Skip to content

Commit 826ebc0

Browse files
committed
token-scopes: Fix typos
1 parent 7cede63 commit 826ebc0

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

text/0000-crates-io-token-scopes.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ adding the following endpoint scopes:
4242
* **yank**: allows yanking and unyanking existing versions of the user's crates
4343
* **change-owners**: allows inviting new owners or removing existing owners
4444
* **legacy**: allows accessing all the endpoints on crates.io except for
45-
creating new tokens, like tokens created befores the implementation of this
45+
creating new tokens, like tokens created before the implementation of this
4646
RFC.
4747

4848
More endpoint scopes might be added in the future without the need of a
@@ -81,8 +81,8 @@ crate scope filter (equivalent to no restrictions).
8181
# Reference-level explanation
8282
[reference-level-explanation]: #reference-level-explanation
8383

84-
Endpoint scopes and crates scope are two completly separate systems, and can be
85-
used independently from one another. Token scopes will be implemented entirely
84+
Endpoint scopes and crates scope are two completely separate systems, and can be
85+
used independently of one another. Token scopes will be implemented entirely
8686
on the crates.io side, and there will be no change to `cargo` or alternate
8787
registries.
8888

@@ -162,7 +162,7 @@ in the RFC author's opinion, are more likely to need crate scopes than a person
162162
with just a few crates), and it wouldn't allow new crates matching the pattern
163163
but uploaded after the token's creation from being accessed.
164164

165-
Finally an alternative could be to do nothing, and encourage users to create
165+
Finally, an alternative could be to do nothing, and encourage users to create
166166
"machine accounts" for each set of crates they own. A drawback of this is that
167167
GitHub's terms of service limit how many accounts a single person could have.
168168

@@ -222,7 +222,7 @@ implementation of solutions that would make the check hard.
222222
To increase the security of CI environments even more, we could implement an
223223
option to require a separate confirmation for the actions executed by tokens.
224224
For example, we could send a confirmation email with a link the owners have to
225-
click to actually publish the crate uploaded by CI, preventing any mailicious
225+
click to actually publish the crate uploaded by CI, preventing any malicious
226226
action with stolen tokens.
227227

228228
To remove the need for machine accounts, a future RFC could propose adding API

0 commit comments

Comments
 (0)