Skip to content

feat: Phising resistant MFA#39760

Draft
yash-rajpal wants to merge 24 commits into
developfrom
feat/phishing-resistant-mfa
Draft

feat: Phising resistant MFA#39760
yash-rajpal wants to merge 24 commits into
developfrom
feat/phishing-resistant-mfa

Conversation

@yash-rajpal
Copy link
Copy Markdown
Member

Proposed changes (including videos or screenshots)

Issue(s)

Steps to test or reproduce

Further comments

@dionisio-bot
Copy link
Copy Markdown
Contributor

dionisio-bot Bot commented Mar 20, 2026

Looks like this PR is not ready to merge, because of the following issues:

  • This PR is missing the 'stat: QA assured' label
  • This PR is missing the required milestone or project

Please fix the issues and try again

If you have any trouble, please check the PR guidelines

@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai Bot commented Mar 20, 2026

Important

Review skipped

Draft detected.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: b7c8b9c0-0995-446b-82f9-512e076e2833

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Use the checkbox below for a quick retry:

  • 🔍 Trigger review

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@changeset-bot
Copy link
Copy Markdown

changeset-bot Bot commented Mar 20, 2026

⚠️ No Changeset found

Latest commit: 93af0a8

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

@codecov
Copy link
Copy Markdown

codecov Bot commented Mar 20, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 69.71%. Comparing base (c7de992) to head (6e42e87).
⚠️ Report is 42 commits behind head on develop.

Additional details and impacted files

Impacted file tree graph

@@             Coverage Diff             @@
##           develop   #39760      +/-   ##
===========================================
+ Coverage    69.66%   69.71%   +0.05%     
===========================================
  Files         3317     3304      -13     
  Lines       121912   121729     -183     
  Branches     21799    21556     -243     
===========================================
- Hits         84926    84863      -63     
+ Misses       33669    33598      -71     
+ Partials      3317     3268      -49     
Flag Coverage Δ
unit 70.34% <ø> (-0.13%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

Comment thread apps/meteor/server/lib/oauth/configureOAuthServices.ts Fixed
Comment thread apps/meteor/server/lib/oauth/configureOAuthServices.ts Fixed
@yash-rajpal yash-rajpal force-pushed the feat/phishing-resistant-mfa branch from d1667e4 to c558ae5 Compare April 15, 2026 17:03
Comment thread apps/meteor/server/lib/oauth/configureOAuthServices.ts Fixed
Comment thread apps/meteor/server/lib/oauth/configureOAuthServices.ts Fixed
Comment thread apps/meteor/server/lib/oauth/configureOAuthServices.ts Fixed
Comment on lines +81 to +109
async (req: Request, res: Response) => {
const oAuthUser = req.user as IUser;

if (!oAuthUser) {
return res.redirect('/login');
}

const { loginClient } = req.session;

const stampedToken = Accounts._generateStampedLoginToken();
await Accounts._insertLoginToken(oAuthUser._id, stampedToken);

const redirectUrl = new URL(`/home`, siteUrl);

redirectUrl.searchParams.set('resumeToken', stampedToken.token);
redirectUrl.searchParams.set('userId', oAuthUser._id);

if (loginClient) {
redirectUrl.searchParams.set('loginClient', loginClient);
}

res.redirect(redirectUrl.toString());

req.session.destroy((err) => {
if (err) {
console.error('Error destroying session', err);
}
});
},
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants