diff options
| author | James Elliott <james-d-elliott@users.noreply.github.com> | 2021-12-04 15:48:22 +1100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2021-12-04 15:48:22 +1100 |
| commit | c01759715cd57cc6fadeea0662cc63a381cf08d0 (patch) | |
| tree | ddf37617d846648697072c5541bd13e8ffbef438 /internal/storage/sql_provider_encryption.go | |
| parent | 5a223b5a56ea37b480ea84adea54f55473c0bda5 (diff) | |
fix(models): potential panic generating jti (#2669)
This ensures that at the time the JWT is generated for identity verification requests that a panic can't occur and instead an error will be returned.
Diffstat (limited to 'internal/storage/sql_provider_encryption.go')
| -rw-r--r-- | internal/storage/sql_provider_encryption.go | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/internal/storage/sql_provider_encryption.go b/internal/storage/sql_provider_encryption.go index 32aae959d..70f2ade43 100644 --- a/internal/storage/sql_provider_encryption.go +++ b/internal/storage/sql_provider_encryption.go @@ -279,7 +279,10 @@ func (p *SQLProvider) getEncryptionValue(ctx context.Context, name string) (valu } func (p *SQLProvider) setNewEncryptionCheckValue(ctx context.Context, key *[32]byte, e sqlx.ExecerContext) (err error) { - valueClearText := uuid.New() + valueClearText, err := uuid.NewUUID() + if err != nil { + return err + } value, err := utils.Encrypt([]byte(valueClearText.String()), key) if err != nil { |
