@@ -218,7 +218,7 @@ do_update_oauth_provider_endpoints_configuration(OAuthProvider) when
218218 List = get_env (key_config , []),
219219 ModifiedList = case OAuthProvider # oauth_provider .jwks_uri of
220220 undefined -> List ;
221- JwksEndPoint -> [{jwks_url , JwksEndPoint } | proplists :delete (jwks_url , List )]
221+ JwksEndPoint -> [{jwks_uri , JwksEndPoint } | proplists :delete (jwks_uri , List )]
222222 end ,
223223 set_env (key_config , ModifiedList ),
224224 rabbit_log :debug (" Updated oauth_provider details: ~p " ,
@@ -393,7 +393,7 @@ lookup_oauth_provider_from_keyconfig() ->
393393 id = root ,
394394 issuer = Issuer ,
395395 discovery_endpoint = DiscoverEndpoint ,
396- jwks_uri = maps :get (jwks_url , Map , undefined ), % % jwks_url not uri . _url is the legacy name
396+ jwks_uri = maps :get (jwks_uri , Map , undefined ),
397397 token_endpoint = get_env (token_endpoint ),
398398 authorization_endpoint = get_env (authorization_endpoint ),
399399 end_session_endpoint = get_env (end_session_endpoint ),
@@ -437,15 +437,17 @@ extract_ssl_options_as_list(Map) ->
437437 ++
438438 case maps :get (hostname_verification , Map , none ) of
439439 wildcard ->
440- [{customize_hostname_check , [{match_fun , public_key :pkix_verify_hostname_match_fun (https )}]}];
440+ [{customize_hostname_check , [{match_fun ,
441+ public_key :pkix_verify_hostname_match_fun (https )}]}];
441442 none ->
442443 []
443444 end .
444445
445446% Replace peer_verification with verify to make it more consistent with other
446447% ssl_options in RabbitMQ and Erlang's ssl options
447448% Eventually, peer_verification will be removed. For now, both are allowed
448- -spec get_verify_or_peer_verification (#{atom () => any ()}, verify_none | verify_peer ) -> verify_none | verify_peer .
449+ -spec get_verify_or_peer_verification (#{atom () =>
450+ any ()}, verify_none | verify_peer ) -> verify_none | verify_peer .
449451get_verify_or_peer_verification (Ssl_options , Default ) ->
450452 case maps :get (verify , Ssl_options , undefined ) of
451453 undefined ->
@@ -464,7 +466,8 @@ lookup_oauth_provider_config(OAuth2ProviderId) ->
464466 undefined ->
465467 {error , {oauth_provider_not_found , OAuth2ProviderId }};
466468 OAuthProvider ->
467- ensure_oauth_provider_has_id_property (OAuth2ProviderId , OAuthProvider )
469+ ensure_oauth_provider_has_id_property (OAuth2ProviderId ,
470+ OAuthProvider )
468471 end ;
469472 _ -> {error , invalid_oauth_provider_configuration }
470473 end .
@@ -535,8 +538,9 @@ get_timeout_of_default(Timeout) ->
535538is_json (? CONTENT_JSON ) -> true ;
536539is_json (_ ) -> false .
537540
538- -spec decode_body (string (), string () | binary () | term ()) -> 'false' | 'null' | 'true' |
539- binary () | [any ()] | number () | map () | {error , term ()}.
541+ -spec decode_body (string (), string () | binary () | term ()) ->
542+ 'false' | 'null' | 'true' | binary () | [any ()] | number () | map () |
543+ {error , term ()}.
540544
541545decode_body (_ , []) -> [];
542546decode_body (? CONTENT_JSON , Body ) ->
@@ -615,7 +619,8 @@ format_ssl_options(TlsOptions) ->
615619 [] -> 0 ;
616620 Certs -> length (Certs )
617621 end ,
618- lists :flatten (io_lib :format (" {verify: ~p , fail_if_no_peer_cert: ~p , crl_check: ~p , depth: ~p , cacertfile: ~p , cacerts(count): ~p }" , [
622+ lists :flatten (io_lib :format (" {verify: ~p , fail_if_no_peer_cert: ~p , " ++
623+ " crl_check: ~p , depth: ~p , cacertfile: ~p , cacerts(count): ~p }" , [
619624 proplists :get_value (verify , TlsOptions ),
620625 proplists :get_value (fail_if_no_peer_cert , TlsOptions ),
621626 proplists :get_value (crl_check , TlsOptions ),
0 commit comments