@@ -46,17 +46,17 @@ func consoleOutput(call otto.FunctionCall) otto.Value {
4646 return otto.Value {}
4747}
4848
49- // rulesetUi provides an implementation of SignerUI that evaluates a javascript
49+ // rulesetUI provides an implementation of SignerUI that evaluates a javascript
5050// file for each defined UI-method
51- type rulesetUi struct {
51+ type rulesetUI struct {
5252 next core.SignerUI // The next handler, for manual processing
5353 storage storage.Storage
5454 credentials storage.Storage
5555 jsRules string // The rules to use
5656}
5757
58- func NewRuleEvaluator (next core.SignerUI , jsbackend , credentialsBackend storage.Storage ) (* rulesetUi , error ) {
59- c := & rulesetUi {
58+ func NewRuleEvaluator (next core.SignerUI , jsbackend , credentialsBackend storage.Storage ) (* rulesetUI , error ) {
59+ c := & rulesetUI {
6060 next : next ,
6161 storage : jsbackend ,
6262 credentials : credentialsBackend ,
@@ -66,11 +66,11 @@ func NewRuleEvaluator(next core.SignerUI, jsbackend, credentialsBackend storage.
6666 return c , nil
6767}
6868
69- func (r * rulesetUi ) Init (javascriptRules string ) error {
69+ func (r * rulesetUI ) Init (javascriptRules string ) error {
7070 r .jsRules = javascriptRules
7171 return nil
7272}
73- func (r * rulesetUi ) execute (jsfunc string , jsarg interface {}) (otto.Value , error ) {
73+ func (r * rulesetUI ) execute (jsfunc string , jsarg interface {}) (otto.Value , error ) {
7474
7575 // Instantiate a fresh vm engine every time
7676 vm := otto .New ()
@@ -115,7 +115,7 @@ func (r *rulesetUi) execute(jsfunc string, jsarg interface{}) (otto.Value, error
115115 return vm .Run (call )
116116}
117117
118- func (r * rulesetUi ) checkApproval (jsfunc string , jsarg []byte , err error ) (bool , error ) {
118+ func (r * rulesetUI ) checkApproval (jsfunc string , jsarg []byte , err error ) (bool , error ) {
119119 if err != nil {
120120 return false , err
121121 }
@@ -139,7 +139,7 @@ func (r *rulesetUi) checkApproval(jsfunc string, jsarg []byte, err error) (bool,
139139 return false , fmt .Errorf ("Unknown response" )
140140}
141141
142- func (r * rulesetUi ) ApproveTx (request * core.SignTxRequest ) (core.SignTxResponse , error ) {
142+ func (r * rulesetUI ) ApproveTx (request * core.SignTxRequest ) (core.SignTxResponse , error ) {
143143 jsonreq , err := json .Marshal (request )
144144 approved , err := r .checkApproval ("ApproveTx" , jsonreq , err )
145145 if err != nil {
@@ -158,11 +158,11 @@ func (r *rulesetUi) ApproveTx(request *core.SignTxRequest) (core.SignTxResponse,
158158 return core.SignTxResponse {Approved : false }, err
159159}
160160
161- func (r * rulesetUi ) lookupPassword (address common.Address ) string {
161+ func (r * rulesetUI ) lookupPassword (address common.Address ) string {
162162 return r .credentials .Get (strings .ToLower (address .String ()))
163163}
164164
165- func (r * rulesetUi ) ApproveSignData (request * core.SignDataRequest ) (core.SignDataResponse , error ) {
165+ func (r * rulesetUI ) ApproveSignData (request * core.SignDataRequest ) (core.SignDataResponse , error ) {
166166 jsonreq , err := json .Marshal (request )
167167 approved , err := r .checkApproval ("ApproveSignData" , jsonreq , err )
168168 if err != nil {
@@ -175,7 +175,7 @@ func (r *rulesetUi) ApproveSignData(request *core.SignDataRequest) (core.SignDat
175175 return core.SignDataResponse {Approved : false , Password : "" }, err
176176}
177177
178- func (r * rulesetUi ) ApproveExport (request * core.ExportRequest ) (core.ExportResponse , error ) {
178+ func (r * rulesetUI ) ApproveExport (request * core.ExportRequest ) (core.ExportResponse , error ) {
179179 jsonreq , err := json .Marshal (request )
180180 approved , err := r .checkApproval ("ApproveExport" , jsonreq , err )
181181 if err != nil {
@@ -188,13 +188,13 @@ func (r *rulesetUi) ApproveExport(request *core.ExportRequest) (core.ExportRespo
188188 return core.ExportResponse {Approved : false }, err
189189}
190190
191- func (r * rulesetUi ) ApproveImport (request * core.ImportRequest ) (core.ImportResponse , error ) {
191+ func (r * rulesetUI ) ApproveImport (request * core.ImportRequest ) (core.ImportResponse , error ) {
192192 // This cannot be handled by rules, requires setting a password
193193 // dispatch to next
194194 return r .next .ApproveImport (request )
195195}
196196
197- func (r * rulesetUi ) ApproveListing (request * core.ListRequest ) (core.ListResponse , error ) {
197+ func (r * rulesetUI ) ApproveListing (request * core.ListRequest ) (core.ListResponse , error ) {
198198 jsonreq , err := json .Marshal (request )
199199 approved , err := r .checkApproval ("ApproveListing" , jsonreq , err )
200200 if err != nil {
@@ -207,22 +207,22 @@ func (r *rulesetUi) ApproveListing(request *core.ListRequest) (core.ListResponse
207207 return core.ListResponse {}, err
208208}
209209
210- func (r * rulesetUi ) ApproveNewAccount (request * core.NewAccountRequest ) (core.NewAccountResponse , error ) {
210+ func (r * rulesetUI ) ApproveNewAccount (request * core.NewAccountRequest ) (core.NewAccountResponse , error ) {
211211 // This cannot be handled by rules, requires setting a password
212212 // dispatch to next
213213 return r .next .ApproveNewAccount (request )
214214}
215215
216- func (r * rulesetUi ) ShowError (message string ) {
216+ func (r * rulesetUI ) ShowError (message string ) {
217217 log .Error (message )
218218 r .next .ShowError (message )
219219}
220220
221- func (r * rulesetUi ) ShowInfo (message string ) {
221+ func (r * rulesetUI ) ShowInfo (message string ) {
222222 log .Info (message )
223223 r .next .ShowInfo (message )
224224}
225- func (r * rulesetUi ) OnSignerStartup (info core.StartupInfo ) {
225+ func (r * rulesetUI ) OnSignerStartup (info core.StartupInfo ) {
226226 jsonInfo , err := json .Marshal (info )
227227 if err != nil {
228228 log .Warn ("failed marshalling data" , "data" , info )
@@ -235,7 +235,7 @@ func (r *rulesetUi) OnSignerStartup(info core.StartupInfo) {
235235 }
236236}
237237
238- func (r * rulesetUi ) OnApprovedTx (tx ethapi.SignTransactionResult ) {
238+ func (r * rulesetUI ) OnApprovedTx (tx ethapi.SignTransactionResult ) {
239239 jsonTx , err := json .Marshal (tx )
240240 if err != nil {
241241 log .Warn ("failed marshalling transaction" , "tx" , tx )
0 commit comments