Skip to content

Commit

Permalink
Merge pull request #113 from lenkan/fix-spelling-errors
Browse files Browse the repository at this point in the history
fix spelling errors
  • Loading branch information
m00sey authored Oct 26, 2023
2 parents 117a1ca + 02925fc commit 6b82045
Show file tree
Hide file tree
Showing 7 changed files with 55 additions and 55 deletions.
36 changes: 18 additions & 18 deletions src/keria/app/aiding.py
Original file line number Diff line number Diff line change
Expand Up @@ -615,7 +615,7 @@ def info(hab, rm, full=False):

class IdentifierOOBICollectionEnd:
"""
This class represents the OOBI subresource collection endpoint for Identfiiers
This class represents the OOBI subresource collection endpoint for identifiers
"""

Expand Down Expand Up @@ -855,12 +855,12 @@ def on_get(req, rep):
content:
application/json:
schema:
description: Randon word list
description: Random word list
type: object
properties:
words:
type: array
description: random challange word list
description: random challenge word list
items:
type: string
Expand All @@ -886,10 +886,10 @@ def on_post(req, rep, name):
Parameters:
req: falcon.Request HTTP request
rep: falcon.Response HTTP response
name: human readable name of identifier to use to sign the challange/response
name: human readable name of identifier to use to sign the challenge/response
---
summary: Sign challange message and forward to peer identfiier
summary: Sign challenge message and forward to peer identifier
description: Sign a challenge word list received out of bands and send `exn` peer to peer message
to recipient
tags:
Expand Down Expand Up @@ -949,11 +949,11 @@ def on_post(req, rep, name, source):
Parameters:
req: falcon.Request HTTP request
rep: falcon.Response HTTP response
name: human readable name of identifier to use to sign the challange/response
name: human readable name of identifier to use to sign the challenge/response
source: qb64 AID of of source of signed response to verify
---
summary: Sign challange message and forward to peer identfiier
summary: Sign challenge message and forward to peer identifier
description: Sign a challenge word list received out of bands and send `exn` peer to peer message
to recipient
tags:
Expand Down Expand Up @@ -1009,7 +1009,7 @@ def on_put(req, rep, name, source):
Parameters:
req: falcon.Request HTTP request
rep: falcon.Response HTTP response
name: human readable name of identifier to use to sign the challange/response
name: human readable name of identifier to use to sign the challenge/response
source: qb64 AID of of source of signed response to verify
---
Expand Down Expand Up @@ -1174,8 +1174,8 @@ def on_post(req, rep, prefix):
prefix: qb64 identifier prefix of contact to associate with image
---
summary: Uploads an image to associate with identfier.
description: Uploads an image to associate with identfier.
summary: Uploads an image to associate with identifier.
description: Uploads an image to associate with identifier.
tags:
- Contacts
parameters:
Expand Down Expand Up @@ -1268,8 +1268,8 @@ def on_get(req, rep, prefix):
prefix: qb64 identifier prefix of contact information to get
---
summary: Get contact information associated with single remote identfier
description: Get contact information associated with single remote identfier. All
summary: Get contact information associated with single remote identifier
description: Get contact information associated with single remote identifier. All
information is meta-data and kept in local storage only
tags:
- Contacts
Expand Down Expand Up @@ -1331,7 +1331,7 @@ def on_post(req, rep, prefix):
200:
description: Updated contact information for remote identifier
400:
description: Invalid identfier used to update contact information
description: Invalid identifier used to update contact information
404:
description: Prefix not found in identifier contact information
"""
Expand Down Expand Up @@ -1367,8 +1367,8 @@ def on_put(req, rep, prefix):
prefix: qb64 identifier to update contact information
---
summary: Update provided fields in contact information associated with remote identfier prefix
description: Update provided fields in contact information associated with remote identfier prefix. All
summary: Update provided fields in contact information associated with remote identifier prefix
description: Update provided fields in contact information associated with remote identifier prefix. All
information is metadata and kept in local storage only
tags:
- Contacts
Expand All @@ -1391,7 +1391,7 @@ def on_put(req, rep, prefix):
200:
description: Updated contact information for remote identifier
400:
description: Invalid identfier used to update contact information
description: Invalid identifier used to update contact information
404:
description: Prefix not found in identifier contact information
"""
Expand Down Expand Up @@ -1424,8 +1424,8 @@ def on_delete(req, rep, prefix):
prefix: qb64 identifier prefix to delete contact information
---
summary: Delete contact information associated with remote identfier
description: Delete contact information associated with remote identfier
summary: Delete contact information associated with remote identifier
description: Delete contact information associated with remote identifier
tags:
- Contacts
parameters:
Expand Down
16 changes: 8 additions & 8 deletions src/keria/app/credentialing.py
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@ def on_get(req, rep, name):

hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description="name is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description="name is not a valid reference to an identifier")

res = []
for name, registry in agent.rgy.regs.items():
Expand Down Expand Up @@ -136,7 +136,7 @@ def on_post(self, req, rep, name):
type: array
items:
type: string
description: List of qb64 AIDs of witnesses to be used for the new group identfier.
description: List of qb64 AIDs of witnesses to be used for the new group identifier.
estOnly:
type: boolean
required: false
Expand All @@ -159,7 +159,7 @@ def on_post(self, req, rep, name):

hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description="alias is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description="alias is not a valid reference to an identifier")

registry = agent.rgy.makeSignifyRegistry(name=rname, prefix=hab.pre, regser=vcp)

Expand Down Expand Up @@ -207,7 +207,7 @@ def on_get(req, rep, name, registryName):

hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description=f"{name} is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description=f"{name} is not a valid reference to an identifier")

registry = agent.rgy.registryByName(registryName)
if registry is None:
Expand Down Expand Up @@ -354,7 +354,7 @@ def on_post(req, rep, name):
agent = req.context.agent
hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description="name is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description="name is not a valid reference to an identifier")

try:
body = req.get_media()
Expand Down Expand Up @@ -473,7 +473,7 @@ def on_post(self, req, rep, name):
body = req.get_media()
hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description="name is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description="name is not a valid reference to an identifier")

creder = proving.Creder(ked=httping.getRequiredParam(body, "acdc"))
iserder = coring.Serder(ked=httping.getRequiredParam(body, "iss"))
Expand Down Expand Up @@ -559,7 +559,7 @@ def on_get(req, rep, name, said):

hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description="name is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description="name is not a valid reference to an identifier")

accept = req.get_header("accept")
if accept == "application/json+cesr":
Expand Down Expand Up @@ -650,7 +650,7 @@ def on_delete(self, req, rep, name, said):
body = req.get_media()
hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description="name is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description="name is not a valid reference to an identifier")

rserder = coring.Serder(ked=httping.getRequiredParam(body, "rev"))

Expand Down
2 changes: 1 addition & 1 deletion src/keria/app/grouping.py
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ def on_post(req, rep, name):
# Get the hab
hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description=f"alias={name} is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description=f"alias={name} is not a valid reference to an identifier")

# ...and make sure we're a Group
if not isinstance(hab, habbing.SignifyGroupHab):
Expand Down
4 changes: 2 additions & 2 deletions src/keria/app/notifying.py
Original file line number Diff line number Diff line change
Expand Up @@ -29,8 +29,8 @@ def on_get(req, rep):
req: falcon.Request HTTP request
rep: falcon.Response HTTP response
---
summary: Get list of notifcations for the controller of the agent
description: Get list of notifcations for the controller of the agent. Notifications will
summary: Get list of notifications for the controller of the agent
description: Get list of notifications for the controller of the agent. Notifications will
be sorted by creation date/time
parameters:
- in: header
Expand Down
6 changes: 3 additions & 3 deletions src/keria/peer/exchanging.py
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ def on_post(req, rep, name):
# Get the hab
hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description=f"alias={name} is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description=f"alias={name} is not a valid reference to an identifier")

