Add codespell job (#1281)

add codespell workflow and fixed spelling issues
This commit is contained in:
Maycon Santos 2023-11-07 13:37:57 +01:00 committed by GitHub
parent 125a7a9daf
commit b726b3262d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
15 changed files with 42 additions and 28 deletions

View File

@ -10,6 +10,18 @@ concurrency:
cancel-in-progress: true cancel-in-progress: true
jobs: jobs:
codespell:
name: codespell
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v3
- name: codespell
uses: codespell-project/actions-codespell@v2
with:
ignore_words_list: erro,clienta
skip: go.mod,go.sum
only_warn: 1
golangci: golangci:
strategy: strategy:
fail-fast: false fail-fast: false

View File

@ -281,7 +281,7 @@ func TestDefaultManagerSquashRulesNoAffect(t *testing.T) {
manager := &DefaultManager{} manager := &DefaultManager{}
if rules, _ := manager.squashAcceptRules(networkMap); len(rules) != len(networkMap.FirewallRules) { if rules, _ := manager.squashAcceptRules(networkMap); len(rules) != len(networkMap.FirewallRules) {
t.Errorf("we should got same amount of rules as intput, got %v", len(rules)) t.Errorf("we should get the same amount of rules as output, got %v", len(rules))
} }
} }

View File

@ -339,7 +339,7 @@ func TestDNSFakeResolverHandleUpdates(t *testing.T) {
err = wgIface.Create() err = wgIface.Create()
if err != nil { if err != nil {
t.Errorf("crate and init wireguard interface: %v", err) t.Errorf("create and init wireguard interface: %v", err)
return return
} }
defer func() { defer func() {
@ -789,7 +789,7 @@ func createWgInterfaceWithBind(t *testing.T) (*iface.WGIface, error) {
err = wgIface.Create() err = wgIface.Create()
if err != nil { if err != nil {
t.Fatalf("crate and init wireguard interface: %v", err) t.Fatalf("create and init wireguard interface: %v", err)
return nil, err return nil, err
} }

View File

@ -8,12 +8,12 @@ func TestManager_setFeatureFlag(t *testing.T) {
mgr := GeneralManager{} mgr := GeneralManager{}
mgr.setFeatureFlag(featureFlagWGProxy) mgr.setFeatureFlag(featureFlagWGProxy)
if mgr.featureFlags != 1 { if mgr.featureFlags != 1 {
t.Errorf("invalid faeture state") t.Errorf("invalid feature state")
} }
mgr.setFeatureFlag(featureFlagDnsForwarder) mgr.setFeatureFlag(featureFlagDnsForwarder)
if mgr.featureFlags != 3 { if mgr.featureFlags != 3 {
t.Errorf("invalid faeture state") t.Errorf("invalid feature state")
} }
} }
@ -27,7 +27,7 @@ func TestManager_unsetFeatureFlag(t *testing.T) {
t.Errorf("unexpected error: %s", err) t.Errorf("unexpected error: %s", err)
} }
if mgr.featureFlags != 2 { if mgr.featureFlags != 2 {
t.Errorf("invalid faeture state, expected: %d, got: %d", 2, mgr.featureFlags) t.Errorf("invalid feature state, expected: %d, got: %d", 2, mgr.featureFlags)
} }
err = mgr.unsetFeatureFlag(featureFlagDnsForwarder) err = mgr.unsetFeatureFlag(featureFlagDnsForwarder)
@ -35,6 +35,6 @@ func TestManager_unsetFeatureFlag(t *testing.T) {
t.Errorf("unexpected error: %s", err) t.Errorf("unexpected error: %s", err)
} }
if mgr.featureFlags != 0 { if mgr.featureFlags != 0 {
t.Errorf("invalid faeture state, expected: %d, got: %d", 0, mgr.featureFlags) t.Errorf("invalid feature state, expected: %d, got: %d", 0, mgr.featureFlags)
} }
} }

View File

@ -242,7 +242,7 @@ func (conn *Conn) Open() error {
} }
err := conn.statusRecorder.UpdatePeerState(peerState) err := conn.statusRecorder.UpdatePeerState(peerState)
if err != nil { if err != nil {
log.Warnf("erro while updating the state of peer %s,err: %v", conn.config.Key, err) log.Warnf("error while updating the state of peer %s,err: %v", conn.config.Key, err)
} }
defer func() { defer func() {
@ -301,7 +301,7 @@ func (conn *Conn) Open() error {
} }
err = conn.statusRecorder.UpdatePeerState(peerState) err = conn.statusRecorder.UpdatePeerState(peerState)
if err != nil { if err != nil {
log.Warnf("erro while updating the state of peer %s,err: %v", conn.config.Key, err) log.Warnf("error while updating the state of peer %s,err: %v", conn.config.Key, err)
} }
err = conn.agent.GatherCandidates() err = conn.agent.GatherCandidates()

View File

@ -9,9 +9,10 @@ import (
"crypto/x509" "crypto/x509"
"encoding/pem" "encoding/pem"
"fmt" "fmt"
"strings"
"golang.org/x/crypto/ed25519" "golang.org/x/crypto/ed25519"
gossh "golang.org/x/crypto/ssh" gossh "golang.org/x/crypto/ssh"
"strings"
) )
// KeyType is a type of SSH key // KeyType is a type of SSH key
@ -42,7 +43,7 @@ func GeneratePrivateKey(keyType KeyType) ([]byte, error) {
case RSA: case RSA:
key, err = rsa.GenerateKey(rand.Reader, RSAKeySize) key, err = rsa.GenerateKey(rand.Reader, RSAKeySize)
default: default:
return nil, fmt.Errorf("unsupported ket type %s", keyType) return nil, fmt.Errorf("unsupported key type %s", keyType)
} }
if err != nil { if err != nil {
return nil, err return nil, err

View File

@ -4,11 +4,12 @@ package dns
import ( import (
"fmt" "fmt"
"github.com/miekg/dns"
"golang.org/x/net/idna"
"net" "net"
"regexp" "regexp"
"strings" "strings"
"github.com/miekg/dns"
"golang.org/x/net/idna"
) )
const ( const (
@ -95,7 +96,7 @@ func GetParsedDomainLabel(name string) (string, error) {
rawLabel := labels[0] rawLabel := labels[0]
ascii, err := idna.Punycode.ToASCII(rawLabel) ascii, err := idna.Punycode.ToASCII(rawLabel)
if err != nil { if err != nil {
return "", fmt.Errorf("unable to convert host lavel to ASCII, error: %v", err) return "", fmt.Errorf("unable to convert host label to ASCII, error: %v", err)
} }
invalidHostMatcher := regexp.MustCompile(invalidHostLabel) invalidHostMatcher := regexp.MustCompile(invalidHostLabel)

View File

@ -1,6 +1,6 @@
package iface package iface
// TunAdapter is an interface for create tun device from externel service // TunAdapter is an interface for create tun device from external service
type TunAdapter interface { type TunAdapter interface {
ConfigureInterface(address string, mtu int, dns string, searchDomains string, routes string) (int, error) ConfigureInterface(address string, mtu int, dns string, searchDomains string, routes string) (int, error)
UpdateAddr(address string) error UpdateAddr(address string) error

View File

@ -36,7 +36,7 @@ fi
if [[ "x-$NETBIRD_DOMAIN" == "x-" ]]; then if [[ "x-$NETBIRD_DOMAIN" == "x-" ]]; then
echo NETBIRD_DOMAIN is not set, please update your setup.env file echo NETBIRD_DOMAIN is not set, please update your setup.env file
echo If you are migrating from old versions, you migh need to update your variables prefixes from echo If you are migrating from old versions, you might need to update your variables prefixes from
echo WIRETRUSTEE_.. TO NETBIRD_ echo WIRETRUSTEE_.. TO NETBIRD_
exit 1 exit 1
fi fi

View File

@ -387,7 +387,7 @@ check_nb_domain() {
if [ "$DOMAIN" == "netbird.example.com" ]; then if [ "$DOMAIN" == "netbird.example.com" ]; then
echo "The NETBIRD_DOMAIN cannot be netbird.example.com" > /dev/stderr echo "The NETBIRD_DOMAIN cannot be netbird.example.com" > /dev/stderr
retrun 1 return 1
fi fi
return 0 return 0
} }

View File

@ -677,7 +677,7 @@ no-cli
# #
#cli-password=$5$79a316b350311570$81df9cfb9af7f5e5a76eada31e7097b663a0670f99a3c07ded3f1c8e59c5658a #cli-password=$5$79a316b350311570$81df9cfb9af7f5e5a76eada31e7097b663a0670f99a3c07ded3f1c8e59c5658a
# #
# Or unsecure form for the same password: # Or insecure form for the same password:
# #
# cli-password=CHANGE_ME # cli-password=CHANGE_ME

