Stop shadowing GetEmailAddress errors in redeemCode
This commit is contained in:
		
							parent
							
								
									3371284a36
								
							
						
					
					
						commit
						e0d915cc03
					
				|  | @ -17,6 +17,7 @@ | ||||||
| 
 | 
 | ||||||
| - [#575](https://github.com/oauth2-proxy/oauth2-proxy/pull/575) Stop accepting legacy SHA1 signed cookies (@NickMeves) | - [#575](https://github.com/oauth2-proxy/oauth2-proxy/pull/575) Stop accepting legacy SHA1 signed cookies (@NickMeves) | ||||||
| - [#722](https://github.com/oauth2-proxy/oauth2-proxy/pull/722) Validate Redis configuration options at startup (@NickMeves) | - [#722](https://github.com/oauth2-proxy/oauth2-proxy/pull/722) Validate Redis configuration options at startup (@NickMeves) | ||||||
|  | - [#791](https://github.com/oauth2-proxy/oauth2-proxy/pull/791) Remove GetPreferredUsername method from provider interface (@NickMeves) | ||||||
| - [#764](https://github.com/oauth2-proxy/oauth2-proxy/pull/764) Document bcrypt encryption for htpasswd (and hide SHA) (@lentzi90) | - [#764](https://github.com/oauth2-proxy/oauth2-proxy/pull/764) Document bcrypt encryption for htpasswd (and hide SHA) (@lentzi90) | ||||||
| - [#616](https://github.com/oauth2-proxy/oauth2-proxy/pull/616) Add support to ensure user belongs in required groups when using the OIDC provider (@stefansedich) | - [#616](https://github.com/oauth2-proxy/oauth2-proxy/pull/616) Add support to ensure user belongs in required groups when using the OIDC provider (@stefansedich) | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -296,27 +296,31 @@ func (p *OAuthProxy) GetRedirectURI(host string) string { | ||||||
| 	return u.String() | 	return u.String() | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func (p *OAuthProxy) redeemCode(ctx context.Context, host, code string) (s *sessionsapi.SessionState, err error) { | func (p *OAuthProxy) redeemCode(ctx context.Context, host, code string) (*sessionsapi.SessionState, error) { | ||||||
| 	if code == "" { | 	if code == "" { | ||||||
| 		return nil, errors.New("missing code") | 		return nil, errors.New("missing code") | ||||||
| 	} | 	} | ||||||
| 	redirectURI := p.GetRedirectURI(host) | 	redirectURI := p.GetRedirectURI(host) | ||||||
| 	s, err = p.provider.Redeem(ctx, redirectURI, code) | 	s, err := p.provider.Redeem(ctx, redirectURI, code) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return | 		return nil, err | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	if s.Email == "" { | 	if s.Email == "" { | ||||||
| 		s.Email, err = p.provider.GetEmailAddress(ctx, s) | 		s.Email, err = p.provider.GetEmailAddress(ctx, s) | ||||||
|  | 		if err != nil && err.Error() != "not implemented" { | ||||||
|  | 			return nil, err | ||||||
|  | 		} | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	if s.User == "" { | 	if s.User == "" { | ||||||
| 		s.User, err = p.provider.GetUserName(ctx, s) | 		s.User, err = p.provider.GetUserName(ctx, s) | ||||||
| 		if err != nil && err.Error() == "not implemented" { | 		if err != nil && err.Error() != "not implemented" { | ||||||
| 			err = nil | 			return nil, err | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return | 
 | ||||||
|  | 	return s, nil | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| // MakeCSRFCookie creates a cookie for CSRF
 | // MakeCSRFCookie creates a cookie for CSRF
 | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue