FEATURE: Allow linking an existing account during external-auth signup

When a user signs up via an external auth method, a new link is added to the signup modal which allows them to connect an existing Discourse account. This will only happen if:

- There is at least 1 other auth method available

and

- The current auth method permits users to disconnect/reconnect their accounts themselves
This commit is contained in:
David Taylor 2021-08-02 17:57:52 +01:00
parent 46dc189850
commit 7dc8f8b794
7 changed files with 92 additions and 15 deletions

View File

@ -407,6 +407,17 @@ export default Controller.extend(
}
},
@discourseComputed("authOptions.associate_url", "authOptions.auth_provider")
associateHtml(url, provider) {
if (!url) {
return;
}
return I18n.t("create_account.associate", {
associate_link: url,
provider: I18n.t(`login.${provider}.name`),
});
},
actions: {
externalLogin(provider) {
this.login.send("externalLogin", provider, { signup: true });

View File

@ -16,6 +16,11 @@
<div class="login-form">
<form>
{{#if associateHtml}}
<div class="input-group create-account-associate-link">
<span>{{html-safe associateHtml}}</span>
</div>
{{/if}}
<div class="input-group create-account-email">
{{input type="email" disabled=emailDisabled value=accountEmail id="new-account-email" name="email" class=(value-entered accountEmail) autofocus="autofocus" focusOut=(action "checkEmailAvailability")}}
<label class="alt-placeholder" for="new-account-email">

View File

@ -2,17 +2,24 @@ import { acceptance, exists } from "discourse/tests/helpers/qunit-helpers";
import { test } from "qunit";
import { visit } from "@ember/test-helpers";
function setupAuthData(data) {
data = {
auth_provider: "test",
email: "blah@example.com",
can_edit_username: true,
can_edit_name: true,
...data,
};
const node = document.createElement("meta");
node.dataset.authenticationData = JSON.stringify(data);
node.id = "data-authentication";
document.querySelector("head").appendChild(node);
}
acceptance("Create Account - external auth", function (needs) {
needs.hooks.beforeEach(() => {
const node = document.createElement("meta");
node.dataset.authenticationData = JSON.stringify({
auth_provider: "test",
email: "blah@example.com",
can_edit_username: true,
can_edit_name: true,
});
node.id = "data-authentication";
document.querySelector("head").appendChild(node);
setupAuthData();
});
needs.hooks.afterEach(() => {
document
@ -29,6 +36,11 @@ acceptance("Create Account - external auth", function (needs) {
);
assert.ok(exists("#new-account-username"), "it shows the fields");
assert.notOk(
exists(".create-account-associate-link"),
"it does not show the associate link"
);
});
test("when skip is enabled", async function (assert) {
@ -43,3 +55,28 @@ acceptance("Create Account - external auth", function (needs) {
assert.not(exists("#new-account-username"), "it does not show the fields");
});
});
acceptance("Create account - with associate link", function (needs) {
needs.hooks.beforeEach(() => {
setupAuthData({ associate_url: "/associate/abcde" });
});
needs.hooks.afterEach(() => {
document
.querySelector("head")
.removeChild(document.getElementById("data-authentication"));
});
test("displays associate link when allowed", async function (assert) {
await visit("/");
assert.ok(
exists("#discourse-modal div.create-account-body"),
"it shows the registration modal"
);
assert.ok(exists("#new-account-username"), "it shows the fields");
assert.ok(
exists(".create-account-associate-link"),
"it shows the associate link"
);
});
});

View File

@ -22,7 +22,7 @@ class Users::AssociateAccountsController < ApplicationController
end
DiscourseEvent.trigger(:before_auth, authenticator, auth_hash, session, cookies, request)
auth_result = authenticator.after_authenticate(auth, existing_account: current_user)
auth_result = authenticator.after_authenticate(auth_hash, existing_account: current_user)
DiscourseEvent.trigger(:after_auth, authenticator, auth_result, session, cookies, request)
secure_session[self.class.key(params[:token])] = nil

View File

@ -28,10 +28,8 @@ class Users::OmniauthCallbacksController < ApplicationController
authenticator = self.class.find_authenticator(params[:provider])
if session.delete(:auth_reconnect) && authenticator.can_connect_existing_user? && current_user
# Save to redis, with a secret token, then redirect to confirmation screen
token = SecureRandom.hex
secure_session.set "#{Users::AssociateAccountsController.key(token)}", auth.to_json, expires: 10.minutes
return redirect_to "#{Discourse.base_path}/associate/#{token}"
path = persist_auth_token(auth)
return redirect_to path
else
DiscourseEvent.trigger(:before_auth, authenticator, auth, session, cookies, request)
@auth_result = authenticator.after_authenticate(auth)
@ -76,9 +74,16 @@ class Users::OmniauthCallbacksController < ApplicationController
return render_auth_result_failure if @auth_result.failed?
client_hash = @auth_result.to_client_hash
if authenticator.can_connect_existing_user? &&
(SiteSetting.enable_local_logins || Discourse.enabled_authenticators.count > 1)
# There is more than one login method, and users are allowed to manage associations themselves
client_hash[:associate_url] = persist_auth_token(auth)
end
cookies['_bypass_cache'] = true
cookies[:authentication_data] = {
value: @auth_result.to_client_hash.to_json,
value: client_hash.to_json,
path: Discourse.base_path("/")
}
redirect_to @origin
@ -180,4 +185,9 @@ class Users::OmniauthCallbacksController < ApplicationController
end
end
def persist_auth_token(auth)
secret = SecureRandom.hex
secure_session.set "#{Users::AssociateAccountsController.key(secret)}", auth.to_json, expires: 10.minutes
"#{Discourse.base_path}/associate/#{secret}"
end
end

View File

@ -1795,6 +1795,7 @@ en:
disclaimer: "By registering, you agree to the <a href='%{privacy_link}' target='blank'>privacy policy</a> and <a href='%{tos_link}' target='blank'>terms of service</a>."
title: "Create your account"
failed: "Something went wrong, perhaps this email is already registered, try the forgot password link"
associate: "Already have an account? <a href='%{associate_link}'>Log In</a> to link your %{provider} account."
forgot_password:
title: "Password Reset"

View File

@ -246,6 +246,19 @@ RSpec.describe Users::OmniauthCallbacksController do
expect(data["destination_url"]).to eq(destination_url)
end
it 'should return an associate url when multiple login methods are enabled' do
get "/auth/google_oauth2/callback.json"
expect(response.status).to eq(302)
data = JSON.parse(cookies[:authentication_data])
expect(data["associate_url"]).to start_with('/associate/')
SiteSetting.enable_local_logins = false
get "/auth/google_oauth2/callback.json"
data = JSON.parse(cookies[:authentication_data])
expect(data["associate_url"]).to eq(nil)
end
describe 'when site is invite_only' do
before do
SiteSetting.invite_only = true