mirror of
https://github.com/coder/coder.git
synced 2025-07-09 11:45:56 +00:00
feat: add SCIM support for multi-organization (#14691)
* chore: use legacy "AssignDefault" option for legacy behavior in SCIM (#14696) * chore: reference legacy assign default option for legacy behavior AssignDefault is a boolean flag mainly for single org and legacy deployments. Use this flag to determine SCIM behavior. --------- Co-authored-by: Steven Masley <Emyrk@users.noreply.github.com>
This commit is contained in:
@ -24,6 +24,7 @@ import (
|
|||||||
// claims to the internal representation of a user in Coder.
|
// claims to the internal representation of a user in Coder.
|
||||||
// TODO: Move group + role sync into this interface.
|
// TODO: Move group + role sync into this interface.
|
||||||
type IDPSync interface {
|
type IDPSync interface {
|
||||||
|
AssignDefaultOrganization() bool
|
||||||
OrganizationSyncEnabled() bool
|
OrganizationSyncEnabled() bool
|
||||||
// ParseOrganizationClaims takes claims from an OIDC provider, and returns the
|
// ParseOrganizationClaims takes claims from an OIDC provider, and returns the
|
||||||
// organization sync params for assigning users into organizations.
|
// organization sync params for assigning users into organizations.
|
||||||
|
@ -32,6 +32,10 @@ func (AGPLIDPSync) OrganizationSyncEnabled() bool {
|
|||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (s AGPLIDPSync) AssignDefaultOrganization() bool {
|
||||||
|
return s.OrganizationAssignDefault
|
||||||
|
}
|
||||||
|
|
||||||
func (s AGPLIDPSync) ParseOrganizationClaims(_ context.Context, _ jwt.MapClaims) (OrganizationParams, *HTTPError) {
|
func (s AGPLIDPSync) ParseOrganizationClaims(_ context.Context, _ jwt.MapClaims) (OrganizationParams, *HTTPError) {
|
||||||
// For AGPL we only sync the default organization.
|
// For AGPL we only sync the default organization.
|
||||||
return OrganizationParams{
|
return OrganizationParams{
|
||||||
|
@ -217,14 +217,19 @@ func (api *API) scimPostUser(rw http.ResponseWriter, r *http.Request) {
|
|||||||
sUser.UserName = codersdk.UsernameFrom(sUser.UserName)
|
sUser.UserName = codersdk.UsernameFrom(sUser.UserName)
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO: This is a temporary solution that does not support multi-org
|
// If organization sync is enabled, the user's organizations will be
|
||||||
// deployments. This assumption places all new SCIM users into the
|
// corrected on login. If including the default org, then always assign
|
||||||
// default organization.
|
// the default org, regardless if sync is enabled or not.
|
||||||
//nolint:gocritic
|
// This is to preserve single org deployment behavior.
|
||||||
defaultOrganization, err := api.Database.GetDefaultOrganization(dbauthz.AsSystemRestricted(ctx))
|
organizations := []uuid.UUID{}
|
||||||
if err != nil {
|
if api.IDPSync.AssignDefaultOrganization() {
|
||||||
_ = handlerutil.WriteError(rw, err)
|
//nolint:gocritic // SCIM operations are a system user
|
||||||
return
|
defaultOrganization, err := api.Database.GetDefaultOrganization(dbauthz.AsSystemRestricted(ctx))
|
||||||
|
if err != nil {
|
||||||
|
_ = handlerutil.WriteError(rw, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
organizations = append(organizations, defaultOrganization.ID)
|
||||||
}
|
}
|
||||||
|
|
||||||
//nolint:gocritic // needed for SCIM
|
//nolint:gocritic // needed for SCIM
|
||||||
@ -232,7 +237,7 @@ func (api *API) scimPostUser(rw http.ResponseWriter, r *http.Request) {
|
|||||||
CreateUserRequestWithOrgs: codersdk.CreateUserRequestWithOrgs{
|
CreateUserRequestWithOrgs: codersdk.CreateUserRequestWithOrgs{
|
||||||
Username: sUser.UserName,
|
Username: sUser.UserName,
|
||||||
Email: email,
|
Email: email,
|
||||||
OrganizationIDs: []uuid.UUID{defaultOrganization.ID},
|
OrganizationIDs: organizations,
|
||||||
},
|
},
|
||||||
LoginType: database.LoginTypeOIDC,
|
LoginType: database.LoginTypeOIDC,
|
||||||
// Do not send notifications to user admins as SCIM endpoint might be called sequentially to all users.
