mirror of
https://github.com/bitwarden/android.git
synced 2025-12-10 08:35:05 -06:00
PM-24481: Logout when token refresh API returns 401 or 403 (#5651)
This commit is contained in:
parent
59c2261e7c
commit
3c033d4aa2
@ -781,12 +781,21 @@ class AuthRepositoryImpl(
|
||||
when (refreshTokenResponse) {
|
||||
is RefreshTokenResponseJson.Error -> {
|
||||
if (refreshTokenResponse.isInvalidGrant) {
|
||||
// We only logout for an invalid grant
|
||||
logout(userId = userId, reason = LogoutReason.InvalidGrant)
|
||||
}
|
||||
IllegalStateException(refreshTokenResponse.error).asFailure()
|
||||
}
|
||||
|
||||
is RefreshTokenResponseJson.Forbidden -> {
|
||||
logout(userId = userId, reason = LogoutReason.RefreshForbidden)
|
||||
refreshTokenResponse.error.asFailure()
|
||||
}
|
||||
|
||||
is RefreshTokenResponseJson.Unauthorized -> {
|
||||
logout(userId = userId, reason = LogoutReason.RefreshUnauthorized)
|
||||
refreshTokenResponse.error.asFailure()
|
||||
}
|
||||
|
||||
is RefreshTokenResponseJson.Success -> {
|
||||
// Store the new token information
|
||||
authDiskSource.storeAccountTokens(
|
||||
|
||||
@ -35,6 +35,18 @@ sealed class LogoutReason {
|
||||
*/
|
||||
data object InvalidGrant : LogoutReason()
|
||||
|
||||
/**
|
||||
* Indicates that the logout is happening because the there was a "Forbidden" response from
|
||||
* token refresh API.
|
||||
*/
|
||||
data object RefreshForbidden : LogoutReason()
|
||||
|
||||
/**
|
||||
* Indicates that the logout is happening because the there was a "Unauthorized" response from
|
||||
* token refresh API.
|
||||
*/
|
||||
data object RefreshUnauthorized : LogoutReason()
|
||||
|
||||
/**
|
||||
* Indicates that the logout is happening because of an invalid state.
|
||||
*/
|
||||
|
||||
@ -882,21 +882,88 @@ class AuthRepositoryTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
fun `refreshAccessTokenSynchronously returns failure and logs out on failure`() = runTest {
|
||||
fakeAuthDiskSource.storeAccountTokens(
|
||||
userId = USER_ID_1,
|
||||
accountTokens = ACCOUNT_TOKENS_1,
|
||||
)
|
||||
coEvery {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
} returns Throwable("Fail").asFailure()
|
||||
fun `refreshAccessTokenSynchronously returns failure if refreshTokenSynchronously fails`() =
|
||||
runTest {
|
||||
fakeAuthDiskSource.storeAccountTokens(
|
||||
userId = USER_ID_1,
|
||||
accountTokens = ACCOUNT_TOKENS_1,
|
||||
)
|
||||
coEvery {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
} returns Throwable("Fail").asFailure()
|
||||
|
||||
assertTrue(repository.refreshAccessTokenSynchronously(USER_ID_1).isFailure)
|
||||
assertTrue(repository.refreshAccessTokenSynchronously(USER_ID_1).isFailure)
|
||||
|
||||
coVerify(exactly = 1) {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
coVerify(exactly = 1) {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
}
|
||||
}
|
||||
|
||||
@Suppress("MaxLineLength")
|
||||
@Test
|
||||
