Skip to content

Commit cc007a1

Browse files
fix: address typos in auth-client and EXAMPLES.md
1 parent 44f3435 commit cc007a1

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

EXAMPLES.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1228,7 +1228,7 @@ export const auth0 = new Auth0Client({
12281228
12291229
### Customizing Transaction Cookie Expiration
12301230
1231-
You can configure transaction cookies expiration by providing a `maxAge` proeprty for `transactionCookie`.
1231+
You can configure transaction cookies expiration by providing a `maxAge` property for `transactionCookie`.
12321232
12331233
```ts
12341234
export const auth0 = new Auth0Client({
@@ -1402,8 +1402,8 @@ If you'd like to customize the `user` object to include additional custom claims
14021402
The SDK mounts 6 routes:
14031403
14041404
1. `/auth/login`: the login route that the user will be redirected to to start a initiate an authentication transaction
1405-
2. `/auth/logout`: the logout route that must be addedto your Auth0 application's Allowed Logout URLs
1406-
3. `/auth/callback`: the callback route that must be addedto your Auth0 application's Allowed Callback URLs
1405+
2. `/auth/logout`: the logout route that must be added to your Auth0 application's Allowed Logout URLs
1406+
3. `/auth/callback`: the callback route that must be added to your Auth0 application's Allowed Callback URLs
14071407
4. `/auth/profile`: the route to check the user's session and return their attributes
14081408
5. `/auth/access-token`: the route to check the user's session and return an access token (which will be automatically refreshed if a refresh token is available)
14091409
6. `/auth/backchannel-logout`: the route that will receive a `logout_token` when a configured Back-Channel Logout initiator occurs

src/server/auth-client.ts

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -337,7 +337,7 @@ export class AuthClient {
337337
async startInteractiveLogin(
338338
options: StartInteractiveLoginOptions = {}
339339
): Promise<NextResponse> {
340-
const redirectUri = createRouteUrl(this.routes.callback, this.appBaseUrl); // must be registed with the authorization server
340+
const redirectUri = createRouteUrl(this.routes.callback, this.appBaseUrl); // must be registered with the authorization server
341341
let returnTo = this.signInReturnToPath;
342342

343343
// Validate returnTo parameter
@@ -397,7 +397,7 @@ export class AuthClient {
397397
await this.authorizationUrl(authorizationParams);
398398
if (error) {
399399
return new NextResponse(
400-
"An error occured while trying to initiate the login request.",
400+
"An error occurred while trying to initiate the login request.",
401401
{
402402
status: 500
403403
}
@@ -586,7 +586,7 @@ export class AuthClient {
586586

587587
let codeGrantResponse: Response;
588588
try {
589-
const redirectUri = createRouteUrl(this.routes.callback, this.appBaseUrl); // must be registed with the authorization server
589+
const redirectUri = createRouteUrl(this.routes.callback, this.appBaseUrl); // must be registered with the authorization server
590590
codeGrantResponse = await oauth.authorizationCodeGrantRequest(
591591
authorizationServerMetadata,
592592
this.clientMetadata,
@@ -979,7 +979,7 @@ export class AuthClient {
979979
...tokenSet, // contains the existing `iat` claim to maintain the session lifetime
980980
accessToken: oauthRes.access_token,
981981
idToken: oauthRes.id_token,
982-
// We store the bot requested and granted scopes on the tokenSet, so we know what scopes were requested.
982+
// We store the both requested and granted scopes on the tokenSet, so we know what scopes were requested.
983983
// The server may return less scopes than requested.
984984
// This ensures we can return the same token again when a token for the same or less scopes is requested by using `requestedScope` during look-up.
985985
//

0 commit comments

Comments
 (0)