Merge branch 'main' of https://github.com/authorizerdev/authorizer into fix/forgot-password

This commit is contained in:
Lakhan Samani 2023-12-14 22:45:36 +05:30
commit c9c2789097
8 changed files with 73 additions and 48 deletions

View File

@ -49,17 +49,18 @@ export default function Login({ urlProps }: { urlProps: Record<string, any> }) {
<AuthorizerMagicLinkLogin urlProps={urlProps} /> <AuthorizerMagicLinkLogin urlProps={urlProps} />
)} )}
{(config.is_basic_authentication_enabled || {(config.is_basic_authentication_enabled ||
config.is_mobile_basic_authentication_enabled) && ( config.is_mobile_basic_authentication_enabled) &&
<Footer> !config.is_magic_link_login_enabled && (
<Link <Footer>
to="#" <Link
onClick={() => setView(VIEW_TYPES.FORGOT_PASSWORD)} to="#"
style={{ marginBottom: 10 }} onClick={() => setView(VIEW_TYPES.FORGOT_PASSWORD)}
> style={{ marginBottom: 10 }}
Forgot Password? >
</Link> Forgot Password?
</Footer> </Link>
)} </Footer>
)}
</Fragment> </Fragment>
)} )}
{view === VIEW_TYPES.FORGOT_PASSWORD && ( {view === VIEW_TYPES.FORGOT_PASSWORD && (

View File

@ -21,15 +21,15 @@ func DeactivateAccountResolver(ctx context.Context) (*model.Response, error) {
log.Debug("Failed to get GinContext: ", err) log.Debug("Failed to get GinContext: ", err)
return res, err return res, err
} }
userID, err := token.GetUserIDFromSessionOrAccessToken(gc) tokenData, err := token.GetUserIDFromSessionOrAccessToken(gc)
if err != nil { if err != nil {
log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err) log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err)
return res, err return res, err
} }
log := log.WithFields(log.Fields{ log := log.WithFields(log.Fields{
"user_id": userID, "user_id": tokenData.UserID,
}) })
user, err := db.Provider.GetUserByID(ctx, userID) user, err := db.Provider.GetUserByID(ctx, tokenData.UserID)
if err != nil { if err != nil {
log.Debug("Failed to get user by id: ", err) log.Debug("Failed to get user by id: ", err)
return res, err return res, err

View File

@ -2,12 +2,10 @@ package resolvers
import ( import (
"context" "context"
"encoding/json"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
"github.com/authorizerdev/authorizer/server/cookie" "github.com/authorizerdev/authorizer/server/cookie"
"github.com/authorizerdev/authorizer/server/crypto"
"github.com/authorizerdev/authorizer/server/graph/model" "github.com/authorizerdev/authorizer/server/graph/model"
"github.com/authorizerdev/authorizer/server/memorystore" "github.com/authorizerdev/authorizer/server/memorystore"
"github.com/authorizerdev/authorizer/server/token" "github.com/authorizerdev/authorizer/server/token"
@ -22,31 +20,18 @@ func LogoutResolver(ctx context.Context) (*model.Response, error) {
return nil, err return nil, err
} }
// get fingerprint hash tokenData, err := token.GetUserIDFromSessionOrAccessToken(gc)
fingerprintHash, err := cookie.GetSession(gc)
if err != nil { if err != nil {
log.Debug("Failed to get fingerprint hash: ", err) log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err)
return nil, err return nil, err
} }
decryptedFingerPrint, err := crypto.DecryptAES(fingerprintHash) sessionKey := tokenData.UserID
if err != nil { if tokenData.LoginMethod != "" {
log.Debug("Failed to decrypt fingerprint hash: ", err) sessionKey = tokenData.LoginMethod + ":" + tokenData.UserID
return nil, err
} }
var sessionData token.SessionData memorystore.Provider.DeleteUserSession(sessionKey, tokenData.Nonce)
err = json.Unmarshal([]byte(decryptedFingerPrint), &sessionData)
if err != nil {
return nil, err
}
sessionKey := sessionData.Subject
if sessionData.LoginMethod != "" {
sessionKey = sessionData.LoginMethod + ":" + sessionData.Subject
}
memorystore.Provider.DeleteUserSession(sessionKey, sessionData.Nonce)
cookie.DeleteSession(gc) cookie.DeleteSession(gc)
res := &model.Response{ res := &model.Response{

View File

@ -20,15 +20,15 @@ func ProfileResolver(ctx context.Context) (*model.User, error) {
log.Debug("Failed to get GinContext: ", err) log.Debug("Failed to get GinContext: ", err)
return res, err return res, err
} }
userID, err := token.GetUserIDFromSessionOrAccessToken(gc) tokenData, err := token.GetUserIDFromSessionOrAccessToken(gc)
if err != nil { if err != nil {
log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err) log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err)
return res, err return res, err
} }
log := log.WithFields(log.Fields{ log := log.WithFields(log.Fields{
"user_id": userID, "user_id": tokenData.UserID,
}) })
user, err := db.Provider.GetUserByID(ctx, userID) user, err := db.Provider.GetUserByID(ctx, tokenData.UserID)
if err != nil { if err != nil {
log.Debug("Failed to get user: ", err) log.Debug("Failed to get user: ", err)
return res, err return res, err

View File

@ -36,7 +36,7 @@ func UpdateProfileResolver(ctx context.Context, params model.UpdateProfileInput)
log.Debug("Failed to get GinContext: ", err) log.Debug("Failed to get GinContext: ", err)
return res, err return res, err
} }
userID, err := token.GetUserIDFromSessionOrAccessToken(gc) tokenData, err := token.GetUserIDFromSessionOrAccessToken(gc)
if err != nil { if err != nil {
log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err) log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err)
return res, err return res, err
@ -48,9 +48,9 @@ func UpdateProfileResolver(ctx context.Context, params model.UpdateProfileInput)
return res, fmt.Errorf("please enter at least one param to update") return res, fmt.Errorf("please enter at least one param to update")
} }
log := log.WithFields(log.Fields{ log := log.WithFields(log.Fields{
"user_id": userID, "user_id": tokenData.UserID,
}) })
user, err := db.Provider.GetUserByID(ctx, userID) user, err := db.Provider.GetUserByID(ctx, tokenData.UserID)
if err != nil { if err != nil {
log.Debug("Failed to get user by id: ", err) log.Debug("Failed to get user by id: ", err)
return res, err return res, err

View File

@ -48,7 +48,7 @@ func UpdateUserResolver(ctx context.Context, params model.UpdateUserInput) (*mod
"user_id": params.ID, "user_id": params.ID,
}) })
if params.GivenName == nil && params.FamilyName == nil && params.Picture == nil && params.MiddleName == nil && params.Nickname == nil && params.Email == nil && params.Birthdate == nil && params.Gender == nil && params.PhoneNumber == nil && params.Roles == nil && params.IsMultiFactorAuthEnabled == nil { if params.GivenName == nil && params.FamilyName == nil && params.Picture == nil && params.MiddleName == nil && params.Nickname == nil && params.Email == nil && params.Birthdate == nil && params.Gender == nil && params.PhoneNumber == nil && params.Roles == nil && params.IsMultiFactorAuthEnabled == nil && params.AppData == nil {
log.Debug("No params to update") log.Debug("No params to update")
return res, fmt.Errorf("please enter atleast one param to update") return res, fmt.Errorf("please enter atleast one param to update")
} }

View File

@ -35,6 +35,30 @@ func logoutTests(t *testing.T, s TestSetup) {
assert.NotNil(t, verifyRes) assert.NotNil(t, verifyRes)
accessToken := *verifyRes.AccessToken accessToken := *verifyRes.AccessToken
assert.NotEmpty(t, accessToken) assert.NotEmpty(t, accessToken)
// Test logout with access token
req.Header.Set("Authorization", "Bearer "+accessToken)
logoutRes, err := resolvers.LogoutResolver(ctx)
assert.Nil(t, err)
assert.NotNil(t, logoutRes)
assert.NotEmpty(t, logoutRes.Message)
req.Header.Set("Authorization", "")
// Test logout with session cookie
magicLoginRes, err = resolvers.MagicLinkLoginResolver(ctx, model.MagicLinkLoginInput{
Email: email,
})
assert.NoError(t, err)
assert.NotNil(t, magicLoginRes)
verificationRequest, err = db.Provider.GetVerificationRequestByEmail(ctx, email, constants.VerificationTypeMagicLinkLogin)
assert.NoError(t, err)
assert.NotNil(t, verificationRequest)
verifyRes, err = resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
Token: verificationRequest.Token,
})
assert.NoError(t, err)
assert.NotNil(t, verifyRes)
accessToken = *verifyRes.AccessToken
assert.NotEmpty(t, accessToken)
claims, err := token.ParseJWTToken(accessToken) claims, err := token.ParseJWTToken(accessToken)
assert.NoError(t, err) assert.NoError(t, err)
assert.NotEmpty(t, claims) assert.NotEmpty(t, claims)

View File

@ -482,8 +482,15 @@ func GetIDToken(gc *gin.Context) (string, error) {
return token, nil return token, nil
} }
// SessionOrAccessTokenData is a struct to hold session or access token data
type SessionOrAccessTokenData struct {
UserID string
LoginMethod string
Nonce string
}
// GetUserIDFromSessionOrAccessToken returns the user id from the session or access token // GetUserIDFromSessionOrAccessToken returns the user id from the session or access token
func GetUserIDFromSessionOrAccessToken(gc *gin.Context) (string, error) { func GetUserIDFromSessionOrAccessToken(gc *gin.Context) (*SessionOrAccessTokenData, error) {
// First try to get the user id from the session // First try to get the user id from the session
isSession := true isSession := true
token, err := cookie.GetSession(gc) token, err := cookie.GetSession(gc)
@ -493,22 +500,30 @@ func GetUserIDFromSessionOrAccessToken(gc *gin.Context) (string, error) {
token, err = GetAccessToken(gc) token, err = GetAccessToken(gc)
if err != nil || token == "" { if err != nil || token == "" {
log.Debug("Failed to get access token: ", err) log.Debug("Failed to get access token: ", err)
return "", fmt.Errorf(`unauthorized`) return nil, fmt.Errorf(`unauthorized`)
} }
} }
if isSession { if isSession {
claims, err := ValidateBrowserSession(gc, token) claims, err := ValidateBrowserSession(gc, token)
if err != nil { if err != nil {
log.Debug("Failed to validate session token: ", err) log.Debug("Failed to validate session token: ", err)
return "", fmt.Errorf(`unauthorized`) return nil, fmt.Errorf(`unauthorized`)
} }
return claims.Subject, nil return &SessionOrAccessTokenData{
UserID: claims.Subject,
LoginMethod: claims.LoginMethod,
Nonce: claims.Nonce,
}, nil
} }
// If not session, then validate the access token // If not session, then validate the access token
claims, err := ValidateAccessToken(gc, token) claims, err := ValidateAccessToken(gc, token)
if err != nil { if err != nil {
log.Debug("Failed to validate access token: ", err) log.Debug("Failed to validate access token: ", err)
return "", fmt.Errorf(`unauthorized`) return nil, fmt.Errorf(`unauthorized`)
} }
return claims["sub"].(string), nil return &SessionOrAccessTokenData{
UserID: claims["sub"].(string),
LoginMethod: claims["login_method"].(string),
Nonce: claims["nonce"].(string),
}, nil
} }