Fix another batch of spelling typos (#13915)

* Fix typos

* Remove repeated words

* Minor grammar fixes
This commit is contained in:
Nathan Baulch
2022-11-08 00:30:24 +11:00
committed by GitHub
parent 3dc8403e10
commit 9f1fa0e440
1449 changed files with 2576 additions and 2581 deletions

View File

@@ -198,7 +198,7 @@ Class | Method | HTTP request | Description
*FakeApi* | [**object_model_with_ref_props**](docs/apis/tags/FakeApi.md#object_model_with_ref_props) | **post** /fake/refs/object_model_with_ref_props |
*FakeApi* | [**parameter_collisions**](docs/apis/tags/FakeApi.md#parameter_collisions) | **post** /fake/parameterCollisions/{1}/{aB}/{Ab}/{self}/{A-B}/ | parameter collision case
*FakeApi* | [**query_param_with_json_content_type**](docs/apis/tags/FakeApi.md#query_param_with_json_content_type) | **get** /fake/queryParamWithJsonContentType | query param with json content-type
*FakeApi* | [**query_parameter_collection_format**](docs/apis/tags/FakeApi.md#query_parameter_collection_format) | **put** /fake/test-query-paramters |
*FakeApi* | [**query_parameter_collection_format**](docs/apis/tags/FakeApi.md#query_parameter_collection_format) | **put** /fake/test-query-parameters |
*FakeApi* | [**ref_object_in_query**](docs/apis/tags/FakeApi.md#ref_object_in_query) | **get** /fake/refObjInQuery | user list
*FakeApi* | [**response_without_schema**](docs/apis/tags/FakeApi.md#response_without_schema) | **get** /fake/responseWithoutSchema | receives a response without schema
*FakeApi* | [**string**](docs/apis/tags/FakeApi.md#string) | **post** /fake/refs/string |

View File

@@ -30,7 +30,7 @@ Method | HTTP request | Description
[**object_model_with_ref_props**](#object_model_with_ref_props) | **post** /fake/refs/object_model_with_ref_props |
[**parameter_collisions**](#parameter_collisions) | **post** /fake/parameterCollisions/{1}/{aB}/{Ab}/{self}/{A-B}/ | parameter collision case
[**query_param_with_json_content_type**](#query_param_with_json_content_type) | **get** /fake/queryParamWithJsonContentType | query param with json content-type
[**query_parameter_collection_format**](#query_parameter_collection_format) | **put** /fake/test-query-paramters |
[**query_parameter_collection_format**](#query_parameter_collection_format) | **put** /fake/test-query-parameters |
[**ref_object_in_query**](#ref_object_in_query) | **get** /fake/refObjInQuery | user list
[**response_without_schema**](#response_without_schema) | **get** /fake/responseWithoutSchema | receives a response without schema
[**string**](#string) | **post** /fake/refs/string |
@@ -561,7 +561,7 @@ No authorization required
Ensures that original naming is used in endpoint params, that way we on't have collisions
Ensures that original naming is used in endpoint params, that way we won't have collisions
### Example

View File

@@ -183,7 +183,7 @@ Key | Input Type | Accessed Type | Description | Notes
Find purchase order by ID
For valid response try integer IDs with value <= 5 or > 10. Other values will generated exceptions
For valid response try integer IDs with value <= 5 or > 10. Other values will generate exceptions
### Example

View File

@@ -1,7 +1,7 @@
#!/bin/sh
# ref: https://help.github.com/articles/adding-an-existing-project-to-github-using-the-command-line/
#
# Usage example: /bin/sh ./git_push.sh wing328 openapi-pestore-perl "minor update" "gitlab.com"
# Usage example: /bin/sh ./git_push.sh wing328 openapi-petstore-perl "minor update" "gitlab.com"
git_user_id=$1
git_repo_id=$2

View File

@@ -1250,9 +1250,9 @@ class ApiClient:
# The HTTP signature scheme requires multiple HTTP headers
# that are calculated dynamically.
signing_info = self.configuration.signing_info
querys = tuple()
queries = tuple()
auth_headers = signing_info.get_http_signature_headers(
resource_path, method, headers, body, querys)
resource_path, method, headers, body, queries)
for key, value in auth_headers.items():
headers.add(key, value)
elif auth_setting['in'] == 'query':

