diff --git a/credentials/scopes_logical_validator.go b/credentials/scopes_logical_validator.go index b2057ba78c..00fa739dc7 100644 --- a/credentials/scopes_logical_validator.go +++ b/credentials/scopes_logical_validator.go @@ -14,7 +14,7 @@ type ScopeValidation func(scopeResult map[string]bool) error func DefaultValidation(scopeResult map[string]bool) error { for sc, result := range scopeResult { if !result { - return errors.WithStack(herodot.ErrInternalServerError.WithReasonf(`JSON Web Token is missing required scope "%s".`, sc)) + return errors.WithStack(herodot.ErrInternalServerError.WithReasonf(`JSON Web Token is missing required scope "%s"`, sc)) } } diff --git a/driver/configuration/provider_koanf.go b/driver/configuration/provider_koanf.go index f1ab8dfc50..26307aafbb 100644 --- a/driver/configuration/provider_koanf.go +++ b/driver/configuration/provider_koanf.go @@ -278,7 +278,7 @@ func (v *KoanfProvider) ToScopeValidation(value string, key string) credentials. case "any": return credentials.AnyValidation default: - v.l.Errorf(`Configuration key "%s" declares unknown scope strategy "%s", only "default", "any", are supported. Falling back to strategy "default".`, key, value) + v.l.Errorf(`Configuration key "%s" declares unknown scope validation policy "%s", only "default" and "any" are supported. Falling back to policy "default".`, key, value) return credentials.DefaultValidation } }