Skip to content

Commit 250426b

Browse files
committed
codespell
1 parent 8f4827c commit 250426b

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

CHANGELOG.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -411,7 +411,7 @@ This is a major release with **BREAKING** changes. Please make sure to review th
411411
* **New feature**: The new setting `ERROR_RESPONSE_WITH_SCOPES` can now be set to True to include required
412412
scopes when DRF authorization fails due to improper scopes.
413413
* **New feature**: The new setting `REFRESH_TOKEN_GRACE_PERIOD_SECONDS` controls a grace period during which
414-
refresh tokens may be re-used.
414+
refresh tokens may be reused.
415415
* An `app_authorized` signal is fired when a token is generated.
416416

417417
## 1.0.0 [2017-06-07]

tests/test_authorization_code.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -989,7 +989,7 @@ def test_refresh_fail_repeating_requests(self):
989989
def test_refresh_repeating_requests_revokes_old_token(self):
990990
"""
991991
If a refresh token is reused, the server should invalidate *all* access tokens that have a relation
992-
to the re-used token. This forces a malicious actor to be logged out.
992+
to the reused token. This forces a malicious actor to be logged out.
993993
The server can't determine whether the first or the second client was legitimate, so it needs to
994994
revoke both.
995995
See https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-29#name-recommendations

0 commit comments

Comments
 (0)