From d6bd672eb8941ef3705d029b8a0cc5c6c8207e24 Mon Sep 17 00:00:00 2001 From: laurentsimon <64505099+laurentsimon@users.noreply.github.com> Date: Fri, 2 Dec 2022 10:06:23 -0800 Subject: [PATCH] Update verifiers/internal/gcb/provenance.go Co-authored-by: asraa Signed-off-by: laurentsimon <64505099+laurentsimon@users.noreply.github.com> --- verifiers/internal/gcb/provenance.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/verifiers/internal/gcb/provenance.go b/verifiers/internal/gcb/provenance.go index 5789eaae4..4e9de4be4 100644 --- a/verifiers/internal/gcb/provenance.go +++ b/verifiers/internal/gcb/provenance.go @@ -422,7 +422,7 @@ func decodeSignature(s string) ([]byte, []error) { // If std decoding failed, try URL decoding. // We try both because we encountered decoding failures - // during our tests. The DSSE documentation does not prescribes + // during our tests. The DSSE documentation does not prescribe // which encoding to use: `Either standard or URL-safe encoding is allowed`. // https://github.com/secure-systems-lab/dsse/blob/27ce241dec575998dee8967c3c76d4edd5d6ee73/envelope.md#standard-json-envelope. rsig, err = base64.URLEncoding.DecodeString(s)