- 
          
 - 
                Notifications
    
You must be signed in to change notification settings  - Fork 252
 
fix: invalid revoke token #7012
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
2f92c99    to
    96b1644      
    Compare
  
    | 
           @metamaskbot publish-preview  | 
    
| 
           Preview builds have been published. See these instructions for more information about preview builds. Expand for full list of packages and versions. | 
    
| 
           @metamaskbot publish-preview  | 
    
| 
           Preview builds have been published. See these instructions for more information about preview builds. Expand for full list of packages and versions. | 
    
| 
           @metamaskbot publish-preview  | 
    
| 
           Preview builds have been published. See these instructions for more information about preview builds. Expand for full list of packages and versions. | 
    
…param to skip vault creation check
| 
           @metamaskbot publish-preview  | 
    
| 
           Preview builds have been published. See these instructions for more information about preview builds. Expand for full list of packages and versions. | 
    
Explanation
Fixed
Invalid Revoke Token.References
Checklist
Note
Makes revoke/access token handling stricter and retrievable from the vault, renames the auth-check API, and fixes InvalidRevokeToken during token refresh.
authenticate: makerevokeTokenoptional; stop relying on it during refresh; persist only when provided.#getAccessTokenAndRevokeToken(password)to sourceaccessToken/revokeTokenfrom state or decrypting the vault.checkIsSeedlessOnboardingUserAuthenticatedtogetIsUserAuthenticated(skipVaultCreationCheck?)and support skipping vault-token checks.#assertIsAuthenticatedUser; throw on missing SRPauthPubKey; treat missingaccessTokenas expired incheckAccessTokenExpired.accessTokenandrevokeTokento exist in vault data; improve error specificity when missing/invalid.VaultData.revokeTokenis now required; refineassertIsValidVaultDataandassertIsSeedlessOnboardingUserAuthenticated; removeassertIsAuthUserInfoValid.revokeTokeninauthenticate, and fix forInvalidRevokeTokeninrefreshAuthTokens.Written by Cursor Bugbot for commit 6e4fc6a. This will update automatically on new commits. Configure here.