Skip to content
Snippets Groups Projects
  1. Apr 21, 2023
  2. Apr 19, 2023
  3. Dec 15, 2022
    • Andrej Shadura's avatar
    • Andrej Shadura's avatar
    • Andrej Shadura's avatar
      Periodically block users removed from the required groups · c03e97b8
      Andrej Shadura authored
      
      This implementation assumes users are not allowed to change their
      usernames.
      
      MS Graph API provides a few different elements to identify users:
      
       - the oid, which is guaranteed to uniquely map to a single user
         in a tenant, and globally if combined with the tid (tenant id)
       - the userPrincipalName, in the form <username@tenant.domain>
       - the free-form email address
      
      Ideally, all services should use the oid+tid as an internal user
      identifier, the userPrincipalName as a username, and the free-form
      email for notifications.
      
      When federation of tenants is out of scope, the oid and the
      username part of the userPrincipalName would be enough.
      
      Due to various reasons, the services the mediator is used
      with on our setup use those elements differently:
      
      * OBS uses <username> for user IDs, but *usually* the free-form email
        for emails.
      * GitLab uses integers for user IDs, the free-form email for primary
        emails, <username> as the username and the full userPrincipalName for the
        openid_connect authentication method (which, arguably, should be changed to
        use the oid+tid), but has no easy way to retrieve users by such identifier
        (however, it is exposed in some of the user listing API when using
        administrator’s rights)
      * LAVA currently uses the free-form email and should be fixed to use the
        username from the userPrincipalName
      
      Since in our setup the userPrincipalName cannot be changed and
      cannot be re-used, and federation is not in scope, using the
      username part of the userPrincipalName is enough to reliably identify
      users across services, and it is also what users expect.
      
      Signed-off-by: default avatarAndrej Shadura <andrew.shadura@collabora.co.uk>
      Unverified
      c03e97b8
  4. Nov 29, 2022
  5. Nov 22, 2022
  6. Jul 15, 2022
  7. May 16, 2022
  8. Nov 08, 2021
  9. Aug 31, 2021
  10. Aug 24, 2021
  11. Aug 11, 2021
  12. Aug 04, 2021
    • Paweł Wieczorek's avatar
      Wait for asset availability on the service · 6ed986c3
      Paweł Wieczorek authored
      
      GitLab membership mapping could fail when given user logged in for the
      first time. It was caused by requesting information on given user before
      completing user creation on GitLab. Now user presence is checked prior
      attempting to access user information.
      
      Default behaviour is changed to query GitLab for user presence up to 10
      times with 500 millisecond intervals. This can be adjusted with
      configuration file or environmental variables.
      
      Signed-off-by: default avatarPaweł Wieczorek <pawel.wieczorek@collabora.com>
      6ed986c3
  13. Aug 02, 2021
    • Paweł Wieczorek's avatar
      Add explicit request for groups scope · cb53475c
      Paweł Wieczorek authored
      
      This patch allows appending request for "groups" scope to the traffic
      relayed to the identity provider.
      
      Explicit request can be made by:
      
      - command line flag ("groups"),
      - environmental variable ("AUTHZ_MEDIATOR_GROUPS"),
      - configuration file argument ("groups").
      
      Command line flag argument takes precedence over environmental variable
      which takes precedence over configuration file argument. Argument should
      be a valid YAML boolean (yes/true, no/false).
      
      Default behaviour remains unchanged, i.e. no additional scopes are
      appended to the communication unless explicitly requested.
      
      This patch also makes FakeVerifier structure part of "mediator" package
      for testing purposes of both internal as well as exported functions.
      
      Signed-off-by: default avatarPaweł Wieczorek <pawel.wieczorek@collabora.com>
      cb53475c
  14. Jul 19, 2021
  15. Jul 16, 2021
  16. Jul 02, 2021
Loading