Skip to content

Commit af4cc03

Browse files
di72nnjzheaux
authored andcommitted
Fix some typos and mistakes in docs
1 parent 194993a commit af4cc03

File tree

19 files changed

+26
-25
lines changed

19 files changed

+26
-25
lines changed

docs/manual/src/docs/asciidoc/_includes/about/authentication/password-storage.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -295,7 +295,7 @@ java.lang.IllegalArgumentException: There is no PasswordEncoder mapped for the i
295295
at org.springframework.security.crypto.password.DelegatingPasswordEncoder.matches(DelegatingPasswordEncoder.java:196)
296296
----
297297

298-
The easiest way to resolve the error is to switch to explicitly provide the `PasswordEncoder` that you passwords are encoded with.
298+
The easiest way to resolve the error is to switch to explicitly providing the `PasswordEncoder` that your passwords are encoded with.
299299
The easiest way to resolve it is to figure out how your passwords are currently being stored and explicitly provide the correct `PasswordEncoder`.
300300

301301
If you are migrating from Spring Security 4.2.x you can revert to the previous behavior by <<authentication-password-storage-configuration,exposing a `NoOpPasswordEncoder` bean>>.

docs/manual/src/docs/asciidoc/_includes/about/exploits/csrf.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -377,7 +377,7 @@ More information about using multipart forms with Spring can be found within the
377377
The first option is to include the actual CSRF token in the body of the request.
378378
By placing the CSRF token in the body, the body will be read before authorization is performed.
379379
This means that anyone can place temporary files on your server.
380-
However, only authorized users will be able to submit a File that is processed by your application.
380+
However, only authorized users will be able to submit a file that is processed by your application.
381381
In general, this is the recommended approach because the temporary file upload should have a negligible impact on most servers.
382382

383383
[[csrf-considerations-multipart-url]]

docs/manual/src/docs/asciidoc/_includes/about/exploits/headers.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -384,7 +384,7 @@ This is a nice clean-up action to perform on logout.
384384

385385
[NOTE]
386386
====
387-
Refer to the relevant sections to see how to configure both <<servlet-headers-custom,servlet>> based applications.
387+
Refer to the relevant section to see how to configure <<servlet-headers-custom,servlet>> based applications.
388388
====
389389

390390
Spring Security has mechanisms to make it convenient to add the more common security headers to your application.

docs/manual/src/docs/asciidoc/_includes/about/exploits/http.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Spring Security provides support for <<headers-hsts,Strict Transport Security>>
2020
== Proxy Server Configuration
2121

2222
When using a proxy server it is important to ensure that you have configured your application properly.
23-
For example, many applications will have a load balancer that responds to request for https://example.com/ by forwarding the request to an application server at https://192.168.1:8080
23+
For example, many applications will have a load balancer that responds to request for https://example.com/ by forwarding the request to an application server at https://192.168.1:8080.
2424
Without proper configuration, the application server will not know that the load balancer exists and treat the request as though https://192.168.1:8080 was requested by the client.
2525

2626
To fix this you can use https://tools.ietf.org/html/rfc7239[RFC 7239] to specify that a load balancer is being used.

docs/manual/src/docs/asciidoc/_includes/servlet/architecture/delegating-filter-proxy.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,6 @@ fun doFilter(request: ServletRequest, response: ServletResponse, chain: FilterCh
4141
----
4242
====
4343

44-
Another benefit of `DelegatingFilterProxy` is that it allows delaying looking `Filter` bean instances.
44+
Another benefit of `DelegatingFilterProxy` is that it allows delaying looking `Filter` bean instances up.
4545
This is important because the container needs to register the `Filter` instances before the container can startup.
4646
However, Spring typically uses a `ContextLoaderListener` to load the Spring Beans which will not be done until after the `Filter` instances need to be registered.

docs/manual/src/docs/asciidoc/_includes/servlet/architecture/exception-translation-filter.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ image::{figures}/exceptiontranslationfilter.png[]
1313

