Skip to content

Commit

Permalink
Merge branch 'main' into mntor-3492-e2e
Browse files Browse the repository at this point in the history
  • Loading branch information
flozia authored Oct 30, 2024
2 parents 9769e0a + 2a212cb commit 0d3493d
Show file tree
Hide file tree
Showing 13 changed files with 91 additions and 64 deletions.
Binary file removed public/images/email/footer-bg-shapes.png
Binary file not shown.
Binary file removed public/images/email/hero-bg-gradient.png
Binary file not shown.
Original file line number Diff line number Diff line change
Expand Up @@ -10,21 +10,31 @@ import { getServerSession } from "../../../../../functions/server/getServerSessi
import { isAdmin } from "../../../../../api/utils/auth";
import { logger } from "@sentry/utils";
import { captureException } from "@sentry/node";
import { getSubscriberByFxaUid } from "../../../../../../db/tables/subscribers";

export async function getAttachedClientsAction() {
const session = await getServerSession();

if (
!session?.user?.email ||
!isAdmin(session.user.email) ||
process.env.APP_ENV === "production"
process.env.APP_ENV === "production" ||
typeof session?.user?.subscriber?.fxa_uid !== "string"
) {
return notFound();
}

const subscriber = await getSubscriberByFxaUid(
session.user.subscriber.fxa_uid,
);
if (!subscriber) {
logger.error("admin_fxa_no_subscriber_found");
return notFound();
}

try {
const attachedClients = await getAttachedClients(
session?.user.subscriber?.fxa_access_token ?? "",
subscriber.fxa_access_token ?? "",
);
return attachedClients;
} catch (error) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -176,7 +176,20 @@ export async function onDeleteAccount() {
};
}

await deleteAccount(session.user.subscriber);
const subscriber = await getSubscriberByFxaUid(
session.user.subscriber.fxa_uid,
);
if (!subscriber) {
logger.error(
`Tried to delete an account with a session that could not be linked to a subscriber.`,
);
return {
success: false,
error: "delete-account-with-invalid-session",
errorMessage: `User tried to delete their account, but we could not find it.`,
};
}
await deleteAccount(subscriber);

// Tell the front page to display an "account deleted" notification:
cookies().set("justDeletedAccount", "justDeletedAccount", {
Expand All @@ -202,7 +215,20 @@ export async function onApplyCouponCode() {
};
}

const result = await applyCurrentCouponCode(session.user.subscriber);
const subscriber = await getSubscriberByFxaUid(
session.user.subscriber.fxa_uid,
);
if (!subscriber) {
logger.error(
`Tried to apply a coupon code with a session that could not be linked to a subscriber.`,
);
return {
success: false,
error: "apply-coupon-code-with-invalid-session",
errorMessage: `User tried to apply a coupon code, but we could not find their account.`,
};
}
const result = await applyCurrentCouponCode(subscriber);
return result;
}

Expand Down
59 changes: 29 additions & 30 deletions src/app/api/utils/auth.tsx
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@

import { NextRequest } from "next/server";
import { AuthOptions, Profile as FxaProfile, User } from "next-auth";
import { SubscriberRow } from "knex/types/tables";
import { logger } from "../../functions/server/logging";

import {
Expand All @@ -26,6 +25,7 @@ import { record } from "../../functions/server/glean";
import { renderEmail } from "../../../emails/renderEmail";
import { SignupReportEmail } from "../../../emails/templates/signupReport/SignupReportEmail";
import { getEnvVarsOrThrow } from "../../../envVars";
import { sanitizeSubscriberRow } from "../../functions/server/sanitize";

const envVars = getEnvVarsOrThrow([
"OAUTH_AUTHORIZATION_URI",
Expand Down Expand Up @@ -117,14 +117,11 @@ export const authOptions: AuthOptions = {
);

if (subscriberFromDb) {
profile = subscriberFromDb.fxa_profile_json as FxaProfile;
const sanitizedSubscriber = sanitizeSubscriberRow(subscriberFromDb);
profile = sanitizedSubscriber.fxa_profile_json as FxaProfile;

// MNTOR-2599 The breach_resolution object can get pretty big,
// causing the session token cookie to balloon in size,
// eventually resulting in a 400 Bad Request due to headers being too large.
delete (subscriberFromDb as Partial<SubscriberRow>).breach_resolution;
token.subscriber =
subscriberFromDb as unknown as SerializedSubscriber;
sanitizedSubscriber as unknown as SerializedSubscriber;
}
}
if (profile) {
Expand Down Expand Up @@ -153,11 +150,9 @@ export const authOptions: AuthOptions = {
const existingUser = await getSubscriberByFxaUid(profile.uid);

if (existingUser) {
// MNTOR-2599 The breach_resolution object can get pretty big,
// causing the session token cookie to balloon in size,
// eventually resulting in a 400 Bad Request due to headers being too large.
delete (existingUser as Partial<SubscriberRow>).breach_resolution;
token.subscriber = existingUser as unknown as SerializedSubscriber;
const sanitizedSubscriber = sanitizeSubscriberRow(existingUser);
token.subscriber =
sanitizedSubscriber as unknown as SerializedSubscriber;
if (account.access_token && account.refresh_token) {
const updatedUser = await updateFxAData(
existingUser,
Expand All @@ -166,13 +161,13 @@ export const authOptions: AuthOptions = {
account.expires_at ?? 0,
profile,
);
// MNTOR-2599 The breach_resolution object can get pretty big,
// causing the session token cookie to balloon in size,
// eventually resulting in a 400 Bad Request due to headers being too large.
delete (updatedUser as Partial<SubscriberRow>).breach_resolution;
// Next-Auth implicitly converts `updatedUser` to a SerializedSubscriber,
// hence the type assertion:
token.subscriber = updatedUser as unknown as SerializedSubscriber;
if (updatedUser) {
const sanitizedUpdatedUser = sanitizeSubscriberRow(updatedUser);
// Next-Auth implicitly converts `updatedUser` to a SerializedSubscriber,
// hence the type assertion:
token.subscriber =
sanitizedUpdatedUser as unknown as SerializedSubscriber;
}
}
} else if (!existingUser && profile.email) {
const verifiedSubscriber = await addSubscriber(
Expand All @@ -183,10 +178,14 @@ export const authOptions: AuthOptions = {
account.expires_at,
profile,
);
// The date fields of `verifiedSubscriber` get converted to an ISO 8601
// date string when serialised in the token, hence the type assertion:
token.subscriber =
verifiedSubscriber as unknown as SerializedSubscriber;
if (verifiedSubscriber) {
const sanitizedSubscriber =
sanitizeSubscriberRow(verifiedSubscriber);
// The date fields of `verifiedSubscriber` get converted to an ISO 8601
// date string when serialised in the token, hence the type assertion:
token.subscriber =
sanitizedSubscriber as unknown as SerializedSubscriber;
}

const allBreaches = await getBreaches();
const unsafeBreachesForEmail = await getBreachesForEmail(
Expand Down Expand Up @@ -276,13 +275,13 @@ export const authOptions: AuthOptions = {
Date.now() + responseTokens.expires_in * 1000,
);

// MNTOR-2599 The breach_resolution object can get pretty big,
// causing the session token cookie to balloon in size,
// eventually resulting in a 400 Bad Request due to headers being too large.
delete (updatedUser as Partial<SubscriberRow>).breach_resolution;
// Next-Auth implicitly converts `updatedUser` to a SerializedSubscriber,
// hence the type assertion:
token.subscriber = updatedUser as unknown as SerializedSubscriber;
if (updatedUser) {
const sanitizedUpdatedUser = sanitizeSubscriberRow(updatedUser);
// Next-Auth implicitly converts `updatedUser` to a SerializedSubscriber,
// hence the type assertion:
token.subscriber =
sanitizedUpdatedUser as unknown as SerializedSubscriber;
}
} catch (error) {
logger.error("refresh_access_token", error);
// The error property can be used client-side to handle the refresh token error
Expand Down
4 changes: 1 addition & 3 deletions src/app/functions/server/applyCoupon.ts
Original file line number Diff line number Diff line change
Expand Up @@ -11,9 +11,7 @@ import {
} from "../../../db/tables/subscriber_coupons";
import { applyCoupon } from "../../../utils/fxa";

export async function applyCurrentCouponCode(
subscriber: SubscriberRow | SerializedSubscriber,
) {
export async function applyCurrentCouponCode(subscriber: SubscriberRow) {
logger.info("fxa_apply_coupon_code", {
subscriber: subscriber.id,
});
Expand Down
5 changes: 1 addition & 4 deletions src/app/functions/server/deleteAccount.ts
Original file line number Diff line number Diff line change
Expand Up @@ -9,13 +9,10 @@ import {
getOnerepProfileId,
} from "../../../db/tables/subscribers";
import { deactivateProfile } from "./onerep";
import { SerializedSubscriber } from "../../../next-auth";
import { deleteSubscription } from "../../../utils/fxa";
import { record } from "./glean";

