diff --git a/server/handlers/oauth_callback.go b/server/handlers/oauth_callback.go index 9255041..b3020ea 100644 --- a/server/handlers/oauth_callback.go +++ b/server/handlers/oauth_callback.go @@ -456,15 +456,12 @@ func processLinkedInUserInfo(code string) (models.User, error) { func processAppleUserInfo(code string) (models.User, error) { user := models.User{} - fmt.Println("=> code:", code) oauth2Token, err := oauth.OAuthProviders.AppleConfig.Exchange(oauth2.NoContext, code) if err != nil { log.Debug("Failed to exchange code for token: ", err) return user, fmt.Errorf("invalid apple exchange code: %s", err.Error()) } - fmt.Println("=> oauth2Token:", oauth2Token) - // Extract the ID Token from OAuth2 token. rawIDToken, ok := oauth2Token.Extra("id_token").(string) if !ok { @@ -480,8 +477,6 @@ func processAppleUserInfo(code string) (models.User, error) { return user, fmt.Errorf("failed to decrypt claims data: %s", err.Error()) } - fmt.Println("=> decodedClaimsData:", string(decodedClaimsData)) - claims := make(map[string]interface{}) err = json.Unmarshal(decodedClaimsData, &claims) if err != nil { @@ -489,8 +484,6 @@ func processAppleUserInfo(code string) (models.User, error) { return user, fmt.Errorf("failed to unmarshal claims data: %s", err.Error()) } - fmt.Println("=> claims:", claims) - if val, ok := claims["email"]; !ok { log.Debug("Failed to extract email from claims.") return user, fmt.Errorf("unable to extract email, please check the scopes enabled for your app. It needs `email`, `name` scopes")