Skip to content

Commit

Permalink
Fix typos and markdowns (#81)
Browse files Browse the repository at this point in the history
See a detailed description of the rules is available at
https://github.com/markdownlint/markdownlint/blob/master/docs/RULES.md
  • Loading branch information
kianmeng committed Aug 2, 2022
1 parent 48e8b3f commit 769f796
Show file tree
Hide file tree
Showing 5 changed files with 11 additions and 11 deletions.
12 changes: 6 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,12 @@
[![Build Status](https://github.com/ramosbugs/openidconnect-rs/actions/workflows/main.yml/badge.svg)](https://github.com/ramosbugs/openidconnect-rs/actions/workflows/main.yml)
[![codecov](https://codecov.io/gh/ramosbugs/openidconnect-rs/branch/main/graph/badge.svg)](https://codecov.io/gh/ramosbugs/openidconnect-rs)


This library provides extensible, strongly-typed interfaces for the OpenID Connect protocol.
This library provides extensible, strongly-typed interfaces for the OpenID
Connect protocol.

API documentation and examples are available on [docs.rs](https://docs.rs/openidconnect).

# Standards
## Standards

* [OpenID Connect Core](https://openid.net/specs/openid-connect-core-1_0.html)
* This crate passes the
Expand Down Expand Up @@ -41,7 +41,7 @@ API documentation and examples are available on [docs.rs](https://docs.rs/openid
* [OAuth 2.0 Token Introspection](https://tools.ietf.org/html/rfc7662)
* [OAuth 2.0 Token Revocation](https://tools.ietf.org/html/rfc7009)

# Sponsorship
## Sponsorship

This project is sponsored by [Unflakable](https://unflakable.com), a service for tracking and
quarantining flaky tests.
This project is sponsored by [Unflakable](https://unflakable.com), a service
for tracking and quarantining flaky tests.
2 changes: 1 addition & 1 deletion src/core/crypto.rs
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,7 @@ pub fn verify_rsa_signature(
let (n, e) = rsa_public_key(key).map_err(SignatureVerificationError::InvalidKey)?;
// let's n and e as a big integers to prevent issues with leading zeros
// according to https://datatracker.ietf.org/doc/html/rfc7518#section-6.3.1.1
// `n` is alwasy unsigned (hence has sign plus)
// `n` is always unsigned (hence has sign plus)

let n_bigint = BigInt::from_bytes_be(Sign::Plus, n.deref());
let e_bigint = BigInt::from_bytes_be(Sign::Plus, e.deref());
Expand Down
2 changes: 1 addition & 1 deletion src/core/jwk.rs
Original file line number Diff line number Diff line change
Expand Up @@ -356,7 +356,7 @@ impl CoreRsaPrivateSigningKey {
}

/// Filters characters from the base64 input string.
/// Charcters are specified according to lax base64 parsing.
/// Characters are specified according to lax base64 parsing.
///
/// RFC 7468 Lax Parsing
fn lax_base64_parsing(input: &str) -> String {
Expand Down
4 changes: 2 additions & 2 deletions src/id_token.rs
Original file line number Diff line number Diff line change
Expand Up @@ -485,10 +485,10 @@ mod tests {
SubjectIdentifier::new("24400320".to_string())
);

// test `ToString` implemenation
// test `ToString` implementation
assert_eq!(&id_token.to_string(), ID_TOKEN);

// test `serde::Serialize` implemenation too
// test `serde::Serialize` implementation too
let de = serde_json::to_string(&id_token).expect("failed to deserializee id token");
assert_eq!(de, format!("\"{}\"", ID_TOKEN));
}
Expand Down
2 changes: 1 addition & 1 deletion src/types.rs
Original file line number Diff line number Diff line change
Expand Up @@ -375,7 +375,7 @@ pub trait ResponseMode: Debug + DeserializeOwned + Serialize + 'static {}
pub trait ResponseType: AsRef<str> + Debug + DeserializeOwned + Serialize + 'static {
///
/// Converts this OpenID Connect response type to an [`oauth2::ResponseType`] used by the
/// underyling [`oauth2`] crate.
/// underlying [`oauth2`] crate.
///
fn to_oauth2(&self) -> oauth2::ResponseType;
}
Expand Down

0 comments on commit 769f796

Please sign in to comment.