Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix(BA-781): Let Auth API handler check all keypairs owned by user #3780

Open
wants to merge 7 commits into
base: main
Choose a base branch
from

Conversation

fregataa
Copy link
Member

@fregataa fregataa commented Feb 20, 2025

resolves #3738 (BA-781)

Checklist: (if applicable)

  • Milestone metadata specifying the target backport version
  • Mention to the original issue

📚 Documentation preview 📚: https://sorna--3780.org.readthedocs.build/en/3780/


📚 Documentation preview 📚: https://sorna-ko--3780.org.readthedocs.build/ko/3780/

@fregataa fregataa added this to the 24.09 milestone Feb 20, 2025
@fregataa fregataa self-assigned this Feb 20, 2025
@github-actions github-actions bot added comp:manager Related to Manager component size:M 30~100 LoC labels Feb 20, 2025
@github-actions github-actions bot added the area:docs Documentations label Feb 20, 2025
@fregataa fregataa changed the title Fix(BA-781): Check and assign main keypair Fix(BA-781): Let Auth API handler check all keypairs owned by user Feb 20, 2025
await check_password_age(root_ctx.db, user, root_ctx.shared_config["auth"])
async with root_ctx.db.begin_session() as db_session:
user_row = await UserRow.query_user_by_uuid(user["uuid"], db_session)
assert user_row is not None
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Don't use assert.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area:docs Documentations comp:manager Related to Manager component size:M 30~100 LoC
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Unable to login when user have multiple keypairs
2 participants