Skip to content

Commit 3abb766

Browse files
committed
Rename Localize to Localizef
1 parent a0994c3 commit 3abb766

16 files changed

+59
-57
lines changed

auth/auth.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ func (a *Auth) LoginPost(w http.ResponseWriter, r *http.Request) error {
6363
pidUser, err := a.Authboss.Storage.Server.Load(r.Context(), pid)
6464
if err == authboss.ErrUserNotFound {
6565
logger.Infof("failed to load user requested by pid: %s", pid)
66-
data := authboss.HTMLData{authboss.DataErr: a.Localize(r.Context(), authboss.TxtInvalidCredentials)}
66+
data := authboss.HTMLData{authboss.DataErr: a.Localizef(r.Context(), authboss.TxtInvalidCredentials)}
6767
return a.Authboss.Core.Responder.Respond(w, r, http.StatusOK, PageLogin, data)
6868
} else if err != nil {
6969
return err
@@ -85,7 +85,7 @@ func (a *Auth) LoginPost(w http.ResponseWriter, r *http.Request) error {
8585
}
8686

8787
logger.Infof("user %s failed to log in", pid)
88-
data := authboss.HTMLData{authboss.DataErr: a.Localize(r.Context(), authboss.TxtInvalidCredentials)}
88+
data := authboss.HTMLData{authboss.DataErr: a.Localizef(r.Context(), authboss.TxtInvalidCredentials)}
8989
return a.Authboss.Core.Responder.Respond(w, r, http.StatusOK, PageLogin, data)
9090
}
9191

authboss.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -101,15 +101,15 @@ func (a *Authboss) VerifyPassword(user AuthableUser, password string) error {
101101
return a.Core.Hasher.CompareHashAndPassword(user.GetPassword(), password)
102102
}
103103

104-
// Localize is a helper to translate a key using the translator
104+
// Localizef is a helper to translate a key using the translator
105105
// If the localizer is nil or returns an empty string,
106106
// then the original text will be returned using [fmt.Sprintf] to interpolate the args.
107-
func (a *Authboss) Localize(ctx context.Context, text string, args ...any) string {
107+
func (a *Authboss) Localizef(ctx context.Context, text string, args ...any) string {
108108
if a.Config.Core.Localizer == nil {
109109
return fmt.Sprintf(text, args...)
110110
}
111111

112-
if translated := a.Config.Core.Localizer.Localize(ctx, text, args...); translated != "" {
112+
if translated := a.Config.Core.Localizer.Localizef(ctx, text, args...); translated != "" {
113113
return translated
114114
}
115115

@@ -231,7 +231,7 @@ func MountedMiddleware2(ab *Authboss, mountPathed bool, reqs MWRequirements, fai
231231

232232
ro := RedirectOptions{
233233
Code: http.StatusTemporaryRedirect,
234-
Failure: ab.Localize(r.Context(), TxtAuthFailed),
234+
Failure: ab.Localizef(r.Context(), TxtAuthFailed),
235235
RedirectPath: path.Join(ab.Config.Paths.Mount, fmt.Sprintf("/login?%s", vals.Encode())),
236236
}
237237

confirm/confirm.go

+6-6
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ func (c *Confirm) PreventAuth(w http.ResponseWriter, r *http.Request, handled bo
9393
ro := authboss.RedirectOptions{
9494
Code: http.StatusTemporaryRedirect,
9595
RedirectPath: c.Authboss.Config.Paths.ConfirmNotOK,
96-
Failure: c.Localize(r.Context(), authboss.TxtAccountNotConfirmed),
96+
Failure: c.Localizef(r.Context(), authboss.TxtAccountNotConfirmed),
9797
}
9898
return true, c.Authboss.Config.Core.Redirector.Redirect(w, r, ro)
9999
}
@@ -114,7 +114,7 @@ func (c *Confirm) StartConfirmationWeb(w http.ResponseWriter, r *http.Request, h
114114
ro := authboss.RedirectOptions{
115115
Code: http.StatusTemporaryRedirect,
116116
RedirectPath: c.Authboss.Config.Paths.ConfirmNotOK,
117-
Success: c.Localize(r.Context(), authboss.TxtConfirmYourAccount),
117+
Success: c.Localizef(r.Context(), authboss.TxtConfirmYourAccount),
118118
}
119119
return true, c.Authboss.Config.Core.Redirector.Redirect(w, r, ro)
120120
}
@@ -157,7 +157,7 @@ func (c *Confirm) SendConfirmEmail(ctx context.Context, to, token string) {
157157
To: []string{to},
158158
From: c.Config.Mail.From,
159159
FromName: c.Config.Mail.FromName,
160-
Subject: c.Config.Mail.SubjectPrefix + c.Localize(ctx, authboss.TxtConfirmEmailSubject),
160+
Subject: c.Config.Mail.SubjectPrefix + c.Localizef(ctx, authboss.TxtConfirmEmailSubject),
161161
}
162162

