Fossil SCM
Fix a typo in an internal function name. "logic" should be "login".
Commit
c921545bff3d7043913d3e2a943cea75295300222cd270f668b968809079ccfb
Parent
c19f782e54b47f4…
1 file changed
+2
-2
+2
-2
| --- src/login.c | ||
| +++ src/login.c | ||
| @@ -897,11 +897,11 @@ | ||
| 897 | 897 | |
| 898 | 898 | /* |
| 899 | 899 | ** Attempt to use Basic Authentication to establish the user. Return the |
| 900 | 900 | ** (non-zero) uid if successful. Return 0 if it does not work. |
| 901 | 901 | */ |
| 902 | -static int logic_basic_authentication(const char *zIpAddr){ | |
| 902 | +static int login_basic_authentication(const char *zIpAddr){ | |
| 903 | 903 | const char *zAuth = PD("HTTP_AUTHORIZATION", 0); |
| 904 | 904 | int i; |
| 905 | 905 | int uid = 0; |
| 906 | 906 | int nDecode = 0; |
| 907 | 907 | char *zDecode = 0; |
| @@ -1069,11 +1069,11 @@ | ||
| 1069 | 1069 | /* If the request didn't provide a login cookie or the login cookie didn't |
| 1070 | 1070 | ** match a known valid user, check the HTTP "Authorization" header and |
| 1071 | 1071 | ** see if those credentials are valid for a known user. |
| 1072 | 1072 | */ |
| 1073 | 1073 | if( uid==0 && db_get_boolean("http_authentication_ok",0) ){ |
| 1074 | - uid = logic_basic_authentication(zIpAddr); | |
| 1074 | + uid = login_basic_authentication(zIpAddr); | |
| 1075 | 1075 | } |
| 1076 | 1076 | |
| 1077 | 1077 | /* If no user found yet, try to log in as "nobody" */ |
| 1078 | 1078 | if( uid==0 ){ |
| 1079 | 1079 | uid = db_int(0, "SELECT uid FROM user WHERE login='nobody'"); |
| 1080 | 1080 |
| --- src/login.c | |
| +++ src/login.c | |
| @@ -897,11 +897,11 @@ | |
| 897 | |
| 898 | /* |
| 899 | ** Attempt to use Basic Authentication to establish the user. Return the |
| 900 | ** (non-zero) uid if successful. Return 0 if it does not work. |
| 901 | */ |
| 902 | static int logic_basic_authentication(const char *zIpAddr){ |
| 903 | const char *zAuth = PD("HTTP_AUTHORIZATION", 0); |
| 904 | int i; |
| 905 | int uid = 0; |
| 906 | int nDecode = 0; |
| 907 | char *zDecode = 0; |
| @@ -1069,11 +1069,11 @@ | |
| 1069 | /* If the request didn't provide a login cookie or the login cookie didn't |
| 1070 | ** match a known valid user, check the HTTP "Authorization" header and |
| 1071 | ** see if those credentials are valid for a known user. |
| 1072 | */ |
| 1073 | if( uid==0 && db_get_boolean("http_authentication_ok",0) ){ |
| 1074 | uid = logic_basic_authentication(zIpAddr); |
| 1075 | } |
| 1076 | |
| 1077 | /* If no user found yet, try to log in as "nobody" */ |
| 1078 | if( uid==0 ){ |
| 1079 | uid = db_int(0, "SELECT uid FROM user WHERE login='nobody'"); |
| 1080 |
| --- src/login.c | |
| +++ src/login.c | |
| @@ -897,11 +897,11 @@ | |
| 897 | |
| 898 | /* |
| 899 | ** Attempt to use Basic Authentication to establish the user. Return the |
| 900 | ** (non-zero) uid if successful. Return 0 if it does not work. |
| 901 | */ |
| 902 | static int login_basic_authentication(const char *zIpAddr){ |
| 903 | const char *zAuth = PD("HTTP_AUTHORIZATION", 0); |
| 904 | int i; |
| 905 | int uid = 0; |
| 906 | int nDecode = 0; |
| 907 | char *zDecode = 0; |
| @@ -1069,11 +1069,11 @@ | |
| 1069 | /* If the request didn't provide a login cookie or the login cookie didn't |
| 1070 | ** match a known valid user, check the HTTP "Authorization" header and |
| 1071 | ** see if those credentials are valid for a known user. |
| 1072 | */ |
| 1073 | if( uid==0 && db_get_boolean("http_authentication_ok",0) ){ |
| 1074 | uid = login_basic_authentication(zIpAddr); |
| 1075 | } |
| 1076 | |
| 1077 | /* If no user found yet, try to log in as "nobody" */ |
| 1078 | if( uid==0 ){ |
| 1079 | uid = db_int(0, "SELECT uid FROM user WHERE login='nobody'"); |
| 1080 |