Skip to content

Commit 619bff0

Browse files
authored
Fix documentation typos (#596)
1 parent 069569e commit 619bff0

File tree

8 files changed

+47
-47
lines changed

8 files changed

+47
-47
lines changed

api/src/main/java/com/inrupt/client/auth/package-info.java

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -20,32 +20,32 @@
2020
*/
2121
/**
2222
* <h2>Authentication and Authorization classes for the Inrupt Java Client Libraries.</h2>
23-
*
23+
*
2424
* <h3>The Session interface</h3>
25-
*
25+
*
2626
* <p>In the libraries we make use of the {@link Session} interface to share authentication and
2727
* authorization information when working with HTTP clients.
28-
*
29-
* <p>The anonymous session, in comparison, does not keep a cache of access tokens.
30-
*
28+
*
29+
* <p>The anonymous session, by contrast, does not keep a cache of access tokens.
30+
*
3131
* <pre>{@code
3232
SolidClient client = SolidClient.getClient().session(Session.anonymous());
3333
* }</pre>
34-
*
35-
* <p>The session is also used in the authentication/authorization modules and help create a dedicated session
34+
*
35+
* <p>The session is also used in the authentication/authorization modules and helps create a dedicated session
3636
* for each implementation. Some examples:
37-
*
37+
*
3838
* <pre>{@code
3939
Session openidSession = OpenIdSession.ofIdToken(token);
4040
Session openidSessionWithConfig = OpenIdSession.ofIdToken(token, config);
4141
Session accessGrantSession = AccessGrantSession.ofAccessGrant(openidSession, accessGrant);
4242
* }</pre>
43-
*
43+
*
4444
* <h3>HTTP challenges</h3>
45-
*
45+
*
4646
* <p>As part of the HTTP Challenge and Response authentication framework, the {@link Challenge} class represents a
4747
* challenge object as represented in a WWW-Authenticate Response Header. An example code is shown next.
48-
*
48+
*
4949
* <pre>{@code
5050
List<Challenge> challenges = WwwAuthenticate.parse(response.headers()
5151
.firstValue("WWW-Authenticate").get()).getChallenges();
@@ -55,11 +55,11 @@
5555
+ challenges.get(0).getParameter("realm"));
5656
System.out.println("Authorization server: " + challenges.get(0).getParameter("as_uri");
5757
* }</pre>
58-
*
58+
*
5959
* <h3>Client credentials</h3>
60-
*
60+
*
6161
* <p>We make use of the {@link Credential} class when working with OIDC ID Tokens. Example code is presented next.
62-
*
62+
*
6363
* <pre>{@code
6464
Credential token = new Credential("Bearer", URI.create(ISS), this.token,
6565
Instant.now().plusSeconds(3600), URI.create(WEBID), null);
@@ -70,11 +70,11 @@
7070
Session session = OpenIdSession.ofIdToken(token, config);
7171
System.out.println("The token is an OpenID token " + session.getCredential(OpenIdSession.ID_TOKEN).isPresent());
7272
* }</pre>
73-
*
73+
*
7474
* <h3>Authentication</h3>
75-
*
76-
* <p>The {@link Authenticator} is the interface to call if one wants to develop an own authentication logic.
77-
*
75+
*
76+
* <p>The {@link Authenticator} is the interface to call if you want to develop your own authentication logic.
77+
*
7878
* <pre>{@code
7979
class TestAuthenticator implements Authenticator {
8080
{@literal @}Override
@@ -94,12 +94,12 @@ public CompletionStage<Credential> authenticate(Session session,
9494
}
9595
}
9696
* }</pre>
97-
*
98-
* <p>If one want to make use of DPoP, the {@link DPoP} interface makes available the basic
99-
* methods for generating a proof or creating a DPoP manager for example.
100-
*
97+
*
98+
* <p>If you want to make use of DPoP, the {@link DPoP} interface makes available the basic
99+
* methods for generating a proof or creating a DPoP manager, for example.
100+
*
101101
* <p>{@link ReactiveAuthorization} is the class which will negotiate for a token based on the WWW-Authenticate header
102102
* and the Authenticator loaded on the classpath.
103-
*
103+
*
104104
*/
105105
package com.inrupt.client.auth;