export async function deleteAccount(
subscriber: SubscriberRow | SerializedSubscriber,
) {
export async function deleteAccount(subscriber: SubscriberRow) {
logger.info("fxa_delete_user", {
subscriber: subscriber.id,
});
Expand Down
2 changes: 2 additions & 0 deletions src/app/functions/server/sanitize.ts
Original file line number Diff line number Diff line change
Expand Up @@ -48,6 +48,7 @@ export type SanitizedSubscriberRow = SanitizationMarker &
| "id"
| "primary_email"
| "primary_verified"
| "primary_sha1"
| "created_at"
| "updated_at"
| "fx_newsletter"
Expand Down Expand Up @@ -77,6 +78,7 @@ export function sanitizeSubscriberRow(
id: subscriber.id,
primary_email: subscriber.primary_email,
primary_verified: subscriber.primary_verified,
primary_sha1: subscriber.primary_sha1,
created_at: subscriber.created_at,
updated_at: subscriber.updated_at,
fx_newsletter: subscriber.fx_newsletter,
Expand Down
10 changes: 8 additions & 2 deletions src/app/functions/server/user.ts
Original file line number Diff line number Diff line change
Expand Up @@ -4,10 +4,16 @@

import { Session } from "next-auth";
import { getBillingAndSubscriptions } from "../../../utils/fxa";
import { getSubscriberByFxaUid } from "../../../db/tables/subscribers";

/* c8 ignore start */
export async function checkUserHasMonthlySubscription(user: Session["user"]) {
if (!user.subscriber?.fxa_access_token) {
if (!user.subscriber?.fxa_uid) {
console.error("FXA UID not set");
return false;
}
const subscriber = await getSubscriberByFxaUid(user.subscriber.fxa_uid);
if (!subscriber || !subscriber.fxa_access_token) {
console.error("FXA token not set");
return false;
}
Expand All @@ -18,7 +24,7 @@ export async function checkUserHasMonthlySubscription(user: Session["user"]) {
}

const billingAndSubscriptionInfo = await getBillingAndSubscriptions(
user.subscriber.fxa_access_token,
subscriber.fxa_access_token,
);

if (billingAndSubscriptionInfo === null) {
Expand Down
4 changes: 2 additions & 2 deletions src/emails/components/EmailHero.tsx
Original file line number Diff line number Diff line change
Expand Up @@ -23,8 +23,8 @@ export const EmailHero = (props: Props) => {
<mj-wrapper padding="24px 16px">
<mj-section
padding="10px 12px"
css-class="hero_background"
border-radius="16px 16px 0 0"
background-color="#E7DFFF"
>
<mj-group>
<mj-column
Expand Down Expand Up @@ -58,7 +58,7 @@ export const EmailHero = (props: Props) => {
</mj-column>
</mj-group>
</mj-section>
<mj-section css-class="hero_background" border-radius="0 0 16px 16px">
<mj-section background-color="#E7DFFF" border-radius="0 0 16px 16px">
<mj-column>
<mj-text font-size="20px">
<h2>{props.heading}</h2>
Expand Down
2 changes: 1 addition & 1 deletion src/emails/templates/EmailFooter.tsx
Original file line number Diff line number Diff line change
Expand Up @@ -120,7 +120,7 @@ export const RedesignedEmailFooter = (props: Props) => {
<mj-wrapper
full-width="full-width"
padding="50px 32px"
css-class="footer_background"
background-color="#F9F9FA"
>
<mj-section>
<mj-column>
Expand Down
18 changes: 2 additions & 16 deletions src/emails/templates/HeaderStyles.tsx
Original file line number Diff line number Diff line change
Expand Up @@ -13,26 +13,12 @@ export const MetaTags = () => {
};

export const HeaderStyles = () => {
const hideBgImageOnDarkMode = `
const enforceLightMode = `
:root {
color-scheme: light only;
supported-color-schemes: light only;
}
.footer_background {
background-image: url(${process.env.SERVER_URL}/images/email/footer-bg-shapes.png);
background-position: center bottom;
background-repeat: no-repeat;
color: #000000 !important;
}
.hero_background {
background-image: url(${process.env.SERVER_URL}/images/email/hero-bg-gradient.png);
background-repeat: repeat;
background-position-x: 0;
color: #000000 !important;
}
`;

return <mj-style>{hideBgImageOnDarkMode}</mj-style>;
return <mj-style>{enforceLightMode}</mj-style>;
};
7 changes: 5 additions & 2 deletions src/next-auth.d.ts
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,13 @@
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */

import { DefaultSession } from "next-auth";
import { SubscriberRow } from "knex/types/tables";
import { ISO8601DateString } from "./utils/parse";
import { SanitizedSubscriberRow } from "./app/functions/server/sanitize";

export type SerializedSubscriber = Omit<SubscriberRow, "created_at"> & {
export type SerializedSubscriber = Omit<
SanitizedSubscriberRow,
"created_at"
> & {
created_at: ISO8601DateString;
};

Expand Down

0 comments on commit 0d3493d

Please sign in to comment.