mirror of
https://github.com/TheAnachronism/docspell.git
synced 2025-06-22 02:18:26 +00:00
Fix compile warnings after scala update
This commit is contained in:
@ -90,6 +90,6 @@ object Config {
|
||||
}
|
||||
object Addons {
|
||||
val disabled: Addons =
|
||||
Addons(false, false, UrlMatcher.False, UrlMatcher.True)
|
||||
Addons(enabled = false, allowImpure = false, UrlMatcher.False, UrlMatcher.True)
|
||||
}
|
||||
}
|
||||
|
@ -127,7 +127,7 @@ object Login {
|
||||
_ <- logF.trace(s"Account lookup: $data")
|
||||
res <- data match {
|
||||
case Some(d) if checkNoPassword(d, Set(AccountSource.OpenId)) =>
|
||||
doLogin(config, d.account, false)
|
||||
doLogin(config, d.account, rememberMe = false)
|
||||
case Some(d) if checkNoPassword(d, Set(AccountSource.Local)) =>
|
||||
config.onAccountSourceConflict match {
|
||||
case OnAccountSourceConflict.Fail =>
|
||||
@ -145,7 +145,7 @@ object Login {
|
||||
AccountSource.OpenId
|
||||
)
|
||||
)
|
||||
res <- doLogin(config, d.account, false)
|
||||
res <- doLogin(config, d.account, rememberMe = false)
|
||||
} yield res
|
||||
}
|
||||
case _ =>
|
||||
@ -212,7 +212,12 @@ object Login {
|
||||
val okResult: F[Result] =
|
||||
for {
|
||||
_ <- store.transact(RUser.updateLogin(sf.token.account))
|
||||
newToken <- AuthToken.user(sf.token.account, false, config.serverSecret, None)
|
||||
newToken <- AuthToken.user(
|
||||
sf.token.account,
|
||||
requireSecondFactor = false,
|
||||
config.serverSecret,
|
||||
None
|
||||
)
|
||||
rem <- OptionT
|
||||
.whenF(sf.rememberMe && config.rememberMe.enabled)(
|
||||
insertRememberToken(store, sf.token.account, config)
|
||||
@ -239,7 +244,9 @@ object Login {
|
||||
(for {
|
||||
_ <- validateToken
|
||||
key <- EitherT.fromOptionF(
|
||||
store.transact(RTotp.findEnabledByUserId(sf.token.account.userId, true)),
|
||||
store.transact(
|
||||
RTotp.findEnabledByUserId(sf.token.account.userId, enabled = true)
|
||||
),
|
||||
Result.invalidAuth
|
||||
)
|
||||
now <- EitherT.right[Result](Timestamp.current[F])
|
||||
@ -255,7 +262,12 @@ object Login {
|
||||
def okResult(acc: AccountInfo) =
|
||||
for {
|
||||
_ <- store.transact(RUser.updateLogin(acc))
|
||||
token <- AuthToken.user(acc, false, config.serverSecret, None)
|
||||
token <- AuthToken.user(
|
||||
acc,
|
||||
requireSecondFactor = false,
|
||||
config.serverSecret,
|
||||
None
|
||||
)
|
||||
} yield Result.ok(token, None)
|
||||
|
||||
def rememberedLogin(rid: Ident) =
|
||||
|
@ -93,7 +93,7 @@ object AddonOps {
|
||||
AddonResult.executionFailed(
|
||||
new Exception(s"Addon run config ${id.id} not found.")
