Skip to content

Commit ad3593d

Browse files
committed
chore: typo
1 parent 0979016 commit ad3593d

File tree

8 files changed

+9
-9
lines changed

8 files changed

+9
-9
lines changed

crates/rust-mcp-extra/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ let auth_provider = WorkOsAuthProvider::new(WorkOSAuthOptions {
7474
})?;
7575
```
7676

77-
Before running the [example](../../examples/workos-auth.rs), make sure you enabled DCR (Dynamic Client Regsitration) in your WorkOS Authkit dashboard.
77+
Before running the [example](../../examples/workos-auth.rs), make sure you enabled DCR (Dynamic Client Registration) in your WorkOS Authkit dashboard.
7878

7979
Set the `AUTH_SERVER` environment variable and start the example:
8080

crates/rust-mcp-extra/src/auth_provider/keycloak.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -228,7 +228,7 @@ impl AuthProvider for KeycloakAuthProvider {
228228
request: http::Request<&str>,
229229
state: Arc<McpAppState>,
230230
) -> Result<http::Response<GenericBody>, TransportServerError> {
231-
let Some(endpoint) = self.endpont_type(&request) else {
231+
let Some(endpoint) = self.endpoint_type(&request) else {
232232
return http::Response::builder()
233233
.status(StatusCode::NOT_FOUND)
234234
.body(GenericBody::empty())

crates/rust-mcp-extra/src/auth_provider/scalekit.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@ impl AuthProvider for ScalekitAuthProvider {
212212
request: http::Request<&str>,
213213
state: Arc<McpAppState>,
214214
) -> Result<http::Response<GenericBody>, TransportServerError> {
215-
let Some(endpoint) = self.endpont_type(&request) else {
215+
let Some(endpoint) = self.endpoint_type(&request) else {
216216
return http::Response::builder()
217217
.status(StatusCode::NOT_FOUND)
218218
.body(GenericBody::empty())

crates/rust-mcp-extra/src/auth_provider/work_os.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -211,7 +211,7 @@ impl AuthProvider for WorkOsAuthProvider {
211211
request: http::Request<&str>,
212212
state: Arc<McpAppState>,
213213
) -> Result<http::Response<GenericBody>, TransportServerError> {
214-
let Some(endpoint) = self.endpont_type(&request) else {
214+
let Some(endpoint) = self.endpoint_type(&request) else {
215215
return http::Response::builder()
216216
.status(StatusCode::NOT_FOUND)
217217
.body(GenericBody::empty())

crates/rust-mcp-sdk/src/auth/auth_provider.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ pub trait AuthProvider: Send + Sync {
4747
/// - If your token and revocation endpoints share the same URL path (valid in some implementations),
4848
/// you may want to override this method to correctly distinguish the request type
4949
/// (e.g., based on request parameters like `grant_type` vs `token`).
50-
fn endpont_type(&self, request: &http::Request<&str>) -> Option<&OauthEndpoint> {
50+
fn endpoint_type(&self, request: &http::Request<&str>) -> Option<&OauthEndpoint> {
5151
let endpoints = self.auth_endpoints()?;
5252
endpoints.get(request.uri().path())
5353
}

crates/rust-mcp-sdk/src/auth/auth_provider/remote_auth_provider.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ impl AuthProvider for RemoteAuthProvider {
133133
request: http::Request<&str>,
134134
state: Arc<McpAppState>,
135135
) -> Result<http::Response<GenericBody>, TransportServerError> {
136-
let Some(endpoint) = self.endpont_type(&request) else {
136+
let Some(endpoint) = self.endpoint_type(&request) else {
137137
return http::Response::builder()
138138
.status(StatusCode::NOT_FOUND)
139139
.body(GenericBody::empty())

crates/rust-mcp-sdk/src/auth/metadata.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ pub enum AuthMetadateError {
3434

3535
pub struct AuthMetadataEndpoints {
3636
pub protected_resource_endpoint: String,
37-
pub autorization_server_endpoint: String,
37+
pub authorization_server_endpoint: String,
3838
}
3939

4040
// Builder struct to construct both OAuthMetadata and OAuthProtectedResourceMetadata
@@ -101,7 +101,7 @@ impl OauthMetadata {
101101

102102
pub fn endpoints(&self) -> AuthMetadataEndpoints {
103103
AuthMetadataEndpoints {
104-
autorization_server_endpoint: WELL_KNOWN_OAUTH_AUTHORIZATION_SERVER.to_string(),
104+
authorization_server_endpoint: WELL_KNOWN_OAUTH_AUTHORIZATION_SERVER.to_string(),
105105
protected_resource_endpoint: format!(
106106
"{OAUTH_PROTECTED_RESOURCE_BASE}{}",
107107
match self.protected_resource_metadata.resource.path() {

examples/auth/server-oauth-remote/src/main.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt};
1919

2020
// this function creates and setup a RemoteAuthProvider , pointing to a local KeyCloak server
2121
// please refer to the keycloak-setup section of the following blog post for
22-
// detailed instrctions on how to setup a KeyCloak server for this :
22+
// detailed instructions on how to setup a KeyCloak server for this :
2323
// https://modelcontextprotocol.io/docs/tutorials/security/authorization#keycloak-setup
2424
pub async fn create_oauth_provider() -> SdkResult<RemoteAuthProvider> {
2525
// build metadata from a oauth discovery url : .well-known/openid-configuration

0 commit comments

Comments
 (0)