remove unused empty line changes

This commit is contained in:
manoj 2022-12-18 11:46:48 +05:30
parent fb74bce9c3
commit fe862a50e5
6 changed files with 2 additions and 21 deletions

View File

@ -1,14 +0,0 @@
ENV=test
DATABASE_TYPE=couchbase
COUCHBASE_SCOPE=_default
DATABASE_USERNAME=admin
DATABASE_PASSWORD=123456
COUCHBASE_BUCKET=auth
DATABASE_URL=couchbase://127.0.0.1
CUSTOM_ACCESS_TOKEN_SCRIPT="function(user,tokenPayload){var data = tokenPayload;data.extra = {'x-extra-id': user.id};return data;}"
SMTP_HOST=smtp.mailtrap.io
SMTP_PORT=2525
SMTP_USERNAME=test
SMTP_PASSWORD=test
SENDER_EMAIL="info@authorizer.dev"

View File

@ -27,6 +27,6 @@ const (
DbTypePlanetScaleDB = "planetscale" DbTypePlanetScaleDB = "planetscale"
// DbTypeDynamoDB is the Dynamo database type // DbTypeDynamoDB is the Dynamo database type
DbTypeDynamoDB = "dynamodb" DbTypeDynamoDB = "dynamodb"
// DbTypeDynamoDB is the Dynamo database type // DbTypeCouchbaseDB is the Couchbase database type
DbTypeCouchbaseDB = "couchbase" DbTypeCouchbaseDB = "couchbase"
) )

View File

@ -53,21 +53,18 @@ func AdminSignupResolver(ctx context.Context, params model.AdminSignupInput) (*m
memorystore.Provider.UpdateEnvVariable(constants.EnvKeyAdminSecret, params.AdminSecret) memorystore.Provider.UpdateEnvVariable(constants.EnvKeyAdminSecret, params.AdminSecret)
// consvert EnvData to JSON // consvert EnvData to JSON
storeData, err := memorystore.Provider.GetEnvStore() storeData, err := memorystore.Provider.GetEnvStore()
if err != nil { if err != nil {
log.Debug("Error getting env store: ", err) log.Debug("Error getting env store: ", err)
return res, err return res, err
} }
env, err := db.Provider.GetEnv(ctx) env, err := db.Provider.GetEnv(ctx)
if err != nil { if err != nil {
log.Debug("Failed to get env: ", err) log.Debug("Failed to get env: ", err)
return res, err return res, err
} }
envData, err := crypto.EncryptEnvData(storeData) envData, err := crypto.EncryptEnvData(storeData)
if err != nil { if err != nil {
log.Debug("Failed to encrypt envstore: ", err) log.Debug("Failed to encrypt envstore: ", err)
return res, err return res, err
@ -80,7 +77,6 @@ func AdminSignupResolver(ctx context.Context, params model.AdminSignupInput) (*m
} }
hashedKey, err := crypto.EncryptPassword(params.AdminSecret) hashedKey, err := crypto.EncryptPassword(params.AdminSecret)
if err != nil { if err != nil {
log.Debug("Failed to encrypt admin session key: ", err) log.Debug("Failed to encrypt admin session key: ", err)
return res, err return res, err

View File

@ -31,6 +31,7 @@ func VerifyOtpResolver(ctx context.Context, params model.VerifyOTPRequest) (*mod
log.Debug("Failed to get otp request by email: ", err) log.Debug("Failed to get otp request by email: ", err)
return res, fmt.Errorf(`invalid email: %s`, err.Error()) return res, fmt.Errorf(`invalid email: %s`, err.Error())
} }
if params.Otp != otp.Otp { if params.Otp != otp.Otp {
log.Debug("Failed to verify otp request: Incorrect value") log.Debug("Failed to verify otp request: Incorrect value")
return res, fmt.Errorf(`invalid otp`) return res, fmt.Errorf(`invalid otp`)

View File

@ -41,7 +41,6 @@ func updateAllUsersTest(t *testing.T, s TestSetup) {
Offset: 0, Offset: 0,
}) })
assert.NoError(t, err) assert.NoError(t, err)
for _, u := range listUsers.Users { for _, u := range listUsers.Users {
assert.True(t, refs.BoolValue(u.IsMultiFactorAuthEnabled)) assert.True(t, refs.BoolValue(u.IsMultiFactorAuthEnabled))
} }

View File

@ -24,7 +24,6 @@ func webhookLogsTest(t *testing.T, s TestSetup) {
req.Header.Set("Cookie", fmt.Sprintf("%s=%s", constants.AdminCookieName, h)) req.Header.Set("Cookie", fmt.Sprintf("%s=%s", constants.AdminCookieName, h))
webhookLogs, err := resolvers.WebhookLogsResolver(ctx, nil) webhookLogs, err := resolvers.WebhookLogsResolver(ctx, nil)
assert.NoError(t, err) assert.NoError(t, err)
assert.Greater(t, len(webhookLogs.WebhookLogs), 1) assert.Greater(t, len(webhookLogs.WebhookLogs), 1)