Skip to content

Commit bb0fac6

Browse files
robin850rwinch
authored andcommitted
Fix a few typos in the documentation
1 parent 1d821a2 commit bb0fac6

File tree

8 files changed

+16
-16
lines changed

8 files changed

+16
-16
lines changed

docs/manual/src/docs/asciidoc/_includes/about/authentication/password-storage.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@ The `Argon2PasswordEncoder` implementation uses the https://en.wikipedia.org/wik
355355
Argon2 is the winner of the https://en.wikipedia.org/wiki/Password_Hashing_Competition[Password Hashing Competition].
356356
In order to defeat password cracking on custom hardware, Argon2 is a deliberately slow algorithm that requires large amounts of memory.
357357
Like other adaptive one-way functions, it should be tuned to take about 1 second to verify a password on your system.
358-
The current implementation if the `Argon2PasswordEncoder` requires BouncyCastle.
358+
The current implementation of the `Argon2PasswordEncoder` requires BouncyCastle.
359359

360360
.Argon2PasswordEncoder
361361
====

docs/manual/src/docs/asciidoc/_includes/about/exploits/headers.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Expires: 0
7272
====
7373

7474
In order to be secure by default, Spring Security adds these headers by default.
75-
However, if your application provides it's own cache control headers Spring Security will back out of the way.
75+
However, if your application provides its own cache control headers Spring Security will back out of the way.
7676
This allows for applications to ensure that static resources like CSS and JavaScript can be cached.
7777

7878

@@ -119,7 +119,7 @@ Refer to the relevant sections to see how to customize the defaults for both <<s
119119

120120
When you type in your bank's website, do you enter mybank.example.com or do you enter https://mybank.example.com[]?
121121
If you omit the https protocol, you are potentially vulnerable to https://en.wikipedia.org/wiki/Man-in-the-middle_attack[Man in the Middle attacks].
122-
Even if the website performs a redirect to https://mybank.example.com a malicious user could intercept the initial HTTP request and manipulate the response (i.e. redirect to https://mibank.example.com and steal their credentials).
122+
Even if the website performs a redirect to https://mybank.example.com a malicious user could intercept the initial HTTP request and manipulate the response (e.g. redirect to https://mibank.example.com and steal their credentials).
123123

124124
Many users omit the https protocol and this is why https://tools.ietf.org/html/rfc6797[HTTP Strict Transport Security (HSTS)] was created.
125125
Once mybank.example.com is added as a https://tools.ietf.org/html/rfc6797#section-5.1[HSTS host], a browser can know ahead of time that any request to mybank.example.com should be interpreted as https://mybank.example.com.
@@ -144,7 +144,7 @@ Strict-Transport-Security: max-age=31536000 ; includeSubDomains ; preload
144144
----
145145
====
146146

147-
The optional `includeSubDomains` directive instructs the browser that subdomains (i.e. secure.mybank.example.com) should also be treated as an HSTS domain.
147+
The optional `includeSubDomains` directive instructs the browser that subdomains (e.g. secure.mybank.example.com) should also be treated as an HSTS domain.
148148

149149
The optional `preload` directive instructs the browser that domain should be preloaded in browser as HSTS domain.
150150
For more details on HSTS preload please see https://hstspreload.org.

docs/manual/src/docs/asciidoc/_includes/servlet/architecture/security-filter-chain.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ In a Servlet container, ``Filter``s are invoked based upon the URL alone.
2323
However, `FilterChainProxy` can determine invocation based upon anything in the `HttpServletRequest` by leveraging the `RequestMatcher` interface.
2424

2525
In fact, `FilterChainProxy` can be used to determine which `SecurityFilterChain` should be used.
26-
This allows providing a totally separate configuration for different _slices_ if your application.
26+
This allows providing a totally separate configuration for different _slices_ of your application.
2727

