commit 839df4492c61777eaf660665a2aeb0d4267251bb Author: Damian Johnson atagar@torproject.org Date: Tue Dec 27 10:24:40 2011 -0800
Connection pydoc spelling corrections
Just some quick corrections now that this module has reached maturity. I'll check the other modules later. --- stem/connection.py | 14 +++++++------- 1 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/stem/connection.py b/stem/connection.py index 6b914f8..eb5da62 100644 --- a/stem/connection.py +++ b/stem/connection.py @@ -7,7 +7,7 @@ authenticated control connection. This is handy for CLI applications and the python interactive interpretor, but does several things that makes it undesirable for applications (uses stdin/stdout, suppresses exceptions, etc).
-The 'authenicate' function, however, gives easy but fine-grained control over +The 'authenticate' function, however, gives easy but fine-grained control over the authentication process. For instance...
import sys @@ -319,7 +319,7 @@ def authenticate(control_socket, password = None, protocolinfo_response = None):
stem.connection.UnreadableCookieFile Tor allows for authentication by reading it a cookie file, but we can't - read that file (probaby due to permissions). + read that file (probably due to permissions).
stem.connection.IncorrectCookieValue (*) Tor allows for authentication by reading it a cookie file, but rejected @@ -338,8 +338,8 @@ def authenticate(control_socket, password = None, protocolinfo_response = None): including socket failures, malformed controller responses, etc. These mostly constitute transient failures or bugs.
- * In practice it is highly unusual for this to occure, being more of a - theoretical possability rather than something you should expect. It's + * In practice it is highly unusual for this to occur, being more of a + theoretical possibility rather than something you should expect. It's fine to treat these as errors. If you have a use case where this commonly happens, please file a ticket on 'trac.torproject.org'.
@@ -379,7 +379,7 @@ def authenticate(control_socket, password = None, protocolinfo_response = None):
if AuthMethod.COOKIE in auth_methods and protocolinfo_response.cookie_path == None: auth_methods.remove(AuthMethod.COOKIE) - auth_exceptions.append(NoAuthCookie("our PROTOCOLINFO reponse did not have the location of our authentication cookie")) + auth_exceptions.append(NoAuthCookie("our PROTOCOLINFO response did not have the location of our authentication cookie"))
if AuthMethod.PASSWORD in auth_methods and password == None: auth_methods.remove(AuthMethod.PASSWORD) @@ -426,7 +426,7 @@ def authenticate(control_socket, password = None, protocolinfo_response = None): # We really, really shouldn't get here. It means that auth_exceptions is # either empty or contains something that isn't an AuthenticationFailure.
- raise AssertionError("BUG: Authenticaion failed without providing a recognized exception: %s" % str(auth_exceptions)) + raise AssertionError("BUG: Authentication failed without providing a recognized exception: %s" % str(auth_exceptions))
def authenticate_none(control_socket, suppress_ctl_errors = True): """ @@ -533,7 +533,7 @@ def authenticate_cookie(control_socket, cookie_path, suppress_ctl_errors = True) validation that this is a cookie before presenting the contents to the socket.
- The IncorrectCookieSize and UnreadableCookieFile exceptions take precidence + The IncorrectCookieSize and UnreadableCookieFile exceptions take precedence over the other types.
If authentication fails tor will disconnect and we'll make a best effort
tor-commits@lists.torproject.org