Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 0adbbe1

Browse files
kianmengauvipy
authored andcommitted
docs: fix typos
1 parent 6569ec3 commit 0adbbe1

20 files changed

+27
-27
lines changed

CHANGELOG.rst

+3-3
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ OAuth1.0 Client:
146146
General fixes:
147147

148148
* $ and ' are allowed to be unencoded in query strings #564
149-
* Request attributes are no longer overriden by HTTP Headers #409
149+
* Request attributes are no longer overridden by HTTP Headers #409
150150
* Removed unnecessary code for handling python2.6
151151
* Add support of python3.7 #621
152152
* Several minors updates to setup.py and tox
@@ -204,7 +204,7 @@ General fixes:
204204
* Added log statements to except clauses.
205205
* According to RC7009 Section 2.1, a client should include authentication credentials when revoking its tokens.
206206
As discussed in #339, this is not make sense for public clients.
207-
However, in that case, the public client should still be checked that is infact a public client (authenticate_client_id).
207+
However, in that case, the public client should still be checked that is in fact a public client (authenticate_client_id).
208208
* Improved prompt parameter validation.
209209
* Added two error codes from RFC 6750.
210210
* Hybrid response types are now be fragment-encoded.
@@ -354,7 +354,7 @@ Quick fix. OAuth 1 client repr in 0.6.2 overwrote secrets when scrubbing for pri
354354
Draft revocation endpoint features and numerous fixes including:
355355

356356
* (OAuth 2 Provider) is_within_original_scope to check whether a refresh token
357-
is trying to aquire a new set of scopes that are a subset of the original scope.
357+
is trying to acquire a new set of scopes that are a subset of the original scope.
358358

359359
* (OAuth 2 Provider) expires_in token lifetime can be set per request.
360360

README.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ busy and therefore slow to reply but we love feedback!
103103

104104
Chances are you have run into something annoying that you wish there was
105105
documentation for, if you wish to gain eternal fame and glory, and a drink if we
106-
have the pleasure to run into eachother, please send a docs pull request =)
106+
have the pleasure to run into each other, please send a docs pull request =)
107107

108108
.. _`Gitter community`: https://gitter.im/oauthlib/Lobby
109109

docs/contributing.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,7 @@ Consolidated example
292292
:param client: User's defined Client object, see ``.authenticate_client``.
293293
:param bar: Another example.
294294
:param key: Another param.
295-
:return: Explaination of return value and type
295+
:return: Explanation of return value and type
296296
297297
.. _`MAC Access Authentication`: https://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-01
298298
"""

docs/faq.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ What does ValueError `Error trying to decode a non urlencoded string` mean?
4848
include non percent encoded characters such as `£`. Which could be because
4949
it has already been decoded by your web framework.
5050

51-
If you believe it contains characters that should be excempt from this
51+
If you believe it contains characters that should be exempt from this
5252
check please open an issue and state why.
5353

5454

docs/oauth1/security.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ A few important facts regarding OAuth security
55
SSL for all interactions both with your API as well as for setting up
66
tokens. An example of when it's especially bad is when sending POST
77
requests with form data, this data is not accounted for in the OAuth
8-
signature and a successfull man-in-the-middle attacker could swap your
8+
signature and a successful man-in-the-middle attacker could swap your
99
form data (or files) to whatever he pleases without invalidating the
1010
signature. This is an even bigger issue if you fail to check
1111
nonce/timestamp pairs for each request, allowing an attacker who

docs/oauth1/server.rst

+2-2
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The client interested in accessing protected resources.
5959

6060
**Client secret**:
6161
Required for HMAC-SHA1 and PLAINTEXT. The secret the client will use when
62-
verifying requests during the OAuth workflow. Has to be accesible as
62+
verifying requests during the OAuth workflow. Has to be accessible as
6363
plaintext (i.e. not hashed) since it is used to recreate and validate
6464
request signatured::
6565

@@ -175,7 +175,7 @@ you should consider expiring them as it increases security dramatically.
175175
The user and realms will need to be transferred from the request token to the
176176
access token. It is possible that the list of authorized realms is smaller
177177
than the list of requested realms. Clients can observe whether this is the case
178-
by comparing the `oauth_realms` parameter given in the token reponse. This way
178+
by comparing the `oauth_realms` parameter given in the token response. This way
179179
of indicating change of realms is backported from OAuth2 scope behaviour and is
180180
not in the OAuth 1 spec.
181181

docs/oauth2/endpoints/endpoints.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ Provider Endpoints
33

