@@ -73,9 +73,6 @@ func (am *DefaultAccountManager) CreateUser(ctx context.Context, accountID, user
73
73
74
74
// inviteNewUser Invites a USer to a given account and creates reference in datastore
75
75
func (am * DefaultAccountManager ) inviteNewUser (ctx context.Context , accountID , userID string , invite * types.UserInfo ) (* types.UserInfo , error ) {
76
- unlock := am .Store .AcquireWriteLockByUID (ctx , accountID )
77
- defer unlock ()
78
-
79
76
if am .idpManager == nil {
80
77
return nil , status .Errorf (status .PreconditionFailed , "IdP manager must be enabled to send user invites" )
81
78
}
@@ -224,9 +221,6 @@ func (am *DefaultAccountManager) DeleteUser(ctx context.Context, accountID, init
224
221
return status .Errorf (status .InvalidArgument , "self deletion is not allowed" )
225
222
}
226
223
227
- unlock := am .Store .AcquireWriteLockByUID (ctx , accountID )
228
- defer unlock ()
229
-
230
224
initiatorUser , err := am .Store .GetUserByUserID (ctx , store .LockingStrengthNone , initiatorUserID )
231
225
if err != nil {
232
226
return err
@@ -282,9 +276,6 @@ func (am *DefaultAccountManager) DeleteUser(ctx context.Context, accountID, init
282
276
283
277
// InviteUser resend invitations to users who haven't activated their accounts prior to the expiration period.
284
278
func (am * DefaultAccountManager ) InviteUser (ctx context.Context , accountID string , initiatorUserID string , targetUserID string ) error {
285
- unlock := am .Store .AcquireWriteLockByUID (ctx , accountID )
286
- defer unlock ()
287
-
288
279
if am .idpManager == nil {
289
280
return status .Errorf (status .PreconditionFailed , "IdP manager must be enabled to send user invites" )
290
281
}
@@ -325,9 +316,6 @@ func (am *DefaultAccountManager) InviteUser(ctx context.Context, accountID strin
325
316
326
317
// CreatePAT creates a new PAT for the given user
327
318
func (am * DefaultAccountManager ) CreatePAT (ctx context.Context , accountID string , initiatorUserID string , targetUserID string , tokenName string , expiresIn int ) (* types.PersonalAccessTokenGenerated , error ) {
328
- unlock := am .Store .AcquireWriteLockByUID (ctx , accountID )
329
- defer unlock ()
330
-
331
319
if tokenName == "" {
332
320
return nil , status .Errorf (status .InvalidArgument , "token name can't be empty" )
333
321
}
@@ -376,9 +364,6 @@ func (am *DefaultAccountManager) CreatePAT(ctx context.Context, accountID string
376
364
377
365
// DeletePAT deletes a specific PAT from a user
378
366
func (am * DefaultAccountManager ) DeletePAT (ctx context.Context , accountID string , initiatorUserID string , targetUserID string , tokenID string ) error {
379
- unlock := am .Store .AcquireWriteLockByUID (ctx , accountID )
380
- defer unlock ()
381
-
382
367
allowed , err := am .permissionsManager .ValidateUserPermissions (ctx , accountID , initiatorUserID , modules .Pats , operations .Delete )
383
368
if err != nil {
384
369
return status .NewPermissionValidationError (err )
@@ -478,9 +463,6 @@ func (am *DefaultAccountManager) SaveUser(ctx context.Context, accountID, initia
478
463
// SaveOrAddUser updates the given user. If addIfNotExists is set to true it will add user when no exist
479
464
// Only User.AutoGroups, User.Role, and User.Blocked fields are allowed to be updated for now.
480
465
func (am * DefaultAccountManager ) SaveOrAddUser (ctx context.Context , accountID , initiatorUserID string , update * types.User , addIfNotExists bool ) (* types.UserInfo , error ) {
481
- unlock := am .Store .AcquireWriteLockByUID (ctx , accountID )
482
- defer unlock ()
483
-
484
466
updatedUsers , err := am .SaveOrAddUsers (ctx , accountID , initiatorUserID , []* types.User {update }, addIfNotExists )
485
467
if err != nil {
486
468
return nil , err
0 commit comments