Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Override token contents when reusing sessions #5640

Merged
merged 1 commit into from Oct 16, 2023

Conversation

philippjfr
Copy link
Member

Fixes #5552

@codecov
Copy link

codecov bot commented Oct 15, 2023

Codecov Report

Merging #5640 (75bb421) into main (db1e9fe) will decrease coverage by 0.05%.
The diff coverage is 84.21%.

@@            Coverage Diff             @@
##             main    #5640      +/-   ##
==========================================
- Coverage   83.65%   83.60%   -0.05%     
==========================================
  Files         280      280              
  Lines       41580    41599      +19     
==========================================
- Hits        34782    34780       -2     
- Misses       6798     6819      +21     
Flag Coverage Δ
ui-tests 39.57% <5.26%> (-0.02%) ⬇️
unitexamples-tests 73.69% <84.21%> (-0.05%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

Files Coverage Δ
panel/io/server.py 75.43% <84.21%> (+0.24%) ⬆️

... and 6 files with indirect coverage changes

📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more

@philippjfr philippjfr force-pushed the reuse_sessions_token_payload_update branch from 0253152 to 75bb421 Compare October 15, 2023 19:38
@philippjfr philippjfr merged commit a6dcce9 into main Oct 16, 2023
12 of 15 checks passed
@philippjfr philippjfr deleted the reuse_sessions_token_payload_update branch October 16, 2023 11:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Cookies and possibly other unwanted info are copied in new sessions with --reuse-sessions
1 participant