challenger

OAuth 2.0-based authentication service that validates user can receive messages at a certain address
Log | Files | Refs | Submodules | README | LICENSE

commit a6afc5f618c16110a3f1c805109d986dfedec072
parent 3186e3c49e456f0389101904a4cdcc6861c604cd
Author: Christian Grothoff <christian@grothoff.org>
Date:   Fri, 22 Nov 2024 22:36:18 +0100

-bugfix + re-add unique constraint

Diffstat:
Msrc/challenger/challenger-httpd_setup.c | 3+++
Msrc/challengerdb/challenger-0001.sql | 2+-
2 files changed, 4 insertions(+), 1 deletion(-)

diff --git a/src/challenger/challenger-httpd_setup.c b/src/challenger/challenger-httpd_setup.c @@ -55,6 +55,8 @@ request_done (void *ctx) { struct SetupContext *sc = ctx; + if (NULL == ctx) + return; if (NULL != sc->root) { json_decref (sc->root); @@ -80,6 +82,7 @@ CH_handler_setup (struct CH_HandlerContext *hc, sc = GNUNET_new (struct SetupContext); sc->hc = hc; hc->cc = &request_done; + hc->ctx = sc; } if ( (NULL == sc->root) && (0 != *upload_data_size) ) diff --git a/src/challengerdb/challenger-0001.sql b/src/challengerdb/challenger-0001.sql @@ -28,7 +28,7 @@ SET search_path TO challenger; CREATE TABLE IF NOT EXISTS clients (client_serial_id BIGINT UNIQUE GENERATED BY DEFAULT AS IDENTITY - ,uri VARCHAR NOT NULL + ,uri VARCHAR NOT NULL UNIQUE ,validation_counter INT8 NOT NULL DEFAULT(0) ,client_secret VARCHAR NOT NULL );