2828
.Multiple SecurityFilterChain
2929
[[servlet-multi-securityfilterchain-figure]]

docs/manual/src/docs/asciidoc/_includes/servlet/authentication/architecture/provider-manager.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
`ProviderManager` delegates to a `List` of <<servlet-authentication-authenticationprovider,``AuthenticationProvider``s>>.
77
// FIXME: link to AuthenticationProvider
88
Each `AuthenticationProvider` has an opportunity to indicate that authentication should be successful, fail, or indicate it cannot make a decision and allow a downstream `AuthenticationProvider` to decide.
9-
If none of the configured ``AuthenticationProvider``s can authenticate, then authentication will fail with a `ProviderNotFoundException` which is a special `AuthenticationException` that indicates the `ProviderManager` was not configured support the type of `Authentication` that was passed into it.
9+
If none of the configured ``AuthenticationProvider``s can authenticate, then authentication will fail with a `ProviderNotFoundException` which is a special `AuthenticationException` that indicates the `ProviderManager` was not configured to support the type of `Authentication` that was passed into it.
1010

1111
image::{figures}/providermanager.png[]
1212

docs/manual/src/docs/asciidoc/_includes/servlet/authentication/unpwd/in-memory.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ The samples above store the passwords in a secure format, but leave a lot to be
6565

6666

6767
In the sample below we leverage <<authentication-password-storage-dep-getting-started,User.withDefaultPasswordEncoder>> to ensure that the password stored in memory is protected.
68-
However, it does not protect the password against obtaining the password by decompiling the source code.
68+
However, it does not protect against obtaining the password by decompiling the source code.
6969
For this reason, `User.withDefaultPasswordEncoder` should only be used for "getting started" and is not intended for production.
7070

7171
.InMemoryUserDetailsManager with User.withDefaultPasswordEncoder

docs/manual/src/docs/asciidoc/_includes/servlet/authorization/acls.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Columns include the ID, a foreign key to the ACL_CLASS table, a unique identifie
7272
We have a single row for every domain object instance we're storing ACL permissions for.
7373

7474
* Finally, ACL_ENTRY stores the individual permissions assigned to each recipient.
75-
Columns include a foreign key to the ACL_OBJECT_IDENTITY, the recipient (ie a foreign key to ACL_SID), whether we'll be auditing or not, and the integer bit mask that represents the actual permission being granted or denied.
75+
Columns include a foreign key to the ACL_OBJECT_IDENTITY, the recipient (i.e. a foreign key to ACL_SID), whether we'll be auditing or not, and the integer bit mask that represents the actual permission being granted or denied.
7676
We have a single row for every recipient that receives a permission to work with a domain object.
7777

7878

@@ -113,7 +113,7 @@ The default implementation is called `ObjectIdentityImpl`.
113113

114114
* `AclService`: Retrieves the `Acl` applicable for a given `ObjectIdentity`.
115115
In the included implementation (`JdbcAclService`), retrieval operations are delegated to a `LookupStrategy`.
116-
The `LookupStrategy` provides a highly optimized strategy for retrieving ACL information, using batched retrievals `(BasicLookupStrategy`) and supporting custom implementations that leverage materialized views, hierarchical queries and similar performance-centric, non-ANSI SQL capabilities.
116+
The `LookupStrategy` provides a highly optimized strategy for retrieving ACL information, using batched retrievals (`BasicLookupStrategy`) and supporting custom implementations that leverage materialized views, hierarchical queries and similar performance-centric, non-ANSI SQL capabilities.
117117

118118
* `MutableAclService`: Allows a modified `Acl` to be presented for persistence.
119119
It is not essential to use this interface if you do not wish.
@@ -141,7 +141,7 @@ You'll also need to populate the database with the four ACL-specific tables list
141141
Once you've created the required schema and instantiated `JdbcMutableAclService`, you'll next need to ensure your domain model supports interoperability with the Spring Security ACL package.
142142
Hopefully `ObjectIdentityImpl` will prove sufficient, as it provides a large number of ways in which it can be used.
143143
Most people will have domain objects that contain a `public Serializable getId()` method.
144-
If the return type is long, or compatible with long (eg an int), you will find you need not give further consideration to `ObjectIdentity` issues.
144+
If the return type is long, or compatible with long (e.g. an int), you will find you need not give further consideration to `ObjectIdentity` issues.
145145
Many parts of the ACL module rely on long identifiers.
146146
If you're not using long (or an int, byte etc), there is a very good chance you'll need to reimplement a number of classes.
147147
We do not intend to support non-long identifiers in Spring Security's ACL module, as longs are already compatible with all database sequences, the most common identifier data type, and are of sufficient length to accommodate all common usage scenarios.

docs/manual/src/docs/asciidoc/_includes/servlet/authorization/expression-based.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ For example:
103103
Here we have defined that the "admin" area of an application (defined by the URL pattern) should only be available to users who have the granted authority "admin" and whose IP address matches a local subnet.
104104
We've already seen the built-in `hasRole` expression in the previous section.
105105
The expression `hasIpAddress` is an additional built-in expression which is specific to web security.
106-
It is defined by the `WebSecurityExpressionRoot` class, an instance of which is used as the expression root object when evaluation web-access expressions.
106+
It is defined by the `WebSecurityExpressionRoot` class, an instance of which is used as the expression root object when evaluating web-access expressions.
107107
This object also directly exposed the `HttpServletRequest` object under the name `request` so you can invoke the request directly in an expression.
108108
If expressions are being used, a `WebExpressionVoter` will be added to the `AccessDecisionManager` which is used by the namespace.
109109
So if you aren't using the namespace and want to use expressions, you will have to add one of these to your configuration.
@@ -207,7 +207,7 @@ Their use is enabled through the `global-method-security` namespace element:
207207

208208
===== Access Control using @PreAuthorize and @PostAuthorize
209209
The most obviously useful annotation is `@PreAuthorize` which decides whether a method can actually be invoked or not.
210-
For example (from the"Contacts" sample application)
210+
For example (from the "Contacts" sample application)
211211

212212
[source,java]
213213
----
@@ -226,7 +226,7 @@ public void deletePermission(Contact contact, Sid recipient, Permission permissi
226226
----
227227

228228
Here we're actually using a method argument as part of the expression to decide whether the current user has the "admin"permission for the given contact.
229-
The built-in `hasPermission()` expression is linked into the Spring Security ACL module through the application context, as we'll<<el-permission-evaluator,see below>>.
229+
The built-in `hasPermission()` expression is linked into the Spring Security ACL module through the application context, as we'll <<el-permission-evaluator,see below>>.
230230
You can access any of the method arguments by name as expression variables.
231231

232232
There are a number of ways in which Spring Security can resolve the method arguments.
@@ -251,7 +251,7 @@ public void doSomething(@P("c") Contact contact);
251251

252252
+
253253

254-
Behind the scenes this use implemented using `AnnotationParameterNameDiscoverer` which can be customized to support the value attribute of any specified annotation.
254+
Behind the scenes this is implemented using `AnnotationParameterNameDiscoverer` which can be customized to support the value attribute of any specified annotation.
255255

256256
* If Spring Data's `@Param` annotation is present on at least one parameter for the method, the value will be used.
257257
This is useful for interfaces compiled with a JDK prior to JDK 8 which do not contain any information about the parameter names.
@@ -271,7 +271,7 @@ Contact findContactByName(@Param("n") String name);
271271

272272
+
273273

274-
Behind the scenes this use implemented using `AnnotationParameterNameDiscoverer` which can be customized to support the value attribute of any specified annotation.
274+
Behind the scenes this is implemented using `AnnotationParameterNameDiscoverer` which can be customized to support the value attribute of any specified annotation.
275275

276276
* If JDK 8 was used to compile the source with the -parameters argument and Spring 4+ is being used, then the standard JDK reflection API is used to discover the parameter names.
277277
This works on both classes and interfaces.

docs/manual/src/docs/asciidoc/_includes/servlet/authorization/secure-objects.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,4 +140,4 @@ A bean declaration which achieves this is shown below:
140140

141141

142142
That's it!
143-
Now you can create your beans from anywhere within your application, using whatever means you think fit (eg `new Person();`) and they will have the security interceptor applied.
143+
Now you can create your beans from anywhere within your application, using whatever means you think fit (e.g. `new Person();`) and they will have the security interceptor applied.

0 commit comments

Comments
 (0)