From 2f9725d8e19b606bf12a03abb4531c93f314b4a4 Mon Sep 17 00:00:00 2001 From: Lakhan Samani Date: Wed, 9 Mar 2022 06:41:38 +0530 Subject: [PATCH] fix: verification request --- server/db/providers/sql/verification_requests.go | 2 +- server/token/jwt.go | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/server/db/providers/sql/verification_requests.go b/server/db/providers/sql/verification_requests.go index 7e7e7ba..fe044a7 100644 --- a/server/db/providers/sql/verification_requests.go +++ b/server/db/providers/sql/verification_requests.go @@ -21,7 +21,7 @@ func (p *provider) AddVerificationRequest(verificationRequest models.Verificatio verificationRequest.UpdatedAt = time.Now().Unix() result := p.db.Clauses(clause.OnConflict{ Columns: []clause.Column{{Name: "email"}, {Name: "identifier"}}, - DoUpdates: clause.AssignmentColumns([]string{"token", "expires_at"}), + DoUpdates: clause.AssignmentColumns([]string{"token", "expires_at", "nonce", "redirect_uri"}), }).Create(&verificationRequest) if result.Error != nil { diff --git a/server/token/jwt.go b/server/token/jwt.go index 912f1e5..f3e74c8 100644 --- a/server/token/jwt.go +++ b/server/token/jwt.go @@ -92,7 +92,7 @@ func ParseJWTToken(token, hostname, nonce, subject string) (jwt.MapClaims, error return claims, errors.New("invalid audience") } - fmt.Println("claims:", claims, claims["nonce"], nonce) + fmt.Println("claims:", claims["nonce"], nonce, claims["nonce"] == nonce) if claims["nonce"] != nonce { return claims, errors.New("invalid nonce") }