# Get the exn, sigs, additional attachments and recipients from the request
ked = httping.getRequiredParam(body, "exn")
Expand Down Expand Up @@ -98,7 +98,7 @@ def on_post(req, rep, name):
agent = req.context.agent
hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description="name is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description="name is not a valid reference to an identifier")

try:
body = req.get_media()
Expand Down Expand Up @@ -159,7 +159,7 @@ def on_get(req, rep, name, said):
# Get the hab
hab = agent.hby.habByName(name)
if hab is None:
raise falcon.HTTPNotFound(description=f"alias={name} is not a valid reference to an identfier")
raise falcon.HTTPNotFound(description=f"alias={name} is not a valid reference to an identifier")

serder, pathed = exchanging.cloneMessage(agent.hby, said)

Expand Down
12 changes: 6 additions & 6 deletions tests/app/test_credentialing.py
Original file line number Diff line number Diff line change
Expand Up @@ -146,12 +146,12 @@ def test_registry_end(helpers, seeder):
body = dict(name="test", alias="test", vcp=regser.ked, ixn=serder.ked, sigs=sigers)
result = client.simulate_post(path="/identifiers/bad_test/registries", body=json.dumps(body).encode("utf-8"))
assert result.status == falcon.HTTP_404
assert result.json == {'description': 'alias is not a valid reference to an identfier', 'title': '404 Not Found'}
assert result.json == {'description': 'alias is not a valid reference to an identifier', 'title': '404 Not Found'}


result = client.simulate_get(path="/identifiers/not_test/registries")
assert result.status == falcon.HTTP_404
assert result.json == {'description': 'name is not a valid reference to an identfier', 'title': '404 Not Found'}
assert result.json == {'description': 'name is not a valid reference to an identifier', 'title': '404 Not Found'}

# Test Operation Resource
result = client.simulate_get(path=f"/operations/{op['name']}")
Expand Down Expand Up @@ -243,7 +243,7 @@ def test_issue_credential(helpers, seeder):

result = client.simulate_post(path="/identifiers/badname/credentials", body=json.dumps(body).encode("utf-8"))
assert result.status_code == 404
assert result.json == {'description': "name is not a valid reference to an identfier",
assert result.json == {'description': "name is not a valid reference to an identifier",
'title': '404 Not Found'}

result = client.simulate_post(path="/identifiers/issuer/credentials", body=json.dumps(body).encode("utf-8"))
Expand Down Expand Up @@ -322,7 +322,7 @@ def test_credentialing_ends(helpers, seeder):

res = client.simulate_post(f"/identifiers/{hab.name}/credentials/query")
assert res.status_code == 404
assert res.json == {'description': 'name is not a valid reference to an identfier',
assert res.json == {'description': 'name is not a valid reference to an identifier',
'title': '404 Not Found'}

res = client.simulate_post(f"/identifiers/test/credentials/query")
Expand Down Expand Up @@ -469,7 +469,7 @@ def test_revoke_credential(helpers, seeder):

result = client.simulate_post(path="/identifiers/badname/credentials", body=json.dumps(body).encode("utf-8"))
assert result.status_code == 404
assert result.json == {'description': "name is not a valid reference to an identfier",
assert result.json == {'description': "name is not a valid reference to an identifier",
'title': '404 Not Found'}

result = client.simulate_post(path="/identifiers/issuer/credentials", body=json.dumps(body).encode("utf-8"))
Expand Down Expand Up @@ -505,7 +505,7 @@ def test_revoke_credential(helpers, seeder):
sigs=sigers)
res = client.simulate_delete(path=f"/identifiers/badname/credentials/{creder.said}", body=json.dumps(body).encode("utf-8"))
assert res.status_code == 404
assert res.json == {'description': "name is not a valid reference to an identfier",
assert res.json == {'description': "name is not a valid reference to an identifier",
'title': '404 Not Found'}

res = client.simulate_delete(path=f"/identifiers/issuer/credentials/{regser.said}", body=json.dumps(body).encode("utf-8"))
Expand Down
Loading

0 comments on commit 6b82045

Please sign in to comment.