Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Production deploy of 2020-03 through 2020-11 #349

Merged
merged 78 commits into from
Nov 11, 2020
Merged

Production deploy of 2020-03 through 2020-11 #349

merged 78 commits into from
Nov 11, 2020

Conversation

gene1wood
Copy link
Contributor

@gene1wood gene1wood commented Nov 11, 2020

This deploys the following PRs to production

This should be a near no-op for production which has already been manually updated

$ ./uploader_rules.py --dry-run --rules-dir ../auth0-deploy/rules
[13:42:40] DEBUG [__main__.<module>:81] Got access token for client_id:2t3y42Ads6RTXoWOulizFy0VedhUDQIa
[13:42:40] DEBUG [__main__.<module>:88] Loaded 25 remote rules from current Auth0 deployment
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/temporary-LDAP-re-reintegration.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/temporary-LDAP-re-reintegration.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in temporary-LDAP-re-reintegration :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/SAML-Convercent-Community.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/SAML-Convercent-Community.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in SAML-Convercent-Community :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/configuration-dumper.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/configuration-dumper.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in configuration-dumper :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/AWS-Federated-AMR.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/AWS-Federated-AMR.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in AWS-Federated-AMR :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/SAML-Braintree-attribute.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/SAML-Braintree-attribute.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in SAML-Braintree-attribute :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/force-ldap-logins-over-ldap.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/force-ldap-logins-over-ldap.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in force-ldap-logins-over-ldap :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/SAML-configuration-mapping.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/SAML-configuration-mapping.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in SAML-configuration-mapping :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/duosecurity.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/duosecurity.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in duosecurity :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/HRIS-is-staff.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/HRIS-is-staff.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in HRIS-is-staff :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/activate-new-users-in-CIS.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/activate-new-users-in-CIS.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in activate-new-users-in-CIS :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/Everyone-is-in-the-everyone-group.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/Everyone-is-in-the-everyone-group.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in Everyone-is-in-the-everyone-group :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/Global-Function-Declarations.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/Global-Function-Declarations.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in Global-Function-Declarations :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/default-deny-for-maintenance.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/default-deny-for-maintenance.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in default-deny-for-maintenance :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/SAML-gcp-gsuite.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/SAML-gcp-gsuite.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in SAML-gcp-gsuite :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/security-block-ips.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/security-block-ips.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in security-block-ips :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/CIS-Claims-fixups.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/CIS-Claims-fixups.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in CIS-Claims-fixups :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/AccessRules.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/AccessRules.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in AccessRules :
[13:42:40] DEBUG [__main__.<module>:175] --- auth0-AccessRules

[13:42:40] DEBUG [__main__.<module>:175] +++ local-AccessRules

[13:42:40] DEBUG [__main__.<module>:175] @@ -177,6 +177,7 @@

[13:42:40] DEBUG [__main__.<module>:175]          }
[13:42:40] DEBUG [__main__.<module>:175]  
[13:42:40] DEBUG [__main__.<module>:175]          // Check if the user is authorized to access
[13:42:40] DEBUG [__main__.<module>:175] +        // A user is authorized if they are a member of any authorized_groups or if they are one of the authorized_users
[13:42:40] DEBUG [__main__.<module>:175]          if ((app.authorized_users.length > 0 ) && (app.authorized_users.indexOf(user.email) >= 0)) {
[13:42:40] DEBUG [__main__.<module>:175]            authorized = true;
[13:42:40] DEBUG [__main__.<module>:175]          // Same dance as above, but for groups
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/SAML-Navex-partition-id.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/SAML-Navex-partition-id.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in SAML-Navex-partition-id :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/temporary-hrdata.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/temporary-hrdata.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in temporary-hrdata :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/SAML-lgtm.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/SAML-lgtm.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in SAML-lgtm :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/temporary-update-at-conformance.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/temporary-update-at-conformance.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in temporary-update-at-conformance :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/restricted-users.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/restricted-users.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in restricted-users :
[13:42:40] DEBUG [__main__.<module>:175] --- auth0-restricted-users

