Skip to content

Commit ed3100c

Browse files
committed
fix: allow logout using access token
1 parent 0a5357c commit ed3100c

File tree

6 files changed

+60
-36
lines changed

6 files changed

+60
-36
lines changed

server/resolvers/deactivate_account.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,15 +21,15 @@ func DeactivateAccountResolver(ctx context.Context) (*model.Response, error) {
2121
log.Debug("Failed to get GinContext: ", err)
2222
return res, err
2323
}
24-
userID, err := token.GetUserIDFromSessionOrAccessToken(gc)
24+
tokenData, err := token.GetUserIDFromSessionOrAccessToken(gc)
2525
if err != nil {
2626
log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err)
2727
return res, err
2828
}
2929
log := log.WithFields(log.Fields{
30-
"user_id": userID,
30+
"user_id": tokenData.UserID,
3131
})
32-
user, err := db.Provider.GetUserByID(ctx, userID)
32+
user, err := db.Provider.GetUserByID(ctx, tokenData.UserID)
3333
if err != nil {
3434
log.Debug("Failed to get user by id: ", err)
3535
return res, err

server/resolvers/logout.go

Lines changed: 6 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,10 @@ package resolvers
22

33
import (
44
"context"
5-
"encoding/json"
65

76
log "github.com/sirupsen/logrus"
87

98
"github.com/authorizerdev/authorizer/server/cookie"
10-
"github.com/authorizerdev/authorizer/server/crypto"
119
"github.com/authorizerdev/authorizer/server/graph/model"
1210
"github.com/authorizerdev/authorizer/server/memorystore"
1311
"github.com/authorizerdev/authorizer/server/token"
@@ -22,31 +20,18 @@ func LogoutResolver(ctx context.Context) (*model.Response, error) {
2220
return nil, err
2321
}
2422

25-
// get fingerprint hash
26-
fingerprintHash, err := cookie.GetSession(gc)
23+
tokenData, err := token.GetUserIDFromSessionOrAccessToken(gc)
2724
if err != nil {
28-
log.Debug("Failed to get fingerprint hash: ", err)
25+
log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err)
2926
return nil, err
3027
}
3128

32-
decryptedFingerPrint, err := crypto.DecryptAES(fingerprintHash)
33-
if err != nil {
34-
log.Debug("Failed to decrypt fingerprint hash: ", err)
35-
return nil, err
36-
}
37-
38-
var sessionData token.SessionData
39-
err = json.Unmarshal([]byte(decryptedFingerPrint), &sessionData)
40-
if err != nil {
41-
return nil, err
42-
}
43-
44-
sessionKey := sessionData.Subject
45-
if sessionData.LoginMethod != "" {
46-
sessionKey = sessionData.LoginMethod + ":" + sessionData.Subject
29+
sessionKey := tokenData.UserID
30+
if tokenData.LoginMethod != "" {
31+
sessionKey = tokenData.LoginMethod + ":" + tokenData.UserID
4732
}
4833

49-
memorystore.Provider.DeleteUserSession(sessionKey, sessionData.Nonce)
34+
memorystore.Provider.DeleteUserSession(sessionKey, tokenData.Nonce)
5035
cookie.DeleteSession(gc)
5136

5237
res := &model.Response{

server/resolvers/profile.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,15 @@ func ProfileResolver(ctx context.Context) (*model.User, error) {
2020
log.Debug("Failed to get GinContext: ", err)
2121
return res, err
2222
}
23-
userID, err := token.GetUserIDFromSessionOrAccessToken(gc)
23+
tokenData, err := token.GetUserIDFromSessionOrAccessToken(gc)
2424
if err != nil {
2525
log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err)
2626
return res, err
2727
}
2828
log := log.WithFields(log.Fields{
29-
"user_id": userID,
29+
"user_id": tokenData.UserID,
3030
})
31-
user, err := db.Provider.GetUserByID(ctx, userID)
31+
user, err := db.Provider.GetUserByID(ctx, tokenData.UserID)
3232
if err != nil {
3333
log.Debug("Failed to get user: ", err)
3434
return res, err

server/resolvers/update_profile.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ func UpdateProfileResolver(ctx context.Context, params model.UpdateProfileInput)
3636
log.Debug("Failed to get GinContext: ", err)
3737
return res, err
3838
}
39-
userID, err := token.GetUserIDFromSessionOrAccessToken(gc)
39+
tokenData, err := token.GetUserIDFromSessionOrAccessToken(gc)
4040
if err != nil {
4141
log.Debug("Failed GetUserIDFromSessionOrAccessToken: ", err)
4242
return res, err
@@ -48,9 +48,9 @@ func UpdateProfileResolver(ctx context.Context, params model.UpdateProfileInput)
4848
return res, fmt.Errorf("please enter at least one param to update")
4949
}
5050
log := log.WithFields(log.Fields{
51-
"user_id": userID,
51+
"user_id": tokenData.UserID,
5252
})
53-
user, err := db.Provider.GetUserByID(ctx, userID)
53+
user, err := db.Provider.GetUserByID(ctx, tokenData.UserID)
5454
if err != nil {
5555
log.Debug("Failed to get user by id: ", err)
5656
return res, err

