Assorted typo fixes

This commit is contained in:
XhmikosR 2020-02-20 18:30:05 +02:00
parent 32df01a9da
commit 8347b5afbc
11 changed files with 15 additions and 15 deletions

View File

@ -112,7 +112,7 @@
2019.9.0 2019.9.0
- 2019-09-05 TUN-2279: Revert path encoding fix - 2019-09-05 TUN-2279: Revert path encoding fix
- 2019-08-30 AUTH-2021 - check error for failing tests - 2019-08-30 AUTH-2021 - check error for failing tests
- 2019-08-29 AUTH-2030: Support both authorized_key and short lived cert authentication simultaniously without specifiying at start time - 2019-08-29 AUTH-2030: Support both authorized_key and short lived cert authentication simultaneously without specifying at start time
- 2019-08-29 AUTH-2026: Adds support for non-pty sessions and inline command exec - 2019-08-29 AUTH-2026: Adds support for non-pty sessions and inline command exec
- 2019-08-26 AUTH-1943: Adds session logging - 2019-08-26 AUTH-1943: Adds session logging
- 2019-08-26 TUN-2162: Decomplect OpenStream to allow finer-grained timeouts - 2019-08-26 TUN-2162: Decomplect OpenStream to allow finer-grained timeouts

View File

@ -67,7 +67,7 @@ func FindDefaultConfigPath() string {
// i.e. it fails if a user specifies both --url and --unix-socket // i.e. it fails if a user specifies both --url and --unix-socket
func ValidateUnixSocket(c *cli.Context) (string, error) { func ValidateUnixSocket(c *cli.Context) (string, error) {
if c.IsSet("unix-socket") && (c.IsSet("url") || c.NArg() > 0) { if c.IsSet("unix-socket") && (c.IsSet("url") || c.NArg() > 0) {
return "", errors.New("--unix-socket must be used exclusivly.") return "", errors.New("--unix-socket must be used exclusively.")
} }
return c.String("unix-socket"), nil return c.String("unix-socket"), nil
} }

View File

@ -28,7 +28,7 @@ func waitForSignal(errC chan error, shutdownC chan struct{}) error {
// waitForSignalWithGraceShutdown notifies all routines to shutdown immediately // waitForSignalWithGraceShutdown notifies all routines to shutdown immediately
// by closing the shutdownC when one of the routines in main exits. // by closing the shutdownC when one of the routines in main exits.
// When this process recieves SIGTERM/SIGINT, it closes the graceShutdownC to // When this process receives SIGTERM/SIGINT, it closes the graceShutdownC to
// notify certain routines to start graceful shutdown. When grace period is over, // notify certain routines to start graceful shutdown. When grace period is over,
// or when some routine exits, it notifies the rest of the routines to shutdown // or when some routine exits, it notifies the rest of the routines to shutdown
// immediately by closing shutdownC. // immediately by closing shutdownC.

View File

@ -149,7 +149,7 @@ func CmdAction(c *cli.Context) error {
} }
}() }()
// Block until the the Proxy is online, retreive its address, and change the url to point to it. // Block until the the Proxy is online, retrieve its address, and change the url to point to it.
// This is effectively "handing over" control to the tunnel package so it can run the tunnel daemon. // This is effectively "handing over" control to the tunnel package so it can run the tunnel daemon.
c.Set("url", "https://"+(<-listenerC).Addr().String()) c.Set("url", "https://"+(<-listenerC).Addr().String())

View File

@ -98,7 +98,7 @@ func (proxy *Proxy) IsAllowed(r *http.Request, verbose ...bool) bool {
// Start the Proxy at a given address and notify the listener channel when the server is online. // Start the Proxy at a given address and notify the listener channel when the server is online.
func (proxy *Proxy) Start(ctx context.Context, addr string, listenerC chan<- net.Listener) error { func (proxy *Proxy) Start(ctx context.Context, addr string, listenerC chan<- net.Listener) error {
// STOR-611: use a seperate listener and consider web socket support. // STOR-611: use a separate listener and consider web socket support.
httpListener, err := hello.CreateTLSListener(addr) httpListener, err := hello.CreateTLSListener(addr)
if err != nil { if err != nil {
return errors.Wrapf(err, "could not create listener at %s", addr) return errors.Wrapf(err, "could not create listener at %s", addr)
@ -217,7 +217,7 @@ func (proxy *Proxy) httpSubmit() http.HandlerFunc {
func (proxy *Proxy) httpRespond(w http.ResponseWriter, r *http.Request, status int, message string) { func (proxy *Proxy) httpRespond(w http.ResponseWriter, r *http.Request, status int, message string) {
w.WriteHeader(status) w.WriteHeader(status)
// Only expose the message detail of the reponse if the request is not HEAD // Only expose the message detail of the response if the request is not HEAD
// and the user is authenticated. For example, this prevents an unauthenticated // and the user is authenticated. For example, this prevents an unauthenticated
// failed health check from accidentally leaking sensitive information about the Client. // failed health check from accidentally leaking sensitive information about the Client.
if r.Method != http.MethodHead && proxy.IsAllowed(r) { if r.Method != http.MethodHead && proxy.IsAllowed(r) {

View File

@ -278,10 +278,10 @@ func sqlRows(rows *sql.Rows) ([]map[string]interface{}, error) {
func sqlValue(val interface{}, col *sql.ColumnType) interface{} { func sqlValue(val interface{}, col *sql.ColumnType) interface{} {
bytes, ok := val.([]byte) bytes, ok := val.([]byte)
if ok { if ok {
// Opportunistically check for embeded JSON and convert it to a first-class object. // Opportunistically check for embedded JSON and convert it to a first-class object.
var embeded interface{} var embedded interface{}
if json.Unmarshal(bytes, &embeded) == nil { if json.Unmarshal(bytes, &embedded) == nil {
return embeded return embedded
} }
// STOR-604: investigate a way to coerce PostgreSQL arrays '{a, b, ...}' into JSON. // STOR-604: investigate a way to coerce PostgreSQL arrays '{a, b, ...}' into JSON.

View File

@ -468,7 +468,7 @@ func assignDictToStream(s *MuxedStream, p []byte) bool {
} }
} else { } else {
// Use the overflow dictionary as last resort // Use the overflow dictionary as last resort
// If slots are availabe generate new dictioanries for path and content-type // If slots are available generate new dictionaries for path and content-type
useID, _ = h2d.getGenericDictID() useID, _ = h2d.getGenericDictID()
pathID, pathFound = h2d.getNextDictID() pathID, pathFound = h2d.getNextDictID()
if pathFound { if pathFound {

View File

@ -273,7 +273,7 @@ func (m *Muxer) readPeerSettings(magic uint32) error {
m.compressionQuality = compressionPresets[CompressionNone] m.compressionQuality = compressionPresets[CompressionNone]
return nil return nil
} }
// Values used for compression are the mimimum between the two peers // Values used for compression are the minimum between the two peers
if sz < m.compressionQuality.dictSize { if sz < m.compressionQuality.dictSize {
m.compressionQuality.dictSize = sz m.compressionQuality.dictSize = sz
} }

View File

@ -39,7 +39,7 @@ func TestIsEventStream(t *testing.T) {
// Content-Type and text/event-stream are case-insensitive. text/event-stream can be followed by OWS parameter // Content-Type and text/event-stream are case-insensitive. text/event-stream can be followed by OWS parameter
resp: &http.Response{ resp: &http.Response{
Header: http.Header{ Header: http.Header{
"content-type": []string{"appication/json", "text/html", "Text/event-stream;charset=utf-8"}, "content-type": []string{"application/json", "text/html", "Text/event-stream;charset=utf-8"},
}, },
}, },
isEventStream: true, isEventStream: true,

View File

@ -100,7 +100,7 @@ struct ClientConfig {
# supervisorConfig is configuration for supervisor, the component that manages connection manager, # supervisorConfig is configuration for supervisor, the component that manages connection manager,
# autoupdater and metrics server # autoupdater and metrics server
supervisorConfig @1 :SupervisorConfig; supervisorConfig @1 :SupervisorConfig;
# edgeConnectionConfig is configuration for connection manager, the componenet that manages connections with the edge # edgeConnectionConfig is the configuration for the connection manager, the component that manages connections with the edge
edgeConnectionConfig @2 :EdgeConnectionConfig; edgeConnectionConfig @2 :EdgeConnectionConfig;
# Configuration for cloudflared to run as a DNS-over-HTTPS proxy. # Configuration for cloudflared to run as a DNS-over-HTTPS proxy.
# cloudflared CLI option: `proxy-dns` # cloudflared CLI option: `proxy-dns`

View File

@ -74,7 +74,7 @@ func ValidateUrl(originUrl string) (string, error) {
if net.ParseIP(originUrl) != nil { if net.ParseIP(originUrl) != nil {
return validateIP("", originUrl, "") return validateIP("", originUrl, "")
} else if strings.HasPrefix(originUrl, "[") && strings.HasSuffix(originUrl, "]") { } else if strings.HasPrefix(originUrl, "[") && strings.HasSuffix(originUrl, "]") {
// ParseIP doesn't recoginze [::1] // ParseIP doesn't recognize [::1]
return validateIP("", originUrl[1:len(originUrl)-1], "") return validateIP("", originUrl[1:len(originUrl)-1], "")
} }