Skip to content

Commit

Permalink
PREAPPS-8066 remove ignoreSameSite in Auth Requests
Browse files Browse the repository at this point in the history
  • Loading branch information
damini-vashishtha authored and silentsakky committed Oct 18, 2024
1 parent 3c49b99 commit 994c7b5
Show file tree
Hide file tree
Showing 4 changed files with 2 additions and 11 deletions.
8 changes: 2 additions & 6 deletions src/batch-client/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -860,8 +860,7 @@ export class ZimbraBatchClient {
password,
authToken,
twoFactorCode,
csrfTokenSecured,
ignoreSameSite
csrfTokenSecured
}: EnableTwoFactorAuthInput) =>
this.jsonRequest({
name: 'EnableTwoFactorAuth',
Expand Down Expand Up @@ -894,7 +893,6 @@ export class ZimbraBatchClient {
_content: twoFactorCode
}
}),
...(ignoreSameSite && { ignoreSameSite }),
csrfTokenSecured
},
namespace: Namespace.Account,
Expand Down Expand Up @@ -1481,8 +1479,7 @@ export class ZimbraBatchClient {
persistAuthTokenCookie,
twoFactorCode,
deviceTrusted,
csrfTokenSecured,
ignoreSameSite
csrfTokenSecured
}: LoginOptions) =>
this.jsonRequest({
name: 'Auth',
Expand All @@ -1495,7 +1492,6 @@ export class ZimbraBatchClient {
by: 'name',
_content: username
},
...(ignoreSameSite && { ignoreSameSite }),
...(password && { password }),
...(recoveryCode && {
recoveryCode: {
Expand Down
1 change: 0 additions & 1 deletion src/batch-client/types.ts
Original file line number Diff line number Diff line change
Expand Up @@ -245,7 +245,6 @@ export interface ModifyProfileImageOptions {
export interface LoginOptions {
csrfTokenSecured: boolean;
deviceTrusted?: boolean;
ignoreSameSite?: boolean;
password: string;
persistAuthTokenCookie?: boolean;
recoveryCode?: string;
Expand Down
2 changes: 0 additions & 2 deletions src/schema/generated-schema-types.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1534,7 +1534,6 @@ export type EnableTwoFactorAuthInput = {
authToken?: InputMaybe<Scalars['String']['input']>;
csrfTokenSecured: Scalars['Boolean']['input'];
email?: InputMaybe<Scalars['String']['input']>;
ignoreSameSite?: InputMaybe<Scalars['Boolean']['input']>;
method: Scalars['String']['input'];
name: Scalars['String']['input'];
password?: InputMaybe<Scalars['String']['input']>;
Expand Down Expand Up @@ -3017,7 +3016,6 @@ export type MutationItemActionArgs = {
export type MutationLoginArgs = {
csrfTokenSecured: Scalars['Boolean']['input'];
deviceTrusted?: InputMaybe<Scalars['Boolean']['input']>;
ignoreSameSite?: InputMaybe<Scalars['Boolean']['input']>;
password?: InputMaybe<Scalars['String']['input']>;
persistAuthTokenCookie?: InputMaybe<Scalars['Boolean']['input']>;
recoveryCode?: InputMaybe<Scalars['String']['input']>;
Expand Down
2 changes: 0 additions & 2 deletions src/schema/schema.graphql
Original file line number Diff line number Diff line change
Expand Up @@ -3089,7 +3089,6 @@ input EnableTwoFactorAuthInput {
twoFactorCode: String
authToken: String
csrfTokenSecured: Boolean!
ignoreSameSite: Boolean
}

input SendTwoFactorAuthCodeInput {
Expand Down Expand Up @@ -3771,7 +3770,6 @@ type Mutation {
twoFactorCode: String
deviceTrusted: Boolean
csrfTokenSecured: Boolean!
ignoreSameSite: Boolean
): AuthResponse
enableTwoFactorAuth(
options: EnableTwoFactorAuthInput!
Expand Down

0 comments on commit 994c7b5

Please sign in to comment.