Showing 402 of 849 total issues
Method OAuth2ApiService.DeleteOAuth2ClientExecute
has 7 return statements (exceeds 4 allowed). Open
Open
func (a *OAuth2ApiService) DeleteOAuth2ClientExecute(r ApiDeleteOAuth2ClientRequest) (*http.Response, error) {
var (
localVarHTTPMethod = http.MethodDelete
localVarPostBody interface{}
formFiles []formFile
Method Handler.rejectOAuth2ConsentRequest
has 7 return statements (exceeds 4 allowed). Open
Open
func (h *Handler) rejectOAuth2ConsentRequest(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {
ctx := r.Context()
challenge := stringsx.Coalesce(
r.URL.Query().Get("consent_challenge"),
Function ManagerTests
has 6 arguments (exceeds 4 allowed). Consider refactoring. Open
Open
func ManagerTests(deps Deps, m consent.Manager, clientManager client.Manager, fositeManager x.FositeStorer, network string, parallel bool) func(t *testing.T) {
Method OAuth2ApiService.DeleteTrustedOAuth2JwtGrantIssuerExecute
has 7 return statements (exceeds 4 allowed). Open
Open
func (a *OAuth2ApiService) DeleteTrustedOAuth2JwtGrantIssuerExecute(r ApiDeleteTrustedOAuth2JwtGrantIssuerRequest) (*http.Response, error) {
var (
localVarHTTPMethod = http.MethodDelete
localVarPostBody interface{}
formFiles []formFile
Method OAuth2ApiService.RevokeOAuth2LoginSessionsExecute
has 7 return statements (exceeds 4 allowed). Open
Open
func (a *OAuth2ApiService) RevokeOAuth2LoginSessionsExecute(r ApiRevokeOAuth2LoginSessionsRequest) (*http.Response, error) {
var (
localVarHTTPMethod = http.MethodDelete
localVarPostBody interface{}
formFiles []formFile
Method DefaultStrategy.forwardConsentRequest
has 7 return statements (exceeds 4 allowed). Open
Open
func (s *DefaultStrategy) forwardConsentRequest(
ctx context.Context,
w http.ResponseWriter,
r *http.Request,
ar fosite.AuthorizeRequester,
Method OidcApiService.DeleteOidcDynamicClientExecute
has 7 return statements (exceeds 4 allowed). Open
Open
func (a *OidcApiService) DeleteOidcDynamicClientExecute(r ApiDeleteOidcDynamicClientRequest) (*http.Response, error) {
var (
localVarHTTPMethod = http.MethodDelete
localVarPostBody interface{}
formFiles []formFile
Method Handler.rejectOAuth2LoginRequest
has 7 return statements (exceeds 4 allowed). Open
Open
func (h *Handler) rejectOAuth2LoginRequest(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {
ctx := r.Context()
challenge := stringsx.Coalesce(
r.URL.Query().Get("login_challenge"),
Method Handler.acceptOAuth2ConsentRequest
has 7 return statements (exceeds 4 allowed). Open
Open
func (h *Handler) acceptOAuth2ConsentRequest(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {
ctx := r.Context()
challenge := stringsx.Coalesce(
r.URL.Query().Get("consent_challenge"),
Function TestHandler
has 7 return statements (exceeds 4 allowed). Open
Open
func TestHandler(t *testing.T) {
ctx := context.Background()
reg := internal.NewMockedRegistry(t, &contextx.Default{})
h := client.NewHandler(reg)
reg.WithContextualizer(&contextx.TestContextualizer{})
Function NewRegistryFromDSN
has 6 arguments (exceeds 4 allowed). Consider refactoring. Open
Open
func NewRegistryFromDSN(ctx context.Context, c *config.DefaultProvider, l *logrusx.Logger, skipNetworkInit bool, migrate bool, ctxer contextx.Contextualizer) (Registry, error) {
Method Handler.CreateClient
has 7 return statements (exceeds 4 allowed). Open
Open
func (h *Handler) CreateClient(r *http.Request, validator func(context.Context, *Client) error, isDynamic bool) (*Client, error) {
var c Client
if err := json.NewDecoder(r.Body).Decode(&c); err != nil {
return nil, errorsx.WithStack(herodot.ErrBadRequest.WithReasonf("Unable to decode the request body: %s", err))
}
Avoid deeply nested control flow statements. Open
Open
} else if gt == fosite.GrantTypePassword {
if tt == fosite.AccessToken && c.PasswordGrantAccessTokenLifespan.Valid {
cl = &c.PasswordGrantAccessTokenLifespan.Duration
} else if tt == fosite.RefreshToken && c.PasswordGrantRefreshTokenLifespan.Valid {
cl = &c.PasswordGrantRefreshTokenLifespan.Duration
Method RegistrySQL.Init
has 6 arguments (exceeds 4 allowed). Consider refactoring. Open
Open
ctx context.Context,
skipNetworkInit bool,
migrate bool,
ctxer contextx.Contextualizer,
extraMigrations []fs.FS,
Avoid deeply nested control flow statements. Open
Open
} else if tt == fosite.IDToken && c.ImplicitGrantIDTokenLifespan.Valid {
cl = &c.ImplicitGrantIDTokenLifespan.Duration
}
Avoid deeply nested control flow statements. Open
Open
if tt == fosite.AccessToken && c.JwtBearerGrantAccessTokenLifespan.Valid {
cl = &c.JwtBearerGrantAccessTokenLifespan.Duration
}
Method Persister.migrateOldMigrationTables
has 7 return statements (exceeds 4 allowed). Open
Open
func (p *Persister) migrateOldMigrationTables() error {
if err := p.conn.RawQuery(fmt.Sprintf("SELECT * FROM %s", clientMigrationTableName)).Exec(); err != nil {
// assume there are no old migration tables => done
return nil
}
Function NewPersister
has 6 arguments (exceeds 4 allowed). Consider refactoring. Open
Open
func NewPersister(ctx context.Context, c *pop.Connection, r Dependencies, config *config.DefaultProvider, extraMigrations []fs.FS, goMigrations []popx.Migration) (*Persister, error) {
Method Persister.ConfirmLoginSession
has 7 return statements (exceeds 4 allowed). Open
Open
func (p *Persister) ConfirmLoginSession(ctx context.Context, loginSession *flow.LoginSession) error {
ctx, span := p.r.Tracer(ctx).Tracer().Start(ctx, "persistence.sql.ConfirmLoginSession")
defer span.End()
loginSession.NID = p.NetworkID(ctx)
Method JwkApiService.DeleteJsonWebKeyExecute
has 7 return statements (exceeds 4 allowed). Open
Open
func (a *JwkApiService) DeleteJsonWebKeyExecute(r ApiDeleteJsonWebKeyRequest) (*http.Response, error) {
var (
localVarHTTPMethod = http.MethodDelete
localVarPostBody interface{}
formFiles []formFile