diff --git a/connector/oidc/oidc.go b/connector/oidc/oidc.go
index 78557a5a5b556d124ecd66ec71508b0c7803aa30..b4e67799954444b95b27ff5937eca3438948a2d7 100644
--- a/connector/oidc/oidc.go
+++ b/connector/oidc/oidc.go
@@ -296,7 +296,7 @@ func (c *oidcConnector) createIdentity(ctx context.Context, identity connector.I
 	const subjectClaimKey = "sub"
 	subject, found := claims[subjectClaimKey].(string)
 	if !found {
-	    return identity, fmt.Errorf("missing \"%s\" claim", subjectClaimKey)
+		return identity, fmt.Errorf("missing \"%s\" claim", subjectClaimKey)
 	}
 
 	userNameKey := "name"
diff --git a/connector/oidc/oidc_test.go b/connector/oidc/oidc_test.go
index 66764cd7a8253947f6841c454c1ea4ba2183542a..d8b30b3921eb93e6ef69a0c565e7b63d8b5a05ad 100644
--- a/connector/oidc/oidc_test.go
+++ b/connector/oidc/oidc_test.go
@@ -453,17 +453,19 @@ func setupServer(tok map[string]interface{}, idTokenDesired bool) (*httptest.Ser
 			json.NewEncoder(w).Encode(&map[string]string{
 				"access_token": token,
 				"id_token":     token,
-				"token_type":   "Bearer"})
+				"token_type":   "Bearer",
+			})
 		} else {
 			json.NewEncoder(w).Encode(&map[string]string{
 				"access_token": token,
-				"token_type":   "Bearer"})
+				"token_type":   "Bearer",
+			})
 		}
 	})
 
 	mux.HandleFunc("/userinfo", func(w http.ResponseWriter, r *http.Request) {
 		w.Header().Add("Content-Type", "application/json")
-	        json.NewEncoder(w).Encode(tok)
+		json.NewEncoder(w).Encode(tok)
 	})
 
 	mux.HandleFunc("/.well-known/openid-configuration", func(w http.ResponseWriter, r *http.Request) {