-
-
Notifications
You must be signed in to change notification settings - Fork 931
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: add new message when refresh parameter is true #1560
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you! This looks really good already! There are a few more things we need to do to get it merged.
The CI is failing because some files are formatted incorrectly. To format them, run:
$ make format
$ git commit -a -m "styles: format code"
$ git push
Please also add a test around here
assert.Empty(t, gjson.GetBytes(body, "ui.nodes.#(attributes.name==password).attributes.value").String(), "%s", body) |
verifying that the message is set in the payload :)
Thank you!
session/handler.go
Outdated
// 500: jsonError | ||
// 401: jsonError |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Revert order
text/message_verification.go
Outdated
@@ -8,7 +8,8 @@ import ( | |||
const ( | |||
InfoSelfServiceVerification ID = 1070000 + iota // 1070000 | |||
InfoSelfServiceVerificationEmailSent // 1070001 | |||
InfoSelfServiceVerificationSuccessful // 1060002 | |||
InfoSelfServiceVerificationSuccessful // 1070002 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Since this is in the login UI, please put it in message_login
and give it a descriptive name
Thanks for the comment. Will fix it up and add the test. Frankly, I'm still confused of the use case of this fix, as just started to get myself down and dirty with the code :) The fix will include message I've updated the PR. Thanks |
Codecov Report
@@ Coverage Diff @@
## master #1560 +/- ##
==========================================
+ Coverage 74.17% 74.19% +0.01%
==========================================
Files 257 257
Lines 12557 12565 +8
==========================================
+ Hits 9314 9322 +8
Misses 2624 2624
Partials 619 619
Continue to review full report at Codecov.
|
@aeneasr any feedback on the PR ? Thanks. |
@nanikjava sorry for the long response time, I didn't have time to review things because it was a really busy week.
Yes, exactly, that would be the case. I think it's an o.k. workaround for now. There is still an open item, could you please address my comment: Thank you for your hard work! :) |
Ok cool. Thanks for confirming about the behaviour.
Fixed. |
@aeneasr Checked the E2E test and looks like it has 1 test case failing using cockroachdb not sure what is the problem. Tried running locally by executing the
|
text/message_verification.go
Outdated
@@ -48,6 +47,15 @@ func NewVerificationEmailSent() *Message { | |||
} | |||
} | |||
|
|||
func NewVerificationConfirmation() *Message { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please move this to message_login
- this file should stay unmodified. message_verification
refers to the self-service verification (e.g. email verification flow). Thank you :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@aeneasr Thanks for the feedback. Changes has been moved to message_login
. Hope I did it right this time :)
Thank you! I added some changes but overall this looks very good! Ready to be merged :) |
Closes ory#1117 Co-authored-by: aeneasr <3372410+aeneasr@users.noreply.github.com>
PR for fixing #1117
contributing code guidelines.
vulnerability. If this pull request addresses a security. vulnerability, I
confirm that I got green light (please contact
security@ory.sh) from the maintainers to push
the changes.
works.