diff --git a/connector/oidc/oidc.go b/connector/oidc/oidc.go index 78557a5a5b556d124ecd66ec71508b0c7803aa30..b4e67799954444b95b27ff5937eca3438948a2d7 100644 --- a/connector/oidc/oidc.go +++ b/connector/oidc/oidc.go @@ -296,7 +296,7 @@ func (c *oidcConnector) createIdentity(ctx context.Context, identity connector.I const subjectClaimKey = "sub" subject, found := claims[subjectClaimKey].(string) if !found { - return identity, fmt.Errorf("missing \"%s\" claim", subjectClaimKey) + return identity, fmt.Errorf("missing \"%s\" claim", subjectClaimKey) } userNameKey := "name" diff --git a/connector/oidc/oidc_test.go b/connector/oidc/oidc_test.go index 66764cd7a8253947f6841c454c1ea4ba2183542a..d8b30b3921eb93e6ef69a0c565e7b63d8b5a05ad 100644 --- a/connector/oidc/oidc_test.go +++ b/connector/oidc/oidc_test.go @@ -453,17 +453,19 @@ func setupServer(tok map[string]interface{}, idTokenDesired bool) (*httptest.Ser json.NewEncoder(w).Encode(&map[string]string{ "access_token": token, "id_token": token, - "token_type": "Bearer"}) + "token_type": "Bearer", + }) } else { json.NewEncoder(w).Encode(&map[string]string{ "access_token": token, - "token_type": "Bearer"}) + "token_type": "Bearer", + }) } }) mux.HandleFunc("/userinfo", func(w http.ResponseWriter, r *http.Request) { w.Header().Add("Content-Type", "application/json") - json.NewEncoder(w).Encode(tok) + json.NewEncoder(w).Encode(tok) }) mux.HandleFunc("/.well-known/openid-configuration", func(w http.ResponseWriter, r *http.Request) {