163163
logger.Infof("sending confirm e-mail to: %s", to)
@@ -236,7 +236,7 @@ func (c *Confirm) Get(w http.ResponseWriter, r *http.Request) error {
236236

237237
ro := authboss.RedirectOptions{
238238
Code: http.StatusTemporaryRedirect,
239-
Success: c.Localize(r.Context(), authboss.TxtConfrimationSuccess),
239+
Success: c.Localizef(r.Context(), authboss.TxtConfrimationSuccess),
240240
RedirectPath: c.Authboss.Config.Paths.ConfirmOK,
241241
}
242242
return c.Authboss.Config.Core.Redirector.Redirect(w, r, ro)
@@ -256,7 +256,7 @@ func (c *Confirm) mailURL(token string) string {
256256
func (c *Confirm) invalidToken(w http.ResponseWriter, r *http.Request) error {
257257
ro := authboss.RedirectOptions{
258258
Code: http.StatusTemporaryRedirect,
259-
Failure: c.Localize(r.Context(), authboss.TxtInvalidConfirmToken),
259+
Failure: c.Localizef(r.Context(), authboss.TxtInvalidConfirmToken),
260260
RedirectPath: c.Authboss.Config.Paths.ConfirmNotOK,
261261
}
262262
return c.Authboss.Config.Core.Redirector.Redirect(w, r, ro)
@@ -284,7 +284,7 @@ func Middleware(ab *authboss.Authboss) func(http.Handler) http.Handler {
284284
logger.Infof("user %s prevented from accessing %s: not confirmed", user.GetPID(), r.URL.Path)
285285
ro := authboss.RedirectOptions{
286286
Code: http.StatusTemporaryRedirect,
287-
Failure: ab.Localize(r.Context(), authboss.TxtAccountNotConfirmed),
287+
Failure: ab.Localizef(r.Context(), authboss.TxtAccountNotConfirmed),
288288
RedirectPath: ab.Config.Paths.ConfirmNotOK,
289289
}
290290
if err := ab.Config.Core.Redirector.Redirect(w, r, ro); err != nil {

confirm/confirm_test.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ func TestGetValidationFailure(t *testing.T) {
235235
if p := harness.redirector.Options.RedirectPath; p != harness.ab.Paths.ConfirmNotOK {
236236
t.Error("redir path was wrong:", p)
237237
}
238-
if reason := harness.redirector.Options.Failure; reason != harness.ab.Localize(context.Background(), authboss.TxtInvalidConfirmToken) {
238+
if reason := harness.redirector.Options.Failure; reason != harness.ab.Localizef(context.Background(), authboss.TxtInvalidConfirmToken) {
239239
t.Error("reason for failure was wrong:", reason)
240240
}
241241
}
@@ -262,7 +262,7 @@ func TestGetBase64DecodeFailure(t *testing.T) {
262262
if p := harness.redirector.Options.RedirectPath; p != harness.ab.Paths.ConfirmNotOK {
263263
t.Error("redir path was wrong:", p)
264264
}
265-
if reason := harness.redirector.Options.Failure; reason != harness.ab.Localize(context.Background(), authboss.TxtInvalidConfirmToken) {
265+
if reason := harness.redirector.Options.Failure; reason != harness.ab.Localizef(context.Background(), authboss.TxtInvalidConfirmToken) {
266266
t.Error("reason for failure was wrong:", reason)
267267
}
268268
}
@@ -294,7 +294,7 @@ func TestGetUserNotFoundFailure(t *testing.T) {
294294
if p := harness.redirector.Options.RedirectPath; p != harness.ab.Paths.ConfirmNotOK {
295295
t.Error("redir path was wrong:", p)
296296
}
297-
if reason := harness.redirector.Options.Failure; reason != harness.ab.Localize(context.Background(), authboss.TxtInvalidConfirmToken) {
297+
if reason := harness.redirector.Options.Failure; reason != harness.ab.Localizef(context.Background(), authboss.TxtInvalidConfirmToken) {
298298
t.Error("reason for failure was wrong:", reason)
299299
}
300300
}

localizer.go

+4-2
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
11
package authboss
22

3-
import "context"
3+
import (
4+
"context"
5+
)
46

57
type Localizer interface {
68
// Get the translation for the given text in the given context.
79
// If no translation is found, an empty string should be returned.
8-
Localize(ctx context.Context, txt string, args ...any) string
10+
Localizef(ctx context.Context, txt string, args ...any) string
911
}
1012

1113
// Translation constants

lock/lock.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ func (l *Lock) updateLockedState(w http.ResponseWriter, r *http.Request, wasCorr
9999

100100
ro := authboss.RedirectOptions{
101101
Code: http.StatusTemporaryRedirect,
102-
Failure: l.Localize(r.Context(), authboss.TxtLocked),
102+
Failure: l.Localizef(r.Context(), authboss.TxtLocked),
103103
RedirectPath: l.Authboss.Config.Paths.LockNotOK,
104104
}
105105
return true, l.Authboss.Config.Core.Redirector.Redirect(w, r, ro)
@@ -158,7 +158,7 @@ func Middleware(ab *authboss.Authboss) func(http.Handler) http.Handler {
158158
logger.Infof("user %s prevented from accessing %s: locked", user.GetPID(), r.URL.Path)
159159
ro := authboss.RedirectOptions{
160160
Code: http.StatusTemporaryRedirect,
161-
Failure: ab.Localize(r.Context(), authboss.TxtLocked),
161+
Failure: ab.Localizef(r.Context(), authboss.TxtLocked),
162162
RedirectPath: ab.Config.Paths.LockNotOK,
163163
}
164164
if err := ab.Config.Core.Redirector.Redirect(w, r, ro); err != nil {

oauth2/oauth2.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@ func (o *OAuth2) End(w http.ResponseWriter, r *http.Request) error {
212212
ro := authboss.RedirectOptions{
213213
Code: http.StatusTemporaryRedirect,
214214
RedirectPath: o.Authboss.Config.Paths.OAuth2LoginNotOK,
215-
Failure: o.Localize(r.Context(), authboss.TxtOAuth2LoginNotOK, provider),
215+
Failure: o.Localizef(r.Context(), authboss.TxtOAuth2LoginNotOK, provider),
216216
}
217217
return o.Authboss.Core.Redirector.Redirect(w, r, ro)
218218
}
@@ -290,7 +290,7 @@ func (o *OAuth2) End(w http.ResponseWriter, r *http.Request) error {
290290
ro := authboss.RedirectOptions{
291291
Code: http.StatusTemporaryRedirect,
292292
RedirectPath: redirect,
293-
Success: o.Localize(r.Context(), authboss.TxtOAuth2LoginOK, provider),
293+
Success: o.Localizef(r.Context(), authboss.TxtOAuth2LoginOK, provider),
294294
}
295295
return o.Authboss.Config.Core.Redirector.Redirect(w, r, ro)
296296
}

otp/otp.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ func (o *OTP) LoginPost(w http.ResponseWriter, r *http.Request) error {
118118
pidUser, err := o.Authboss.Storage.Server.Load(r.Context(), pid)
119119
if err == authboss.ErrUserNotFound {
120120
logger.Infof("failed to load user requested by pid: %s", pid)
121-
data := authboss.HTMLData{authboss.DataErr: o.Localize(r.Context(), authboss.TxtInvalidCredentials)}
121+
data := authboss.HTMLData{authboss.DataErr: o.Localizef(r.Context(), authboss.TxtInvalidCredentials)}
122122
return o.Authboss.Core.Responder.Respond(w, r, http.StatusOK, PageLogin, data)
123123
} else if err != nil {
124124
return err
@@ -153,7 +153,7 @@ func (o *OTP) LoginPost(w http.ResponseWriter, r *http.Request) error {
153153
}
154154

