@@ -215,7 +215,7 @@ func (a *Authority) signSSH(ctx context.Context, key ssh.PublicKey, opts provisi
215215 for _ , v := range keyValidators {
216216 if err := v .Valid (key ); err != nil {
217217 return nil , nil , errs .ApplyOptions (
218- errs .ForbiddenErr (err , err .Error ()),
218+ errs .ForbiddenErr (err , "%s" , err .Error ()),
219219 errs .WithKeyVal ("signOptions" , signOpts ),
220220 )
221221 }
@@ -232,7 +232,7 @@ func (a *Authority) signSSH(ctx context.Context, key ssh.PublicKey, opts provisi
232232 // Call enriching webhooks
233233 if err := a .callEnrichingWebhooksSSH (ctx , prov , webhookCtl , cr ); err != nil {
234234 return nil , prov , errs .ApplyOptions (
235- errs .ForbiddenErr (err , err .Error ()),
235+ errs .ForbiddenErr (err , "%s" , err .Error ()),
236236 errs .WithKeyVal ("signOptions" , signOpts ),
237237 )
238238 }
@@ -244,7 +244,7 @@ func (a *Authority) signSSH(ctx context.Context, key ssh.PublicKey, opts provisi
244244 switch {
245245 case errors .As (err , & te ):
246246 return nil , prov , errs .ApplyOptions (
247- errs .BadRequestErr (err , err .Error ()),
247+ errs .BadRequestErr (err , "%s" , err .Error ()),
248248 errs .WithKeyVal ("signOptions" , signOpts ),
249249 )
250250 case strings .HasPrefix (err .Error (), "error unmarshaling certificate" ):
@@ -264,7 +264,7 @@ func (a *Authority) signSSH(ctx context.Context, key ssh.PublicKey, opts provisi
264264 // Use SignSSHOptions to modify the certificate validity. It will be later
265265 // checked or set if not defined.
266266 if err := opts .ModifyValidity (certTpl ); err != nil {
267- return nil , prov , errs .BadRequestErr (err , err .Error ())
267+ return nil , prov , errs .BadRequestErr (err , "%s" , err .Error ())
268268 }
269269
270270 // Use provisioner modifiers.
0 commit comments