Skip to content

Commit db51238

Browse files
committed
Fix typo in readme
Signed-off-by: Ivan Kanakarakis <ivan.kanak@gmail.com>
1 parent 2014f2f commit db51238

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ The lifetime of authorization codes, access tokens, and refresh tokens is config
9191

9292
```python
9393
AuthorizationState(..., authorization_code_lifetime=300, access_token_lifetime=60*60*24,
94-
refresh_token_lifetime=60*60*24*365, refresh_token_threshold=None)
94+
refresh_token_lifetime=60*60*24*365, refresh_token_threshold=None)
9595
```
9696

9797
If not specified the lifetimes defaults to the following values:
@@ -106,9 +106,9 @@ specify a `refresh_token_threshold` > 0.
106106

107107
# Dynamic discovery: Provider Configuration Information
108108
To publish the provider configuration information at an endpoint, use `Provider.provider_configuration`.
109-
109+
110110
The following example illustrates the high-level idea:
111-
111+
112112
```python
113113
@app.route('/.well-known/openid-configuration')
114114
def provider_config():
@@ -135,7 +135,7 @@ def authorization_endpoints(request):
135135
else:
136136
return HTTPResponse("Something went wrong: {}".format(str(e)), status=400)
137137

138-
session['authn_req'] = authn_req.to_dict()
138+
session['authn_req'] = authn_req.to_dict()
139139
// TODO initiate end-user authentication
140140
```
141141

@@ -171,7 +171,7 @@ def request_contains_nonce(authentication_request):
171171
if 'nonce' not in authentication_request:
172172
raise InvalidAuthenticationRequest('The request does not contain a nonce', authentication_request,
173173
oauth_error='invalid_request')
174-
174+
175175
provider.authentication_request_validators.append(request_contains_nonce)
176176
```
177177

@@ -204,7 +204,7 @@ def token_endpoint(request):
204204

205205
# Userinfo endpoint
206206
An incoming userinfo request is processed by `Provider.handle_userinfo_request`. It will validate the request and return
207-
all requested userinfo.
207+
all requested userinfo.
208208

209209
```python
210210
from oic.oic.message import UserInfoErrorResponse
@@ -229,7 +229,7 @@ def userinfo_endpoint(request):
229229

230230
# Dynamic client registration
231231

232-
An incoming client registration request is process by `Provider.handle_userinfo_request`. It will validate the request,
232+
An incoming client registration request is process by `Provider.handle_client_registration_request`. It will validate the request,
233233
store the registered metadata and issue new client credentials.
234234

235235
```python
@@ -276,12 +276,12 @@ from pyop.exceptions import InvalidSubjectIdentifier
276276
@app.route('/logout')
277277
def end_session_endpoint(request):
278278
end_session_request = EndSessionRequest().deserialize(request.get_data().decode('utf-8'))
279-
279+
280280
try:
281281
provider.logout_user(session.get('sub'), end_session_request)
282282
except InvalidSubjectIdentifier as e:
283283
return HTTPResponse('Logout unsuccessful!', content_type='text/html', status=400)
284-
284+
285285
# TODO automagic logout, should ask user first!
286286
redirect_url = provider.do_post_logout_redirect(end_session_request)
287287
if redirect_url:

0 commit comments

Comments
 (0)