Skip to content

Commit a24d0a8

Browse files
[pre-commit.ci] pre-commit autoupdate (#1544)
* [pre-commit.ci] pre-commit autoupdate updates: - [github.com/astral-sh/ruff-pre-commit: v0.9.2 → v0.9.3](astral-sh/ruff-pre-commit@v0.9.2...v0.9.3) - [github.com/codespell-project/codespell: v2.3.0 → v2.4.0](codespell-project/codespell@v2.3.0...v2.4.0) * codespell --------- Co-authored-by: pre-commit-ci[bot] <66853113+pre-commit-ci[bot]@users.noreply.github.com> Co-authored-by: Alan Crosswell <[email protected]>
1 parent ffcf609 commit a24d0a8

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

.pre-commit-config.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
repos:
22
- repo: https://github.com/astral-sh/ruff-pre-commit
3-
rev: v0.9.2
3+
rev: v0.9.3
44
hooks:
55
- id: ruff
66
args: [ --fix ]
@@ -22,7 +22,7 @@ repos:
2222
- id: sphinx-lint
2323
# Configuration for codespell is in pyproject.toml
2424
- repo: https://github.com/codespell-project/codespell
25-
rev: v2.3.0
25+
rev: v2.4.0
2626
hooks:
2727
- id: codespell
2828
exclude: (package-lock.json|/locale/)

CHANGELOG.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -411,7 +411,7 @@ This is a major release with **BREAKING** changes. Please make sure to review th
411411
* **New feature**: The new setting `ERROR_RESPONSE_WITH_SCOPES` can now be set to True to include required
412412
scopes when DRF authorization fails due to improper scopes.
413413
* **New feature**: The new setting `REFRESH_TOKEN_GRACE_PERIOD_SECONDS` controls a grace period during which
414-
refresh tokens may be re-used.
414+
refresh tokens may be reused.
415415
* An `app_authorized` signal is fired when a token is generated.
416416

417417
## 1.0.0 [2017-06-07]

tests/test_authorization_code.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -989,7 +989,7 @@ def test_refresh_fail_repeating_requests(self):
989989
def test_refresh_repeating_requests_revokes_old_token(self):
990990
"""
991991
If a refresh token is reused, the server should invalidate *all* access tokens that have a relation
992-
to the re-used token. This forces a malicious actor to be logged out.
992+
to the reused token. This forces a malicious actor to be logged out.
993993
The server can't determine whether the first or the second client was legitimate, so it needs to
994994
revoke both.
995995
See https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-29#name-recommendations

0 commit comments

Comments
 (0)