Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support updating custom claims in updateUser() #1882

Open
wants to merge 7 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions etc/firebase-admin.auth.api.md
Original file line number Diff line number Diff line change
Expand Up @@ -516,6 +516,7 @@ export interface UpdateProjectConfigRequest {

// @public
export interface UpdateRequest {
customUserClaims?: object | null;
disabled?: boolean;
displayName?: string | null;
email?: string;
Expand Down
20 changes: 19 additions & 1 deletion src/auth/auth-api-request.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1349,7 +1349,7 @@ export abstract class AbstractAuthRequestHandler {
if (customUserClaims === null) {
customUserClaims = {};
}
// Construct custom user attribute editting request.
// Construct custom user attribute editing request.
const request: any = {
localId: uid,
customAttributes: JSON.stringify(customUserClaims),
Expand Down Expand Up @@ -1405,6 +1405,14 @@ export abstract class AbstractAuthRequestHandler {
'providersToUnlink of properties argument must be an array of strings.');
}
});
} else if ((typeof properties.customUserClaims !== 'undefined')
&& !validator.isObject(properties.customUserClaims)) {
return Promise.reject(
new FirebaseAuthError(
AuthClientErrorCode.INVALID_ARGUMENT,
'customUserClaims of properties argument must be an object, null, or undefined.',
),
);
}

// Build the setAccountInfo request.
Expand Down Expand Up @@ -1470,6 +1478,16 @@ export abstract class AbstractAuthRequestHandler {
request.disableUser = request.disabled;
delete request.disabled;
}
// Rewrite customClaims to customAttributes
if (typeof request.customUserClaims !== 'undefined') {
if (request.customUserClaims === null) {
// Delete operation. Replace null with an empty object.
request.customAttributes = JSON.stringify({});
} else {
request.customAttributes = JSON.stringify(request.customUserClaims);
}
delete request.customUserClaims;
}
// Construct mfa related user data.
if (validator.isNonNullObject(request.multiFactor)) {
if (request.multiFactor.enrolledFactors === null) {
Expand Down
20 changes: 16 additions & 4 deletions src/auth/auth-config.ts
Original file line number Diff line number Diff line change
Expand Up @@ -124,10 +124,9 @@ export interface MultiFactorUpdateSettings {
}

/**
* Interface representing the properties to update on the provided user.
* Interface representing the base properties for `CreateRequest` and `UpdateRequest`.
*/
export interface UpdateRequest {

export interface BaseCreateUpdateUserRequest {
/**
* Whether or not the user is disabled: `true` for disabled;
* `false` for enabled.
Expand Down Expand Up @@ -163,6 +162,12 @@ export interface UpdateRequest {
* The user's photo URL.
*/
photoURL?: string | null;
}

/**
* Interface representing the properties to update on the provided user.
*/
export interface UpdateRequest extends BaseCreateUpdateUserRequest {

/**
* The user's updated multi-factor related properties.
Expand All @@ -188,6 +193,13 @@ export interface UpdateRequest {
* Unlinks this user from the specified providers.
*/
providersToUnlink?: string[];

/**
* If provided, sets additional developer claims on the user's token, overwriting
* any existing claims. Providing `null` will clear any existing custom claims.
* If not provided or `undefined`, then existing claims will remain unchanged.
*/
customUserClaims?: object | null;
}

/**
Expand Down Expand Up @@ -231,7 +243,7 @@ export interface UserProvider {
* Interface representing the properties to set on a new user record to be
* created.
*/
export interface CreateRequest extends UpdateRequest {
export interface CreateRequest extends BaseCreateUpdateUserRequest {

/**
* The user's `uid`.
Expand Down
50 changes: 50 additions & 0 deletions test/integration/auth.spec.ts
Original file line number Diff line number Diff line change
Expand Up @@ -800,6 +800,56 @@ describe('admin.auth', () => {
});
});

it('sets claims that are accessible via user\'s ID token', () => {
// Set custom claims on the user.
return getAuth().updateUser(updateUser.uid, { customUserClaims: customClaims })
.then((userRecord) => {
// Confirm custom claims set on the UserRecord.
expect(userRecord.customClaims).to.deep.equal(customClaims);
expect(userRecord.email).to.exist;
return clientAuth().signInWithEmailAndPassword(
userRecord.email!, mockUserData.password);
})
.then(({ user }) => {
// Get the user's ID token.
expect(user).to.exist;
return user!.getIdToken();
})
.then((idToken) => {
// Verify ID token contents.
return getAuth().verifyIdToken(idToken);
})
.then((decodedIdToken: { [key: string]: any }) => {
// Confirm expected claims set on the user's ID token.
for (const key in customClaims) {
if (Object.prototype.hasOwnProperty.call(customClaims, key)) {
expect(decodedIdToken[key]).to.equal(customClaims[key]);
}
}
// Test clearing of custom claims.
return getAuth().updateUser(newUserUid, { customUserClaims: null });
})
.then((userRecord) => {
// Custom claims should be cleared.
expect(userRecord.customClaims).to.deep.equal({});
// Force token refresh. All claims should be cleared.
expect(clientAuth().currentUser).to.exist;
return clientAuth().currentUser!.getIdToken(true);
})
.then((idToken) => {
// Verify ID token contents.
return getAuth().verifyIdToken(idToken);
})
.then((decodedIdToken: { [key: string]: any }) => {
// Confirm all custom claims are cleared.
for (const key in customClaims) {
if (Object.prototype.hasOwnProperty.call(customClaims, key)) {
expect(decodedIdToken[key]).to.be.undefined;
}
}
});
});

it('creates, updates, and removes second factors', function () {
if (authEmulatorHost) {
return this.skip(); // Not yet supported in Auth Emulator.
Expand Down
80 changes: 80 additions & 0 deletions test/unit/auth/auth-api-request.spec.ts
Original file line number Diff line number Diff line change
Expand Up @@ -2044,6 +2044,10 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
photoURL: 'http://localhost/1234/photo.png',
password: 'password',
phoneNumber: '+11234567890',
customUserClaims: {
admin: true,
groupId: '123',
},
multiFactor: {
enrolledFactors: [
{
Expand Down Expand Up @@ -2076,6 +2080,7 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
photoUrl: 'http://localhost/1234/photo.png',
password: 'password',
phoneNumber: '+11234567890',
customAttributes: JSON.stringify({ admin: true, groupId: '123' }),
mfa: {
enrollments: [
{
Expand Down Expand Up @@ -2106,6 +2111,7 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
disableUser: false,
password: 'password',
phoneNumber: '+11234567890',
customAttributes: JSON.stringify({ admin: true, groupId: '123' }),
deleteAttribute: ['DISPLAY_NAME', 'PHOTO_URL'],
};
// Valid request to delete phoneNumber.
Expand All @@ -2120,8 +2126,38 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
disableUser: false,
photoUrl: 'http://localhost/1234/photo.png',
password: 'password',
customAttributes: JSON.stringify({ admin: true, groupId: '123' }),
deleteProvider: ['phone'],
};
// Valid request to delete custom claims.
const validDeleteCustomClaimsData = deepCopy(validData);
validDeleteCustomClaimsData.customUserClaims = null;
delete validDeleteCustomClaimsData.multiFactor;
const expectedValidDeleteCustomClaimsData = {
localId: uid,
displayName: 'John Doe',
email: '[email protected]',
emailVerified: true,
disableUser: false,
photoUrl: 'http://localhost/1234/photo.png',
password: 'password',
phoneNumber: '+11234567890',
customAttributes: JSON.stringify({}),
};
// Valid request to leave custom claims unchanged.
const validUnchangedCustomClaimsData = deepCopy(validData);
delete validUnchangedCustomClaimsData.customUserClaims;
delete validUnchangedCustomClaimsData.multiFactor;
const expectedValidUnchangedCustomClaimsData = {
localId: uid,
displayName: 'John Doe',
email: '[email protected]',
emailVerified: true,
disableUser: false,
photoUrl: 'http://localhost/1234/photo.png',
password: 'password',
phoneNumber: '+11234567890',
};
// Valid request to delete all second factors.
const expectedValidDeleteMfaData = {
localId: uid,
Expand Down Expand Up @@ -2222,6 +2258,50 @@ AUTH_REQUEST_HANDLER_TESTS.forEach((handler) => {
callParams(path, method, expectedValidDeletePhoneNumberData));
});
});

it('should be fulfilled given null custom claims', () => {
// Successful result server response.
const expectedResult = utils.responseFrom({
kind: 'identitytoolkit#SetAccountInfoResponse',
localId: uid,
});

const stub = sinon.stub(HttpClient.prototype, 'send').resolves(expectedResult);
stubs.push(stub);

const requestHandler = handler.init(mockApp);
// Send update request to delete custom claims.
return requestHandler.updateExistingAccount(uid, validDeleteCustomClaimsData)
.then((returnedUid: string) => {
// uid should be returned.
expect(returnedUid).to.be.equal(uid);
// Confirm expected rpc request parameters sent. In this case, customAttributes added.
expect(stub).to.have.been.calledOnce.and.calledWith(
callParams(path, method, expectedValidDeleteCustomClaimsData));
});
});

it('should be fulfilled given undefined custom claims', () => {
// Successful result server response.
const expectedResult = utils.responseFrom({
kind: 'identitytoolkit#SetAccountInfoResponse',
localId: uid,
});

const stub = sinon.stub(HttpClient.prototype, 'send').resolves(expectedResult);
stubs.push(stub);

const requestHandler = handler.init(mockApp);
// Send update request to update account excluding custom claims.
return requestHandler.updateExistingAccount(uid, validUnchangedCustomClaimsData)
.then((returnedUid: string) => {
// uid should be returned.
expect(returnedUid).to.be.equal(uid);
// Confirm expected rpc request parameters sent. In this case, customAttributes removed.
expect(stub).to.have.been.calledOnce.and.calledWith(
callParams(path, method, expectedValidUnchangedCustomClaimsData));
});
});

it('should be fulfilled given null enrolled factors', () => {
// Successful result server response.
Expand Down
18 changes: 18 additions & 0 deletions test/unit/auth/auth.spec.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1845,6 +1845,10 @@ AUTH_CONFIGS.forEach((testConfig) => {
emailVerified: expectedUserRecord.emailVerified,
password: 'password',
phoneNumber: expectedUserRecord.phoneNumber,
customUserClaims: {
admin: true,
groupId: '123',
},
providerToLink: {
providerId: 'google.com',
uid: 'google_uid',
Expand All @@ -1855,10 +1859,12 @@ AUTH_CONFIGS.forEach((testConfig) => {
beforeEach(() => {
sinon.spy(validator, 'isUid');
sinon.spy(validator, 'isNonNullObject');
sinon.spy(validator, 'isObject');
});
afterEach(() => {
(validator.isUid as any).restore();
(validator.isNonNullObject as any).restore();
(validator.isObject as any).restore();
_.forEach(stubs, (stub) => stub.restore());
stubs = [];
});
Expand Down Expand Up @@ -1978,6 +1984,18 @@ AUTH_CONFIGS.forEach((testConfig) => {
});
});

it('should be rejected given invalid custom user claims', () => {
return auth.updateUser(uid, { customUserClaims: 'invalid' as any })
.then(() => {
throw new Error('Unexpected success');
})
.catch((error) => {
expect(error).to.have.property('code', 'auth/argument-error');
expect(validator.isObject).to.have.been.calledOnce.and.calledWith('invalid');
});
});


describe('non-federated providers', () => {
let invokeRequestHandlerStub: sinon.SinonStub;
let getAccountInfoByUidStub: sinon.SinonStub;
Expand Down