Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix | Handle invalid auth token #158

Merged
merged 2 commits into from
Sep 2, 2024
Merged

Conversation

Sergio-e
Copy link
Collaborator

@Sergio-e Sergio-e commented Aug 30, 2024

Description

Fixes the following error:
https://appsignal.com/telos-labs-1/sites/6699677a94809a7074e5bef5/exceptions/incidents/63/samples/last

How has this been tested?

Please mark the tests that you ran to verify your changes. If difficult to test, consider providing instructions so reviewers can test.

  • Manual testing
  • System tests
  • Unit tests
  • None

Checklist

  • CI pipeline is passing
  • My code follows the conventions of this project
  • I have performed a self-review of my code
  • I have commented on my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation (if applicable)
  • I have added seed data to the database (if applicable)

Release tasks

Add any tasks that need to be done before/after the release of this feature.

Screenshots/Loom

This section is relevant in case we want to share progress with the team, otherwise, it can be omitted.

@Sergio-e Sergio-e self-assigned this Aug 30, 2024
private

def current_profile = current_user&.profile

# TODO: Must change after implementing multi-conference support
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added this note to the "Bugs & improvements" sheet

@@ -7,14 +7,22 @@ class ApplicationController < ActionController::Base

helper_method :current_profile, :current_conference, :vapid_public_key

rescue_from ActionController::InvalidAuthenticityToken,
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You can test this out by going to /user_session/new, deleting your cookies, and submitting the form. Another way is to inspect the DOM and change the CSRF token in the head and in the form you want to submit

@andresag4 andresag4 merged commit e3b2f30 into main Sep 2, 2024
4 checks passed
@andresag4 andresag4 deleted the handle-invalid-auth-token branch September 2, 2024 17:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants