diff options
| author | Sarah Boyce <42296566+sarahboyce@users.noreply.github.com> | 2025-07-18 15:37:14 +0200 |
|---|---|---|
| committer | nessita <124304+nessita@users.noreply.github.com> | 2025-07-23 10:09:43 -0300 |
| commit | 1ecf6889cabc9f3f60d3fdd651468cddd8f4da6e (patch) | |
| tree | 77eebf89eaf5f1ee6f5947a962caa67b5cca7f4b /django/contrib/auth | |
| parent | 1909108f9f0f2a91c1ec0fcdb65b01f58743a871 (diff) | |
Removed double spaces after periods and within phrases.
Diffstat (limited to 'django/contrib/auth')
| -rw-r--r-- | django/contrib/auth/backends.py | 4 | ||||
| -rw-r--r-- | django/contrib/auth/hashers.py | 6 | ||||
| -rw-r--r-- | django/contrib/auth/management/__init__.py | 2 | ||||
| -rw-r--r-- | django/contrib/auth/middleware.py | 8 |
4 files changed, 10 insertions, 10 deletions
diff --git a/django/contrib/auth/backends.py b/django/contrib/auth/backends.py index 8352530665..e72a18981c 100644 --- a/django/contrib/auth/backends.py +++ b/django/contrib/auth/backends.py @@ -254,7 +254,7 @@ class RemoteUserBackend(ModelBackend): is handling authentication outside of Django. By default, the ``authenticate`` method creates ``User`` objects for - usernames that don't already exist in the database. Subclasses can disable + usernames that don't already exist in the database. Subclasses can disable this behavior by setting the ``create_unknown_user`` attribute to ``False``. """ @@ -318,7 +318,7 @@ class RemoteUserBackend(ModelBackend): def clean_username(self, username): """ Perform any cleaning on the "username" prior to using it to get or - create the user object. Return the cleaned username. + create the user object. Return the cleaned username. By default, return the username unchanged. """ diff --git a/django/contrib/auth/hashers.py b/django/contrib/auth/hashers.py index aa183c3904..29eb1f1b77 100644 --- a/django/contrib/auth/hashers.py +++ b/django/contrib/auth/hashers.py @@ -314,7 +314,7 @@ class PBKDF2PasswordHasher(BasePasswordHasher): Secure password hashing using the PBKDF2 algorithm (recommended) Configured to use PBKDF2 + HMAC + SHA256. - The result is a 64 byte binary string. Iterations may be changed + The result is a 64 byte binary string. Iterations may be changed safely but you must rename the algorithm if you change SHA256. """ @@ -486,7 +486,7 @@ class BCryptSHA256PasswordHasher(BasePasswordHasher): Secure password hashing using the bcrypt algorithm (recommended) This is considered by many to be the most secure algorithm but you - must first install the bcrypt library. Please be warned that + must first install the bcrypt library. Please be warned that this library depends on native C code and might cause portability issues. """ @@ -559,7 +559,7 @@ class BCryptPasswordHasher(BCryptSHA256PasswordHasher): Secure password hashing using the bcrypt algorithm This is considered by many to be the most secure algorithm but you - must first install the bcrypt library. Please be warned that + must first install the bcrypt library. Please be warned that this library depends on native C code and might cause portability issues. diff --git a/django/contrib/auth/management/__init__.py b/django/contrib/auth/management/__init__.py index a8639cb258..e816357b2b 100644 --- a/django/contrib/auth/management/__init__.py +++ b/django/contrib/auth/management/__init__.py @@ -80,7 +80,7 @@ def create_permissions( ) # Find all the Permissions that have a content_type for a model we're - # looking for. We don't need to check for codenames since we already have + # looking for. We don't need to check for codenames since we already have # a list of the ones we're going to create. all_perms = set( Permission.objects.using(using) diff --git a/django/contrib/auth/middleware.py b/django/contrib/auth/middleware.py index 6be3552cad..297a8a83b2 100644 --- a/django/contrib/auth/middleware.py +++ b/django/contrib/auth/middleware.py @@ -137,7 +137,7 @@ class RemoteUserMiddleware: if not hasattr(request, "user"): raise ImproperlyConfigured( "The Django remote user auth middleware requires the" - " authentication middleware to be installed. Edit your" + " authentication middleware to be installed. Edit your" " MIDDLEWARE setting to insert" " 'django.contrib.auth.middleware.AuthenticationMiddleware'" " before the RemoteUserMiddleware class." @@ -166,7 +166,7 @@ class RemoteUserMiddleware: # to authenticate the user. user = auth.authenticate(request, remote_user=username) if user: - # User is valid. Set request.user and persist user in the session + # User is valid. Set request.user and persist user in the session # by logging the user in. request.user = user auth.login(request, user) @@ -194,7 +194,7 @@ class RemoteUserMiddleware: if not hasattr(request, "user"): raise ImproperlyConfigured( "The Django remote user auth middleware requires the" - " authentication middleware to be installed. Edit your" + " authentication middleware to be installed. Edit your" " MIDDLEWARE setting to insert" " 'django.contrib.auth.middleware.AuthenticationMiddleware'" " before the RemoteUserMiddleware class." @@ -226,7 +226,7 @@ class RemoteUserMiddleware: # to authenticate the user. user = await auth.aauthenticate(request, remote_user=username) if user: - # User is valid. Set request.user and persist user in the session + # User is valid. Set request.user and persist user in the session # by logging the user in. request.user = user await auth.alogin(request, user) |
