Skip to content

Conversation

@J0
Copy link
Contributor

@J0 J0 commented Sep 18, 2024

What kind of change does this PR introduce?

Adds MFA for WebAuthn and supporting migrations

What is the current behavior?

MFA for Phone and MFA for TOTP is supported

What is the new behavior?

Developers can use MFA For WebAuthn to sign in

@J0 J0 force-pushed the j0/add_webauthn branch 2 times, most recently from 4bafb15 to cb1ac2a Compare September 28, 2024 09:34
@J0
Copy link
Contributor Author

J0 commented Sep 28, 2024

Not quite ready yet, please check back after 12pm CEST tomorrow..

@coveralls
Copy link

coveralls commented Sep 30, 2024

Pull Request Test Coverage Report for Build 11293653315

Warning: This coverage report may be inaccurate.

This pull request's base commit is no longer the HEAD commit of its target branch. This means it includes changes from outside the original pull request, including, potentially, unrelated coverage changes.

Details

  • 141 of 360 (39.17%) changed or added relevant lines in 5 files are covered.
  • 76 unchanged lines in 4 files lost coverage.
  • Overall coverage decreased (-0.4%) to 57.577%

Changes Missing Coverage Covered Lines Changed/Added Lines %
internal/models/user.go 9 18 50.0%
internal/models/challenge.go 16 37 43.24%
internal/models/factor.go 10 46 21.74%
internal/api/mfa.go 105 258 40.7%
Files with Coverage Reduction New Missed Lines %
internal/api/mfa.go 2 57.97%
cmd/serve_cmd.go 10 0.0%
internal/api/api.go 19 84.21%
internal/api/middleware.go 45 80.37%
Totals Coverage Status
Change from base Build 11256757764: -0.4%
Covered Lines: 9499
Relevant Lines: 16498

💛 - Coveralls

@J0 J0 marked this pull request as ready for review October 2, 2024 14:57
@J0 J0 requested a review from a team as a code owner October 2, 2024 14:57
@J0 J0 force-pushed the j0/add_webauthn branch from a78abe0 to cc7aab0 Compare October 3, 2024 15:49
Copy link
Contributor

@hf hf left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Very good, very close! Thanks!

@J0 J0 force-pushed the j0/add_webauthn branch 2 times, most recently from c9b18e3 to cc764cc Compare October 10, 2024 14:16
@J0 J0 force-pushed the j0/add_webauthn branch from cc764cc to e92aeac Compare October 10, 2024 14:22
Copy link
Contributor

@hf hf left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pretty solid. Approving but please consider the points especially about scanning.

@J0
Copy link
Contributor Author

J0 commented Oct 11, 2024

Merging first but let's not release until we do a full test with the updated frontend bindings. I will follow up on that front.

None of the code below should be active since it's flagged behind MFA_WEB_AUTHN_*_ENABLED

@J0 J0 merged commit 8cc2f0e into master Oct 11, 2024
2 checks passed
@J0 J0 deleted the j0/add_webauthn branch October 11, 2024 14:04
cstockton pushed a commit that referenced this pull request Oct 15, 2024
🤖 I have created a release *beep* *boop*
---


##
[2.163.0](v2.162.2...v2.163.0)
(2024-10-15)


### Features

* add mail header support via `GOTRUE_SMTP_HEADERS` with `$messageType`
([#1804](#1804))
([99d6a13](99d6a13))
* add MFA for WebAuthn
([#1775](#1775))
([8cc2f0e](8cc2f0e))
* configurable email and sms rate limiting
([#1800](#1800))
([5e94047](5e94047))
* mailer logging ([#1805](#1805))
([9354b83](9354b83))
* preserve rate limiters in memory across configuration reloads
([#1792](#1792))
([0a3968b](0a3968b))


### Bug Fixes

* add twilio verify support on mfa
([#1714](#1714))
([aeb5d8f](aeb5d8f))
* email header setting no longer misleading
([#1802](#1802))
([3af03be](3af03be))
* enforce authorized address checks on send email only
([#1806](#1806))
([c0c5b23](c0c5b23))
* fix `getExcludedColumns` slice allocation
([#1788](#1788))
([7f006b6](7f006b6))
* Fix reqPath for bypass check for verify EP
([#1789](#1789))
([646dc66](646dc66))
* inline mailme package for easy development
([#1803](#1803))
([fa6f729](fa6f729))

---
This PR was generated with [Release
Please](https://github.com/googleapis/release-please). See
[documentation](https://github.com/googleapis/release-please#release-please).

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
cemalkilic pushed a commit that referenced this pull request Aug 7, 2025
## What kind of change does this PR introduce?

Adds MFA for WebAuthn and supporting migrations

## What is the current behavior?

MFA for Phone and MFA for TOTP is supported 

## What is the new behavior?

Developers can use MFA For WebAuthn to sign in

---------

Co-authored-by: Stojan Dimitrovski <[email protected]>
cemalkilic pushed a commit that referenced this pull request Aug 7, 2025
🤖 I have created a release *beep* *boop*
---


##
[2.163.0](v2.162.2...v2.163.0)
(2024-10-15)


### Features

* add mail header support via `GOTRUE_SMTP_HEADERS` with `$messageType`
([#1804](#1804))
([99d6a13](99d6a13))
* add MFA for WebAuthn
([#1775](#1775))
([8cc2f0e](8cc2f0e))
* configurable email and sms rate limiting
([#1800](#1800))
([5e94047](5e94047))
* mailer logging ([#1805](#1805))
([9354b83](9354b83))
* preserve rate limiters in memory across configuration reloads
([#1792](#1792))
([0a3968b](0a3968b))


### Bug Fixes

* add twilio verify support on mfa
([#1714](#1714))
([aeb5d8f](aeb5d8f))
* email header setting no longer misleading
([#1802](#1802))
([3af03be](3af03be))
* enforce authorized address checks on send email only
([#1806](#1806))
([c0c5b23](c0c5b23))
* fix `getExcludedColumns` slice allocation
([#1788](#1788))
([7f006b6](7f006b6))
* Fix reqPath for bypass check for verify EP
([#1789](#1789))
([646dc66](646dc66))
* inline mailme package for easy development
([#1803](#1803))
([fa6f729](fa6f729))

---
This PR was generated with [Release
Please](https://github.com/googleapis/release-please). See
[documentation](https://github.com/googleapis/release-please#release-please).

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
xeladotbe pushed a commit to xeladotbe/supabase-auth that referenced this pull request Sep 27, 2025
## What kind of change does this PR introduce?

Adds MFA for WebAuthn and supporting migrations

## What is the current behavior?

MFA for Phone and MFA for TOTP is supported 

## What is the new behavior?

Developers can use MFA For WebAuthn to sign in

---------

Co-authored-by: Stojan Dimitrovski <[email protected]>
xeladotbe pushed a commit to xeladotbe/supabase-auth that referenced this pull request Sep 27, 2025
🤖 I have created a release *beep* *boop*
---


##
[2.163.0](supabase/auth@v2.162.2...v2.163.0)
(2024-10-15)


### Features

* add mail header support via `GOTRUE_SMTP_HEADERS` with `$messageType`
([supabase#1804](supabase#1804))
([99d6a13](supabase@99d6a13))
* add MFA for WebAuthn
([supabase#1775](supabase#1775))
([8cc2f0e](supabase@8cc2f0e))
* configurable email and sms rate limiting
([supabase#1800](supabase#1800))
([5e94047](supabase@5e94047))
* mailer logging ([supabase#1805](supabase#1805))
([9354b83](supabase@9354b83))
* preserve rate limiters in memory across configuration reloads
([supabase#1792](supabase#1792))
([0a3968b](supabase@0a3968b))


### Bug Fixes

* add twilio verify support on mfa
([supabase#1714](supabase#1714))
([aeb5d8f](supabase@aeb5d8f))
* email header setting no longer misleading
([supabase#1802](supabase#1802))
([3af03be](supabase@3af03be))
* enforce authorized address checks on send email only
([supabase#1806](supabase#1806))
([c0c5b23](supabase@c0c5b23))
* fix `getExcludedColumns` slice allocation
([supabase#1788](supabase#1788))
([7f006b6](supabase@7f006b6))
* Fix reqPath for bypass check for verify EP
([supabase#1789](supabase#1789))
([646dc66](supabase@646dc66))
* inline mailme package for easy development
([supabase#1803](supabase#1803))
([fa6f729](supabase@fa6f729))

---
This PR was generated with [Release
Please](https://github.com/googleapis/release-please). See
[documentation](https://github.com/googleapis/release-please#release-please).

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
issuedat pushed a commit that referenced this pull request Sep 30, 2025
## What kind of change does this PR introduce?

Adds MFA for WebAuthn and supporting migrations

## What is the current behavior?

MFA for Phone and MFA for TOTP is supported 

## What is the new behavior?

Developers can use MFA For WebAuthn to sign in

---------

Co-authored-by: Stojan Dimitrovski <[email protected]>
issuedat pushed a commit that referenced this pull request Sep 30, 2025
🤖 I have created a release *beep* *boop*
---


##
[2.163.0](v2.162.2...v2.163.0)
(2024-10-15)


### Features

* add mail header support via `GOTRUE_SMTP_HEADERS` with `$messageType`
([#1804](#1804))
([99d6a13](99d6a13))
* add MFA for WebAuthn
([#1775](#1775))
([8cc2f0e](8cc2f0e))
* configurable email and sms rate limiting
([#1800](#1800))
([5e94047](5e94047))
* mailer logging ([#1805](#1805))
([9354b83](9354b83))
* preserve rate limiters in memory across configuration reloads
([#1792](#1792))
([0a3968b](0a3968b))


### Bug Fixes

* add twilio verify support on mfa
([#1714](#1714))
([aeb5d8f](aeb5d8f))
* email header setting no longer misleading
([#1802](#1802))
([3af03be](3af03be))
* enforce authorized address checks on send email only
([#1806](#1806))
([c0c5b23](c0c5b23))
* fix `getExcludedColumns` slice allocation
([#1788](#1788))
([7f006b6](7f006b6))
* Fix reqPath for bypass check for verify EP
([#1789](#1789))
([646dc66](646dc66))
* inline mailme package for easy development
([#1803](#1803))
([fa6f729](fa6f729))

---
This PR was generated with [Release
Please](https://github.com/googleapis/release-please). See
[documentation](https://github.com/googleapis/release-please#release-please).

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants