From bcb0e40bfca989f164a04cbf46a4175822b7cb28 Mon Sep 17 00:00:00 2001
From: "Peter H. Boling"
Date: Fri, 7 Nov 2025 21:16:06 -0700
Subject: [PATCH] =?UTF-8?q?=E2=9C=8F=EF=B8=8F=20Fix=20typos=20in=20docs?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
---
README.md | 8 +-
docs/OAuth2.html | 2 +-
docs/OAuth2/AccessToken.html | 2 +-
docs/OAuth2/Authenticator.html | 2 +-
docs/OAuth2/Client.html | 2 +-
docs/OAuth2/Error.html | 2 +-
docs/OAuth2/FilteredAttributes.html | 2 +-
.../FilteredAttributes/ClassMethods.html | 2 +-
docs/OAuth2/Response.html | 2 +-
docs/OAuth2/Strategy.html | 2 +-
docs/OAuth2/Strategy/Assertion.html | 2 +-
docs/OAuth2/Strategy/AuthCode.html | 2 +-
docs/OAuth2/Strategy/Base.html | 2 +-
docs/OAuth2/Strategy/ClientCredentials.html | 2 +-
docs/OAuth2/Strategy/Implicit.html | 2 +-
docs/OAuth2/Strategy/Password.html | 2 +-
docs/OAuth2/Version.html | 2 +-
docs/_index.html | 2 +-
docs/file.CHANGELOG.html | 2 +-
docs/file.CODE_OF_CONDUCT.html | 2 +-
docs/file.CONTRIBUTING.html | 2 +-
docs/file.FUNDING.html | 2 +-
docs/file.IRP.html | 2 +-
docs/file.LICENSE.html | 2 +-
docs/file.OIDC.html | 2 +-
docs/file.README.html | 160 +++++++++---------
docs/file.RUBOCOP.html | 2 +-
docs/file.SECURITY.html | 2 +-
docs/file.THREAT_MODEL.html | 2 +-
docs/index.html | 160 +++++++++---------
docs/top-level-namespace.html | 2 +-
31 files changed, 192 insertions(+), 192 deletions(-)
diff --git a/README.md b/README.md
index 13ab7ba0..65e7d6bc 100644
--- a/README.md
+++ b/README.md
@@ -90,7 +90,7 @@ NOTE: `header` - The content type specified in the `curl` is already the default
-
Complete E2E single file script against mock-oauth2-server
- E2E example uses [navikt/mock-oauth2-server](https://github.com/navikt/mock-oauth2-server), which was added in v2.0.11
@@ -304,7 +304,7 @@ Compatibility is further distinguished as "Best Effort Support" or "Incidental S
This gem will install on Ruby versions >= v2.2 for 2.x releases.
See `1-4-stable` branch for older rubies.
-
Ruby Engine Compatibility Policy
This gem is tested against MRI, JRuby, and Truffleruby.
@@ -315,7 +315,7 @@ see [gemfiles/README.md](gemfiles/README.md), then submit a PR to the correct ma
-
Ruby Version Compatibility Policy
If something doesn't work on one of these interpreters, it's a bug.
@@ -470,7 +470,7 @@ They are likely not needed if you are on a newer Ruby.
Expand the examples below, or the [ruby-oauth/snaky_hash](https://gitlab.com/ruby-oauth/snaky_hash) gem,
or [response_spec.rb](https://github.com/ruby-oauth/oauth2/blob/main/spec/oauth2/response_spec.rb), for more ideas, especially if you need to study the hacks for older Rubies.
-
See Examples
```ruby
diff --git a/docs/OAuth2.html b/docs/OAuth2.html
index 1ffcdd17..8f5751f6 100644
--- a/docs/OAuth2.html
+++ b/docs/OAuth2.html
@@ -415,7 +415,7 @@
-<details markdown=”1>
-Complete E2E single file script against mock-oauth2-server
+
+ Complete E2E single file script against mock-oauth2-server
-
- - E2E example uses navikt/mock-oauth2-server, which was added in v2.0.11
- - E2E example does not ship with the released gem, so clone the source to play with it.
-
+
+ - E2E example uses navikt/mock-oauth2-server, which was added in v2.0.11
+ - E2E example does not ship with the released gem, so clone the source to play with it.
