From 9b90f52cbaa87a1316116ac33e9204cb613caff3 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Wolfgang=20Hu=C3=9F?= Date: Thu, 2 Jun 2022 16:00:09 +0200 Subject: [PATCH] Cleanup --- backend/src/graphql/resolver/UserResolver.ts | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/backend/src/graphql/resolver/UserResolver.ts b/backend/src/graphql/resolver/UserResolver.ts index 95c4316ff..df610384d 100644 --- a/backend/src/graphql/resolver/UserResolver.ts +++ b/backend/src/graphql/resolver/UserResolver.ts @@ -332,12 +332,8 @@ export class UserResolver { logger.info(`DbUser.findOne(email=${email}) = ${userFound}`) const dbUser = new DbUser() if (userFound) { - // Wolle: logger.error('User already exists with this email=' + email) logger.info('User already exists with this email=' + email) // TODO: this is unsecure, but the current implementation of the login server. This way it can be queried if the user with given EMail is existent. - // Wolle: throw new Error(`User already exists.`) - // send mail even CC to support - // respond with fake user_id? dbUser.id = sodium.randombytes_random() % (2048 * 16) dbUser.email = email dbUser.firstName = firstName @@ -361,17 +357,11 @@ export class UserResolver { logger.debug(`Email not send!`) } logger.info('createUser() faked and send multi registration mail...') - // Wolle: - // console.log('dbUser: ', dbUser) } else { - // Wolle: const passphrase = PassphraseGenerate() // const keyPair = KeyPairEd25519Create(passphrase) // return pub, priv Key // const passwordHash = SecretKeyCryptographyCreateKey(email, password) // return short and long hash // const encryptedPrivkey = SecretKeyCryptographyEncrypt(keyPair[1], passwordHash[1]) - // Wolle: const emailHash = getEmailHash(email) - // Wolle: const dbUser = new DbUser() - // Wolle: what is about id? dbUser.email = email dbUser.firstName = firstName dbUser.lastName = lastName