@@ -36,7 +36,7 @@ func TestNewEnterpriseHandler_Validation(t *testing.T) {
3636 AccessToken : "mock_access_token" ,
3737 TokenType : "Bearer" ,
3838 }
39- return token .WithExtra (map [string ]interface {} {"id_token" : "mock_id_token" }), nil
39+ return token .WithExtra (map [string ]any {"id_token" : "mock_id_token" }), nil
4040 },
4141 }
4242
@@ -194,7 +194,7 @@ func TestNewEnterpriseHandler_Validation(t *testing.T) {
194194 AccessToken : "mock_access_token" ,
195195 TokenType : "Bearer" ,
196196 }
197- return token .WithExtra (map [string ]interface {} {"id_token" : "mock_id_token" }), nil
197+ return token .WithExtra (map [string ]any {"id_token" : "mock_id_token" }), nil
198198 },
199199 },
200200 wantError : "" ,
@@ -254,7 +254,7 @@ func TestEnterpriseHandler_Authorize_E2E(t *testing.T) {
254254 AccessToken : "mock_access_token" ,
255255 TokenType : "Bearer" ,
256256 }
257- return token .WithExtra (map [string ]interface {} {"id_token" : "mock_id_token_from_user_login" }), nil
257+ return token .WithExtra (map [string ]any {"id_token" : "mock_id_token_from_user_login" }), nil
258258 },
259259 })
260260 if err != nil {
@@ -305,7 +305,7 @@ func setupIdPServer(t *testing.T) *httptest.Server {
305305 // OAuth/OIDC metadata endpoint - uses closure to get server URL
306306 mux .HandleFunc ("/.well-known/oauth-authorization-server" , func (w http.ResponseWriter , r * http.Request ) {
307307 w .Header ().Set ("Content-Type" , "application/json" )
308- json .NewEncoder (w ).Encode (map [string ]interface {} {
308+ json .NewEncoder (w ).Encode (map [string ]any {
309309 "issuer" : server .URL ,
310310 "token_endpoint" : server .URL + "/token" ,
311311 "authorization_endpoint" : server .URL + "/authorize" ,
@@ -350,7 +350,7 @@ func setupIdPServer(t *testing.T) *httptest.Server {
350350
351351 // Return ID-JAG (Identity Assertion JWT Authorization Grant)
352352 w .Header ().Set ("Content-Type" , "application/json" )
353- json .NewEncoder (w ).Encode (map [string ]interface {} {
353+ json .NewEncoder (w ).Encode (map [string ]any {
354354 "access_token" : "id-jag-token-from-idp" ,
355355 "issued_token_type" : oauthex .TokenTypeIDJAG ,
356356 "token_type" : "N_A" ,
@@ -375,7 +375,7 @@ func setupMCPAuthServer(t *testing.T) *httptest.Server {
375375 // OAuth metadata endpoint - uses closure to get server URL
376376 mux .HandleFunc ("/.well-known/oauth-authorization-server" , func (w http.ResponseWriter , r * http.Request ) {
377377 w .Header ().Set ("Content-Type" , "application/json" )
378- json .NewEncoder (w ).Encode (map [string ]interface {} {
378+ json .NewEncoder (w ).Encode (map [string ]any {
379379 "issuer" : server .URL ,
380380 "token_endpoint" : server .URL + "/token" ,
381381 "code_challenge_methods_supported" : []string {"S256" },
@@ -412,7 +412,7 @@ func setupMCPAuthServer(t *testing.T) *httptest.Server {
412412
413413 // Return access token
414414 w .Header ().Set ("Content-Type" , "application/json" )
415- json .NewEncoder (w ).Encode (map [string ]interface {} {
415+ json .NewEncoder (w ).Encode (map [string ]any {
416416 "access_token" : "mcp_access_token_from_jwt_bearer" ,
417417 "token_type" : "Bearer" ,
418418 "expires_in" : 3600 ,
@@ -480,7 +480,7 @@ func TestEnterpriseHandler_TokenSource_BeforeAuthorization(t *testing.T) {
480480 AccessToken : "mock_access_token" ,
481481 TokenType : "Bearer" ,
482482 }
483- return token .WithExtra (map [string ]interface {} {"id_token" : "mock_id_token" }), nil
483+ return token .WithExtra (map [string ]any {"id_token" : "mock_id_token" }), nil
484484 },
485485 })
486486 if err != nil {
0 commit comments