commit b98cfd344d0500d720cc551bfb861436a9c6aa04
parent f8fca883e3c8cd6d6371f3e420c6b18112591b55
Author: Martin Schanzenbach <schanzen@gnunet.org>
Date: Fri, 13 Feb 2026 16:44:10 +0100
-code formatting
Diffstat:
2 files changed, 7 insertions(+), 9 deletions(-)
diff --git a/pkg/taldir/disseminator_gns.go b/pkg/taldir/disseminator_gns.go
@@ -29,7 +29,7 @@ type GnsDisseminator struct {
config *TaldirConfig
}
-func (d *GnsDisseminator) gns_check_is_disseminated(e *Entry) bool {
+func (d *GnsDisseminator) gnsCheckIsDisseminated(e *Entry) bool {
path, err := exec.LookPath("gnunet-gns")
if err != nil {
return false
@@ -43,7 +43,7 @@ func (d *GnsDisseminator) gns_check_is_disseminated(e *Entry) bool {
}
func (d *GnsDisseminator) DisseminateStop(e *Entry) error {
- if !d.gns_check_is_disseminated(e) {
+ if !d.gnsCheckIsDisseminated(e) {
return nil
}
path, err := exec.LookPath("gnunet-namestore")
@@ -59,7 +59,7 @@ func (d *GnsDisseminator) DisseminateStop(e *Entry) error {
}
func (d *GnsDisseminator) DisseminateStart(e *Entry) error {
- if d.gns_check_is_disseminated(e) {
+ if d.gnsCheckIsDisseminated(e) {
fmt.Printf("`%s' is already being disseminated\n", e.HsAlias)
return nil
}
diff --git a/pkg/taldir/oidc_validator.go b/pkg/taldir/oidc_validator.go
@@ -39,7 +39,7 @@ type AuthorizationsState struct {
}
type RelevantUserClaims struct {
- // Subject
+ // Subject
Sub string
}
@@ -123,15 +123,13 @@ func (t OidcValidator) IsAliasValid(alias string) (err error) {
return
}
-
-
func (t OidcValidator) ValidateAliasSubject(tokenString string, expectedAlias string) error {
var relevantClaims map[string]any
req, err := http.NewRequest("GET", t.userinfoEndpoint, nil)
if err != nil {
return fmt.Errorf("failed to create userinfo request")
}
- req.Header.Set("Authorization", "Bearer " + tokenString)
+ req.Header.Set("Authorization", "Bearer "+tokenString)
client := &http.Client{}
resp, err := client.Do(req)
if err != nil {
@@ -161,8 +159,8 @@ func (t OidcValidator) ProcessOidcCallback(r *http.Request) (string, string, err
if !ok {
return "", "", fmt.Errorf("state invalid")
}
- alias := state.alias
- challenge := state.challenge
+ alias := state.alias
+ challenge := state.challenge
delete(t.authorizationsState, stateParam)
code := r.URL.Query().Get("code")
data := url.Values{}