mirror of https://github.com/zulip/zulip.git
docs: Fix typos caught by ‘typos’.
https://github.com/crate-ci/typos Signed-off-by: Anders Kaseorg <anders@zulip.com>
This commit is contained in:
parent
fdd811bec1
commit
48a3588cdb
|
@ -96,7 +96,7 @@ _Released 2023-07-05_
|
|||
[common reverse proxy mis-configurations][proxies] are detected.
|
||||
|
||||
- Improved [reverse proxy documentation][proxies] to clarify that trust of
|
||||
`X-Fowarded-Proto` is also necessary.
|
||||
`X-Forwarded-Proto` is also necessary.
|
||||
|
||||
- Removed [reverse proxy][proxies] nginx configuration files when the
|
||||
[`loadbalancer.ips`](../production/deployment.md#ips)
|
||||
|
|
|
@ -424,7 +424,7 @@ export function show_edit_bot_info_modal(user_id, from_user_info_popover) {
|
|||
|
||||
function item_click_callback(event, dropdown) {
|
||||
bot_owner_dropdown_widget.render();
|
||||
// Let dialog_wigdet know that there was a change in value.
|
||||
// Let dialog_widget know that there was a change in value.
|
||||
$(bot_owner_dropdown_widget.widget_id).trigger("input");
|
||||
dropdown.hide();
|
||||
event.stopPropagation();
|
||||
|
|
|
@ -98,11 +98,11 @@ function get_user_info_row(user_id) {
|
|||
|
||||
export function allow_sorting_deactivated_users_list_by_email() {
|
||||
const deactivated_users = people.get_non_active_realm_users();
|
||||
const deactivated_humans_with_visble_email = deactivated_users.filter(
|
||||
const deactivated_humans_with_visible_email = deactivated_users.filter(
|
||||
(user) => !user.is_bot && user.delivery_email,
|
||||
);
|
||||
|
||||
return deactivated_humans_with_visble_email.length !== 0;
|
||||
return deactivated_humans_with_visible_email.length !== 0;
|
||||
}
|
||||
|
||||
export function update_view_on_deactivate(user_id) {
|
||||
|
|
|
@ -424,14 +424,14 @@ test("file_drop", ({override, override_rewire}) => {
|
|||
dragenter_handler(drag_event);
|
||||
assert.equal(prevent_default_counter, 2);
|
||||
|
||||
let stop_propogation_counter = 0;
|
||||
let stop_propagation_counter = 0;
|
||||
const files = ["file1", "file2"];
|
||||
const drop_event = {
|
||||
preventDefault() {
|
||||
prevent_default_counter += 1;
|
||||
},
|
||||
stopPropagation() {
|
||||
stop_propogation_counter += 1;
|
||||
stop_propagation_counter += 1;
|
||||
},
|
||||
originalEvent: {
|
||||
dataTransfer: {
|
||||
|
@ -451,7 +451,7 @@ test("file_drop", ({override, override_rewire}) => {
|
|||
drop_handler(drop_event);
|
||||
assert.ok(compose_actions_start_called);
|
||||
assert.equal(prevent_default_counter, 3);
|
||||
assert.equal(stop_propogation_counter, 1);
|
||||
assert.equal(stop_propagation_counter, 1);
|
||||
assert.equal(upload_files_called, true);
|
||||
});
|
||||
|
||||
|
|
|
@ -1649,7 +1649,7 @@ class NormalActionsTest(BaseAction):
|
|||
)
|
||||
check_realm_user_update("events[0]", events[0], "full_name")
|
||||
|
||||
def test_change_user_delivery_email_email_address_visibilty_admins(self) -> None:
|
||||
def test_change_user_delivery_email_email_address_visibility_admins(self) -> None:
|
||||
do_change_user_setting(
|
||||
self.user_profile,
|
||||
"email_address_visibility",
|
||||
|
|
|
@ -1689,7 +1689,7 @@ class GetOldMessagesTest(ZulipTestCase):
|
|||
.values_list("recipient_id", flat=True)
|
||||
.order_by("id")
|
||||
)
|
||||
query_ids["public_streams_recipents"] = ", ".join(str(r) for r in recipients)
|
||||
query_ids["public_streams_recipients"] = ", ".join(str(r) for r in recipients)
|
||||
return query_ids
|
||||
|
||||
def check_unauthenticated_response(
|
||||
|
@ -4006,13 +4006,13 @@ recipient_id = %(recipient_id_3)s AND upper(subject) = upper(%(param_2)s))\
|
|||
sql,
|
||||
)
|
||||
|
||||
sql_template = "SELECT anon_1.message_id \nFROM (SELECT id AS message_id \nFROM zerver_message \nWHERE recipient_id IN ({public_streams_recipents}) ORDER BY zerver_message.id ASC \n LIMIT 10) AS anon_1 ORDER BY message_id ASC"
|
||||
sql_template = "SELECT anon_1.message_id \nFROM (SELECT id AS message_id \nFROM zerver_message \nWHERE recipient_id IN ({public_streams_recipients}) ORDER BY zerver_message.id ASC \n LIMIT 10) AS anon_1 ORDER BY message_id ASC"
|
||||
sql = sql_template.format(**query_ids)
|
||||
self.common_check_get_messages_query(
|
||||
{"anchor": 0, "num_before": 0, "num_after": 9, "narrow": '[["streams", "public"]]'}, sql
|
||||
)
|
||||
|
||||
sql_template = "SELECT anon_1.message_id, anon_1.flags \nFROM (SELECT message_id, flags \nFROM zerver_usermessage JOIN zerver_message ON zerver_usermessage.message_id = zerver_message.id \nWHERE user_profile_id = {hamlet_id} AND (recipient_id NOT IN ({public_streams_recipents})) ORDER BY message_id ASC \n LIMIT 10) AS anon_1 ORDER BY message_id ASC"
|
||||
sql_template = "SELECT anon_1.message_id, anon_1.flags \nFROM (SELECT message_id, flags \nFROM zerver_usermessage JOIN zerver_message ON zerver_usermessage.message_id = zerver_message.id \nWHERE user_profile_id = {hamlet_id} AND (recipient_id NOT IN ({public_streams_recipients})) ORDER BY message_id ASC \n LIMIT 10) AS anon_1 ORDER BY message_id ASC"
|
||||
sql = sql_template.format(**query_ids)
|
||||
self.common_check_get_messages_query(
|
||||
{
|
||||
|
|
|
@ -339,7 +339,7 @@ class MutedUsersTests(ZulipTestCase):
|
|||
)
|
||||
self.assert_json_success(result)
|
||||
m.assert_called_once()
|
||||
# `maybe_enqueue_notificaions` was called for Hamlet after message edit mentioned him.
|
||||
# `maybe_enqueue_notifications` was called for Hamlet after message edit mentioned him.
|
||||
self.assertEqual(m.call_args_list[0][1]["user_notifications_data"].user_id, hamlet.id)
|
||||
|
||||
# Hamlet mutes Cordelia.
|
||||
|
@ -361,6 +361,6 @@ class MutedUsersTests(ZulipTestCase):
|
|||
),
|
||||
)
|
||||
self.assert_json_success(result)
|
||||
# `maybe_enqueue_notificaions` wasn't called for Hamlet after message edit which mentioned him,
|
||||
# `maybe_enqueue_notifications` wasn't called for Hamlet after message edit which mentioned him,
|
||||
# because the sender (Cordelia) was muted.
|
||||
m.assert_not_called()
|
||||
|
|
|
@ -196,7 +196,7 @@ class DeactivationNoticeTestCase(ZulipTestCase):
|
|||
result.content.decode(),
|
||||
)
|
||||
|
||||
def test_no_deactivation_notice_with_no_rediect(self) -> None:
|
||||
def test_no_deactivation_notice_with_no_redirect(self) -> None:
|
||||
realm = get_realm("zulip")
|
||||
do_change_realm_subdomain(
|
||||
realm, "new-subdomain-name", acting_user=None, add_deactivated_redirect=False
|
||||
|
|
|
@ -122,7 +122,7 @@ class UserGroupRaceConditionTestCase(ZulipTransactionTestCase):
|
|||
t2: RacingThread,
|
||||
*,
|
||||
success_count: int,
|
||||
error_messsage: str = "",
|
||||
error_message: str = "",
|
||||
) -> None:
|
||||
help_msg = """We access the test endpoint that wraps around the
|
||||
real subgroup update endpoint by synchronizing them after the acquisition of the
|
||||
|
@ -142,7 +142,7 @@ have no control over the scheduler when the barrier timeouts.
|
|||
succeeded += 1
|
||||
continue
|
||||
|
||||
self.assertEqual(response, error_messsage)
|
||||
self.assertEqual(response, error_message)
|
||||
# Race condition resolution should only allow one thread to succeed
|
||||
self.assertEqual(
|
||||
succeeded,
|
||||
|
@ -164,7 +164,7 @@ have no control over the scheduler when the barrier timeouts.
|
|||
supergroup_id=foo_chain[0].id,
|
||||
),
|
||||
success_count=1,
|
||||
error_messsage="Deadlock detected",
|
||||
error_message="Deadlock detected",
|
||||
)
|
||||
|
||||
foo_chain = self.create_user_group_chain(realm)
|
||||
|
@ -184,7 +184,7 @@ have no control over the scheduler when the barrier timeouts.
|
|||
supergroup_id=bar_chain[-1].id,
|
||||
),
|
||||
success_count=1,
|
||||
error_messsage="Busy lock detected",
|
||||
error_message="Busy lock detected",
|
||||
)
|
||||
|
||||
foo_chain = self.create_user_group_chain(realm)
|
||||
|
|
Loading…
Reference in New Issue