-
-
Notifications
You must be signed in to change notification settings - Fork 204
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Fix sessionId handling to allow authentication with sessionId #80
Conversation
Hey, can you check my comments please. Just a few queries. Cheers |
Hi, of course, but where can I find your comments? I'm not using github that often :-) |
Ah okay, they are on GitHub.
There seems to be some confusion on when your removing token from one
method and when your replacing it elsewhere.
…On Thu, Feb 14, 2019, 07:35 Christoph Bayer ***@***.*** wrote:
Hi, of course, but where can I find your comments? I'm not using github
that often :-)
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#80 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AHgn3mNhqKCJDSChNbcqm0fvGllxv4ndks5vNRHKgaJpZM4a2QYz>
.
|
In the previous version, the sessionId was manually inserted in the client request in three methods of ParseUser: getCurrentUserFromServer(), save() and destroy(). I removed this, instead the the sessionId is now always send in any transaction to the server if available, I included it in ParseHTTPClient.send(). This means that of course the sessionId is still send for these three methods. In a real parse server application I think it is important to restrict the access to any used classes on the server, if not there would be no reason to # or login at all. And if the access is restricted, you need to authenticate each access with your sessionId. |
I see. So the user token is only sent for user based requests?
…On Thu, Feb 14, 2019, 07:51 Christoph Bayer ***@***.*** wrote:
In the previous version, the sessionId was manually inserted in the client
request in three methods of ParseUser: getCurrentUserFromServer(), save()
and destroy(). I removed this, instead the the sessionId is now always send
in any transaction to the server if available, I included it in
ParseHTTPClient.send(). In a real parse server application I think it is
important to restrict the access to any used classes on the server, if not
there would be no reason to # or login at all. And if the access is
restricted, you need to authenticate each access with your sessionId.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#80 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AHgn3h2GZcotHFNEuqJ5-gWKzSBLsNHnks5vNRWPgaJpZM4a2QYz>
.
|
No, for all requests. Is not every request somehow user based after login? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
After further reading, I do not think is correct.
It makes sense for user related changes, not all objects. We need to revisit this.
https://docs.parseplatform.org/rest/guide/#validating-session-tokens--retrieving-current-user
In your current setup, do you need a user token for everything you do? This doesn't seem logical.
@@ -89,8 +89,6 @@ class Parse { | |||
sessionId: sessionId, | |||
securityContext: securityContext); | |||
|
|||
ParseCoreData().initStorage(); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just to confirm, the ParseCoreData class is a singleton, initStorage method creates an instance of ParseCoreData with all the necessary data. If this method is not called here, where else is it called? / Or is not needed to be called?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The init functionality was and still is in getStore(), It is initialized at the first usage:
Future<SharedPreferences> getStore() async {
return storage ?? (storage = await SharedPreferences.getInstance());
}
lib/src/objects/parse_user.dart
Outdated
@@ -63,20 +63,16 @@ class ParseUser extends ParseObject implements ParseCloneable { | |||
/// fromServer can be called and an updated version of the [User] object will be | |||
/// returned | |||
static Future<ParseResponse> getCurrentUserFromServer( | |||
{String token, bool debug, ParseHTTPClient client}) async { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This was added recently by another user who needed a token. I understand your hoping to send the token if we have it for every call, but I don't see where you are adding it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh, Ok, I was not aware it was recently added, I will look for a way to use a different token in this function.
Okay so after further reading, I think this makes sense when used with ACL. As we don't always want to send a token, please can you change your code so that the user has the option of sending a token. @chrbayer it's good work, but not quite there. This doesn't fit all user requirements. Maybe set a bool in ParseCoreData for now that can determine whether to send token with all requests? |
Even if the the sessionId is not needed for ACL or CLP, what harm does it make sending it? Nevertheless I can make sending the sessionId optional for not user objects. |
I see.
I'm not sure if there are many side affects of having the user token
present when not required, but looking through the docs, it still doesn't
look like best practice.
On this basis, please do make it an optional. I think somebody is looking
into implementing ACL features as we speak and I am hoping they will make
the call on this.
I really do appreciate your efforts.
…On Sat, Feb 16, 2019, 12:46 Christoph Bayer ***@***.*** wrote:
Even if the the sessionId is not needed for ACL or CLP, what harm does it
make sending it? Nevertheless I can make sending the sessionId optional for
not user objects.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#80 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AHgn3vigeR8HgkwVayikICSkTXwJKJUlks5vN_2fgaJpZM4a2QYz>
.
|
I've merged this but will need to do some work. Your still forcing tokens when it's not necessary. The only token that users are going to be sending is their current user token, so checking if a token is present in the headers and if not using the token from ParseCoreData is redundant. It's going to be the same token either way. |
Yeah, I am not ready and still working on making sending the token optional, I was interrupted this afternoon :-) Checking if a header is present is not completely redundant, because in the getCurrentUserFromServer() function I do insert a user given not necessarily the same SessionId header. I inform you as soon as my work is done. Thanks! |
Fix sessionId handling to allow authentication with sessionId
The sessionId was used manually for some ParseUser communication, but has to be used with all communication with the parse server to be able to access protected resources. It took me quite some time to find me the reason why I was not able to access my classes after I activating CLP for my classes...
Some small code clean-ups regarding storage.