Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(improvement) 2FA auth flow #776

Merged
merged 6 commits into from
Mar 5, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 7 additions & 2 deletions src/components/Auth/LoginOtp/LoginOtp.js
Original file line number Diff line number Diff line change
@@ -1,10 +1,12 @@
import React, { memo, useEffect } from 'react'
import { useSelector } from 'react-redux'
import PropTypes from 'prop-types'
import { useTranslation } from 'react-i18next'
import { Button, Intent } from '@blueprintjs/core'
import { isEmpty } from '@bitfinex/lib-js-util-base'

import useKeyDown from 'hooks/useKeyDown'
import { getIsAuthBtnDisabled } from 'state/auth/selectors'

import InputKey from '../InputKey'

Expand All @@ -15,9 +17,12 @@ export const LoginOtp = ({
handleOneTimePassword,
}) => {
const { t } = useTranslation()
const isAuthBtnDisabled = useSelector(getIsAuthBtnDisabled)

useKeyDown(() => {
handleOneTimePassword()
if (!isAuthBtnDisabled) {
handleOneTimePassword()
}
}, ['Enter'])

useEffect(() => {
Expand Down Expand Up @@ -48,9 +53,9 @@ export const LoginOtp = ({
<Button
name='auth'
intent={Intent.SUCCESS}
disabled={isEmpty(otp)}
className='bitfinex-auth-check'
onClick={handleOneTimePassword}
disabled={isEmpty(otp || isAuthBtnDisabled)}
>
{t('auth.2FA.auth')}
</Button>
Expand Down
8 changes: 8 additions & 0 deletions src/state/auth/actions.js
Original file line number Diff line number Diff line change
Expand Up @@ -217,6 +217,13 @@ export function syncAfterUpdate(payload) {
}
}

export function disableAuthBtn(payload) {
return {
type: types.DISABLE_AUTH_BUTTON,
payload,
}
}

export default {
checkAuth,
addUser,
Expand All @@ -243,4 +250,5 @@ export default {
signInOtp,
deleteAccount,
syncAfterUpdate,
disableAuthBtn,
}
1 change: 1 addition & 0 deletions src/state/auth/constants.js
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ export default {
LOGOUT: 'BITFINEX/AUTH/LOGOUT',
DELETE_ACCOUNT: 'BITFINEX/AUTH/ACCOUNT/DELETE',
SET_SYNC_AFTER_UPDATE: 'BITFINEX/SYNC/SYNC_AFTER_UPDATE/SET',
DISABLE_AUTH_BUTTON: 'BITFINEX/AUTH/BUTTON/DISABLE',

WS_SIGN_IN: 'ws_signIn',
LOGIN_2FA_OTP: 'otp',
Expand Down
6 changes: 6 additions & 0 deletions src/state/auth/reducer.js
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,7 @@ const initialState = {
loginToken: '',
userShouldReLogin: '',
shouldNotSyncOnStartupAfterUpdate: false,
isAuthBtnDisabled: false,
}

export function authReducer(state = initialState, action) {
Expand Down Expand Up @@ -148,6 +149,11 @@ export function authReducer(state = initialState, action) {
...state,
shouldNotSyncOnStartupAfterUpdate: payload,
}
case types.DISABLE_AUTH_BUTTON:
return {
...state,
isAuthBtnDisabled: payload,
}
case types.HIDE_AUTH:
return {
...state,
Expand Down
4 changes: 4 additions & 0 deletions src/state/auth/saga.js
Original file line number Diff line number Diff line change
Expand Up @@ -177,6 +177,7 @@ function* signUpEmail({ payload }) {

function* signUpOtp({ payload }) {
try {
yield put(actions.disableAuthBtn(true))
const { otp, password, isNotProtected } = payload
const loginToken = yield select(getLoginToken)
const params = {
Expand All @@ -193,16 +194,19 @@ function* signUpOtp({ payload }) {
password,
isNotProtected,
}
yield put(actions.disableAuthBtn(false))
yield put(actions.signUp(authParams))
}

if (error) {
yield put(actions.disableAuthBtn(false))
yield put(updateErrorStatus({
id: 'auth.2FA.invalidToken',
}))
}
} catch (fail) {
yield put(updateAuthErrorStatus(fail))
yield put(actions.disableAuthBtn(false))
}
}

Expand Down
2 changes: 2 additions & 0 deletions src/state/auth/selectors.js
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@ export const getIsSubAccsAvailable = state => _first(
_filter(getUsers(state), user => isEqual(user?.email, getEmail(state))),
)?.isApiKeysAuth ?? true
export const getLocalUsername = state => getAuth(state)?.localUsername ?? null
export const getIsAuthBtnDisabled = state => getAuth(state)?.isAuthBtnDisabled ?? false

export const getAuthData = state => {
const {
Expand Down Expand Up @@ -108,4 +109,5 @@ export default {
getIsSubAccsAvailable,
getLocalUsername,
getShouldNotSyncOnStartupAfterUpdate,
getIsAuthBtnDisabled,
}