Skip to content

Commit

Permalink
Merge pull request #23 from daniwk/daniwk-#21-minor-changes-docs
Browse files Browse the repository at this point in the history
Daniwk #21 minor changes docs
  • Loading branch information
JonasKs committed Sep 20, 2021
2 parents 44c5029 + af68b9b commit 1eec23e
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/coverage.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ jobs:
uses: actions/cache@v2
with:
path: .venv
key: venv-${{ runner.os }}-${{ hashFiles('**/poetry.lock') }}-1
key: venv-${{ runner.os }}-${{ hashFiles('**/poetry.lock') }}-2
- name: Install dependencies
run: poetry install
if: steps.cached-poetry-dependencies.outputs.cache-hit != 'true'
Expand Down
2 changes: 1 addition & 1 deletion docs/docs/multi-tenant/accept_specific_tenants_only.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ azure_scheme = MultiTenantAzureAuthorizationCodeBearer(
f'api://{settings.APP_CLIENT_ID}/user_impersonation': 'user_impersonation',
},
validate_iss=True,
valid_tenants_callable=check_if_valid_tenant
iss_callable=check_if_valid_tenant
)


Expand Down
2 changes: 1 addition & 1 deletion docs/docs/multi-tenant/fastapi_configuration.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -435,7 +435,7 @@ As discussed earlier, there is a `scope` parameter to the `Security()` version o
your API to only be accessible by those with certain scopes, you can simply pass it into the dependency.

```python
@app.get("/", dependencies=[Security(azure_scheme, scopes='wrong_scope')])
@app.get("/", dependencies=[Security(azure_scheme, scopes=['wrong_scope'])])
```
If you do this and try out your API again, you'll see that you're denied.

Expand Down
2 changes: 1 addition & 1 deletion docs/docs/single-tenant/fastapi_configuration.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -441,7 +441,7 @@ As discussed earlier, there is a `scope` parameter to the `Security()` version o
your API to only be accessible by those with certain scopes, you can simply pass it into the dependency.

```python
@app.get("/", dependencies=[Security(azure_scheme, scopes='wrong_scope')])
@app.get("/", dependencies=[Security(azure_scheme, scopes=['wrong_scope'])])
```
If you do this and try out your API again, you'll see that you're denied.

Expand Down

0 comments on commit 1eec23e

Please sign in to comment.