Skip to content

Commit be0025b

Browse files
authored
Merge pull request #78 from davidpcls/documentation_spelling_corrections
DOC: Fixing a few spelling mistakes
2 parents 39a1662 + 42a4f91 commit be0025b

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

docs/source/configuration.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Basic configuration of the HTTP Server may be set using environment variables. F
1111
single-user API key could be :ref:`set using the environment variable<passing_single_user_API_key_as_ev>`
1212
``QSERVER_HTTP_SERVER_SINGLE_USER_API_KEY``. While many environment variables are supported by the server
1313
and allow high level of customization of functionality, using configuration YML files is more simple,
14-
allows greater fexibility and is considered a preferable way of configuring the server in production
14+
allows greater flexibility and is considered a preferable way of configuring the server in production
1515
deployments.
1616

1717
Environment variable for passing the path to server configuration file(s):
@@ -66,7 +66,7 @@ Configuration Files
6666
-------------------
6767

6868
The preferable method for customizing HTTP server is using configuration YML files. The server
69-
not attemting to load config files unless the path is passed to the server using environment
69+
not attempting to load config files unless the path is passed to the server using environment
7070
variable ``QSERVER_HTTP_SERVER_CONFIG`` as described in :ref:`passing_config_to_server`.
7171
The path may point to a single config file or a directory containing multiple config files.
7272
The settings in config file override any settings defined using environment variables.
@@ -137,7 +137,7 @@ Alternatively, the list of modules can be specified in the configuration file::
137137
Authentication
138138
**************
139139

140-
The server may be configured to run in single-user mode or multi-user mode. In nulti-user
140+
The server may be configured to run in single-user mode or multi-user mode. In multi-user
141141
mode the server is using one or more authentication providers to validate user login
142142
data and allows users to obtain access tokens or API keys for authorization of requests.
143143
Single-user and multi-user modes are mutually exclusive: activation of one or more
@@ -301,7 +301,7 @@ Expiration Time for Tokens and Sessions
301301
The server is using reasonable default values for lifetimes of the access token (15 minutes)
302302
refresh token (7 days) and sessions (365 days). The default values may be changed in
303303
configuration by setting authentication parameters ``access_token_max_age``,
304-
``refresh_token_max_age`` and ``session_max_age``, which define maximum age of the respecitvely
304+
``refresh_token_max_age`` and ``session_max_age``, which define maximum age of the respectively
305305
items in seconds. For example, the following configuration sets maximum age of the tokens
306306
and the session to 10, 3600 and 7200 seconds respectively::
307307

@@ -324,7 +324,7 @@ supports API access control for single-user and anonymous public access.
324324
accepts the fixed dictionary that maps user names to assigned roles as an argument
325325
during initialization (arguments are defined in the config file) and serves as
326326
a convenient tool for testing, demos and small local deployments.
327-
More sophysticated policies based on ``BasicAPIAccessControl`` should be implemented
327+
More sophisticated policies based on ``BasicAPIAccessControl`` should be implemented
328328
for production deployments, where user roles are stored on a secure server.
329329

330330
.. _basic_api_access_policy:
@@ -335,7 +335,7 @@ Basic API Access Policy
335335
``BasicAPIAccessControl`` is used by default if no API access policy is specified in
336336
the config file. The policy supports access in single-user mode and anonymous public mode.
337337
The policy defines two user names: ``UNAUTHENTICATED_SINGLE_USER`` and ``UNAUTHENTICATED_PUBLIC``
338-
associated with ``unauthenticated_single_user`` and ``unauthenticated_public`` respecitvely.
338+
associated with ``unauthenticated_single_user`` and ``unauthenticated_public`` respectively.
339339
The first user name is used to manage access for clients using single-user API key and
340340
the second user name is used for access without API key or token (calls with an invalid
341341
API key or a token always fail).

docs/source/usage.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,7 @@ the browser. The API request does not require authentication::
296296
Administrative API
297297
==================
298298

299-
Some API are available only to clients with administrative permissons
299+
Some API are available only to clients with administrative permissions
300300
(scope ``admin:read:principals`` and/or ``admin:apikeys``).
301301

302302

0 commit comments

Comments
 (0)