remove unused empty line changes
This commit is contained in:
parent
fb74bce9c3
commit
fe862a50e5
|
@ -1,14 +0,0 @@
|
|||
|
||||
ENV=test
|
||||
DATABASE_TYPE=couchbase
|
||||
COUCHBASE_SCOPE=_default
|
||||
DATABASE_USERNAME=admin
|
||||
DATABASE_PASSWORD=123456
|
||||
COUCHBASE_BUCKET=auth
|
||||
DATABASE_URL=couchbase://127.0.0.1
|
||||
CUSTOM_ACCESS_TOKEN_SCRIPT="function(user,tokenPayload){var data = tokenPayload;data.extra = {'x-extra-id': user.id};return data;}"
|
||||
SMTP_HOST=smtp.mailtrap.io
|
||||
SMTP_PORT=2525
|
||||
SMTP_USERNAME=test
|
||||
SMTP_PASSWORD=test
|
||||
SENDER_EMAIL="info@authorizer.dev"
|
|
@ -27,6 +27,6 @@ const (
|
|||
DbTypePlanetScaleDB = "planetscale"
|
||||
// DbTypeDynamoDB is the Dynamo database type
|
||||
DbTypeDynamoDB = "dynamodb"
|
||||
// DbTypeDynamoDB is the Dynamo database type
|
||||
// DbTypeCouchbaseDB is the Couchbase database type
|
||||
DbTypeCouchbaseDB = "couchbase"
|
||||
)
|
||||
|
|
|
@ -53,21 +53,18 @@ func AdminSignupResolver(ctx context.Context, params model.AdminSignupInput) (*m
|
|||
memorystore.Provider.UpdateEnvVariable(constants.EnvKeyAdminSecret, params.AdminSecret)
|
||||
// consvert EnvData to JSON
|
||||
storeData, err := memorystore.Provider.GetEnvStore()
|
||||
|
||||
if err != nil {
|
||||
log.Debug("Error getting env store: ", err)
|
||||
return res, err
|
||||
}
|
||||
|
||||
env, err := db.Provider.GetEnv(ctx)
|
||||
|
||||
if err != nil {
|
||||
log.Debug("Failed to get env: ", err)
|
||||
return res, err
|
||||
}
|
||||
|
||||
envData, err := crypto.EncryptEnvData(storeData)
|
||||
|
||||
if err != nil {
|
||||
log.Debug("Failed to encrypt envstore: ", err)
|
||||
return res, err
|
||||
|
@ -80,7 +77,6 @@ func AdminSignupResolver(ctx context.Context, params model.AdminSignupInput) (*m
|
|||
}
|
||||
|
||||
hashedKey, err := crypto.EncryptPassword(params.AdminSecret)
|
||||
|
||||
if err != nil {
|
||||
log.Debug("Failed to encrypt admin session key: ", err)
|
||||
return res, err
|
||||
|
|
|
@ -31,6 +31,7 @@ func VerifyOtpResolver(ctx context.Context, params model.VerifyOTPRequest) (*mod
|
|||
log.Debug("Failed to get otp request by email: ", err)
|
||||
return res, fmt.Errorf(`invalid email: %s`, err.Error())
|
||||
}
|
||||
|
||||
if params.Otp != otp.Otp {
|
||||
log.Debug("Failed to verify otp request: Incorrect value")
|
||||
return res, fmt.Errorf(`invalid otp`)
|
||||
|
|
|
@ -41,7 +41,6 @@ func updateAllUsersTest(t *testing.T, s TestSetup) {
|
|||
Offset: 0,
|
||||
})
|
||||
assert.NoError(t, err)
|
||||
|
||||
for _, u := range listUsers.Users {
|
||||
assert.True(t, refs.BoolValue(u.IsMultiFactorAuthEnabled))
|
||||
}
|
||||
|
|
|
@ -24,7 +24,6 @@ func webhookLogsTest(t *testing.T, s TestSetup) {
|
|||
req.Header.Set("Cookie", fmt.Sprintf("%s=%s", constants.AdminCookieName, h))
|
||||
|
||||
webhookLogs, err := resolvers.WebhookLogsResolver(ctx, nil)
|
||||
|
||||
assert.NoError(t, err)
|
||||
assert.Greater(t, len(webhookLogs.WebhookLogs), 1)
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user