From 0c21a058abddf814021f17192e8ba848a089eeb1 Mon Sep 17 00:00:00 2001
From: Ian Bishop <ianbishop@pace7.com>
Date: Mon, 8 Sep 2014 11:42:58 +1000
Subject: [PATCH] Lowercase error messages

---
 hmac.go |  2 +-
 jwt.go  | 18 +++++++++---------
 2 files changed, 10 insertions(+), 10 deletions(-)

diff --git a/hmac.go b/hmac.go
index e76e45d..c6ed7ba 100644
--- a/hmac.go
+++ b/hmac.go
@@ -57,7 +57,7 @@ func (m *SigningMethodHMAC) Verify(signingString, signature string, key interfac
 			hasher.Write([]byte(signingString))
 
 			if !bytes.Equal(sig, hasher.Sum(nil)) {
-				err = errors.New("Signature is invalid")
+				err = errors.New("signature is invalid")
 			}
 		}
 		return err
diff --git a/jwt.go b/jwt.go
index 1554e8c..1cd8b9a 100644
--- a/jwt.go
+++ b/jwt.go
@@ -22,8 +22,8 @@ type Keyfunc func(*Token) (interface{}, error)
 
 // Error constants
 var (
-	ErrInvalidKey      = errors.New("Key is invalid or of invalid type.")
-	ErrHashUnavailable = errors.New("The requested Hash function is unavailable")
+	ErrInvalidKey      = errors.New("key is invalid or of invalid type.")
+	ErrHashUnavailable = errors.New("the requested hash function is unavailable")
 )
 
 // A JWT Token.  Different fields will be used depending on whether you're
@@ -93,7 +93,7 @@ func (t *Token) SigningString() (string, error) {
 func Parse(tokenString string, keyFunc Keyfunc) (*Token, error) {
 	parts := strings.Split(tokenString, ".")
 	if len(parts) != 3 {
-		return nil, &ValidationError{err: "Token contains an invalid number of segments", Errors: ValidationErrorMalformed}
+		return nil, &ValidationError{err: "token contains an invalid number of segments", Errors: ValidationErrorMalformed}
 	}
 
 	var err error
@@ -119,10 +119,10 @@ func Parse(tokenString string, keyFunc Keyfunc) (*Token, error) {
 	// Lookup signature method
 	if method, ok := token.Header["alg"].(string); ok {
 		if token.Method = GetSigningMethod(method); token.Method == nil {
-			return token, &ValidationError{err: "Signing method (alg) is unavailable.", Errors: ValidationErrorUnverifiable}
+			return token, &ValidationError{err: "signing method (alg) is unavailable.", Errors: ValidationErrorUnverifiable}
 		}
 	} else {
-		return token, &ValidationError{err: "Signing method (alg) is unspecified.", Errors: ValidationErrorUnverifiable}
+		return token, &ValidationError{err: "signing method (alg) is unspecified.", Errors: ValidationErrorUnverifiable}
 	}
 
 	// Lookup key
@@ -136,13 +136,13 @@ func Parse(tokenString string, keyFunc Keyfunc) (*Token, error) {
 	now := TimeFunc().Unix()
 	if exp, ok := token.Claims["exp"].(float64); ok {
 		if now > int64(exp) {
-			vErr.err = "Token is expired"
+			vErr.err = "token is expired"
 			vErr.Errors |= ValidationErrorExpired
 		}
 	}
 	if nbf, ok := token.Claims["nbf"].(float64); ok {
 		if now < int64(nbf) {
-			vErr.err = "Token is not valid yet"
+			vErr.err = "token is not valid yet"
 			vErr.Errors |= ValidationErrorNotValidYet
 		}
 	}
@@ -179,7 +179,7 @@ type ValidationError struct {
 // Validation error is an error type
 func (e ValidationError) Error() string {
 	if e.err == "" {
-		return "Token is invalid"
+		return "token is invalid"
 	}
 	return e.err
 }
@@ -212,7 +212,7 @@ func ParseFromRequest(req *http.Request, keyFunc Keyfunc) (token *Token, err err
 		return Parse(tokStr, keyFunc)
 	}
 
-	return nil, errors.New("No token present in request.")
+	return nil, errors.New("no token present in request.")
 
 }