Skip to content

Commit 7bdac3b

Browse files
authored
Update hashed password import APIs (#381)
1 parent 81c913f commit 7bdac3b

File tree

4 files changed

+70
-38
lines changed

4 files changed

+70
-38
lines changed

README.md

+18-7
Original file line numberDiff line numberDiff line change
@@ -700,7 +700,7 @@ userReqInvite.SSOAppIDs = []string{"appId1", "appId2"}
700700
options := &descope.InviteOptions{InviteURL: "https://sub.domain.com"}
701701
err := descopeClient.Management.User().Invite(context.Background(), "[email protected]", userReqInvite, options)
702702

703-
// batch invite
703+
// Invite multiple users with InviteBatch
704704
options := &descope.InviteOptions{InviteURL: "https://sub.domain.com"}
705705
batchUsers := []*descope.BatchUser{}
706706
u1 := &descope.BatchUser{}
@@ -717,6 +717,19 @@ u2.Roles = []string{"two"}
717717
batchUsers = append(batchUsers, u1, u2)
718718
users, err := descopeClient.Management.User().InviteBatch(context.Background(), batchUsers, options)
719719

720+
// Import users from another service by calling CreateBatch with each user's password hash
721+
user := &descope.BatchUser{
722+
LoginID: "[email protected]",
723+
Password: &descope.BatchUserPassword{
724+
Hashed: &descope.BatchUserPasswordHashed{
725+
Bcrypt: &descope.BatchUserPasswordBcrypt{
726+
Hash: "$2a$...",
727+
},
728+
},
729+
},
730+
}
731+
users, err := descopeClient.Management.User().CreateBatch(context.Background(), []*descope.BatchUser{user})
732+
720733
// Update will override all fields as is. Use carefully.
721734
userReqUpdate := &descope.UserRequest{}
722735
userReqUpdate.Email = "[email protected]"
@@ -762,8 +775,7 @@ if err == nil {
762775
err := descopeClient.Management.User().LogoutUser(context.Background(), "<login id>")
763776

764777
// Logout given user from all its devices, by user ID
765-
err := descopeClient.Management.User()LogoutUserByUserID(context.Background(), "<user id>")
766-
778+
err := descopeClient.Management.User().LogoutUserByUserID(context.Background(), "<user id>")
767779
```
768780

769781
#### Set or Expire User Password
@@ -832,7 +844,6 @@ err := descopeClient.Management.AccessKey().Delete(context.Background(), "access
832844
You can manage SSO (SAML or OIDC) settings for a specific tenant.
833845

834846
```go
835-
836847
// Load all tenant SSO settings
837848
ssoSettings, err := cc.HC.DescopeClient().Management.SSO().LoadSettings(context.Background(), "tenant-id")
838849

@@ -893,6 +904,9 @@ attributeMapping := &descope.AttributeMapping {
893904
PhoneNumber: "IDP_PHONE",
894905
}
895906
err := descopeClient.Management.SSO().ConfigureMapping(context.Background(), tenantID, roleMapping, attributeMapping)
907+
908+
// To delete SSO settings, call the following method
909+
err := descopeClient.Management.SSO().DeleteSettings(context.Background(), "tenant-id")
896910
```
897911

898912
Note: Certificates should have a similar structure to:
@@ -903,9 +917,6 @@ Certifcate contents
903917
-----END CERTIFICATE-----
904918
```
905919

906-
// To delete SSO settings, call the following method
907-
err := descopeClient.Management.SSO().DeleteSettings(context.Background(), "tenant-id")
908-
909920
### Manage Password Setting
910921

911922
You can manage password settings for tenants and projects.

descope/internal/mgmt/user.go

+12-12
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@ package mgmt
22

33
import (
44
"context"
5-
"encoding/base64"
65

76
"github.com/descope/go-sdk/descope"
87
"github.com/descope/go-sdk/descope/api"
@@ -61,7 +60,10 @@ func (u *user) create(ctx context.Context, loginID, email, phone, displayName, g
6160
}
6261

6362
func (u *user) createBatch(ctx context.Context, users []*descope.BatchUser, options *descope.InviteOptions) (*descope.UsersBatchResponse, error) {
64-
req := makeCreateUsersBatchRequest(users, options)
63+
req, err := makeCreateUsersBatchRequest(users, options)
64+
if err != nil {
65+
return nil, err
66+
}
6567
res, err := u.client.DoPostRequest(ctx, api.Routes.ManagementUserCreateBatch(), req, nil, u.conf.ManagementKey)
6668
if err != nil {
6769
return nil, err
@@ -570,7 +572,7 @@ func makeCreateUserRequest(loginID, email, phone, displayName, givenName, middle
570572
return req
571573
}
572574

573-
func makeCreateUsersBatchRequest(users []*descope.BatchUser, options *descope.InviteOptions) map[string]any {
575+
func makeCreateUsersBatchRequest(users []*descope.BatchUser, options *descope.InviteOptions) (map[string]any, error) {
574576
var usersReq []map[string]any
575577
for _, u := range users {
576578
user := makeUpdateUserRequest(u.LoginID, u.Email, u.Phone, u.Name, u.GivenName, u.MiddleName, u.FamilyName, u.Picture, u.Roles, u.Tenants, u.CustomAttributes, u.VerifiedEmail, u.VerifiedPhone, u.AdditionalLoginIDs, u.SSOAppIDs)
@@ -579,15 +581,13 @@ func makeCreateUsersBatchRequest(users []*descope.BatchUser, options *descope.In
579581
user["password"] = u.Password.Cleartext
580582
}
581583
if hashed := u.Password.Hashed; hashed != nil {
582-
m := map[string]any{
583-
"algorithm": hashed.Algorithm,
584-
"hash": base64.RawStdEncoding.EncodeToString(hashed.Hash),
584+
b, err := utils.Marshal(hashed)
585+
if err != nil {
586+
return nil, err
585587
}
586-
if len(hashed.Salt) > 0 {
587-
m["salt"] = base64.RawStdEncoding.EncodeToString(hashed.Salt)
588-
}
589-
if hashed.Iterations != 0 {
590-
m["iterations"] = hashed.Iterations
588+
var m map[string]any
589+
if err := utils.Unmarshal(b, &m); err != nil {
590+
return nil, err
591591
}
592592
user["hashedPassword"] = m
593593
}
@@ -610,7 +610,7 @@ func makeCreateUsersBatchRequest(users []*descope.BatchUser, options *descope.In
610610
}
611611
}
612612

613-
return req
613+
return req, nil
614614
}
615615

616616
func makeUpdateUserRequest(loginID, email, phone, displayName, givenName, middleName, familyName, picture string, roles []string, tenants []*descope.AssociatedTenant, customAttributes map[string]any, verifiedEmail *bool, verifiedPhone *bool, additionalLoginIDs []string, ssoAppIDs []string) map[string]any {

descope/internal/mgmt/user_test.go

+12-8
Original file line numberDiff line numberDiff line change
@@ -129,10 +129,12 @@ func TestUsersInviteBatchSuccess(t *testing.T) {
129129
u2.Email = "[email protected]"
130130
u2.Roles = []string{"two"}
131131
u2.Password = &descope.BatchUserPassword{Hashed: &descope.BatchUserPasswordHashed{
132-
Algorithm: descope.BatchUserPasswordAlgorithmPBKDF2SHA256,
133-
Hash: []byte("1"),
134-
Salt: []byte("2"),
135-
Iterations: 100,
132+
Pbkdf2: &descope.BatchUserPasswordPbkdf2{
133+
Hash: []byte("1"),
134+
Salt: []byte("2"),
135+
Iterations: 100,
136+
Type: "sha256",
137+
},
136138
}}
137139

