Skip to content

Commit e29845f

Browse files
authored
feat: Deprecation DEPPS8: Parse Server option allowExpiredAuthDataToken defaults to false (#8860)
BREAKING CHANGE: Parse Server option `allowExpiredAuthDataToken` defaults to `false`; a 3rd party authentication token will be validated every time the user tries to log in and the login will fail if the token has expired; the effect of this change may differ for different authentication adapters, depending on the token lifetime and the token refresh logic of the adapter
1 parent bbda8d2 commit e29845f

File tree

6 files changed

+12
-76
lines changed

6 files changed

+12
-76
lines changed

DEPRECATIONS.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ The following is a list of deprecations, according to the [Deprecation Policy](h
1111
| DEPPS5 | Config option `allowClientClassCreation` defaults to `false` | [#7925](https://github.com/parse-community/parse-server/pull/7925) | 5.3.0 (2022) | 7.0.0 (2024) | deprecated | - |
1212
| DEPPS6 | Auth providers disabled by default | [#7953](https://github.com/parse-community/parse-server/pull/7953) | 5.3.0 (2022) | 7.0.0 (2024) | deprecated | - |
1313
| DEPPS7 | Remove file trigger syntax `Parse.Cloud.beforeSaveFile((request) => {})` | [#7966](https://github.com/parse-community/parse-server/pull/7966) | 5.3.0 (2022) | 7.0.0 (2024) | removed | - |
14-
| DEPPS8 | Login with expired 3rd party authentication token defaults to `false` | [#7079](https://github.com/parse-community/parse-server/pull/7079) | 5.3.0 (2022) | 7.0.0 (2024) | deprecated | - |
14+
| DEPPS8 | Login with expired 3rd party authentication token defaults to `false` | [#7079](https://github.com/parse-community/parse-server/pull/7079) | 5.3.0 (2022) | 7.0.0 (2024) | removed | - |
1515
| DEPPS9 | Rename LiveQuery `fields` option to `keys` | [#8389](https://github.com/parse-community/parse-server/issues/8389) | 6.0.0 (2023) | 7.0.0 (2024) | removed | - |
1616
| DEPPS10 | Config option `encodeParseObjectInCloudFunction` defaults to `true` | [#8634](https://github.com/parse-community/parse-server/issues/8634) | 6.2.0 (2023) | 8.0.0 (2025) | deprecated | - |
1717

spec/ParseUser.spec.js

+6-69
Original file line numberDiff line numberDiff line change
@@ -15,51 +15,18 @@ const cryptoUtils = require('../lib/cryptoUtils');
1515

1616
describe('allowExpiredAuthDataToken option', () => {
1717
it('should accept true value', async () => {
18-
const logger = require('../lib/logger').logger;
19-
const logSpy = spyOn(logger, 'warn').and.callFake(() => {});
2018
await reconfigureServer({ allowExpiredAuthDataToken: true });
2119
expect(Config.get(Parse.applicationId).allowExpiredAuthDataToken).toBe(true);
22-
expect(
23-
logSpy.calls
24-
.all()
25-
.filter(
26-
log =>
27-
log.args[0] ===
28-
`DeprecationWarning: The Parse Server option 'allowExpiredAuthDataToken' default will change to 'false' in a future version.`
29-
).length
30-
).toEqual(0);
3120
});
3221

3322
it('should accept false value', async () => {
34-
const logger = require('../lib/logger').logger;
35-
const logSpy = spyOn(logger, 'warn').and.callFake(() => {});
3623
await reconfigureServer({ allowExpiredAuthDataToken: false });
3724
expect(Config.get(Parse.applicationId).allowExpiredAuthDataToken).toBe(false);
38-
expect(
39-
logSpy.calls
40-
.all()
41-
.filter(
42-
log =>
43-
log.args[0] ===
44-
`DeprecationWarning: The Parse Server option 'allowExpiredAuthDataToken' default will change to 'false' in a future version.`
45-
).length
46-
).toEqual(0);
47-
});
48-
49-
it('should default true', async () => {
50-
const logger = require('../lib/logger').logger;
51-
const logSpy = spyOn(logger, 'warn').and.callFake(() => {});
25+
});
26+
27+
it('should default false', async () => {
5228
await reconfigureServer({});
53-
expect(Config.get(Parse.applicationId).allowExpiredAuthDataToken).toBe(true);
54-
expect(
55-
logSpy.calls
56-
.all()
57-
.filter(
58-
log =>
59-
log.args[0] ===
60-
`DeprecationWarning: The Parse Server option 'allowExpiredAuthDataToken' default will change to 'false' in a future version.`
61-
).length
62-
).toEqual(1);
29+
expect(Config.get(Parse.applicationId).allowExpiredAuthDataToken).toBe(false);
6330
});
6431

6532
it('should enforce boolean values', async () => {
@@ -1878,7 +1845,7 @@ describe('Parse.User testing', () => {
18781845
});
18791846
});
18801847

1881-
it('should allow login with expired authData token by default', async () => {
1848+
it('should not allow login with expired authData token since allowExpiredAuthDataToken is set to false by default', async () => {
18821849
const provider = {
18831850
authData: {
18841851
id: '12345',
@@ -1904,37 +1871,7 @@ describe('Parse.User testing', () => {
19041871
// In this case, we want success as it was valid once.
19051872
// If the client needs an updated token, do lock the user out
19061873
defaultConfiguration.auth.shortLivedAuth.setValidAccessToken('otherToken');
1907-
await Parse.User._logInWith('shortLivedAuth', {});
1908-
});
1909-
1910-
it('should not allow login with expired authData token when allowExpiredAuthDataToken is set to false', async () => {
1911-
await reconfigureServer({ allowExpiredAuthDataToken: false });
1912-
const provider = {
1913-
authData: {
1914-
id: '12345',
1915-
access_token: 'token',
1916-
},
1917-
restoreAuthentication() {
1918-
return true;
1919-
},
1920-
deauthenticate() {
1921-
provider.authData = {};
1922-
},
1923-
authenticate(options) {
1924-
options.success(this, provider.authData);
1925-
},
1926-
getAuthType() {
1927-
return 'shortLivedAuth';
1928-
},
1929-
};
1930-
defaultConfiguration.auth.shortLivedAuth.setValidAccessToken('token');
1931-
Parse.User._registerAuthenticationProvider(provider);
1932-
await Parse.User._logInWith('shortLivedAuth', {});
1933-
// Simulate a remotely expired token (like a short lived one)
1934-
// In this case, we want success as it was valid once.
1935-
// If the client needs an updated token, do lock the user out
1936-
defaultConfiguration.auth.shortLivedAuth.setValidAccessToken('otherToken');
1937-
expectAsync(Parse.User._logInWith('shortLivedAuth', {})).toBeRejected();
1874+
await expectAsync(Parse.User._logInWith('shortLivedAuth', {})).toBeRejected();
19381875
});
19391876

19401877
it('should allow PUT request with stale auth Data', done => {

src/Deprecator/Deprecations.js

-1
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,5 @@
1717
*/
1818
module.exports = [
1919
{ optionKey: 'allowClientClassCreation', changeNewDefault: 'false' },
20-
{ optionKey: 'allowExpiredAuthDataToken', changeNewDefault: 'false' },
2120
{ optionKey: 'encodeParseObjectInCloudFunction', changeNewDefault: 'true' },
2221
];

src/Options/Definitions.js

+2-2
Original file line numberDiff line numberDiff line change
@@ -70,9 +70,9 @@ module.exports.ParseServerOptions = {
7070
allowExpiredAuthDataToken: {
7171
env: 'PARSE_SERVER_ALLOW_EXPIRED_AUTH_DATA_TOKEN',
7272
help:
73-
'Allow a user to log in even if the 3rd party authentication token that was used to # to their account has expired. If this is set to `false`, then the token will be validated every time the user signs in to their account. This refers to the token that is stored in the `_User.authData` field. Defaults to `true`.',
73+
'Allow a user to log in even if the 3rd party authentication token that was used to # to their account has expired. If this is set to `false`, then the token will be validated every time the user signs in to their account. This refers to the token that is stored in the `_User.authData` field. Defaults to `false`.',
7474
action: parsers.booleanParser,
75-
default: true,
75+
default: false,
7676
},
7777
allowHeaders: {
7878
env: 'PARSE_SERVER_ALLOW_HEADERS',

src/Options/docs.js

+1-1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/Options/index.js

+2-2
Original file line numberDiff line numberDiff line change
@@ -320,8 +320,8 @@ export interface ParseServerOptions {
320320
/* Set to true if new users should be created without public read and write access.
321321
:DEFAULT: true */
322322
enforcePrivateUsers: ?boolean;
323-
/* Allow a user to log in even if the 3rd party authentication token that was used to # to their account has expired. If this is set to `false`, then the token will be validated every time the user signs in to their account. This refers to the token that is stored in the `_User.authData` field. Defaults to `true`.
324-
:DEFAULT: true */
323+
/* Allow a user to log in even if the 3rd party authentication token that was used to # to their account has expired. If this is set to `false`, then the token will be validated every time the user signs in to their account. This refers to the token that is stored in the `_User.authData` field. Defaults to `false`.
324+
:DEFAULT: false */
325325
allowExpiredAuthDataToken: ?boolean;
326326
/* An array of keys and values that are prohibited in database read and write requests to prevent potential security vulnerabilities. It is possible to specify only a key (`{"key":"..."}`), only a value (`{"value":"..."}`) or a key-value pair (`{"key":"...","value":"..."}`). The specification can use the following types: `boolean`, `numeric` or `string`, where `string` will be interpreted as a regex notation. Request data is deep-scanned for matching definitions to detect also any nested occurrences. Defaults are patterns that are likely to be used in malicious requests. Setting this option will override the default patterns.
327327
:DEFAULT: [{"key":"_bsontype","value":"Code"},{"key":"constructor"},{"key":"__proto__"}] */

0 commit comments

Comments
 (0)