fun `refreshAccessTokenSynchronously returns logs out and returns failure if refreshTokenSynchronously returns invalid_grant`() =
|
||||
runTest {
|
||||
fakeAuthDiskSource.userState = SINGLE_USER_STATE_1
|
||||
fakeAuthDiskSource.storeAccountTokens(
|
||||
userId = USER_ID_1,
|
||||
accountTokens = ACCOUNT_TOKENS_1,
|
||||
)
|
||||
coEvery {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
} returns RefreshTokenResponseJson.Error(error = "invalid_grant").asSuccess()
|
||||
|
||||
assertTrue(repository.refreshAccessTokenSynchronously(USER_ID_1).isFailure)
|
||||
|
||||
coVerify(exactly = 1) {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
userLogoutManager.logout(userId = USER_ID_1, reason = LogoutReason.InvalidGrant)
|
||||
}
|
||||
}
|
||||
|
||||
@Suppress("MaxLineLength")
|
||||
@Test
|
||||
fun `refreshAccessTokenSynchronously returns logs out and returns failure if refreshTokenSynchronously returns Forbidden`() =
|
||||
runTest {
|
||||
fakeAuthDiskSource.userState = SINGLE_USER_STATE_1
|
||||
fakeAuthDiskSource.storeAccountTokens(
|
||||
userId = USER_ID_1,
|
||||
accountTokens = ACCOUNT_TOKENS_1,
|
||||
)
|
||||
coEvery {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
} returns RefreshTokenResponseJson.Forbidden(error = Throwable("Fail!")).asSuccess()
|
||||
|
||||
assertTrue(repository.refreshAccessTokenSynchronously(USER_ID_1).isFailure)
|
||||
|
||||
coVerify(exactly = 1) {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
userLogoutManager.logout(userId = USER_ID_1, reason = LogoutReason.RefreshForbidden)
|
||||
}
|
||||
}
|
||||
|
||||
@Suppress("MaxLineLength")
|
||||
@Test
|
||||
fun `refreshAccessTokenSynchronously returns logs out and returns failure if refreshTokenSynchronously returns Unauthorized`() =
|
||||
runTest {
|
||||
fakeAuthDiskSource.userState = SINGLE_USER_STATE_1
|
||||
fakeAuthDiskSource.storeAccountTokens(
|
||||
userId = USER_ID_1,
|
||||
accountTokens = ACCOUNT_TOKENS_1,
|
||||
)
|
||||
coEvery {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
} returns RefreshTokenResponseJson.Unauthorized(error = Throwable("Fail!")).asSuccess()
|
||||
|
||||
assertTrue(repository.refreshAccessTokenSynchronously(USER_ID_1).isFailure)
|
||||
|
||||
coVerify(exactly = 1) {
|
||||
identityService.refreshTokenSynchronously(REFRESH_TOKEN)
|
||||
userLogoutManager.logout(
|
||||
userId = USER_ID_1,
|
||||
reason = LogoutReason.RefreshUnauthorized,
|
||||
)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
fun `refreshAccessTokenSynchronously returns success and sets account tokens`() = runTest {
|
||||
|
||||
@ -40,4 +40,18 @@ sealed class RefreshTokenResponseJson {
|
||||
) : RefreshTokenResponseJson() {
|
||||
val isInvalidGrant: Boolean get() = error == "invalid_grant"
|
||||
}
|
||||
|
||||
/**
|
||||
* Models a failure response with a 403 "Forbidden" response code.
|
||||
*/
|
||||
data class Forbidden(
|
||||
val error: Throwable,
|
||||
) : RefreshTokenResponseJson()
|
||||
|
||||
/**
|
||||
* Models a failure response with a 401 "Unauthorized" response code.
|
||||
*/
|
||||
data class Unauthorized(
|
||||
val error: Throwable,
|
||||
) : RefreshTokenResponseJson()
|
||||
}
|
||||
|
||||
@ -20,6 +20,7 @@ import com.bitwarden.network.util.DeviceModelProvider
|
||||
import com.bitwarden.network.util.NetworkErrorCode
|
||||
import com.bitwarden.network.util.base64UrlEncode
|
||||
import com.bitwarden.network.util.executeForNetworkResult
|
||||
import com.bitwarden.network.util.getNetworkErrorCodeOrNull
|
||||
import com.bitwarden.network.util.parseErrorBodyOrNull
|
||||
import com.bitwarden.network.util.toResult
|
||||
import kotlinx.serialization.json.Json
|
||||
@ -131,13 +132,28 @@ internal class IdentityServiceImpl(
|
||||
.executeForNetworkResult()
|
||||
.toResult()
|
||||
.recoverCatching { throwable ->
|
||||
throwable
|
||||
.toBitwardenError()
|
||||
val bitwardenError = throwable.toBitwardenError()
|
||||
bitwardenError
|
||||
.parseErrorBodyOrNull<RefreshTokenResponseJson.Error>(
|
||||
code = NetworkErrorCode.BAD_REQUEST,
|
||||
json = json,
|
||||
)
|
||||
?: throw throwable
|
||||
?: run {
|
||||
when (bitwardenError.getNetworkErrorCodeOrNull()) {
|
||||
NetworkErrorCode.UNAUTHORIZED -> {
|
||||
RefreshTokenResponseJson.Unauthorized(throwable)
|
||||
}
|
||||
|
||||
NetworkErrorCode.FORBIDDEN -> {
|
||||
RefreshTokenResponseJson.Forbidden(throwable)
|
||||
}
|
||||
|
||||
NetworkErrorCode.BAD_REQUEST,
|
||||
NetworkErrorCode.TOO_MANY_REQUESTS,
|
||||
null,
|
||||
-> throw throwable
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
override suspend fun registerFinish(
|
||||
|
||||
@ -5,6 +5,14 @@ import com.bitwarden.network.model.BitwardenError
|
||||
import kotlinx.serialization.json.Json
|
||||
import retrofit2.HttpException
|
||||
|
||||
/**
|
||||
* Returns the [NetworkErrorCode] for the given error if it is available.
|
||||
*/
|
||||
internal fun BitwardenError.getNetworkErrorCodeOrNull(): NetworkErrorCode? =
|
||||
(this as? BitwardenError.Http)?.let { httpError ->
|
||||
NetworkErrorCode.entries.firstOrNull { httpError.code == it.code }
|
||||
}
|
||||
|
||||
/**
|
||||
* Attempt to parse the error body to serializable type [T].
|
||||
*
|
||||
|
||||
@ -7,5 +7,7 @@ internal enum class NetworkErrorCode(
|
||||
val code: Int,
|
||||
) {
|
||||
BAD_REQUEST(code = 400),
|
||||
UNAUTHORIZED(code = 401),
|
||||
FORBIDDEN(code = 403),
|
||||
TOO_MANY_REQUESTS(code = 429),
|
||||
}
|
||||
|
||||
@ -333,6 +333,20 @@ class IdentityServiceTest : BaseServiceTest() {
|
||||
assertTrue(result.isFailure)
|
||||
}
|
||||
|
||||
@Test
|
||||
fun `refreshTokenSynchronously when response is a 403 error should return an Forbidden`() {
|
||||
server.enqueue(MockResponse().setResponseCode(403))
|
||||
val result = identityService.refreshTokenSynchronously(refreshToken = REFRESH_TOKEN)
|
||||
assertTrue(result.getOrThrow() is RefreshTokenResponseJson.Forbidden)
|
||||
}
|
||||
|
||||
@Test
|
||||
fun `refreshTokenSynchronously when response is a 401 error should return an Unauthorized`() {
|
||||
server.enqueue(MockResponse().setResponseCode(401))
|
||||
val result = identityService.refreshTokenSynchronously(refreshToken = REFRESH_TOKEN)
|
||||
assertTrue(result.getOrThrow() is RefreshTokenResponseJson.Unauthorized)
|
||||
}
|
||||
|
||||
@Test
|
||||
fun `registerFinish success json should be Success`() = runTest {
|
||||
val expectedResponse = RegisterResponseJson.Success(
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user