From ded48cb61894d65121f8ac1a470fea3dfcc9a06f Mon Sep 17 00:00:00 2001 From: loks0n <22452787+loks0n@users.noreply.github.com> Date: Tue, 9 Jan 2024 16:41:42 +0000 Subject: [PATCH] chore: fmt --- app/controllers/api/account.php | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/app/controllers/api/account.php b/app/controllers/api/account.php index e3c2e66f63..f6621d2c55 100644 --- a/app/controllers/api/account.php +++ b/app/controllers/api/account.php @@ -775,7 +775,7 @@ App::get('/v1/account/sessions/oauth2/:provider/redirect') $duration = $project->getAttribute('auths', [])['duration'] ?? Auth::TOKEN_EXPIRATION_LOGIN_LONG; $expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), $duration)); $secret = Auth::tokenGenerator(); - + // If the `token` param is set, we will return the token in the query string if ($state['token']) { $token = new Document([ @@ -788,9 +788,9 @@ App::get('/v1/account/sessions/oauth2/:provider/redirect') 'userAgent' => $request->getUserAgent('UNKNOWN'), 'ip' => $request->getIP(), ]); - + Authorization::setRole(Role::user($user->getId())->toString()); - + $token = $dbForProject->createDocument('tokens', $token ->setAttribute('$permissions', [ Permission::read(Role::user($user->getId())), @@ -811,7 +811,7 @@ App::get('/v1/account/sessions/oauth2/:provider/redirect') } else { $detector = new Detector($request->getUserAgent('UNKNOWN')); $record = $geodb->get($request->getIP()); - + $session = new Document(array_merge([ '$id' => ID::unique(), 'userId' => $user->getId(), @@ -844,7 +844,7 @@ App::get('/v1/account/sessions/oauth2/:provider/redirect') ->setParam('sessionId', $session->getId()) ->setPayload($response->output($session, Response::MODEL_SESSION)) ; - + // TODO: Remove this deprecated, undocumented workaround if ($state['success']['path'] == $oauthDefaultSuccess) { $query['project'] = $project->getId();