Skip to content

Commit 241f977

Browse files
committed
Fixing related files
1 parent 049ea64 commit 241f977

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

server/handlers/oauth_login.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ func OAuthLoginHandler() gin.HandlerFunc {
5252

5353
// use protected roles verification for admin login only.
5454
// though if not associated with user, it will be rejected from oauth_callback
55-
if !utils.IsValidRoles(append([]string{}, append(envstore.EnvStoreObj.GetSliceStoreEnvVariable(constants.EnvKeyRoles), envstore.EnvStoreObj.GetSliceStoreEnvVariable(constants.EnvKeyProtectedRoles)...)...), rolesSplit) {
55+
if !utils.IsValidRoles(rolesSplit, append([]string{}, append(envstore.EnvStoreObj.GetSliceStoreEnvVariable(constants.EnvKeyRoles), envstore.EnvStoreObj.GetSliceStoreEnvVariable(constants.EnvKeyProtectedRoles)...)...)) {
5656
c.JSON(400, gin.H{
5757
"error": "invalid role",
5858
})

server/resolvers/magic_link_login.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ func MagicLinkLoginResolver(ctx context.Context, params model.MagicLinkLoginInpu
5252
// define roles for new user
5353
if len(params.Roles) > 0 {
5454
// check if roles exists
55-
if !utils.IsValidRoles(envstore.EnvStoreObj.GetSliceStoreEnvVariable(constants.EnvKeyRoles), params.Roles) {
55+
if !utils.IsValidRoles(params.Roles, envstore.EnvStoreObj.GetSliceStoreEnvVariable(constants.EnvKeyRoles)) {
5656
return res, fmt.Errorf(`invalid roles`)
5757
} else {
5858
inputRoles = params.Roles

0 commit comments

Comments
 (0)