taldir

Directory service to resolve wallet mailboxes by messenger addresses
Log | Files | Refs | Submodules | README | LICENSE

commit b98cfd344d0500d720cc551bfb861436a9c6aa04
parent f8fca883e3c8cd6d6371f3e420c6b18112591b55
Author: Martin Schanzenbach <schanzen@gnunet.org>
Date:   Fri, 13 Feb 2026 16:44:10 +0100

-code formatting

Diffstat:
Mpkg/taldir/disseminator_gns.go | 6+++---
Mpkg/taldir/oidc_validator.go | 10++++------
2 files changed, 7 insertions(+), 9 deletions(-)

diff --git a/pkg/taldir/disseminator_gns.go b/pkg/taldir/disseminator_gns.go @@ -29,7 +29,7 @@ type GnsDisseminator struct { config *TaldirConfig } -func (d *GnsDisseminator) gns_check_is_disseminated(e *Entry) bool { +func (d *GnsDisseminator) gnsCheckIsDisseminated(e *Entry) bool { path, err := exec.LookPath("gnunet-gns") if err != nil { return false @@ -43,7 +43,7 @@ func (d *GnsDisseminator) gns_check_is_disseminated(e *Entry) bool { } func (d *GnsDisseminator) DisseminateStop(e *Entry) error { - if !d.gns_check_is_disseminated(e) { + if !d.gnsCheckIsDisseminated(e) { return nil } path, err := exec.LookPath("gnunet-namestore") @@ -59,7 +59,7 @@ func (d *GnsDisseminator) DisseminateStop(e *Entry) error { } func (d *GnsDisseminator) DisseminateStart(e *Entry) error { - if d.gns_check_is_disseminated(e) { + if d.gnsCheckIsDisseminated(e) { fmt.Printf("`%s' is already being disseminated\n", e.HsAlias) return nil } diff --git a/pkg/taldir/oidc_validator.go b/pkg/taldir/oidc_validator.go @@ -39,7 +39,7 @@ type AuthorizationsState struct { } type RelevantUserClaims struct { - // Subject + // Subject Sub string } @@ -123,15 +123,13 @@ func (t OidcValidator) IsAliasValid(alias string) (err error) { return } - - func (t OidcValidator) ValidateAliasSubject(tokenString string, expectedAlias string) error { var relevantClaims map[string]any req, err := http.NewRequest("GET", t.userinfoEndpoint, nil) if err != nil { return fmt.Errorf("failed to create userinfo request") } - req.Header.Set("Authorization", "Bearer " + tokenString) + req.Header.Set("Authorization", "Bearer "+tokenString) client := &http.Client{} resp, err := client.Do(req) if err != nil { @@ -161,8 +159,8 @@ func (t OidcValidator) ProcessOidcCallback(r *http.Request) (string, string, err if !ok { return "", "", fmt.Errorf("state invalid") } - alias := state.alias - challenge := state.challenge + alias := state.alias + challenge := state.challenge delete(t.authorizationsState, stateParam) code := r.URL.Query().Get("code") data := url.Values{}