[13:42:40] DEBUG [__main__.<module>:175] +++ local-restricted-users

[13:42:40] DEBUG [__main__.<module>:175] @@ -35,7 +35,7 @@

[13:42:40] DEBUG [__main__.<module>:175]      // Remove all group but what's allowed (IntranetWiki) just in case
[13:42:40] DEBUG [__main__.<module>:175]      console.log(`User is restricted, wiping group data for ${user.user_id}`);
[13:42:40] DEBUG [__main__.<module>:175]      user.app_metadata = user.app_metadata || {};
[13:42:40] DEBUG [__main__.<module>:175] -    const groups_to_add = ['IntranetWiki', 'restricted_users'];
[13:42:40] DEBUG [__main__.<module>:175] +    const groups_to_add = ['IntranetWiki'];
[13:42:40] DEBUG [__main__.<module>:175]      user.app_metadata.groups = groups_to_add;
[13:42:40] DEBUG [__main__.<module>:175]      user.groups = groups_to_add;
[13:42:40] DEBUG [__main__.<module>:175]      user.ldap_groups = groups_to_add;
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/aai.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/aai.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in aai :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/link-users-by-email-with-metadata.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/link-users-by-email-with-metadata.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in link-users-by-email-with-metadata :
[13:42:40] DEBUG [__main__.<module>:124] Reading local rule configuration ../auth0-deploy/rules/SAML-test-mozilla-com-google.json
[13:42:40] DEBUG [__main__.<module>:138] Reading local rule code ../auth0-deploy/rules/SAML-test-mozilla-com-google.js
[13:42:40] DEBUG [__main__.<module>:169] Difference found in SAML-test-mozilla-com-google :
[13:42:40] DEBUG [__main__.<module>:186] Found 25 local rules
[13:42:40] DEBUG [__main__.<module>:194] Found 0 rules that not longer exist locally and will be deleted remotely
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule temporary-LDAP-re-reintegration (rul_AjXuFWzxKuxU4BVE) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule SAML-Convercent-Community (rul_wvarCznyIOa6GzNr) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule configuration-dumper (rul_3o2aRc4u6GdSTaI8) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule AWS-Federated-AMR (rul_7e5j3U2UknqbF5oj) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule SAML-Braintree-attribute (rul_pzGmkSvSqUkq1Z7P) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule force-ldap-logins-over-ldap (rul_y6xXV2d8w410CECP) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule SAML-configuration-mapping (rul_zsufGEmKzhxDI2LU) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule duosecurity (rul_T258JgivrEe3CA5Y) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule HRIS-is-staff (rul_1kV3c7rM5wFvBejL) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule activate-new-users-in-CIS (rul_SIn3HlLdD3CB250l) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule Everyone-is-in-the-everyone-group (rul_AJUv6InkjtFycigG) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule Global-Function-Declarations (rul_1vHjz6tOZ4n3t4ij) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule default-deny-for-maintenance (rul_xPZp6tWbEXhOUtjz) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule SAML-gcp-gsuite (rul_Ni1E5hJ8YLldt2ZX) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule security-block-ips (rul_K3dHq1La3jhjD9m7) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule CIS-Claims-fixups (rul_eAwDJ0Pk6HkYgKFT) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule AccessRules (rul_Y4xta4VzQpIz5pGN) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule SAML-Navex-partition-id (rul_U4D19JIT9vnwBZJY) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule temporary-hrdata (rul_4sCpIquDIjhViJCx) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule SAML-lgtm (rul_9nBLyVeKzG8JV88b) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule temporary-update-at-conformance (rul_9WQf1MI49RF0qvYq) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule restricted-users (rul_Q1sY1rtZWm2Twp8n) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule aai (rul_4rI7wUGgV3tje2w7) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule link-users-by-email-with-metadata (rul_C7qqHcHtKGLhS2J1) on Auth0
[13:42:40] DEBUG [__main__.<module>:227] [~] Dry Run : Action not taken : Updating rule SAML-test-mozilla-com-google (rul_d20dQK2mEMVOatGU) on Auth0

april and others added 30 commits March 3, 2020 13:37
Clean up rules and then add tests for them
Bumps [acorn](https://github.com/acornjs/acorn) from 5.7.3 to 5.7.4.
- [Release notes](https://github.com/acornjs/acorn/releases)
- [Commits](acornjs/acorn@5.7.3...5.7.4)

Signed-off-by: dependabot[bot] <[email protected]>
Minor code tweaks to fix validation
…s/acorn-5.7.4

Bump acorn from 5.7.3 to 5.7.4 in /tests
april and others added 27 commits May 20, 2020 17:13
* Documenting where privateKey comes from
* Switching to await in async functions
* Setting `login_method`, which was missed before
* Skipping null attributes
Add direct creation of users in CIS from Auth0
Signed-off-by: April King <[email protected]>
Signed-off-by: April King <[email protected]>
Add fix for prod firefox accounts
Add clarifying comment about group user logical operator
Update the CIS user creation login to look at linked accounts
Add chat.mozilla.org, prod testrp and Udemy to restricted user rule
@gene1wood gene1wood requested a review from april November 11, 2020 21:34
@gene1wood gene1wood merged commit 7ee53ca into production Nov 11, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants