-
Notifications
You must be signed in to change notification settings - Fork 11k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: SAML login redirects to incorrect room when using an invite #34873
base: develop
Are you sure you want to change the base?
Conversation
Looks like this PR is not ready to merge, because of the following issues:
Please fix the issues and try again If you have any trouble, please check the PR guidelines |
|
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## develop #34873 +/- ##
=========================================
Coverage 59.13% 59.13%
=========================================
Files 2819 2819
Lines 67957 67440 -517
Branches 15138 15026 -112
=========================================
- Hits 40188 39884 -304
+ Misses 24935 24744 -191
+ Partials 2834 2812 -22
Flags with carried forward coverage won't be shown. Click here to find out more. |
🦋 Changeset detectedLatest commit: b2e7d43 The changes in this PR will be included in the next version bump. This PR includes changesets to release 35 packages
Not sure what this means? Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
apps/meteor/app/meteor-accounts-saml/server/lib/generators/AuthorizeRequest.ts
Outdated
Show resolved
Hide resolved
@@ -28,7 +30,8 @@ const InvitePage = (): ReactElement => { | |||
return <PageLoading />; | |||
} | |||
|
|||
if (isValidInvite) { | |||
if (isValidInvite && token) { | |||
localStorage.setItem(KEY, token); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
invite token should be removed on successful non-SAML login as well.
Possibly needs to also be removed on failed login as well?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmmm am I not covering both cases here already? Real question bc I thought so, but I might me missing something
That mutation is always called since it is responsible for redirecting the user to the invite link
Proposed changes (including videos or screenshots)
id
andredirectUrl
from SAML's globalServiceProvideOptions
(since they're actually meant to relate to each client/request);Issue(s)
Steps to test or reproduce
Further comments
SUP-719