Fix misspell issues.
See, $ gometalinter --vendor --disable-all --enable=misspell ./... sqlite3.go:1379:45⚠️ "succesfully" is a misspelling of "successfully" (misspell) sqlite3.go:1390:30⚠️ "registerd" is a misspelling of "registered" (misspell) sqlite3_func_crypt.go:16:27⚠️ "ceasar" is a misspelling of "caesar" (misspell) sqlite3_func_crypt.go:43:59⚠️ "Ceasar" is a misspelling of "Caesar" (misspell) sqlite3_opt_userauth_test.go:450:27⚠️ "succesful" is a misspelling of "successful" (misspell) sqlite3_opt_userauth_test.go:456:27⚠️ "succesful" is a misspelling of "successful" (misspell)
This commit is contained in:
parent
1ef6010539
commit
b76b90f754
|
@ -1376,7 +1376,7 @@ func (d *SQLiteDriver) Open(dsn string) (driver.Conn, error) {
|
||||||
// - Activate User Authentication
|
// - Activate User Authentication
|
||||||
// Check if the user wants to activate User Authentication.
|
// Check if the user wants to activate User Authentication.
|
||||||
// If so then first create a temporary AuthConn to the database
|
// If so then first create a temporary AuthConn to the database
|
||||||
// This is possible because we are already succesfully authenticated.
|
// This is possible because we are already successfully authenticated.
|
||||||
//
|
//
|
||||||
// - Check if `sqlite_user`` table exists
|
// - Check if `sqlite_user`` table exists
|
||||||
// YES => Add the provided user from DSN as Admin User and
|
// YES => Add the provided user from DSN as Admin User and
|
||||||
|
@ -1387,7 +1387,7 @@ func (d *SQLiteDriver) Open(dsn string) (driver.Conn, error) {
|
||||||
// Create connection to SQLite
|
// Create connection to SQLite
|
||||||
conn := &SQLiteConn{db: db, loc: loc, txlock: txlock}
|
conn := &SQLiteConn{db: db, loc: loc, txlock: txlock}
|
||||||
|
|
||||||
// Password Cipher has to be registerd before authentication
|
// Password Cipher has to be registered before authentication
|
||||||
if len(authCrypt) > 0 {
|
if len(authCrypt) > 0 {
|
||||||
switch strings.ToUpper(authCrypt) {
|
switch strings.ToUpper(authCrypt) {
|
||||||
case "SHA1":
|
case "SHA1":
|
||||||
|
|
|
@ -13,7 +13,7 @@ import (
|
||||||
|
|
||||||
// This file provides several different implementations for the
|
// This file provides several different implementations for the
|
||||||
// default embedded sqlite_crypt function.
|
// default embedded sqlite_crypt function.
|
||||||
// This function is uses a ceasar-cypher by default
|
// This function is uses a caesar-cypher by default
|
||||||
// and is used within the UserAuthentication module to encode
|
// and is used within the UserAuthentication module to encode
|
||||||
// the password.
|
// the password.
|
||||||
//
|
//
|
||||||
|
@ -40,7 +40,7 @@ import (
|
||||||
// password X, sqlite_crypt(X,NULL) is run. A new random salt is selected
|
// password X, sqlite_crypt(X,NULL) is run. A new random salt is selected
|
||||||
// when the second argument is NULL.
|
// when the second argument is NULL.
|
||||||
//
|
//
|
||||||
// The built-in version of of sqlite_crypt() uses a simple Ceasar-cypher
|
// The built-in version of of sqlite_crypt() uses a simple Caesar-cypher
|
||||||
// which prevents passwords from being revealed by searching the raw database
|
// which prevents passwords from being revealed by searching the raw database
|
||||||
// for ASCII text, but is otherwise trivally broken. For better password
|
// for ASCII text, but is otherwise trivally broken. For better password
|
||||||
// security, the database should be encrypted using the SQLite Encryption
|
// security, the database should be encrypted using the SQLite Encryption
|
||||||
|
|
|
@ -447,13 +447,13 @@ func TestUserAuthModifyUser(t *testing.T) {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
if rv != SQLITE_AUTH {
|
if rv != SQLITE_AUTH {
|
||||||
t.Fatal("Password change succesful while not allowed")
|
t.Fatal("Password change successful while not allowed")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Modify other user password and flag through *SQLiteConn
|
// Modify other user password and flag through *SQLiteConn
|
||||||
err = c2.AuthUserChange("user2", "invalid", false)
|
err = c2.AuthUserChange("user2", "invalid", false)
|
||||||
if err != ErrAdminRequired {
|
if err != ErrAdminRequired {
|
||||||
t.Fatal("Password change succesful while not allowed")
|
t.Fatal("Password change successful while not allowed")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue