Skip to content

Commit e3f5519

Browse files
bittiDavid-Ongaro
andauthored
Fix spelling in documentation and comments (#352)
Co-authored-by: Ongaro, David <David.Ongaro@sap.com>
1 parent 538622d commit e3f5519

File tree

5 files changed

+18
-18
lines changed

5 files changed

+18
-18
lines changed

README.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ A replay attack is basically try to reuse an intercepted valid SAML Message in o
154154
SAML Messages have a limited timelife (NotBefore, NotOnOrAfter) that
155155
make harder this kind of attacks, but they are still possible.
156156

157-
In order to avoid them, the SP can keep a list of SAML Messages or Assertion IDs alredy valdidated and processed. Those values only need
157+
In order to avoid them, the SP can keep a list of SAML Messages or Assertion IDs already validated and processed. Those values only need
158158
to be stored the amount of time of the SAML Message life time, so
159159
we don't need to store all processed message/assertion Ids, but the most recent ones.
160160

@@ -297,9 +297,9 @@ This is the ``settings.json`` file:
297297
},
298298
// If you need to specify requested attributes, set a
299299
// attributeConsumingService. nameFormat, attributeValue and
300-
// friendlyName can be ommited
300+
// friendlyName can be omitted
301301
"attributeConsumingService": {
302-
// OPTIONAL: only specifiy if SP requires this.
302+
// OPTIONAL: only specify if SP requires this.
303303
// index is an integer which identifies the attributeConsumingService used
304304
// to the SP. SAML toolkit supports configuring only one attributeConsumingService
305305
// but in certain cases the SP requires a different value. Defaults to '1'.
@@ -366,7 +366,7 @@ This is the ``settings.json`` file:
366366
/*
367367
* Instead of using the whole X.509cert you can use a fingerprint in order to
368368
* validate a SAMLResponse (but you still need the X.509cert to validate LogoutRequest and LogoutResponse using the HTTP-Redirect binding).
369-
* But take in mind that the algortithm for the fingerprint should be as strong as the algorithm in a normal certificate signature
369+
* But take in mind that the algorithm for the fingerprint should be as strong as the algorithm in a normal certificate signature
370370
* (e.g. SHA256 or strong)
371371
*
372372
* (openssl x509 -noout -fingerprint -in "idp.crt" to generate it,
@@ -501,7 +501,7 @@ In addition to the required settings data (idp, sp), extra settings can be defin
501501
'allowRepeatAttributeName': false,
502502

503503
// If the toolkit receive a message signed with a
504-
// deprecated algoritm (defined at the constant class)
504+
// deprecated algorithm (defined at the constant class)
505505
// will raise an error and reject the message
506506
"rejectDeprecatedAlgorithm": true
507507
},
@@ -520,7 +520,7 @@ In addition to the required settings data (idp, sp), extra settings can be defin
520520
},
521521

522522
// Organization information template, the info in en_US lang is
523-
// recomended, add more if required.
523+
// recommended, add more if required.
524524
"organization": {
525525
"en-US": {
526526
"name": "sp_test",
@@ -690,7 +690,7 @@ We can set a ``return_to`` url parameter to the login function and that will be
690690
target_url = 'https://example.com'
691691
auth.login(return_to=target_url)
692692
```
693-
The login method can recieve 3 more optional parameters:
693+
The login method can receive 3 more optional parameters:
694694

695695
* ``force_authn`` When ``true``, the ``AuthNReuqest`` will set the ``ForceAuthn='true'``
696696
* ``is_passive`` When true, the ``AuthNReuqest`` will set the ``Ispassive='true'``
@@ -785,7 +785,7 @@ If we execute print attributes we could get:
785785
}
786786
```
787787

788-
Each attribute name can be used as a key to obtain the value. Every attribute is a list of values. A single-valued attribute is a listy of a single element.
788+
Each attribute name can be used as a key to obtain the value. Every attribute is a list of values. A single-valued attribute is a list of a single element.
789789

