From 7119c566ef73c10002e12f3cb224b88158f5165a Mon Sep 17 00:00:00 2001 From: James Houlahan Date: Tue, 17 Jan 2023 12:32:18 +0100 Subject: [PATCH] Other: Bump GPA to v0.3.0 --- go.mod | 2 +- go.sum | 4 ++-- internal/bridge/user.go | 2 +- internal/frontend/grpc/service_methods.go | 4 ++-- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/go.mod b/go.mod index ed409fed..c0ec9e96 100644 --- a/go.mod +++ b/go.mod @@ -7,7 +7,7 @@ require ( github.com/Masterminds/semver/v3 v3.1.1 github.com/ProtonMail/gluon v0.14.2-0.20230117124414-549c1f016d6e github.com/ProtonMail/go-autostart v0.0.0-20210130080809-00ed301c8e9a - github.com/ProtonMail/go-proton-api v0.2.4-0.20230112102613-6ad201cdb337 + github.com/ProtonMail/go-proton-api v0.3.0 github.com/ProtonMail/go-rfc5322 v0.11.0 github.com/ProtonMail/gopenpgp/v2 v2.4.10 github.com/PuerkitoBio/goquery v1.8.0 diff --git a/go.sum b/go.sum index 38f8846c..3e0e4168 100644 --- a/go.sum +++ b/go.sum @@ -41,8 +41,8 @@ github.com/ProtonMail/go-message v0.0.0-20210611055058-fabeff2ec753/go.mod h1:NB github.com/ProtonMail/go-mime v0.0.0-20220302105931-303f85f7fe0f/go.mod h1:NYt+V3/4rEeDuaev/zw1zCq8uqVEuPHzDPo3OZrlGJ4= github.com/ProtonMail/go-mime v0.0.0-20220429130430-2192574d760f h1:4IWzKjHzZxdrW9k4zl/qCwenOVHDbVDADPPHFLjs0Oc= github.com/ProtonMail/go-mime v0.0.0-20220429130430-2192574d760f/go.mod h1:qRZgbeASl2a9OwmsV85aWwRqic0NHPh+9ewGAzb4cgM= -github.com/ProtonMail/go-proton-api v0.2.4-0.20230112102613-6ad201cdb337 h1:yvpmJq6AvALZLDUTYaXSc9BHfpV90fcXyrVNoP8FDu4= -github.com/ProtonMail/go-proton-api v0.2.4-0.20230112102613-6ad201cdb337/go.mod h1:JUo5IQG0hNuPRuDpOUsCOvtee6UjTEHHF1QN2i8RSos= +github.com/ProtonMail/go-proton-api v0.3.0 h1:0lRWSp4bGSwWcpVFWMk++z11ZzRHhXAC9k5L6BQ4KQA= +github.com/ProtonMail/go-proton-api v0.3.0/go.mod h1:JUo5IQG0hNuPRuDpOUsCOvtee6UjTEHHF1QN2i8RSos= github.com/ProtonMail/go-rfc5322 v0.11.0 h1:o5Obrm4DpmQEffvgsVqG6S4BKwC1Wat+hYwjIp2YcCY= github.com/ProtonMail/go-rfc5322 v0.11.0/go.mod h1:6oOKr0jXvpoE6pwTx/HukigQpX2J9WUf6h0auplrFTw= github.com/ProtonMail/go-srp v0.0.5 h1:xhUioxZgDbCnpo9JehyFhwwsn9JLWkUGfB0oiKXgiGg= diff --git a/internal/bridge/user.go b/internal/bridge/user.go index 6a369745..3aad762d 100644 --- a/internal/bridge/user.go +++ b/internal/bridge/user.go @@ -367,7 +367,7 @@ func (bridge *Bridge) loadUsers(ctx context.Context) error { func (bridge *Bridge) loadUser(ctx context.Context, user *vault.User) error { client, auth, err := bridge.api.NewClientWithRefresh(ctx, user.AuthUID(), user.AuthRef()) if err != nil { - if apiErr := new(proton.Error); errors.As(err, &apiErr) && (apiErr.Code == proton.AuthRefreshTokenInvalid) { + if apiErr := new(proton.APIError); errors.As(err, &apiErr) && (apiErr.Code == proton.AuthRefreshTokenInvalid) { // The session cannot be refreshed, we sign out the user by clearing his auth secrets. if err := user.Clear(); err != nil { logrus.WithError(err).Warn("Failed to clear user secrets") diff --git a/internal/frontend/grpc/service_methods.go b/internal/frontend/grpc/service_methods.go index 6beecaf3..1adcd027 100644 --- a/internal/frontend/grpc/service_methods.go +++ b/internal/frontend/grpc/service_methods.go @@ -405,7 +405,7 @@ func (s *Service) Login(ctx context.Context, login *LoginRequest) (*emptypb.Empt if errors.Is(err, bridge.ErrUserAlreadyLoggedIn) { _ = s.SendEvent(NewLoginAlreadyLoggedInEvent(auth.UserID)) - } else if apiErr := new(proton.Error); errors.As(err, &apiErr) { + } else if apiErr := new(proton.APIError); errors.As(err, &apiErr) { switch apiErr.Code { // nolint:exhaustive case proton.PasswordWrong, proton.UsernameInvalid: _ = s.SendEvent(NewLoginError(LoginErrorType_USERNAME_PASSWORD_ERROR, "")) @@ -464,7 +464,7 @@ func (s *Service) Login2FA(ctx context.Context, login *LoginRequest) (*emptypb.E } if err := s.authClient.Auth2FA(context.Background(), proton.Auth2FAReq{TwoFactorCode: string(twoFA)}); err != nil { - if apiErr := new(proton.Error); errors.As(err, &apiErr) && apiErr.Code == proton.PasswordWrong { + if apiErr := new(proton.APIError); errors.As(err, &apiErr) && apiErr.Code == proton.PasswordWrong { s.log.Warn("Login 2FA: retry 2fa") _ = s.SendEvent(NewLoginError(LoginErrorType_TFA_ERROR, "")) } else {