Skip to content

Commit 3fc0045

Browse files
ngocnhan-tran1996jzheaux
authored andcommitted
Fix Documentation Typos
1 parent c61ccd9 commit 3fc0045

File tree

8 files changed

+8
-8
lines changed

8 files changed

+8
-8
lines changed

docs/modules/ROOT/pages/features/integrations/localization.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ If your application is designed for English-speaking users, you don't need to do
55
If you need to support other locales, everything you need to know is contained in this section.
66

77
All exception messages can be localized, including messages related to authentication failures and access being denied (authorization failures).
8-
Exceptions and logging messages that are focused on developers or system deplopers (including incorrect attributes, interface contract violations, using incorrect constructors, startup time validation, debug-level logging) are not localized and instead are hard-coded in English within Spring Security's code.
8+
Exceptions and logging messages that are focused on developers or system deployers (including incorrect attributes, interface contract violations, using incorrect constructors, startup time validation, debug-level logging) are not localized and instead are hard-coded in English within Spring Security's code.
99

1010
Shipping in the `spring-security-core-xx.jar` you will find an `org.springframework.security` package that in turn contains a `messages.properties` file, as well as localized versions for some common languages.
1111
This should be referred to by your `ApplicationContext`, as Spring Security classes implement Spring's `MessageSourceAware` interface and expect the message resolver to be dependency injected at application context startup time.

docs/modules/ROOT/pages/reactive/getting-started.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Using generated security password: 8e557245-73e2-4286-969a-ff57fe326336
7575
[[authenticating]]
7676
== Authenticating
7777

78-
You can access the application at http://localhost:8080/ which will redirect the browser to the default log in page. You can provide the default username of `user` with the randomly generated password that is logged to the console. The browser is then taken to the orginally requested page.
78+
You can access the application at http://localhost:8080/ which will redirect the browser to the default log in page. You can provide the default username of `user` with the randomly generated password that is logged to the console. The browser is then taken to the originally requested page.
7979

8080
To log out you can visit http://localhost:8080/logout and then confirming you wish to log out.
8181

docs/modules/ROOT/pages/reactive/oauth2/resource-server/bearer-tokens.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ this.rest.get()
9696
----
9797
======
9898

99-
The prececing example invokes the `https://other-service.example.com/endpoint`, adding the bearer token `Authorization` header for you.
99+
The preceding example invokes the `https://other-service.example.com/endpoint`, adding the bearer token `Authorization` header for you.
100100

101101
In places where you need to override this behavior, you can supply the header yourself:
102102

docs/modules/ROOT/pages/servlet/appendix/namespace/method-security.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -287,7 +287,7 @@ Use AuthorizationManager API instead of AccessDecisionManager (defaults to true)
287287

288288
[[nsa-intercept-methods-authorization-manager-ref]]
289289
* **authorization-manager-ref**
290-
Optional AuthorizationManager bean ID to be used instead of the default (supercedes use-authorization-manager)
290+
Optional AuthorizationManager bean ID to be used instead of the default (supersedes use-authorization-manager)
291291

292292
[[nsa-intercept-methods-access-decision-manager-ref]]
293293
* **access-decision-manager-ref**

docs/modules/ROOT/pages/servlet/authentication/rememberme.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ If you have more than one in your application context, you need to specify which
5050

5151
[[remember-me-persistent-token]]
5252
== Persistent Token Approach
53-
This approach is based on the article https://web.archive.org/web/20180819014446/http://jaspan.com/improved_persistent_login_cookie_best_practice[Improved Persistent Login Cookie Best Practice] with some minor modifications footnote:[Essentially, the username is not included in the cookie, to prevent exposing a valid login name unecessarily.
53+
This approach is based on the article https://web.archive.org/web/20180819014446/http://jaspan.com/improved_persistent_login_cookie_best_practice[Improved Persistent Login Cookie Best Practice] with some minor modifications footnote:[Essentially, the username is not included in the cookie, to prevent exposing a valid login name unnecessarily.
5454
There is a discussion on this in the comments section of this article.].
5555
To use this approach with namespace configuration, you would supply a datasource reference:
5656

docs/modules/ROOT/pages/servlet/authentication/runas.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Because Spring Security provides a number of helper classes that automatically c
1212

1313
[[runas-config]]
1414
== Configuration
15-
Spring Security provices a `RunAsManager` interface:
15+
Spring Security provides a `RunAsManager` interface:
1616

1717
[source,java]
1818
----

docs/modules/ROOT/pages/servlet/authorization/method-security.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -796,7 +796,7 @@ In-memory filtering can obviously be expensive, and so be considerate of whether
796796
=== Authorizing Method Invocation with `@Secured`
797797

798798
javadoc:org.springframework.security.access.annotation.Secured[format=annotation] is a legacy option for authorizing invocations.
799-
<<use-preauthorize,`@PreAuthorize`>> supercedes it and is recommended instead.
799+
<<use-preauthorize,`@PreAuthorize`>> supersedes it and is recommended instead.
800800

801801
To use the `@Secured` annotation, you should first change your Method Security declaration to enable it like so:
802802

docs/modules/ROOT/pages/servlet/saml2/metadata.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ class RefreshableRelyingPartyRegistrationRepository : IterableRelyingPartyRegist
120120
======
121121

122122
[TIP]
123-
`OpenSaml4AssertingPartyMetadataRepository` also ships with a constructor so you can provide a custom `MetadataResolver`. Since the underlying `MetadataResolver` is doing the expirying and refreshing, if you use the constructor directly, you will only get these features by providing an implementation that does so.
123+
`OpenSaml4AssertingPartyMetadataRepository` also ships with a constructor so you can provide a custom `MetadataResolver`. Since the underlying `MetadataResolver` is doing the expiring and refreshing, if you use the constructor directly, you will only get these features by providing an implementation that does so.
124124

125125
=== Verifying Metadata Signatures
126126

0 commit comments

Comments
 (0)