View File

@@ -34,7 +34,7 @@ from petstore_api.apis.paths.fake_body_with_query_params import FakeBodyWithQuer
from petstore_api.apis.paths.another_fake_dummy import AnotherFakeDummy
from petstore_api.apis.paths.fake_body_with_file_schema import FakeBodyWithFileSchema
from petstore_api.apis.paths.fake_case_sensitive_params import FakeCaseSensitiveParams
from petstore_api.apis.paths.fake_test_query_paramters import FakeTestQueryParamters
from petstore_api.apis.paths.fake_test_query_parameters import FakeTestQueryParameters
from petstore_api.apis.paths.fake_pet_id_upload_image_with_required_file import FakePetIdUploadImageWithRequiredFile
from petstore_api.apis.paths.fake_parameter_collisions_1_a_b_ab_self_a_b_ import FakeParameterCollisions1ABAbSelfAB
from petstore_api.apis.paths.fake_upload_file import FakeUploadFile
@@ -86,7 +86,7 @@ PathToApi = typing_extensions.TypedDict(
PathValues.ANOTHERFAKE_DUMMY: AnotherFakeDummy,
PathValues.FAKE_BODYWITHFILESCHEMA: FakeBodyWithFileSchema,
PathValues.FAKE_CASESENSITIVEPARAMS: FakeCaseSensitiveParams,
PathValues.FAKE_TESTQUERYPARAMTERS: FakeTestQueryParamters,
PathValues.FAKE_TESTQUERYPARAMETERS: FakeTestQueryParameters,
PathValues.FAKE_PET_ID_UPLOAD_IMAGE_WITH_REQUIRED_FILE: FakePetIdUploadImageWithRequiredFile,
PathValues.FAKE_PARAMETER_COLLISIONS_1_A_B_AB_SELF_AB_: FakeParameterCollisions1ABAbSelfAB,
PathValues.FAKE_UPLOAD_FILE: FakeUploadFile,
@@ -139,7 +139,7 @@ path_to_api = PathToApi(
PathValues.ANOTHERFAKE_DUMMY: AnotherFakeDummy,
PathValues.FAKE_BODYWITHFILESCHEMA: FakeBodyWithFileSchema,
PathValues.FAKE_CASESENSITIVEPARAMS: FakeCaseSensitiveParams,
PathValues.FAKE_TESTQUERYPARAMTERS: FakeTestQueryParamters,
PathValues.FAKE_TESTQUERYPARAMETERS: FakeTestQueryParameters,
PathValues.FAKE_PET_ID_UPLOAD_IMAGE_WITH_REQUIRED_FILE: FakePetIdUploadImageWithRequiredFile,
PathValues.FAKE_PARAMETER_COLLISIONS_1_A_B_AB_SELF_AB_: FakeParameterCollisions1ABAbSelfAB,
PathValues.FAKE_UPLOAD_FILE: FakeUploadFile,

View File

@@ -0,0 +1,7 @@
from petstore_api.paths.fake_test_query_parameters.put import ApiForput
class FakeTestQueryParameters(
ApiForput,
):
pass

View File

@@ -1,7 +0,0 @@
from petstore_api.paths.fake_test_query_paramters.put import ApiForput
class FakeTestQueryParamters(
ApiForput,
):
pass

View File

@@ -34,7 +34,7 @@ from petstore_api.paths.fake_obj_in_query.get import ObjectInQuery
from petstore_api.paths.fake_refs_object_model_with_ref_props.post import ObjectModelWithRefProps
from petstore_api.paths.fake_parameter_collisions_1_a_b_ab_self_a_b_.post import ParameterCollisions
from petstore_api.paths.fake_query_param_with_json_content_type.get import QueryParamWithJsonContentType
from petstore_api.paths.fake_test_query_paramters.put import QueryParameterCollectionFormat
from petstore_api.paths.fake_test_query_parameters.put import QueryParameterCollectionFormat
from petstore_api.paths.fake_ref_obj_in_query.get import RefObjectInQuery
from petstore_api.paths.fake_response_without_schema.get import ResponseWithoutSchema
from petstore_api.paths.fake_refs_string.post import String

