remove unused empty line changes
This commit is contained in:
parent
fb74bce9c3
commit
fe862a50e5
|
@ -1,14 +0,0 @@
|
||||||
|
|
||||||
ENV=test
|
|
||||||
DATABASE_TYPE=couchbase
|
|
||||||
COUCHBASE_SCOPE=_default
|
|
||||||
DATABASE_USERNAME=admin
|
|
||||||
DATABASE_PASSWORD=123456
|
|
||||||
COUCHBASE_BUCKET=auth
|
|
||||||
DATABASE_URL=couchbase://127.0.0.1
|
|
||||||
CUSTOM_ACCESS_TOKEN_SCRIPT="function(user,tokenPayload){var data = tokenPayload;data.extra = {'x-extra-id': user.id};return data;}"
|
|
||||||
SMTP_HOST=smtp.mailtrap.io
|
|
||||||
SMTP_PORT=2525
|
|
||||||
SMTP_USERNAME=test
|
|
||||||
SMTP_PASSWORD=test
|
|
||||||
SENDER_EMAIL="info@authorizer.dev"
|
|
|
@ -27,6 +27,6 @@ const (
|
||||||
DbTypePlanetScaleDB = "planetscale"
|
DbTypePlanetScaleDB = "planetscale"
|
||||||
// DbTypeDynamoDB is the Dynamo database type
|
// DbTypeDynamoDB is the Dynamo database type
|
||||||
DbTypeDynamoDB = "dynamodb"
|
DbTypeDynamoDB = "dynamodb"
|
||||||
// DbTypeDynamoDB is the Dynamo database type
|
// DbTypeCouchbaseDB is the Couchbase database type
|
||||||
DbTypeCouchbaseDB = "couchbase"
|
DbTypeCouchbaseDB = "couchbase"
|
||||||
)
|
)
|
||||||
|
|
|
@ -53,21 +53,18 @@ func AdminSignupResolver(ctx context.Context, params model.AdminSignupInput) (*m
|
||||||
memorystore.Provider.UpdateEnvVariable(constants.EnvKeyAdminSecret, params.AdminSecret)
|
memorystore.Provider.UpdateEnvVariable(constants.EnvKeyAdminSecret, params.AdminSecret)
|
||||||
// consvert EnvData to JSON
|
// consvert EnvData to JSON
|
||||||
storeData, err := memorystore.Provider.GetEnvStore()
|
storeData, err := memorystore.Provider.GetEnvStore()
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Debug("Error getting env store: ", err)
|
log.Debug("Error getting env store: ", err)
|
||||||
return res, err
|
return res, err
|
||||||
}
|
}
|
||||||
|
|
||||||
env, err := db.Provider.GetEnv(ctx)
|
env, err := db.Provider.GetEnv(ctx)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Debug("Failed to get env: ", err)
|
log.Debug("Failed to get env: ", err)
|
||||||
return res, err
|
return res, err
|
||||||
}
|
}
|
||||||
|
|
||||||
envData, err := crypto.EncryptEnvData(storeData)
|
envData, err := crypto.EncryptEnvData(storeData)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Debug("Failed to encrypt envstore: ", err)
|
log.Debug("Failed to encrypt envstore: ", err)
|
||||||
return res, err
|
return res, err
|
||||||
|
@ -80,7 +77,6 @@ func AdminSignupResolver(ctx context.Context, params model.AdminSignupInput) (*m
|
||||||
}
|
}
|
||||||
|
|
||||||
hashedKey, err := crypto.EncryptPassword(params.AdminSecret)
|
hashedKey, err := crypto.EncryptPassword(params.AdminSecret)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Debug("Failed to encrypt admin session key: ", err)
|
log.Debug("Failed to encrypt admin session key: ", err)
|
||||||
return res, err
|
return res, err
|
||||||
|
|
|
@ -31,6 +31,7 @@ func VerifyOtpResolver(ctx context.Context, params model.VerifyOTPRequest) (*mod
|
||||||
log.Debug("Failed to get otp request by email: ", err)
|
log.Debug("Failed to get otp request by email: ", err)
|
||||||
return res, fmt.Errorf(`invalid email: %s`, err.Error())
|
return res, fmt.Errorf(`invalid email: %s`, err.Error())
|
||||||
}
|
}
|
||||||
|
|
||||||
if params.Otp != otp.Otp {
|
if params.Otp != otp.Otp {
|
||||||
log.Debug("Failed to verify otp request: Incorrect value")
|
log.Debug("Failed to verify otp request: Incorrect value")
|
||||||
return res, fmt.Errorf(`invalid otp`)
|
return res, fmt.Errorf(`invalid otp`)
|
||||||
|
|
|
@ -41,7 +41,6 @@ func updateAllUsersTest(t *testing.T, s TestSetup) {
|
||||||
Offset: 0,
|
Offset: 0,
|
||||||
})
|
})
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
|
|
||||||
for _, u := range listUsers.Users {
|
for _, u := range listUsers.Users {
|
||||||
assert.True(t, refs.BoolValue(u.IsMultiFactorAuthEnabled))
|
assert.True(t, refs.BoolValue(u.IsMultiFactorAuthEnabled))
|
||||||
}
|
}
|
||||||
|
|
|
@ -24,7 +24,6 @@ func webhookLogsTest(t *testing.T, s TestSetup) {
|
||||||
req.Header.Set("Cookie", fmt.Sprintf("%s=%s", constants.AdminCookieName, h))
|
req.Header.Set("Cookie", fmt.Sprintf("%s=%s", constants.AdminCookieName, h))
|
||||||
|
|
||||||
webhookLogs, err := resolvers.WebhookLogsResolver(ctx, nil)
|
webhookLogs, err := resolvers.WebhookLogsResolver(ctx, nil)
|
||||||
|
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
assert.Greater(t, len(webhookLogs.WebhookLogs), 1)
|
assert.Greater(t, len(webhookLogs.WebhookLogs), 1)
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user