@@ -42,7 +42,7 @@ adding the following endpoint scopes:
42
42
* ** yank** : allows yanking and unyanking existing versions of the user's crates
43
43
* ** change-owners** : allows inviting new owners or removing existing owners
44
44
* ** legacy** : allows accessing all the endpoints on crates.io except for
45
- creating new tokens, like tokens created befores the implementation of this
45
+ creating new tokens, like tokens created before the implementation of this
46
46
RFC.
47
47
48
48
More endpoint scopes might be added in the future without the need of a
@@ -81,8 +81,8 @@ crate scope filter (equivalent to no restrictions).
81
81
# Reference-level explanation
82
82
[ reference-level-explanation ] : #reference-level-explanation
83
83
84
- Endpoint scopes and crates scope are two completly separate systems, and can be
85
- used independently from one another. Token scopes will be implemented entirely
84
+ Endpoint scopes and crates scope are two completely separate systems, and can be
85
+ used independently of one another. Token scopes will be implemented entirely
86
86
on the crates.io side, and there will be no change to ` cargo ` or alternate
87
87
registries.
88
88
@@ -162,7 +162,7 @@ in the RFC author's opinion, are more likely to need crate scopes than a person
162
162
with just a few crates), and it wouldn't allow new crates matching the pattern
163
163
but uploaded after the token's creation from being accessed.
164
164
165
- Finally an alternative could be to do nothing, and encourage users to create
165
+ Finally, an alternative could be to do nothing, and encourage users to create
166
166
"machine accounts" for each set of crates they own. A drawback of this is that
167
167
GitHub's terms of service limit how many accounts a single person could have.
168
168
@@ -222,7 +222,7 @@ implementation of solutions that would make the check hard.
222
222
To increase the security of CI environments even more, we could implement an
223
223
option to require a separate confirmation for the actions executed by tokens.
224
224
For example, we could send a confirmation email with a link the owners have to
225
- click to actually publish the crate uploaded by CI, preventing any mailicious
225
+ click to actually publish the crate uploaded by CI, preventing any malicious
226
226
action with stolen tokens.
227
227
228
228
To remove the need for machine accounts, a future RFC could propose adding API
0 commit comments