-
Notifications
You must be signed in to change notification settings - Fork 195
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
JWT and api keys authentication fixes #519
base: main
Are you sure you want to change the base?
Conversation
Qovery can create a Preview Environment for this PR.
This comment has been generated from Qovery AI 🤖.
|
|
@mohamedsalem401 is attempting to deploy a commit to the Panora Team on Vercel. A member of the Team first needs to authorize it. |
Important Review skippedAuto reviews are disabled on this repository. Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (invoked as PR comments)
Additionally, you can add CodeRabbit Configration File (
|
Hello @mohamedsalem401, actually I considered the first scenario and that is why I added the verifyUser method at the auth/profile endpoint. Could please double-check that? Thank you. |
Hey @mit-27, Let me check and get back to you :D |
The current implementation checks if the user associated with the JWT token exists in the database when calling the
|
Yes, you are right. we need to verify the user within the guard so that it can apply to all JWT-guarded endpoints. Thanks |
This PR should handle two seperate issue
validateApiKey
service now returns a 401 Unauthorized error (instead of a500 Internal Server Error
) when an invalid or deleted API key is encountered.