|
// Do not send notifications to user admins as SCIM endpoint might be called sequentially to all users.
|
||||||
|
@ -157,6 +157,66 @@ func TestScim(t *testing.T) {
|
|||||||
require.Len(t, userRes.Users, 1)
|
require.Len(t, userRes.Users, 1)
|
||||||
assert.Equal(t, sUser.Emails[0].Value, userRes.Users[0].Email)
|
assert.Equal(t, sUser.Emails[0].Value, userRes.Users[0].Email)
|
||||||
assert.Equal(t, sUser.UserName, userRes.Users[0].Username)
|
assert.Equal(t, sUser.UserName, userRes.Users[0].Username)
|
||||||
|
assert.Len(t, userRes.Users[0].OrganizationIDs, 1)
|
||||||
|
|
||||||
|
// Expect zero notifications (SkipNotifications = true)
|
||||||
|
require.Empty(t, notifyEnq.Sent)
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("OKNoDefault", func(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
|
||||||
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
// given
|
||||||
|
scimAPIKey := []byte("hi")
|
||||||
|
mockAudit := audit.NewMock()
|
||||||
|
notifyEnq := &testutil.FakeNotificationsEnqueuer{}
|
||||||
|
dv := coderdtest.DeploymentValues(t)
|
||||||
|
dv.OIDC.OrganizationAssignDefault = false
|
||||||
|
client, _ := coderdenttest.New(t, &coderdenttest.Options{
|
||||||
|
Options: &coderdtest.Options{
|
||||||
|
Auditor: mockAudit,
|
||||||
|
NotificationsEnqueuer: notifyEnq,
|
||||||
|
DeploymentValues: dv,
|
||||||
|
},
|
||||||
|
SCIMAPIKey: scimAPIKey,
|
||||||
|
AuditLogging: true,
|
||||||
|
LicenseOptions: &coderdenttest.LicenseOptions{
|
||||||
|
AccountID: "coolin",
|
||||||
|
Features: license.Features{
|
||||||
|
codersdk.FeatureSCIM: 1,
|
||||||
|
codersdk.FeatureAuditLog: 1,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
mockAudit.ResetLogs()
|
||||||
|
|
||||||
|
// when
|
||||||
|
sUser := makeScimUser(t)
|
||||||
|
res, err := client.Request(ctx, "POST", "/scim/v2/Users", sUser, setScimAuth(scimAPIKey))
|
||||||
|
require.NoError(t, err)
|
||||||
|
defer res.Body.Close()
|
||||||
|
require.Equal(t, http.StatusOK, res.StatusCode)
|
||||||
|
|
||||||
|
// then
|
||||||
|
// Expect audit logs
|
||||||
|
aLogs := mockAudit.AuditLogs()
|
||||||
|
require.Len(t, aLogs, 1)
|
||||||
|
af := map[string]string{}
|
||||||
|
err = json.Unmarshal([]byte(aLogs[0].AdditionalFields), &af)
|
||||||
|
require.NoError(t, err)
|
||||||
|
assert.Equal(t, coderd.SCIMAuditAdditionalFields, af)
|
||||||
|
assert.Equal(t, database.AuditActionCreate, aLogs[0].Action)
|
||||||
|
|
||||||
|
// Expect users exposed over API
|
||||||
|
userRes, err := client.Users(ctx, codersdk.UsersRequest{Search: sUser.Emails[0].Value})
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Len(t, userRes.Users, 1)
|
||||||
|
assert.Equal(t, sUser.Emails[0].Value, userRes.Users[0].Email)
|
||||||
|
assert.Equal(t, sUser.UserName, userRes.Users[0].Username)
|
||||||
|
assert.Len(t, userRes.Users[0].OrganizationIDs, 0)
|
||||||
|
|
||||||
// Expect zero notifications (SkipNotifications = true)
|
// Expect zero notifications (SkipNotifications = true)
|
||||||
require.Empty(t, notifyEnq.Sent)
|
require.Empty(t, notifyEnq.Sent)
|
||||||
|
Reference in New Issue
Block a user