@@ -61,8 +61,7 @@ export class ZapierAuthorizationController {
61
61
throw new HttpException ( 'State parameter is required' , HttpStatus . BAD_REQUEST ) ;
62
62
}
63
63
64
- // const configuredClientId = this._config.get<string>('zapier.clientId');
65
- const configuredClientId = '74558f42-82db-4ec2-b674-e80929888bd9' ;
64
+ const configuredClientId = this . _config . get < string > ( 'zapier.clientId' ) ;
66
65
67
66
if ( clientId !== configuredClientId ) {
68
67
throw new HttpException ( 'Invalid client ID' , HttpStatus . BAD_REQUEST ) ;
@@ -176,10 +175,8 @@ export class ZapierAuthorizationController {
176
175
}
177
176
178
177
// Verify client credentials
179
- // const configuredClientId = this._config.get<string>('zapier.clientId');
180
- // const configuredClientSecret = this._config.get<string>('zapier.clientSecret');
181
- const configuredClientId = '74558f42-82db-4ec2-b674-e80929888bd9' ;
182
- const configuredClientSecret = 'ef3c3167967d903ce6845997ac3a9967b60e405e66d10ffc1bb997516da28adf' ;
178
+ const configuredClientId = this . _config . get < string > ( 'zapier.clientId' ) ;
179
+ const configuredClientSecret = this . _config . get < string > ( 'zapier.clientSecret' ) ;
183
180
184
181
if ( client_id !== configuredClientId || client_secret !== configuredClientSecret ) {
185
182
throw new UnauthorizedException ( 'Invalid client credentials' ) ;
@@ -252,10 +249,8 @@ export class ZapierAuthorizationController {
252
249
}
253
250
254
251
// Verify client credentials
255
- // const configuredClientId = this._config.get<string>('zapier.clientId');
256
- // const configuredClientSecret = this._config.get<string>('zapier.clientSecret');
257
- const configuredClientId = '74558f42-82db-4ec2-b674-e80929888bd9' ;
258
- const configuredClientSecret = 'ef3c3167967d903ce6845997ac3a9967b60e405e66d10ffc1bb997516da28adf' ;
252
+ const configuredClientId = this . _config . get < string > ( 'zapier.clientId' ) ;
253
+ const configuredClientSecret = this . _config . get < string > ( 'zapier.clientSecret' ) ;
259
254
260
255
if ( client_id !== configuredClientId || client_secret !== configuredClientSecret ) {
261
256
throw new UnauthorizedException ( 'Invalid client credentials' ) ;
0 commit comments