155155
logger.Infof("user %s failed to log in with otp", pid)
156-
data := authboss.HTMLData{authboss.DataErr: o.Localize(r.Context(), authboss.TxtInvalidCredentials)}
156+
data := authboss.HTMLData{authboss.DataErr: o.Localizef(r.Context(), authboss.TxtInvalidCredentials)}
157157
return o.Authboss.Core.Responder.Respond(w, r, http.StatusOK, PageLogin, data)
158158
}
159159

@@ -218,7 +218,7 @@ func (o *OTP) AddPost(w http.ResponseWriter, r *http.Request) error {
218218
currentOTPs := splitOTPs(otpUser.GetOTPs())
219219

220220
if len(currentOTPs) >= maxOTPs {
221-
data := authboss.HTMLData{authboss.DataValidation: o.Localize(r.Context(), authboss.TxtTooManyOTPs, maxOTPs)}
221+
data := authboss.HTMLData{authboss.DataValidation: o.Localizef(r.Context(), authboss.TxtTooManyOTPs, maxOTPs)}
222222
return o.Core.Responder.Respond(w, r, http.StatusOK, PageAdd, data)
223223
}
224224

otp/twofactor/sms2fa/sms.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ func (s *SMS) PostSetup(w http.ResponseWriter, r *http.Request) error {
264264
if len(number) == 0 {
265265
data := authboss.HTMLData{
266266
authboss.DataValidation: map[string][]string{FormValuePhoneNumber: {
267-
s.Localize(r.Context(), authboss.TxtSMSNumberRequired),
267+
s.Localizef(r.Context(), authboss.TxtSMSNumberRequired),
268268
}},
269269
}
270270
return s.Core.Responder.Respond(w, r, http.StatusOK, PageSMSSetup, data)
@@ -357,7 +357,7 @@ func (s *SMSValidator) sendCode(w http.ResponseWriter, r *http.Request, user Use
357357
var data authboss.HTMLData
358358
err := s.SendCodeToUser(w, r, user.GetPID(), phoneNumber)
359359
if err == errSMSRateLimit {
360-
data = authboss.HTMLData{authboss.DataErr: s.Localize(r.Context(), authboss.TxtSMSWaitToResend)}
360+
data = authboss.HTMLData{authboss.DataErr: s.Localizef(r.Context(), authboss.TxtSMSWaitToResend)}
361361
} else if err != nil {
362362
return err
363363
}
@@ -403,7 +403,7 @@ func (s *SMSValidator) validateCode(w http.ResponseWriter, r *http.Request, user
403403

404404
logger.Infof("user %s sms 2fa failure (wrong code)", user.GetPID())
405405
data := authboss.HTMLData{
406-
authboss.DataValidation: map[string][]string{FormValueCode: {s.Localize(r.Context(), authboss.TxtInvalid2FACode)}},
406+
authboss.DataValidation: map[string][]string{FormValueCode: {s.Localizef(r.Context(), authboss.TxtInvalid2FACode)}},
407407
}
408408
return s.Authboss.Core.Responder.Respond(w, r, http.StatusOK, s.Page, data)
409409
}

otp/twofactor/sms2fa/sms_test.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ func TestPostSetup(t *testing.T) {
272272
t.Error("page wrong:", h.responder.Page)
273273
}
274274
validation := h.responder.Data[authboss.DataValidation].(map[string][]string)
275-
if got := validation[FormValuePhoneNumber][0]; got != h.ab.Localize(context.Background(), authboss.TxtSMSNumberRequired) {
275+
if got := validation[FormValuePhoneNumber][0]; got != h.ab.Localizef(context.Background(), authboss.TxtSMSNumberRequired) {
276276
t.Error("data wrong:", got)
277277
}
278278
})
@@ -547,7 +547,7 @@ func TestValidatorPostOk(t *testing.T) {
547547
w.WriteHeader(http.StatusOK)
548548

549549
validation := h.responder.Data[authboss.DataValidation].(map[string][]string)
550-
if got := validation[FormValueCode][0]; got != h.ab.Localize(context.Background(), authboss.TxtInvalid2FACode) {
550+
if got := validation[FormValueCode][0]; got != h.ab.Localizef(context.Background(), authboss.TxtInvalid2FACode) {
551551
t.Error("data wrong:", got)
552552
}
553553
})
@@ -574,7 +574,7 @@ func TestValidatorPostOk(t *testing.T) {
574574
t.Error("page wrong:", h.responder.Page)
575575
}
576576
validation := h.responder.Data[authboss.DataValidation].(map[string][]string)
577-
if got := validation[FormValueCode][0]; got != h.ab.Localize(context.Background(), authboss.TxtInvalid2FACode) {
577+
if got := validation[FormValueCode][0]; got != h.ab.Localizef(context.Background(), authboss.TxtInvalid2FACode) {
578578
t.Error("data wrong:", got)
579579
}
580580
})

otp/twofactor/totp2fa/totp.go

+10-10
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ func (t *TOTP) PostConfirm(w http.ResponseWriter, r *http.Request) error {
269269
if !ok {
270270
data := authboss.HTMLData{
271271
authboss.DataValidation: map[string][]string{FormValueCode: {
272-
t.Localize(r.Context(), authboss.TxtInvalid2FACode),
272+
t.Localizef(r.Context(), authboss.TxtInvalid2FACode),
273273
}},
274274
DataTOTPSecret: totpSecret,
275275
}
@@ -325,11 +325,11 @@ func (t *TOTP) PostRemove(w http.ResponseWriter, r *http.Request) error {
325325
user, status, err := t.validate(r)
326326
switch {
327327
case err == errNoTOTPEnabled:
328-
data := authboss.HTMLData{authboss.DataErr: t.Localize(r.Context(), authboss.TxtTOTP2FANotActive)}
328+
data := authboss.HTMLData{authboss.DataErr: t.Localizef(r.Context(), authboss.TxtTOTP2FANotActive)}
329329
return t.Authboss.Core.Responder.Respond(w, r, http.StatusOK, PageTOTPRemove, data)
330330
case err != nil:
331331
return err
332-
case status != t.Localize(r.Context(), authboss.TxtSuccess):
332+
case status != t.Localizef(r.Context(), authboss.TxtSuccess):
333333
logger.Infof("user %s totp 2fa removal failure (%s)", user.GetPID(), status)
334334
data := authboss.HTMLData{
335335
authboss.DataValidation: map[string][]string{FormValueCode: {status}},
@@ -368,12 +368,12 @@ func (t *TOTP) PostValidate(w http.ResponseWriter, r *http.Request) error {
368368
switch {
369369
case err == errNoTOTPEnabled:
370370
logger.Infof("user %s totp failure (not enabled)", user.GetPID())
371-
data := authboss.HTMLData{authboss.DataErr: t.Localize(
371+
data := authboss.HTMLData{authboss.DataErr: t.Localizef(
372372
r.Context(), authboss.TxtTOTP2FANotActive)}
373373
return t.Authboss.Core.Responder.Respond(w, r, http.StatusOK, PageTOTPValidate, data)
374374
case err != nil:
375375
return err
376-
case status != t.Localize(r.Context(), authboss.TxtSuccess):
376+
case status != t.Localizef(r.Context(), authboss.TxtSuccess):
377377
r = r.WithContext(context.WithValue(r.Context(), authboss.CTXKeyUser, user))
378378
handled, err := t.Authboss.Events.FireAfter(authboss.EventAuthFail, w, r)
379379
if err != nil {
@@ -471,25 +471,25 @@ func (t *TOTP) validate(r *http.Request) (User, string, error) {
471471
return nil, "", err
472472
}
473473
} else {
474-
return user, t.Localize(r.Context(), authboss.TxtInvalid2FACode), nil
474+
return user, t.Localizef(r.Context(), authboss.TxtInvalid2FACode), nil
475475
}
476476

477-
return user, t.Localize(r.Context(), authboss.TxtSuccess), nil
477+
return user, t.Localizef(r.Context(), authboss.TxtSuccess), nil
478478
}
479479

480480
input := totpCodeValues.GetCode()
481481

482482
if oneTime, ok := user.(UserOneTime); ok {
483483
oldCode := oneTime.GetTOTPLastCode()
484484
if oldCode == input {
485-
return user, t.Localize(r.Context(), authboss.TxtRepeated2FACode), nil
485+
return user, t.Localizef(r.Context(), authboss.TxtRepeated2FACode), nil
486486
}
487487
oneTime.PutTOTPLastCode(input)
488488
}
489489

