summaryrefslogtreecommitdiff
path: root/internal
diff options
context:
space:
mode:
authorjwijenbergh <jeroenwijenbergh@protonmail.com>2022-11-28 14:30:55 +0100
committerjwijenbergh <jeroenwijenbergh@protonmail.com>2022-11-28 14:30:55 +0100
commitbb760ad9036b586fd4f07b96623e8421e1dccaf0 (patch)
treec06fa76d5fe89dadb3e7ad6d4f2c1d5fe6f94912 /internal
parent0bfb35520d7e138e6219e550187e0b55bc8a29ac (diff)
Formatting: Run golines
Diffstat (limited to 'internal')
-rw-r--r--internal/fsm/fsm.go9
-rw-r--r--internal/oauth/oauth.go18
-rw-r--r--internal/oauth/oauth_test.go5
-rw-r--r--internal/server/common.go16
-rw-r--r--internal/server/custom.go5
-rw-r--r--internal/server/instituteaccess.go5
6 files changed, 48 insertions, 10 deletions
diff --git a/internal/fsm/fsm.go b/internal/fsm/fsm.go
index 0163fed..5bfa712 100644
--- a/internal/fsm/fsm.go
+++ b/internal/fsm/fsm.go
@@ -137,7 +137,14 @@ func (fsm *FSM) writeGraph() {
func (fsm *FSM) GoTransitionRequired(newState StateID, data interface{}) error {
oldState := fsm.Current
if !fsm.GoTransitionWithData(newState, data) {
- return types.NewWrappedError("failed required transition", fmt.Errorf("required transition not handled, from: %s -> to: %s", fsm.GetStateName(oldState), fsm.GetStateName(newState)))
+ return types.NewWrappedError(
+ "failed required transition",
+ fmt.Errorf(
+ "required transition not handled, from: %s -> to: %s",
+ fsm.GetStateName(oldState),
+ fsm.GetStateName(newState),
+ ),
+ )
}
return nil
}
diff --git a/internal/oauth/oauth.go b/internal/oauth/oauth.go
index 6abdb7f..9233448 100644
--- a/internal/oauth/oauth.go
+++ b/internal/oauth/oauth.go
@@ -139,7 +139,10 @@ func (oauth *OAuth) AccessToken() (string, error) {
// Check if refresh is even possible by doing a simple check if the refresh token is empty
// This is not needed but reduces API calls to the server
if tokens.refresh == "" {
- return "", types.NewWrappedError(errorMessage, &TokensInvalidError{Cause: "no refresh token is present"})
+ return "", types.NewWrappedError(
+ errorMessage,
+ &TokensInvalidError{Cause: "no refresh token is present"},
+ )
}
// Otherwise refresh and then later return the access token if we are successful
@@ -366,7 +369,11 @@ func (oauth *OAuth) Callback(w http.ResponseWriter, req *http.Request) {
defer func() {
// writing the html is best effort
if oauth.session.CallbackError != nil {
- _ = writeResponseHTML(w, "Authorization Failed", "The authorization has failed. See the log file for more information.")
+ _ = writeResponseHTML(
+ w,
+ "Authorization Failed",
+ "The authorization has failed. See the log file for more information.",
+ )
} else {
_ = writeResponseHTML(w, "Authorized", "The client has been successfully authorized. You can close this browser window.")
}
@@ -472,7 +479,12 @@ func (oauth *OAuth) AuthURL(name string, postProcessAuth func(string) string) (s
}
// Fill the struct with the necessary fields filled for the next call to getting the HTTP client
- oauthSession := ExchangeSession{ClientID: name, ISS: oauth.ISS, State: state, Verifier: verifier}
+ oauthSession := ExchangeSession{
+ ClientID: name,
+ ISS: oauth.ISS,
+ State: state,
+ Verifier: verifier,
+ }
oauth.session = oauthSession
// set up the listener to get the redirect URI
diff --git a/internal/oauth/oauth_test.go b/internal/oauth/oauth_test.go
index 2427220..693984e 100644
--- a/internal/oauth/oauth_test.go
+++ b/internal/oauth/oauth_test.go
@@ -14,7 +14,10 @@ func Test_verifiergen(t *testing.T) {
// Verifier must be at minimum 43 and at max 128 characters...
// However... Our verifier is exactly 43!
if len(verifier) != 43 {
- t.Fatalf("Got verifier length: %d, want a verifier with at least 43 characters", len(verifier))
+ t.Fatalf(
+ "Got verifier length: %d, want a verifier with at least 43 characters",
+ len(verifier),
+ )
}
_, unescapeErr := url.QueryUnescape(verifier)
diff --git a/internal/server/common.go b/internal/server/common.go
index e8eedd0..3db535c 100644
--- a/internal/server/common.go
+++ b/internal/server/common.go
@@ -340,7 +340,10 @@ func (base *Base) ValidProfiles(clientSupportsWireguard bool) ProfileInfo {
}
validProfiles = append(validProfiles, profile)
}
- return ProfileInfo{Current: base.Profiles.Current, Info: ProfileListInfo{ProfileList: validProfiles}}
+ return ProfileInfo{
+ Current: base.Profiles.Current,
+ Info: ProfileListInfo{ProfileList: validProfiles},
+ }
}
func ValidProfiles(server Server, clientSupportsWireguard bool) (*ProfileInfo, error) {
@@ -352,12 +355,19 @@ func ValidProfiles(server Server, clientSupportsWireguard bool) (*ProfileInfo, e
}
profiles := base.ValidProfiles(clientSupportsWireguard)
if len(profiles.Info.ProfileList) == 0 {
- return nil, types.NewWrappedError(errorMessage, errors.New("no profiles found with supported protocols"))
+ return nil, types.NewWrappedError(
+ errorMessage,
+ errors.New("no profiles found with supported protocols"),
+ )
}
return &profiles, nil
}
-func wireguardGetConfig(server Server, preferTCP bool, supportsOpenVPN bool) (string, string, error) {
+func wireguardGetConfig(
+ server Server,
+ preferTCP bool,
+ supportsOpenVPN bool,
+) (string, string, error) {
errorMessage := "failed getting server WireGuard configuration"
base, baseErr := server.Base()
diff --git a/internal/server/custom.go b/internal/server/custom.go
index f8899b3..d376727 100644
--- a/internal/server/custom.go
+++ b/internal/server/custom.go
@@ -31,7 +31,10 @@ func (servers *Servers) GetCustomServer(url string) (*InstituteAccessServer, err
if server, ok := servers.CustomServers.Map[url]; ok {
return server, nil
}
- return nil, types.NewWrappedError("failed to get institute access server", fmt.Errorf("no custom server with URL: %s", url))
+ return nil, types.NewWrappedError(
+ "failed to get institute access server",
+ fmt.Errorf("no custom server with URL: %s", url),
+ )
}
func (servers *Servers) RemoveCustomServer(url string) {
diff --git a/internal/server/instituteaccess.go b/internal/server/instituteaccess.go
index f76323c..9b6f735 100644
--- a/internal/server/instituteaccess.go
+++ b/internal/server/instituteaccess.go
@@ -46,7 +46,10 @@ func (servers *Servers) GetInstituteAccess(url string) (*InstituteAccessServer,
if server, ok := servers.InstituteServers.Map[url]; ok {
return server, nil
}
- return nil, types.NewWrappedError("failed to get institute access server", fmt.Errorf("no institute access server with URL: %s", url))
+ return nil, types.NewWrappedError(
+ "failed to get institute access server",
+ fmt.Errorf("no institute access server with URL: %s", url),
+ )
}
func (servers *Servers) RemoveInstituteAccess(url string) {