You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add codespell support: config + workflow to catch new typos, let it fix some (#1392)
* Add rudimentary codespell config
* Add pre-commit definition for codespell
Includes also squashed
- [pre-commit.ci] auto fixes from pre-commit.com hooks
for more information, see https://pre-commit.ci
- Unfortunately due to bug in codespell we need to duplicate some skipped paths for pre-commit config
* Add pragma handling to ignore for codespell and ignore a line with a key
* [DATALAD RUNCMD] run codespell throughout fixing typos automagically
=== Do not change lines below ===
{
"chain": [],
"cmd": "codespell -w",
"exit": 0,
"extra_inputs": [],
"inputs": [],
"outputs": [],
"pwd": "."
}
^^^ Do not change lines above ^^^
* Added author
---------
Co-authored-by: Alan Crosswell <[email protected]>
Copy file name to clipboardExpand all lines: CHANGELOG.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
31
31
*#1311 Add option to disable client_secret hashing to allow verifying JWTs' signatures.
32
32
*#1337 Gracefully handle expired or deleted refresh tokens, in `validate_user`.
33
33
*#1350 Support Python 3.12 and Django 5.0
34
-
*#1249 Add code_challenge_methods_supported property to auto discovery informations, per [RFC 8414 section 2](https://www.rfc-editor.org/rfc/rfc8414.html#page-7)
34
+
*#1249 Add code_challenge_methods_supported property to auto discovery information, per [RFC 8414 section 2](https://www.rfc-editor.org/rfc/rfc8414.html#page-7)
35
35
36
36
37
37
### Fixed
@@ -144,7 +144,7 @@ This is a major release with **BREAKING** changes. Please make sure to review th
144
144
145
145
### Added
146
146
*#969 Add batching of expired token deletions in `cleartokens` management command and `models.clear_expired()`
147
-
to improve performance for removal of large numers of expired tokens. Configure with
147
+
to improve performance for removal of large numbers of expired tokens. Configure with
148
148
[`CLEAR_EXPIRED_TOKENS_BATCH_SIZE`](https://django-oauth-toolkit.readthedocs.io/en/latest/settings.html#clear-expired-tokens-batch-size) and
*#1070 Add a Celery task for clearing expired tokens, e.g. to be scheduled as a [periodic task](https://docs.celeryproject.org/en/stable/userguide/periodic-tasks.html).
@@ -229,7 +229,7 @@ This is a major release with **BREAKING** changes. Please make sure to review th
229
229
230
230
### Added
231
231
*#917 Documentation improvement for Access Token expiration.
232
-
*#916 (for DOT contributors) Added `tox -e livedocs` which launches a local web server on `locahost:8000`
232
+
*#916 (for DOT contributors) Added `tox -e livedocs` which launches a local web server on `localhost:8000`
233
233
to display Sphinx documentation with live updates as you edit.
Copy file name to clipboardExpand all lines: docs/tutorial/tutorial_04.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ obtained in :doc:`part 1 <tutorial_01>`. If your application type is `Confidenti
36
36
token=XXXX&client_id=XXXX&client_secret=XXXX
37
37
38
38
39
-
The server will respond wih a ``200`` status code on successful revocation. You can use ``curl`` to make a revoke request on your server. If you have access to a local installation of your authorization server, you can test revoking a token with a request like that shown below, for a `Confidential` client.
39
+
The server will respond with a ``200`` status code on successful revocation. You can use ``curl`` to make a revoke request on your server. If you have access to a local installation of your authorization server, you can test revoking a token with a request like that shown below, for a `Confidential` client.
0 commit comments