490490
if !totp.Validate(input, secret) {
491-
return user, t.Localize(r.Context(), authboss.TxtInvalid2FACode), nil
491+
return user, t.Localizef(r.Context(), authboss.TxtInvalid2FACode), nil
492492
}
493493

494-
return user, t.Localize(r.Context(), authboss.TxtSuccess), nil
494+
return user, t.Localizef(r.Context(), authboss.TxtSuccess), nil
495495
}

otp/twofactor/totp2fa/totp_test.go

+6-6
Original file line numberDiff line numberDiff line change
@@ -380,7 +380,7 @@ func TestPostRemove(t *testing.T) {
380380
if h.responder.Page != PageTOTPRemove {
381381
t.Error("page wrong:", h.responder.Page)
382382
}
383-
if got := h.responder.Data[authboss.DataErr]; got != h.ab.Localize(context.Background(), authboss.TxtTOTP2FANotActive) {
383+
if got := h.responder.Data[authboss.DataErr]; got != h.ab.Localizef(context.Background(), authboss.TxtTOTP2FANotActive) {
384384
t.Error("data wrong:", got)
385385
}
386386
})
@@ -404,7 +404,7 @@ func TestPostRemove(t *testing.T) {
404404
if h.responder.Page != PageTOTPRemove {
405405
t.Error("page wrong:", h.responder.Page)
406406
}
407-
if got := h.responder.Data[authboss.DataValidation].(map[string][]string); got[FormValueCode][0] != h.ab.Localize(context.Background(), authboss.TxtInvalid2FACode) {
407+
if got := h.responder.Data[authboss.DataValidation].(map[string][]string); got[FormValueCode][0] != h.ab.Localizef(context.Background(), authboss.TxtInvalid2FACode) {
408408
t.Error("data wrong:", got)
409409
}
410410
})
@@ -486,7 +486,7 @@ func TestPostValidate(t *testing.T) {
486486
if h.responder.Page != PageTOTPValidate {
487487
t.Error("page wrong:", h.responder.Page)
488488
}
489-
if got := h.responder.Data[authboss.DataErr]; got != h.ab.Localize(context.Background(), authboss.TxtTOTP2FANotActive) {
489+
if got := h.responder.Data[authboss.DataErr]; got != h.ab.Localizef(context.Background(), authboss.TxtTOTP2FANotActive) {
490490
t.Error("data wrong:", got)
491491
}
492492
})
@@ -509,7 +509,7 @@ func TestPostValidate(t *testing.T) {
509509
if h.responder.Page != PageTOTPValidate {
510510
t.Error("page wrong:", h.responder.Page)
511511
}
512-
if got := h.responder.Data[authboss.DataValidation].(map[string][]string); got[FormValueCode][0] != h.ab.Localize(context.Background(), authboss.TxtInvalid2FACode) {
512+
if got := h.responder.Data[authboss.DataValidation].(map[string][]string); got[FormValueCode][0] != h.ab.Localizef(context.Background(), authboss.TxtInvalid2FACode) {
513513
t.Error("data wrong:", got)
514514
}
515515
})
@@ -533,7 +533,7 @@ func TestPostValidate(t *testing.T) {
533533
if h.responder.Page != PageTOTPValidate {
534534
t.Error("page wrong:", h.responder.Page)
535535
}
536-
if got := h.responder.Data[authboss.DataValidation].(map[string][]string); got[FormValueCode][0] != h.ab.Localize(context.Background(), authboss.TxtRepeated2FACode) {
536+
if got := h.responder.Data[authboss.DataValidation].(map[string][]string); got[FormValueCode][0] != h.ab.Localizef(context.Background(), authboss.TxtRepeated2FACode) {
537537
t.Error("data wrong:", got)
538538
}
539539
})
@@ -621,7 +621,7 @@ func TestPostValidate(t *testing.T) {
621621
// Flush client state
622622
w.WriteHeader(http.StatusOK)
623623

624-
if got := h.responder.Data[authboss.DataValidation].(map[string][]string); got[FormValueCode][0] != h.ab.Localize(context.Background(), authboss.TxtInvalid2FACode) {
624+
if got := h.responder.Data[authboss.DataValidation].(map[string][]string); got[FormValueCode][0] != h.ab.Localizef(context.Background(), authboss.TxtInvalid2FACode) {
625625
t.Error("data wrong:", got)
626626
}
627627
})

0 commit comments

Comments
 (0)