138140
users = append(users, u1, u2)
@@ -170,10 +172,12 @@ func TestUsersInviteBatchSuccess(t *testing.T) {
170172
assert.Nil(t, userRes2["customAttributes"])
171173
pass2, _ := userRes2["hashedPassword"].(map[string]any)
172174
require.NotNil(t, pass2)
173-
require.Equal(t, "pbkdf2sha256", pass2["algorithm"])
174-
require.Equal(t, "MQ", pass2["hash"])
175-
require.Equal(t, "Mg", pass2["salt"])
176-
require.EqualValues(t, 100, pass2["iterations"])
175+
pbkdf2, _ := pass2["pbkdf2"].(map[string]any)
176+
require.NotNil(t, pbkdf2)
177+
require.Equal(t, "MQ==", pbkdf2["hash"])
178+
require.Equal(t, "Mg==", pbkdf2["salt"])
179+
require.EqualValues(t, 100, pbkdf2["iterations"])
180+
require.Equal(t, "sha256", pbkdf2["type"])
177181
roleNames = userRes2["roleNames"].([]any)
178182
require.Len(t, roleNames, 1)
179183
require.Equal(t, u2.Roles[0], roleNames[0])

descope/types.go

+28-11
Original file line numberDiff line numberDiff line change
@@ -381,26 +381,43 @@ type BatchUser struct {
381381
UserRequest `json:",inline"`
382382
}
383383

384+
// Set a cleartext or prehashed password for a new user (only one should be set).
384385
type BatchUserPassword struct {
385386
Cleartext string
386387
Hashed *BatchUserPasswordHashed
387388
}
388389

390+
// Set the kind of prehashed password for a user (only one should be set).
389391
type BatchUserPasswordHashed struct {
390-
Algorithm BatchUserPasswordAlgorithm
391-
Hash []byte
392-
Salt []byte
393-
Iterations int
392+
Bcrypt *BatchUserPasswordBcrypt `json:"bcrypt,omitempty"`
393+
Firebase *BatchUserPasswordFirebase `json:"firebase,omitempty"`
394+
Pbkdf2 *BatchUserPasswordPbkdf2 `json:"pbkdf2,omitempty"`
395+
Django *BatchUserPasswordDjango `json:"django,omitempty"`
394396
}
395397

396-
type BatchUserPasswordAlgorithm string
398+
type BatchUserPasswordBcrypt struct {
399+
Hash string `json:"hash"` // the bcrypt hash in plaintext format, for example "$2a$..."
400+
}
397401

398-
const (
399-
BatchUserPasswordAlgorithmBcrypt BatchUserPasswordAlgorithm = "bcrypt"
400-
BatchUserPasswordAlgorithmPBKDF2SHA1 BatchUserPasswordAlgorithm = "pbkdf2sha1"
401-
BatchUserPasswordAlgorithmPBKDF2SHA256 BatchUserPasswordAlgorithm = "pbkdf2sha256"
402-
BatchUserPasswordAlgorithmPBKDF2SHA512 BatchUserPasswordAlgorithm = "pbkdf2sha512"
403-
)
402+
type BatchUserPasswordFirebase struct {
403+
Hash []byte `json:"hash"` // the hash in raw bytes (base64 strings should be decoded first)
404+
Salt []byte `json:"salt"` // the salt in raw bytes (base64 strings should be decoded first)
405+
SaltSeparator []byte `json:"saltSeparator"` // the salt separator (usually 1 byte long)
406+
SignerKey []byte `json:"signerKey"` // the signer key (base64 strings should be decoded first)
407+
Memory int `json:"memory"` // the memory cost value (usually between 12 to 17)
408+
Rounds int `json:"rounds"` // the rounds cost value (usually between 6 to 10)
409+
}
410+
411+
type BatchUserPasswordPbkdf2 struct {
412+
Hash []byte `json:"hash"` // the hash in raw bytes (base64 strings should be decoded first)
413+
Salt []byte `json:"salt"` // the salt in raw bytes (base64 strings should be decoded first)
414+
Iterations int `json:"iterations"` // the iterations cost value (usually in the thousands)
415+
Type string `json:"type"` // the hash name (sha1, sha256, sha512)
416+
}
417+
418+
type BatchUserPasswordDjango struct {
419+
Hash string `json:"hash"` // the django hash in plaintext format, for example "pbkdf2_sha256$..."
420+
}
404421

405422
type UserResponse struct {
406423
User `json:",inline"`

0 commit comments

Comments
 (0)