From 51272cb6cd65aaae4842009a6176260c579dd48a Mon Sep 17 00:00:00 2001
From: rswindell <>
Date: Sun, 1 Apr 2018 02:21:41 +0000
Subject: [PATCH] Fixed some typos. Added node address to some authentication
 failure warnings.

---
 exec/load/fido_syscfg.js | 16 ++++++++--------
 1 file changed, 8 insertions(+), 8 deletions(-)

diff --git a/exec/load/fido_syscfg.js b/exec/load/fido_syscfg.js
index e32c4bc1f8..1f362dfe3d 100644
--- a/exec/load/fido_syscfg.js
+++ b/exec/load/fido_syscfg.js
@@ -7,10 +7,10 @@
  *					TODO: SBBSecho supports per-node inbound via fileboxes... a method to get the inbound for a node should exist
  * secure_inbound	secure inbound directory path
  *					TODO: SBBSecho supports per-node inbound via fileboxes... a method to get the inbound for a node should exist
- * outbound			default oubound path, may end with a path separator
+ * outbound			default outbound path, may end with a path separator
  *					TODO: SBBSecho supports per-node outbound via fileboxes... a method to get the outbound for a node should exist
  * is_flow			boolean indicating it is a FLO style mailer... most things will require this to be true
- * pktpass{}		object with a separate property for each node addres (wildcards included as "ALL").
+ * pktpass{}		object with a separate property for each node address (wildcards included as "ALL").
  *					Should be accessed using get_pw() and match_pw() methods.
  *
  * SBBSEchoCfg Methods:
@@ -98,17 +98,17 @@ SBBSEchoCfg.prototype.match_ticpw = function(node, pw)
 	if (ticpw === undefined || ticpw == '') {
 		if (pw === '' || pw === undefined)
 			return true;
-		log(LOG_WARNING, "Configued TicFilePwd is empty, but TIC file has a password");
+		log(LOG_WARNING, "Configured TicFilePwd is empty, but TIC file has a password, node: " + node);
 		return false;
 	}
 	if (pw === undefined || pw === '') {
-		log(LOG_WARNING, "TicFilePwd ("+ticpw+") configured, but TIC file has no password");
+		log(LOG_WARNING, "TicFilePwd ("+ticpw+") configured, but TIC file has no password, node: " + node);
 		return false;
 	}
 	if (pw.toUpperCase() === ticpw.toUpperCase())
 		return true;
 
-	log(LOG_WARNING, "Incorrect TIC password "+pw+" (expected "+ticpw+")");
+	log(LOG_WARNING, "Incorrect TIC password "+pw+" (expected "+ticpw+"), node: " + node);
 	return false;
 };
 SBBSEchoCfg.prototype.match_pw = function(node, pw)
@@ -118,17 +118,17 @@ SBBSEchoCfg.prototype.match_pw = function(node, pw)
 	if (pktpw === undefined || pktpw == '') {
 		if (pw === '' || pw === undefined)
 			return true;
-		log(LOG_WARNING, "Configured packet password is empty, but packet has a password");
+		log(LOG_WARNING, "Configured packet password is empty, but packet has a password, node: " + node);
 		return false;
 	}
 	if (pw === undefined || pw === '') {
-		log(LOG_WARNING, "Configured packet password ("+pktpw+") configured, but packet has no password");
+		log(LOG_WARNING, "Configured packet password ("+pktpw+") configured, but packet has no password, node: " + node);
 		return false;
 	}
 	if (pw.toUpperCase() === pktpw.toUpperCase())
 		return true;
 
-	log(LOG_WARNING, "Incorrect packet password "+pw+" (expected "+pktpw+")");
+	log(LOG_WARNING, "Incorrect packet password "+pw+" (expected "+pktpw+"), node: " + node);
 	return false;
 };
 
-- 
GitLab