Skip to content

Commit 7748fb0

Browse files
ahrytsiukrwinch
authored andcommitted
Fix typos in documentation
1 parent 1f1ddeb commit 7748fb0

File tree

16 files changed

+25
-25
lines changed

16 files changed

+25
-25
lines changed

docs/articles/src/docbook/codebase-structure.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@
9494
<tbody>
9595
<row>
9696
<entry valign="middle">spring-security-core</entry>
97-
<entry>Core authentication and access-contol classes and interfaces.
97+
<entry>Core authentication and access-control classes and interfaces.
9898
Remoting support and basic provisioning APIs.</entry>
9999
<entry>Required by any application which uses Spring Security.
100100
Supports standalone applications, remote clients, method
@@ -174,7 +174,7 @@
174174
The <filename>core</filename> package and sub packages contain the basic classes and
175175
interfaces which are used throughout the framework and the other two main packages
176176
within the core jar are <filename>authentication</filename> and
177-
<filename>access</filename>. The <filename>access</filename> package containst
177+
<filename>access</filename>. The <filename>access</filename> package contains
178178
access-control/authorization code such as the
179179
<interfacename>AccessDecisionManager</interfacename> and related voter-based
180180
implementations, the interception and method security infrastructure, annotation

docs/guides/src/docs/asciidoc/form-javaconfig.asc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ Our existing configuration means that all we need to do is create a *login.html*
199199

200200
IMPORTANT: Do not display details about why authentication failed. For example, we do not want to display that the user does not exist as this will tell an attacker that they should try a different username.
201201

202-
TIP: We use Thymeleaf to automatically add the CSRF token to our form. If we were not using Thymleaf or Spring MVCs taglib we could also manually add the CSRF token using `<input type="hidden" name="${_csrf.parameterName}" value="${_csrf.token}"/>`.
202+
TIP: We use Thymeleaf to automatically add the CSRF token to our form. If we were not using Thymeleaf or Spring MVCs taglib we could also manually add the CSRF token using `<input type="hidden" name="${_csrf.parameterName}" value="${_csrf.token}"/>`.
203203

204204
Start up the server and try visiting http://localhost:8080/sample/ to see the updates to our configuration. We now see our login page, but it does not look very pretty. The issue is that we have not granted access to the css files.
205205

docs/guides/src/docs/asciidoc/helloworld-boot.asc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ in order to utilize the _sec:authentication_ and _sec:authorize_ attributes.
6666
<3> Displays the authorities of the currently authenticated principal.
6767
<4> The logout form.
6868

69-
TIP: Thymeleaf will automatically add the CSRF token to our logout form. If we were not using Thymleaf or Spring MVCs taglib we could also manually add the CSRF token using `<input type="hidden" name="${_csrf.parameterName}" value="${_csrf.token}"/>`.
69+
TIP: Thymeleaf will automatically add the CSRF token to our logout form. If we were not using Thymeleaf or Spring MVCs taglib we could also manually add the CSRF token using `<input type="hidden" name="${_csrf.parameterName}" value="${_csrf.token}"/>`.
7070

7171
==== Update the _secured_ page
7272

docs/manual/src/docs/asciidoc/_includes/about/exploits/csrf.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -378,7 +378,7 @@ The first option is to include the actual CSRF token in the body of the request.
378378
By placing the CSRF token in the body, the body will be read before authorization is performed.
379379
This means that anyone can place temporary files on your server.
380380
However, only authorized users will be able to submit a File that is processed by your application.
381-
In general, this is the recommended approach because the temporary file uplaod should have a negligible impact on most servers.
381+
In general, this is the recommended approach because the temporary file upload should have a negligible impact on most servers.
382382

383383
[[csrf-considerations-multipart-url]]
384384
==== Include CSRF Token in URL

docs/manual/src/docs/asciidoc/_includes/reactive/exploits/csrf.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ Next we will discuss various ways of including the CSRF token in a form as a hid
130130
Spring Security's CSRF support provides integration with Spring's https://docs.spring.io/spring/docs/current/javadoc-api/org/springframework/web/reactive/result/view/RequestDataValueProcessor.html[RequestDataValueProcessor] via its https://docs.spring.io/spring-security/site/docs/current/api/org/springframework/security/web/reactive/result/view/CsrfRequestDataValueProcessor.html[CsrfRequestDataValueProcessor].
131131
In order for `CsrfRequestDataValueProcessor` to work, the `Mono<CsrfToken>` must be subscribed to and the `CsrfToken` must be <<webflux-csrf-include-subscribe,exposed as an attribute>> that matches https://docs.spring.io/spring-security/site/docs/current/api/org/springframework/security/web/reactive/result/view/CsrfRequestDataValueProcessor.html#DEFAULT_CSRF_ATTR_NAME[DEFAULT_CSRF_ATTR_NAME].
132132

133-
Fortunately, Thymleaf https://www.thymeleaf.org/doc/tutorials/2.1/thymeleafspring.html#integration-with-requestdatavalueprocessor[provides support] to take care of all the boilerplate for you by integrating with `RequestDataValueProcessor` to ensure that forms that have an unsafe HTTP method (i.e. post) will automatically include the actual CSRF token.
133+
Fortunately, Thymeleaf https://www.thymeleaf.org/doc/tutorials/2.1/thymeleafspring.html#integration-with-requestdatavalueprocessor[provides support] to take care of all the boilerplate for you by integrating with `RequestDataValueProcessor` to ensure that forms that have an unsafe HTTP method (i.e. post) will automatically include the actual CSRF token.
134134