|
||||
) :: Nil,
|
||||
false
|
||||
pure = false
|
||||
) :: Nil,
|
||||
Nil
|
||||
)
|
||||
|
@ -72,7 +72,7 @@ private[joex] class AddonPrepare[F[_]: Sync](store: Store[F]) extends LoggerExte
|
||||
|
||||
token <- AuthToken.user(
|
||||
account,
|
||||
false,
|
||||
requireSecondFactor = false,
|
||||
secret.getOrElse(ByteVector.empty),
|
||||
tokenValidity.some
|
||||
)
|
||||
|
@ -194,7 +194,14 @@ object OCollective {
|
||||
id <- Ident.randomId[F]
|
||||
settings = sett.emptyTrash.getOrElse(EmptyTrash.default)
|
||||
args = EmptyTrashArgs(cid, settings.minAge)
|
||||
ut = UserTask(id, EmptyTrashArgs.taskName, true, settings.schedule, None, args)
|
||||
ut = UserTask(
|
||||
id,
|
||||
EmptyTrashArgs.taskName,
|
||||
enabled = true,
|
||||
settings.schedule,
|
||||
None,
|
||||
args
|
||||
)
|
||||
_ <- uts.updateOneTask(UserTaskScope.collective(cid), args.makeSubject.some, ut)
|
||||
_ <- joex.notifyAllNodes
|
||||
} yield ()
|
||||
@ -220,7 +227,7 @@ object OCollective {
|
||||
ut = UserTask(
|
||||
id,
|
||||
LearnClassifierArgs.taskName,
|
||||
true,
|
||||
enabled = true,
|
||||
CalEvent(WeekdayComponent.All, DateEvent.All, TimeEvent.All),
|
||||
None,
|
||||
args
|
||||
@ -239,7 +246,7 @@ object OCollective {
|
||||
ut = UserTask(
|
||||
id,
|
||||
EmptyTrashArgs.taskName,
|
||||
true,
|
||||
enabled = true,
|
||||
CalEvent(WeekdayComponent.All, DateEvent.All, TimeEvent.All),
|
||||
None,
|
||||
args
|
||||
|
@ -114,14 +114,14 @@ object ONotification {
|
||||
)
|
||||
_ <- notMod.send(logbuf._2.andThen(log), ev, ch)
|
||||
logs <- logbuf._1.get
|
||||
res = SendTestResult(true, logs)
|
||||
res = SendTestResult(success = true, logs)
|
||||
} yield res).attempt
|
||||
.map {
|
||||
case Right(res) => res
|
||||
case Left(ex) =>
|
||||
val ev =
|
||||
LogEvent.of(Level.Error, "Failed sending sample event").addError(ex)
|
||||
SendTestResult(false, Vector(ev))
|
||||
SendTestResult(success = false, Vector(ev))
|
||||
}
|
||||
|
||||
def listChannels(userId: Ident): F[Vector[Channel]] =
|
||||
|
@ -120,7 +120,9 @@ object OTotp {
|
||||
def confirmInit(accountId: AccountInfo, otp: OnetimePassword): F[ConfirmResult] =
|
||||
for {
|
||||
_ <- log.info(s"Confirm TOTP setup for account ${accountId.asString}")
|
||||
key <- store.transact(RTotp.findEnabledByUserId(accountId.userId, false))
|
||||
key <- store.transact(
|
||||
RTotp.findEnabledByUserId(accountId.userId, enabled = false)
|
||||
)
|
||||
now <- Timestamp.current[F]
|
||||
res <- key match {
|
||||
case None =>
|
||||
@ -129,7 +131,7 @@ object OTotp {
|
||||
val check = totp.checkPassword(r.secret, otp, now.value)
|
||||
if (check)
|
||||
store
|
||||
.transact(RTotp.setEnabled(accountId.userId, true))
|
||||
.transact(RTotp.setEnabled(accountId.userId, enabled = true))
|
||||
.map(_ => ConfirmResult.Success)
|
||||
else ConfirmResult.Failed.pure[F]
|
||||
}
|
||||
@ -140,7 +142,7 @@ object OTotp {
|
||||
case Some(pw) =>
|
||||
for {
|
||||
_ <- log.info(s"Validating TOTP, because it is requested to disable it.")
