Skip to content

fix(clerk-js): Correct signout behavior for multisession #6515

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions .changeset/strong-schools-shine.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
'@clerk/clerk-js': patch
---

Fixing redirect behavior when signing out from a multisession app with multple singed in accounts
36 changes: 36 additions & 0 deletions packages/clerk-js/src/core/__tests__/clerk.test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -809,6 +809,42 @@ describe('Clerk singleton', () => {
expect(sut.navigate).toHaveBeenCalledWith('/after-sign-out');
});
});

it('properly restores auth state from remaining sessions after multisession sign-out', async () => {
const mockClient = {
signedInSessions: [mockSession1, mockSession2],
sessions: [mockSession1, mockSession2],
destroy: mockClientDestroy,
lastActiveSessionId: '1',
};

mockSession1.remove = jest.fn().mockImplementation(() => {
mockClient.signedInSessions = mockClient.signedInSessions.filter(s => s.id !== '1');
mockClient.sessions = mockClient.sessions.filter(s => s.id !== '1');
return Promise.resolve(mockSession1);
});

mockClientFetch.mockReturnValue(Promise.resolve(mockClient));

const sut = new Clerk(productionPublishableKey);
sut.navigate = jest.fn();
await sut.load();

expect(sut.session).toBe(mockSession1);
expect(sut.isSignedIn).toBe(true);

await sut.signOut({ sessionId: '1' });

await waitFor(() => {
expect(mockSession1.remove).toHaveBeenCalled();
expect(mockClientDestroy).not.toHaveBeenCalled();
expect(sut.navigate).toHaveBeenCalledWith('/');
});

expect(mockClient.lastActiveSessionId).toBe('2');
expect(sut.session).toBe(mockSession2);
expect(sut.isSignedIn).toBe(true);
});
Comment on lines +812 to +847
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Great addition; add guard-rail tests for non-current removal and active session selection

This verifies the main regression. Please add:

  • A test ensuring that removing a non-current session does not switch the active session.
  • A test ensuring that when the first remaining session is pending, we pick an active one as next.
  • Optionally assert that the next session’s getToken is invoked to sync cookies.

Example additions you can append near this block:

it('does not switch active session when signing out a non-current session', async () => {
  const mockClient = {
    signedInSessions: [mockSession1, mockSession2],
    sessions: [mockSession1, mockSession2],
    destroy: mockClientDestroy,
    lastActiveSessionId: '1',
  };
  mockClientFetch.mockReturnValue(Promise.resolve(mockClient));
  const sut = new Clerk(productionPublishableKey);
  await sut.load();

  await sut.signOut({ sessionId: '2' });

  await waitFor(() => {
    expect(mockSession2.remove).toHaveBeenCalled();
    expect(sut.session).toBe(mockSession1);
    expect(mockClient.lastActiveSessionId).toBe('1');
  });
});

it('prefers an active next session over pending when switching after current-session sign-out', async () => {
  const active = { ...mockSession2, id: '2', status: 'active', getToken: jest.fn() };
  const pending = { ...mockSession3, id: '3', status: 'pending', getToken: jest.fn() };
  const mockClient = {
    signedInSessions: [pending, active], // pending first to validate selection
    sessions: [mockSession1, pending, active],
    destroy: mockClientDestroy,
    lastActiveSessionId: '1',
  };
  mockSession1.remove = jest.fn().mockImplementation(() => {
    mockClient.signedInSessions = mockClient.signedInSessions.filter(s => s.id !== '1');
    mockClient.sessions = mockClient.sessions.filter(s => s.id !== '1');
    return Promise.resolve(mockSession1);
  });
  mockClientFetch.mockReturnValue(Promise.resolve(mockClient));

  const sut = new Clerk(productionPublishableKey);
  await sut.load();
  await sut.signOut({ sessionId: '1' });

  await waitFor(() => {
    expect(sut.session).toBe(active);
    expect(mockClient.lastActiveSessionId).toBe('2');
    // If you adopt token sync, assert:
    // expect(active.getToken).toHaveBeenCalled();
  });
});
🤖 Prompt for AI Agents
In packages/clerk-js/src/core/__tests__/clerk.test.ts around lines 812 to 847,
the reviewer asks for two additional guard-rail tests: one ensuring removing a
non-current session does not switch the active session, and one ensuring that
when choosing the next session after removing the current session we prefer an
active session over a pending one (and optionally call its getToken to sync
cookies). Add a test that creates mockClient with signedInSessions
[mockSession1, mockSession2], sessions [mockSession1, mockSession2],
lastActiveSessionId '1', stub mockClientFetch to return it, load sut, call
signOut({ sessionId: '2' }), and assert mockSession2.remove was called,
sut.session remains mockSession1, and mockClient.lastActiveSessionId stays '1'.
Add a second test that constructs pending and active mocks (pending first in
signedInSessions), sets mockSession1.remove to remove session1 from client
arrays, stub mockClientFetch, load sut, signOut({ sessionId: '1' }), and assert
sut.session becomes the active session, mockClient.lastActiveSessionId updates
to the active id, and optionally assert active.getToken was called to sync
cookies.

Comment on lines +813 to +847
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add assertions for cookie/token sync and event emissions to prevent regressions

To ensure reload consistency, assert that the next session’s token is propagated or that a TokenUpdate was emitted. Also validate that UserSignOut is not emitted when removing a non-current session.

Examples:

  • Spy on eventBus.emit for events.TokenUpdate and verify it’s called with the next session token.
  • For non-current sign-out, assert eventBus.emit is not called with events.UserSignOut.
  • Optionally assert nextSession.getToken() is called if you choose that path.

I can draft these test additions if helpful.

🤖 Prompt for AI Agents
In packages/clerk-js/src/core/__tests__/clerk.test.ts around lines 813 to 847,
the test lacks assertions that the next session’s token is synced and that
correct events are emitted/omitted after removing a non-current session; add a
spy on eventBus.emit, assert that events.TokenUpdate is emitted with the next
session token (or assert nextSession.getToken() is called and its value is
propagated), and assert that events.UserSignOut is NOT emitted for the removed
non-current session; keep existing assertions about navigation and client
destruction and place the new event/token assertions after awaiting signOut so
they run against the final state.

});

describe('.navigate(to)', () => {
Expand Down
27 changes: 26 additions & 1 deletion packages/clerk-js/src/core/clerk.ts
Original file line number Diff line number Diff line change
Expand Up @@ -531,8 +531,33 @@ export class Clerk implements ClerkInterface {

await session?.remove();

if (this.client && this.client.signedInSessions.length > 0) {
const nextSession = this.client.signedInSessions[0];
if (nextSession) {
this.client.lastActiveSessionId = nextSession.id;
this.#setAccessors(nextSession);
this.#emit();
}
}
Comment on lines +534 to +541
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

⚠️ Potential issue

Do not change the active session when a non-current session is removed.

This block always switches to the first remaining session, even when the removed session is not the current one. That will unexpectedly flip the active session for the user.

Restrict the “pick next session” logic to only when the removed session was the current session. Optionally prefer an “active” session over “pending”.

-    if (this.client && this.client.signedInSessions.length > 0) {
-      const nextSession = this.client.signedInSessions[0];
-      if (nextSession) {
-        this.client.lastActiveSessionId = nextSession.id;
-        this.#setAccessors(nextSession);
-        this.#emit();
-      }
-    }
+    if (shouldSignOutCurrent && this.client && this.client.signedInSessions.length > 0) {
+      // Prefer an active session if available; otherwise fall back to the first remaining session
+      const nextSession =
+        this.client.signedInSessions.find(s => s.status === 'active') ?? this.client.signedInSessions[0];
+      this.client.lastActiveSessionId = nextSession.id;
+      this.#setAccessors(nextSession);
+      this.#emit();
+    }

Committable suggestion skipped: line range outside the PR's diff.

🤖 Prompt for AI Agents
In packages/clerk-js/src/core/clerk.ts around lines 534 to 541, the code
currently always picks the first remaining signed-in session and makes it
active; change it so this "pick next session" logic only runs if the session
that was removed was the current/lastActiveSession. Concretely: compare the
removed session id to this.client.lastActiveSessionId and only if they match,
select the next session (prefer one with status 'active' then fallback to first)
and then set this.client.lastActiveSessionId, call #setAccessors(nextSession)
and #emit(); otherwise do nothing to avoid flipping active session. Also handle
the no-sessions case by clearing lastActiveSessionId and accessors if needed.

Comment on lines +534 to +541
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

⚠️ Potential issue

Only switch active session if you signed out the current session; prefer an active next session and sync cookies

Currently this always selects the first remaining session and updates state, even when removing a non-active session. That can inadvertently switch the active session. Also, the chosen next session might be pending, and cookies are not synced to the new session.

Consider:

  • Switch to a next session only if shouldSignOutCurrent is true.
  • Prefer an active session if available; fall back to the first remaining session.
  • Sync cookies by fetching a token for the new session before emitting, mirroring setActive behavior.
-    if (this.client && this.client.signedInSessions.length > 0) {
-      const nextSession = this.client.signedInSessions[0];
-      if (nextSession) {
-        this.client.lastActiveSessionId = nextSession.id;
-        this.#setAccessors(nextSession);
-        this.#emit();
-      }
-    }
+    if (shouldSignOutCurrent && this.client && this.client.signedInSessions.length > 0) {
+      // Prefer an active session; fall back to the first remaining session
+      const nextSession =
+        (this.client.signedInSessions.find(s => s.status === 'active') as SignedInSessionResource | undefined) ??
+        this.client.signedInSessions[0];
+      if (nextSession) {
+        this.client.lastActiveSessionId = nextSession.id;
+        // Sync cookies (__session, __client_uat) to the new session before emitting
+        try {
+          // Touch when in active tab or for non-standard browsers, similar to setActive
+          if (inActiveBrowserTab() || !this.#options.standardBrowser) {
+            await this.#touchCurrentSession(nextSession);
+          }
+          await nextSession.getToken();
+        } catch {
+          // If token retrieval fails, proceed with best-effort state update
+        }
+        this.#setAccessors(nextSession);
+        this.#emit();
+      }
+    }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
if (this.client && this.client.signedInSessions.length > 0) {
const nextSession = this.client.signedInSessions[0];
if (nextSession) {
this.client.lastActiveSessionId = nextSession.id;
this.#setAccessors(nextSession);
this.#emit();
}
}
if (shouldSignOutCurrent && this.client && this.client.signedInSessions.length > 0) {
// Prefer an active session; fall back to the first remaining session
const nextSession =
(this.client.signedInSessions.find(s => s.status === 'active') as SignedInSessionResource | undefined) ??
this.client.signedInSessions[0];
if (nextSession) {
this.client.lastActiveSessionId = nextSession.id;
// Sync cookies (__session, __client_uat) to the new session before emitting
try {
// Touch when in active tab or for non-standard browsers, similar to setActive
if (inActiveBrowserTab() || !this.#options.standardBrowser) {
await this.#touchCurrentSession(nextSession);
}
await nextSession.getToken();
} catch {
// If token retrieval fails, proceed with best-effort state update
}
this.#setAccessors(nextSession);
this.#emit();
}
}
🤖 Prompt for AI Agents
In packages/clerk-js/src/core/clerk.ts around lines 534 to 541, the code always
picks the first remaining session and switches active state immediately when a
session is removed; change this so that we only switch the active session when
shouldSignOutCurrent is true, prefer an already-active session from
this.client.signedInSessions (fall back to the first remaining session if none
are active), and before calling #setAccessors and #emit fetch and apply the
session token (sync cookies) the same way setActive does — i.e., obtain the
token for the chosen session and update cookie/auth state, then set
lastActiveSessionId, call #setAccessors and finally #emit; keep all existing
guards for client and session existence.

Comment on lines +534 to +541
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Only switch active session when signing out the current session; also sync auth token for the new session

Currently the next-session selection runs even when a non-current session is removed, which can inadvertently change the active session if the array ordering differs from the current. Also, after switching, cookies/tokens are not refreshed, risking an inconsistent state on reload.

  • Guard the switch with shouldSignOutCurrent.
  • After switching, emit a TokenUpdate (or call getToken) to sync cookies to the new session.
-    if (this.client && this.client.signedInSessions.length > 0) {
-      const nextSession = this.client.signedInSessions[0];
-      if (nextSession) {
-        this.client.lastActiveSessionId = nextSession.id;
-        this.#setAccessors(nextSession);
-        this.#emit();
-      }
-    }
+    if (shouldSignOutCurrent && this.client && this.client.signedInSessions.length > 0) {
+      // Prefer selecting based on lastActiveSessionId if present; otherwise first signed-in session.
+      const nextSession =
+        this.client.signedInSessions.find(s => s.id === this.client.lastActiveSessionId) ??
+        this.client.signedInSessions[0];
+
+      if (nextSession) {
+        this.client.lastActiveSessionId = nextSession.id;
+        this.#setAccessors(nextSession);
+        // Ensure downstream consumers receive up-to-date auth. Option A (no network):
+        eventBus.emit(events.TokenUpdate, { token: nextSession.lastActiveToken });
+        // Option B (safer but async): await nextSession.getToken().catch(() => eventBus.emit(events.TokenUpdate, { token: null }));
+        this.#emit();
+      }
+    }
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
if (this.client && this.client.signedInSessions.length > 0) {
const nextSession = this.client.signedInSessions[0];
if (nextSession) {
this.client.lastActiveSessionId = nextSession.id;
this.#setAccessors(nextSession);
this.#emit();
}
}
if (shouldSignOutCurrent && this.client && this.client.signedInSessions.length > 0) {
// Prefer selecting based on lastActiveSessionId if present; otherwise first signed-in session.
const nextSession =
this.client.signedInSessions.find(s => s.id === this.client.lastActiveSessionId) ??
this.client.signedInSessions[0];
if (nextSession) {
this.client.lastActiveSessionId = nextSession.id;
this.#setAccessors(nextSession);
// Ensure downstream consumers receive up-to-date auth. Option A (no network):
eventBus.emit(events.TokenUpdate, { token: nextSession.lastActiveToken });
// Option B (safer but async): await nextSession.getToken().catch(() => eventBus.emit(events.TokenUpdate, { token: null }));
this.#emit();
}
}
🤖 Prompt for AI Agents
In packages/clerk-js/src/core/clerk.ts around lines 534 to 541, the code
unconditionally picks the first signedInSessions entry which can change the
active session when a different (non-current) session is removed and does not
refresh auth cookies/tokens; wrap the next-session selection and assignment
behind a check for shouldSignOutCurrent so we only switch when we intended to
sign out the current session, and after setting lastActiveSessionId and calling
#setAccessors/#emit, trigger a TokenUpdate or call getToken() (or equivalent
token-refresh flow) to sync cookies/tokens for the newly active session so state
remains consistent on reload.


if (shouldSignOutCurrent) {
await executeSignOut();
const tracker = createBeforeUnloadTracker(this.#options.standardBrowser);

eventBus.emit(events.UserSignOut, null);

await tracker.track(async () => {
if (signOutCallback) {
await signOutCallback();
} else {
await this.navigate(redirectUrl);
}
});

if (tracker.isUnloading()) {
return;
}

await onAfterSetActive();
}
Comment on lines +544 to 561
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Verification agent

🧩 Analysis chain

Verify side effects of UserSignOut during multi-session switch; ensure cookies aren’t cleared after selecting the next session

In the multi-session/current-session path, you emit UserSignOut after switching to the next session. If any listener clears __session cookies on this event, the tab may end up signed-out on reload despite the in-memory switch. Either:

  • Ensure UserSignOut does not clear cookies when a next active session exists, or
  • Re-sync cookies (TokenUpdate or getToken) after the tracker when not unloading.

To confirm event side effects and avoid regressions, search for the UserSignOut handlers:

If a cookie-clearing listener exists, consider moving TokenUpdate re-sync after the tracker when tracker.isUnloading() is false, or introduce a specialized event for multi-session single sign-out that does not clear cookies globally.


🏁 Script executed:

#!/bin/bash
# Find all listeners reacting to UserSignOut and inspect for cookie-clearing.
rg -n "UserSignOut" -A 8 -B 4

Length of output: 8105


🏁 Script executed:

#!/bin/bash
# Inspect AuthCookieService.handleSignOut implementation to see if it clears cookies unconditionally
rg -n "handleSignOut" -A 10 -B 2 packages/clerk-js/src/core/auth/AuthCookieService.ts

Length of output: 1027


🏁 Script executed:

#!/bin/bash
# Find TokenUpdate handler in AuthCookieService to see when cookies are set/updated
rg -n "eventBus.on" -A 10 -B 0 packages/clerk-js/src/core/auth/AuthCookieService.ts

Length of output: 728


Prevent clearing cookies on multi‐session switch

We confirmed that AuthCookieService.handleSignOut() (packages/clerk-js/src/core/auth/AuthCookieService.ts:217–221) unconditionally removes both the session and active‐context cookies whenever events.UserSignOut is emitted. In the “switch to next session” path (packages/clerk-js/src/core/clerk.ts:544–561), you’re emitting UserSignOut before the in‐memory session swap, causing those cookies to be wiped and leading to an unintended sign-out on reload.

To fix this, pick one of two approaches:

• Introduce a new “session switch” event that only signals other tabs (via broadcast) and doesn’t trigger cookie clearance:
– Define events.SessionSwitch = 'user:sessionSwitch'.
– In the multi-session branch, replace
ts eventBus.emit(events.UserSignOut, null);
with
ts eventBus.emit(events.SessionSwitch, null);
– Leave the existing UserSignOut listeners untouched (they still clear cookies on real sign-out).

• Or, re-sync cookies immediately after the in-memory switch when not unloading:

  1. Keep emitting UserSignOut.
  2. After
    await tracker.track(/*…*/);
    if (tracker.isUnloading()) return;
    await onAfterSetActive();
    insert:
    // restore cookies for the newly active session
    const token = this.session?.token ?? null;
    eventBus.emit(events.TokenUpdate, { token });

Locations to update:

  • packages/clerk-js/src/core/clerk.ts:544–561
  • packages/clerk-js/src/core/events.ts (add SessionSwitch if using the first approach)
  • packages/clerk-js/src/core/auth/AuthCookieService.ts (no change if you use dedicated switch event; otherwise ensure token re-sync is wired up)

};

Expand Down