Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: specify a unique mock authToken for dial-in users, + #19084

Conversation

prlanzarin
Copy link
Member

What does this PR do?

  • fix: specify a unique mock authToken for dial-in users
    • Every dial in user has its RegistedUser authToken set to an empty string.
      Since authToken is the RegUser's HashMap indexing key, this causes a
      bunch of inconsistencies; eg.: endpoint ejection will stop working if
      more than one dial-in user joined a single meeting because the
      later dial-in devices overwrite the earlier ones in the RegUsers map.
    • The authToken is now mocked as the user's intId (which, for dial-in, is
      the voice user ID) so that some sort of uniqueness is guaranteed within
      the voice conf scope.
  • fix: reversed userColor and avatar args in dial-in user creation
    • Benign: userColor and avatar arguments of RegisteredUsers.create were incorrectly placed

Closes Issue(s)

None

Every dial in user has its RegistedUser authToken set to an empty string,
Since authToken is the RegUser's HashMap indexing key, this causes a
bunch of inconsistencies; eg.: endpoint ejection will stop working if
more than one dial-in user joined a meeting concurrently because the
later dial-in devices overwrite the earlier ones in the RegUsers map.

The authToken is now mocked as the user's intId (which, for dial-in, is
the voice user ID) so that some sort of uniqueness is guaranteed within
the voice conf scope.
userColor and avatar arguments of RegisteredUsers.create were incorrectly placed
Copy link

sonarcloud bot commented Nov 7, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

@prlanzarin prlanzarin added this to the Release 2.7 milestone Nov 7, 2023
Copy link

github-actions bot commented Nov 7, 2023

Automated tests Summary

All the CI tests have passed!

@antobinary antobinary merged commit f314aaf into bigbluebutton:v2.7.x-release Nov 8, 2023
25 checks passed
@prlanzarin prlanzarin deleted the u27/fix/dialin-reguser-dedupe branch November 8, 2023 14:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants