docs: Fix typos caught by ‘typos’.

https://github.com/crate-ci/typos

Signed-off-by: Anders Kaseorg <anders@zulip.com>
This commit is contained in:
Anders Kaseorg 2023-09-06 15:29:46 -07:00 committed by Anders Kaseorg
parent fdd811bec1
commit 48a3588cdb
9 changed files with 18 additions and 18 deletions

View File

@ -96,7 +96,7 @@ _Released 2023-07-05_
[common reverse proxy mis-configurations][proxies] are detected.
- Improved [reverse proxy documentation][proxies] to clarify that trust of
`X-Fowarded-Proto` is also necessary.
`X-Forwarded-Proto` is also necessary.
- Removed [reverse proxy][proxies] nginx configuration files when the
[`loadbalancer.ips`](../production/deployment.md#ips)

View File

@ -424,7 +424,7 @@ export function show_edit_bot_info_modal(user_id, from_user_info_popover) {
function item_click_callback(event, dropdown) {
bot_owner_dropdown_widget.render();
// Let dialog_wigdet know that there was a change in value.
// Let dialog_widget know that there was a change in value.
$(bot_owner_dropdown_widget.widget_id).trigger("input");
dropdown.hide();
event.stopPropagation();

View File

@ -98,11 +98,11 @@ function get_user_info_row(user_id) {
export function allow_sorting_deactivated_users_list_by_email() {
const deactivated_users = people.get_non_active_realm_users();
const deactivated_humans_with_visble_email = deactivated_users.filter(
const deactivated_humans_with_visible_email = deactivated_users.filter(
(user) => !user.is_bot && user.delivery_email,
);
return deactivated_humans_with_visble_email.length !== 0;
return deactivated_humans_with_visible_email.length !== 0;
}
export function update_view_on_deactivate(user_id) {

View File

@ -424,14 +424,14 @@ test("file_drop", ({override, override_rewire}) => {
dragenter_handler(drag_event);
assert.equal(prevent_default_counter, 2);
let stop_propogation_counter = 0;
let stop_propagation_counter = 0;
const files = ["file1", "file2"];
const drop_event = {
preventDefault() {
prevent_default_counter += 1;
},
stopPropagation() {
stop_propogation_counter += 1;
stop_propagation_counter += 1;
},
originalEvent: {
dataTransfer: {
@ -451,7 +451,7 @@ test("file_drop", ({override, override_rewire}) => {
drop_handler(drop_event);
assert.ok(compose_actions_start_called);
assert.equal(prevent_default_counter, 3);
assert.equal(stop_propogation_counter, 1);
assert.equal(stop_propagation_counter, 1);
assert.equal(upload_files_called, true);
});

View File

@ -1649,7 +1649,7 @@ class NormalActionsTest(BaseAction):
)
check_realm_user_update("events[0]", events[0], "full_name")
def test_change_user_delivery_email_email_address_visibilty_admins(self) -> None:
def test_change_user_delivery_email_email_address_visibility_admins(self) -> None:
do_change_user_setting(
self.user_profile,
"email_address_visibility",