44
Endpoints in OAuth 2 are targets with a specific responsibility and often
55
associated with a particular URL. Because of this the word endpoint might be
6-
used interchangably from the endpoint url.
6+
used interchangeably from the endpoint url.
77

88
The main three responsibilities in an OAuth 2 flow is to authorize access to a
99
certain users resources to a client, to supply said client with a token

docs/oauth2/endpoints/resource.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Resource authorization
55
Resource endpoints verify that the token presented is valid and granted access
66
to the scopes associated with the resource in question.
77

8-
**Request Verfication**
8+
**Request Verification**
99
Each view may set certain scopes under which it is bound. Only requests
1010
that present an access token bound to the correct scopes may access the
1111
view. Access tokens are commonly embedded in the authorization header but

docs/oauth2/grants/custom_validators.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ Custom Validators
33

44
The Custom validators are useful when you want to change a particular
55
behavior of an existing grant. That is often needed because of the
6-
diversity of the identity softwares and to let the oauthlib framework to be
6+
diversity of the identity software and to let the oauthlib framework to be
77
flexible as possible.
88

99
However, if you are looking into writing a custom grant type, please

docs/oauth2/tokens/bearer.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ And you will find all claims in its decoded form:
7979
Sometime you may want to generate custom `access_token` with a reference from a
8080
database (as text) or use a HASH signature in JWT or use JWE (encrypted content).
8181

82-
Also, note that you can declare the generate function in your instanciated
82+
Also, note that you can declare the generate function in your instantiated
8383
validator to benefit of the `self` variables.
8484

8585
See the example below:

oauthlib/oauth1/rfc5849/endpoints/request_token.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ def validate_request_token_request(self, request):
152152
request.client_key = self.request_validator.dummy_client
153153

154154
# Note that `realm`_ is only used in authorization headers and how
155-
# it should be interepreted is not included in the OAuth spec.
155+
# it should be interpreted is not included in the OAuth spec.
156156
# However they could be seen as a scope or realm to which the
157157
# client has access and as such every client should be checked
158158
# to ensure it is authorized access to that scope or realm.
@@ -164,7 +164,7 @@ def validate_request_token_request(self, request):
164164
# workflow where a client requests access to a specific realm.
165165
# This first step (obtaining request token) need not require a realm
166166
# and can then be identified by checking the require_resource_owner
167-
# flag and abscence of realm.
167+
# flag and absence of realm.
168168
#
169169
# Clients obtaining an access token will not supply a realm and it will
170170
# not be checked. Instead the previously requested realm should be

oauthlib/oauth1/rfc5849/endpoints/resource.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ def validate_protected_resource_request(self, uri, http_method='GET',
113113
request.resource_owner_key = self.request_validator.dummy_access_token
114114

115115
# Note that `realm`_ is only used in authorization headers and how
116-
# it should be interepreted is not included in the OAuth spec.
116+
# it should be interpreted is not included in the OAuth spec.
117117
# However they could be seen as a scope or realm to which the
118118
# client has access and as such every client should be checked
119119
# to ensure it is authorized access to that scope or realm.
@@ -125,7 +125,7 @@ def validate_protected_resource_request(self, uri, http_method='GET',
125125
# workflow where a client requests access to a specific realm.
126126
# This first step (obtaining request token) need not require a realm
127127
# and can then be identified by checking the require_resource_owner
128-
# flag and abscence of realm.
128+
# flag and absence of realm.
129129
#
130130
# Clients obtaining an access token will not supply a realm and it will
131131
# not be checked. Instead the previously requested realm should be

oauthlib/oauth1/rfc5849/request_validator.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ class RequestValidator:
1919
Methods used to check the format of input parameters. Common tests include
2020
length, character set, membership, range or pattern. These tests are
2121
referred to as `whitelisting or blacklisting`_. Whitelisting is better
22-
but blacklisting can be usefull to spot malicious activity.
22+
but blacklisting can be useful to spot malicious activity.
2323
The following have methods a default implementation:
2424
2525
- check_client_key

