_key(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.query_url, query_string={'api_key': self.api_key})
|
|
self.assertIsNotNone(api_key_load_user_from_request(request))
|
|
|
|
def test_no_query_id(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.queries_url, query_string={'api_key': self.api_key})
|
|
self.assertIsNone(api_key_load_user_from_request(request))
|
|
|
|
def test_user_api_key(self):
|
|
user = self.factory.create_user(api_key="user_key")
|
|
models.db.session.flush()
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.queries_url, query_string={'api_key': user.api_key})
|
|
self.assertEqual(user.id, api_key_load_user_from_request(request).id)
|
|
|
|
def test_api_key_header(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.query_url, headers={'Authorization': "Key {}".format(self.api_key)})
|
|
self.assertIsNotNone(api_key_load_user_from_request(request))
|
|
|
|
def test_api_key_header_with_wrong_key(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.query_url, headers={'Authorization': "Key oops"})
|
|
self.assertIsNone(api_key_load_user_from_request(request))
|
|
|
|
def test_api_key_for_wrong_org(self):
|
|
other_user = self.factory.create_admin(org=self.factory.create_org())
|
|
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.query_url, headers={'Authorization': "Key {}".format(other_user.api_key)})
|
|
self.assertEqual(404, rv.status_code)
|
|
|
|
|
|
class TestHMACAuthentication(BaseTestCase):
|
|
#
|
|
# This is a bad way to write these tests, but the way Flask works doesn't make it easy to write them properly...
|
|
#
|
|
def setUp(self):
|
|
super(TestHMACAuthentication, self).setUp()
|
|
self.api_key = '10'
|
|
self.query = self.factory.create_query(api_key=self.api_key)
|
|
models.db.session.flush()
|
|
self.path = '/{}/api/queries/{}'.format(self.query.org.slug, self.query.id)
|
|
self.expires = time.time() + 1800
|
|
|
|
def signature(self, expires):
|
|
return sign(self.query.api_key, self.path, expires)
|
|
|
|
def test_no_signature(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.path)
|
|
self.assertIsNone(hmac_load_user_from_request(request))
|
|
|
|
def test_wrong_signature(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.path, query_string={'signature': 'whatever', 'expires': self.expires})
|
|
self.assertIsNone(hmac_load_user_from_request(request))
|
|
|
|
def test_correct_signature(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get(self.path, query_string={'signature': self.signature(self.expires), 'expires': self.expires})
|
|
self.assertIsNotNone(hmac_load_user_from_request(request))
|
|
|
|
def test_no_query_id(self):
|
|
with self.app.test_client() as c:
|
|
rv = c.get('/{}/api/queries'.format(self.query.org.slug), query_string={'api_key': self.api_key})
|
|
self.assertIsNone(hmac_load_user_from_request(request))
|
|
|
|
def test_user_api_key(self):
|
|
user = self.factory.create_user(api_key="user_key")
|
|
path = '/api/queries/'
|
|
models.db.session.flush()
|
|
|
|
signature = sign(user.api_key, path, self.expires)
|
|
with self.app.test_client() as c:
|
|
rv = c.get(path, query_string={'signature': signature, 'expires': self.expires, 'user_id': user.id})
|
|
self.assertEqual(user.id, hmac_load_user_from_request(request).id)
|
|
|
|
|
|
class TestCreateAndLoginUser(BaseTestCase):
|
|
def test_logins_valid_user(self):
|
|
user = self.factory.create_user(email='test@example.com')
|
|
|
|
with patch('redash.authentication.google_oauth.login_user') as login_user_mock:
|
|
create_and_login_user(self.factory.org, user.name, user.email)
|
|
login_user_mock.assert_called_once_with(user, remember=True)
|
|
|
|
def test_creates_vaild_new_user(self):
|
|
email = 'test@example.com'
|
|
name = 'Test User'
|
|
|
|
with patch('redash.authentication.google_oauth.login_user') as login_user_mock:
|
|
create_and_login_user(self.factory.org, name, email)
|
|
|
|
self.assertTrue(login_user_mock.called)
|
|
user = models.User.query.filter(models.User.email == email).one()
|
|
self.assertEqual(user.email, email)
|
|
|
|
def test_updates_user_name(self):
|
|
user = self.factory.create_user(email='test@example.com')
|
|
|
|
with patch('redash.authentication.google_oauth.login_user') as login_user_mock:
|
|
create_and_login_user(self.factory.org, "New Name", user.email)
|
|
login_user_mock.assert_called_once_with(user, remember=True)
|
|
|
|
|
|
class TestVerifyProfile(BaseTestCase):
|
|
def test_no_domain_allowed_for_org(self):
|
|
profile = dict(email='arik@example.com')
|
|
self.assertFalse(verify_profile(self.factory.org, profile))
|
|
|
|
def test_domain_not_in_org_domains_list(self):
|
|
profile = dict(email='arik@example.com')
