@@ -103,7 +103,7 @@ import (
103
103
"github.com/coder/wgtunnel/tunnelsdk"
104
104
)
105
105
106
- func createOIDCConfig (ctx context.Context ,instrument * promoauth. Factory , vals * codersdk.DeploymentValues ) (* coderd.OIDCConfig ,error ) {
106
+ func createOIDCConfig (ctx context.Context ,vals * codersdk.DeploymentValues ) (* coderd.OIDCConfig ,error ) {
107
107
if vals .OIDC .ClientID == "" {
108
108
return nil ,xerrors .Errorf ("OIDC client ID must be set!" )
109
109
}
@@ -160,7 +160,7 @@ func createOIDCConfig(ctx context.Context, instrument *promoauth.Factory, vals *
160
160
}
161
161
162
162
return & coderd.OIDCConfig {
163
- OAuth2Config :instrument . New ( "oidc-login" , useCfg ) ,
163
+ OAuth2Config :useCfg ,
164
164
Provider :oidcProvider ,
165
165
Verifier :oidcProvider .Verifier (& oidc.Config {
166
166
ClientID :vals .OIDC .ClientID .String (),
@@ -642,7 +642,13 @@ func (r *RootCmd) Server(newAPI func(context.Context, *coderd.Options) (*coderd.
642
642
logger .Warn (ctx ,"coder will not check email_verified for OIDC logins" )
643
643
}
644
644
645
- oc ,err := createOIDCConfig (ctx ,oauthInstrument ,vals )
645
+ // This OIDC config is **not** being instrumented with the
646
+ // oauth2 instrument wrapper. If we implement the missing
647
+ // oidc methods, then we can instrument it.
648
+ // Missing:
649
+ //- Userinfo
650
+ //- Verify
651
+ oc ,err := createOIDCConfig (ctx ,vals )
646
652
if err != nil {
647
653
return xerrors .Errorf ("create oidc config: %w" ,err )
648
654
}