You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: versions/3.0.4.md
+16-16Lines changed: 16 additions & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -277,8 +277,8 @@ This object MAY be extended with [Specification Extensions](#specification-exten
277
277
278
278
```json
279
279
{
280
-
"title": "Sample Pet Store App",
281
-
"description": "This is a sample server for a pet store.",
280
+
"title": "Example Pet Store App",
281
+
"description": "This is an example server for a pet store.",
282
282
"termsOfService": "https://example.com/terms/",
283
283
"contact": {
284
284
"name": "API Support",
@@ -294,8 +294,8 @@ This object MAY be extended with [Specification Extensions](#specification-exten
294
294
```
295
295
296
296
```yaml
297
-
title: Sample Pet Store App
298
-
description: This is a sample server for a pet store.
297
+
title: Example Pet Store App
298
+
description: This is an example server for a pet store.
299
299
termsOfService: https://example.com/terms/
300
300
contact:
301
301
name: API Support
@@ -2716,7 +2716,7 @@ The [XML Object](#xml-object) contains additional information about the availabl
2716
2716
2717
2717
##### Schema Object Examples
2718
2718
2719
-
###### Primitive Sample
2719
+
###### Primitive Example
2720
2720
2721
2721
```json
2722
2722
{
@@ -3545,7 +3545,7 @@ animals:
3545
3545
3546
3546
Defines a security scheme that can be used by the operations.
3547
3547
3548
-
Supported schemes are HTTP authentication, an API key (either as a header, a cookie parameter or as a query parameter), OAuth2's common flows (implicit, password, client credentials and authorization code) as defined in [RFC6749](https://tools.ietf.org/html/rfc6749), and [[OpenID-Connect-Core]].
3548
+
Supported schemes are HTTP authentication, an API key (either as a header, a cookie parameter, or as a query parameter), OAuth2's common flows (implicit, password, client credentials, and authorization code) as defined in [RFC6749](https://tools.ietf.org/html/rfc6749), and [[OpenID-Connect-Core]].
3549
3549
Please note that as of 2020, the implicit flow is about to be deprecated by [OAuth 2.0 Security Best Current Practice](https://tools.ietf.org/html/draft-ietf-oauth-security-topics). Recommended for most use cases is Authorization Code Grant flow with PKCE.
3550
3550
3551
3551
##### Fixed Fields
@@ -3555,17 +3555,17 @@ Please note that as of 2020, the implicit flow is about to be deprecated by [OAu
3555
3555
| <a name="security-scheme-type"></a>type | `string` | Any | **REQUIRED**. The type of the security scheme. Valid values are `"apiKey"`, `"http"`, `"oauth2"`, `"openIdConnect"`. |
3556
3556
| <a name="security-scheme-description"></a>description | `string` | Any | A description for security scheme. [CommonMark syntax](https://spec.commonmark.org/) MAY be used for rich text representation. |
3557
3557
| <a name="security-scheme-name"></a>name | `string` | `apiKey` | **REQUIRED**. The name of the header, query or cookie parameter to be used. |
3558
-
| <a name="security-scheme-in"></a>in | `string` | `apiKey` | **REQUIRED**. The location of the API key. Valid values are `"query"`, `"header"` or `"cookie"`. |
3558
+
| <a name="security-scheme-in"></a>in | `string` | `apiKey` | **REQUIRED**. The location of the API key. Valid values are `"query"`, `"header"`, or `"cookie"`. |
3559
3559
| <a name="security-scheme-scheme"></a>scheme | `string` | `http` | **REQUIRED**. The name of the HTTP Authentication scheme to be used in the [Authorization header as defined in RFC7235](https://tools.ietf.org/html/rfc7235#section-5.1). The values used SHOULD be registered in the [IANA Authentication Scheme registry](https://www.iana.org/assignments/http-authschemes/http-authschemes.xhtml). The value is case-insensitive, as defined in [RFC7235](https://datatracker.ietf.org/doc/html/rfc7235#section-2.1). |
3560
3560
| <a name="security-scheme-bearer-format"></a>bearerFormat | `string` | `http` (`"bearer"`) | A hint to the client to identify how the bearer token is formatted. Bearer tokens are usually generated by an authorization server, so this information is primarily for documentation purposes. |
3561
3561
| <a name="security-scheme-flows"></a>flows | [OAuth Flows Object](#oauth-flows-object) | `oauth2` | **REQUIRED**. An object containing configuration information for the flow types supported. |
3562
3562
| <a name="security-scheme-open-id-connect-url"></a>openIdConnectUrl | `string` | `openIdConnect` | **REQUIRED**. [Well-known URL](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig) to discover the [[OpenID-Connect-Discovery]] [provider metadata](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata). |
3563
3563
3564
3564
This object MAY be extended with [Specification Extensions](#specification-extensions).
3565
3565
3566
-
##### Security Scheme Object Example
3566
+
##### Security Scheme Object Examples
3567
3567
3568
-
###### Basic Authentication Sample
3568
+
###### Basic Authentication Example
3569
3569
3570
3570
```json
3571
3571
{
@@ -3579,7 +3579,7 @@ type: http
3579
3579
scheme: basic
3580
3580
```
3581
3581
3582
-
###### API Key Sample
3582
+
###### API Key Example
3583
3583
3584
3584
```json
3585
3585
{
@@ -3595,7 +3595,7 @@ name: api-key
3595
3595
in: header
3596
3596
```
3597
3597
3598
-
###### JWT Bearer Sample
3598
+
###### JWT Bearer Example
3599
3599
3600
3600
```json
3601
3601
{
@@ -3611,7 +3611,7 @@ scheme: bearer
3611
3611
bearerFormat: JWT
3612
3612
```
3613
3613
3614
-
###### Implicit OAuth2 Sample
3614
+
###### Implicit OAuth2 Example
3615
3615
3616
3616
```json
3617
3617
{
@@ -3668,7 +3668,7 @@ Configuration details for a supported OAuth Flow
3668
3668
3669
3669
This object MAY be extended with [Specification Extensions](#specification-extensions).
3670
3670
3671
-
##### OAuth Flow Object Examples
3671
+
##### OAuth Flow Object Example
3672
3672
3673
3673
```JSON
3674
3674
{
@@ -3780,7 +3780,7 @@ security:
3780
3780
3781
3781
See [Resolving Implicit Connections](#resolving-implicit-connections) for more information.
3782
3782
3783
-
First, our entry document is where parsing begins. It defines the `MySecurity` security scheme to be JWT-based, and it defines a Path Item as a reference to a component in another document:
3783
+
First, our [entry document](#openapi-description-structure) is where parsing begins. It defines the `MySecurity` security scheme to be JWT-based, and it defines a Path Item as a reference to a component in another document:
3784
3784
3785
3785
```HTTP
3786
3786
GET /api/description/openapi HTTP/1.1
@@ -3876,11 +3876,11 @@ In the `other` document, the referenced path item has a Security Requirement for
3876
3876
3877
3877
While the OpenAPI Specification tries to accommodate most use cases, additional data can be added to extend the specification at certain points.
3878
3878
3879
-
The extensions properties are implemented as patterned fields that are always prefixed by `"x-"`.
3879
+
The extensions properties are implemented as patterned fields that are always prefixed by `x-`.
| <a name="info-extensions"></a>^x- | Any | Allows extensions to the OpenAPI Schema. The field name MUST begin with `x-`, for example, `x-internal-id`. The value can be any valid JSON value (`null`, a primitive, an array or an object.) |
3883
+
| <a name="info-extensions"></a>^x- | Any | Allows extensions to the OpenAPI Schema. The field name MUST begin with `x-`, for example, `x-internal-id`. The value can be any valid JSON value (`null`, a primitive, an array, or an object.) |
3884
3884
3885
3885
The OpenAPI Initiative maintains several [[OpenAPI-Registry|extension registries]], including registries for [individual extension keywords](https://spec.openapis.org/registry/extension/) and [extension keyword namespaces](https://spec.openapis.org/registry/namespace/).
0 commit comments