pages-core
pages-core copied to clipboard
Feat disable user check 3957
Changes proposed in this pull request:
- Disable checking cloud.gov Pages/Federalist membership for external auth
- Enabled checking site referrer information to see that the Netlify CMS app is running at a cloud.gov registered domain
- Note: An Events API call was added to log an audit even for each external authentication request. It is currently only logging the
refererand also uses a dummySitemodel to ensure the method doesn't error. - Towards #3957
security considerations
External users are no longer checked to see that they use cloud.gov Pages/Federalist but they are instead checked to see if the site Referer is a cloud.gov domain (generated url) or registered domain (by querying the Sites list). There is an additional (existing) check implemented by netlify-cms directly which ensures the OAuth'ed GitHub user has write access to the site they'd like to edit.
@drewbo should we close this out?
@apburnes I think we didn't get a clear answer ever on how this would affect our various security/compliance boundaries; are we still interested in pursuing this change?
I put https://github.com/cloud-gov/pages-core/issues/3957 into this IP sprint so we can review it again.
I just noticed this again. What's its status?
I think we need a "product + security" review of this before proceeding. Basically:
- Do we want non-users to be able to make changes to the repo and kickoff builds (this is possible either way via the Github UI and somewhat dependent upon what we do with access tokens)?
- What are the security ramifications of making that change?
- What are the security ramifications of having an open endpoint for Github authentication
- General code review:
- Is our current check for "is this request coming from one our sites" sufficient? (probably no)
- How should we handle event logging for this?
Not implementing