mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-01 19:17:58 +00:00
Spelling (#4119)
This commit is contained in:
committed by
Jeff Mitchell
parent
f105461df5
commit
e43b76ef97
@@ -246,7 +246,7 @@ func TestCassandra_RevokeUser(t *testing.T) {
|
||||
t.Fatalf("Could not connect with new credentials: %s", err)
|
||||
}
|
||||
|
||||
// Test default revoke statememts
|
||||
// Test default revoke statements
|
||||
err = db.RevokeUser(context.Background(), statements, username)
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
|
||||
@@ -250,7 +250,7 @@ commit_failure_policy: stop
|
||||
#
|
||||
# Valid values are either "auto" (omitting the value) or a value greater 0.
|
||||
#
|
||||
# Note that specifying a too large value will result in long running GCs and possbily
|
||||
# Note that specifying a too large value will result in long running GCs and possibly
|
||||
# out-of-memory errors. Keep the value at a small fraction of the heap.
|
||||
#
|
||||
# If you constantly see "prepared statements discarded in the last minute because
|
||||
@@ -259,7 +259,7 @@ commit_failure_policy: stop
|
||||
# i.e. use bind markers for variable parts.
|
||||
#
|
||||
# Do only change the default value, if you really have more prepared statements than
|
||||
# fit in the cache. In most cases it is not neccessary to change this value.
|
||||
# fit in the cache. In most cases it is not necessary to change this value.
|
||||
# Constantly re-preparing statements is a performance penalty.
|
||||
#
|
||||
# Default value ("auto") is 1/256th of the heap or 10MB, whichever is greater
|
||||
@@ -1021,7 +1021,7 @@ client_encryption_options:
|
||||
keystore: conf/.keystore
|
||||
keystore_password: cassandra
|
||||
# require_client_auth: false
|
||||
# Set trustore and truststore_password if require_client_auth is true
|
||||
# Set truststore and truststore_password if require_client_auth is true
|
||||
# truststore: conf/.truststore
|
||||
# truststore_password: cassandra
|
||||
# More advanced defaults below:
|
||||
@@ -1080,7 +1080,7 @@ windows_timer_interval: 1
|
||||
|
||||
# Enables encrypting data at-rest (on disk). Different key providers can be plugged in, but the default reads from
|
||||
# a JCE-style keystore. A single keystore can hold multiple keys, but the one referenced by
|
||||
# the "key_alias" is the only key that will be used for encrypt opertaions; previously used keys
|
||||
# the "key_alias" is the only key that will be used for encrypt operations; previously used keys
|
||||
# can still (and should!) be in the keystore and will be used on decrypt operations
|
||||
# (to handle the case of key rotation).
|
||||
#
|
||||
@@ -1114,7 +1114,7 @@ transparent_data_encryption_options:
|
||||
# tombstones seen in memory so we can return them to the coordinator, which
|
||||
# will use them to make sure other replicas also know about the deleted rows.
|
||||
# With workloads that generate a lot of tombstones, this can cause performance
|
||||
# problems and even exaust the server heap.
|
||||
# problems and even exhaust the server heap.
|
||||
# (http://www.datastax.com/dev/blog/cassandra-anti-patterns-queues-and-queue-like-datasets)
|
||||
# Adjust the thresholds here if you understand the dangers and want to
|
||||
# scan more tombstones anyway. These thresholds may also be adjusted at runtime
|
||||
|
||||
@@ -66,7 +66,7 @@ func TestHANA_CreateUser(t *testing.T) {
|
||||
RoleName: "test-test",
|
||||
}
|
||||
|
||||
// Test with no configured Creation Statememt
|
||||
// Test with no configured Creation Statement
|
||||
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Hour))
|
||||
if err == nil {
|
||||
t.Fatal("Expected error when no creation statement is provided")
|
||||
@@ -113,7 +113,7 @@ func TestHANA_RevokeUser(t *testing.T) {
|
||||
RoleName: "test-test",
|
||||
}
|
||||
|
||||
// Test default revoke statememts
|
||||
// Test default revoke statements
|
||||
username, password, err := db.CreateUser(context.Background(), statements, usernameConfig, time.Now().Add(time.Hour))
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
@@ -130,7 +130,7 @@ func TestHANA_RevokeUser(t *testing.T) {
|
||||
t.Fatal("Credentials were not revoked")
|
||||
}
|
||||
|
||||
// Test custom revoke statememt
|
||||
// Test custom revoke statement
|
||||
username, password, err = db.CreateUser(context.Background(), statements, usernameConfig, time.Now().Add(time.Hour))
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
|
||||
@@ -88,7 +88,7 @@ func (c *mongoDBConnectionProducer) Initialize(ctx context.Context, conf map[str
|
||||
return nil
|
||||
}
|
||||
|
||||
// Connection creates or returns an exisitng a database connection. If the session fails
|
||||
// Connection creates or returns an existing a database connection. If the session fails
|
||||
// on a ping check, the session will be closed and then re-created.
|
||||
func (c *mongoDBConnectionProducer) Connection(_ context.Context) (interface{}, error) {
|
||||
if !c.Initialized {
|
||||
|
||||
@@ -155,7 +155,7 @@ func (m *MongoDB) RenewUser(ctx context.Context, statements dbplugin.Statements,
|
||||
return nil
|
||||
}
|
||||
|
||||
// RevokeUser drops the specified user from the authentication databse. If none is provided
|
||||
// RevokeUser drops the specified user from the authentication database. If none is provided
|
||||
// in the revocation statement, the default "admin" authentication database will be assumed.
