From c65a88fc9f6f7312b704e813f21030b140e6615a Mon Sep 17 00:00:00 2001 From: Paul Lessing Date: Tue, 28 Jun 2022 19:32:54 +0100 Subject: [PATCH 1/3] Fix: Changing security settings should not implicitly save allowedDomains --- app/scenes/Settings/Security.tsx | 94 ++++++++++++++++++-------------- app/stores/AuthStore.ts | 1 + 2 files changed, 53 insertions(+), 42 deletions(-) diff --git a/app/scenes/Settings/Security.tsx b/app/scenes/Settings/Security.tsx index f978340d5..f56d2ab2d 100644 --- a/app/scenes/Settings/Security.tsx +++ b/app/scenes/Settings/Security.tsx @@ -36,9 +36,12 @@ function Security() { defaultUserRole: team.defaultUserRole, memberCollectionCreate: team.memberCollectionCreate, inviteRequired: team.inviteRequired, - allowedDomains: team.allowedDomains, }); + const [allowedDomains, setAllowedDomains] = useState([ + ...(team.allowedDomains ?? []), + ]); + const authenticationMethods = team.signinMethods; const showSuccessMessage = React.useMemo( @@ -59,9 +62,7 @@ function Security() { setData(newData); await auth.updateTeam(newData); showSuccessMessage(); - setDomainsChanged(false); } catch (err) { - setDomainsChanged(true); showToast(err.message, { type: "error", }); @@ -77,6 +78,21 @@ function Security() { [data, saveData] ); + const handleSaveDomains = React.useCallback(async () => { + try { + await auth.updateTeam({ + allowedDomains, + }); + showSuccessMessage(); + setDomainsChanged(false); + } catch (err) { + setDomainsChanged(true); + showToast(err.message, { + type: "error", + }); + } + }, [auth, allowedDomains, showSuccessMessage, showToast]); + const handleDefaultRoleChange = React.useCallback( async (newDefaultRole: string) => { await saveData({ ...data, defaultUserRole: newDefaultRole }); @@ -123,31 +139,26 @@ function Security() { ); const handleRemoveDomain = async (index: number) => { - const newData = { - ...data, - }; - newData.allowedDomains && newData.allowedDomains.splice(index, 1); + const newDomains = allowedDomains.filter((_, i) => index !== i); - setData(newData); + setAllowedDomains(newDomains); setDomainsChanged(true); }; const handleAddDomain = () => { - const newData = { - ...data, - allowedDomains: [...(data.allowedDomains || []), ""], - }; + const newDomains = [...allowedDomains, ""]; - setData(newData); + setAllowedDomains(newDomains); + setDomainsChanged(true); }; const createOnDomainChangedHandler = (index: number) => ( ev: React.ChangeEvent ) => { - const newData = { ...data }; + const newDomains = allowedDomains.slice(); - newData.allowedDomains![index] = ev.currentTarget.value; - setData(newData); + newDomains[index] = ev.currentTarget.value; + setAllowedDomains(newDomains); setDomainsChanged(true); }; @@ -269,35 +280,34 @@ function Security() { "The domains which should be allowed to create accounts. This applies to both SSO and Email logins. Changing this setting does not affect existing user accounts." )} > - {data.allowedDomains && - data.allowedDomains.map((domain, index) => ( - - - - - handleRemoveDomain(index)}> - - - - - - ))} + {allowedDomains.map((domain, index) => ( + + + + + handleRemoveDomain(index)}> + + + + + + ))} - {!data.allowedDomains?.length || - data.allowedDomains[data.allowedDomains.length - 1] !== "" ? ( + {!allowedDomains.length || + allowedDomains[allowedDomains.length - 1] !== "" ? (