diff --git a/internal/controller/oidc_controller.go b/internal/controller/oidc_controller.go index 2f78e18..005b7c8 100644 --- a/internal/controller/oidc_controller.go +++ b/internal/controller/oidc_controller.go @@ -1,7 +1,6 @@ package controller import ( - "database/sql" "errors" "fmt" "net/http" @@ -276,8 +275,7 @@ func (controller *OIDCController) Token(c *gin.Context) { case "authorization_code": entry, err := controller.oidc.GetCodeEntry(c, controller.oidc.Hash(req.Code), client.ClientID) if err != nil { - err := controller.oidc.DeleteTokenByCodeHash(c, controller.oidc.Hash(req.Code)) - if err != nil && !errors.Is(err, sql.ErrNoRows) { + if err := controller.oidc.DeleteTokenByCodeHash(c, controller.oidc.Hash(req.Code)); err != nil { tlog.App.Error().Err(err).Msg("Failed to delete access token by code hash") } if errors.Is(err, service.ErrCodeNotFound) { diff --git a/internal/controller/oidc_controller_test.go b/internal/controller/oidc_controller_test.go index 70b1a9e..7f1dc1a 100644 --- a/internal/controller/oidc_controller_test.go +++ b/internal/controller/oidc_controller_test.go @@ -387,7 +387,7 @@ func TestOIDCController(t *testing.T) { err = json.Unmarshal(secondRecorder.Body.Bytes(), &secondRes) assert.NoError(t, err) - assert.Equal(t, secondRes["error"], "invalid_grant") + assert.Equal(t, "invalid_grant", secondRes["error"]) }, }, {