oauthlib/oauth2/rfc6749/clients/base.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ def prepare_token_request(self, token_url, authorization_response=None,
267267
268268
:param token_url: Provider token creation endpoint URL.
269269
:param authorization_response: The full redirection URL string, i.e.
270-
the location to which the user was redirected after successfull
270+
the location to which the user was redirected after successful
271271
authorization. Used to mine credentials needed to obtain a token
272272
in this step, such as authorization code.
273273
:param redirect_url: The redirect_url supplied with the authorization

oauthlib/oauth2/rfc6749/clients/mobile_application.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ def prepare_request_uri(self, uri, redirect_uri=None, scope=None,
5555
using the "application/x-www-form-urlencoded" format, per `Appendix B`_:
5656
5757
:param redirect_uri: OPTIONAL. The redirect URI must be an absolute URI
58-
and it should have been registerd with the OAuth
58+
and it should have been registered with the OAuth
5959
provider prior to use. As described in `Section 3.1.2`_.
6060
6161
:param scope: OPTIONAL. The scope of the access request as described by

oauthlib/oauth2/rfc6749/clients/service_application.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ class ServiceApplicationClient(Client):
3131

3232
def __init__(self, client_id, private_key=None, subject=None, issuer=None,
3333
audience=None, **kwargs):
34-
"""Initalize a JWT client with defaults for implicit use later.
34+
"""Initialize a JWT client with defaults for implicit use later.
3535
3636
:param client_id: Client identifier given by the OAuth provider upon
3737
registration.

oauthlib/oauth2/rfc6749/clients/web_application.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ def prepare_request_uri(self, uri, redirect_uri=None, scope=None,
4949
using the "application/x-www-form-urlencoded" format, per `Appendix B`_:
5050
5151
:param redirect_uri: OPTIONAL. The redirect URI must be an absolute URI
52-
and it should have been registerd with the OAuth
52+
and it should have been registered with the OAuth
5353
provider prior to use. As described in `Section 3.1.2`_.
5454
5555
:param scope: OPTIONAL. The scope of the access request as described by

oauthlib/oauth2/rfc6749/endpoints/revocation.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ def validate_revocation_request(self, request):
9595
submitted for revocation. Clients MAY pass this parameter in order to
9696
help the authorization server to optimize the token lookup. If the
9797
server is unable to locate the token using the given hint, it MUST
98-
extend its search accross all of its supported token types. An
98+
extend its search across all of its supported token types. An
9999
authorization server MAY ignore this parameter, particularly if it is
100100
able to detect the token type automatically. This specification
101101
defines two such values:

oauthlib/oauth2/rfc6749/request_validator.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ def introspect_token(self, token, token_type_hint, request, *args, **kwargs):
208208
can be found in `Introspect Claims`_ or `JWT Claims`_.
209209
210210
The implementation can use *token_type_hint* to improve lookup
211-
efficency, but must fallback to other types to be compliant with RFC.
211+
efficiency, but must fallback to other types to be compliant with RFC.
212212
213213
The dict of claims is added to request.token after this method.
214214
@@ -564,7 +564,7 @@ def validate_user(self, username, password, client, request, *args, **kwargs):
564564
OBS! The validation should also set the user attribute of the request
565565
to a valid resource owner, i.e. request.user = username or similar. If
566566
not set you will be unable to associate a token with a user in the
567-
persistance method used (commonly, save_bearer_token).
567+
persistence method used (commonly, save_bearer_token).
568568
569569
:param username: Unicode username.
570570
:param password: Unicode password.

tox.ini

+2-2
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ commands=
88
pytest --cov=oauthlib tests/
99

1010

11-
# tox -e docs to mimick readthedocs build.
11+
# tox -e docs to mimic readthedocs build.
1212
# as of today, RTD is using python3.7 and doesn't run "setup.py install"
1313
[testenv:docs]
1414
basepython=python3.7
@@ -20,7 +20,7 @@ changedir=docs
2020
whitelist_externals=make
2121
commands=make clean html
2222

23-
# tox -e readme to mimick PyPI long_description check
23+
# tox -e readme to mimic PyPI long_description check
2424
[testenv:readme]
2525
basepython=python3.8
2626
deps=twine>=1.12.0

0 commit comments

Comments
 (0)