@@ -92,13 +92,13 @@ func (auth *authenticationService) Logout(request *http.Request, w http.Response
92
92
93
93
_ , refreshToken := provideTokens (request )
94
94
if refreshToken == "" {
95
- logger .LogDebug ("unable to find tokens from cookies" )
95
+ logger .LogDebug ("Unable to find tokens from cookies" )
96
96
return descope .ErrRefreshToken .WithMessage ("Unable to find tokens from cookies" )
97
97
}
98
98
99
99
_ , err := auth .validateJWT (refreshToken )
100
100
if err != nil {
101
- logger .LogDebug ("invalid refresh token" )
101
+ logger .LogDebug ("Invalid refresh token" )
102
102
return descope .ErrRefreshToken .WithMessage ("Invalid refresh token" )
103
103
}
104
104
@@ -145,13 +145,13 @@ func (auth *authenticationService) LogoutAll(request *http.Request, w http.Respo
145
145
146
146
_ , refreshToken := provideTokens (request )
147
147
if refreshToken == "" {
148
- logger .LogDebug ("unable to find tokens from cookies" )
148
+ logger .LogDebug ("Unable to find tokens from cookies" )
149
149
return descope .ErrRefreshToken .WithMessage ("Unable to find tokens from cookies" )
150
150
}
151
151
152
152
_ , err := auth .validateJWT (refreshToken )
153
153
if err != nil {
154
- logger .LogDebug ("invalid refresh token" )
154
+ logger .LogDebug ("Invalid refresh token" )
155
155
return descope .ErrRefreshToken .WithMessage ("Invalid refresh token" )
156
156
}
157
157
@@ -198,13 +198,13 @@ func (auth *authenticationService) Me(request *http.Request) (*descope.UserRespo
198
198
199
199
_ , refreshToken := provideTokens (request )
200
200
if refreshToken == "" {
201
- logger .LogDebug ("unable to find tokens from cookies" )
201
+ logger .LogDebug ("Unable to find tokens from cookies" )
202
202
return nil , descope .ErrRefreshToken .WithMessage ("Unable to find tokens from cookies" )
203
203
}
204
204
205
205
_ , err := auth .validateJWT (refreshToken )
206
206
if err != nil {
207
- logger .LogDebug ("invalid refresh token" )
207
+ logger .LogDebug ("Invalid refresh token" )
208
208
return nil , descope .ErrRefreshToken .WithMessage ("Invalid refresh token" )
209
209
}
210
210
@@ -317,7 +317,7 @@ func (auth *authenticationService) validateAndRefreshSessionWithTokens(sessionTo
317
317
func (auth * authenticationService ) ExchangeAccessKey (accessKey string ) (success bool , SessionToken * descope.Token , err error ) {
318
318
httpResponse , err := auth .client .DoPostRequest (api .Routes .ExchangeAccessKey (), nil , & api.HTTPRequest {}, accessKey )
319
319
if err != nil {
320
- logger .LogError ("failed to exchange access key" , err )
320
+ logger .LogError ("Failed to exchange access key" , err )
321
321
return false , nil , err
322
322
}
323
323
@@ -369,7 +369,7 @@ func (auth *authenticationsBase) extractJWTResponse(bodyStr string) (*descope.JW
369
369
jRes := descope.JWTResponse {}
370
370
err := utils .Unmarshal ([]byte (bodyStr ), & jRes )
371
371
if err != nil {
372
- logger .LogError ("unable to parse jwt response" , err )
372
+ logger .LogError ("Unable to parse jwt response" , err )
373
373
return nil , err
374
374
}
375
375
return & jRes , nil
@@ -382,7 +382,7 @@ func (auth *authenticationsBase) extractUserResponse(bodyStr string) (*descope.U
382
382
res := descope.UserResponse {}
383
383
err := utils .Unmarshal ([]byte (bodyStr ), & res )
384
384
if err != nil {
385
- logger .LogError ("unable to parse user response" , err )
385
+ logger .LogError ("Unable to parse user response" , err )
386
386
return nil , err
387
387
}
388
388
return & res , nil
@@ -518,7 +518,7 @@ func (auth *authenticationsBase) generateAuthenticationInfoWithRefreshToken(http
518
518
}
519
519
tokens , err := auth .extractTokens (jwtResponse )
520
520
if err != nil {
521
- logger .LogError ("unable to extract tokens from request [%s]" , err , httpResponse .Req .URL )
521
+ logger .LogError ("Unable to extract tokens from request [%s]" , err , httpResponse .Req .URL )
522
522
return nil , err
523
523
}
524
524
@@ -548,7 +548,7 @@ func (auth *authenticationsBase) generateAuthenticationInfoWithRefreshToken(http
548
548
if cookies [i ].Name == descope .RefreshCookieName {
549
549
refreshToken , err = auth .validateJWT (cookies [i ].Value )
550
550
if err != nil {
551
- logger .LogDebug ("validation of refresh token failed: %s" , err .Error ())
551
+ logger .LogDebug ("Validation of refresh token failed: %s" , err .Error ())
552
552
return nil , err
553
553
}
554
554
}
@@ -562,7 +562,7 @@ func (auth *authenticationsBase) generateAuthenticationInfoWithRefreshToken(http
562
562
func getValidRefreshToken (r * http.Request ) (string , error ) {
563
563
_ , refreshToken := provideTokens (r )
564
564
if refreshToken == "" {
565
- logger .LogDebug ("unable to find tokens from cookies" )
565
+ logger .LogDebug ("Unable to find tokens from cookies" )
566
566
return "" , descope .ErrRefreshToken .WithMessage ("Unable to find tokens from cookies" )
567
567
}
568
568
return refreshToken , nil
@@ -667,7 +667,7 @@ func getAuthorizationClaimItems(token *descope.Token, tenant string, claim strin
667
667
668
668
// warn if it seems like programmer forgot the tenant ID
669
669
if len (items ) == 0 && tenant == "" && len (token .GetTenants ()) != 0 {
670
- logger .LogDebug ("no authorization items found but tenant might need to be specified" )
670
+ logger .LogDebug ("No authorization items found but tenant might need to be specified" )
671
671
}
672
672
673
673
return items
@@ -676,7 +676,7 @@ func getAuthorizationClaimItems(token *descope.Token, tenant string, claim strin
676
676
func getPendingRefFromResponse (httpResponse * api.HTTPResponse ) (* descope.EnchantedLinkResponse , error ) {
677
677
var response * descope.EnchantedLinkResponse
678
678
if err := utils .Unmarshal ([]byte (httpResponse .BodyStr ), & response ); err != nil {
679
- logger .LogError ("failed to load pending reference from response" , err )
679
+ logger .LogError ("Failed to load pending reference from response" , err )
680
680
return response , descope .ErrUnexpectedResponse .WithMessage ("Failed to load pending reference" )
681
681
}
682
682
return response , nil
0 commit comments