BB2-4270: Ensure data_access_grant, refresh_token, and access_token r… #1439
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
…ecords are not deleted when a user has already authorized, and clicks 'Cancel' on the permissions screen
JIRA Ticket:
BB2-4270
What Does This PR Do?
Ensures that when a user who has already granted access to an app is on the permission screen, and clicks 'Cancel', that the data_access_grant, refresh_token, and access_token associated with that user are not deleted.
What Should Reviewers Watch For?
If you're reviewing this PR, please check for these things in particular:
Validation
select * from authorization_dataaccessgrant where beneficiary_id ={{user_id from auth flow}} and application_id = 1;(Note: Use application_id = 1 if using TestApp)select * from oauth2_provider_accesstoken where user_id = {{user_id from auth flow}} and application_id = 1 order by created desc;select * from oauth2_provider_refreshtoken where user_id = {{user_id from auth flow}} and application_id = 1 order by created desc;What Security Implications Does This PR Have?
Please indicate if this PR does any of the following:
security engineer's approval.
Any Migrations?
etc)