@@ -426,11 +426,11 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithOptions(t *testing.T
426426 }
427427 policyFlowCheck := newCustomTokenRequestPolicyFlowCheck ()
428428
429- customTokenEndointServerCalledTimes := new (atomic.Int32 )
430- customTokenEndointServer , caData := startTestTokenEndpointWithCAData (
429+ customTokenEndpointServerCalledTimes := new (atomic.Int32 )
430+ customTokenEndpointServer , caData := startTestTokenEndpointWithCAData (
431431 t ,
432432 http .HandlerFunc (func (w http.ResponseWriter , req * http.Request ) {
433- customTokenEndointServerCalledTimes .Add (1 )
433+ customTokenEndpointServerCalledTimes .Add (1 )
434434
435435 policyFlowCheck .Validate (t , req )
436436
@@ -459,7 +459,7 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithOptions(t *testing.T
459459 TenantID : fakeTenantID ,
460460 TokenFilePath : tempFile ,
461461 AzureProxy : WorkloadIdentityAzureProxyOptions {
462- AzureKubernetesTokenProxy : customTokenEndointServer .URL ,
462+ AzureKubernetesTokenProxy : customTokenEndpointServer .URL ,
463463 AzureKubernetesCAData : caData ,
464464 },
465465 })
@@ -468,7 +468,7 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithOptions(t *testing.T
468468
469469 testGetTokenSuccess (t , cred )
470470
471- require .Equal (t , int32 (1 ), customTokenEndointServerCalledTimes .Load ())
471+ require .Equal (t , int32 (1 ), customTokenEndpointServerCalledTimes .Load ())
472472}
473473
474474func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithCAData (t * testing.T ) {
@@ -478,11 +478,11 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithCAData(t *testing.T)
478478 }
479479 policyFlowCheck := newCustomTokenRequestPolicyFlowCheck ()
480480
481- customTokenEndointServerCalledTimes := new (atomic.Int32 )
482- customTokenEndointServer , caData := startTestTokenEndpointWithCAData (
481+ customTokenEndpointServerCalledTimes := new (atomic.Int32 )
482+ customTokenEndpointServer , caData := startTestTokenEndpointWithCAData (
483483 t ,
484484 http .HandlerFunc (func (w http.ResponseWriter , req * http.Request ) {
485- customTokenEndointServerCalledTimes .Add (1 )
485+ customTokenEndpointServerCalledTimes .Add (1 )
486486
487487 policyFlowCheck .Validate (t , req )
488488
@@ -499,7 +499,7 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithCAData(t *testing.T)
499499 }),
500500 )
501501
502- t .Setenv (customtokenproxy .AzureKubernetesTokenProxy , customTokenEndointServer .URL )
502+ t .Setenv (customtokenproxy .AzureKubernetesTokenProxy , customTokenEndpointServer .URL )
503503 t .Setenv (customtokenproxy .AzureKubernetesCAData , caData )
504504
505505 clientOptions := policy.ClientOptions {
@@ -519,7 +519,7 @@ func TestWorkloadIdentityCredential_CustomTokenEndpoint_WithCAData(t *testing.T)
519519
520520 testGetTokenSuccess (t , cred )
521521
522- require .Equal (t , int32 (1 ), customTokenEndointServerCalledTimes .Load ())
522+ require .Equal (t , int32 (1 ), customTokenEndpointServerCalledTimes .Load ())
523523}
524524
525525func TestWorkloadIdentityCredential_CustomTokenEndpoint_InvalidSettings (t * testing.T ) {
0 commit comments