From 8d2565773e20177685fc9d4bfadbd7fdbed8b036 Mon Sep 17 00:00:00 2001 From: Firstyear Date: Tue, 20 Jun 2023 13:19:21 +1000 Subject: [PATCH] Resolve codespell issues (#1753) --- book/src/developers/designs/kanidm-trust.rst | 2 +- book/src/developers/designs/replication.rst | 2 +- server/lib/src/idm/credupdatesession.rs | 2 +- server/lib/src/idm/oauth2.rs | 2 +- server/lib/src/idm/scim.rs | 4 ++-- server/lib/src/server/access/mod.rs | 2 +- 6 files changed, 7 insertions(+), 7 deletions(-) diff --git a/book/src/developers/designs/kanidm-trust.rst b/book/src/developers/designs/kanidm-trust.rst index e5a1c51e0..58190132e 100644 --- a/book/src/developers/designs/kanidm-trust.rst +++ b/book/src/developers/designs/kanidm-trust.rst @@ -37,7 +37,7 @@ There are different ways we can scope a trust out, each with pros-cons. Here are is no global catalog, just the details you get in the presented authentication (certificate). You may implement some controls around which subject DN's to allow/deny, but this is pretty fraught with landminds. You don't know who exists until they login! -* Azure AD individiual account trusting. Instead of trusting a whole domain you allow a user from +* Azure AD individual account trusting. Instead of trusting a whole domain you allow a user from a remote tennant to access your resources. You don't trust everyone in their tennant, just that one account that you can invite. You can then revoke them as needed. * Group-trust - FreeIPA does this with AD. It's still like kerberos, but you only trust a subset diff --git a/book/src/developers/designs/replication.rst b/book/src/developers/designs/replication.rst index ce95533be..115b65d81 100644 --- a/book/src/developers/designs/replication.rst +++ b/book/src/developers/designs/replication.rst @@ -385,7 +385,7 @@ server of the change. A psudeo example of this is: Summarised, this shows that on our server, our changelog has changes from A for time range T4 to T8, B T6 to T16, and C T0 to T7. -Individiually, a RUV does not allow much, but now we can compare RUVs to another server. Lets +Individually, a RUV does not allow much, but now we can compare RUVs to another server. Lets assume a second server exists with the RUV of: :: diff --git a/server/lib/src/idm/credupdatesession.rs b/server/lib/src/idm/credupdatesession.rs index 8a9fe09e2..4ea149a75 100644 --- a/server/lib/src/idm/credupdatesession.rs +++ b/server/lib/src/idm/credupdatesession.rs @@ -375,7 +375,7 @@ impl<'a> IdmServerProxyWriteTransaction<'a> { if !eperm_search_primary_cred || !eperm_mod_primary_cred || !eperm_rem_primary_cred { security_info!( - "Requestor {} does not have permission to update credentials of {}", + "Requester {} does not have permission to update credentials of {}", ident, account.spn ); diff --git a/server/lib/src/idm/oauth2.rs b/server/lib/src/idm/oauth2.rs index 72baf9b4a..d898cb069 100644 --- a/server/lib/src/idm/oauth2.rs +++ b/server/lib/src/idm/oauth2.rs @@ -2244,7 +2244,7 @@ mod tests { == Oauth2Error::InvalidClientId ); - // * mis match origin in the redirect. + // * mismatched origin in the redirect. let auth_req = AuthorisationRequest { response_type: "code".to_string(), client_id: "test_resource_server".to_string(), diff --git a/server/lib/src/idm/scim.rs b/server/lib/src/idm/scim.rs index 4be441f45..4e874d284 100644 --- a/server/lib/src/idm/scim.rs +++ b/server/lib/src/idm/scim.rs @@ -278,7 +278,7 @@ impl<'a> IdmServerProxyWriteTransaction<'a> { if !eperm.delete { security_info!( - "Requestor {} does not have permission to delete sync account {}", + "Requester {} does not have permission to delete sync account {}", sfe.ident, sync_account.name ); @@ -403,7 +403,7 @@ impl<'a> IdmServerProxyWriteTransaction<'a> { if !eperm.delete { security_info!( - "Requestor {} does not have permission to delete sync account {}", + "Requester {} does not have permission to delete sync account {}", ste.ident, sync_account.name ); diff --git a/server/lib/src/server/access/mod.rs b/server/lib/src/server/access/mod.rs index da0fef329..6930e743f 100644 --- a/server/lib/src/server/access/mod.rs +++ b/server/lib/src/server/access/mod.rs @@ -57,7 +57,7 @@ pub enum Access { #[derive(Debug, Clone, PartialEq, Eq)] pub struct AccessEffectivePermission { - // I don't think we need this? The ident is implied by the requestor. + // I don't think we need this? The ident is implied by the requester. // ident: Uuid, pub target: Uuid, pub delete: bool,