mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-02 11:38:02 +00:00
update gofumpt to 0.3.1 and reformat the repo (#17055)
* update gofumpt to 0.3.1 and reformat the repo * output the version of the formatter we're using
This commit is contained in:
@@ -1148,9 +1148,9 @@ func parseMFAHeader(req *logical.Request) error {
|
||||
// maintain backwards compatibility, this will err on the side of JSON.
|
||||
// The request will be considered a form only if:
|
||||
//
|
||||
// 1. The content type is "application/x-www-form-urlencoded"
|
||||
// 2. The start of the request doesn't look like JSON. For this test we
|
||||
// we expect the body to begin with { or [, ignoring leading whitespace.
|
||||
// 1. The content type is "application/x-www-form-urlencoded"
|
||||
// 2. The start of the request doesn't look like JSON. For this test we
|
||||
// we expect the body to begin with { or [, ignoring leading whitespace.
|
||||
func isForm(head []byte, contentType string) bool {
|
||||
contentType, _, err := mime.ParseMediaType(contentType)
|
||||
|
||||
@@ -1221,8 +1221,8 @@ func oidcPermissionDenied(path string, err error) bool {
|
||||
// permission denied errors (expired token) on resources protected
|
||||
// by OIDC access tokens. Currently, the UserInfo Endpoint is the only
|
||||
// protected resource. See the following specifications for details:
|
||||
// - https://openid.net/specs/openid-connect-core-1_0.html#UserInfoError
|
||||
// - https://datatracker.ietf.org/doc/html/rfc6750#section-3.1
|
||||
// - https://openid.net/specs/openid-connect-core-1_0.html#UserInfoError
|
||||
// - https://datatracker.ietf.org/doc/html/rfc6750#section-3.1
|
||||
func respondOIDCPermissionDenied(w http.ResponseWriter) {
|
||||
errorCode := "invalid_token"
|
||||
errorDescription := logical.ErrPermissionDenied.Error()
|
||||
|
||||
Reference in New Issue
Block a user