+
-console
+ console
docker compose -f docker-compose-ssl.yml up -d --wait
ruby examples/e2e.rb
# If your machine is slow or Docker pulls are cold, increase the wait:
@@ -169,9 +169,9 @@ Quick Examples
# The mock server serves HTTP on 8080; the example points to http://localhost:8080 by default.
-The output should be something like this:
+ The output should be something like this:
-console
+ console
➜ ruby examples/e2e.rb
Access token (truncated): eyJraWQiOiJkZWZhdWx0...
userinfo status: 200
@@ -179,69 +179,69 @@ Quick Examples
E2E complete
-Make sure to shut down the mock server when you are done:
+ Make sure to shut down the mock server when you are done:
-console
+ console
docker compose -f docker-compose-ssl.yml down
-Troubleshooting: validate connectivity to the mock server
+ Troubleshooting: validate connectivity to the mock server
-
- - Check container status and port mapping:
-
- docker compose -f docker-compose-ssl.yml ps
-
-
- - From the host, try the discovery URL directly (this is what the example uses by default):
-
- curl -v http://localhost:8080/default/.well-known/openid-configuration
- - If that fails immediately, also try:
curl -v --connect-timeout 2 http://127.0.0.1:8080/default/.well-known/openid-configuration
+
+ - Check container status and port mapping:
+
+ docker compose -f docker-compose-ssl.yml ps
+
+
+ - From the host, try the discovery URL directly (this is what the example uses by default):
+
+ curl -v http://localhost:8080/default/.well-known/openid-configuration
+ - If that fails immediately, also try:
curl -v --connect-timeout 2 http://127.0.0.1:8080/default/.well-known/openid-configuration
-
-
- - From inside the container (to distinguish container vs. host networking):
-
- docker exec -it oauth2-mock-oauth2-server-1 curl -v http://127.0.0.1:8080/default/.well-known/openid-configuration
-
-
- - Simple TCP probe from the host:
-
- nc -vz localhost 8080 # or: ruby -rsocket -e 'TCPSocket.new("localhost",8080).close; puts "tcp ok"'
-
-
- - Inspect which host port 8080 is bound to (should be 8080):
-
- docker inspect -f '{{ (index (index .NetworkSettings.Ports "8080/tcp") 0).HostPort }}' oauth2-mock-oauth2-server-1
-
-
- - Look at server logs for readiness/errors:
-
- docker logs -n 200 oauth2-mock-oauth2-server-1
-
-
- - On Linux, ensure nothing else is bound to 8080 and that firewall/SELinux aren’t blocking:
-
- ss -ltnp | grep :8080
-
-
-
+
+
+ - From inside the container (to distinguish container vs. host networking):
+
+ docker exec -it oauth2-mock-oauth2-server-1 curl -v http://127.0.0.1:8080/default/.well-known/openid-configuration
+
+
+ - Simple TCP probe from the host:
+
+ nc -vz localhost 8080 # or: ruby -rsocket -e 'TCPSocket.new("localhost",8080).close; puts "tcp ok"'
+
+
+ - Inspect which host port 8080 is bound to (should be 8080):
+
+ docker inspect -f '{{ (index (index .NetworkSettings.Ports "8080/tcp") 0).HostPort }}' oauth2-mock-oauth2-server-1
+
+
+ - Look at server logs for readiness/errors:
+
+ docker logs -n 200 oauth2-mock-oauth2-server-1
+
+
+ - On Linux, ensure nothing else is bound to 8080 and that firewall/SELinux aren’t blocking:
+
+ ss -ltnp | grep :8080
+
+
+
-Notes
+ Notes
-
- - Discovery URL pattern is:
http://localhost:8080/<realm>/.well-known/openid-configuration, where <realm> defaults to default.
- - You can change these with env vars when running the example:
-
- -
+
+ - Discovery URL pattern is:
http://localhost:8080/<realm>/.well-known/openid-configuration, where <realm> defaults to default.
+ - You can change these with env vars when running the example:
+
+ -
E2E_ISSUER_BASE (default: http://localhost:8080)
- -
+
-
E2E_REALM (default: default)
-
-
-
+
+
+
-</details>
+
If it seems like you are in the wrong place, you might try one of these:
@@ -550,34 +550,34 @@ Compatibility
This gem will install on Ruby versions >= v2.2 for 2.x releases.
See 1-4-stable branch for older rubies.
-<details markdown=”1>
-Ruby Engine Compatibility Policy
+
+ Ruby Engine Compatibility Policy
-This gem is tested against MRI, JRuby, and Truffleruby.
+
This gem is tested against MRI, JRuby, and Truffleruby.
Each of those has varying versions that target a specific version of MRI Ruby.
This gem should work in the just-listed Ruby engines according to the targeted MRI compatibility in the table below.
If you would like to add support for additional engines,
see gemfiles/README.md, then submit a PR to the correct maintenance branch as according to the table below.
-</details>
+
-<details markdown=”1>
-Ruby Version Compatibility Policy
+
+ Ruby Version Compatibility Policy
-If something doesn’t work on one of these interpreters, it’s a bug.
+ If something doesn’t work on one of these interpreters, it’s a bug.
-This library may inadvertently work (or seem to work) on other Ruby
+
This library may inadvertently work (or seem to work) on other Ruby
implementations; however, support will only be provided for the versions listed
above.
-If you would like this library to support another Ruby version, you may
+
If you would like this library to support another Ruby version, you may
volunteer to be a maintainer. Being a maintainer entails making sure all tests
run and pass on that implementation. When something breaks on your
implementation, you will be responsible for providing patches in a timely
fashion. If critical issues for a particular implementation exist at the time
of a major release, support for that Ruby version may be dropped.
-</details>
+
@@ -751,15 +751,15 @@ Serialization Extensions
Expand the examples below, or the ruby-oauth/snaky_hash gem,
or response_spec.rb, for more ideas, especially if you need to study the hacks for older Rubies.
-<details markdown=”1>
-See Examples
+
+ See Examples
-```ruby
+
```ruby
class MySnakyHash < SnakyHash::StringKeyed
# Give this hash class dump and load abilities!
extend SnakyHash::Serializer
-#### Serialization Extentions
+
#### Serialization Extentions
#
# Act on the non-hash values (including the values of hashes) as they are dumped to JSON
# In other words, this retains nested hashes, and only the deepest leaf nodes become bananas.
@@ -768,14 +768,14 @@
Serialization Extensions
“banana” # => Make values “banana” on dump
end
-# Act on the non-hash values (including the values of hashes) as they are loaded from the JSON dump
+
# Act on the non-hash values (including the values of hashes) as they are loaded from the JSON dump
# In other words, this retains nested hashes, and only the deepest leaf nodes become .
# WARNING: This is a silly example!
load_value_extensions.add(:to_stars) do |value|
“” # Turn dumped bananas into *** when they are loaded
end
-# Act on the entire hash as it is prepared for dumping to JSON
+
# Act on the entire hash as it is prepared for dumping to JSON
# WARNING: This is a silly example!
dump_hash_extensions.add(:to_cheese) do |value|
if value.is_a?(Hash)
@@ -789,7 +789,7 @@
Serialization Extensions
end
end
-# Act on the entire hash as it is loaded from the JSON dump
+
# Act on the entire hash as it is loaded from the JSON dump
# WARNING: This is a silly example!
load_hash_extensions.add(:to_pizza) do |value|
if value.is_a?(Hash)
@@ -808,7 +808,7 @@
Serialization Extensions
end
```
-</details>
+
Prefer camelCase over snake_case? => snaky: false
@@ -1677,7 +1677,7 @@ Please give the project a star ⭐ ♥
diff --git a/docs/file.RUBOCOP.html b/docs/file.RUBOCOP.html
index 99b4a4b1..a05b5068 100644
--- a/docs/file.RUBOCOP.html
+++ b/docs/file.RUBOCOP.html
@@ -160,7 +160,7 @@ Benefits of rubocop_gradual
diff --git a/docs/file.SECURITY.html b/docs/file.SECURITY.html
index b1a7d6ea..39842b81 100644
--- a/docs/file.SECURITY.html
+++ b/docs/file.SECURITY.html
@@ -93,7 +93,7 @@ Additional Support
diff --git a/docs/file.THREAT_MODEL.html b/docs/file.THREAT_MODEL.html
index d9568287..71e52de8 100644
--- a/docs/file.THREAT_MODEL.html
+++ b/docs/file.THREAT_MODEL.html
@@ -206,7 +206,7 @@ 8. References
diff --git a/docs/index.html b/docs/index.html
index 95578274..57948e36 100644
--- a/docs/index.html
+++ b/docs/index.html
@@ -153,15 +153,15 @@ Quick Examples
-
<details markdown=”1>
-Complete E2E single file script against mock-oauth2-server
+
+ Complete E2E single file script against mock-oauth2-server
-
- - E2E example uses navikt/mock-oauth2-server, which was added in v2.0.11
- - E2E example does not ship with the released gem, so clone the source to play with it.
-
+
+ - E2E example uses navikt/mock-oauth2-server, which was added in v2.0.11
+ - E2E example does not ship with the released gem, so clone the source to play with it.
+
-console
+ console
docker compose -f docker-compose-ssl.yml up -d --wait
ruby examples/e2e.rb
# If your machine is slow or Docker pulls are cold, increase the wait:
@@ -169,9 +169,9 @@ Quick Examples
# The mock server serves HTTP on 8080; the example points to http://localhost:8080 by default.
-The output should be something like this:
+ The output should be something like this:
-console
+ console
➜ ruby examples/e2e.rb
Access token (truncated): eyJraWQiOiJkZWZhdWx0...
userinfo status: 200
@@ -179,69 +179,69 @@ Quick Examples
E2E complete
-Make sure to shut down the mock server when you are done:
+ Make sure to shut down the mock server when you are done:
-console
+ console
docker compose -f docker-compose-ssl.yml down
-Troubleshooting: validate connectivity to the mock server
+ Troubleshooting: validate connectivity to the mock server
-
- - Check container status and port mapping:
-
- docker compose -f docker-compose-ssl.yml ps
-
-
- - From the host, try the discovery URL directly (this is what the example uses by default):
-
- curl -v http://localhost:8080/default/.well-known/openid-configuration
- - If that fails immediately, also try:
curl -v --connect-timeout 2 http://127.0.0.1:8080/default/.well-known/openid-configuration
+
+ - Check container status and port mapping:
+
+ docker compose -f docker-compose-ssl.yml ps
+
+
+ - From the host, try the discovery URL directly (this is what the example uses by default):
+
+ curl -v http://localhost:8080/default/.well-known/openid-configuration
+ - If that fails immediately, also try:
curl -v --connect-timeout 2 http://127.0.0.1:8080/default/.well-known/openid-configuration
-
-
- - From inside the container (to distinguish container vs. host networking):
-
- docker exec -it oauth2-mock-oauth2-server-1 curl -v http://127.0.0.1:8080/default/.well-known/openid-configuration
-
-
- - Simple TCP probe from the host:
-
- nc -vz localhost 8080 # or: ruby -rsocket -e 'TCPSocket.new("localhost",8080).close; puts "tcp ok"'
-
-
- - Inspect which host port 8080 is bound to (should be 8080):
-
- docker inspect -f '{{ (index (index .NetworkSettings.Ports "8080/tcp") 0).HostPort }}' oauth2-mock-oauth2-server-1
-
-
- - Look at server logs for readiness/errors:
-
- docker logs -n 200 oauth2-mock-oauth2-server-1
-
-
- - On Linux, ensure nothing else is bound to 8080 and that firewall/SELinux aren’t blocking:
-
- ss -ltnp | grep :8080
-
-
-
+
+
+ - From inside the container (to distinguish container vs. host networking):
+
+ docker exec -it oauth2-mock-oauth2-server-1 curl -v http://127.0.0.1:8080/default/.well-known/openid-configuration
+
+
+ - Simple TCP probe from the host:
+
+ nc -vz localhost 8080 # or: ruby -rsocket -e 'TCPSocket.new("localhost",8080).close; puts "tcp ok"'
+
+
+ - Inspect which host port 8080 is bound to (should be 8080):
+
+ docker inspect -f '{{ (index (index .NetworkSettings.Ports "8080/tcp") 0).HostPort }}' oauth2-mock-oauth2-server-1
+
+
+ - Look at server logs for readiness/errors:
+
+ docker logs -n 200 oauth2-mock-oauth2-server-1
+
+
+ - On Linux, ensure nothing else is bound to 8080 and that firewall/SELinux aren’t blocking:
+
+ ss -ltnp | grep :8080
+
+
+
-Notes
+ Notes
-
- - Discovery URL pattern is:
http://localhost:8080/<realm>/.well-known/openid-configuration, where <realm> defaults to default.