135135
[[webflux-csrf-include-form-attr]]
136136
===== CsrfToken Request Attribute

docs/manual/src/docs/asciidoc/_includes/servlet/appendix/faq.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -77,9 +77,9 @@ It should also be compatible with applications using Spring 2.5.x.
7777
==== I'm new to Spring Security and I need to build an application that supports CAS single sign-on over HTTPS, while allowing Basic authentication locally for certain URLs, authenticating against multiple back end user information sources (LDAP and JDBC). I've copied some configuration files I found but it doesn't work.
7878
What could be wrong?
7979

80-
Or subsititute an alternative complex scenario...
80+
Or substitute an alternative complex scenario...
8181

82-
Realistically, you need an understanding of the technolgies you are intending to use before you can successfully build applications with them.
82+
Realistically, you need an understanding of the technologies you are intending to use before you can successfully build applications with them.
8383
Security is complicated.
8484
Setting up a simple configuration using a login form and some hard-coded users using Spring Security's namespace is reasonably straightforward.
8585
Moving to using a backed JDBC database is also easy enough.
@@ -131,7 +131,7 @@ If you are using hashed passwords, make sure the value stored in your database i
131131
[[appendix-faq-login-loop]]
132132
==== My application goes into an "endless loop" when I try to login, what's going on?
133133

134-
A common user problem with infinite loop and redirecting to the login page is caused by accidently configuring the login page as a "secured" resource.
134+
A common user problem with infinite loop and redirecting to the login page is caused by accidentally configuring the login page as a "secured" resource.
135135
Make sure your configuration allows anonymous access to the login page, either by excluding it from the security filter chain or marking it as requiring ROLE_ANONYMOUS.
136136

137137
If your AccessDecisionManager includes an AuthenticatedVoter, you can use the attribute "IS_AUTHENTICATED_ANONYMOUSLY". This is automatically available if you are using the standard namespace configuration setup.
@@ -387,7 +387,7 @@ Any which are marked as "optional" in the Spring Security POM files will have to
387387
[[appendix-faq-apacheds-deps]]
388388
==== What dependencies are needed to run an embedded ApacheDS LDAP server?
389389

390-
If you are using Maven, you need to add the folowing to your pom dependencies:
390+
If you are using Maven, you need to add the following to your pom dependencies:
391391

392392
[source]
393393
----

docs/manual/src/docs/asciidoc/_includes/servlet/appendix/namespace.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -517,11 +517,11 @@ Select the `AllowFromStrategy` to use when using the ALLOW-FROM policy.
517517

518518
** `static` Use a single static ALLOW-FROM value.
519519
The value can be set through the <<nsa-frame-options-value,value>> attribute.
520-
** `regexp` Use a regelur expression to validate incoming requests and if they are allowed.
520+
** `regexp` Use a regular expression to validate incoming requests and if they are allowed.
521521
The regular expression can be set through the <<nsa-frame-options-value,value>> attribute.
522522
The request parameter used to retrieve the value to validate can be specified using the <<nsa-frame-options-from-parameter,from-parameter>>.
523-
** `whitelist` A comma-seperated list containing the allowed domains.
524-
The comma-seperated list can be set through the <<nsa-frame-options-value,value>> attribute.
523+
** `whitelist` A comma-separated list containing the allowed domains.
524+
The comma-separated list can be set through the <<nsa-frame-options-value,value>> attribute.
525525
The request parameter used to retrieve the value to validate can be specified using the <<nsa-frame-options-from-parameter,from-parameter>>.
526526

527527

docs/manual/src/docs/asciidoc/_includes/servlet/authentication/cas.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ With the configuration above, the flow of logout would be:
235235
* The logout success page, `/cas-logout.jsp`, should instruct the user to click a link pointing to `/logout/cas` in order to logout out of all applications.
236236
* When the user clicks the link, the user is redirected to the CAS single logout URL (https://localhost:9443/cas/logout).
237237
* On the CAS Server side, the CAS single logout URL then submits single logout requests to all the CAS Services.
238-
On the CAS Service side, JASIG's `SingleSignOutFilter` processes the logout request by invaliditing the original session.
238+
On the CAS Service side, JASIG's `SingleSignOutFilter` processes the logout request by invalidating the original session.
239239

240240

241241

docs/manual/src/docs/asciidoc/_includes/servlet/authentication/unpwd/digest.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ protected void configure(HttpSecurity http) throws Exception {
7676
7777
<b:bean id="digestEntryPoint"
7878
class="org.springframework.security.web.authentication.www.DigestAuthenticationEntryPoint"
79-
p:realmName="My App Relam"
79+
p:realmName="My App Realm"
8080
p:key="3028472b-da34-4501-bfd8-a355c42bdf92"
8181
/>
8282

docs/manual/src/docs/asciidoc/_includes/servlet/authentication/unpwd/in-memory.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ public UserDetailsService users() {
8282
.password("password")
8383
.roles("USER")
8484
.build();
85-
UserDetails user = users
85+
UserDetails admin = users
8686
.username("admin")
8787
.password("password")
8888
.roles("USER", "ADMIN")

0 commit comments

Comments
 (0)