From fb114a7c44103e4865110df2f243e5b82037c80b Mon Sep 17 00:00:00 2001 From: Antoine Clausse Date: Tue, 13 Aug 2024 11:05:36 +0200 Subject: [PATCH] Merge pull request #19545 from overleaf/ac-remove-login-route-override [web] Remove `/login` route override from overleaf-integration GitOrigin-RevId: a22d0698e5039a8e77fb7ebb620500ad40a9a630 --- .../AuthenticationController.js | 33 +++++++++++++++++-- .../AuthenticationControllerTests.js | 21 ++++++++---- 2 files changed, 44 insertions(+), 10 deletions(-) diff --git a/services/web/app/src/Features/Authentication/AuthenticationController.js b/services/web/app/src/Features/Authentication/AuthenticationController.js index fef22e7828..aae184d011 100644 --- a/services/web/app/src/Features/Authentication/AuthenticationController.js +++ b/services/web/app/src/Features/Authentication/AuthenticationController.js @@ -26,6 +26,7 @@ const { hasAdminAccess } = require('../Helpers/AdminAuthorizationHelper') const Modules = require('../../infrastructure/Modules') const { expressify, promisify } = require('@overleaf/promise-utils') const { handleAuthenticateErrors } = require('./AuthenticationErrors') +const EmailHelper = require('../Helpers/EmailHelper') function send401WithChallenge(res) { res.setHeader('WWW-Authenticate', 'OverleafLogin') @@ -103,7 +104,7 @@ const AuthenticationController = { passport.authenticate( 'local', { keepSessionInfo: true }, - function (err, user, info) { + async function (err, user, info) { if (err) { return next(err) } @@ -112,7 +113,18 @@ const AuthenticationController = { AuthenticationController.setAuditInfo(req, { method: 'Password login', }) - return AuthenticationController.finishLogin(user, req, res, next) + + try { + // We could investigate whether this can be done together with 'preFinishLogin' instead of being its own hook + await Modules.promises.hooks.fire( + 'saasLogin', + { email: user.email }, + req + ) + await AuthenticationController.promises.finishLogin(user, req, res) + } catch (err) { + return next(err) + } } else { if (info.redir != null) { return res.json({ redir: info.redir }) @@ -217,7 +229,20 @@ const AuthenticationController = { * @returns {Promise<{ user: any, info: any}>} */ async _doPassportLogin(req, username, password) { - const email = username.toLowerCase() + const email = EmailHelper.parseEmail(username) + if (!email) { + Metrics.inc('login_failure_reason', 1, { status: 'invalid_email' }) + return { + user: null, + info: { + status: 400, + type: 'error', + text: req.i18n.translate('email_address_is_invalid'), + }, + } + } + AuthenticationController.setAuditInfo(req, { method: 'Password login' }) + const { fromKnownDevice } = AuthenticationController.getAuditInfo(req) const auditLog = { ipAddress: req.ip, @@ -243,6 +268,7 @@ const AuthenticationController = { } if (user && AuthenticationController.captchaRequiredForLogin(req, user)) { + Metrics.inc('login_failure_reason', 1, { status: 'captcha_missing' }) return { user: false, info: { @@ -266,6 +292,7 @@ const AuthenticationController = { // async actions return { user, info: undefined } } else { + Metrics.inc('login_failure_reason', 1, { status: 'password_invalid' }) AuthenticationController._recordFailedLogin() logger.debug({ email }, 'failed log in') return { diff --git a/services/web/test/unit/src/Authentication/AuthenticationControllerTests.js b/services/web/test/unit/src/Authentication/AuthenticationControllerTests.js index 474860a0f5..31d3b7dfea 100644 --- a/services/web/test/unit/src/Authentication/AuthenticationControllerTests.js +++ b/services/web/test/unit/src/Authentication/AuthenticationControllerTests.js @@ -280,7 +280,7 @@ describe('AuthenticationController', function () { this.req.session.destroy = sinon.stub().yields(null) this.req.session.save = sinon.stub().yields(null) this.req.sessionStore = { generate: sinon.stub() } - this.AuthenticationController.finishLogin = sinon.stub() + this.AuthenticationController.promises.finishLogin = sinon.stub() this.passport.authenticate.yields(null, this.user, this.info) this.err = new Error('woops') }) @@ -315,16 +315,21 @@ describe('AuthenticationController', function () { delete this.req.session.postLoginRedirect }) - it('should call finishLogin', function () { + it('should call finishLogin', function (done) { + this.AuthenticationController.promises.finishLogin.callsFake(() => { + this.AuthenticationController.promises.finishLogin.callCount.should.equal( + 1 + ) + this.AuthenticationController.promises.finishLogin + .calledWith(this.user, this.req, this.res) + .should.equal(true) + done() + }) this.AuthenticationController.passportLogin( this.req, this.res, this.next ) - this.AuthenticationController.finishLogin.callCount.should.equal(1) - this.AuthenticationController.finishLogin - .calledWith(this.user) - .should.equal(true) }) }) @@ -340,7 +345,9 @@ describe('AuthenticationController', function () { this.res, this.next ) - this.AuthenticationController.finishLogin.callCount.should.equal(0) + this.AuthenticationController.promises.finishLogin.callCount.should.equal( + 0 + ) }) it('should not send a json response with redirect', function () {