1414
* image:{icondir}/number_1.png[] First, the `ExceptionTranslationFilter` invokes `FilterChain.doFilter(request, response)` to invoke the rest of the application.
1515
* image:{icondir}/number_2.png[] If the user is not authenticated or it is an `AuthenticationException`, then __Start Authentication__.
16-
** The <<servlet-authentication-securitycontextholder>> is cleared out
16+
** The <<servlet-authentication-securitycontextholder>> is cleared out.
1717
** The `HttpServletRequest` is saved in the {security-api-url}org/springframework/security/web/savedrequest/RequestCache.html[`RequestCache`].
1818
When the user successfully authenticates, the `RequestCache` is used to replay the original request.
1919
// FIXME: add link to authentication success

docs/manual/src/docs/asciidoc/_includes/servlet/authentication/anonymous.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ You could also omit these pages from the filter chain entirely, thus bypassing t
1414
This is what we mean by anonymous authentication.
1515
Note that there is no real conceptual difference between a user who is "anonymously authenticated" and an unauthenticated user.
1616
Spring Security's anonymous authentication just gives you a more convenient way to configure your access-control attributes.
17-
Calls to servlet API calls such as `getCallerPrincipal`, for example, will still return null even though there is actually an anonymous authentication object in the `SecurityContextHolder`.
17+
Calls to servlet API such as `getCallerPrincipal`, for example, will still return null even though there is actually an anonymous authentication object in the `SecurityContextHolder`.
1818

1919
There are other situations where anonymous authentication is useful, such as when an auditing interceptor queries the `SecurityContextHolder` to identify which principal was responsible for a given operation.
2020
Classes can be authored more robustly if they know the `SecurityContextHolder` always contains an `Authentication` object, and never `null`.

docs/manual/src/docs/asciidoc/_includes/servlet/authentication/architecture/security-context-holder.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,4 +86,4 @@ Other applications might want to have threads spawned by the secure thread also
8686
This is achieved by using `SecurityContextHolder.MODE_INHERITABLETHREADLOCAL`.
8787
You can change the mode from the default `SecurityContextHolder.MODE_THREADLOCAL` in two ways.
8888
The first is to set a system property, the second is to call a static method on `SecurityContextHolder`.
89-
Most applications won't need to change from the default, but if you do, take a look at the JavaDoc for `SecurityContextHolder` to learn more.
89+
Most applications won't need to change from the default, but if you do, take a look at the Javadoc for `SecurityContextHolder` to learn more.

docs/manual/src/docs/asciidoc/_includes/servlet/authentication/logout.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,17 +55,17 @@ override fun configure(http: HttpSecurity) {
5555
This is automatically applied when using `WebSecurityConfigurerAdapter`.
5656
<2> The URL that triggers log out to occur (default is `/logout`).
5757
If CSRF protection is enabled (default), then the request must also be a POST.
58-
For more information, please consult the {security-api-url}org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.html#logoutUrl-java.lang.String-[JavaDoc].
58+
For more information, please consult the {security-api-url}org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.html#logoutUrl-java.lang.String-[Javadoc].
5959
<3> The URL to redirect to after logout has occurred.
6060
The default is `/login?logout`.
61-
For more information, please consult the {security-api-url}org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.html#logoutSuccessUrl-java.lang.String-[JavaDoc].
61+
For more information, please consult the {security-api-url}org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.html#logoutSuccessUrl-java.lang.String-[Javadoc].
6262
<4> Let's you specify a custom `LogoutSuccessHandler`.
6363
If this is specified, `logoutSuccessUrl()` is ignored.
64-
For more information, please consult the {security-api-url}org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.html#logoutSuccessHandler-org.springframework.security.web.authentication.logout.LogoutSuccessHandler-[JavaDoc].
64+
For more information, please consult the {security-api-url}org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.html#logoutSuccessHandler-org.springframework.security.web.authentication.logout.LogoutSuccessHandler-[Javadoc].
6565
<5> Specify whether to invalidate the `HttpSession` at the time of logout.
6666
This is *true* by default.
6767
Configures the `SecurityContextLogoutHandler` under the covers.
68-
For more information, please consult the {security-api-url}org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.html#invalidateHttpSession-boolean-[JavaDoc].
68+
For more information, please consult the {security-api-url}org/springframework/security/config/annotation/web/configurers/LogoutConfigurer.html#invalidateHttpSession-boolean-[Javadoc].
6969
<6> Adds a `LogoutHandler`.
7070
`SecurityContextLogoutHandler` is added as the last `LogoutHandler` by default.
7171
<7> Allows specifying the names of cookies to be removed on logout success.

docs/manual/src/docs/asciidoc/_includes/servlet/authentication/rememberme.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Notably, this has a potential security issue in that a captured remember-me toke
3434
This is the same issue as with digest authentication.
3535
If a principal is aware a token has been captured, they can easily change their password and immediately invalidate all remember-me tokens on issue.
3636
If more significant security is needed you should use the approach described in the next section.
37-
Alternatively remember-me services should simply not be used at all.
37+
Alternatively, remember-me services should simply not be used at all.
3838

3939
If you are familiar with the topics discussed in the chapter on <<ns-config,namespace configuration>>, you can enable remember-me authentication just by adding the `<remember-me>` element:
4040

0 commit comments

Comments
 (0)