diff --git a/server/db/providers/sql/verification_requests.go b/server/db/providers/sql/verification_requests.go index 7e7e7ba..fe044a7 100644 --- a/server/db/providers/sql/verification_requests.go +++ b/server/db/providers/sql/verification_requests.go @@ -21,7 +21,7 @@ func (p *provider) AddVerificationRequest(verificationRequest models.Verificatio verificationRequest.UpdatedAt = time.Now().Unix() result := p.db.Clauses(clause.OnConflict{ Columns: []clause.Column{{Name: "email"}, {Name: "identifier"}}, - DoUpdates: clause.AssignmentColumns([]string{"token", "expires_at"}), + DoUpdates: clause.AssignmentColumns([]string{"token", "expires_at", "nonce", "redirect_uri"}), }).Create(&verificationRequest) if result.Error != nil { diff --git a/server/token/jwt.go b/server/token/jwt.go index 912f1e5..f3e74c8 100644 --- a/server/token/jwt.go +++ b/server/token/jwt.go @@ -92,7 +92,7 @@ func ParseJWTToken(token, hostname, nonce, subject string) (jwt.MapClaims, error return claims, errors.New("invalid audience") } - fmt.Println("claims:", claims, claims["nonce"], nonce) + fmt.Println("claims:", claims["nonce"], nonce, claims["nonce"] == nonce) if claims["nonce"] != nonce { return claims, errors.New("invalid nonce") }