Skip to content

Commit 99839d6

Browse files
fix ESlint fails
1 parent cf22f42 commit 99839d6

2 files changed

Lines changed: 47 additions & 46 deletions

File tree

api/server/controllers/AuthController.js

Lines changed: 41 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -83,51 +83,51 @@ const refreshController = async (req, res) => {
8383

8484
// We have a refresh token, use OpenID refresh flow
8585
try {
86-
const openIdConfig = getOpenIdConfig();
87-
const tokenset = await openIdClient.refreshTokenGrant(openIdConfig, refreshToken);
88-
const claims = tokenset.claims();
89-
const { user, error, migration } = await findOpenIDUser({
90-
findUser,
91-
email: claims.email,
86+
const openIdConfig = getOpenIdConfig();
87+
const tokenset = await openIdClient.refreshTokenGrant(openIdConfig, refreshToken);
88+
const claims = tokenset.claims();
89+
const { user, error, migration } = await findOpenIDUser({
90+
findUser,
91+
email: claims.email,
92+
openidId: claims.sub,
93+
idOnTheSource: claims.oid,
94+
strategyName: 'refreshController',
95+
});
96+
97+
logger.debug(
98+
`[refreshController] findOpenIDUser result: user=${user?.email ?? 'null'}, error=${error ?? 'null'}, migration=${migration}, userOpenidId=${user?.openidId ?? 'null'}, claimsSub=${claims.sub}`,
99+
);
100+
101+
if (error || !user) {
102+
logger.warn(
103+
`[refreshController] Redirecting to /login: error=${error ?? 'null'}, user=${user ? 'exists' : 'null'}`,
104+
);
105+
return res.status(401).redirect('/login');
106+
}
107+
108+
// Handle migration: update user with openidId if found by email without openidId
109+
// Also handle case where user has mismatched openidId (e.g., after database switch)
110+
if (migration || user.openidId !== claims.sub) {
111+
const reason = migration ? 'migration' : 'openidId mismatch';
112+
await updateUser(user._id.toString(), {
113+
provider: 'openid',
92114
openidId: claims.sub,
93-
idOnTheSource: claims.oid,
94-
strategyName: 'refreshController',
95115
});
96-
97-
logger.debug(
98-
`[refreshController] findOpenIDUser result: user=${user?.email ?? 'null'}, error=${error ?? 'null'}, migration=${migration}, userOpenidId=${user?.openidId ?? 'null'}, claimsSub=${claims.sub}`,
116+
logger.info(
117+
`[refreshController] Updated user ${user.email} openidId (${reason}): ${user.openidId ?? 'null'} -> ${claims.sub}`,
99118
);
119+
}
120+
121+
const token = setOpenIDAuthTokens(tokenset, req, res, user._id.toString(), refreshToken);
100122

101-
if (error || !user) {
102-
logger.warn(
103-
`[refreshController] Redirecting to /login: error=${error ?? 'null'}, user=${user ? 'exists' : 'null'}`,
104-
);
105-
return res.status(401).redirect('/login');
106-
}
107-
108-
// Handle migration: update user with openidId if found by email without openidId
109-
// Also handle case where user has mismatched openidId (e.g., after database switch)
110-
if (migration || user.openidId !== claims.sub) {
111-
const reason = migration ? 'migration' : 'openidId mismatch';
112-
await updateUser(user._id.toString(), {
113-
provider: 'openid',
114-
openidId: claims.sub,
115-
});
116-
logger.info(
117-
`[refreshController] Updated user ${user.email} openidId (${reason}): ${user.openidId ?? 'null'} -> ${claims.sub}`,
118-
);
119-
}
120-
121-
const token = setOpenIDAuthTokens(tokenset, req, res, user._id.toString(), refreshToken);
122-
123-
user.federatedTokens = {
124-
access_token: tokenset.access_token,
125-
id_token: tokenset.id_token,
126-
refresh_token: refreshToken,
127-
expires_at: claims.exp,
128-
};
129-
130-
return res.status(200).send({ token, user });
123+
user.federatedTokens = {
124+
access_token: tokenset.access_token,
125+
id_token: tokenset.id_token,
126+
refresh_token: refreshToken,
127+
expires_at: claims.exp,
128+
};
129+
130+
return res.status(200).send({ token, user });
131131
} catch (error) {
132132
logger.error('[refreshController] OpenID token refresh error', error);
133133
}

api/server/services/AuthService.js

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -514,7 +514,7 @@ const setOpenIDAuthTokens = (tokenset, req, res, userId, existingRefreshToken) =
514514
res.cookie('refreshToken', refreshToken, {
515515
expires: expirationDate,
516516
httpOnly: true,
517-
secure: isProduction,
517+
secure: shouldUseSecureCookie(),
518518
sameSite: 'strict',
519519
});
520520
}
@@ -524,10 +524,7 @@ const setOpenIDAuthTokens = (tokenset, req, res, userId, existingRefreshToken) =
524524
secure: shouldUseSecureCookie(),
525525
sameSite: 'strict',
526526
});
527-
logger.info('[setOpenIDAuthTokens] Tokens stored in cookies', {
528-
hasAccessToken: !!tokenset.access_token,
529-
hasRefreshToken: !!refreshToken,
530-
});
527+
531528
if (tokenset.id_token) {
532529
res.cookie('openid_id_token', tokenset.id_token, {
533530
expires: expirationDate,
@@ -536,6 +533,10 @@ const setOpenIDAuthTokens = (tokenset, req, res, userId, existingRefreshToken) =
536533
sameSite: 'strict',
537534
});
538535
}
536+
logger.info('[setOpenIDAuthTokens] Tokens stored in cookies', {
537+
hasAccessToken: !!tokenset.access_token,
538+
hasRefreshToken: !!refreshToken,
539+
});
539540
}
540541

541542
/** Small cookie to indicate token provider (required for auth middleware) */

0 commit comments

Comments
 (0)