790790
The following code is equivalent:
791791

@@ -813,7 +813,7 @@ if len(errors) == 0:
813813
# the value of the url is a trusted URL.
814814
return redirect(url)
815815
else:
816-
print("Sucessfully Logged out")
816+
print("Successfully Logged out")
817817
else:
818818
print("Error when processing SLO: %s %s" % (', '.join(errors), auth.get_last_error_reason()))
819819
```
@@ -955,7 +955,7 @@ elif 'sls' in request.args: # Single
955955
# the value of the url is a trusted URL.
956956
return redirect(url)
957957
else:
958-
msg = "Sucessfully logged out"
958+
msg = "Successfully logged out"
959959

960960
if len(errors) == 0:
961961
print(msg)
@@ -1071,7 +1071,7 @@ SAML 2 Logout Request class
10711071
* ***get_nameid*** Gets the NameID of the Logout Request Message (returns a string).
10721072
* ***get_issuer*** Gets the Issuer of the Logout Request Message.
10731073
* ***get_session_indexes*** Gets the ``SessionIndexes`` from the Logout Request.
1074-
* ***is_valid*** Checks if the Logout Request recieved is valid.
1074+
* ***is_valid*** Checks if the Logout Request received is valid.
10751075
* ***get_error*** After execute a validation process, if fails this method returns the cause.
10761076
* ***get_xml*** Returns the XML that will be sent as part of the request or that was received at the SP
10771077

@@ -1154,7 +1154,7 @@ Auxiliary class that contains several methods
11541154
* ***get_expire_time*** Compares 2 dates and returns the earliest.
11551155
* ***delete_local_session*** Deletes the local session.
11561156
* ***calculate_X.509_fingerprint*** Calculates the fingerprint of a X.509 cert.
1157-
* ***format_finger_print*** Formates a fingerprint.
1157+
* ***format_finger_print*** Formats a fingerprint.
11581158
* ***generate_name_id*** Generates a nameID.
11591159
* ***get_status*** Gets Status from a Response.
11601160
* ***decrypt_element*** Decrypts an encrypted element.
@@ -1204,7 +1204,7 @@ let's see how fast is it to deploy them.
12041204
The use of a [virtualenv](http://virtualenv.readthedocs.org/en/latest/) is
12051205
highly recommended.
12061206

1207-
Virtualenv helps isolating the python enviroment used to run the toolkit. You
1207+
Virtualenv helps isolating the python environment used to run the toolkit. You
12081208
can find more details and an installation guide in the
12091209
[official documentation](http://virtualenv.readthedocs.org/en/latest/).
12101210

@@ -1508,7 +1508,7 @@ Once the SP is configured, the metadata of the SP is published at the ``/metadat
15081508

15091509
4. We are logged in the app and the user attributes are showed. At this point, we can test the single log out functionality.
15101510

1511-
The single log out funcionality could be tested by 2 ways.
1511+
The single log out functionality could be tested by 2 ways.
15121512

15131513
5.1 SLO Initiated by SP. Click on the "logout" link at the SP, after that a Logout Request is sent to the IdP, the session at the IdP is closed and replies through the client to the SP with a Logout Response (sent to the Single Logout Service endpoint). The SLS endpoint /?sls of the SP process the Logout Response and if is valid, close the user session of the local app. Notice that the SLO Workflow starts and ends at the SP.
15141514

changelog.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@
101101
### 1.3.0 (Sep 15, 2017)
102102
* Improve decrypt method, Add an option to decrypt an element in place or copy it before decryption.
103103
* [#63](https://github.com/onelogin/python3-saml/pull/63) Be able to get at the auth object the last processed ID (response/assertion) and the last generated ID, as well as the NotOnOrAfter value of the valid SubjectConfirmationData in the processed SAMLResponse
104-
* On a LogoutRequest if the NameIdFormat is entity, NameQualifier and SPNameQualifier will be ommited. If the NameIdFormat is not entity and a NameQualifier is provided, then the SPNameQualifier will be also added.
104+
* On a LogoutRequest if the NameIdFormat is entity, NameQualifier and SPNameQualifier will be omitted. If the NameIdFormat is not entity and a NameQualifier is provided, then the SPNameQualifier will be also added.
105105
* Reset errorReason attribute of the auth object before each Process method
106106
* [#65](https://github.com/onelogin/python3-saml/pull/65) Fix issue on getting multiple certs when only sign or encryption certs
107107

src/onelogin/saml2/utils.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -901,7 +901,7 @@ def validate_metadata_sign(xml, cert=None, fingerprint=None, fingerprintalg='sha
901901

902902
if len(signature_nodes) > 0:
903903
for signature_node in signature_nodes:
904-
# Raises expection if invalid
904+
# Raises exception if invalid
905905
OneLogin_Saml2_Utils.validate_node_sign(signature_node, elem, cert, fingerprint, fingerprintalg, validatecert, debug, raise_exceptions=True)
906906
return True
907907
else:

tests/src/OneLogin/saml2_tests/auth_test.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -310,7 +310,7 @@ def testProcessSLOResponseInvalid(self):
310310
def testProcessSLOResponseNoSucess(self):
311311
"""
312312
Tests the process_slo method of the OneLogin_Saml2_Auth class
313-
Case Logout Response not sucess
313+
Case Logout Response not success
314314
"""
315315
request_data = self.get_request()
316316
message = self.file_contents(join(self.data_path, 'logout_responses', 'invalids', 'status_code_responder.xml.base64'))

tests/src/OneLogin/saml2_tests/response_test.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1282,7 +1282,7 @@ def testIsInValidSessionIndex(self):
12821282
def testDatetimeWithMiliseconds(self):
12831283
"""
12841284
Tests the is_valid method of the OneLogin_Saml2_Response class
1285-
Somtimes IdPs uses datetimes with miliseconds, this
1285+
Sometimes IdPs uses datetimes with miliseconds, this
12861286
test is to verify that the toolkit supports them
12871287
"""
12881288
settings = OneLogin_Saml2_Settings(self.loadSettingsJSON())

0 commit comments

Comments
 (0)