Skip to content

Commit f91bb0f

Browse files
fkmyjeremyevans
authored andcommitted
Fix typos in doc
sucessful ==> successful Unsucessful ==> Unsuccessful absense ==> absence authenicator ==> authenticator colummn ==> column chosing ==> choosing speficiation ==> specification representating ==> representing remebering ==> remembering
1 parent 7c49c42 commit f91bb0f

12 files changed

+12
-12
lines changed

doc/argon2.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ from transitioning from bcrypt to argon2 and vice-versa, if you are using the
3838
update_password_hash feature.
3939

4040
Argon2 is more configurable than bcrypt in terms of password hash cost
41-
speficiation. Instead of specifying the password_hash_cost value as
41+
specification. Instead of specifying the password_hash_cost value as
4242
an integer, you must specify the password hash cost as a hash, such as
4343
(<tt>{t_cost: 2, m_cost: 16}</tt>).
4444

doc/base.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ account_id_column :: The primary key column of the +accounts_table+.
2727
account_open_status_value :: The integer representing open accounts.
2828
account_select :: An array of columns to select from +accounts_table+. By default, selects all columns in the table.
2929
account_status_column :: The status id column in the +accounts_table+.
30-
account_unverified_status_value :: The integer representating unverified accounts.
30+
account_unverified_status_value :: The integer representing unverified accounts.
3131
authenticated_by_session_key :: The key in the session hash storing an array of methods used to authenticate.
3232
autocomplete_for_field?(param) :: Whether to use an autocomplete attribute for the given parameter, defaults to +mark_input_fields_with_autocomplete?+.
3333
autologin_type_session_key :: The key in the session hash storing the type of autologin method used, if autologin was used to authenticate.

doc/change_login.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ change_login_button :: The text to use for the change login button.
1010
change_login_error_flash :: The flash error to show for an unsuccessful login change.
1111
change_login_notice_flash :: The flash notice to show after a successful login change.
1212
change_login_page_title :: The page title to use on the change login form.
13-
change_login_redirect :: Where to redirect after a sucessful login change.
13+
change_login_redirect :: Where to redirect after a successful login change.
1414
change_login_requires_password? :: Whether a password is required when changing logins.
1515
change_login_route :: The route to the change login action. Defaults to +change-login+.
1616
same_as_current_login_message :: The error message to display if using the same value as the current login when changing the login.

doc/change_password.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ change_password_button :: The text to use for the change password button.
1010
change_password_error_flash :: The flash error to show for an unsuccessful password change.
1111
change_password_notice_flash :: The flash notice to show after a successful password change.
1212
change_password_page_title :: The page title to use on the change password form.
13-
change_password_redirect :: Where to redirect after a sucessful password change.
13+
change_password_redirect :: Where to redirect after a successful password change.
1414
change_password_requires_password? :: Whether a password is required when changing passwords.
1515
change_password_route :: The route to the change password action. Defaults to +change-password+.
1616
invalid_previous_password_message :: The message to use when the previous password was incorrect. Defaults to +invalid_password_message+.

doc/guides/alternative_login.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ does not expect an email address to be provided.
1515
Note that Rodauth features that require sending email need an email address, and
1616
that defaults to the value of the login column. If you have both a username and
1717
an email for an account, you can have the login column be the user, and use the
18-
value of the email colummn for the email address.
18+
value of the email column for the email address.
1919

2020
plugin :rodauth do
2121
enable :login, :logout, :reset_password

doc/guides/delay_password.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ask the user to set their password only when they verify their account:
1111
Note that this is already the default behaviour when verify account feature is
1212
loaded, but it's not when verify account grace period is used, because it would
1313
prevent the account from logging in during the grace period. You can work around
14-
this by automatically remebering their login during account creation using the
14+
this by automatically remembering their login during account creation using the
1515
remember feature. Be aware that remembering accounts has effects beyond the
1616
verification period, and this would only allow automatic logins from the browser
1717
that created the account.

doc/guides/internals.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ Here's a heavily commented example showing what is going on inside a Rodauth fea
210210
set_notice_flash foo_notice_flash
211211
redirect foo_redirect
212212
else
213-
# Unsucessful form subsmission will usually set the error flash,
213+
# Unsuccessful form subsmission will usually set the error flash,
214214
# the redisplay the page so that the submission can be fixed.
215215
set_error_flash foo_error_flash
216216
foo_view

doc/login.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ login_form_footer_links :: An array of entries for links to show on the login pa
2020
login_form_footer_links_heading :: A heading to show before the login form footer links.
2121
login_notice_flash :: The flash notice to show after successful login.
2222
login_page_title :: The page title to use on the login form.
23-
login_redirect :: Where to redirect after a sucessful login.
23+
login_redirect :: Where to redirect after a successful login.
2424
login_redirect_session_key :: The key in the session hash storing the location to redirect to after successful login.
2525
login_return_to_requested_location? :: Whether to redirect to the originally requested location after successful login when +require_login+ was used, false by default.
2626
login_return_to_requested_location_max_path_size :: The maximum path size in bytes to allow when returning to requested location, 2048 by default to avoid exceeding the 4K cookie size limit

doc/otp.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ otp_setup_notice_flash :: The flash notice to show if OTP authentication setup w
5353
otp_setup_page_title :: The page title to use on the form to setup OTP authentication.
5454
otp_setup_param :: The parameter name used for the OTP secret when setting up OTP authentication.
5555
otp_setup_raw_param :: The parameter name used for the raw OTP secret when setting up OTP authentication, when +otp_keys_use_hmac?+ is true.
56-
otp_setup_redirect :: Where to redirect after sucessful OTP authentication setup.
56+
otp_setup_redirect :: Where to redirect after successful OTP authentication setup.
5757
otp_setup_route :: The route to the OTP setup action. Defaults to +otp-setup+.
5858

5959
== Auth Methods

doc/password_complexity.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
The password complexity feature implements more sophisticated password
44
complexity checks. It is not recommended to use this feature unless
55
you have a policy that requires it, as users that would not choose a
6-
good password in the absense of password complexity requirements are
6+
good password in the absence of password complexity requirements are
77
unlikely to choose a good password if you have password complexity
88
requirements.
99

doc/password_expiration.rdoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ enabled, but it can be enabled by setting +allow_password_change_after+
1313
to a positive number of seconds.
1414

1515
It is not recommended to use this feature unless you have a policy that
16-
requires it, as password expiration in general results in users chosing
16+
requires it, as password expiration in general results in users choosing
1717
weaker passwords. When asked to change their password, many users choose
1818
a password that is based on their previous password, so forcing password
1919
expiration is in general a net loss from a security perspective.

doc/release_notes/2.32.0.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@
3838
which can be used to handle cases where a user successfully
3939
authenticated via TOTP using the old secret. This can be used
4040
to direct them to a page to remove the TOTP authenticator and
41-
then setup a new TOTP authenicator.
41+
then setup a new TOTP authenticator.
4242

4343
* Many *_response configuration methods have been added, which allow
4444
users to override Rodauth's default behavior in successful cases of

0 commit comments

Comments
 (0)