typos: Fix typos caught by typos and mwic.

Signed-off-by: Anders Kaseorg <anders@zulip.com>
This commit is contained in:
Anders Kaseorg
2024-12-24 18:47:02 -08:00
committed by Anders Kaseorg
parent ed6dc25710
commit 58822372d5
14 changed files with 21 additions and 21 deletions

View File

@@ -1836,7 +1836,7 @@ class TestActiveUsersAudit(AnalyticsTestCase):
do_fill_count_stat_at_hour(self.stat, self.TIME_ZERO)
self.assertTableState(RealmCount, [], [])
def test_user_unactive_then_activated_same_day(self) -> None:
def test_user_inactive_then_activated_same_day(self) -> None:
self.add_event(AuditLogEventType.USER_DEACTIVATED, 1)
self.add_event(AuditLogEventType.USER_REACTIVATED, 0.5)
do_fill_count_stat_at_hour(self.stat, self.TIME_ZERO)

View File

@@ -1068,7 +1068,7 @@ No changes; feature level used for Zulip 8.0 release.
* `PATCH /realm`, [`POST /register`](/api/register-queue),
[`GET /events`](/api/get-events): Added `can_access_all_users_group_id`
realm setting, which is the ID of the user group whose members can
access all the users in the oragnization.
access all the users in the organization.
* [`POST /register`](/api/register-queue): Added `allowed_system_groups`
field to configuration data object of permission settings passed in

View File

@@ -526,7 +526,7 @@ The long-term plan for this bot system is to allow the same
* Run directly using the Zulip `call_on_each_message` API, which is
how the implementation above works. This is great for quick
development with minimal setup.
* Run in a simple Python webserver server, processing messages
* Run in a simple Python web server, processing messages
received from Zulip's outgoing webhooks integration.
* For bots merged into the mainline Zulip codebase, enabled via a
button in the Zulip web UI, with no code deployment effort required.

View File

@@ -1887,7 +1887,7 @@ class BillingSession(ABC):
_("Please add a credit card to schedule upgrade."),
)
# Setting status > CustomerPLan.LIVE_STATUS_THRESHOLD makes sure we
# Setting status > CustomerPlan.LIVE_STATUS_THRESHOLD makes sure we
# don't have to worry about this plan being used for any other purpose.
# NOTE: This is the 2nd plan for the customer.
plan_params["status"] = CustomerPlan.NEVER_STARTED

View File

@@ -155,7 +155,7 @@ If one of these services is not installed or functioning correctly,
Zulip will not work. Below we detail some common configuration
problems and how to resolve them:
- If your browser reports no webserver is running, that is likely
- If your browser reports no web server is running, that is likely
because nginx is not configured properly and thus failed to start.
nginx will fail to start if you configured SSL incorrectly or did
not provide SSL certificates. To fix this, configure them properly

View File

@@ -302,7 +302,7 @@ _"Suchen" (YouTube, Google, Facebook, Transifex)_
- Pin/Unpin - **Anpinnen/Loslösen**
While "pinnen" is shorter than "anpinnen", "anpinnen" sweeps any amiguity out of
While "pinnen" is shorter than "anpinnen", "anpinnen" sweeps any ambiguity out of
the way. This term is not used too often on Zulip, so the length shouldn't be a
problem.

View File

@@ -1,4 +1,4 @@
; Used in docker.pp, starts nginx webserver (for docker use only)
; Used in docker.pp, starts nginx web server (for docker use only)
[program:nginx]
command = /usr/sbin/nginx -g 'daemon off;'
stdout_events_enabled=true

View File

@@ -237,9 +237,9 @@ async function delete_realm_icon(page: Page): Promise<void> {
async function test_organization_profile(page: Page): Promise<void> {
await page.click("li[data-section='organization-profile']");
const gravatar_selctor =
const gravatar_selector =
'#realm-icon-upload-widget .image-block[src^="https://secure.gravatar.com/avatar/"]';
await page.waitForSelector(gravatar_selctor, {visible: true});
await page.waitForSelector(gravatar_selector, {visible: true});
await page.waitForSelector("#realm-icon-upload-widget .image-delete-button", {hidden: true});
await test_upload_realm_icon_image(page);
@@ -247,7 +247,7 @@ async function test_organization_profile(page: Page): Promise<void> {
await delete_realm_icon(page);
await page.waitForSelector("#realm-icon-upload-widget .image-delete-button", {hidden: true});
await page.waitForSelector(gravatar_selctor, {visible: true});
await page.waitForSelector(gravatar_selector, {visible: true});
}
async function test_authentication_methods(page: Page): Promise<void> {

