Closed
Bug 1023780
Opened 10 years ago
Closed 10 years ago
Ensure that Mobile ID client support the 401/110 error (invalid token) properly
Categories
(Core :: DOM: Device Interfaces, defect)
Core
DOM: Device Interfaces
Tracking
()
People
(Reporter: ferjm, Assigned: ferjm)
References
Details
(Whiteboard: ft:loop)
Attachments
(1 file, 1 obsolete file)
(deleted),
patch
|
jedp
:
review+
|
Details | Diff | Splinter Review |
Assignee | ||
Updated•10 years ago
|
Assignee: nobody → ferjmoreno
Updated•10 years ago
|
Whiteboard: ft:loop
Assignee | ||
Comment 1•10 years ago
|
||
The session tokens that allow the Mobile ID API to obtain signed certificates and generate assertions have no expiration date by default. However, the server might revoke these tokens on some specific circumstances (for security or other reasons like bug 1023436). In these cases we will be stuck with an invalid session token that will make impossible to obtain a new assertion unless the user reinstalls the application. We need this fix to properly obtain a new valid session token from the server.
blocking-b2g: --- → 2.0?
Assignee | ||
Comment 2•10 years ago
|
||
In other words, without this fix the user won't be able to login to Loop if the token is revoked on the server.
Comment 3•10 years ago
|
||
Romain - Do we need this to ship Loop? If so, do you read this as a feature or a bug? If it's a feature, then we probably should set the feature-b2g flag.
blocking-b2g: 2.0? → ---
Flags: needinfo?(rtestard)
Comment 4•10 years ago
|
||
This sounds like a feature to me.
Is the only scenario to revoke a server token when a new user of Loop starts using Loop with a previously registered MSISDN?
Flags: needinfo?(rtestard)
Assignee | ||
Comment 5•10 years ago
|
||
FWIW I don't think this is a feature but a fix for a potential (and pretty bad for the user) issue.
(In reply to Romain Testard [:RT] from comment #4)
> This sounds like a feature to me.
> Is the only scenario to revoke a server token when a new user of Loop starts
> using Loop with a previously registered MSISDN?
No, it isn't. The token can also be revoked for security reasons.
Comment 6•10 years ago
|
||
Alright - I'll leave this on the nom list then & will discuss at triage.
blocking-b2g: --- → 2.0?
Updated•10 years ago
|
blocking-b2g: 2.0? → 2.0+
Comment 7•10 years ago
|
||
Hi, Fernando, can we get your latest update? This bug has not update for more than one week. Thank you!
Flags: needinfo?(ferjmoreno)
Comment 9•10 years ago
|
||
Hi, Fernando, "next week" is going to be finished, any update? Thanks.
Flags: needinfo?(ferjmoreno)
Assignee | ||
Comment 10•10 years ago
|
||
Flags: needinfo?(ferjmoreno)
Comment 11•10 years ago
|
||
(In reply to Fernando Jiménez Moreno [:ferjm] from comment #10)
> Created attachment 8453647 [details] [diff] [review]
> v1
Thanks!! Fernando!!!
Assignee | ||
Comment 12•10 years ago
|
||
Jed, have you got a few minutes to take a look a this patch, please? Thanks!
Attachment #8453647 -
Attachment is obsolete: true
Attachment #8453804 -
Flags: review?(jed+bmo)
Comment 13•10 years ago
|
||
Comment on attachment 8453804 [details] [diff] [review]
v1
Review of attachment 8453804 [details] [diff] [review]:
-----------------------------------------------------------------
Looks good to me, Fernando. Thanks for catching this case and providing the fix!
::: services/mobileid/MobileIdentityManager.jsm
@@ +929,5 @@
> + if (error === ERROR_INVALID_AUTH_TOKEN &&
> + !aOptions.refreshCredentials) {
> + log.debug("Need to get new credentials");
> + aOptions.refreshCredentials = true;
> + _creds && this.credStore.delete(_creds.msisdn);
Why not delete _creds entirely from the credStore?
Attachment #8453804 -
Flags: review?(jed+bmo) → review+
Assignee | ||
Comment 14•10 years ago
|
||
Thanks Jed!
>
> ::: services/mobileid/MobileIdentityManager.jsm
> @@ +929,5 @@
> > + if (error === ERROR_INVALID_AUTH_TOKEN &&
> > + !aOptions.refreshCredentials) {
> > + log.debug("Need to get new credentials");
> > + aOptions.refreshCredentials = true;
> > + _creds && this.credStore.delete(_creds.msisdn);
>
> Why not delete _creds entirely from the credStore?
That's actually what credStore.delete does ;). Instead of the whole object it only takes the msisdn as it is the db object key.
Assignee | ||
Comment 15•10 years ago
|
||
Comment 16•10 years ago
|
||
(In reply to Fernando Jiménez Moreno [:ferjm] from comment #14)
> > Why not delete _creds entirely from the credStore?
>
> That's actually what credStore.delete does ;). Instead of the whole object
> it only takes the msisdn as it is the db object key.
Ah yes. Thank you.
Comment 17•10 years ago
|
||
Status: NEW → RESOLVED
Closed: 10 years ago
Flags: in-testsuite+
Resolution: --- → FIXED
Target Milestone: --- → mozilla33
Comment 18•10 years ago
|
||
status-b2g-v2.0:
--- → fixed
status-b2g-v2.1:
--- → fixed
status-firefox31:
--- → wontfix
status-firefox32:
--- → fixed
status-firefox33:
--- → fixed
You need to log in
before you can comment on or make changes to this bug.
Description
•