Fix misspell issues.

See,
$ gometalinter --vendor --disable-all --enable=misspell ./...
sqlite3.go:1379:45⚠️ "succesfully" is a misspelling of "successfully" (misspell)
sqlite3.go:1390:30⚠️ "registerd" is a misspelling of "registered" (misspell)
sqlite3_func_crypt.go:16:27⚠️ "ceasar" is a misspelling of "caesar" (misspell)
sqlite3_func_crypt.go:43:59⚠️ "Ceasar" is a misspelling of "Caesar" (misspell)
sqlite3_opt_userauth_test.go:450:27⚠️ "succesful" is a misspelling of "successful" (misspell)
sqlite3_opt_userauth_test.go:456:27⚠️ "succesful" is a misspelling of "successful" (misspell)
fix-688
Mario Trangoni 2018-11-21 11:14:40 +01:00
parent 1ef6010539
commit b76b90f754
3 changed files with 6 additions and 6 deletions

View File

@ -1376,7 +1376,7 @@ func (d *SQLiteDriver) Open(dsn string) (driver.Conn, error) {
// - Activate User Authentication // - Activate User Authentication
// Check if the user wants to activate User Authentication. // Check if the user wants to activate User Authentication.
// If so then first create a temporary AuthConn to the database // If so then first create a temporary AuthConn to the database
// This is possible because we are already succesfully authenticated. // This is possible because we are already successfully authenticated.
// //
// - Check if `sqlite_user`` table exists // - Check if `sqlite_user`` table exists
// YES => Add the provided user from DSN as Admin User and // YES => Add the provided user from DSN as Admin User and
@ -1387,7 +1387,7 @@ func (d *SQLiteDriver) Open(dsn string) (driver.Conn, error) {
// Create connection to SQLite // Create connection to SQLite
conn := &SQLiteConn{db: db, loc: loc, txlock: txlock} conn := &SQLiteConn{db: db, loc: loc, txlock: txlock}
// Password Cipher has to be registerd before authentication // Password Cipher has to be registered before authentication
if len(authCrypt) > 0 { if len(authCrypt) > 0 {
switch strings.ToUpper(authCrypt) { switch strings.ToUpper(authCrypt) {
case "SHA1": case "SHA1":

View File

@ -13,7 +13,7 @@ import (
// This file provides several different implementations for the // This file provides several different implementations for the
// default embedded sqlite_crypt function. // default embedded sqlite_crypt function.
// This function is uses a ceasar-cypher by default // This function is uses a caesar-cypher by default
// and is used within the UserAuthentication module to encode // and is used within the UserAuthentication module to encode
// the password. // the password.
// //
@ -40,7 +40,7 @@ import (
// password X, sqlite_crypt(X,NULL) is run. A new random salt is selected // password X, sqlite_crypt(X,NULL) is run. A new random salt is selected
// when the second argument is NULL. // when the second argument is NULL.
// //
// The built-in version of of sqlite_crypt() uses a simple Ceasar-cypher // The built-in version of of sqlite_crypt() uses a simple Caesar-cypher
// which prevents passwords from being revealed by searching the raw database // which prevents passwords from being revealed by searching the raw database
// for ASCII text, but is otherwise trivally broken. For better password // for ASCII text, but is otherwise trivally broken. For better password
// security, the database should be encrypted using the SQLite Encryption // security, the database should be encrypted using the SQLite Encryption

View File

@ -447,13 +447,13 @@ func TestUserAuthModifyUser(t *testing.T) {
t.Fatal(err) t.Fatal(err)
} }
if rv != SQLITE_AUTH { if rv != SQLITE_AUTH {
t.Fatal("Password change succesful while not allowed") t.Fatal("Password change successful while not allowed")
} }
// Modify other user password and flag through *SQLiteConn // Modify other user password and flag through *SQLiteConn
err = c2.AuthUserChange("user2", "invalid", false) err = c2.AuthUserChange("user2", "invalid", false)
if err != ErrAdminRequired { if err != ErrAdminRequired {
t.Fatal("Password change succesful while not allowed") t.Fatal("Password change successful while not allowed")
} }
} }