View File

@@ -726,7 +726,7 @@ export function process_hotkey(e, hotkey) {
// modals.any_active() and modals.active_modal() both query the dom to
// find and retrieve any active modal. Thus, we limit the number of calls
// to the DOM by storing these values as constansts to be reused.
// to the DOM by storing these values as constants to be reused.
const is_any_modal_active = modals.any_active();
const active_modal = is_any_modal_active ? modals.active_modal() : null;

View File

@@ -437,7 +437,7 @@ export function populate_auth_methods(auth_method_to_bool_map: Record<string, bo
enabled: value,
disable_configure_auth_method: !can_configure_auth_methods() || cant_be_enabled,
// The negated character class regexp serves as an allowlist - the replace() will
// remove *all* symbols *but* digits (\d) and lowecase letters (a-z),
// remove *all* symbols *but* digits (\d) and lowercase letters (a-z),
// so that we can make assumptions on this string elsewhere in the code.
// As a result, the only two "incoming" assumptions on the auth method name are:
// 1) It contains at least one allowed symbol

View File

@@ -155,7 +155,7 @@ function update_group_permission_settings_elements(group: UserGroup): void {
return;
}
// We are concerend with the General tab for changing group permissions.
// We are concerned with the General tab for changing group permissions.
const $group_permission_settings = $("#group_permission_settings");
const $permission_pill_container_elements = $group_permission_settings.find(".pill-container");

View File

@@ -825,7 +825,7 @@ class InviteUserTest(InviteUserBase):
self.assert_json_error(result, "Insufficient permission")
# Test that user having permission to manage all groups can
# add user to groups through invitiation.
# add user to groups through invitation.
owners_group = NamedUserGroup.objects.get(
name=SystemGroups.OWNERS, realm=realm, is_system_group=True
)
@@ -859,7 +859,7 @@ class InviteUserTest(InviteUserBase):
self.assertTrue(find_key_by_email(invitee))
# Test that user having permission to add members to a group can
# add user to that group through invitiation.
# add user to that group through invitation.
do_change_user_group_permission_setting(
test_group,
"can_add_members_group",
@@ -880,7 +880,7 @@ class InviteUserTest(InviteUserBase):
self.assertTrue(find_key_by_email(invitee))
# Test that user having permission to manage a group can
# add user to that group through invitiation.
# add user to that group through invitation.
do_change_user_group_permission_setting(
hamletcharacters_group,
"can_manage_group",
@@ -3190,7 +3190,7 @@ class MultiuseInviteTest(ZulipTestCase):
)
# Test that user having permission to manage all groups can
# add users to groups through invitiation.
# add users to groups through invitation.
owners_group = NamedUserGroup.objects.get(
name=SystemGroups.OWNERS, realm=realm, is_system_group=True
)
@@ -3217,7 +3217,7 @@ class MultiuseInviteTest(ZulipTestCase):
check_create_multiuse_invite("desdemona", [test_group.id, hamletcharacters_group.id])
# Test that user having permission to add members to a group can
# add user to that group through invitiation.
# add user to that group through invitation.
do_change_user_group_permission_setting(
test_group,
"can_add_members_group",
@@ -3234,7 +3234,7 @@ class MultiuseInviteTest(ZulipTestCase):
check_create_multiuse_invite("shiva", [test_group.id])
# Test that user having permission to manage a group can
# add user to that group through invitiation.
# add user to that group through invitation.
do_change_user_group_permission_setting(
hamletcharacters_group,
"can_manage_group",

View File

@@ -1964,7 +1964,7 @@ class EmojiTest(UploadSerializeMixin, ZulipTestCase):
self.assert_json_error(result, "Invalid image format")
resize_mock.assert_not_called()
def test_upsupported_format(self) -> None:
def test_unsupported_format(self) -> None:
"""Invalid format is not resized"""
self.login("iago")
with (

View File

@@ -137,7 +137,7 @@ def handle_upload_pre_finish_hook(
request: HttpRequest, user_profile: UserProfile, data: TusUpload
) -> HttpResponse:
# With an S3 backend, the filename we passed in pre_create's
# data.id has a randomly-generated "mutlipart-id" appended with a
# data.id has a randomly-generated "multipart-id" appended with a
# `+`. Our path_ids cannot contain `+`, so we strip any suffix
# starting with `+`.
path_id = data.id.partition("+")[0]