aboutsummaryrefslogtreecommitdiffstats
path: root/doc-src
diff options
context:
space:
mode:
authorAldo Cortesi <aldo@nullcube.com>2011-03-30 12:05:50 +1300
committerAldo Cortesi <aldo@nullcube.com>2011-03-30 12:05:50 +1300
commitf12510d9794c155657e80864529e0198872e7d7d (patch)
tree8d393ac81ef8929821e4e587af8fe59bd2d2cba5 /doc-src
parent60aa16fc56d67506886315818773d6fedddb2d4f (diff)
downloadmitmproxy-f12510d9794c155657e80864529e0198872e7d7d.tar.gz
mitmproxy-f12510d9794c155657e80864529e0198872e7d7d.tar.bz2
mitmproxy-f12510d9794c155657e80864529e0198872e7d7d.zip
Spell-check docs, setup.py fixes, add missing files to manifest.
Diffstat (limited to 'doc-src')
-rw-r--r--doc-src/anticache.html2
-rw-r--r--doc-src/filters.html2
-rw-r--r--doc-src/interception.html4
-rw-r--r--doc-src/ssl.html2
-rw-r--r--doc-src/sticky.html2
5 files changed, 6 insertions, 6 deletions
diff --git a/doc-src/anticache.html b/doc-src/anticache.html
index ceeffe2e..a4d76e47 100644
--- a/doc-src/anticache.html
+++ b/doc-src/anticache.html
@@ -2,6 +2,6 @@
When the __anticache__ option is passed to mitmproxy, it removes headers
(__if-none-match__ and __if-modified-since__) that might elicit a
304-not-modified response from the server. This is useful when you want to make
-sure you capture an HTTP extchange in its totality, and during [client
+sure you capture an HTTP exchange in its totality, and during [client
replay](@!urlTo("clientreplay.html")!@).
diff --git a/doc-src/filters.html b/doc-src/filters.html
index b71207fc..b5e3ebf8 100644
--- a/doc-src/filters.html
+++ b/doc-src/filters.html
@@ -20,7 +20,7 @@ Filter expressions consist of the following operators:
Examples
========
-Url containing "google.com":
+URL containing "google.com":
google\.com
diff --git a/doc-src/interception.html b/doc-src/interception.html
index cf5b7439..2f961b5f 100644
--- a/doc-src/interception.html
+++ b/doc-src/interception.html
@@ -14,7 +14,7 @@ pattern tells __mitmproxy__ to intercept all requests. For complete filter
syntax, see the [Filter expressions](@!urlTo("filters.html")!@) section of this
document, or the built-in help function in __mitmproxy__.
-### 2: Intercepted conenctions are indicated with a red exclamation mark:
+### 2: Intercepted connections are indicated with a red exclamation mark:
<img src="@!urlTo('intercept-mid.png')!@"/>
@@ -22,7 +22,7 @@ document, or the built-in help function in __mitmproxy__.
<img src="@!urlTo('intercept-options.png')!@"/>
-In this case, we viewd the request by selecting it, pressed __e__ for "edit"
+In this case, we viewed the request by selecting it, pressed __e__ for "edit"
and __m__ for "method" to change the HTTP request method.
### 4: Accept the intercept to continue
diff --git a/doc-src/ssl.html b/doc-src/ssl.html
index a8004082..7ee9438e 100644
--- a/doc-src/ssl.html
+++ b/doc-src/ssl.html
@@ -27,7 +27,7 @@ a browser, just accepting the bogus SSL cert manually is not too much trouble,
but there are a number of cases where you will want to configure your testing
system or browser to trust the __mitmproxy__ CA as a signing root authority:
-- If you are testing non-browser software that checks SSL cert validiy using
+- If you are testing non-browser software that checks SSL cert validity using
the system certificate store.
- You are testing an app that makes non-interactive (JSONP, script src, etc.)
requests to SSL resources. Another workaround in this case is to manually visit
diff --git a/doc-src/sticky.html b/doc-src/sticky.html
index 32ccdd2d..b2636890 100644
--- a/doc-src/sticky.html
+++ b/doc-src/sticky.html
@@ -17,7 +17,7 @@ with the secured resources.
## Sticky auth
-The __stickyauth__ option is analagous to the __stickycookie__ option, in that
+The __stickyauth__ option is analogous to the __stickycookie__ option, in that
HTTP __Authorization__ headers are simply replayed to the server once they have
been seen. This is enough to allow you to access a server resource using HTTP
Basic authentication through the proxy. Note that __mitmproxy__ doesn't (yet)