- - You can change these with env vars when running the example:
-
- -
+
+ - Discovery URL pattern is:
http://localhost:8080/<realm>/.well-known/openid-configuration, where <realm> defaults to default.
+ - You can change these with env vars when running the example:
+
+ -
E2E_ISSUER_BASE (default: http://localhost:8080)
- -
+
-
E2E_REALM (default: default)
-
-
-
+
+
+
-</details>
+
If it seems like you are in the wrong place, you might try one of these:
@@ -550,34 +550,34 @@ Compatibility
This gem will install on Ruby versions >= v2.2 for 2.x releases.
See 1-4-stable branch for older rubies.
-<details markdown=”1>
-Ruby Engine Compatibility Policy
+
+ Ruby Engine Compatibility Policy
-This gem is tested against MRI, JRuby, and Truffleruby.
+
This gem is tested against MRI, JRuby, and Truffleruby.
Each of those has varying versions that target a specific version of MRI Ruby.
This gem should work in the just-listed Ruby engines according to the targeted MRI compatibility in the table below.
If you would like to add support for additional engines,
see gemfiles/README.md, then submit a PR to the correct maintenance branch as according to the table below.
-</details>
+
-<details markdown=”1>
-Ruby Version Compatibility Policy
+
+ Ruby Version Compatibility Policy
-If something doesn’t work on one of these interpreters, it’s a bug.
+ If something doesn’t work on one of these interpreters, it’s a bug.
-This library may inadvertently work (or seem to work) on other Ruby
+
This library may inadvertently work (or seem to work) on other Ruby
implementations; however, support will only be provided for the versions listed
above.
-If you would like this library to support another Ruby version, you may
+
If you would like this library to support another Ruby version, you may
volunteer to be a maintainer. Being a maintainer entails making sure all tests
run and pass on that implementation. When something breaks on your
implementation, you will be responsible for providing patches in a timely
fashion. If critical issues for a particular implementation exist at the time
of a major release, support for that Ruby version may be dropped.
-</details>
+
@@ -751,15 +751,15 @@ Serialization Extensions
Expand the examples below, or the ruby-oauth/snaky_hash gem,
or response_spec.rb, for more ideas, especially if you need to study the hacks for older Rubies.
-<details markdown=”1>
-See Examples
+
+ See Examples
-```ruby
+
```ruby
class MySnakyHash < SnakyHash::StringKeyed
# Give this hash class dump and load abilities!
extend SnakyHash::Serializer
-#### Serialization Extentions
+
#### Serialization Extentions
#
# Act on the non-hash values (including the values of hashes) as they are dumped to JSON
# In other words, this retains nested hashes, and only the deepest leaf nodes become bananas.
@@ -768,14 +768,14 @@
Serialization Extensions
“banana” # => Make values “banana” on dump
end
-# Act on the non-hash values (including the values of hashes) as they are loaded from the JSON dump
+
# Act on the non-hash values (including the values of hashes) as they are loaded from the JSON dump
# In other words, this retains nested hashes, and only the deepest leaf nodes become .
# WARNING: This is a silly example!
load_value_extensions.add(:to_stars) do |value|
“” # Turn dumped bananas into *** when they are loaded
end
-# Act on the entire hash as it is prepared for dumping to JSON
+
# Act on the entire hash as it is prepared for dumping to JSON
# WARNING: This is a silly example!
dump_hash_extensions.add(:to_cheese) do |value|
if value.is_a?(Hash)
@@ -789,7 +789,7 @@
Serialization Extensions
end
end
-# Act on the entire hash as it is loaded from the JSON dump
+
# Act on the entire hash as it is loaded from the JSON dump
# WARNING: This is a silly example!
load_hash_extensions.add(:to_pizza) do |value|
if value.is_a?(Hash)
@@ -808,7 +808,7 @@
Serialization Extensions
end
```
-</details>
+
Prefer camelCase over snake_case? => snaky: false
@@ -1677,7 +1677,7 @@ Please give the project a star ⭐ ♥
diff --git a/docs/top-level-namespace.html b/docs/top-level-namespace.html
index ba975a96..6dacf828 100644
--- a/docs/top-level-namespace.html
+++ b/docs/top-level-namespace.html
@@ -100,7 +100,7 @@ Defined Under Namespace