Skip to content

Commit b76b90f

Browse files
committed
Fix misspell issues.
See, $ gometalinter --vendor --disable-all --enable=misspell ./... sqlite3.go:1379:45:warning: "succesfully" is a misspelling of "successfully" (misspell) sqlite3.go:1390:30:warning: "registerd" is a misspelling of "registered" (misspell) sqlite3_func_crypt.go:16:27:warning: "ceasar" is a misspelling of "caesar" (misspell) sqlite3_func_crypt.go:43:59:warning: "Ceasar" is a misspelling of "Caesar" (misspell) sqlite3_opt_userauth_test.go:450:27:warning: "succesful" is a misspelling of "successful" (misspell) sqlite3_opt_userauth_test.go:456:27:warning: "succesful" is a misspelling of "successful" (misspell)
1 parent 1ef6010 commit b76b90f

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

sqlite3.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1376,7 +1376,7 @@ func (d *SQLiteDriver) Open(dsn string) (driver.Conn, error) {
13761376
// - Activate User Authentication
13771377
// Check if the user wants to activate User Authentication.
13781378
// If so then first create a temporary AuthConn to the database
1379-
// This is possible because we are already succesfully authenticated.
1379+
// This is possible because we are already successfully authenticated.
13801380
//
13811381
// - Check if `sqlite_user`` table exists
13821382
// YES => Add the provided user from DSN as Admin User and
@@ -1387,7 +1387,7 @@ func (d *SQLiteDriver) Open(dsn string) (driver.Conn, error) {
13871387
// Create connection to SQLite
13881388
conn := &SQLiteConn{db: db, loc: loc, txlock: txlock}
13891389

1390-
// Password Cipher has to be registerd before authentication
1390+
// Password Cipher has to be registered before authentication
13911391
if len(authCrypt) > 0 {
13921392
switch strings.ToUpper(authCrypt) {
13931393
case "SHA1":

sqlite3_func_crypt.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import (
1313

1414
// This file provides several different implementations for the
1515
// default embedded sqlite_crypt function.
16-
// This function is uses a ceasar-cypher by default
16+
// This function is uses a caesar-cypher by default
1717
// and is used within the UserAuthentication module to encode
1818
// the password.
1919
//
@@ -40,7 +40,7 @@ import (
4040
// password X, sqlite_crypt(X,NULL) is run. A new random salt is selected
4141
// when the second argument is NULL.
4242
//
43-
// The built-in version of of sqlite_crypt() uses a simple Ceasar-cypher
43+
// The built-in version of of sqlite_crypt() uses a simple Caesar-cypher
4444
// which prevents passwords from being revealed by searching the raw database
4545
// for ASCII text, but is otherwise trivally broken. For better password
4646
// security, the database should be encrypted using the SQLite Encryption

sqlite3_opt_userauth_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -447,13 +447,13 @@ func TestUserAuthModifyUser(t *testing.T) {
447447
t.Fatal(err)
448448
}
449449
if rv != SQLITE_AUTH {
450-
t.Fatal("Password change succesful while not allowed")
450+
t.Fatal("Password change successful while not allowed")
451451
}
452452

453453
// Modify other user password and flag through *SQLiteConn
454454
err = c2.AuthUserChange("user2", "invalid", false)
455455
if err != ErrAdminRequired {
456-
t.Fatal("Password change succesful while not allowed")
456+
t.Fatal("Password change successful while not allowed")
457457
}
458458
}
459459

0 commit comments

Comments
 (0)