|
|
|
|
@ -96,7 +96,6 @@ func (r *RefreshService) cleanAndPickAuthTokens(ctx context.Context, u *user) (m
|
|
|
|
|
}
|
|
|
|
|
default:
|
|
|
|
|
_, err := r.repo.tokenReadFromBoundaryFn(ctx, u.Address, at.Token)
|
|
|
|
|
var apiErr *api.Error
|
|
|
|
|
switch {
|
|
|
|
|
case err != nil && (api.ErrUnauthorized.Is(err) || api.ErrNotFound.Is(err)):
|
|
|
|
|
if err := r.repo.deleteKeyringToken(ctx, *kt); err != nil {
|
|
|
|
|
@ -104,7 +103,7 @@ func (r *RefreshService) cleanAndPickAuthTokens(ctx context.Context, u *user) (m
|
|
|
|
|
}
|
|
|
|
|
event.WriteSysEvent(ctx, op, "Removed auth token from cache because it was not found to be valid in boundary", "auth token id", at.Id)
|
|
|
|
|
continue
|
|
|
|
|
case err != nil && !errors.Is(err, apiErr):
|
|
|
|
|
case err != nil:
|
|
|
|
|
event.WriteError(ctx, op, err, event.WithInfoMsg("validating keyring stored token against boundary", "auth token id", at.Id))
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
@ -114,7 +113,6 @@ func (r *RefreshService) cleanAndPickAuthTokens(ctx context.Context, u *user) (m
|
|
|
|
|
if atv, ok := r.repo.idToKeyringlessAuthToken.Load(t.Id); ok {
|
|
|
|
|
if at, ok := atv.(*authtokens.AuthToken); ok {
|
|
|
|
|
_, err := r.repo.tokenReadFromBoundaryFn(ctx, u.Address, at.Token)
|
|
|
|
|
var apiErr *api.Error
|
|
|
|
|
switch {
|
|
|
|
|
case err != nil && (api.ErrUnauthorized.Is(err) || api.ErrNotFound.Is(err)):
|
|
|
|
|
r.repo.idToKeyringlessAuthToken.Delete(t.Id)
|
|
|
|
|
@ -123,11 +121,10 @@ func (r *RefreshService) cleanAndPickAuthTokens(ctx context.Context, u *user) (m
|
|
|
|
|
return nil, errors.Wrap(ctx, err, op, errors.WithMsg("for user %q, auth token %q", u.Id, t.Id))
|
|
|
|
|
}
|
|
|
|
|
continue
|
|
|
|
|
case err != nil && !errors.Is(err, apiErr):
|
|
|
|
|
case err != nil:
|
|
|
|
|
event.WriteError(ctx, op, err, event.WithInfoMsg("validating in memory stored token against boundary", "auth token id", at.Id))
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ret[*t] = at.Token
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|