api/src/main/java/com/inrupt/client/package-info.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,13 +25,13 @@
2525
* some of the higher-level modules.
2626
*
2727
* <p>Working with an HTTP client is easier by implementing the {@link Client}. Then, to make use of the HTTP client,
28-
* which previously was loaded on the classpath, one can call the {@link ClientProvider}.
28+
* which previously was loaded on the classpath, you can call the {@link ClientProvider}.
2929
*
3030
* <p>{@link Request} and {@link Response} classes help with interacting with an HTTP client. And {@link Headers}
3131
* helps parsing header values, including those often used with Solid, such as {@link Headers.Link}
3232
* or {@link Headers.WacAllow}.
3333
*
34-
* <p>Further, to work with HTTP resources as RDF-based resources, one can make use of the {@link Resource}
34+
* <p>Further, to work with HTTP resources as RDF-based resources, you can make use of the {@link Resource}
3535
* class.
3636
* {@link ValidationResult} can be of use when validation of the Solid resource is needed.
3737
*

integration/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ They can be found in the `./base/src/main/resources/META-INF/microprofile-config
2121

2222
## Running the tests on a live Solid server
2323

24-
To set up a server, one needs to add more configurations to the `./base/src/main/resources/META-INF/microprofile-config.properties` file.
24+
To set up a server, you needs to add more configurations to the `./base/src/main/resources/META-INF/microprofile-config.properties` file.
2525

2626
Let's take a look at the possible configuration values in the properties file.
2727
All the possible value are listed next:

solid/src/main/java/com/inrupt/client/solid/package-info.java

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,11 @@
2424
*
2525
* <h3>Solid Client</h3>
2626
*
27-
* <p>This Solid domain-specific module contains two dedicated Solid clients one can make use of:
27+
* <p>This Solid domain-specific module contains two dedicated Solid clients you can make use of:
2828
* {@link SolidClient} which works asynchronously and {@link SolidSyncClient} which works synchronously.
29-
*
29+
*
3030
* <p>One can instantiate a Solid client in different ways, depending on the use case:
31-
*
31+
*
3232
* <p>A simple direct way is with the following line:
3333
* <pre>{@code
3434
SolidClient client = SolidClient.getClient();
@@ -44,9 +44,9 @@
4444
SolidClient client = SolidClient.getClientBuilder().client(classPathClient).build();
4545
}
4646
* </pre>
47-
*
47+
*
4848
* <p>The Solid client can be used to perform CRUD operations on Solid resources.
49-
*
49+
*
5050
* <p>In this example, the client reads a Solid resource as a {@code Playlist} object.
5151
* <pre>{@code
5252
var playlist = client.read(uri, Playlist.class);
@@ -82,7 +82,7 @@
8282
* <pre>{@code
8383
client.delete(uri).toCompletableFuture().join(); }
8484
* </pre>
85-
*
85+
*
8686
* <h3>Solid RDFSource and Solid Container</h3>
8787
*
8888
* <p>This module also contains a BodyHandler which consumes the response body

src/site/apt/client-options.apt.vm

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
Client Options
2-
2+
33
An application can obtain a client for interacting with Solid data in several ways. This guide will help you decide how your application will retrieve, configure and use a client.
44

55
* What you will need
@@ -133,7 +133,7 @@ public class ClientSample {
133133

134134
* <<<Response.BodyHandlers.ofInputStream()>>> This handler maps the HTTP response to an <<<InputStream>>>. This may be useful for custom processing of the response body.
135135

136-
* <<<Response.BodyHandlers.ofString()>>> This handler maps the HTTP response to a <<<String>>>. This may be useful for small text-oriented responses, though one should generally prefer the <<<InputStream>>>-based API.
136+
* <<<Response.BodyHandlers.ofString()>>> This handler maps the HTTP response to a <<<String>>>. This may be useful for small text-oriented responses, though the <<<InputStream>>>-based API is generally preferred.
137137

138138

139139
When working with RDF resources, there are Jena and RDF4J handlers that will map HTTP responses directly to a Jena or RDF4J Model. These handlers are useful in cases where applications are already using an RDF framework. <<<JenaBodyHandlers.ofModel()>>> or <<<RDF4JBodyHandlers.ofModel()>>> would be used in these cases.

src/site/apt/data-modeling.apt.vm

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,15 +17,15 @@ Data Modeling
1717
* How to complete
1818

1919
At first you need to know (or choose) how your data is modeled on the Solid Pod.
20-
Than one can model your data wite the available domain-specific types of with the class wrapper.
20+
Then you can model your data with the available domain-specific types of with the class wrapper.
2121

2222
* Different data model approaches
2323

24-
Let's work with an example to describe the data model options.
24+
Let's work with an example to describe the data model options.
2525

2626
We want to model a Book Library on the Pod:
2727

28-
* One Solid Resource - we have a Book Library Solid Resource which contains all the book descriptions part of that library it one Solid Resource or
28+
* One Solid Resource - we have a Book Library Solid Resource which contains all the book descriptions part of that library in one Solid Resource or
2929

3030
* Multiple Solid Resources - we have a Book Library Solid Container which holds more Solid Resources. Each Resource, in turn, contains the description of only one Book.
3131

src/site/apt/data-modeling/multiple-resources.apt.vm

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ Data Modeling for multiple Solid Resources
44

55
* How to complete
66

7-
The solution involves working with domain-specific type such as <<<SolidContainer>>> and <<<SolidResource>>>.
7+
The solution involves working with domain-specific type such as <<<SolidContainer>>> and <<<SolidResource>>>.
88

99
* Working with Solid Containers
1010

11-
Given a Solid Container, we assume that all Solid RDF Resources contained in the container are Books. One Book per Solid Resource.
11+
Given a Solid Container, we assume that all Solid RDF Resources contained in the container are Books. One Book per Solid Resource.
1212

13-
For modeling a single Book one can use a <<<SolidResource>>> or a wrapper class as (describe on the {{{./one-resource.html}one Solid Resource}} page).
13+
For modeling a single Book you can use a <<<SolidResource>>> or a wrapper class as (describe on the {{{./one-resource.html}one Solid Resource}} page).
1414

1515
+---
1616
import com.inrupt.client.auth.Session;
@@ -48,7 +48,7 @@ public class MyApplication {
4848
}
4949
});
5050
}
51-
51+
5252
}
5353
}
5454
+---

src/site/apt/sessions/session-access-grants.apt.vm

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,17 @@ Access Grants
33
{{{https://docs.inrupt.com/ess/latest/security/access-requests-grants/}Access Grants}} provide an alternative way to give access to your Solid resources. The Inrupt Java Client Libraries
44
provide tooling for working with Access Grants.
55

6-
To use {{{https://docs.inrupt.com/ess/latest/security/access-requests-grants/}Access Grants}}, the resources one wants to access must have an {{{https://docs.inrupt.com/ess/latest/security/access-requests-grants/#access-grants-acp}access control policy (ACP) that enables the use of access grants}} and the Authorization Service must be able to exchange an access grant for a token (for example such as a {{{https://docs.inrupt.com/ess/latest/services/service-uma/}UMA Service}}).
6+
To use {{{https://docs.inrupt.com/ess/latest/security/access-requests-grants/}Access Grants}}, the resources you want to access must have an {{{https://docs.inrupt.com/ess/latest/security/access-requests-grants/#access-grants-acp}access control policy (ACP) that enables the use of access grants}} and the Authorization Service must be able to exchange an access grant for a token (for example such as a {{{https://docs.inrupt.com/ess/latest/services/service-uma/}UMA Service}}).
77

88
* ACP that enables the use of Access Grants
99

10-
One needs to edit the ACP of the resource the access grant will be used for.
11-
10+
One needs to edit the ACP of the resource the access grant will be used for.
11+
1212
** Manually adding triples to ACP
13-
13+
1414
This can be done manually by using a resource management interface such as {{{https://podpro.dev/} Pod Pro}}.
1515

16-
The next example contains a new access control that matches <<<http://www.w3.org/ns/solid/vc#SolidAccessGrant>>>> and allows Read and Write access to a Solid Container and its contents.
16+
The next example contains a new access control that matches <<<http://www.w3.org/ns/solid/vc#SolidAccessGrant>>>> and allows Read and Write access to a Solid Container and its contents.
1717

1818
+---
1919
prefix acp: <http://www.w3.org/ns/solid/acp#>
@@ -119,7 +119,7 @@ if (acrLink != null) {
119119
//adding the new access control to the ACP
120120
resource.add(rdf.createQuad(resourceACRiri, resourceACRiri, acpAccessControl, newAccessControl));
121121
authClient.update(resource);
122-
122+
123123
}
124124
}
125125
+---

0 commit comments

Comments
 (0)