Skip to content

Commit

Permalink
codespell
Browse files Browse the repository at this point in the history
  • Loading branch information
n2ygk committed Jan 27, 2025
1 parent 8f4827c commit 250426b
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -411,7 +411,7 @@ This is a major release with **BREAKING** changes. Please make sure to review th
* **New feature**: The new setting `ERROR_RESPONSE_WITH_SCOPES` can now be set to True to include required
scopes when DRF authorization fails due to improper scopes.
* **New feature**: The new setting `REFRESH_TOKEN_GRACE_PERIOD_SECONDS` controls a grace period during which
refresh tokens may be re-used.
refresh tokens may be reused.
* An `app_authorized` signal is fired when a token is generated.

## 1.0.0 [2017-06-07]
Expand Down
2 changes: 1 addition & 1 deletion tests/test_authorization_code.py
Original file line number Diff line number Diff line change
Expand Up @@ -989,7 +989,7 @@ def test_refresh_fail_repeating_requests(self):
def test_refresh_repeating_requests_revokes_old_token(self):
"""
If a refresh token is reused, the server should invalidate *all* access tokens that have a relation
to the re-used token. This forces a malicious actor to be logged out.
to the reused token. This forces a malicious actor to be logged out.
The server can't determine whether the first or the second client was legitimate, so it needs to
revoke both.
See https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-29#name-recommendations
Expand Down

0 comments on commit 250426b

Please sign in to comment.