diff --git a/bin/build_web_extensions b/bin/build_web_extensions index 63362c4..4d3ca0b 100755 --- a/bin/build_web_extensions +++ b/bin/build_web_extensions @@ -5,7 +5,7 @@ NOCOLOR='\033[0m' function print_error { echo -e "${RED}$1${NOCOLOR}" -} +} function check_current_directory_is_root { if [ ! -f README.md ]; then @@ -83,7 +83,7 @@ function increment_version { patch=$((patch + 1)) ;; esac - + new_version="$major.$minor.$patch" echo ${new_version} } diff --git a/bin/build_web_site b/bin/build_web_site index 196a489..4535fce 100755 --- a/bin/build_web_site +++ b/bin/build_web_site @@ -5,7 +5,7 @@ NOCOLOR='\033[0m' function print_error { echo -e "${RED}$1${NOCOLOR}" -} +} function check_current_directory_is_root { if [ ! -f README.md ]; then @@ -83,7 +83,7 @@ function increment_version { patch=$((patch + 1)) ;; esac - + new_version="$major.$minor.$patch" echo ${new_version} } diff --git a/cli/tests/test_functional.py b/cli/tests/test_functional.py index 5ccad7c..0936e01 100644 --- a/cli/tests/test_functional.py +++ b/cli/tests/test_functional.py @@ -19,7 +19,7 @@ class TestFunctional(unittest.TestCase): def test_length_range_type(self): self.assertEqual(range_type('5'), 5) - self.assertEqual(range_type('35'), 35) + self.assertEqual(range_type('35'), 35) with self.assertRaises(argparse.ArgumentTypeError): range_type('2') diff --git a/containers/backend/Dockerfile b/containers/backend/Dockerfile index 0688281..d567873 100644 --- a/containers/backend/Dockerfile +++ b/containers/backend/Dockerfile @@ -1,6 +1,6 @@ FROM python:3.6 LABEL maintainer="LessPass " -LABEL name="LessPass Backend" +LABEL name="LessPass Backend" RUN mkdir /opt/backend WORKDIR /opt/backend COPY requirements.txt /opt/backend diff --git a/containers/ssl/create_ca_and_ee.sh b/containers/ssl/create_ca_and_ee.sh index b8304b7..6013380 100755 --- a/containers/ssl/create_ca_and_ee.sh +++ b/containers/ssl/create_ca_and_ee.sh @@ -1,6 +1,6 @@ #!/usr/bin/env bash # This script will create a custom Certificate Authority (CA) and End Entity (EE) certificates. -# +# # for local development this should be fine and you can ignore certificate trust errors related to # an untrusted root. For public facing access, you can submit the generated lesspass.csr to a trusted # ca so that they can provide you with a trusted certificate to replace this development certificate. diff --git a/containers/webserver/Dockerfile b/containers/webserver/Dockerfile index 7e92a67..adde54e 100644 --- a/containers/webserver/Dockerfile +++ b/containers/webserver/Dockerfile @@ -1,6 +1,6 @@ FROM httpd:2.4 LABEL maintainer="LessPass " -LABEL name="LessPass Web Server" +LABEL name="LessPass Web Server" COPY ./httpd-default.conf /usr/local/apache2/conf/extra/httpd-default.conf COPY ./httpd.conf /usr/local/apache2/conf/httpd.conf diff --git a/mobile/android/app/src/main/java/com/lesspass/android/Crypto.java b/mobile/android/app/src/main/java/com/lesspass/android/Crypto.java index ce9b1e7..37596e9 100644 --- a/mobile/android/app/src/main/java/com/lesspass/android/Crypto.java +++ b/mobile/android/app/src/main/java/com/lesspass/android/Crypto.java @@ -15,9 +15,9 @@ public class Crypto { byte[] secretData = secret.getBytes(); byte[] saltData = salt.getBytes(); gen.init(secretData, saltData, iterations); - byte[] derivedKey = ((KeyParameter)gen.generateDerivedParameters(keyLength * 8)).getKey(); + byte[] derivedKey = ((KeyParameter)gen.generateDerivedParameters(keyLength * 8)).getKey(); return toHex(derivedKey); - } + } catch (Exception e){ throw new RuntimeException(e); } @@ -32,7 +32,7 @@ public class Crypto { byte[] result = new byte[hmac.getMacSize()]; hmac.doFinal(result, 0); return toHex(result); - } + } catch (Exception e){ throw new RuntimeException(e); } diff --git a/mobile/ios/LessPassModule.swift b/mobile/ios/LessPassModule.swift index 42fab77..2693892 100644 --- a/mobile/ios/LessPassModule.swift +++ b/mobile/ios/LessPassModule.swift @@ -78,9 +78,9 @@ extension Data { } func pbkdf2(hash: CCPBKDFAlgorithm, password: String, salt: String, keyByteCount: Int, rounds: Int) -> String? { - + guard let passwordData = password.data(using: .utf8), let saltData = salt.data(using: .utf8) else { return nil } - + var derivedKeyData = Data(repeating: 0, count: keyByteCount) let derivedCount = derivedKeyData.count let derivationStatus: Int32 = derivedKeyData.withUnsafeMutableBytes { derivedKeyBytes in @@ -111,7 +111,7 @@ class LessPassModule: NSObject { rejecter reject:RCTPromiseRejectBlock) -> Void { resolve("".hmac(algorithm: HMACAlgorithm.SHA256, key: masterPassword)) } - + @objc(calcEntropy:withLogin:withMasterPassword:withCounter:resolver:rejecter:) func calcEntropy(_ site: String, withLogin login: String, @@ -123,7 +123,7 @@ class LessPassModule: NSObject { let r = pbkdf2(hash: CCPBKDFAlgorithm(kCCPRFHmacAlgSHA256), password: masterPassword, salt: salt, keyByteCount: 32, rounds: 100000) resolve(r) } - + @objc static func requiresMainQueueSetup() -> Bool { return false diff --git a/packages/lesspass-site/Dockerfile b/packages/lesspass-site/Dockerfile index 4939720..6afa321 100644 --- a/packages/lesspass-site/Dockerfile +++ b/packages/lesspass-site/Dockerfile @@ -1,6 +1,6 @@ FROM node:lts AS builder LABEL maintainer="LessPass " -LABEL name="LessPass Frontend" +LABEL name="LessPass Frontend" WORKDIR /opt/frontend COPY package.json yarn.lock ./ RUN yarn install