Skip to content

Instantly share code, notes, and snippets.

diff --git a/lib/actions/user-actions.js b/lib/actions/user-actions.js
index 3a1cc84444..a2785c89dc 100644
--- a/lib/actions/user-actions.js
+++ b/lib/actions/user-actions.js
@@ -685,15 +685,20 @@ function useIdentityPasswordRegister(): (
throw new Error('Register password user method unimplemented');
}
const { registerPasswordUser } = identityClient;
- const { markPrekeysAsPublished } = getConfig().olmAPI;
+ const { markPrekeysAsPublished, getUnpublishedPrekeys } = getConfig().olmAPI;
diff --git a/lib/actions/user-actions.js b/lib/actions/user-actions.js
index ee67a6d902..2312859272 100644
--- a/lib/actions/user-actions.js
+++ b/lib/actions/user-actions.js
@@ -475,6 +475,7 @@ function useDeleteDiscardedIdentityAccount(): (
'deleteDiscardedIdentityAccount can only be called when ' +
'usingCommServicesAccessToken',
);
+ throw new Error('ahhh');
if (!identityClient) {
diff --git a/lib/utils/services-utils.js b/lib/utils/services-utils.js
index 684f444314..c22609665e 100644
--- a/lib/utils/services-utils.js
+++ b/lib/utils/services-utils.js
@@ -7,7 +7,7 @@ import type { AuthMetadata } from '../shared/identity-client-context.js';
// If this is true then we're using the identity service for auth. After we
// auth, the identity service gives us a CSAT, which we can use to auth with
// other Comm services.
-const usingCommServicesAccessToken = false;
+const usingCommServicesAccessToken = true;
diff --git a/native/components/background-identity-login-handler.react.js b/native/components/background-identity-login-handler.react.js
index b7288bbbae..f6da27f0d6 100644
--- a/native/components/background-identity-login-handler.react.js
+++ b/native/components/background-identity-login-handler.react.js
@@ -3,12 +3,13 @@
import * as React from 'react';
import { logOutActionTypes, useLogOut } from 'lib/actions/user-actions.js';
-import { useModalContext } from 'lib/components/modal-provider.react.js';
+import { usePasswordLogIn } from 'lib/hooks/login-hooks.js';
diff --git a/keyserver/src/user/login.js b/keyserver/src/user/login.js
index 57e54776bb..149c505985 100644
--- a/keyserver/src/user/login.js
+++ b/keyserver/src/user/login.js
@@ -220,11 +220,26 @@ async function registerOrLogInBase<T>(
getAccountOneTimeKeys(account, ONE_TIME_KEYS_NUMBER),
),
]);
+
+ console.log(contentOneTimeKeys);
diff --git a/keyserver/src/user/login.js b/keyserver/src/user/login.js
index 57e54776bb..99823c4897 100644
--- a/keyserver/src/user/login.js
+++ b/keyserver/src/user/login.js
@@ -30,6 +30,7 @@ function markKeysAsPublished(account: OlmAccount) {
// Before attempting login
function markPrekeyAsPublished(account: OlmAccount) {
+ console.log('unpublished prekey', account.unpublished_prekey());
account.mark_prekey_as_published();
@vdhanan
vdhanan / timeout-alert.patch
Last active April 10, 2024 21:35
timeout-alert.patch
diff --git a/lib/utils/services-utils.js b/lib/utils/services-utils.js
index 684f444314..c22609665e 100644
--- a/lib/utils/services-utils.js
+++ b/lib/utils/services-utils.js
@@ -7,7 +7,7 @@ import type { AuthMetadata } from '../shared/identity-client-context.js';
// If this is true then we're using the identity service for auth. After we
// auth, the identity service gives us a CSAT, which we can use to auth with
// other Comm services.
-const usingCommServicesAccessToken = false;
+const usingCommServicesAccessToken = true;
diff --git a/services/identity/Cargo.lock b/services/identity/Cargo.lock
index 89d2064ea9..a41b1c1690 100644
--- a/services/identity/Cargo.lock
+++ b/services/identity/Cargo.lock
@@ -3014,6 +3014,16 @@ dependencies = [
"tracing-core",
]
+[[package]]
+name = "tracing-serde"
diff --git a/keyserver/src/keyserver.js b/keyserver/src/keyserver.js
index bb64717ecf..b26eac4570 100644
--- a/keyserver/src/keyserver.js
+++ b/keyserver/src/keyserver.js
@@ -52,10 +52,19 @@ import {
getWebAppURLFacts,
getWebAppCorsConfig,
} from './utils/urls.js';
+import { getRustAPI } from 'rust-node-addon';
#!/bin/bash
TABLE_NAME="identity-users"
ATTRIBUTE_NAME="farcasterID"
ATTRIBUTE_VALUE="7811"
# Step 1: Scan the table and filter items based on the condition
KEYS=$(aws dynamodb scan \
--table-name "$TABLE_NAME" \
--filter-expression "farcasterID = :val" \