Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: add condition for token to authenticate user #534

Merged
merged 1 commit into from
Oct 10, 2023

Conversation

afzal442
Copy link
Contributor

Fixes #524

Removes unauthorised user to authenticate using token

@sonarqubecloud
Copy link

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

@afzal442
Copy link
Contributor Author

Hi @oviecodes I think it resolves that auth part. Can you review it?

cc @Souvikns

@afzal442 afzal442 changed the title Added condition for token to authenticate user fix: add condition for token to authenticate user Oct 10, 2023
@oviecodes
Copy link
Contributor

@afzal442 okay. You could use any logic to authenticate the user. Usually it would be an API call or some logic that references an authentication API. But what you've done is nice. Thanks

@afzal442
Copy link
Contributor Author

Thanks @Souvikns @oviecodes for your reviews. I have tested it locally, it works.

/rtm

@asyncapi-bot asyncapi-bot merged commit 59041da into asyncapi:master Oct 10, 2023
23 of 24 checks passed
@afzal442 afzal442 deleted the add-token-auth branch October 10, 2023 13:16
@asyncapi-bot
Copy link
Contributor

🎉 This PR is included in version 0.26.10 🎉

The release is available on:

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Bug] Unauthorized error on auth user data while running through crypto-websockets example
4 participants