diff options
| author | Mario Trangoni <mjtrangoni@gmail.com> | 2018-11-21 11:14:40 +0100 |
|---|---|---|
| committer | Mario Trangoni <mjtrangoni@gmail.com> | 2018-11-21 11:30:42 +0100 |
| commit | b76b90f75407f7656fcf45c646145992c9195f81 (patch) | |
| tree | c9586c01ba788f50faf91a9e53ad544834234dd9 | |
| parent | Merge pull request #664 from bk521234/patch-1 (diff) | |
| download | golite-b76b90f75407f7656fcf45c646145992c9195f81.tar.gz golite-b76b90f75407f7656fcf45c646145992c9195f81.tar.xz | |
Fix misspell issues.
See,
$ gometalinter --vendor --disable-all --enable=misspell ./...
sqlite3.go:1379:45:warning: "succesfully" is a misspelling of "successfully" (misspell)
sqlite3.go:1390:30:warning: "registerd" is a misspelling of "registered" (misspell)
sqlite3_func_crypt.go:16:27:warning: "ceasar" is a misspelling of "caesar" (misspell)
sqlite3_func_crypt.go:43:59:warning: "Ceasar" is a misspelling of "Caesar" (misspell)
sqlite3_opt_userauth_test.go:450:27:warning: "succesful" is a misspelling of "successful" (misspell)
sqlite3_opt_userauth_test.go:456:27:warning: "succesful" is a misspelling of "successful" (misspell)
| -rw-r--r-- | sqlite3.go | 4 | ||||
| -rw-r--r-- | sqlite3_func_crypt.go | 4 | ||||
| -rw-r--r-- | sqlite3_opt_userauth_test.go | 4 |
3 files changed, 6 insertions, 6 deletions
@@ -1376,7 +1376,7 @@ func (d *SQLiteDriver) Open(dsn string) (driver.Conn, error) { // - Activate User Authentication // Check if the user wants to activate User Authentication. // If so then first create a temporary AuthConn to the database - // This is possible because we are already succesfully authenticated. + // This is possible because we are already successfully authenticated. // // - Check if `sqlite_user`` table exists // YES => Add the provided user from DSN as Admin User and @@ -1387,7 +1387,7 @@ func (d *SQLiteDriver) Open(dsn string) (driver.Conn, error) { // Create connection to SQLite conn := &SQLiteConn{db: db, loc: loc, txlock: txlock} - // Password Cipher has to be registerd before authentication + // Password Cipher has to be registered before authentication if len(authCrypt) > 0 { switch strings.ToUpper(authCrypt) { case "SHA1": diff --git a/sqlite3_func_crypt.go b/sqlite3_func_crypt.go index d397c8c..afd9333 100644 --- a/sqlite3_func_crypt.go +++ b/sqlite3_func_crypt.go @@ -13,7 +13,7 @@ import ( // This file provides several different implementations for the // default embedded sqlite_crypt function. -// This function is uses a ceasar-cypher by default +// This function is uses a caesar-cypher by default // and is used within the UserAuthentication module to encode // the password. // @@ -40,7 +40,7 @@ import ( // password X, sqlite_crypt(X,NULL) is run. A new random salt is selected // when the second argument is NULL. // -// The built-in version of of sqlite_crypt() uses a simple Ceasar-cypher +// The built-in version of of sqlite_crypt() uses a simple Caesar-cypher // which prevents passwords from being revealed by searching the raw database // for ASCII text, but is otherwise trivally broken. For better password // security, the database should be encrypted using the SQLite Encryption diff --git a/sqlite3_opt_userauth_test.go b/sqlite3_opt_userauth_test.go index b4ac4a9..df65215 100644 --- a/sqlite3_opt_userauth_test.go +++ b/sqlite3_opt_userauth_test.go @@ -447,13 +447,13 @@ func TestUserAuthModifyUser(t *testing.T) { t.Fatal(err) } if rv != SQLITE_AUTH { - t.Fatal("Password change succesful while not allowed") + t.Fatal("Password change successful while not allowed") } // Modify other user password and flag through *SQLiteConn err = c2.AuthUserChange("user2", "invalid", false) if err != ErrAdminRequired { - t.Fatal("Password change succesful while not allowed") + t.Fatal("Password change successful while not allowed") } } |
