@@ -525,10 +525,10 @@ func (r *RootCmd) Server(newAPI func(context.Context, *coderd.Options) (*coderd.
525
525
}
526
526
527
527
promRegistry := prometheus .NewRegistry ()
528
- oauthIntrument := promoauth .NewFactory (promRegistry )
528
+ oauthInstrument := promoauth .NewFactory (promRegistry )
529
529
vals .ExternalAuthConfigs .Value = append (vals .ExternalAuthConfigs .Value , extAuthEnv ... )
530
530
externalAuthConfigs , err := externalauth .ConvertConfig (
531
- oauthIntrument ,
531
+ oauthInstrument ,
532
532
vals .ExternalAuthConfigs .Value ,
533
533
vals .AccessURL .Value (),
534
534
)
@@ -622,7 +622,7 @@ func (r *RootCmd) Server(newAPI func(context.Context, *coderd.Options) (*coderd.
622
622
623
623
if vals .OAuth2 .Github .ClientSecret != "" {
624
624
options .GithubOAuth2Config , err = configureGithubOAuth2 (
625
- oauthIntrument ,
625
+ oauthInstrument ,
626
626
vals .AccessURL .Value (),
627
627
vals .OAuth2 .Github .ClientID .String (),
628
628
vals .OAuth2 .Github .ClientSecret .String (),
@@ -642,7 +642,7 @@ func (r *RootCmd) Server(newAPI func(context.Context, *coderd.Options) (*coderd.
642
642
logger .Warn (ctx , "coder will not check email_verified for OIDC logins" )
643
643
}
644
644
645
- oc , err := createOIDCConfig (ctx , oauthIntrument , vals )
645
+ oc , err := createOIDCConfig (ctx , oauthInstrument , vals )
646
646
if err != nil {
647
647
return xerrors .Errorf ("create oidc config: %w" , err )
648
648
}
0 commit comments