mirror of
				https://github.com/Blah-IM/blahrs.git
				synced 2025-10-31 02:31:37 +00:00 
			
		
		
		
	Fix typos
This commit is contained in:
		
							parent
							
								
									42a778bef2
								
							
						
					
					
						commit
						263c0ca44b
					
				
					 6 changed files with 11 additions and 11 deletions
				
			
		|  | @ -29,5 +29,5 @@ max_request_len = 4096 | |||
| # Maximum length of a single event queue. | ||||
| event_queue_len = 1024 | ||||
| 
 | ||||
| # The maximum timestamp tolerence in seconds for request validation. | ||||
| timestamp_tolerence_secs = 90 | ||||
| # The maximum timestamp tolerance in seconds for request validation. | ||||
| timestamp_tolerance_secs = 90 | ||||
|  |  | |||
|  | @ -75,7 +75,7 @@ paths: | |||
|       description: | | ||||
|         Return chat items in reversed time order, up to PAGE_LEN items. | ||||
|         The last (oldest) chat id can be used as query parameter for the next | ||||
|         GET, to repeatly fetch full history. | ||||
|         GET, to repeatedly fetch full history. | ||||
|       headers: | ||||
|         Authorization: | ||||
|           description: Proof of membership for private rooms. | ||||
|  |  | |||
|  | @ -34,7 +34,7 @@ pub struct ServerConfig { | |||
|     pub event_queue_len: usize, | ||||
| 
 | ||||
|     #[serde_inline_default(90)] | ||||
|     pub timestamp_tolerence_secs: u64, | ||||
|     pub timestamp_tolerance_secs: u64, | ||||
| } | ||||
| 
 | ||||
| impl Config { | ||||
|  |  | |||
|  | @ -103,7 +103,7 @@ impl AppState { | |||
|             conn: Mutex::new(conn), | ||||
|             room_listeners: Mutex::new(HashMap::new()), | ||||
|             used_nonces: Mutex::new(ExpiringSet::new(Duration::from_secs( | ||||
|                 config.server.timestamp_tolerence_secs, | ||||
|                 config.server.timestamp_tolerance_secs, | ||||
|             ))), | ||||
| 
 | ||||
|             config, | ||||
|  | @ -123,7 +123,7 @@ impl AppState { | |||
|             .expect("after UNIX epoch") | ||||
|             .as_secs() | ||||
|             .abs_diff(data.signee.timestamp); | ||||
|         if timestamp_diff > self.config.server.timestamp_tolerence_secs { | ||||
|         if timestamp_diff > self.config.server.timestamp_tolerance_secs { | ||||
|             return Err(error_response!( | ||||
|                 StatusCode::BAD_REQUEST, | ||||
|                 "invalid_timestamp", | ||||
|  | @ -160,7 +160,7 @@ async fn main_async(st: AppState) -> Result<()> { | |||
|         .route("/room/:ruuid/item", get(room_get_item).post(room_post_item)) | ||||
|         .route("/room/:ruuid/admin", post(room_admin)) | ||||
|         .with_state(st.clone()) | ||||
|         // NB. This comes at last (outmost layer), so inner errors will still be wraped with
 | ||||
|         // NB. This comes at last (outmost layer), so inner errors will still be wrapped with
 | ||||
|         // correct CORS headers.
 | ||||
|         .layer(tower_http::limit::RequestBodyLimitLayer::new( | ||||
|             st.config.server.max_request_len, | ||||
|  |  | |||
|  | @ -90,10 +90,10 @@ async function generateKeypair() { | |||
|     joinRoomBtn.disabled = false; | ||||
| 
 | ||||
|     try { | ||||
|         const ser = (k) => crypto.subtle.exportKey('jwk', k); | ||||
|         const serialize = (k) => crypto.subtle.exportKey('jwk', k); | ||||
|         localStorage.setItem('keypair', JSON.stringify({ | ||||
|             publicKey: await ser(keypair.publicKey), | ||||
|             privateKey: await ser(keypair.privateKey), | ||||
|             publicKey: await serialize(keypair.publicKey), | ||||
|             privateKey: await serialize(keypair.privateKey), | ||||
|         })); | ||||
|     } catch (e) { | ||||
|         console.error(e); | ||||
|  |  | |||
|  | @ -68,7 +68,7 @@ impl<T: Serialize> WithSig<T> { | |||
| 
 | ||||
|     /// Verify `sig` is valid for `signee`.
 | ||||
|     ///
 | ||||
|     /// Note that this does nott check validity of timestamp and other data.
 | ||||
|     /// Note that this does not check validity of timestamp and other data.
 | ||||
|     pub fn verify(&self) -> Result<(), SignatureError> { | ||||
|         let canonical_signee = serde_jcs::to_vec(&self.signee).expect("serialization cannot fail"); | ||||
|         let sig = Signature::from_bytes(&self.sig); | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue
	
	 oxalica
						oxalica