File tree Expand file tree Collapse file tree 2 files changed +2
-2
lines changed Expand file tree Collapse file tree 2 files changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -411,7 +411,7 @@ This is a major release with **BREAKING** changes. Please make sure to review th
411411* ** New feature** : The new setting ` ERROR_RESPONSE_WITH_SCOPES ` can now be set to True to include required
412412 scopes when DRF authorization fails due to improper scopes.
413413* ** New feature** : The new setting ` REFRESH_TOKEN_GRACE_PERIOD_SECONDS ` controls a grace period during which
414- refresh tokens may be re-used .
414+ refresh tokens may be reused .
415415* An ` app_authorized ` signal is fired when a token is generated.
416416
417417## 1.0.0 [ 2017-06-07]
Original file line number Diff line number Diff line change @@ -989,7 +989,7 @@ def test_refresh_fail_repeating_requests(self):
989989 def test_refresh_repeating_requests_revokes_old_token (self ):
990990 """
991991 If a refresh token is reused, the server should invalidate *all* access tokens that have a relation
992- to the re-used token. This forces a malicious actor to be logged out.
992+ to the reused token. This forces a malicious actor to be logged out.
993993 The server can't determine whether the first or the second client was legitimate, so it needs to
994994 revoke both.
995995 See https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-29#name-recommendations
You can’t perform that action at this time.
0 commit comments