fix: fix typos

This commit is contained in:
Stavros
2026-05-09 13:42:44 +03:00
parent 886f9a84d6
commit 02b48aa165
7 changed files with 12 additions and 18 deletions
+5 -5
View File
@@ -214,7 +214,7 @@ func (app *BootstrapApp) Setup() error {
return errors.New("no authentication providers configured") return errors.New("no authentication providers configured")
} }
for _, provider := range app.runtime.ConfiguredProviders { for _, provider := range configuredProviders {
app.log.App.Debug().Str("provider", provider.Name).Msg("Configured authentication provider") app.log.App.Debug().Str("provider", provider.Name).Msg("Configured authentication provider")
} }
@@ -238,7 +238,7 @@ func (app *BootstrapApp) Setup() error {
} }
// create err channel to listen for server errors // create err channel to listen for server errors
errChan := make(chan error, 1) errChan := make(chan error, 2)
// serve unix // serve unix
app.wg.Go(func() { app.wg.Go(func() {
@@ -317,7 +317,7 @@ func (app *BootstrapApp) serveUnix() error {
listener, err := net.Listen("unix", app.config.Server.SocketPath) listener, err := net.Listen("unix", app.config.Server.SocketPath)
if err != nil { if err != nil {
return fmt.Errorf("failed to create unix socket listner: %w", err) return fmt.Errorf("failed to create unix socket listener: %w", err)
} }
server := &http.Server{ server := &http.Server{
@@ -330,7 +330,7 @@ func (app *BootstrapApp) serveUnix() error {
go func() { go func() {
<-app.ctx.Done() <-app.ctx.Done()
app.log.App.Debug().Msg("Shutting down unix sokcet listener") app.log.App.Debug().Msg("Shutting down unix socket listener")
server.Close() server.Close()
listener.Close() listener.Close()
os.Remove(app.config.Server.SocketPath) os.Remove(app.config.Server.SocketPath)
@@ -338,7 +338,7 @@ func (app *BootstrapApp) serveUnix() error {
err = server.Serve(listener) err = server.Serve(listener)
if err != nil && (!errors.Is(err, net.ErrClosed) || !errors.Is(err, http.ErrServerClosed)) { if err != nil && !errors.Is(err, net.ErrClosed) && !errors.Is(err, http.ErrServerClosed) {
return fmt.Errorf("failed to start unix socket listener: %w", err) return fmt.Errorf("failed to start unix socket listener: %w", err)
} }
+1 -1
View File
@@ -19,7 +19,7 @@ func (app *BootstrapApp) setupServices() error {
useKubernetes := app.config.LabelProvider == "kubernetes" || useKubernetes := app.config.LabelProvider == "kubernetes" ||
(app.config.LabelProvider == "auto" && os.Getenv("KUBERNETES_SERVICE_HOST") != "") (app.config.LabelProvider == "auto" && os.Getenv("KUBERNETES_SERVICE_HOST") != "")
var labelProvider service.LabelProviderImpl var labelProvider service.LabelProvider
if useKubernetes { if useKubernetes {
app.log.App.Debug().Msg("Using Kubernetes label provider") app.log.App.Debug().Msg("Using Kubernetes label provider")
+1 -1
View File
@@ -86,7 +86,7 @@ func (controller *UserController) loginHandler(c *gin.Context) {
if errors.Is(err, service.ErrUserNotFound) { if errors.Is(err, service.ErrUserNotFound) {
controller.log.App.Warn().Str("username", req.Username).Msg("User not found during login attempt") controller.log.App.Warn().Str("username", req.Username).Msg("User not found during login attempt")
controller.auth.RecordLoginAttempt(req.Username, false) controller.auth.RecordLoginAttempt(req.Username, false)
controller.log.AuditLoginFailure(req.Username, "unkown", c.ClientIP(), "user not found") controller.log.AuditLoginFailure(req.Username, "unknown", c.ClientIP(), "user not found")
c.JSON(401, gin.H{ c.JSON(401, gin.H{
"status": 401, "status": 401,
"message": "Unauthorized", "message": "Unauthorized",
+1 -1
View File
@@ -121,7 +121,7 @@ func (c *UserContext) NewFromSession(session *repository.Session) (*UserContext,
Email: session.Email, Email: session.Email,
}, },
} }
// By default we assume an unkown name which is oauth // By default we assume an unknown name which is oauth
default: default:
c.Provider = ProviderOAuth c.Provider = ProviderOAuth
c.OAuth = &OAuthContext{ c.OAuth = &OAuthContext{
+3 -3
View File
@@ -7,19 +7,19 @@ import (
"github.com/tinyauthapp/tinyauth/internal/utils/logger" "github.com/tinyauthapp/tinyauth/internal/utils/logger"
) )
type LabelProviderImpl interface { type LabelProvider interface {
GetLabels(appDomain string) (*model.App, error) GetLabels(appDomain string) (*model.App, error)
} }
type AccessControlsService struct { type AccessControlsService struct {
log *logger.Logger log *logger.Logger
labelProvider *LabelProviderImpl labelProvider *LabelProvider
static map[string]model.App static map[string]model.App
} }
func NewAccessControlsService( func NewAccessControlsService(
log *logger.Logger, log *logger.Logger,
labelProvider *LabelProviderImpl, labelProvider *LabelProvider,
static map[string]model.App) *AccessControlsService { static map[string]model.App) *AccessControlsService {
return &AccessControlsService{ return &AccessControlsService{
log: log, log: log,
-6
View File
@@ -399,12 +399,6 @@ func (auth *AuthService) DeleteSession(ctx context.Context, uuid string) (*http.
auth.log.App.Error().Err(err).Str("uuid", uuid).Msg("Failed to delete session from database") auth.log.App.Error().Err(err).Str("uuid", uuid).Msg("Failed to delete session from database")
} }
err = auth.queries.DeleteSession(ctx, uuid)
if err != nil {
return nil, err
}
return &http.Cookie{ return &http.Cookie{
Name: auth.runtime.SessionCookieName, Name: auth.runtime.SessionCookieName,
Value: "", Value: "",
+1 -1
View File
@@ -33,7 +33,7 @@ func NewLogger() *Logger {
App: model.LogStreamConfig{ App: model.LogStreamConfig{
Enabled: true, Enabled: true,
}, },
// No reason to enabled audit by default since it will be surpressed by the log level // No reason to enabled audit by default since it will be suppressed by the log level
}, },
}, },
} }