gofmt'ing the IMAP changes

pull/1867/head
Jordan Wright 2020-06-16 20:13:24 -05:00
parent 61bbb22f7c
commit 0f6439de5a
2 changed files with 6 additions and 7 deletions

View File

@ -191,7 +191,6 @@ func (mbox *Mailbox) newClient() (*client.Client, error) {
return imapClient, err
}
err = imapClient.Login(mbox.User, mbox.Pwd)
if err != nil {
return imapClient, err

View File

@ -9,11 +9,11 @@ package imap
import (
"bytes"
"context"
"path/filepath"
"regexp"
"strconv"
"strings"
"time"
"path/filepath"
log "github.com/gophish/gophish/logger"
"github.com/jordan-wright/email"
@ -135,7 +135,7 @@ func checkForNewEmails(im models.IMAP) {
if len(msgs) > 0 {
log.Debugf("%d new emails for %s", len(msgs), im.Username)
var reportingFailed []uint32 // SeqNums of emails that were unable to be reported to phishing server, mark as unread
var deleteEmails []uint32 // SeqNums of campaign emails. If DeleteReportedCampaignEmail is true, we will delete these
var deleteEmails []uint32 // SeqNums of campaign emails. If DeleteReportedCampaignEmail is true, we will delete these
for _, m := range msgs {
// Check if sender is from company's domain, if enabled. TODO: Make this an IMAP filter
if im.RestrictDomain != "" { // e.g domainResitct = widgets.com
@ -198,7 +198,7 @@ func checkForNewEmails(im models.IMAP) {
}
}
func checkRIDs(em *email.Email, rids map[string]bool){
func checkRIDs(em *email.Email, rids map[string]bool) {
// Check Text and HTML
emailContent := string(em.Text) + string(em.HTML)
for _, r := range goPhishRegex.FindAllStringSubmatch(emailContent, -1) {