|
|
self.factory.org.settings[models.Organization.SETTING_GOOGLE_APPS_DOMAINS] = ['example.org']
|
|
self.assertFalse(verify_profile(self.factory.org, profile))
|
|
|
|
def test_domain_in_org_domains_list(self):
|
|
profile = dict(email='arik@example.com')
|
|
self.factory.org.settings[models.Organization.SETTING_GOOGLE_APPS_DOMAINS] = ['example.com']
|
|
self.assertTrue(verify_profile(self.factory.org, profile))
|
|
|
|
self.factory.org.settings[models.Organization.SETTING_GOOGLE_APPS_DOMAINS] = ['example.org', 'example.com']
|
|
self.assertTrue(verify_profile(self.factory.org, profile))
|
|
|
|
def test_org_in_public_mode_accepts_any_domain(self):
|
|
profile = dict(email='arik@example.com')
|
|
self.factory.org.settings[models.Organization.SETTING_IS_PUBLIC] = True
|
|
self.factory.org.settings[models.Organization.SETTING_GOOGLE_APPS_DOMAINS] = []
|
|
self.assertTrue(verify_profile(self.factory.org, profile))
|
|
|
|
def test_user_not_in_domain_but_account_exists(self):
|
|
profile = dict(email='arik@example.com')
|
|
self.factory.create_user(email='arik@example.com')
|
|
self.factory.org.settings[models.Organization.SETTING_GOOGLE_APPS_DOMAINS] = ['example.org']
|
|
self.assertTrue(verify_profile(self.factory.org, profile))
|
|
|
|
|
|
class TestGetLoginUrl(BaseTestCase):
|
|
def test_when_multi_org_enabled_and_org_exists(self):
|
|
with self.app.test_request_context('/{}/'.format(self.factory.org.slug)):
|
|
self.assertEqual(get_login_url(next=None), '/{}/login'.format(self.factory.org.slug))
|
|
|
|
def test_when_multi_org_enabled_and_org_doesnt_exist(self):
|
|
with self.app.test_request_context('/{}_notexists/'.format(self.factory.org.slug)):
|
|
self.assertEqual(get_login_url(next=None), '/')
|
|
|
|
class TestRemoteUserAuth(BaseTestCase):
|
|
DEFAULT_SETTING_OVERRIDES = {
|
|
'REDASH_REMOTE_USER_LOGIN_ENABLED': 'true'
|
|
}
|
|
|
|
def setUp(self):
|
|
# Apply default setting overrides to every test
|
|
self.overrideSettings(None)
|
|
|
|
super(TestRemoteUserAuth, self).setUp()
|
|
|
|
def overrideSettings(self, overrides):
|
|
"""Override settings for testing purposes.
|
|
|
|
This helper method can be used to override specific environmental
|
|
variables to enable / disable Re:Dash features for the duration
|
|
of the test.
|
|
|
|
Note that these overrides only affect code that checks the value of
|
|
the setting at runtime. It doesn't affect code that only checks the
|
|
value during program initialization.
|
|
|
|
:param dict overrides: a dict of environmental variables to override
|
|
when the settings are reloaded
|
|
"""
|
|
variables = self.DEFAULT_SETTING_OVERRIDES.copy()
|
|
variables.update(overrides or {})
|
|
with patch.dict(os.environ, variables):
|
|
reload(settings)
|
|
|
|
# Queue a cleanup routine that reloads the settings without overrides
|
|
# once the test ends
|
|
self.addCleanup(lambda: reload(settings))
|
|
|
|
def assertCorrectUserAttributes(self, user, email='test@example.com', name='test@example.com', groups=None, org=None):
|
|
"""Helper to assert that the user attributes are correct."""
|
|
groups = groups or []
|
|
if self.factory.org.default_group.id not in groups:
|
|
groups.append(self.factory.org.default_group.id)
|
|
|
|
self.assertIsNotNone(user)
|
|
self.assertEqual(user.email, email)
|
|
self.assertEqual(user.name, name)
|
|
self.assertEqual(user.org, org or self.factory.org)
|
|
self.assertItemsEqual(user.group_ids, groups)
|
|
|
|
def getTestUser(self, email='test@example.com', org=None):
|
|
"""Helper to fetch an user from the database."""
|
|
|
|
# Expire all cached objects to ensure these values are read directly
|
|
# from the database.
|
|
models.db.session.expire_all()
|
|
|
|
return models.User.get_by_email_and_org(email, org or self.factory.org)
|
|
|
|
def test_remote_login_disabled(self):
|
|
self.overrideSettings({
|
|
'REDASH_REMOTE_USER_LOGIN_ENABLED': 'false'
|
|
})
|
|
|
|
self.get_request('/remote_user/login', org=self.factory.org, headers={
|
|
'X-Forwarded-Remote-User': 'test@example.com'
|
|
})
|
|
|
|
with self.assertRaises(NoResultFound):
|
|
self.getTestUser()
|
|
|
|
def test_remote_login_default_header(self):
|
|
self.get_request('/remote_user/login', org=self.factory.org, headers={
|
|
'X-Forwarded-Remote-User': 'test@example.com'
|
|
})
|
|
|
|
self.assertCorrectUserAttributes(self.getTestUser())
|
|
|
|
def test_remote_login_custom_header(self):
|
|
self.overrideSettings({
|
|
'REDASH_REMOTE_USER_HEADER': 'X-Custom-User'
|
|
})
|
|
|
|
self.get_request('/remote_user/login', org=self.factory.org, headers={
|
|
'X-Custom-User': 'test@example.com'
|
|
})
|
|
|
|
self.assertCorrectUserAttributes(self.getTestUser())
|