View File

@ -1689,7 +1689,7 @@ class GetOldMessagesTest(ZulipTestCase):
.values_list("recipient_id", flat=True)
.order_by("id")
)
query_ids["public_streams_recipents"] = ", ".join(str(r) for r in recipients)
query_ids["public_streams_recipients"] = ", ".join(str(r) for r in recipients)
return query_ids
def check_unauthenticated_response(
@ -4006,13 +4006,13 @@ recipient_id = %(recipient_id_3)s AND upper(subject) = upper(%(param_2)s))\
sql,
)
sql_template = "SELECT anon_1.message_id \nFROM (SELECT id AS message_id \nFROM zerver_message \nWHERE recipient_id IN ({public_streams_recipents}) ORDER BY zerver_message.id ASC \n LIMIT 10) AS anon_1 ORDER BY message_id ASC"
sql_template = "SELECT anon_1.message_id \nFROM (SELECT id AS message_id \nFROM zerver_message \nWHERE recipient_id IN ({public_streams_recipients}) ORDER BY zerver_message.id ASC \n LIMIT 10) AS anon_1 ORDER BY message_id ASC"
sql = sql_template.format(**query_ids)
self.common_check_get_messages_query(
{"anchor": 0, "num_before": 0, "num_after": 9, "narrow": '[["streams", "public"]]'}, sql
)
sql_template = "SELECT anon_1.message_id, anon_1.flags \nFROM (SELECT message_id, flags \nFROM zerver_usermessage JOIN zerver_message ON zerver_usermessage.message_id = zerver_message.id \nWHERE user_profile_id = {hamlet_id} AND (recipient_id NOT IN ({public_streams_recipents})) ORDER BY message_id ASC \n LIMIT 10) AS anon_1 ORDER BY message_id ASC"
sql_template = "SELECT anon_1.message_id, anon_1.flags \nFROM (SELECT message_id, flags \nFROM zerver_usermessage JOIN zerver_message ON zerver_usermessage.message_id = zerver_message.id \nWHERE user_profile_id = {hamlet_id} AND (recipient_id NOT IN ({public_streams_recipients})) ORDER BY message_id ASC \n LIMIT 10) AS anon_1 ORDER BY message_id ASC"
sql = sql_template.format(**query_ids)
self.common_check_get_messages_query(
{

View File

@ -339,7 +339,7 @@ class MutedUsersTests(ZulipTestCase):
)
self.assert_json_success(result)
m.assert_called_once()
# `maybe_enqueue_notificaions` was called for Hamlet after message edit mentioned him.
# `maybe_enqueue_notifications` was called for Hamlet after message edit mentioned him.
self.assertEqual(m.call_args_list[0][1]["user_notifications_data"].user_id, hamlet.id)
# Hamlet mutes Cordelia.
@ -361,6 +361,6 @@ class MutedUsersTests(ZulipTestCase):
),
)
self.assert_json_success(result)
# `maybe_enqueue_notificaions` wasn't called for Hamlet after message edit which mentioned him,
# `maybe_enqueue_notifications` wasn't called for Hamlet after message edit which mentioned him,
# because the sender (Cordelia) was muted.
m.assert_not_called()

View File

@ -196,7 +196,7 @@ class DeactivationNoticeTestCase(ZulipTestCase):
result.content.decode(),
)
def test_no_deactivation_notice_with_no_rediect(self) -> None:
def test_no_deactivation_notice_with_no_redirect(self) -> None:
realm = get_realm("zulip")
do_change_realm_subdomain(
realm, "new-subdomain-name", acting_user=None, add_deactivated_redirect=False

View File

@ -122,7 +122,7 @@ class UserGroupRaceConditionTestCase(ZulipTransactionTestCase):
t2: RacingThread,
*,
success_count: int,
error_messsage: str = "",
error_message: str = "",
) -> None:
help_msg = """We access the test endpoint that wraps around the
real subgroup update endpoint by synchronizing them after the acquisition of the
@ -142,7 +142,7 @@ have no control over the scheduler when the barrier timeouts.
succeeded += 1
continue
self.assertEqual(response, error_messsage)
self.assertEqual(response, error_message)
# Race condition resolution should only allow one thread to succeed
self.assertEqual(
succeeded,
@ -164,7 +164,7 @@ have no control over the scheduler when the barrier timeouts.
supergroup_id=foo_chain[0].id,
),
success_count=1,
error_messsage="Deadlock detected",
error_message="Deadlock detected",
)
foo_chain = self.create_user_group_chain(realm)
@ -184,7 +184,7 @@ have no control over the scheduler when the barrier timeouts.
supergroup_id=bar_chain[-1].id,
),
success_count=1,
error_messsage="Busy lock detected",
error_message="Busy lock detected",
)
foo_chain = self.create_user_group_chain(realm)