summaryrefslogtreecommitdiff
path: root/django/contrib/auth
diff options
context:
space:
mode:
authorSarah Boyce <42296566+sarahboyce@users.noreply.github.com>2025-07-18 15:37:14 +0200
committernessita <124304+nessita@users.noreply.github.com>2025-07-23 10:09:43 -0300
commit1ecf6889cabc9f3f60d3fdd651468cddd8f4da6e (patch)
tree77eebf89eaf5f1ee6f5947a962caa67b5cca7f4b /django/contrib/auth
parent1909108f9f0f2a91c1ec0fcdb65b01f58743a871 (diff)
Removed double spaces after periods and within phrases.
Diffstat (limited to 'django/contrib/auth')
-rw-r--r--django/contrib/auth/backends.py4
-rw-r--r--django/contrib/auth/hashers.py6
-rw-r--r--django/contrib/auth/management/__init__.py2
-rw-r--r--django/contrib/auth/middleware.py8
4 files changed, 10 insertions, 10 deletions
diff --git a/django/contrib/auth/backends.py b/django/contrib/auth/backends.py
index 8352530665..e72a18981c 100644
--- a/django/contrib/auth/backends.py
+++ b/django/contrib/auth/backends.py
@@ -254,7 +254,7 @@ class RemoteUserBackend(ModelBackend):
is handling authentication outside of Django.
By default, the ``authenticate`` method creates ``User`` objects for
- usernames that don't already exist in the database. Subclasses can disable
+ usernames that don't already exist in the database. Subclasses can disable
this behavior by setting the ``create_unknown_user`` attribute to
``False``.
"""
@@ -318,7 +318,7 @@ class RemoteUserBackend(ModelBackend):
def clean_username(self, username):
"""
Perform any cleaning on the "username" prior to using it to get or
- create the user object. Return the cleaned username.
+ create the user object. Return the cleaned username.
By default, return the username unchanged.
"""
diff --git a/django/contrib/auth/hashers.py b/django/contrib/auth/hashers.py
index aa183c3904..29eb1f1b77 100644
--- a/django/contrib/auth/hashers.py
+++ b/django/contrib/auth/hashers.py
@@ -314,7 +314,7 @@ class PBKDF2PasswordHasher(BasePasswordHasher):
Secure password hashing using the PBKDF2 algorithm (recommended)
Configured to use PBKDF2 + HMAC + SHA256.
- The result is a 64 byte binary string. Iterations may be changed
+ The result is a 64 byte binary string. Iterations may be changed
safely but you must rename the algorithm if you change SHA256.
"""
@@ -486,7 +486,7 @@ class BCryptSHA256PasswordHasher(BasePasswordHasher):
Secure password hashing using the bcrypt algorithm (recommended)
This is considered by many to be the most secure algorithm but you
- must first install the bcrypt library. Please be warned that
+ must first install the bcrypt library. Please be warned that
this library depends on native C code and might cause portability
issues.
"""
@@ -559,7 +559,7 @@ class BCryptPasswordHasher(BCryptSHA256PasswordHasher):
Secure password hashing using the bcrypt algorithm
This is considered by many to be the most secure algorithm but you
- must first install the bcrypt library. Please be warned that
+ must first install the bcrypt library. Please be warned that
this library depends on native C code and might cause portability
issues.
diff --git a/django/contrib/auth/management/__init__.py b/django/contrib/auth/management/__init__.py
index a8639cb258..e816357b2b 100644
--- a/django/contrib/auth/management/__init__.py
+++ b/django/contrib/auth/management/__init__.py
@@ -80,7 +80,7 @@ def create_permissions(
)
# Find all the Permissions that have a content_type for a model we're
- # looking for. We don't need to check for codenames since we already have
+ # looking for. We don't need to check for codenames since we already have
# a list of the ones we're going to create.
all_perms = set(
Permission.objects.using(using)
diff --git a/django/contrib/auth/middleware.py b/django/contrib/auth/middleware.py
index 6be3552cad..297a8a83b2 100644
--- a/django/contrib/auth/middleware.py
+++ b/django/contrib/auth/middleware.py
@@ -137,7 +137,7 @@ class RemoteUserMiddleware:
if not hasattr(request, "user"):
raise ImproperlyConfigured(
"The Django remote user auth middleware requires the"
- " authentication middleware to be installed. Edit your"
+ " authentication middleware to be installed. Edit your"
" MIDDLEWARE setting to insert"
" 'django.contrib.auth.middleware.AuthenticationMiddleware'"
" before the RemoteUserMiddleware class."
@@ -166,7 +166,7 @@ class RemoteUserMiddleware:
# to authenticate the user.
user = auth.authenticate(request, remote_user=username)
if user:
- # User is valid. Set request.user and persist user in the session
+ # User is valid. Set request.user and persist user in the session
# by logging the user in.
request.user = user
auth.login(request, user)
@@ -194,7 +194,7 @@ class RemoteUserMiddleware:
if not hasattr(request, "user"):
raise ImproperlyConfigured(
"The Django remote user auth middleware requires the"
- " authentication middleware to be installed. Edit your"
+ " authentication middleware to be installed. Edit your"
" MIDDLEWARE setting to insert"
" 'django.contrib.auth.middleware.AuthenticationMiddleware'"
" before the RemoteUserMiddleware class."
@@ -226,7 +226,7 @@ class RemoteUserMiddleware:
# to authenticate the user.
user = await auth.aauthenticate(request, remote_user=username)
if user:
- # User is valid. Set request.user and persist user in the session
+ # User is valid. Set request.user and persist user in the session
# by logging the user in.
request.user = user
await auth.alogin(request, user)