From 43b27044bb4840277cd2c27371befa8d7fd3c7fe Mon Sep 17 00:00:00 2001 From: David Culbreth Date: Fri, 20 Mar 2026 12:38:12 -0500 Subject: [PATCH] formatting --- crates/api/src/auth/oidc.rs | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/crates/api/src/auth/oidc.rs b/crates/api/src/auth/oidc.rs index d508a7e..4faf822 100644 --- a/crates/api/src/auth/oidc.rs +++ b/crates/api/src/auth/oidc.rs @@ -551,8 +551,9 @@ async fn verify_id_token( oidc: &OidcConfig, expected_nonce: &str, ) -> Result { - let header = decode_header(raw_id_token) - .map_err(|err| ApiError::Unauthorized(format!("OIDC ID token header decode failed: {err}")))?; + let header = decode_header(raw_id_token).map_err(|err| { + ApiError::Unauthorized(format!("OIDC ID token header decode failed: {err}")) + })?; let algorithm = match header.alg { Algorithm::RS256 => Algorithm::RS256, @@ -570,14 +571,19 @@ async fn verify_id_token( .map_err(|err| ApiError::InternalServerError(format!("Failed to fetch OIDC JWKS: {err}")))? .json::() .await - .map_err(|err| ApiError::InternalServerError(format!("Failed to parse OIDC JWKS: {err}")))?; + .map_err(|err| { + ApiError::InternalServerError(format!("Failed to parse OIDC JWKS: {err}")) + })?; let jwk = jwks .keys .iter() .find(|jwk| { jwk.common.key_id == header.kid - && matches!(jwk.common.public_key_use, Some(jsonwebtoken::jwk::PublicKeyUse::Signature)) + && matches!( + jwk.common.public_key_use, + Some(jsonwebtoken::jwk::PublicKeyUse::Signature) + ) && matches!( jwk.algorithm, AlgorithmParameters::RSA(_) | AlgorithmParameters::EllipticCurve(_)