Skip to content

Commit 2f64b96

Browse files
committed
removed references to syncdb
1 parent ca513fe commit 2f64b96

File tree

2 files changed

+11
-12
lines changed

2 files changed

+11
-12
lines changed

docs/install.rst

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@ Sync your database
2929

3030
.. sourcecode:: sh
3131

32-
$ python manage.py syncdb
3332
$ python manage.py migrate oauth2_provider
3433

3534
Next step is our :doc:`first tutorial <tutorial/tutorial_01>`.

docs/tutorial/tutorial_01.rst

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ You want to make your own :term:`Authorization Server` to issue access tokens to
88
Start Your App
99
--------------
1010
During this tutorial you will make an XHR POST from a Heroku deployed app to your localhost instance.
11-
Since the domain that will originate the request (the app on Heroku) is different than the destination domain (your local instance),
11+
Since the domain that will originate the request (the app on Heroku) is different than the destination domain (your local instance),
1212
you will need to install the `django-cors-headers <https://github.com/ottoyiu/django-cors-headers>`_ app.
1313
These "cross-domain" requests are by default forbidden by web browsers unless you use `CORS <http://en.wikipedia.org/wiki/Cross-origin_resource_sharing>`_.
1414

@@ -60,29 +60,29 @@ Allow CORS requests from all domains (just for the scope of this tutorial):
6060

6161
Include the required hidden input in your login template, `registration/login.html`.
6262
The ``{{ next }}`` template context variable will be populated with the correct
63-
redirect value. See the `Django documentation <https://docs.djangoproject.com/en/dev/topics/auth/default/#django.contrib.auth.views.login>`_
63+
redirect value. See the `Django documentation <https://docs.djangoproject.com/en/dev/topics/auth/default/#django.contrib.auth.views.login>`_
6464
for details on using login templates.
6565

6666
.. code-block:: html
6767

6868
<input type="hidden" name="next" value="{{ next }}" />
6969

70-
As a final step, execute syncdb, start the internal server, and login with your credentials.
70+
As a final step, execute migrate command, start the internal server, and login with your credentials.
7171

7272
Create an OAuth2 Client Application
7373
-----------------------------------
74-
Before your :term:`Application` can use the :term:`Authorization Server` for user login,
75-
you must first register the app (also known as the :term:`Client`.) Once registered, your app will be granted access to
74+
Before your :term:`Application` can use the :term:`Authorization Server` for user login,
75+
you must first register the app (also known as the :term:`Client`.) Once registered, your app will be granted access to
7676
the API, subject to approval by its users.
7777

78-
Let's register your application.
78+
Let's register your application.
7979

8080
Point your browser to http://localhost:8000/o/applications/ and add an Application instance.
8181
`Client id` and `Client Secret` are automatically generated, you have to provide the rest of the informations:
8282

8383
* `User`: the owner of the Application (e.g. a developer, or the currently logged in user.)
8484

85-
* `Redirect uris`: Applications must register at least one redirection endpoint prior to utilizing the
85+
* `Redirect uris`: Applications must register at least one redirection endpoint prior to utilizing the
8686
authorization endpoint. The :term:`Authorization Server` will deliver the access token to the client only if the client
8787
specifies one of the verified redirection uris. For this tutorial, paste verbatim the value
8888
`http://django-oauth-toolkit.herokuapp.com/consumer/exchange/`
@@ -101,16 +101,16 @@ process we'll explain shortly)
101101
Test Your Authorization Server
102102
------------------------------
103103
Your authorization server is ready and can begin issuing access tokens. To test the process you need an OAuth2
104-
consumer; if you are familiar enough with OAuth2, you can use curl, requests, or anything that speaks http. For the rest
105-
of us, there is a `consumer service <http://django-oauth-toolkit.herokuapp.com/consumer/>`_ deployed on Heroku to test
104+
consumer; if you are familiar enough with OAuth2, you can use curl, requests, or anything that speaks http. For the rest
105+
of us, there is a `consumer service <http://django-oauth-toolkit.herokuapp.com/consumer/>`_ deployed on Heroku to test
106106
your provider.
107107

108108
Build an Authorization Link for Your Users
109109
++++++++++++++++++++++++++++++++++++++++++
110110
Authorizing an application to access OAuth2 protected data in an :term:`Authorization Code` flow is always initiated
111-
by the user. Your application can prompt users to click a special link to start the process. Go to the
111+
by the user. Your application can prompt users to click a special link to start the process. Go to the
112112
`Consumer <http://django-oauth-toolkit.herokuapp.com/consumer/>`_ page and complete the form by filling in your
113-
application's details obtained from the steps in this tutorial. Submit the form, and you'll receive a link your users can
113+
application's details obtained from the steps in this tutorial. Submit the form, and you'll receive a link your users can
114114
use to access the authorization page.
115115

116116
Authorize the Application

0 commit comments

Comments
 (0)