Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[fix] Call SIGNED_OUT event where session is removed #854

Open
wants to merge 13 commits into
base: master
Choose a base branch
from

Conversation

bombillazo
Copy link

@bombillazo bombillazo commented Feb 16, 2024

What kind of change does this PR introduce?

This adds the SIGNED_OUT event missing in some logic that clears/logs out the session.

What is the current behavior?

#853

@bombillazo bombillazo changed the title fix: keep existing session on auth functions if they fail [fix] Keep existing session on auth functions if they fail Feb 16, 2024
@bombillazo
Copy link
Author

Any feedback on this @kangmingtay @hf ? We're needing to patch this library whenever a new version is released.

@bombillazo
Copy link
Author

Any updates here?

Comment on lines 483 to 485
if (currentSession) {
await this._saveSession(currentSession)
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i'm not sure why it's necessary to preserve the existing session when one calls the signup method - we always want to remove the session when signup is called to prevent any possibilities of the user logging in as someone else.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this applies to all the other sign-in methods too - if you're signing in, there won't be any session in the first place, else you'd be logged in already

Copy link
Author

@bombillazo bombillazo May 9, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This truly depends on the UI implementation. We may need to allow logged-in users to switch accounts directly so it is possible to call sign-in/sign-up. Currently, if something fails, the user is kicked out of their current session.

In addition, I don't see how this would log a user into someone else's account. Either the sign-in is successful, and the current session switches to the new one, or it fails, and you keep the existing one. If you were never logged in, you stay logged out.

Copy link
Contributor

@j4w8n j4w8n May 10, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If the team wanted to go down this path, you could simplify a lot of these methods by moving the _removeSession call to right before the _saveSession calls. There would be a few exceptions to that though.

I've seen more and more discussions about people trying to implement a "switch account" feature; or they already have, but recent changes have broken their implementations.

Copy link
Author

@bombillazo bombillazo May 10, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree. I just wasn't sure if some logic was dependent on having no session while executing, so I preferred keeping it and reverting at the end.

Hopefully, we can remove the current limitation, be it by removing _removeSession where not necessary or, as my PR suggests, restoring the session on fail.

This is already working for us in production, we patch this library in our app for this behavior, but we'd prefer if the lib had it working natively.

@jczstudios
Copy link

Any updates on this, it's breaking our production Electron app, seems that when a request fails, the user just gets signed out entirely.

Copy link
Contributor

@j4w8n j4w8n left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I appreciate the review tag, but this one will ultimately need to be looked at by kangmingtay or hf. Last I knew, the team's time was limited; so, who knows if/when they'll consider this PR further.

@bombillazo
Copy link
Author

Ok, I'll mention @hf so they'll be aware and have visibility on this fix request.

@kangmingtay
Copy link
Member

sorry @bombillazo i was on vacation last week - i'll be looking into this further to see if we can just do away with removing the session prematurely before hitting the underlying auth endpoint - not too sure if it will cause any unintended breaking changes here so we need some time to test this out

@kangmingtay
Copy link
Member

@bombillazo i've made a separate PR (#915) to address this - would be great if you can take a look at it too

kangmingtay added a commit that referenced this pull request Jun 7, 2024
## What kind of change does this PR introduce?
* Replaces #854 
* Fixes #853, #904 
* We don't need to remove the existing session prematurely. This causes
some issues when users want to implement some sort of switch-account
functionality since the existing session will always be removed
regardless of whether the signup / sign-in attempt succeeds.
* It's safe to remove `_removeSession` since calling `_saveSession`
multiple times will just replace the existing session
@bombillazo
Copy link
Author

bombillazo commented Jun 18, 2024

Hey @kangmingtay thanks for the PR, I merged the current repo to my branch and the only thing missing is a few lines of code to emit the SIGNED_OUT event during the _recoverAndRefresh function if the session is ultimately removed.

This means #904 is fixed but #853 is still open.

@bombillazo bombillazo changed the title [fix] Keep existing session on auth functions if they fail [fix] Call SIGNED_OUT event where sessino is removed Jun 18, 2024
@bombillazo bombillazo changed the title [fix] Call SIGNED_OUT event where sessino is removed [fix] Call SIGNED_OUT event where session is removed Jun 18, 2024
@bombillazo
Copy link
Author

bombillazo commented Jul 16, 2024

Any update here? This fixes #853

@bombillazo
Copy link
Author

Hey @kangmingtay , any update on this issue?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants