-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[local-app] gracefully handle invalid token #5369
Conversation
36c0f54
to
66ed329
Compare
45b6e0d
to
4210b0f
Compare
4210b0f
to
cbaa18c
Compare
Codecov Report
@@ Coverage Diff @@
## main #5369 +/- ##
===========================================
- Coverage 79.52% 35.15% -44.38%
===========================================
Files 2 23 +21
Lines 127 5063 +4936
===========================================
+ Hits 101 1780 +1679
- Misses 17 3135 +3118
- Partials 9 148 +139
Flags with carried forward coverage won't be shown. Click here to find out more.
Continue to review full report at Codecov.
|
cbaa18c
to
bf375c7
Compare
9818ee3
to
bbb5b5e
Compare
@csweichel Could you check it again? I rewrote getGitpodTokenScopes to accept the token hash. |
/werft run 👍 started the job as gitpod-build-akosyakov-local-app-is-crashing-5368.14 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Other than a couple of questions and a nit this looks good to me
bbb5b5e
to
0336a71
Compare
@csweichel Could you have a look again please? All comments should be addressed. |
f56b033
to
4f89718
Compare
4f89718
to
018e57f
Compare
/lgtm |
LGTM label has been added. Git tree hash: 99039cd043fb7f4830c96d1bb45e23c2fa7d53eb
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: csweichel Associated issue: #5368 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What it does
I had to move bearer auth into verify callback to return a proper error code during web socket handshake, instead of failing after web socket is established. It allows clients to analyse the bad hahdshake request for unauthorised access.
How to test
update d_b_gitpod_token set scopes = "";