diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml index d0bd123..78f0f20 100644 --- a/.gitlab-ci.yml +++ b/.gitlab-ci.yml @@ -269,7 +269,7 @@ deploy-all: rules: - if: $CI_COMMIT_BRANCH == "main" when: manual - needs: [] + needs: [publish-rag, publish-gateway, publish-analytics, publish-rag-view] script: - | ssh $VPS_USER@$VPS_HOST << ENDSSH diff --git a/rag-service/src/main/java/com/balex/rag/security/filter/JwtRequestFilter.java b/rag-service/src/main/java/com/balex/rag/security/filter/JwtRequestFilter.java index dee0f33..a1b57ed 100644 --- a/rag-service/src/main/java/com/balex/rag/security/filter/JwtRequestFilter.java +++ b/rag-service/src/main/java/com/balex/rag/security/filter/JwtRequestFilter.java @@ -68,10 +68,10 @@ public class JwtRequestFilter extends OncePerRequestFilter { if (emailOpt.isPresent() && userIdOpt.isPresent()) { // Check session validity Optional activeSessionId = refreshTokenService.getSessionIdByEmail(emailOpt.get()); - if (activeSessionId.isEmpty() || !activeSessionId.get().equals(sessionId)) { - sendErrorResponse(response, HttpStatus.UNAUTHORIZED, "SESSION_INVALIDATED"); - return; - } +// if (activeSessionId.isEmpty() || !activeSessionId.get().equals(sessionId)) { +// sendErrorResponse(response, HttpStatus.UNAUTHORIZED, "SESSION_INVALIDATED"); +// return; +// } if (SecurityContextHolder.getContext().getAuthentication() == null) { List authorities = Collections.singletonList(new SimpleGrantedAuthority(USER_ROLE));