diff options
| author | Kumar McMillan | 2014-02-28 16:51:32 -0600 | 
|---|---|---|
| committer | Kumar McMillan | 2014-02-28 16:51:32 -0600 | 
| commit | a4470c42765004825ed6c09ae434dfd7dd969d1e (patch) | |
| tree | b911ee7b25328ae6e3f40985d3ae6305d07603d9 | |
| parent | e2857bdcffce612814e4cc35bef6f97ce5f39e77 (diff) | |
| download | django-rest-framework-a4470c42765004825ed6c09ae434dfd7dd969d1e.tar.bz2 | |
Fix trailing whitespace
Sorry, my editor does this automatically
| -rwxr-xr-x | docs/api-guide/authentication.md | 12 | 
1 files changed, 6 insertions, 6 deletions
| diff --git a/docs/api-guide/authentication.md b/docs/api-guide/authentication.md index f992b0ce..59bea733 100755 --- a/docs/api-guide/authentication.md +++ b/docs/api-guide/authentication.md @@ -93,7 +93,7 @@ Note that if deploying to [Apache using mod_wsgi][mod_wsgi_official], the author  If you are deploying to Apache, and using any non-session based authentication, you will need to explicitly configure mod_wsgi to pass the required headers through to the application.  This can be done by specifying the `WSGIPassAuthorization` directive in the appropriate context and setting it to `'On'`. -    # this can go in either server config, virtual host, directory or .htaccess  +    # this can go in either server config, virtual host, directory or .htaccess      WSGIPassAuthorization On  --- @@ -117,7 +117,7 @@ Unauthenticated responses that are denied permission will result in an `HTTP 401  ## TokenAuthentication -This authentication scheme uses a simple token-based HTTP Authentication scheme.  Token authentication is appropriate for client-server setups, such as native desktop and mobile clients.  +This authentication scheme uses a simple token-based HTTP Authentication scheme.  Token authentication is appropriate for client-server setups, such as native desktop and mobile clients.  To use the `TokenAuthentication` scheme, include `rest_framework.authtoken` in your `INSTALLED_APPS` setting: @@ -125,7 +125,7 @@ To use the `TokenAuthentication` scheme, include `rest_framework.authtoken` in y          ...          'rest_framework.authtoken'      ) -     +  Make sure to run `manage.py syncdb` after changing your settings. The `authtoken` database tables are managed by south (see [Schema migrations](#schema-migrations) below).  You'll also need to create tokens for your users. @@ -209,7 +209,7 @@ You can do so by inserting a `needed_by` attribute in your user migration:          needed_by = (              ('authtoken', '0001_initial'),          ) -         +          def forwards(self):              ... @@ -282,7 +282,7 @@ Note that the `namespace='oauth2'` argument is required.  Finally, sync your database.      python manage.py syncdb -    python manage.py migrate  +    python manage.py migrate  --- @@ -368,7 +368,7 @@ The following example will authenticate any incoming request as the user given b                  user = User.objects.get(username=username)              except User.DoesNotExist:                  raise exceptions.AuthenticationFailed('No such user') -             +              return (user, None)  --- | 