|
||||
func (m *MongoDB) RevokeUser(ctx context.Context, statements dbplugin.Statements, username string) error {
|
||||
session, err := m.getConnection(ctx)
|
||||
|
||||
@@ -206,7 +206,7 @@ func TestMongoDB_RevokeUser(t *testing.T) {
|
||||
t.Fatalf("Could not connect with new credentials: %s", err)
|
||||
}
|
||||
|
||||
// Test default revocation statememt
|
||||
// Test default revocation statement
|
||||
err = db.RevokeUser(context.Background(), statements, username)
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
|
||||
@@ -283,7 +283,7 @@ func (m *MSSQL) revokeUserDefault(ctx context.Context, username string) error {
|
||||
|
||||
// can't drop if not all database users are dropped
|
||||
if rows.Err() != nil {
|
||||
return fmt.Errorf("cound not generate sql statements for all rows: %s", rows.Err())
|
||||
return fmt.Errorf("could not generate sql statements for all rows: %s", rows.Err())
|
||||
}
|
||||
if lastStmtError != nil {
|
||||
return fmt.Errorf("could not perform all sql statements: %s", lastStmtError)
|
||||
|
||||
@@ -80,7 +80,7 @@ func TestMSSQL_CreateUser(t *testing.T) {
|
||||
RoleName: "test",
|
||||
}
|
||||
|
||||
// Test with no configured Creation Statememt
|
||||
// Test with no configured Creation Statement
|
||||
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Minute))
|
||||
if err == nil {
|
||||
t.Fatal("Expected error when no creation statement is provided")
|
||||
@@ -135,7 +135,7 @@ func TestMSSQL_RevokeUser(t *testing.T) {
|
||||
t.Fatalf("Could not connect with new credentials: %s", err)
|
||||
}
|
||||
|
||||
// Test default revoke statememts
|
||||
// Test default revoke statements
|
||||
err = db.RevokeUser(context.Background(), statements, username)
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
@@ -154,7 +154,7 @@ func TestMSSQL_RevokeUser(t *testing.T) {
|
||||
t.Fatalf("Could not connect with new credentials: %s", err)
|
||||
}
|
||||
|
||||
// Test custom revoke statememt
|
||||
// Test custom revoke statement
|
||||
statements.RevocationStatements = testMSSQLDrop
|
||||
err = db.RevokeUser(context.Background(), statements, username)
|
||||
if err != nil {
|
||||
|
||||
@@ -157,7 +157,7 @@ func TestMySQL_CreateUser(t *testing.T) {
|
||||
RoleName: "test-long-rolename",
|
||||
}
|
||||
|
||||
// Test with no configured Creation Statememt
|
||||
// Test with no configured Creation Statement
|
||||
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Minute))
|
||||
if err == nil {
|
||||
t.Fatal("Expected error when no creation statement is provided")
|
||||
@@ -186,7 +186,7 @@ func TestMySQL_CreateUser(t *testing.T) {
|
||||
t.Fatalf("Could not connect with new credentials: %s", err)
|
||||
}
|
||||
|
||||
// Test with a manualy prepare statement
|
||||
// Test with a manually prepare statement
|
||||
statements.CreationStatements = testMySQLRolePreparedStmt
|
||||
|
||||
username, password, err = db.CreateUser(context.Background(), statements, usernameConfig, time.Now().Add(time.Minute))
|
||||
@@ -222,7 +222,7 @@ func TestMySQL_CreateUser_Legacy(t *testing.T) {
|
||||
RoleName: "test-long-rolename",
|
||||
}
|
||||
|
||||
// Test with no configured Creation Statememt
|
||||
// Test with no configured Creation Statement
|
||||
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Minute))
|
||||
if err == nil {
|
||||
t.Fatal("Expected error when no creation statement is provided")
|
||||
@@ -287,7 +287,7 @@ func TestMySQL_RevokeUser(t *testing.T) {
|
||||
t.Fatalf("Could not connect with new credentials: %s", err)
|
||||
}
|
||||
|
||||
// Test default revoke statememts
|
||||
// Test default revoke statements
|
||||
err = db.RevokeUser(context.Background(), statements, username)
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
|
||||
@@ -120,7 +120,7 @@ func TestPostgreSQL_CreateUser(t *testing.T) {
|
||||
RoleName: "test",
|
||||
}
|
||||
|
||||
// Test with no configured Creation Statememt
|
||||
// Test with no configured Creation Statement
|
||||
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Minute))
|
||||
if err == nil {
|
||||
t.Fatal("Expected error when no creation statement is provided")
|
||||
@@ -254,7 +254,7 @@ func TestPostgreSQL_RevokeUser(t *testing.T) {
|
||||
t.Fatalf("Could not connect with new credentials: %s", err)
|
||||
}
|
||||
|
||||
// Test default revoke statememts
|
||||
// Test default revoke statements
|
||||
err = db.RevokeUser(context.Background(), statements, username)
|
||||
if err != nil {
|
||||
t.Fatalf("err: %s", err)
|
||||
|
||||
Reference in New Issue
Block a user