Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: Updated metal-go client for sub-command twofa #334

Closed
wants to merge 1 commit into from

Conversation

codinja1188
Copy link
Contributor

Breakout from #270

What this PR does / why we need it:

This PR replaces packngo with metal-go for all interactions with the Equinix Metal API specifically for twofa subcommands

return nil
}

otpURI, _, err := c.Service.SeedApp()
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this subcommand no longer needed? Or is it removed because the endpoints/operations used here are not in the spec?

If we still need to support this subcommand, a short-term workaround might be to find a way to convert the other 2fa subcommands to metal-go while leaving this one on packngo.

@displague displague mentioned this pull request Sep 5, 2023
15 tasks
@@ -48,12 +49,13 @@ func (c *Client) Enable() *cobra.Command {

cmd.SilenceUsage = true
if sms {
_, err := c.Service.EnableSms(token)
_, err := c.Service.EnableTfaSms(context.Background()).Execute()
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we need to be able to pass in the token? Is this a spec issue that needs to be fixed?

@aayushrangwala
Copy link
Contributor

/assign @aayushrangwala

@cprivitere cprivitere temporarily deployed to external October 9, 2023 19:39 — with GitHub Actions Inactive
@displague displague changed the title Fix: Updated metal-go client for sub-command twofa chore: Updated metal-go client for sub-command twofa Nov 9, 2023
@aayushrangwala
Copy link
Contributor

@Vasubabu Please decline this PR in the favour of #353

@ctreatma
Copy link
Contributor

Closing in favor of #353

@ctreatma ctreatma closed this Jan 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants