You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 13, 2023. It is now read-only.
Realtime server is now checking every minute to verify the validity of the user access token and storing updated user information from the JWT to Realtime's subscription table (used by Realtime WALRUS).
Describe the solution you'd like
Realtime client pushes the user access token to all channels every heartbeat, which defaults to 30 seconds (see ref, ref, and ref).
Supabase client sends latest and valid user access token on auth events SIGNED_IN and TOKEN_REFRESHED (see ref)*.
Supabase client removes all subscriptions on auth event SIGNED_OUT (see ref)*.
Realtime Security (WALRUS) will be launched very soon so we'll mention that additional Supabase client libs, like this one, will be compatible with the new Realtime some time in the near future.
The text was updated successfully, but these errors were encountered:
Hi,
I just wanted to ask is there any news on this issue or can I help with anything to get this resolved?
Because we are seeing exceptions thrown and the stream dying, that seem to be related to the token expiring.
Thanks
Feature request
Realtime server is now checking every minute to verify the validity of the user access token and storing updated user information from the JWT to Realtime's
subscription
table (used by Realtime WALRUS).Describe the solution you'd like
SIGNED_IN
andTOKEN_REFRESHED
(see ref)*.SIGNED_OUT
(see ref)*.*fix: improve auth for realtime row level security #303
Additional context
Realtime Security (WALRUS) will be launched very soon so we'll mention that additional Supabase client libs, like this one, will be compatible with the new Realtime some time in the near future.
The text was updated successfully, but these errors were encountered: