forked from mystiq/dex
Merge pull request #864 from ericchiang/spelling
*: fix spelling using github.com/client9/misspell
This commit is contained in:
commit
af54f59202
7 changed files with 10 additions and 10 deletions
|
@ -341,7 +341,7 @@ func (p *provider) HandlePOST(s connector.Scopes, samlResponse string) (ident co
|
|||
if !ok {
|
||||
return ident, fmt.Errorf("no attribute with name %q", p.groupsAttr)
|
||||
}
|
||||
// TOOD(ericchiang): Do we need to further trim whitespace?
|
||||
// TODO(ericchiang): Do we need to further trim whitespace?
|
||||
ident.Groups = strings.Split(groupsStr, p.groupsDelim)
|
||||
} else {
|
||||
groups, ok := attributes.all(p.groupsAttr)
|
||||
|
|
|
@ -40,7 +40,7 @@ web:
|
|||
|
||||
# Instead of reading from an external storage, use this list of clients.
|
||||
#
|
||||
# If this option isn't choosen clients may be added through the gRPC API.
|
||||
# If this option isn't chosen clients may be added through the gRPC API.
|
||||
staticClients:
|
||||
- id: example-app
|
||||
redirectURIs:
|
||||
|
@ -68,7 +68,7 @@ enablePasswordDB: true
|
|||
# A static list of passwords to login the end user. By identifying here, dex
|
||||
# won't look in its underlying storage for passwords.
|
||||
#
|
||||
# If this option isn't choosen users may be added through the gRPC API.
|
||||
# If this option isn't chosen users may be added through the gRPC API.
|
||||
staticPasswords:
|
||||
- email: "admin@example.com"
|
||||
# bcrypt hash of the string "password"
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
# * Use glide and glide-vc.
|
||||
# * List transitive dependencies.
|
||||
# * Create a separate block for each dependency group.
|
||||
# * Keep updates to "vendor/" in a seperate commit from actual changes.
|
||||
# * Keep updates to "vendor/" in a separate commit from actual changes.
|
||||
|
||||
package: github.com/coreos/dex
|
||||
import:
|
||||
|
|
|
@ -11,7 +11,7 @@ FULL_GOVERSION=$( echo -n "$VERSION" | grep -o 'go1\.[0-9|\.]*' || true )
|
|||
# The list of unsupported major go versions.
|
||||
UNSUPPORTED=( "go1.0" "go1.1" "go1.2" "go1.3" "go1.4" "go1.5" "go1.6" )
|
||||
|
||||
# Minor go verisons which have known security vulnerabilities. Refuse to build with these.
|
||||
# Minor go versions which have known security vulnerabilities. Refuse to build with these.
|
||||
#
|
||||
# There aren't any security issues that impact dex in 1.7 but minor versions should be
|
||||
# added here later if they do have issues.
|
||||
|
@ -26,7 +26,7 @@ done
|
|||
|
||||
for V in "${KNOWN_INSECURE[@]}"; do
|
||||
if [ "$V" = "$FULL_GOVERSION" ]; then
|
||||
>&2 echo "Go version ${V} has known security vulnerabilities which impact dex. Please update your Go verison."
|
||||
>&2 echo "Go version ${V} has known security vulnerabilities which impact dex. Please update your Go version."
|
||||
exit 2
|
||||
fi
|
||||
done
|
||||
|
|
|
@ -721,7 +721,7 @@ func (s *Server) handleAuthCode(w http.ResponseWriter, r *http.Request, client s
|
|||
offlineSessions.Refresh[tokenRef.ClientID] = &tokenRef
|
||||
|
||||
// Create a new OfflineSession object for the user and add a reference object for
|
||||
// the newly recieved refreshtoken.
|
||||
// the newly received refreshtoken.
|
||||
if err := s.storage.CreateOfflineSessions(offlineSessions); err != nil {
|
||||
s.logger.Errorf("failed to create offline session: %v", err)
|
||||
s.tokenErrHelper(w, errServerError, "", http.StatusInternalServerError)
|
||||
|
@ -962,6 +962,6 @@ func (s *Server) renderError(w http.ResponseWriter, status int, description stri
|
|||
|
||||
func (s *Server) tokenErrHelper(w http.ResponseWriter, typ string, description string, statusCode int) {
|
||||
if err := tokenErr(w, typ, description, statusCode); err != nil {
|
||||
s.logger.Errorf("token error repsonse: %v", err)
|
||||
s.logger.Errorf("token error response: %v", err)
|
||||
}
|
||||
}
|
||||
|
|
|
@ -90,7 +90,7 @@ func TestKeyRotater(t *testing.T) {
|
|||
got := verificationKeyIDs(t, r.Storage)
|
||||
|
||||
if !slicesEq(expVerificationKeys, got) {
|
||||
t.Errorf("after %d rotation, expected varification keys %q, got %q", i+1, expVerificationKeys, got)
|
||||
t.Errorf("after %d rotation, expected verification keys %q, got %q", i+1, expVerificationKeys, got)
|
||||
}
|
||||
|
||||
expVerificationKeys = append(expVerificationKeys, signingKeyID(t, r.Storage))
|
||||
|
|
|
@ -1070,7 +1070,7 @@ func TestRefreshTokenFlow(t *testing.T) {
|
|||
Expiry: time.Now().Add(-time.Hour),
|
||||
}
|
||||
|
||||
// Login in again to recieve a new token.
|
||||
// Login in again to receive a new token.
|
||||
if _, err = http.Get(oauth2Client.server.URL + "/login"); err != nil {
|
||||
t.Fatalf("get failed: %v", err)
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue