File tree 3 files changed +4
-4
lines changed
3 files changed +4
-4
lines changed Original file line number Diff line number Diff line change 1
1
repos :
2
2
- repo : https://github.com/astral-sh/ruff-pre-commit
3
- rev : v0.9.2
3
+ rev : v0.9.3
4
4
hooks :
5
5
- id : ruff
6
6
args : [ --fix ]
22
22
- id : sphinx-lint
23
23
# Configuration for codespell is in pyproject.toml
24
24
- repo : https://github.com/codespell-project/codespell
25
- rev : v2.3 .0
25
+ rev : v2.4 .0
26
26
hooks :
27
27
- id : codespell
28
28
exclude : (package-lock.json|/locale/)
Original file line number Diff line number Diff line change @@ -411,7 +411,7 @@ This is a major release with **BREAKING** changes. Please make sure to review th
411
411
* ** New feature** : The new setting ` ERROR_RESPONSE_WITH_SCOPES ` can now be set to True to include required
412
412
scopes when DRF authorization fails due to improper scopes.
413
413
* ** New feature** : The new setting ` REFRESH_TOKEN_GRACE_PERIOD_SECONDS ` controls a grace period during which
414
- refresh tokens may be re-used .
414
+ refresh tokens may be reused .
415
415
* An ` app_authorized ` signal is fired when a token is generated.
416
416
417
417
## 1.0.0 [ 2017-06-07]
Original file line number Diff line number Diff line change @@ -989,7 +989,7 @@ def test_refresh_fail_repeating_requests(self):
989
989
def test_refresh_repeating_requests_revokes_old_token (self ):
990
990
"""
991
991
If a refresh token is reused, the server should invalidate *all* access tokens that have a relation
992
- to the re-used token. This forces a malicious actor to be logged out.
992
+ to the reused token. This forces a malicious actor to be logged out.
993
993
The server can't determine whether the first or the second client was legitimate, so it needs to
994
994
revoke both.
995
995
See https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-29#name-recommendations
You can’t perform that action at this time.
0 commit comments