-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bug fix: SAML_LOGIN_ENABLED setting logic #5784
Conversation
This change is very important for redash admin users with SAML settings. |
I'm not currently contributing to the Redash project. |
Highly recommended this merge to the trunk branch, so that I don't need to set the redundant env by |
ping @arikfr |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
@acefei |
This is not related to the Pull Request directly, but I assume that the author or followers might have SAML enabled for their deployment and should be aware of the following Security Advisory: #5961. This affects all Redash versions and should be patched immediately. |
What type of PR is this?
Description
I would like to point out that an existing
SAML_LOGIN_ENABLED
may have inappropriately strict conditions for it to be true.I first identified this problem as a bug in the following PR, which I attach as a reference:
getredash/contrib-helm-chart#122
In short, due to a change merged from v10 in PR #5175, SAML cannot be enabled at startup unless an environment variable
REDASH_SAML_SSO_URL
is set, but this variable is actually unnecessary in the case of dynamic SAML login.So I'm adding a new conditional branch to avoid
SAML_SSO_URL != ""
when the SAML login type is not static.How is this tested?
Related Tickets & Documents
Mobile & Desktop Screenshots/Recordings (if there are UI changes)