Typo (#2302)
This commit is contained in:
parent
759a006ae9
commit
779fd983e5
|
@ -3063,7 +3063,7 @@ sub sendSLOErrorResponse {
|
|||
"Could not set empty session in logout object", 500 );
|
||||
}
|
||||
|
||||
# Send unvalidated SLO response
|
||||
# Send invalidated SLO response
|
||||
return $self->sendLogoutResponseToServiceProvider( $req, $logout, $method );
|
||||
}
|
||||
|
||||
|
|
|
@ -234,7 +234,7 @@ sub _certificateReset {
|
|||
);
|
||||
if ( my $error = $self->p->process( $req, useMail => $searchByMail ) ) {
|
||||
if ( $error == PE_USERNOTFOUND or $error == PE_BADCREDENTIALS ) {
|
||||
$self->userLogger->warn( 'Reset asked for an unvalid user ('
|
||||
$self->userLogger->warn( 'Reset asked for an invalid user ('
|
||||
. $req->param('mail')
|
||||
. ')' );
|
||||
|
||||
|
|
|
@ -274,7 +274,7 @@ sub check {
|
|||
$self->logger->info("\"$user\" is an unrestricted user!") if $unUser;
|
||||
unless ( $unUser || $self->idRule->( $req, $attrs ) ) {
|
||||
$self->userLogger->warn(
|
||||
"checkUser requested for an unvalid user ($user)");
|
||||
"checkUser requested for an invalid user ($user)");
|
||||
$req->{sessionInfo} = {};
|
||||
$self->logger->debug('Identity not authorized');
|
||||
$req->error(PE_BADCREDENTIALS)
|
||||
|
@ -427,7 +427,7 @@ sub _userData {
|
|||
if ( my $error = $self->p->process($req) ) {
|
||||
if ( $error == PE_BADCREDENTIALS ) {
|
||||
$self->userLogger->warn(
|
||||
'checkUser requested for an unvalid user ('
|
||||
'checkUser requested for an invalid user ('
|
||||
. $req->{user}
|
||||
. ")" );
|
||||
}
|
||||
|
|
|
@ -216,7 +216,7 @@ sub _switchContext {
|
|||
);
|
||||
if ( my $error = $self->p->process($req) ) {
|
||||
$self->userLogger->warn(
|
||||
'ContextSwitching requested for an unvalid user ('
|
||||
'ContextSwitching requested for an invalid user ('
|
||||
. $req->{user}
|
||||
. ")" )
|
||||
if ( $error == PE_BADCREDENTIALS );
|
||||
|
@ -229,7 +229,7 @@ sub _switchContext {
|
|||
$self->logger->info("\"$realId\" is an unrestricted user!") if $unUser;
|
||||
unless ( $unUser || $self->idRule->( $req, $req->sessionInfo ) ) {
|
||||
$self->userLogger->warn(
|
||||
'ContextSwitching requested for an unvalid user ('
|
||||
'ContextSwitching requested for an invalid user ('
|
||||
. $req->{user}
|
||||
. ")" );
|
||||
$self->logger->debug('Identity NOT authorized');
|
||||
|
|
|
@ -139,7 +139,7 @@ sub globalLogout {
|
|||
}
|
||||
else {
|
||||
$self->userLogger->warn(
|
||||
"GlobalLogout called with an unvalid token");
|
||||
"GlobalLogout called with an invalid token");
|
||||
$res = PE_TOKENEXPIRED;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -215,7 +215,7 @@ sub _userData {
|
|||
if ( my $error = $self->p->process($req) ) {
|
||||
if ( $error == PE_BADCREDENTIALS ) {
|
||||
$self->userLogger->warn(
|
||||
'Impersonation requested for an unvalid user ('
|
||||
'Impersonation requested for an invalid user ('
|
||||
. $req->{user}
|
||||
. ")" );
|
||||
}
|
||||
|
@ -229,7 +229,7 @@ sub _userData {
|
|||
$self->logger->info("\"$realId\" is an unrestricted user!") if $unUser;
|
||||
unless ( $unUser || $self->idRule->( $req, $req->sessionInfo ) ) {
|
||||
$self->userLogger->warn(
|
||||
'Impersonation requested for an unvalid user ('
|
||||
'Impersonation requested for an invalid user ('
|
||||
. $req->{user}
|
||||
. ")" );
|
||||
$self->logger->debug('Identity NOT authorized');
|
||||
|
|
|
@ -194,7 +194,7 @@ sub _reset {
|
|||
);
|
||||
if ( my $error = $self->p->process( $req, useMail => $searchByMail ) ) {
|
||||
if ( $error == PE_USERNOTFOUND or $error == PE_BADCREDENTIALS ) {
|
||||
$self->userLogger->warn( 'Reset asked for an unvalid user ('
|
||||
$self->userLogger->warn( 'Reset asked for an invalid user ('
|
||||
. $req->param('mail')
|
||||
. ')' );
|
||||
|
||||
|
|
|
@ -163,7 +163,7 @@ sub removeOther {
|
|||
}
|
||||
else {
|
||||
$self->userLogger->warn(
|
||||
"SingleSession called with an unvalid token");
|
||||
"SingleSession called with an invalid token");
|
||||
