Skip to content

Commit 3628d7d

Browse files
committed
docs: use intendation for quote blocks in docs/pkce
1 parent 71fa350 commit 3628d7d

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

docs/misc/pkce.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ See :rfc:`Section 1 of RFC 7636 <7636#section-1.1>`.
3838

3939
.. _PKCE#authorizationRequest:
4040

41-
.. A:: The client creates and records a secret named the "code_verifier" and derives a transformed version "t(code_verifier)" (referred to as the "code_challenge"), which is sent in the OAuth 2.0 Authorization Request along with the transformation method "t_m".
41+
A. The client creates and records a secret named the "code_verifier" and derives a transformed version "t(code_verifier)" (referred to as the "code_challenge"), which is sent in the OAuth 2.0 Authorization Request along with the transformation method "t_m".
4242

4343
The following shows an example of how a client could generate a `code_challenge`` and
4444
``code_challenge_method`` for the authorizazion request.
@@ -95,7 +95,7 @@ If your Request body contains code_challenge and code_challenge_method then PKCE
9595

9696
.. _PKCE#authorizationResponse:
9797

98-
.. B:: The Authorization Endpoint responds as usual but records "t(code_verifier)" and the transformation method.
98+
B. The Authorization Endpoint responds as usual but records "t(code_verifier)" and the transformation method.
9999

100100
The ``AuthorizeHandler.handle`` saves code challenge and code challenge method automatically via ``model.saveAuthorizationCode``.
101101
Note that this calls your model with additional arguments ``codeChallenge`` and ``codeChallengeMethod``.
@@ -106,7 +106,7 @@ Note that this calls your model with additional arguments ``codeChallenge`` and
106106

107107
.. _PKCE#accessTokenRequest:
108108

109-
.. C:: The client then sends the authorization code in the Access Token Request as usual but includes the "code_verifier" secret generated at (A).
109+
C. The client then sends the authorization code in the Access Token Request as usual but includes the "code_verifier" secret generated at (A).
110110

111111
This is usually done in your token endpoint, that uses ``OAuth2Server.token``.
112112
Note that your client should have kept ``code_verifier`` a secret until this step and now includes it as param for the token endpoint call.
@@ -130,7 +130,7 @@ Note that your client should have kept ``code_verifier`` a secret until this ste
130130
})
131131
}
132132

133-
.. D:: The authorization server transforms "code_verifier" and compares it to "t(code_verifier)" from (B). Access is denied if they are not equal.
133+
D. The authorization server transforms "code_verifier" and compares it to "t(code_verifier)" from (B). Access is denied if they are not equal.
134134

135135
This will call ``model.getAuthorizationCode`` to load the code.
136136
The loaded code has to contain ``codeChallenge`` and ``codeChallengeMethod``.

0 commit comments

Comments
 (0)