feat: Enhance SAML provider name resolution & update redirect handling#38268
feat: Enhance SAML provider name resolution & update redirect handling#38268bra-i-am wants to merge 1 commit intoopenedx:masterfrom
Conversation
|
Thanks for the pull request, @bra-i-am! This repository is currently maintained by Once you've gone through the following steps feel free to tag them in a comment and let them know that your changes are ready for engineering review. 🔘 Get product approvalIf you haven't already, check this list to see if your contribution needs to go through the product review process.
🔘 Provide contextTo help your reviewers and other members of the community understand the purpose and larger context of your changes, feel free to add as much of the following information to the PR description as you can:
🔘 Get a green buildIf one or more checks are failing, continue working on your changes until this is no longer the case and your build turns green. 🔘 Update the status of your PRYour PR is currently marked as a draft. After completing the steps above, update its status by clicking "Ready for Review", or removing "WIP" from the title, as appropriate. Where can I find more information?If you'd like to get more details on all aspects of the review process for open source pull requests (OSPRs), check out the following resources: When can I expect my changes to be merged?Our goal is to get community contributions seen and reviewed as efficiently as possible. However, the amount of time that it takes to review and merge a PR can vary significantly based on factors such as:
💡 As a result it may take up to several weeks or months to complete a review and merge your PR. |
…ing for account settings flow
9710e05 to
9c9c7bd
Compare
Description
Fixes an issue where the TPA errors during the "link account" flow from the Account MFE were skipped, leaving the user with no feedback.
Root cause
When a SAML authentication error occurs (e.g.
AuthAlreadyAssociated— the IdP account is alreadylinked to a different platform account),
ExceptionMiddleware.get_redirect_uri()returned/account/settings. That path is registered as a plaindjango.views.generic.base.RedirectViewpointing directly toACCOUNT_MICROFRONTEND_URL. Thisredirect is stateless — it does not read or forward Django messages, nor does it preserve query
parameters — so any error context was lost before the MFE ever loaded.
What changed
common/djangoapps/third_party_auth/middleware.pyAdded
_get_saml_provider_name(request): reads theRelayStatefield from the SAML POST body(which contains the IdP slug as
{"idp": "<slug>", ...}), looks up the corresponding provider inthe TPA registry, and returns its human-readable display name (e.g. Cartão de Cidadão). Falls
back to
Nonegracefully on any parsing or lookup failure.Extended
ExceptionMiddleware.get_redirect_uri(): whenauth_entry == account_settingsand theexception is a
SocialAuthBaseException, the method now bypasses/account/settingsand buildsthe Account MFE URL directly with
?duplicate_provider=<name>, usingurllib.parse.quote()toencode the name as
%20-spaced (not+-spaced) so the MFE renders it correctly. Falls back tothe backend name (
tpa-saml, OAuth provider name, etc.) if the SAML provider name cannot beresolved.
The Account MFE (
frontend-app-account) already reads?duplicate_provider=inAccountSettingsPage.jsxand renders a danger alert — no frontend changes were required.Impact
another [Site Name] account." is now correctly displayed in the Account MFE after a failed link
attempt.
any
auth_entry=account_settingsTPA error.Screencast
Screencast.from.01-04-26.09.03.33.webm
Testing instructions
*This change was tested by using
SimpleSAMLphpuser_a@example.com,user_b@example.com) and a SAML IdP.user_avia the normal login flow.user_b.