View File

@@ -131,7 +131,7 @@ conf = petstore_api.Configuration(
'Authorization' header, which is used to carry the signature.
One may be tempted to sign all headers by default, but in practice it rarely works.
This is beccause explicit proxies, transparent proxies, TLS termination endpoints or
This is because explicit proxies, transparent proxies, TLS termination endpoints or
load balancers may add/modify/remove headers. Include the HTTP headers that you know
are not going to be modified in transit.
@@ -301,7 +301,7 @@ conf = petstore_api.Configuration(
"Invalid keyword: '{0}''".format(v))
self._disabled_client_side_validations = s
if name == "signing_info" and value is not None:
# Ensure the host paramater from signing info is the same as
# Ensure the host parameter from signing info is the same as
# Configuration.host.
value.host = self.host

View File

@@ -6,7 +6,7 @@
# if you have many models here with many references from one model to another this may
# raise a RecursionError
# to avoid this, import only the models that you directly need like:
# from from petstore_api.model.pet import Pet
# from petstore_api.model.pet import Pet
# or import this package, but before doing it, use:
# import sys
# sys.setrecursionlimit(n)

View File

@@ -39,7 +39,7 @@ class PathValues(str, enum.Enum):
ANOTHERFAKE_DUMMY = "/another-fake/dummy"
FAKE_BODYWITHFILESCHEMA = "/fake/body-with-file-schema"
FAKE_CASESENSITIVEPARAMS = "/fake/case-sensitive-params"
FAKE_TESTQUERYPARAMTERS = "/fake/test-query-paramters"
FAKE_TESTQUERYPARAMETERS = "/fake/test-query-parameters"
FAKE_PET_ID_UPLOAD_IMAGE_WITH_REQUIRED_FILE = "/fake/{petId}/uploadImageWithRequiredFile"
FAKE_PARAMETER_COLLISIONS_1_A_B_AB_SELF_AB_ = "/fake/parameterCollisions/{1}/{aB}/{Ab}/{self}/{A-B}/"
FAKE_UPLOAD_FILE = "/fake/uploadFile"

View File

@@ -1,7 +1,7 @@
# do not import all endpoints into this module because that uses a lot of memory and stack frames
# if you need the ability to import all endpoints from this module, import them with
# from petstore_api.paths.fake_test_query_paramters import Api
# from petstore_api.paths.fake_test_query_parameters import Api
from petstore_api.paths import PathValues
path = PathValues.FAKE_TESTQUERYPARAMTERS
path = PathValues.FAKE_TESTQUERYPARAMETERS