|
||||
key <- store.transact(RTotp.findEnabledByLogin(accountId, true))
|
||||
key <- store.transact(RTotp.findEnabledByLogin(accountId, enabled = true))
|
||||
now <- Timestamp.current[F]
|
||||
res <- key match {
|
||||
case None =>
|
||||
@ -149,7 +151,7 @@ object OTotp {
|
||||
val check = totp.checkPassword(r.secret, pw, now.value)
|
||||
if (check)
|
||||
UpdateResult.fromUpdate(
|
||||
store.transact(RTotp.setEnabled(r.userId, false))
|
||||
store.transact(RTotp.setEnabled(r.userId, enabled = false))
|
||||
)
|
||||
else
|
||||
log.info(s"TOTP code was invalid. Not disabling it.") *> UpdateResult
|
||||
@ -160,15 +162,15 @@ object OTotp {
|
||||
case None =>
|
||||
UpdateResult.fromUpdate {
|
||||
(for {
|
||||
key <- OptionT(RTotp.findEnabledByLogin(accountId, true))
|
||||
n <- OptionT.liftF(RTotp.setEnabled(key.userId, false))
|
||||
key <- OptionT(RTotp.findEnabledByLogin(accountId, enabled = true))
|
||||
n <- OptionT.liftF(RTotp.setEnabled(key.userId, enabled = false))
|
||||
} yield n).mapK(store.transform).getOrElse(0)
|
||||
}
|
||||
}
|
||||
|
||||
def state(acc: AccountInfo): F[OtpState] =
|
||||
for {
|
||||
record <- store.transact(RTotp.findEnabledByUserId(acc.userId, true))
|
||||
record <- store.transact(RTotp.findEnabledByUserId(acc.userId, enabled = true))
|
||||
result = record match {
|
||||
case Some(r) =>
|
||||
OtpState.Enabled(r.created)
|
||||
|
@ -159,7 +159,7 @@ object OUpload {
|
||||
data.meta.skipDuplicates,
|
||||
data.meta.fileFilter.some,
|
||||
data.meta.tags.some,
|
||||
false,
|
||||
reprocess = false,
|
||||
data.meta.attachmentsOnly,
|
||||
data.meta.customData
|
||||
)
|
||||
|
@ -32,9 +32,12 @@ class AuthTokenTest extends CatsEffectSuite {
|
||||
val otherSecret = ByteVector.fromValidHex("16bad")
|
||||
|
||||
test("validate") {
|
||||
val token1 = AuthToken.user[IO](user, false, secret, None).unsafeRunSync()
|
||||
val token1 =
|
||||
AuthToken.user[IO](user, requireSecondFactor = false, secret, None).unsafeRunSync()
|
||||
val token2 =
|
||||
AuthToken.user[IO](user, false, secret, Duration.seconds(10).some).unsafeRunSync()
|
||||
AuthToken
|
||||
.user[IO](user, requireSecondFactor = false, secret, Duration.seconds(10).some)
|
||||
.unsafeRunSync()
|
||||
assert(token1.validate(secret, Duration.seconds(5)))
|
||||
assert(!token1.validate(otherSecret, Duration.seconds(5)))
|
||||
assert(!token1.copy(account = john).validate(secret, Duration.seconds(5)))
|
||||
@ -46,9 +49,12 @@ class AuthTokenTest extends CatsEffectSuite {
|
||||
}
|
||||
|
||||
test("signature") {
|
||||
val token1 = AuthToken.user[IO](user, false, secret, None).unsafeRunSync()
|
||||
val token1 =
|
||||
AuthToken.user[IO](user, requireSecondFactor = false, secret, None).unsafeRunSync()
|
||||
val token2 =
|
||||
AuthToken.user[IO](user, false, secret, Duration.seconds(10).some).unsafeRunSync()
|
||||
AuthToken
|
||||
.user[IO](user, requireSecondFactor = false, secret, Duration.seconds(10).some)
|
||||
.unsafeRunSync()
|
||||
|
||||
assert(token1.sigValid(secret))
|
||||
assert(token1.sigInvalid(otherSecret))
|
||||
|
Reference in New Issue
Block a user