capitalization: Fix OAuth capitalization.

Signed-off-by: Anders Kaseorg <anders@zulipchat.com>
This commit is contained in:
Anders Kaseorg 2019-11-27 16:17:30 -08:00 committed by Tim Abbott
parent fa9bddcfb2
commit 7a53da7526
7 changed files with 10 additions and 9 deletions

View File

@ -1050,7 +1050,7 @@ Backend and scaling
- Improve mention typeahead sort order to prioritize recent senders in
a stream.
- Swapped the 'q' and 'w' hotkeys to better match the UI.
- Fixed most issues with the registration flow, including adding Oauth
- Fixed most issues with the registration flow, including adding OAuth
support for mobile and many corner case problems.
- Significantly improved sort ordering for the emoji picker.
- Fixed most accessibility errors detected by major accessibility
@ -1201,7 +1201,7 @@ Zulip apps.
* Improved markdown support for bulleted lists.
* Improved copy-to-clipboard support in various places.
* Improved subject lines of missed message emails.
* Improved handling of users trying to login with Oauth without an account.
* Improved handling of users trying to login with OAuth without an account.
* Improved UI of off-the-Internet errors to not be hidden in narrow windows.
* Improved rate-limiting errors to be more easily machine-readable.
* Parallelized the backend test suite; now runs 1600 tests in <30s.

View File

@ -288,13 +288,13 @@ CSS](https://github.com/zulip/zulip/).
- Make Zulip integrations easier for nontechnical users to setup.
This includes adding a backend permissions system for managing bot
permissions (and implementing the enforcement logic), adding an
Oauth system for presenting those controls to users, as well as
OAuth system for presenting those controls to users, as well as
making the /integrations page UI have buttons to create a bot,
rather than sending users to the administration page. **Skills
recommended**: Strong Python/Django; JavaScript, CSS, and design
sense helpful. Understanding of implementing Oauth providers,
sense helpful. Understanding of implementing OAuth providers,
e.g. having built a prototype with
[the Django Oauth toolkit](https://django-oauth-toolkit.readthedocs.io/en/latest/)
[the Django OAuth toolkit](https://django-oauth-toolkit.readthedocs.io/en/latest/)
would be great to demonstrate as part of an application. The
[Zulip integration writing guide](../documentation/integrations.md)
and

View File

@ -1,7 +1,7 @@
You are using the **Google auth backend**, but it is not properly
configured. Please check the following:
* You have created a Google Oauth2 client and enabled the Identity Toolkit API.
* You have created a Google OAuth2 client and enabled the Identity Toolkit API.
You can create OAuth2 apps at [the Google developer console](https://console.developers.google.com).
* You have configured your OAuth2 client to allow redirects to your

View File

@ -35,6 +35,7 @@ IGNORED_PHRASES = [
r"Mac",
r"macOS",
r"MiB",
r"OAuth",
r"OTP",
r"Pivotal",
r"Play Store",

View File

@ -289,7 +289,7 @@ def finish_desktop_flow(request: HttpRequest, user_profile: UserProfile,
return render(request, 'zerver/desktop_redirect.html', context=context)
def finish_mobile_flow(request: HttpRequest, user_profile: UserProfile, otp: str) -> HttpResponse:
# For the mobile Oauth flow, we send the API key and other
# For the mobile OAuth flow, we send the API key and other
# necessary details in a redirect to a zulip:// URI scheme.
api_key = get_api_key(user_profile)
response = create_response_for_otp_flow(api_key, otp, user_profile,

View File

@ -1425,7 +1425,7 @@ class GitHubAuthBackend(SocialAuthMixin, GithubOAuth2):
def user_data(self, access_token: str, *args: Any, **kwargs: Any) -> Dict[str, str]:
"""This patched user_data function lets us combine together the 3
social auth backends into a single Zulip backend for GitHub Oauth2"""
social auth backends into a single Zulip backend for GitHub OAuth2"""
team_id = settings.SOCIAL_AUTH_GITHUB_TEAM_ID
org_name = settings.SOCIAL_AUTH_GITHUB_ORG_NAME

View File

@ -70,7 +70,7 @@ EMAIL_BACKEND = 'django.core.mail.backends.locmem.EmailBackend'
# The test suite uses EmailAuthBackend
AUTHENTICATION_BACKENDS += ('zproject.backends.EmailAuthBackend',)
# Configure Google Oauth2
# Configure Google OAuth2
GOOGLE_OAUTH2_CLIENT_ID = "test_client_id"
# Makes testing LDAP backend require less mocking