diff --git a/blueprints/dotnet/src/APIGatewayAuthorizerHandler/AuthPolicyBuilder.cs b/blueprints/dotnet/src/APIGatewayAuthorizerHandler/AuthPolicyBuilder.cs index 553e10c..3f6e39b 100644 --- a/blueprints/dotnet/src/APIGatewayAuthorizerHandler/AuthPolicyBuilder.cs +++ b/blueprints/dotnet/src/APIGatewayAuthorizerHandler/AuthPolicyBuilder.cs @@ -22,7 +22,7 @@ public class AuthPolicyBuilder /// private readonly Regex _pathRegex = new Regex("^[/.a-zA-Z0-9-\\*]+$"); - // these are the values exctracted from the API Options passed into the construction + // these are the values extracted from the API Options passed into the construction // these options default to a "*" if the input option was empty private readonly string _restApiId; private readonly string _region; @@ -41,7 +41,7 @@ public class AuthPolicyBuilder // these are the internal lists of allowed and denied methods. These are lists // of objects and each object has 2 properties: A resource ARN and a nullable // conditions statement. - // the build method processes these lists and generates the approriate + // the build method processes these lists and generates the appropriate // statements for the final policy private struct Method { diff --git a/blueprints/go/main.go b/blueprints/go/main.go index 6228664..b8500e0 100644 --- a/blueprints/go/main.go +++ b/blueprints/go/main.go @@ -41,7 +41,7 @@ func handleRequest(ctx context.Context, event events.APIGatewayCustomAuthorizerR // if the token is valid, a policy must be generated which will allow or deny access to the client - // if access is denied, the client will recieve a 403 Access Denied response + // if access is denied, the client will receive a 403 Access Denied response // if access is allowed, API Gateway will proceed with the backend integration configured on the method that was called // this function must generate a policy that is associated with the recognized principal user identifier. diff --git a/blueprints/nodejs/index.js b/blueprints/nodejs/index.js index 7094aee..5ebdf8c 100644 --- a/blueprints/nodejs/index.js +++ b/blueprints/nodejs/index.js @@ -134,7 +134,7 @@ function AuthPolicy(principal, awsAccountId, apiOptions) { // these are the internal lists of allowed and denied methods. These are lists // of objects and each object has 2 properties: A resource ARN and a nullable // conditions statement. - // the build method processes these lists and generates the approriate + // the build method processes these lists and generates the appropriate // statements for the final policy this.allowMethods = []; this.denyMethods = []; diff --git a/blueprints/python/api-gateway-authorizer-python.py b/blueprints/python/api-gateway-authorizer-python.py index 838598d..896f391 100644 --- a/blueprints/python/api-gateway-authorizer-python.py +++ b/blueprints/python/api-gateway-authorizer-python.py @@ -30,7 +30,7 @@ def lambda_handler(event, context): """if the token is valid, a policy must be generated which will allow or deny access to the client""" - """if access is denied, the client will recieve a 403 Access Denied response""" + """if access is denied, the client will receive a 403 Access Denied response""" """if access is allowed, API Gateway will proceed with the backend integration configured on the method that was called""" """this function must generate a policy that is associated with the recognized principal user identifier.""" @@ -93,7 +93,7 @@ class AuthPolicy(object): """these are the internal lists of allowed and denied methods. These are lists of objects and each object has 2 properties: A resource ARN and a nullable conditions statement. - the build method processes these lists and generates the approriate + the build method processes these lists and generates the appropriate statements for the final policy""" allowMethods = [] denyMethods = [] diff --git a/blueprints/rust/main.rs b/blueprints/rust/main.rs index ae1ac10..51ace6c 100644 --- a/blueprints/rust/main.rs +++ b/blueprints/rust/main.rs @@ -35,7 +35,7 @@ fn my_handler( // if the token is valid, a policy must be generated which will allow or deny access to the client - // if access is denied, the client will recieve a 403 Access Denied response + // if access is denied, the client will receive a 403 Access Denied response // if access is allowed, API Gateway will proceed with the backend integration configured on the method that was called // this function must generate a policy that is associated with the recognized principal user identifier.