2020-03-02 09:36:32 -07:00
|
|
|
# Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2021-09-06 08:23:50 -06:00
|
|
|
import logging
|
2021-02-11 08:05:15 -07:00
|
|
|
from typing import Any, Dict, Optional
|
|
|
|
|
|
|
|
import attr
|
2020-03-02 09:36:32 -07:00
|
|
|
|
2020-03-03 03:54:44 -07:00
|
|
|
from ._base import Config
|
2020-03-02 09:36:32 -07:00
|
|
|
|
2021-09-06 08:23:50 -06:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
LEGACY_TEMPLATE_DIR_WARNING = """
|
|
|
|
This server's configuration file is using the deprecated 'template_dir' setting in the
|
|
|
|
'sso' section. Support for this setting has been deprecated and will be removed in a
|
|
|
|
future version of Synapse. Server admins should instead use the new
|
|
|
|
'custom_templates_directory' setting documented here:
|
|
|
|
https://matrix-org.github.io/synapse/latest/templates.html
|
|
|
|
---------------------------------------------------------------------------------------"""
|
|
|
|
|
2020-03-02 09:36:32 -07:00
|
|
|
|
2021-02-11 08:05:15 -07:00
|
|
|
@attr.s(frozen=True)
|
|
|
|
class SsoAttributeRequirement:
|
|
|
|
"""Object describing a single requirement for SSO attributes."""
|
|
|
|
|
|
|
|
attribute = attr.ib(type=str)
|
|
|
|
# If a value is not given, than the attribute must simply exist.
|
|
|
|
value = attr.ib(type=Optional[str])
|
|
|
|
|
|
|
|
JSON_SCHEMA = {
|
|
|
|
"type": "object",
|
|
|
|
"properties": {"attribute": {"type": "string"}, "value": {"type": "string"}},
|
|
|
|
"required": ["attribute", "value"],
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-03-02 09:36:32 -07:00
|
|
|
class SSOConfig(Config):
|
|
|
|
"""SSO Configuration"""
|
|
|
|
|
|
|
|
section = "sso"
|
|
|
|
|
|
|
|
def read_config(self, config, **kwargs):
|
2021-07-15 04:02:43 -06:00
|
|
|
sso_config: Dict[str, Any] = config.get("sso") or {}
|
2020-03-02 09:36:32 -07:00
|
|
|
|
2020-08-17 10:05:00 -06:00
|
|
|
# The sso-specific template_dir
|
2021-02-01 08:52:50 -07:00
|
|
|
self.sso_template_dir = sso_config.get("template_dir")
|
2021-09-06 08:23:50 -06:00
|
|
|
if self.sso_template_dir is not None:
|
|
|
|
logger.warning(LEGACY_TEMPLATE_DIR_WARNING)
|
2020-03-02 09:36:32 -07:00
|
|
|
|
2020-08-17 10:05:00 -06:00
|
|
|
# Read templates from disk
|
2021-08-17 06:45:24 -06:00
|
|
|
custom_template_directories = (
|
|
|
|
self.root.server.custom_template_directory,
|
|
|
|
self.sso_template_dir,
|
|
|
|
)
|
|
|
|
|
2020-08-17 10:05:00 -06:00
|
|
|
(
|
2021-01-05 04:25:28 -07:00
|
|
|
self.sso_login_idp_picker_template,
|
2020-08-17 10:05:00 -06:00
|
|
|
self.sso_redirect_confirm_template,
|
|
|
|
self.sso_auth_confirm_template,
|
|
|
|
self.sso_error_template,
|
|
|
|
sso_account_deactivated_template,
|
|
|
|
sso_auth_success_template,
|
2021-01-12 11:19:42 -07:00
|
|
|
self.sso_auth_bad_user_template,
|
2020-08-17 10:05:00 -06:00
|
|
|
) = self.read_templates(
|
|
|
|
[
|
2021-01-05 04:25:28 -07:00
|
|
|
"sso_login_idp_picker.html",
|
2020-08-17 10:05:00 -06:00
|
|
|
"sso_redirect_confirm.html",
|
|
|
|
"sso_auth_confirm.html",
|
|
|
|
"sso_error.html",
|
|
|
|
"sso_account_deactivated.html",
|
|
|
|
"sso_auth_success.html",
|
2021-01-12 11:19:42 -07:00
|
|
|
"sso_auth_bad_user.html",
|
2020-08-17 10:05:00 -06:00
|
|
|
],
|
2021-08-17 06:45:24 -06:00
|
|
|
(td for td in custom_template_directories if td),
|
2020-04-09 11:28:13 -06:00
|
|
|
)
|
2020-08-17 10:05:00 -06:00
|
|
|
|
|
|
|
# These templates have no placeholders, so render them here
|
|
|
|
self.sso_account_deactivated_template = (
|
|
|
|
sso_account_deactivated_template.render()
|
2020-04-17 11:34:55 -06:00
|
|
|
)
|
2020-08-17 10:05:00 -06:00
|
|
|
self.sso_auth_success_template = sso_auth_success_template.render()
|
2020-03-02 09:36:32 -07:00
|
|
|
|
2020-03-02 10:05:09 -07:00
|
|
|
self.sso_client_whitelist = sso_config.get("client_whitelist") or []
|
|
|
|
|
2021-06-21 16:48:57 -06:00
|
|
|
self.sso_update_profile_information = (
|
|
|
|
sso_config.get("update_profile_information") or False
|
|
|
|
)
|
|
|
|
|
2020-03-27 14:24:52 -06:00
|
|
|
# Attempt to also whitelist the server's login fallback, since that fallback sets
|
|
|
|
# the redirect URL to itself (so it can process the login token then return
|
|
|
|
# gracefully to the client). This would make it pointless to ask the user for
|
|
|
|
# confirmation, since the URL the confirmation page would be showing wouldn't be
|
|
|
|
# the client's.
|
2021-02-11 09:16:54 -07:00
|
|
|
# public_baseurl is an optional setting, so we only add the fallback's URL to the
|
|
|
|
# list if it's provided (because we can't figure out what that URL is otherwise).
|
|
|
|
if self.public_baseurl:
|
|
|
|
login_fallback_url = self.public_baseurl + "_matrix/static/client/login"
|
|
|
|
self.sso_client_whitelist.append(login_fallback_url)
|
2020-03-27 14:24:52 -06:00
|
|
|
|
2020-03-02 09:36:32 -07:00
|
|
|
def generate_config_section(self, **kwargs):
|
|
|
|
return """\
|
2020-06-03 14:13:17 -06:00
|
|
|
# Additional settings to use with single-sign on systems such as OpenID Connect,
|
|
|
|
# SAML2 and CAS.
|
2020-03-02 09:36:32 -07:00
|
|
|
#
|
2021-08-17 06:45:24 -06:00
|
|
|
# Server admins can configure custom templates for pages related to SSO. See
|
|
|
|
# https://matrix-org.github.io/synapse/latest/templates.html for more information.
|
|
|
|
#
|
2020-03-02 09:36:32 -07:00
|
|
|
sso:
|
2020-03-02 10:05:09 -07:00
|
|
|
# A list of client URLs which are whitelisted so that the user does not
|
|
|
|
# have to confirm giving access to their account to the URL. Any client
|
|
|
|
# whose URL starts with an entry in the following list will not be subject
|
|
|
|
# to an additional confirmation step after the SSO login is completed.
|
|
|
|
#
|
|
|
|
# WARNING: An entry such as "https://my.client" is insecure, because it
|
|
|
|
# will also match "https://my.client.evil.site", exposing your users to
|
|
|
|
# phishing attacks from evil.site. To avoid this, include a slash after the
|
|
|
|
# hostname: "https://my.client/".
|
|
|
|
#
|
2021-02-11 09:16:54 -07:00
|
|
|
# If public_baseurl is set, then the login fallback page (used by clients
|
|
|
|
# that don't natively support the required login flows) is whitelisted in
|
|
|
|
# addition to any URLs in this list.
|
2020-03-27 14:24:52 -06:00
|
|
|
#
|
2020-03-02 10:05:09 -07:00
|
|
|
# By default, this list is empty.
|
|
|
|
#
|
|
|
|
#client_whitelist:
|
|
|
|
# - https://riot.im/develop
|
|
|
|
# - https://my.custom.client/
|
|
|
|
|
2021-06-21 16:48:57 -06:00
|
|
|
# Uncomment to keep a user's profile fields in sync with information from
|
|
|
|
# the identity provider. Currently only syncing the displayname is
|
|
|
|
# supported. Fields are checked on every SSO login, and are updated
|
|
|
|
# if necessary.
|
|
|
|
#
|
|
|
|
# Note that enabling this option will override user profile information,
|
|
|
|
# regardless of whether users have opted-out of syncing that
|
|
|
|
# information when first signing in. Defaults to false.
|
|
|
|
#
|
|
|
|
#update_profile_information: true
|
2020-03-02 09:36:32 -07:00
|
|
|
"""
|