server/test/logout_test.go

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,30 @@ func logoutTests(t *testing.T, s TestSetup) {
3535
assert.NotNil(t, verifyRes)
3636
accessToken := *verifyRes.AccessToken
3737
assert.NotEmpty(t, accessToken)
38+
// Test logout with access token
39+
req.Header.Set("Authorization", "Bearer "+accessToken)
40+
logoutRes, err := resolvers.LogoutResolver(ctx)
41+
assert.Nil(t, err)
42+
assert.NotNil(t, logoutRes)
43+
assert.NotEmpty(t, logoutRes.Message)
44+
req.Header.Set("Authorization", "")
45+
46+
// Test logout with session cookie
47+
magicLoginRes, err = resolvers.MagicLinkLoginResolver(ctx, model.MagicLinkLoginInput{
48+
Email: email,
49+
})
50+
assert.NoError(t, err)
51+
assert.NotNil(t, magicLoginRes)
52+
verificationRequest, err = db.Provider.GetVerificationRequestByEmail(ctx, email, constants.VerificationTypeMagicLinkLogin)
53+
assert.NoError(t, err)
54+
assert.NotNil(t, verificationRequest)
55+
verifyRes, err = resolvers.VerifyEmailResolver(ctx, model.VerifyEmailInput{
56+
Token: verificationRequest.Token,
57+
})
58+
assert.NoError(t, err)
59+
assert.NotNil(t, verifyRes)
60+
accessToken = *verifyRes.AccessToken
61+
assert.NotEmpty(t, accessToken)
3862
claims, err := token.ParseJWTToken(accessToken)
3963
assert.NoError(t, err)
4064
assert.NotEmpty(t, claims)

server/token/auth_token.go

Lines changed: 21 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -482,8 +482,15 @@ func GetIDToken(gc *gin.Context) (string, error) {
482482
return token, nil
483483
}
484484

485+
// SessionOrAccessTokenData is a struct to hold session or access token data
486+
type SessionOrAccessTokenData struct {
487+
UserID string
488+
LoginMethod string
489+
Nonce string
490+
}
491+
485492
// GetUserIDFromSessionOrAccessToken returns the user id from the session or access token
486-
func GetUserIDFromSessionOrAccessToken(gc *gin.Context) (string, error) {
493+
func GetUserIDFromSessionOrAccessToken(gc *gin.Context) (*SessionOrAccessTokenData, error) {
487494
// First try to get the user id from the session
488495
isSession := true
489496
token, err := cookie.GetSession(gc)
@@ -493,22 +500,30 @@ func GetUserIDFromSessionOrAccessToken(gc *gin.Context) (string, error) {
493500
token, err = GetAccessToken(gc)
494501
if err != nil || token == "" {
495502
log.Debug("Failed to get access token: ", err)
496-
return "", fmt.Errorf(`unauthorized`)
503+
return nil, fmt.Errorf(`unauthorized`)
497504
}
498505
}
499506
if isSession {
500507
claims, err := ValidateBrowserSession(gc, token)
501508
if err != nil {
502509
log.Debug("Failed to validate session token: ", err)
503-
return "", fmt.Errorf(`unauthorized`)
510+
return nil, fmt.Errorf(`unauthorized`)
504511
}
505-
return claims.Subject, nil
512+
return &SessionOrAccessTokenData{
513+
UserID: claims.Subject,
514+
LoginMethod: claims.LoginMethod,
515+
Nonce: claims.Nonce,
516+
}, nil
506517
}
507518
// If not session, then validate the access token
508519
claims, err := ValidateAccessToken(gc, token)
509520
if err != nil {
510521
log.Debug("Failed to validate access token: ", err)
511-
return "", fmt.Errorf(`unauthorized`)
522+
return nil, fmt.Errorf(`unauthorized`)
512523
}
513-
return claims["sub"].(string), nil
524+
return &SessionOrAccessTokenData{
525+
UserID: claims["sub"].(string),
526+
LoginMethod: claims["login_method"].(string),
527+
Nonce: claims["nonce"].(string),
528+
}, nil
514529
}

0 commit comments

Comments
 (0)