Corrects validation logic for static password check
This commit is contained in:
parent
91cbd466a5
commit
af9c2880a6
1 changed files with 4 additions and 5 deletions
|
@ -99,12 +99,11 @@ func (p *password) UnmarshalJSON(b []byte) error {
|
|||
Username: data.Username,
|
||||
UserID: data.UserID,
|
||||
})
|
||||
if len(data.Hash) == 0 && len(data.HashFromEnv) > 0 {
|
||||
data.Hash = os.Getenv(data.HashFromEnv)
|
||||
}
|
||||
if len(data.Hash) == 0 {
|
||||
if len(data.HashFromEnv) > 0 {
|
||||
data.Hash = os.Getenv(data.HashFromEnv)
|
||||
} else {
|
||||
return fmt.Errorf("no password hash provided")
|
||||
}
|
||||
return fmt.Errorf("no password hash provided")
|
||||
}
|
||||
|
||||
// If this value is a valid bcrypt, use it.
|
||||
|
|
Reference in a new issue