Commit 2b05562c authored by Grzegorz Bizon's avatar Grzegorz Bizon

Simplify blocked user tracking during authentication

parent 4bcf72e7
...@@ -2,7 +2,7 @@ Rails.application.configure do |config| ...@@ -2,7 +2,7 @@ Rails.application.configure do |config|
Warden::Manager.after_set_user(scope: :user) do |user, auth, opts| Warden::Manager.after_set_user(scope: :user) do |user, auth, opts|
Gitlab::Auth::UniqueIpsLimiter.limit_user!(user) Gitlab::Auth::UniqueIpsLimiter.limit_user!(user)
activity = Gitlab::Auth::Activity.new(user, opts) activity = Gitlab::Auth::Activity.new(opts)
case opts[:event] case opts[:event]
when :authentication when :authentication
...@@ -26,20 +26,18 @@ Rails.application.configure do |config| ...@@ -26,20 +26,18 @@ Rails.application.configure do |config|
end end
Warden::Manager.before_failure(scope: :user) do |env, opts| Warden::Manager.before_failure(scope: :user) do |env, opts|
tracker = Gitlab::Auth::BlockedUserTracker.new(env) Gitlab::Auth::Activity.new(opts).user_authentication_failed!
tracker.log_blocked_user_activity! if tracker.user_blocked?
Gitlab::Auth::Activity.new(tracker.user, opts).user_authentication_failed!
end end
Warden::Manager.before_logout(scope: :user) do |user_warden, auth, opts| Warden::Manager.before_logout(scope: :user) do |user, auth, opts|
user = user_warden || auth.user user ||= auth.user
Gitlab::Auth::Activity.new(user, opts).tap do |activity| if user.blocked?
activity.user_blocked! if user.blocked? Gitlab::Auth::Activity.new(opts).user_blocked!
activity.user_session_destroyed! BlockedUserTracker.new(user, auth).log_blocked_user_activity!
end end
Gitlab::Auth::Activity.new(opts).user_session_destroyed!
ActiveSession.destroy(user, auth.request.session.id) ActiveSession.destroy(user, auth.request.session.id)
end end
end end
...@@ -18,8 +18,7 @@ module Gitlab ...@@ -18,8 +18,7 @@ module Gitlab
user_blocked: 'Counter of sign in attempts when user is blocked' user_blocked: 'Counter of sign in attempts when user is blocked'
}.freeze }.freeze
def initialize(user, opts) def initialize(opts)
@user = user
@opts = opts @opts = opts
end end
......
...@@ -2,57 +2,21 @@ ...@@ -2,57 +2,21 @@
module Gitlab module Gitlab
module Auth module Auth
class BlockedUserTracker class BlockedUserTracker
include Gitlab::Utils::StrongMemoize
ACTIVE_RECORD_REQUEST_PARAMS = 'action_dispatch.request.request_parameters' def initialize(user, auth)
@user = user
def initialize(env) @auth = auth
@env = env
end
def user_blocked?
user&.blocked?
end
def user
return unless has_user_blocked_message?
strong_memoize(:user) do
# Check for either LDAP or regular GitLab account logins
login = @env.dig(ACTIVE_RECORD_REQUEST_PARAMS, 'username') ||
@env.dig(ACTIVE_RECORD_REQUEST_PARAMS, 'user', 'login')
User.by_login(login) if login.present?
end
rescue TypeError
end end
def log_blocked_user_activity! def log_blocked_user_activity!
return unless user_blocked? return unless @user.blocked?
Gitlab::AppLogger.info("Failed login for blocked user: user=#{user.username} ip=#{@env['REMOTE_ADDR']}")
SystemHooksService.new.execute_hooks_for(user, :failed_login)
true
rescue TypeError
end
private Gitlab::AppLogger.info <<~INFO
"Failed login for blocked user: user=#{@user.username} ip=#{@auth.request.ip}")
INFO
## SystemHooksService.new.execute_hooks_for(@user, :failed_login)
# Devise calls User#active_for_authentication? on the User model and then rescue TypeError
# throws an exception to Warden with User#inactive_message:
# https://github.com/plataformatec/devise/blob/v4.2.1/lib/devise/hooks/activatable.rb#L8
#
# Since Warden doesn't pass the user record to the failure handler, we
# need to do a database lookup with the username. We can limit the
# lookups to happen when the user was blocked by checking the inactive
# message passed along by Warden.
#
def has_user_blocked_message?
strong_memoize(:user_blocked_message) do
message = @env.dig('warden.options', :message)
message == User::BLOCKED_MESSAGE
end
end end
end end
end end
......
require 'spec_helper' require 'spec_helper'
describe Gitlab::Auth::BlockedUserTracker do describe Gitlab::Auth::BlockedUserTracker do
set(:user) { create(:user) }
describe '#log_blocked_user_activity!' do describe '#log_blocked_user_activity!' do
it 'does not log if user failed to login due to undefined reason' do context 'when user is not blocked' do
expect_any_instance_of(SystemHooksService).not_to receive(:execute_hooks_for) it 'does not blocked user activity' do
expect_any_instance_of(SystemHooksService)
tracker = described_class.new({}) .not_to receive(:execute_hooks_for)
expect(Gitlab::AppLogger).not_to receive(:info)
expect(tracker.user).to be_nil user = create(:user)
expect(tracker.user_blocked?).to be_falsey
expect(tracker.log_blocked_user_activity!).to be_nil
end
it 'gracefully handles malformed environment variables' do described_class.new(user, spy('auth')).log_blocked_user_activity!
tracker = described_class.new({ 'warden.options' => 'test' })
expect(tracker.user).to be_nil
expect(tracker.user_blocked?).to be_falsey
expect(tracker.log_blocked_user_activity!).to be_nil
end
context 'failed login due to blocked user' do
let(:base_env) { { 'warden.options' => { message: User::BLOCKED_MESSAGE } } }
let(:env) { base_env.merge(request_env) }
subject { described_class.new(env) }
before do
expect_any_instance_of(SystemHooksService).to receive(:execute_hooks_for).with(user, :failed_login)
end end
end
context 'via GitLab login' do context 'when user is not blocked' do
let(:request_env) { { described_class::ACTIVE_RECORD_REQUEST_PARAMS => { 'user' => { 'login' => user.username } } } } it 'logs blocked user activity' do
user = create(:user, :blocked)
it 'logs a blocked user' do
user.block!
expect(subject.user).to be_blocked
expect(subject.user_blocked?).to be true
expect(subject.log_blocked_user_activity!).to be_truthy
end
it 'logs a blocked user by e-mail' do
user.block!
env[described_class::ACTIVE_RECORD_REQUEST_PARAMS]['user']['login'] = user.email
expect(subject.user).to be_blocked
expect(subject.log_blocked_user_activity!).to be_truthy
end
end
context 'via LDAP login' do
let(:request_env) { { described_class::ACTIVE_RECORD_REQUEST_PARAMS => { 'username' => user.username } } }
it 'logs a blocked user' do
user.block!
expect(subject.user).to be_blocked
expect(subject.user_blocked?).to be true
expect(subject.log_blocked_user_activity!).to be_truthy
end
it 'logs a LDAP blocked user' do expect_any_instance_of(SystemHooksService)
user.ldap_block! .to receive(:execute_hooks_for)
.with(user, :failed_login)
expect(Gitlab::AppLogger).to receive(:info)
.with(/Failed login for blocked user/)
expect(subject.user).to be_blocked described_class.new(user, spy('auth')).log_blocked_user_activity!
expect(subject.user_blocked?).to be true
expect(subject.log_blocked_user_activity!).to be_truthy
end
end end
end end
end end
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment