feat: automatic termination of older sessions on login (temporary until release 4);
fix: login controller method not returning tokens
This commit is contained in:
@@ -50,7 +50,6 @@ func NewAuthController(_log *zap.Logger, as services.AuthService) AuthController
|
|||||||
return &authControllerImpl{log: _log, authService: as}
|
return &authControllerImpl{log: _log, authService: as}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Login implements AuthController.
|
|
||||||
// @Summary Acquire tokens via login credentials (and 2FA code if needed)
|
// @Summary Acquire tokens via login credentials (and 2FA code if needed)
|
||||||
// @Tags Auth
|
// @Tags Auth
|
||||||
// @Accept json
|
// @Accept json
|
||||||
@@ -65,7 +64,7 @@ func (a *authControllerImpl) Login(c *gin.Context) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
_, err := a.authService.Login(request.Body)
|
response, err := a.authService.Login(request.Body)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if errors.Is(err, errs.ErrForbidden) {
|
if errors.Is(err, errs.ErrForbidden) {
|
||||||
@@ -76,11 +75,10 @@ func (a *authControllerImpl) Login(c *gin.Context) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
c.Status(http.StatusOK)
|
c.JSON(http.StatusOK, response)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// PasswordResetBegin implements AuthController.
|
|
||||||
// @Summary Request password reset email
|
// @Summary Request password reset email
|
||||||
// @Tags Auth
|
// @Tags Auth
|
||||||
// @Accept json
|
// @Accept json
|
||||||
@@ -90,7 +88,6 @@ func (a *authControllerImpl) PasswordResetBegin(c *gin.Context) {
|
|||||||
c.Status(http.StatusNotImplemented)
|
c.Status(http.StatusNotImplemented)
|
||||||
}
|
}
|
||||||
|
|
||||||
// PasswordResetComplete implements AuthController.
|
|
||||||
// @Summary Complete password reset with email code and provide 2FA code or backup code if needed
|
// @Summary Complete password reset with email code and provide 2FA code or backup code if needed
|
||||||
// @Tags Auth
|
// @Tags Auth
|
||||||
// @Accept json
|
// @Accept json
|
||||||
@@ -100,7 +97,6 @@ func (a *authControllerImpl) PasswordResetComplete(c *gin.Context) {
|
|||||||
c.Status(http.StatusNotImplemented)
|
c.Status(http.StatusNotImplemented)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Refresh implements AuthController.
|
|
||||||
// @Summary Receive new tokens via refresh token
|
// @Summary Receive new tokens via refresh token
|
||||||
// @Tags Auth
|
// @Tags Auth
|
||||||
// @Accept json
|
// @Accept json
|
||||||
@@ -110,7 +106,6 @@ func (a *authControllerImpl) Refresh(c *gin.Context) {
|
|||||||
c.Status(http.StatusNotImplemented)
|
c.Status(http.StatusNotImplemented)
|
||||||
}
|
}
|
||||||
|
|
||||||
// RegistrationComplete implements AuthController.
|
|
||||||
// @Summary Register an account
|
// @Summary Register an account
|
||||||
// @Tags Auth
|
// @Tags Auth
|
||||||
// @Accept json
|
// @Accept json
|
||||||
@@ -142,7 +137,6 @@ func (a *authControllerImpl) RegistrationBegin(c *gin.Context) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// RegistrationBegin implements AuthController.
|
|
||||||
// @Summary Confirm with code, finish creating the account
|
// @Summary Confirm with code, finish creating the account
|
||||||
// @Tags Auth
|
// @Tags Auth
|
||||||
// @Accept json
|
// @Accept json
|
||||||
|
|||||||
@@ -664,6 +664,18 @@ func (q *Queries) PruneTerminatedSessions(ctx context.Context) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const terminateAllSessionsForUserByUsername = `-- name: TerminateAllSessionsForUserByUsername :exec
|
||||||
|
UPDATE sessions
|
||||||
|
SET terminated = TRUE
|
||||||
|
FROM users
|
||||||
|
WHERE sessions.user_id = users.id AND users.username = $1::text
|
||||||
|
`
|
||||||
|
|
||||||
|
func (q *Queries) TerminateAllSessionsForUserByUsername(ctx context.Context, username string) error {
|
||||||
|
_, err := q.db.Exec(ctx, terminateAllSessionsForUserByUsername, username)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
const updateBannedUser = `-- name: UpdateBannedUser :exec
|
const updateBannedUser = `-- name: UpdateBannedUser :exec
|
||||||
UPDATE banned_users
|
UPDATE banned_users
|
||||||
SET
|
SET
|
||||||
|
|||||||
@@ -303,6 +303,15 @@ func (a *authServiceImpl) Login(request models.LoginRequest) (*models.LoginRespo
|
|||||||
return nil, returnedError
|
return nil, returnedError
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Until release 4, only 1 session at a time is supported
|
||||||
|
if err = db.TXQueries.TerminateAllSessionsForUserByUsername(db.CTX, request.Username); err != nil {
|
||||||
|
a.log.Error(
|
||||||
|
"Failed to terminate older sessions for user trying to log in",
|
||||||
|
zap.String("username", request.Username),
|
||||||
|
zap.Error(err))
|
||||||
|
return nil, errs.ErrServerError
|
||||||
|
}
|
||||||
|
|
||||||
session, err = db.TXQueries.CreateSession(db.CTX, database.CreateSessionParams{
|
session, err = db.TXQueries.CreateSession(db.CTX, database.CreateSessionParams{
|
||||||
// TODO: use actual values for session metadata
|
// TODO: use actual values for session metadata
|
||||||
UserID: userRow.ID,
|
UserID: userRow.ID,
|
||||||
|
|||||||
Reference in New Issue
Block a user