From 3a92062b44feb48640b569cf1dd123acc2164152 Mon Sep 17 00:00:00 2001 From: Dimitri Papadopoulos <3350651-DimitriPapadopoulos@users.noreply.gitlab.com> Date: Wed, 17 Nov 2021 12:31:15 +0100 Subject: [PATCH] Typos found by Visual Studio Code Checker Signed-off-by: Dimitri Papadopoulos <3350651-DimitriPapadopoulos@users.noreply.gitlab.com> --- CONTRIBUTING.md | 2 +- NEWS | 2 +- doc/README-oidc.md | 2 +- doc/README-radius.md | 2 +- doc/design.md | 2 +- src/auth/openidconnect.c | 4 ++-- src/ccan/list/list.h | 4 ++-- src/sec-mod-auth.c | 2 +- 8 files changed, 10 insertions(+), 10 deletions(-) diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index db60c965..cb766bfc 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -39,7 +39,7 @@ which is only run during development. file in the repository. The goal is to have a test suite which runs for every new merge request prior to merging. There are no particular rules for the test targets, except for them being reliable and running in a reasonable -timeframe (~1 hour). +time frame (~1 hour). ## Reviewing code diff --git a/NEWS b/NEWS index 8c0ed3ac..f6d5b630 100644 --- a/NEWS +++ b/NEWS @@ -352,7 +352,7 @@ * Version 0.10.9 (released 2015-10-07) - When compiled with GnuTLS 3.4 automatically sort the certificate list to be imported. -- Reload the CRL during periodic maintaince if its modification time +- Reload the CRL during periodic maintenance if its modification time changes. - Address issue with duplicate check failing on IPv6 addresses (issue #5). - Added the ability to specify a UsersFile in plain auth for using an OTP. diff --git a/doc/README-oidc.md b/doc/README-oidc.md index 58b90fe8..43a6691a 100644 --- a/doc/README-oidc.md +++ b/doc/README-oidc.md @@ -24,7 +24,7 @@ For as more detailed explanation see the OpenID Connect protocol (vhost; - seclog(sec, LOG_DEBUG, "permamently closing session of user '%s' "SESSION_STR, e->acct_info.username, e->acct_info.safe_id); + seclog(sec, LOG_DEBUG, "permanently closing session of user '%s' "SESSION_STR, e->acct_info.username, e->acct_info.safe_id); if (vhost->perm_config.acct.amod != NULL && vhost->perm_config.acct.amod->close_session != NULL && e->session_is_open != 0) { vhost->perm_config.acct.amod->close_session(e->vhost_acct_ctx, e->auth_type, &e->acct_info, &e->saved_stats, e->discon_reason); }