$res = PE_TOKENEXPIRED;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -55,7 +55,7 @@ expectOK($res);
|
|||
my $id = expectCookie($res);
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/', cookie => "lemonldap=$id",
|
||||
|
@ -82,7 +82,7 @@ expectOK($res);
|
|||
$id = expectCookie($res);
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/', cookie => "lemonldap=$id",
|
||||
|
|
|
@ -64,7 +64,7 @@ SKIP: {
|
|||
my $id = expectCookie($res);
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/', cookie => "lemonldap=$id",
|
||||
|
@ -90,7 +90,7 @@ SKIP: {
|
|||
$id = expectCookie($res);
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1', 'reference1x2' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/', cookie => "lemonldap=$id",
|
||||
|
|
|
@ -137,7 +137,7 @@ q{INSERT INTO notifications VALUES ('rtyler','testref2','2050-05-30 00:00:00',?,
|
|||
or print STDERR Dumper( $res->[2]->[0] );
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1', 'url' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/',
|
||||
|
|
|
@ -59,7 +59,7 @@ expectOK($res);
|
|||
my $id = expectCookie($res);
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1', 'url' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/',
|
||||
|
|
|
@ -51,7 +51,7 @@ expectOK($res);
|
|||
my $id = expectCookie($res);
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1', 'url' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/',
|
||||
|
@ -97,7 +97,7 @@ expectOK($res);
|
|||
$id = expectCookie($res);
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1', 'url' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/',
|
||||
|
|
|
@ -145,7 +145,7 @@ SKIP: {
|
|||
or print STDERR Dumper( $res->[2]->[0] );
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1', 'url' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/',
|
||||
|
|
|
@ -108,7 +108,7 @@ qq{INSERT INTO notifications VALUES ('rtyler','testref2','2050-05-30 00:00:00','
|
|||
ok( $res->[2]->[0] =~ /1x1x1/, ' Found ref' );
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1', 'url' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/',
|
||||
|
|
|
@ -56,7 +56,7 @@ SKIP: {
|
|||
my $id = expectCookie($res);
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1', 'url' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/',
|
||||
|
@ -102,7 +102,7 @@ SKIP: {
|
|||
$id = expectCookie($res);
|
||||
expectForm( $res, undef, '/notifback', 'reference1x1', 'url' );
|
||||
|
||||
# Verify that cookie is ciphered (session unvalid)
|
||||
# Verify that cookie is ciphered (session invalid)
|
||||
ok(
|
||||
$res = $client->_get(
|
||||
'/',
|
||||
|
|
|
@ -128,7 +128,7 @@ count(2);
|
|||
( $host, $url, $query ) =
|
||||
expectForm( $res, undef, '/decryptvalue', 'cipheredValue', 'token' );
|
||||
|
||||
# Unvalid ciphered value
|
||||
# invalid ciphered value
|
||||
$query =~ s%cipheredValue=%cipheredValue=test%;
|
||||
ok(
|
||||
$res = $client->_post(
|
||||
|
@ -138,7 +138,7 @@ ok(
|
|||
length => length($query),
|
||||
accept => 'text/html',
|
||||
),
|
||||
'POST decryptvalue with unvalid value'
|
||||
'POST decryptvalue with invalid value'
|
||||
);
|
||||
ok( $res->[2]->[0] =~ m%<span trspan="notAnEncryptedValue">%,
|
||||
'Found trspan="notAnEncryptedValue"' )
|
||||
|
|
|
@ -540,7 +540,7 @@ m%<div class="alert alert-warning alert"><div class="text-center"><span trspan="
|
|||
) or explain( $res->[2]->[0], 'PE5 - Unknown identity' );
|
||||
count(2);
|
||||
|
||||
# Request an unvalid identity
|
||||
# Request an invalid identity
|
||||
$query =~ s/user=dwho/user=%*'/;
|
||||
ok(
|
||||
$res = $client->_post(
|
||||
|
@ -556,7 +556,7 @@ ok(
|
|||
$res->[2]->[0] =~
|
||||
m%<div class="alert alert-warning alert"><div class="text-center"><span trspan="PE5"></span></div></div>%,
|
||||
' PE5 found'
|
||||
) or explain( $res->[2]->[0], 'PE5 - Unvalid identity' );
|
||||
) or explain( $res->[2]->[0], 'PE5 - invalid identity' );
|
||||
count(2);
|
||||
|
||||
$client->logout($id);
|
||||
|
|
Loading…
Reference in New Issue