@@ -3769,7 +3769,7 @@ RAML.Inspector = (function() {
37693769 var authorization = btoa ( options . clientId + ':' + options . clientSecret ) ;
37703770
37713771 return this . client . _request ( {
3772- uri : options . accessTokenUri ,
3772+ url : options . accessTokenUri ,
37733773 method : 'POST' ,
37743774 headers : {
37753775 'Accept' : 'application/json, application/x-www-form-urlencoded' ,
@@ -3831,7 +3831,7 @@ RAML.Inspector = (function() {
38313831 var authorization = btoa ( options . clientId + ':' + options . clientSecret ) ;
38323832
38333833 return this . client . _request ( {
3834- uri : options . accessTokenUri ,
3834+ url : options . accessTokenUri ,
38353835 method : 'POST' ,
38363836 headers : {
38373837 'Accept' : 'application/json, application/x-www-form-urlencoded' ,
@@ -3891,13 +3891,13 @@ RAML.Inspector = (function() {
38913891 } ;
38923892
38933893 /**
3894- * Get the user access token from the uri .
3894+ * Get the user access token from the url .
38953895 *
3896- * @param {String } uri
3896+ * @param {String } url
38973897 * @param {String } [state]
38983898 * @param {Function } done
38993899 */
3900- TokenFlow . prototype . getToken = function ( uri , state , done ) {
3900+ TokenFlow . prototype . getToken = function ( url , state , done ) {
39013901 var options = this . client . options ;
39023902 var err ;
39033903
@@ -3907,17 +3907,17 @@ RAML.Inspector = (function() {
39073907 state = null ;
39083908 }
39093909
3910- // Make sure the uri matches our expected redirect uri .
3911- if ( uri . substr ( 0 , options . redirectUri . length ) !== options . redirectUri ) {
3912- return done ( new Error ( 'Invalid uri (should to match redirect): ' + uri ) ) ;
3910+ // Make sure the url matches our expected redirect url .
3911+ if ( url . substr ( 0 , options . redirectUri . length ) !== options . redirectUri ) {
3912+ return done ( new Error ( 'Invalid url (should to match redirect): ' + url ) ) ;
39133913 }
39143914
3915- var queryString = uri . replace ( / ^ [ ^ \? ] * | \# .* $ / g, '' ) . substr ( 1 ) ;
3916- var fragmentString = uri . replace ( / ^ [ ^ \# ] * / , '' ) . substr ( 1 ) ;
3915+ var queryString = url . replace ( / ^ [ ^ \? ] * | \# .* $ / g, '' ) . substr ( 1 ) ;
3916+ var fragmentString = url . replace ( / ^ [ ^ \# ] * / , '' ) . substr ( 1 ) ;
39173917
3918- // Check whether a query string is present in the uri .
3918+ // Check whether a query string is present in the url .
39193919 if ( ! queryString && ! fragmentString ) {
3920- return done ( new Error ( 'Unable to process uri : ' + uri ) ) ;
3920+ return done ( new Error ( 'Unable to process url : ' + url ) ) ;
39213921 }
39223922
39233923 // Merge the fragment with the the query string. This is because, at least,
@@ -3981,7 +3981,7 @@ RAML.Inspector = (function() {
39813981 var authorization = btoa ( options . clientId + ':' + options . clientSecret ) ;
39823982
39833983 return this . client . _request ( {
3984- uri : options . accessTokenUri ,
3984+ url : options . accessTokenUri ,
39853985 method : 'POST' ,
39863986 headers : {
39873987 'Accept' : 'application/json, application/x-www-form-urlencoded' ,
@@ -4041,11 +4041,11 @@ RAML.Inspector = (function() {
40414041 * Get the code token from the redirected uri and make another request for
40424042 * the user access token.
40434043 *
4044- * @param {String } uri
4044+ * @param {String } url
40454045 * @param {String } [state]
40464046 * @param {Function } done
40474047 */
4048- CodeFlow . prototype . getToken = function ( uri , state , done ) {
4048+ CodeFlow . prototype . getToken = function ( url , state , done ) {
40494049 var self = this ;
40504050 var options = this . client . options ;
40514051 var err ;
@@ -4063,17 +4063,17 @@ RAML.Inspector = (function() {
40634063 'accessTokenUri'
40644064 ] ) ;
40654065
4066- // Make sure the uri matches our expected redirect uri .
4067- if ( uri . substr ( 0 , options . redirectUri . length ) !== options . redirectUri ) {
4068- return done ( new Error ( 'Invalid uri (should to match redirect): ' + uri ) ) ;
4066+ // Make sure the url matches our expected redirect url .
4067+ if ( url . substr ( 0 , options . redirectUri . length ) !== options . redirectUri ) {
4068+ return done ( new Error ( 'Invalid url (should to match redirect): ' + url ) ) ;
40694069 }
40704070
40714071 // Extract the query string from the url.
4072- var queryString = uri . replace ( / ^ [ ^ \? ] * | \# .* $ / g, '' ) . substr ( 1 ) ;
4072+ var queryString = url . replace ( / ^ [ ^ \? ] * | \# .* $ / g, '' ) . substr ( 1 ) ;
40734073
4074- // Check whether a query string is present in the uri .
4074+ // Check whether a query string is present in the url .
40754075 if ( ! queryString ) {
4076- return done ( new Error ( 'Unable to process uri : ' + uri ) ) ;
4076+ return done ( new Error ( 'Unable to process url : ' + url ) ) ;
40774077 }
40784078
40794079 var query = uriDecode ( queryString ) ;
@@ -4094,7 +4094,7 @@ RAML.Inspector = (function() {
40944094 }
40954095
40964096 return this . client . _request ( {
4097- uri : options . accessTokenUri ,
4097+ url : options . accessTokenUri ,
40984098 method : 'POST' ,
40994099 headers : {
41004100 'Accept' : 'application/json, application/x-www-form-urlencoded' ,
0 commit comments