Merge pull request #864 from ericchiang/spelling
*: fix spelling using github.com/client9/misspell
This commit is contained in:
commit
af54f59202
@ -341,7 +341,7 @@ func (p *provider) HandlePOST(s connector.Scopes, samlResponse string) (ident co
|
|||||||
if !ok {
|
if !ok {
|
||||||
return ident, fmt.Errorf("no attribute with name %q", p.groupsAttr)
|
return ident, fmt.Errorf("no attribute with name %q", p.groupsAttr)
|
||||||
}
|
}
|
||||||
// TOOD(ericchiang): Do we need to further trim whitespace?
|
// TODO(ericchiang): Do we need to further trim whitespace?
|
||||||
ident.Groups = strings.Split(groupsStr, p.groupsDelim)
|
ident.Groups = strings.Split(groupsStr, p.groupsDelim)
|
||||||
} else {
|
} else {
|
||||||
groups, ok := attributes.all(p.groupsAttr)
|
groups, ok := attributes.all(p.groupsAttr)
|
||||||
|
@ -40,7 +40,7 @@ web:
|
|||||||
|
|
||||||
# Instead of reading from an external storage, use this list of clients.
|
# Instead of reading from an external storage, use this list of clients.
|
||||||
#
|
#
|
||||||
# If this option isn't choosen clients may be added through the gRPC API.
|
# If this option isn't chosen clients may be added through the gRPC API.
|
||||||
staticClients:
|
staticClients:
|
||||||
- id: example-app
|
- id: example-app
|
||||||
redirectURIs:
|
redirectURIs:
|
||||||
@ -68,7 +68,7 @@ enablePasswordDB: true
|
|||||||
# A static list of passwords to login the end user. By identifying here, dex
|
# A static list of passwords to login the end user. By identifying here, dex
|
||||||
# won't look in its underlying storage for passwords.
|
# won't look in its underlying storage for passwords.
|
||||||
#
|
#
|
||||||
# If this option isn't choosen users may be added through the gRPC API.
|
# If this option isn't chosen users may be added through the gRPC API.
|
||||||
staticPasswords:
|
staticPasswords:
|
||||||
- email: "admin@example.com"
|
- email: "admin@example.com"
|
||||||
# bcrypt hash of the string "password"
|
# bcrypt hash of the string "password"
|
||||||
|
@ -5,7 +5,7 @@
|
|||||||
# * Use glide and glide-vc.
|
# * Use glide and glide-vc.
|
||||||
# * List transitive dependencies.
|
# * List transitive dependencies.
|
||||||
# * Create a separate block for each dependency group.
|
# * Create a separate block for each dependency group.
|
||||||
# * Keep updates to "vendor/" in a seperate commit from actual changes.
|
# * Keep updates to "vendor/" in a separate commit from actual changes.
|
||||||
|
|
||||||
package: github.com/coreos/dex
|
package: github.com/coreos/dex
|
||||||
import:
|
import:
|
||||||
|
@ -11,7 +11,7 @@ FULL_GOVERSION=$( echo -n "$VERSION" | grep -o 'go1\.[0-9|\.]*' || true )
|
|||||||
# The list of unsupported major go versions.
|
# The list of unsupported major go versions.
|
||||||
UNSUPPORTED=( "go1.0" "go1.1" "go1.2" "go1.3" "go1.4" "go1.5" "go1.6" )
|
UNSUPPORTED=( "go1.0" "go1.1" "go1.2" "go1.3" "go1.4" "go1.5" "go1.6" )
|
||||||
|
|
||||||
# Minor go verisons which have known security vulnerabilities. Refuse to build with these.
|
# Minor go versions which have known security vulnerabilities. Refuse to build with these.
|
||||||
#
|
#
|
||||||
# There aren't any security issues that impact dex in 1.7 but minor versions should be
|
# There aren't any security issues that impact dex in 1.7 but minor versions should be
|
||||||
# added here later if they do have issues.
|
# added here later if they do have issues.
|
||||||
@ -26,7 +26,7 @@ done
|
|||||||
|
|
||||||
for V in "${KNOWN_INSECURE[@]}"; do
|
for V in "${KNOWN_INSECURE[@]}"; do
|
||||||
if [ "$V" = "$FULL_GOVERSION" ]; then
|
if [ "$V" = "$FULL_GOVERSION" ]; then
|
||||||
>&2 echo "Go version ${V} has known security vulnerabilities which impact dex. Please update your Go verison."
|
>&2 echo "Go version ${V} has known security vulnerabilities which impact dex. Please update your Go version."
|
||||||
exit 2
|
exit 2
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
|
@ -721,7 +721,7 @@ func (s *Server) handleAuthCode(w http.ResponseWriter, r *http.Request, client s
|
|||||||
offlineSessions.Refresh[tokenRef.ClientID] = &tokenRef
|
offlineSessions.Refresh[tokenRef.ClientID] = &tokenRef
|
||||||
|
|
||||||
// Create a new OfflineSession object for the user and add a reference object for
|
// Create a new OfflineSession object for the user and add a reference object for
|
||||||
// the newly recieved refreshtoken.
|
// the newly received refreshtoken.
|
||||||
if err := s.storage.CreateOfflineSessions(offlineSessions); err != nil {
|
if err := s.storage.CreateOfflineSessions(offlineSessions); err != nil {
|
||||||
s.logger.Errorf("failed to create offline session: %v", err)
|
s.logger.Errorf("failed to create offline session: %v", err)
|
||||||
s.tokenErrHelper(w, errServerError, "", http.StatusInternalServerError)
|
s.tokenErrHelper(w, errServerError, "", http.StatusInternalServerError)
|
||||||
@ -962,6 +962,6 @@ func (s *Server) renderError(w http.ResponseWriter, status int, description stri
|
|||||||
|
|
||||||
func (s *Server) tokenErrHelper(w http.ResponseWriter, typ string, description string, statusCode int) {
|
func (s *Server) tokenErrHelper(w http.ResponseWriter, typ string, description string, statusCode int) {
|
||||||
if err := tokenErr(w, typ, description, statusCode); err != nil {
|
if err := tokenErr(w, typ, description, statusCode); err != nil {
|
||||||
s.logger.Errorf("token error repsonse: %v", err)
|
s.logger.Errorf("token error response: %v", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -90,7 +90,7 @@ func TestKeyRotater(t *testing.T) {
|
|||||||
got := verificationKeyIDs(t, r.Storage)
|
got := verificationKeyIDs(t, r.Storage)
|
||||||
|
|
||||||
if !slicesEq(expVerificationKeys, got) {
|
if !slicesEq(expVerificationKeys, got) {
|
||||||
t.Errorf("after %d rotation, expected varification keys %q, got %q", i+1, expVerificationKeys, got)
|
t.Errorf("after %d rotation, expected verification keys %q, got %q", i+1, expVerificationKeys, got)
|
||||||
}
|
}
|
||||||
|
|
||||||
expVerificationKeys = append(expVerificationKeys, signingKeyID(t, r.Storage))
|
expVerificationKeys = append(expVerificationKeys, signingKeyID(t, r.Storage))
|
||||||
|
@ -1070,7 +1070,7 @@ func TestRefreshTokenFlow(t *testing.T) {
|
|||||||
Expiry: time.Now().Add(-time.Hour),
|
Expiry: time.Now().Add(-time.Hour),
|
||||||
}
|
}
|
||||||
|
|
||||||
// Login in again to recieve a new token.
|
// Login in again to receive a new token.
|
||||||
if _, err = http.Get(oauth2Client.server.URL + "/login"); err != nil {
|
if _, err = http.Get(oauth2Client.server.URL + "/login"); err != nil {
|
||||||
t.Fatalf("get failed: %v", err)
|
t.Fatalf("get failed: %v", err)
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user