View File

@ -251,7 +251,7 @@ func TestAccountManager_GetOrCreateAccountByUser(t *testing.T) {
} }
if account != nil && account.Users[userID] == nil { if account != nil && account.Users[userID] == nil {
t.Fatalf("expected to create an account for a user %s but no user was found after creation udner the account %s", userID, account.Id) t.Fatalf("expected to create an account for a user %s but no user was found after creation under the account %s", userID, account.Id)
return return
} }
@ -626,7 +626,7 @@ func TestAccountManager_PrivateAccount(t *testing.T) {
} }
if account != nil && account.Users[userId] == nil { if account != nil && account.Users[userId] == nil {
t.Fatalf("expected to create an account for a user %s but no user was found after creation udner the account %s", userId, account.Id) t.Fatalf("expected to create an account for a user %s but no user was found after creation under the account %s", userId, account.Id)
} }
} }
@ -1385,7 +1385,7 @@ func TestAccount_Copy(t *testing.T) {
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)
} }
account.Peers["peer1"].Status.Connected = false // we change original object to confirm that copy wont change account.Peers["peer1"].Status.Connected = false // we change original object to confirm that copy won't change
accCopyBytes, err := json.Marshal(accountCopy) accCopyBytes, err := json.Marshal(accountCopy)
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)

View File

@ -10,7 +10,7 @@ import (
"github.com/stretchr/testify/require" "github.com/stretchr/testify/require"
) )
func newTestRequestWithJWT(t *testing.T, claims AuthorizationClaims, audiance string) *http.Request { func newTestRequestWithJWT(t *testing.T, claims AuthorizationClaims, audience string) *http.Request {
const layout = "2006-01-02T15:04:05.999Z" const layout = "2006-01-02T15:04:05.999Z"
claimMaps := jwt.MapClaims{} claimMaps := jwt.MapClaims{}
@ -18,16 +18,16 @@ func newTestRequestWithJWT(t *testing.T, claims AuthorizationClaims, audiance st
claimMaps[UserIDClaim] = claims.UserId claimMaps[UserIDClaim] = claims.UserId
} }
if claims.AccountId != "" { if claims.AccountId != "" {
claimMaps[audiance+AccountIDSuffix] = claims.AccountId claimMaps[audience+AccountIDSuffix] = claims.AccountId
} }
if claims.Domain != "" { if claims.Domain != "" {
claimMaps[audiance+DomainIDSuffix] = claims.Domain claimMaps[audience+DomainIDSuffix] = claims.Domain
} }
if claims.DomainCategory != "" { if claims.DomainCategory != "" {
claimMaps[audiance+DomainCategorySuffix] = claims.DomainCategory claimMaps[audience+DomainCategorySuffix] = claims.DomainCategory
} }
if claims.LastLogin != (time.Time{}) { if claims.LastLogin != (time.Time{}) {
claimMaps[audiance+LastLoginSuffix] = claims.LastLogin.Format(layout) claimMaps[audience+LastLoginSuffix] = claims.LastLogin.Format(layout)
} }
token := jwt.NewWithClaims(jwt.SigningMethodHS256, claimMaps) token := jwt.NewWithClaims(jwt.SigningMethodHS256, claimMaps)
r, err := http.NewRequest(http.MethodGet, "http://localhost", nil) r, err := http.NewRequest(http.MethodGet, "http://localhost", nil)

View File

@ -262,7 +262,7 @@ func (s *SharedSocket) ReadFrom(b []byte) (n int, addr net.Addr, err error) {
return int(udp.Length), remoteAddr, nil return int(udp.Length), remoteAddr, nil
} }
// WriteTo builds a UDP packet and writes it using the specific IP version writter // WriteTo builds a UDP packet and writes it using the specific IP version writer
func (s *SharedSocket) WriteTo(buf []byte, rAddr net.Addr) (n int, err error) { func (s *SharedSocket) WriteTo(buf []byte, rAddr net.Addr) (n int, err error) {
rUDPAddr, ok := rAddr.(*net.UDPAddr) rUDPAddr, ok := rAddr.(*net.UDPAddr)
if !ok { if !ok {

View File

@ -260,7 +260,7 @@ func (c *GrpcClient) SendToStream(msg *proto.EncryptedMessage) error {
return fmt.Errorf("no connection to signal") return fmt.Errorf("no connection to signal")
} }
if c.stream == nil { if c.stream == nil {
return fmt.Errorf("connection to the Signal Exchnage has not been established yet. Please call GrpcClient.Receive before sending messages") return fmt.Errorf("connection to the Signal Exchange has not been established yet. Please call GrpcClient.Receive before sending messages")
} }
err := c.stream.Send(msg) err := c.stream.Send(msg)