From 4e23e49de4aa43878a6bf6128e4a3c1abc430974 Mon Sep 17 00:00:00 2001 From: Lakhan Samani Date: Mon, 25 Jul 2022 18:08:07 +0530 Subject: [PATCH] fix: syntax --- server/resolvers/verify_otp.go | 4 ---- 1 file changed, 4 deletions(-) diff --git a/server/resolvers/verify_otp.go b/server/resolvers/verify_otp.go index 506f61f..22a79a3 100644 --- a/server/resolvers/verify_otp.go +++ b/server/resolvers/verify_otp.go @@ -21,14 +21,12 @@ import ( func VerifyOtpResolver(ctx context.Context, params model.VerifyOTPRequest) (*model.AuthResponse, error) { var res *model.AuthResponse gc, err := utils.GinContextFromContext(ctx) - if err != nil { log.Debug("Failed to get GinContext: ", err) return res, err } otp, err := db.Provider.GetOTPByEmail(ctx, params.Email) - if err != nil { log.Debug("Failed to get otp request by email: ", err) return res, fmt.Errorf(`invalid email: %s`, err.Error()) @@ -42,7 +40,6 @@ func VerifyOtpResolver(ctx context.Context, params model.VerifyOTPRequest) (*mod } user, err := db.Provider.GetUserByEmail(ctx, params.Email) - if err != nil { log.Debug("Failed to get user by email: ", err) return res, err @@ -57,7 +54,6 @@ func VerifyOtpResolver(ctx context.Context, params model.VerifyOTPRequest) (*mod roles := strings.Split(user.Roles, ",") scope := []string{"openid", "email", "profile"} authToken, err := token.CreateAuthToken(gc, user, roles, scope, loginMethod) - if err != nil { log.Debug("Failed to create auth token: ", err) return res, err