Skip to content

Commit

Permalink
fix: refactor mfa models and add observability to loadFactor (#1669)
Browse files Browse the repository at this point in the history
## What kind of change does this PR introduce?

Makes two changes:
- Ensures we track DB calls to loadFactor
- Changes the interface for creating a challenge in attempt to make
clear that Challenge should always have a Factor
  • Loading branch information
J0 authored Jul 19, 2024
1 parent 7e67f3e commit 822fb93
Show file tree
Hide file tree
Showing 5 changed files with 16 additions and 15 deletions.
6 changes: 4 additions & 2 deletions internal/api/admin.go
Original file line number Diff line number Diff line change
Expand Up @@ -70,21 +70,23 @@ func (a *API) loadUser(w http.ResponseWriter, r *http.Request) (context.Context,
}

func (a *API) loadFactor(w http.ResponseWriter, r *http.Request) (context.Context, error) {
ctx := r.Context()
db := a.db.WithContext(ctx)
factorID, err := uuid.FromString(chi.URLParam(r, "factor_id"))
if err != nil {
return nil, notFoundError(ErrorCodeValidationFailed, "factor_id must be an UUID")
}

observability.LogEntrySetField(r, "factor_id", factorID)

f, err := models.FindFactorByFactorID(a.db, factorID)
f, err := models.FindFactorByFactorID(db, factorID)
if err != nil {
if models.IsNotFoundError(err) {
return nil, notFoundError(ErrorCodeMFAFactorNotFound, "Factor not found")
}
return nil, internalServerError("Database error loading factor").WithInternalError(err)
}
return withFactor(r.Context(), f), nil
return withFactor(ctx, f), nil
}

func (a *API) getAdminParams(r *http.Request) (*AdminUserParams, error) {
Expand Down
2 changes: 1 addition & 1 deletion internal/api/mfa.go
Original file line number Diff line number Diff line change
Expand Up @@ -182,7 +182,7 @@ func (a *API) ChallengeFactor(w http.ResponseWriter, r *http.Request) error {
user := getUser(ctx)
factor := getFactor(ctx)
ipAddress := utilities.GetIPAddress(r)
challenge := models.NewChallenge(factor, ipAddress)
challenge := factor.CreateChallenge(ipAddress)

if err := db.Transaction(func(tx *storage.Connection) error {
if terr := tx.Create(challenge); terr != nil {
Expand Down
2 changes: 1 addition & 1 deletion internal/api/mfa_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -265,7 +265,7 @@ func (ts *MFATestSuite) TestMFAVerifyFactor() {
req.Header.Set("Authorization", fmt.Sprintf("Bearer %s", token))

testIPAddress := utilities.GetIPAddress(req)
c := models.NewChallenge(f, testIPAddress)
c := f.CreateChallenge(testIPAddress)
require.NoError(ts.T(), ts.API.db.Create(c), "Error saving new test challenge")
if !v.validChallenge {
// Set challenge creation so that it has expired in present time.
Expand Down
11 changes: 0 additions & 11 deletions internal/models/challenge.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,17 +22,6 @@ func (Challenge) TableName() string {
return tableName
}

func NewChallenge(factor *Factor, ipAddress string) *Challenge {
id := uuid.Must(uuid.NewV4())

challenge := &Challenge{
ID: id,
FactorID: factor.ID,
IPAddress: ipAddress,
}
return challenge
}

func FindChallengeByID(conn *storage.Connection, challengeID uuid.UUID) (*Challenge, error) {
var challenge Challenge
err := conn.Find(&challenge, challengeID)
Expand Down
10 changes: 10 additions & 0 deletions internal/models/factor.go
Original file line number Diff line number Diff line change
Expand Up @@ -187,6 +187,16 @@ func DeleteUnverifiedFactors(tx *storage.Connection, user *User) error {
return nil
}

func (f *Factor) CreateChallenge(ipAddress string) *Challenge {
id := uuid.Must(uuid.NewV4())
challenge := &Challenge{
ID: id,
FactorID: f.ID,
IPAddress: ipAddress,
}
return challenge
}

// UpdateFriendlyName changes the friendly name
func (f *Factor) UpdateFriendlyName(tx *storage.Connection, friendlyName string) error {
f.FriendlyName = friendlyName
Expand Down

0 comments on commit 822fb93

Please sign in to comment.