View File

@@ -385,7 +385,7 @@ class Schema:
_validate_oapg returns a key value pair
where the key is the path to the item, and the value will be the required manufactured class
made out of the matching schemas
2. value is an instance of the the correct schema type
2. value is an instance of the correct schema type
the value is NOT validated by _validate_oapg, _validate_oapg only checks that the instance is of the correct schema type
for this value, _validate_oapg does NOT return an entry for it in _path_to_schemas
and in list/dict _get_items_oapg,_get_properties_oapg the value will be directly assigned
@@ -868,7 +868,7 @@ class ValidatorBase:
schema_keyword not in configuration._disabled_client_side_validations)
@staticmethod
def _raise_validation_errror_message_oapg(value, constraint_msg, constraint_value, path_to_item, additional_txt=""):
def _raise_validation_error_message_oapg(value, constraint_msg, constraint_value, path_to_item, additional_txt=""):
raise ApiValueError(
"Invalid value `{value}`, {constraint_msg} `{constraint_value}`{additional_txt} at {path_to_item}".format(
value=value,
@@ -963,7 +963,7 @@ class StrBase(ValidatorBase):
if (cls._is_json_validation_enabled_oapg('maxLength', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'max_length') and
len(arg) > cls.MetaOapg.max_length):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="length must be less than or equal to",
constraint_value=cls.MetaOapg.max_length,
@@ -973,7 +973,7 @@ class StrBase(ValidatorBase):
if (cls._is_json_validation_enabled_oapg('minLength', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'min_length') and
len(arg) < cls.MetaOapg.min_length):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="length must be greater than or equal to",
constraint_value=cls.MetaOapg.min_length,
@@ -988,14 +988,14 @@ class StrBase(ValidatorBase):
if flags != 0:
# Don't print the regex flags if the flags are not
# specified in the OAS document.
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="must match regular expression",
constraint_value=regex_dict['pattern'],
path_to_item=validation_metadata.path_to_item,
additional_txt=" with flags=`{}`".format(flags)
)
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="must match regular expression",
constraint_value=regex_dict['pattern'],
@@ -1211,7 +1211,7 @@ class NumberBase(ValidatorBase):
return self._as_float
except AttributeError:
if self.as_tuple().exponent >= 0:
raise ApiValueError(f'{self} is not an float')
raise ApiValueError(f'{self} is not a float')
self._as_float = float(self)
return self._as_float
@@ -1228,7 +1228,7 @@ class NumberBase(ValidatorBase):
multiple_of_value = cls.MetaOapg.multiple_of
if (not (float(arg) / multiple_of_value).is_integer()):
# Note 'multipleOf' will be as good as the floating point arithmetic.
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="value must be a multiple of",
constraint_value=multiple_of_value,
@@ -1249,7 +1249,7 @@ class NumberBase(ValidatorBase):
if (cls._is_json_validation_enabled_oapg('exclusiveMaximum', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'exclusive_maximum') and
arg >= cls.MetaOapg.exclusive_maximum):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="must be a value less than",
constraint_value=cls.MetaOapg.exclusive_maximum,
@@ -1259,7 +1259,7 @@ class NumberBase(ValidatorBase):
if (cls._is_json_validation_enabled_oapg('maximum', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'inclusive_maximum') and
arg > cls.MetaOapg.inclusive_maximum):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="must be a value less than or equal to",
constraint_value=cls.MetaOapg.inclusive_maximum,
@@ -1269,7 +1269,7 @@ class NumberBase(ValidatorBase):
if (cls._is_json_validation_enabled_oapg('exclusiveMinimum', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'exclusive_minimum') and
arg <= cls.MetaOapg.exclusive_minimum):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="must be a value greater than",
constraint_value=cls.MetaOapg.exclusive_maximum,
@@ -1279,7 +1279,7 @@ class NumberBase(ValidatorBase):
if (cls._is_json_validation_enabled_oapg('minimum', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'inclusive_minimum') and
arg < cls.MetaOapg.inclusive_minimum):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="must be a value greater than or equal to",
constraint_value=cls.MetaOapg.inclusive_minimum,
@@ -1347,7 +1347,7 @@ class ListBase(ValidatorBase):
if (cls._is_json_validation_enabled_oapg('maxItems', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'max_items') and
len(arg) > cls.MetaOapg.max_items):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="number of items must be less than or equal to",
constraint_value=cls.MetaOapg.max_items,
@@ -1357,7 +1357,7 @@ class ListBase(ValidatorBase):
if (cls._is_json_validation_enabled_oapg('minItems', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'min_items') and
len(arg) < cls.MetaOapg.min_items):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="number of items must be greater than or equal to",
constraint_value=cls.MetaOapg.min_items,
@@ -1368,7 +1368,7 @@ class ListBase(ValidatorBase):
hasattr(cls.MetaOapg, 'unique_items') and cls.MetaOapg.unique_items and arg):
unique_items = set(arg)
if len(arg) > len(unique_items):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="duplicate items were found, and the tuple must not contain duplicates because",
constraint_value='unique_items==True',
@@ -1611,7 +1611,7 @@ class DictBase(Discriminable, ValidatorBase):
if (cls._is_json_validation_enabled_oapg('maxProperties', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'max_properties') and
len(arg) > cls.MetaOapg.max_properties):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="number of properties must be less than or equal to",
constraint_value=cls.MetaOapg.max_properties,
@@ -1621,7 +1621,7 @@ class DictBase(Discriminable, ValidatorBase):
if (cls._is_json_validation_enabled_oapg('minProperties', validation_metadata.configuration) and
hasattr(cls.MetaOapg, 'min_properties') and
len(arg) < cls.MetaOapg.min_properties):
cls._raise_validation_errror_message_oapg(
cls._raise_validation_error_message_oapg(
value=arg,
constraint_msg="number of properties must be greater than or equal to",
constraint_value=cls.MetaOapg.min_properties,

View File

@@ -341,7 +341,7 @@ class HttpSigningConfiguration(object):
:return: A tuple of (digest, prefix).
The digest is a hashing object that contains the cryptographic digest of
the HTTP request.
The prefix is a string that identifies the cryptographc hash. It is used
The prefix is a string that identifies the cryptographic hash. It is used
to generate the 'Digest' header as specified in RFC 3230.
"""
if self.hash_algorithm == HASH_SHA512:

View File

@@ -12,15 +12,15 @@ from unittest.mock import patch
import urllib3
import petstore_api
from petstore_api.paths.fake_test_query_paramters import put # noqa: E501
from petstore_api.paths.fake_test_query_parameters import put # noqa: E501
from petstore_api import configuration, schemas, api_client
from .. import ApiTestMixin
class TestFakeTestQueryParamters(ApiTestMixin, unittest.TestCase):
class TestFakeTestQueryParameters(ApiTestMixin, unittest.TestCase):
"""
FakeTestQueryParamters unit test stubs
FakeTestQueryParameters unit test stubs
"""
_configuration = configuration.Configuration()

View File

@@ -83,7 +83,7 @@ class DeserializationTests(unittest.TestCase):
"""
deserialize Animal to a Dog instance
Animal uses a discriminator which has a map built of child classes
that inherrit from Animal
that inherit from Animal
This is the swagger (v2) way of doing something like oneOf composition
"""
from petstore_api.model import animal, dog

View File

@@ -279,7 +279,7 @@
# ]
# )
# config = Configuration(host=HOST, signing_info=signing_cfg)
# # Set the OAuth2 acces_token to None. Here we are interested in testing
# # Set the OAuth2 access_token to None. Here we are interested in testing
# # the HTTP signature scheme.
# config.access_token = None
#
@@ -310,7 +310,7 @@
# private_key_passphrase=self.private_key_passphrase,
# )
# config = Configuration(host=HOST, signing_info=signing_cfg)
# # Set the OAuth2 acces_token to None. Here we are interested in testing
# # Set the OAuth2 access_token to None. Here we are interested in testing
# # the HTTP signature scheme.
# config.access_token = None
#
@@ -346,7 +346,7 @@
# ]
# )
# config = Configuration(host=HOST, signing_info=signing_cfg)
# # Set the OAuth2 acces_token to None. Here we are interested in testing
# # Set the OAuth2 access_token to None. Here we are interested in testing
# # the HTTP signature scheme.
# config.access_token = None
#
@@ -382,7 +382,7 @@
# ]
# )
# config = Configuration(host=HOST, signing_info=signing_cfg)
# # Set the OAuth2 acces_token to None. Here we are interested in testing
# # Set the OAuth2 access_token to None. Here we are interested in testing
# # the HTTP signature scheme.
# config.access_token = None
#
@@ -418,7 +418,7 @@
# ]
# )
# config = Configuration(host=HOST, signing_info=signing_cfg)
# # Set the OAuth2 acces_token to None. Here we are interested in testing
# # Set the OAuth2 access_token to None. Here we are interested in testing
# # the HTTP signature scheme.
# config.access_token = None
#

View File

@@ -23,7 +23,7 @@ class TestObjectWithAllOfWithReqTestPropFromUnsetAddProp(unittest.TestCase):
)
assert inst == {'test': 'a'}
# without the required test property an execption is thrown
# without the required test property an exception is thrown
with self.assertRaises(petstore_api.exceptions.ApiTypeError):
ObjectWithAllOfWithReqTestPropFromUnsetAddProp(
name='a'

View File

@@ -122,7 +122,7 @@ class TestParameter(unittest.TestCase):
)
)
def test_throws_error_for_nonexistant_content_type(self):
def test_throws_error_for_nonexistent_content_type(self):
request_body = api_client.RequestBody(
content={'application/json': api_client.MediaType(schema=schemas.AnyTypeSchema)}
)