Add blacklist i9n test and fix some stuff along the way #261
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Added:
been blacklisted, RIG now sends out a
rig.session_killed
event beforeclosing the socket.
/v2/session-blacklist
, which introduces the following breaking changes:validityInSeconds
should now be passed as an integer value (using a string still works though).Removed:
JWT_BLACKLIST_DEFAULT_EXPIRY_HOURS
environment variable(deprecated since 2.0.0-beta.2).
Security:
connection is established, given the request carries a JWT in its
authorization header. Previously, this was only done by the
subscriptions endpoint, which could cause a connection to remain active
even after blacklisting its authorization token.
On a side note, I've also improved the logging a bit: in
debug
level, there haven't been any logs in case theon_error
callback was invoked in theConnectionInit
module; now RIG will tell us in case something went wrong, and even output all the outgoing messages, at least for SSE.What to look out for
Dear reviewer, I want you to
I know that we still don't have anything on the blacklist feature on the website, but let's resolve this in a follow-up PR.