Skip to content

Commit 2f7d744

Browse files
opensearch-trigger-bot[bot]github-actions[bot]derek-hoSKLEIN3DarshitChanpura
authored
Preserve Query in nextUrl during openid login redirect (#2140) (#2159)
* Preserve Query in nextUrl during openid login redirect * Add release notes for 2.18 release (#2137) * Added Unittest Test Suite for OpenID handling unauthorized calls * Revert "Add release notes for 2.18 release (#2137)" * Fix ES-Lint issues * Fixing OIDC E2E tests and added a new one * Reverting line ending changes from last commit * Reverting changes to E2E OIDC Setup and added an alternative fix for the tests * Fix ESLint issues and try fixing new tests * Prevent Tenant Selection Popup to show during new E2E Test --------- (cherry picked from commit ded4012) Signed-off-by: Sebastian Klein <[email protected]> Signed-off-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com> Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com> Co-authored-by: Derek Ho <[email protected]> Co-authored-by: SKLEIN3 <[email protected]> Co-authored-by: Darshit Chanpura <[email protected]>
1 parent 9e22dbd commit 2f7d744

File tree

4 files changed

+262
-15
lines changed

4 files changed

+262
-15
lines changed

server/auth/types/openid/openid_auth.test.ts

+216-2
Original file line numberDiff line numberDiff line change
@@ -15,25 +15,37 @@
1515

1616
import { httpServerMock } from '../../../../../../src/core/server/http/http_server.mocks';
1717

18-
import { OpenSearchDashboardsRequest } from '../../../../../../src/core/server/http/router';
18+
import {
19+
OpenSearchDashboardsRequest,
20+
ResponseHeaders,
21+
} from '../../../../../../src/core/server/http/router';
1922

2023
import { OpenIdAuthentication } from './openid_auth';
2124
import { SecurityPluginConfigType } from '../../../index';
2225
import { SecuritySessionCookie } from '../../../session/security_cookie';
2326
import { deflateValue } from '../../../utils/compression';
2427
import { getObjectProperties } from '../../../utils/object_properties_defined';
2528
import {
26-
IRouter,
29+
AuthResult,
30+
AuthResultParams,
31+
AuthResultType,
32+
AuthToolkit,
2733
CoreSetup,
2834
ILegacyClusterClient,
35+
IRouter,
2936
SessionStorageFactory,
3037
} from '../../../../../../src/core/server';
38+
import { coreMock } from '../../../../../../src/core/public/mocks';
3139

3240
interface Logger {
3341
debug(message: string): void;
42+
3443
info(message: string): void;
44+
3545
warn(message: string): void;
46+
3647
error(message: string): void;
48+
3749
fatal(message: string): void;
3850
}
3951

@@ -334,3 +346,205 @@ describe('test OpenId authHeaderValue', () => {
334346
global.Date.now = realDateNow;
335347
});
336348
});
349+
350+
describe('Test OpenID Unauthorized Flows', () => {
351+
let router: IRouter;
352+
let core: CoreSetup;
353+
let esClient: ILegacyClusterClient;
354+
let sessionStorageFactory: SessionStorageFactory<SecuritySessionCookie>;
355+
356+
// Consistent with auth_handler_factory.test.ts
357+
beforeEach(() => {});
358+
359+
const config = ({
360+
cookie: {
361+
secure: false,
362+
},
363+
openid: {
364+
header: 'authorization',
365+
scope: [],
366+
extra_storage: {
367+
cookie_prefix: 'testcookie',
368+
additional_cookies: 5,
369+
},
370+
},
371+
} as unknown) as SecurityPluginConfigType;
372+
373+
const logger = {
374+
debug: (message: string) => {},
375+
info: (message: string) => {},
376+
warn: (message: string) => {},
377+
error: (message: string) => {},
378+
fatal: (message: string) => {},
379+
};
380+
381+
const authToolkit: AuthToolkit = {
382+
authenticated(data: AuthResultParams = {}): AuthResult {
383+
return {
384+
type: AuthResultType.authenticated,
385+
state: data.state,
386+
requestHeaders: data.requestHeaders,
387+
responseHeaders: data.responseHeaders,
388+
};
389+
},
390+
notHandled(): AuthResult {
391+
return {
392+
type: AuthResultType.notHandled,
393+
};
394+
},
395+
redirected(headers: { location: string } & ResponseHeaders): AuthResult {
396+
return {
397+
type: AuthResultType.redirected,
398+
headers,
399+
};
400+
},
401+
};
402+
403+
test('Ensure non pageRequest returns an unauthorized response', () => {
404+
const openIdAuthentication = new OpenIdAuthentication(
405+
config,
406+
sessionStorageFactory,
407+
router,
408+
esClient,
409+
core,
410+
logger
411+
);
412+
413+
const mockRequest = httpServerMock.createRawRequest({
414+
url: {
415+
pathname: '/unknownPath/',
416+
},
417+
});
418+
const osRequest = OpenSearchDashboardsRequest.from(mockRequest);
419+
420+
const mockLifecycleFactory = httpServerMock.createLifecycleResponseFactory();
421+
422+
openIdAuthentication.handleUnauthedRequest(osRequest, mockLifecycleFactory, authToolkit);
423+
424+
expect(mockLifecycleFactory.unauthorized).toBeCalledTimes(1);
425+
});
426+
427+
test('Ensure request without path redirects to default route', () => {
428+
const mockCore = coreMock.createSetup();
429+
const openIdAuthentication = new OpenIdAuthentication(
430+
config,
431+
sessionStorageFactory,
432+
router,
433+
esClient,
434+
mockCore,
435+
logger
436+
);
437+
438+
const mockRequest = httpServerMock.createRawRequest();
439+
const osRequest = OpenSearchDashboardsRequest.from(mockRequest);
440+
441+
const mockLifecycleFactory = httpServerMock.createLifecycleResponseFactory();
442+
443+
const authToolKitSpy = jest.spyOn(authToolkit, 'redirected');
444+
445+
openIdAuthentication.handleUnauthedRequest(osRequest, mockLifecycleFactory, authToolkit);
446+
447+
expect(authToolKitSpy).toHaveBeenCalledWith({
448+
location: '/auth/openid/captureUrlFragment?nextUrl=/',
449+
'set-cookie':
450+
'security_authentication=; Max-Age=0; Expires=Thu, 01 Jan 1970 00:00:00 GMT; HttpOnly; Path=/',
451+
});
452+
});
453+
454+
test('Verify cookie is set "Secure" if configured', () => {
455+
const mockCore = coreMock.createSetup();
456+
const openIdAuthentication = new OpenIdAuthentication(
457+
{
458+
...config,
459+
cookie: {
460+
secure: true,
461+
},
462+
},
463+
sessionStorageFactory,
464+
router,
465+
esClient,
466+
mockCore,
467+
logger
468+
);
469+
470+
const mockRequest = httpServerMock.createRawRequest();
471+
const osRequest = OpenSearchDashboardsRequest.from(mockRequest);
472+
473+
const mockLifecycleFactory = httpServerMock.createLifecycleResponseFactory();
474+
475+
const authToolKitSpy = jest.spyOn(authToolkit, 'redirected');
476+
477+
openIdAuthentication.handleUnauthedRequest(osRequest, mockLifecycleFactory, authToolkit);
478+
479+
expect(authToolKitSpy).toHaveBeenCalledWith({
480+
location: '/auth/openid/captureUrlFragment?nextUrl=/',
481+
'set-cookie':
482+
'security_authentication=; Max-Age=0; Expires=Thu, 01 Jan 1970 00:00:00 GMT; Secure; HttpOnly; Path=/',
483+
});
484+
});
485+
486+
test('Ensure nextUrl points to original request pathname', () => {
487+
const mockCore = coreMock.createSetup();
488+
const openIdAuthentication = new OpenIdAuthentication(
489+
config,
490+
sessionStorageFactory,
491+
router,
492+
esClient,
493+
mockCore,
494+
logger
495+
);
496+
497+
const mockRequest = httpServerMock.createRawRequest({
498+
url: {
499+
pathname: '/app/dashboards',
500+
},
501+
});
502+
const osRequest = OpenSearchDashboardsRequest.from(mockRequest);
503+
504+
const mockLifecycleFactory = httpServerMock.createLifecycleResponseFactory();
505+
506+
const authToolKitSpy = jest.spyOn(authToolkit, 'redirected');
507+
508+
openIdAuthentication.handleUnauthedRequest(osRequest, mockLifecycleFactory, authToolkit);
509+
510+
expect(authToolKitSpy).toHaveBeenCalledWith({
511+
location: '/auth/openid/captureUrlFragment?nextUrl=/app/dashboards',
512+
'set-cookie':
513+
'security_authentication=; Max-Age=0; Expires=Thu, 01 Jan 1970 00:00:00 GMT; HttpOnly; Path=/',
514+
});
515+
});
516+
517+
test('Ensure nextUrl points to original request pathname including security_tenant', () => {
518+
const mockCore = coreMock.createSetup();
519+
const openIdAuthentication = new OpenIdAuthentication(
520+
config,
521+
sessionStorageFactory,
522+
router,
523+
esClient,
524+
mockCore,
525+
logger
526+
);
527+
528+
const mockRequest = httpServerMock.createRawRequest({
529+
url: {
530+
pathname: '/app/dashboards',
531+
search: 'security_tenant=testing',
532+
},
533+
});
534+
const osRequest = OpenSearchDashboardsRequest.from(mockRequest);
535+
536+
const mockLifecycleFactory = httpServerMock.createLifecycleResponseFactory();
537+
538+
const authToolKitSpy = jest.spyOn(authToolkit, 'redirected');
539+
540+
openIdAuthentication.handleUnauthedRequest(osRequest, mockLifecycleFactory, authToolkit);
541+
542+
expect(authToolKitSpy).toHaveBeenCalledWith({
543+
location: `/auth/openid/captureUrlFragment?nextUrl=${escape(
544+
'/app/dashboards?security_tenant=testing'
545+
)}`,
546+
'set-cookie':
547+
'security_authentication=; Max-Age=0; Expires=Thu, 01 Jan 1970 00:00:00 GMT; HttpOnly; Path=/',
548+
});
549+
});
550+
});

server/auth/types/openid/openid_auth.ts

+13-11
Original file line numberDiff line numberDiff line change
@@ -16,30 +16,29 @@
1616
import * as fs from 'fs';
1717
import wreck from '@hapi/wreck';
1818
import {
19-
Logger,
20-
SessionStorageFactory,
19+
AuthResult,
20+
AuthToolkit,
2121
CoreSetup,
22-
IRouter,
2322
ILegacyClusterClient,
24-
OpenSearchDashboardsRequest,
25-
LifecycleResponseFactory,
26-
AuthToolkit,
2723
IOpenSearchDashboardsResponse,
28-
AuthResult,
24+
IRouter,
25+
LifecycleResponseFactory,
26+
Logger,
27+
OpenSearchDashboardsRequest,
28+
SessionStorageFactory,
2929
} from 'opensearch-dashboards/server';
3030
import { PeerCertificate } from 'tls';
3131
import { Server, ServerStateCookieOptions } from '@hapi/hapi';
3232
import { ProxyAgent } from 'proxy-agent';
3333
import { SecurityPluginConfigType } from '../../..';
3434
import {
35-
SecuritySessionCookie,
3635
clearOldVersionCookieValue,
36+
SecuritySessionCookie,
3737
} from '../../../session/security_cookie';
3838
import { OpenIdAuthRoutes } from './routes';
3939
import { AuthenticationType } from '../authentication_type';
40-
import { callTokenEndpoint } from './helper';
40+
import { callTokenEndpoint, getExpirationDate } from './helper';
4141
import { getObjectProperties } from '../../../utils/object_properties_defined';
42-
import { getExpirationDate } from './helper';
4342
import { AuthType } from '../../../../common';
4443
import {
4544
ExtraAuthStorageOptions,
@@ -128,11 +127,14 @@ export class OpenIdAuthentication extends AuthenticationType {
128127
}
129128

130129
private generateNextUrl(request: OpenSearchDashboardsRequest): string {
131-
const path = getRedirectUrl({
130+
let path = getRedirectUrl({
132131
request,
133132
basePath: this.coreSetup.http.basePath.serverBasePath,
134133
nextUrl: request.url.pathname || '/app/opensearch-dashboards',
135134
});
135+
if (request.url.search) {
136+
path += request.url.search;
137+
}
136138
return escape(path);
137139
}
138140

server/auth/types/openid/routes.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ export class OpenIdAuthRoutes {
101101
},
102102
})
103103
),
104-
redirectHash: schema.maybe(schema.boolean()),
104+
redirectHash: schema.maybe(schema.string()),
105105
state: schema.maybe(schema.string()),
106106
refresh: schema.maybe(schema.string()),
107107
},

test/cypress/e2e/oidc/oidc_auth_test.spec.js

+32-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@
1717
* Copyright OpenSearch Contributors
1818
* SPDX-License-Identifier: Apache-2.0
1919
*/
20-
2120
const basePath = Cypress.env('basePath') || '';
2221

2322
describe('Log in via OIDC', () => {
@@ -60,6 +59,12 @@ describe('Log in via OIDC', () => {
6059

6160
kcLogin();
6261

62+
cy.url().then((url) => {
63+
cy.visit(url, {
64+
failOnStatusCode: false,
65+
});
66+
});
67+
6368
cy.getCookie('security_authentication').should('exist');
6469

6570
localStorage.setItem('opendistro::security::tenant::saved', '""');
@@ -91,6 +96,32 @@ describe('Log in via OIDC', () => {
9196
cy.get('h1').contains('Get started');
9297
});
9398

99+
it('Login to Dashboard preserving Tenant', () => {
100+
const startUrl = `http://localhost:5601${basePath}/app/dashboards?security_tenant=private#/list`;
101+
102+
cy.visit(startUrl, {
103+
failOnStatusCode: false,
104+
});
105+
106+
sessionStorage.setItem('opendistro::security::tenant::show_popup', 'false');
107+
108+
kcLogin();
109+
cy.getCookie('security_authentication').should('exist');
110+
111+
cy.url().then((url) => {
112+
cy.visit(url, {
113+
failOnStatusCode: false,
114+
});
115+
});
116+
117+
localStorage.setItem('home:newThemeModal:show', 'false');
118+
119+
cy.get('#user-icon-btn').should('be.visible');
120+
cy.get('#user-icon-btn').click();
121+
122+
cy.get('#tenantName').should('have.text', 'Private');
123+
});
124+
94125
it('Tenancy persisted after logout in OIDC', () => {
95126
cy.visit(`http://localhost:5601${basePath}/app/opensearch_dashboards_overview#/`, {
96127
failOnStatusCode: false,

0 commit comments

Comments
 (0)