Skip to content

Commit b106a0d

Browse files
committed
removes overwrite session flag
1 parent 5236c14 commit b106a0d

File tree

5 files changed

+7
-36
lines changed

5 files changed

+7
-36
lines changed

supertokens_python/auth_utils.py

Lines changed: 6 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@
2121
)
2222
from supertokens_python.recipe.multitenancy.asyncio import associate_user_to_tenant
2323
from supertokens_python.recipe.session.interfaces import SessionContainer
24-
from supertokens_python.recipe.session.recipe import SessionRecipe
2524
from supertokens_python.recipe.session.asyncio import create_new_session, get_session
2625
from supertokens_python.recipe.thirdparty.types import ThirdPartyInfo
2726
from supertokens_python.types import (
@@ -249,17 +248,13 @@ async def post_auth_checks(
249248
# If the new user wasn't linked to the current one, we check the config and overwrite the session if required
250249
# Note: we could also get here if MFA is enabled, but the app didn't want to link the user to the session user.
251250
# This is intentional, since the MFA and overwriteSessionDuringSignInUp configs should work independently.
252-
overwrite_session_during_sign_in_up = (
253-
SessionRecipe.get_instance().config.overwrite_session_during_sign_in_up
251+
resp_session = await create_new_session(
252+
request, tenant_id, recipe_user_id, {}, {}, user_context
254253
)
255-
if overwrite_session_during_sign_in_up:
256-
resp_session = await create_new_session(
257-
request, tenant_id, recipe_user_id, {}, {}, user_context
254+
if mfa_instance is not None:
255+
await mark_factor_as_complete_in_session(
256+
resp_session, factor_id, user_context
258257
)
259-
if mfa_instance is not None:
260-
await mark_factor_as_complete_in_session(
261-
resp_session, factor_id, user_context
262-
)
263258
else:
264259
log_debug_message("postAuthChecks creating session for first factor sign in/up")
265260
# If there is no input session, we do not need to do anything other checks and create a new session
@@ -993,14 +988,7 @@ async def load_session_in_auth_api_if_needed(
993988
user_context: Dict[str, Any],
994989
) -> Optional[SessionContainer]:
995990

996-
overwrite_session_during_sign_in_up = (
997-
SessionRecipe.get_instance().config.overwrite_session_during_sign_in_up
998-
)
999-
1000-
if (
1001-
should_try_linking_with_session_user is not False
1002-
or not overwrite_session_during_sign_in_up
1003-
):
991+
if should_try_linking_with_session_user is not False:
1004992
return await get_session(
1005993
request,
1006994
session_required=should_try_linking_with_session_user is True,

supertokens_python/recipe/session/__init__.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,6 @@ def init(
5252
use_dynamic_access_token_signing_key: Union[bool, None] = None,
5353
expose_access_token_to_frontend_in_cookie_based_auth: Union[bool, None] = None,
5454
jwks_refresh_interval_sec: Union[int, None] = None,
55-
overwrite_session_during_sign_in_up: Union[bool, None] = None,
5655
) -> Callable[[AppInfo], RecipeModule]:
5756
return SessionRecipe.init(
5857
cookie_domain,
@@ -68,5 +67,4 @@ def init(
6867
use_dynamic_access_token_signing_key,
6968
expose_access_token_to_frontend_in_cookie_based_auth,
7069
jwks_refresh_interval_sec,
71-
overwrite_session_during_sign_in_up,
7270
)

supertokens_python/recipe/session/recipe.py

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,6 @@ def __init__(
9393
use_dynamic_access_token_signing_key: Union[bool, None] = None,
9494
expose_access_token_to_frontend_in_cookie_based_auth: Union[bool, None] = None,
9595
jwks_refresh_interval_sec: Union[int, None] = None,
96-
overwrite_session_during_sign_in_up: Union[bool, None] = None,
9796
):
9897
super().__init__(recipe_id, app_info)
9998
self.config = validate_and_normalise_user_input(
@@ -111,7 +110,6 @@ def __init__(
111110
use_dynamic_access_token_signing_key,
112111
expose_access_token_to_frontend_in_cookie_based_auth,
113112
jwks_refresh_interval_sec,
114-
overwrite_session_during_sign_in_up,
115113
)
116114
self.openid_recipe = OpenIdRecipe(
117115
recipe_id,
@@ -312,7 +310,6 @@ def init(
312310
use_dynamic_access_token_signing_key: Union[bool, None] = None,
313311
expose_access_token_to_frontend_in_cookie_based_auth: Union[bool, None] = None,
314312
jwks_refresh_interval_sec: Union[int, None] = None,
315-
overwrite_session_during_sign_in_up: Union[bool, None] = None,
316313
):
317314
def func(app_info: AppInfo):
318315
if SessionRecipe.__instance is None:
@@ -332,7 +329,6 @@ def func(app_info: AppInfo):
332329
use_dynamic_access_token_signing_key,
333330
expose_access_token_to_frontend_in_cookie_based_auth,
334331
jwks_refresh_interval_sec,
335-
overwrite_session_during_sign_in_up,
336332
)
337333
return SessionRecipe.__instance
338334
raise_general_exception(

supertokens_python/recipe/session/utils.py

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -391,7 +391,6 @@ def __init__(
391391
use_dynamic_access_token_signing_key: bool,
392392
expose_access_token_to_frontend_in_cookie_based_auth: bool,
393393
jwks_refresh_interval_sec: int,
394-
overwrite_session_during_sign_in_up: bool,
395394
):
396395
self.session_expired_status_code = session_expired_status_code
397396
self.invalid_claim_status_code = invalid_claim_status_code
@@ -412,7 +411,6 @@ def __init__(
412411
self.framework = framework
413412
self.mode = mode
414413
self.jwks_refresh_interval_sec = jwks_refresh_interval_sec
415-
self.overwrite_session_during_sign_in_up = overwrite_session_during_sign_in_up
416414

417415

418416
def validate_and_normalise_user_input(
@@ -436,7 +434,6 @@ def validate_and_normalise_user_input(
436434
use_dynamic_access_token_signing_key: Union[bool, None] = None,
437435
expose_access_token_to_frontend_in_cookie_based_auth: Union[bool, None] = None,
438436
jwks_refresh_interval_sec: Union[int, None] = None,
439-
overwrite_session_during_sign_in_up: Union[bool, None] = None,
440437
):
441438
_ = cookie_same_site # we have this otherwise pylint complains that cookie_same_site is unused, but it is being used in the get_cookie_same_site function.
442439
if anti_csrf not in {"VIA_TOKEN", "VIA_CUSTOM_HEADER", "NONE", None}:
@@ -564,11 +561,6 @@ def anti_csrf_function(
564561
use_dynamic_access_token_signing_key,
565562
expose_access_token_to_frontend_in_cookie_based_auth,
566563
jwks_refresh_interval_sec,
567-
(
568-
overwrite_session_during_sign_in_up
569-
if overwrite_session_during_sign_in_up is not None
570-
else False
571-
),
572564
)
573565

574566

tests/test-server/app.py

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -301,9 +301,6 @@ async def custom_unauthorised_callback(
301301
use_dynamic_access_token_signing_key=recipe_config_json.get(
302302
"useDynamicAccessTokenSigningKey"
303303
),
304-
overwrite_session_during_sign_in_up=recipe_config_json.get(
305-
"overwriteSessionDuringSignInUp", None
306-
),
307304
override=session.InputOverrideConfig(
308305
apis=override_builder_with_logging(
309306
"Session.override.apis",
@@ -703,7 +700,7 @@ def override_params():
703700

704701
@app.route("/test/featureflag", methods=["GET"]) # type: ignore
705702
def feature_flag():
706-
return jsonify([])
703+
return jsonify(["removedOverwriteSessionDuringSignInUp"])
707704

708705

709706
@app.route("/test/resetoverrideparams", methods=["POST"]) # type: ignore

0 commit comments

Comments
 (0)