mirror of
https://github.com/zulip/zulip.git
synced 2025-10-24 08:33:43 +00:00
typos: Fix typos caught by typos and mwic.
Signed-off-by: Anders Kaseorg <anders@zulip.com>
This commit is contained in:
committed by
Anders Kaseorg
parent
ed6dc25710
commit
58822372d5
@@ -1836,7 +1836,7 @@ class TestActiveUsersAudit(AnalyticsTestCase):
|
||||
do_fill_count_stat_at_hour(self.stat, self.TIME_ZERO)
|
||||
self.assertTableState(RealmCount, [], [])
|
||||
|
||||
def test_user_unactive_then_activated_same_day(self) -> None:
|
||||
def test_user_inactive_then_activated_same_day(self) -> None:
|
||||
self.add_event(AuditLogEventType.USER_DEACTIVATED, 1)
|
||||
self.add_event(AuditLogEventType.USER_REACTIVATED, 0.5)
|
||||
do_fill_count_stat_at_hour(self.stat, self.TIME_ZERO)
|
||||
|
||||
@@ -1068,7 +1068,7 @@ No changes; feature level used for Zulip 8.0 release.
|
||||
* `PATCH /realm`, [`POST /register`](/api/register-queue),
|
||||
[`GET /events`](/api/get-events): Added `can_access_all_users_group_id`
|
||||
realm setting, which is the ID of the user group whose members can
|
||||
access all the users in the oragnization.
|
||||
access all the users in the organization.
|
||||
|
||||
* [`POST /register`](/api/register-queue): Added `allowed_system_groups`
|
||||
field to configuration data object of permission settings passed in
|
||||
|
||||
@@ -526,7 +526,7 @@ The long-term plan for this bot system is to allow the same
|
||||
* Run directly using the Zulip `call_on_each_message` API, which is
|
||||
how the implementation above works. This is great for quick
|
||||
development with minimal setup.
|
||||
* Run in a simple Python webserver server, processing messages
|
||||
* Run in a simple Python web server, processing messages
|
||||
received from Zulip's outgoing webhooks integration.
|
||||
* For bots merged into the mainline Zulip codebase, enabled via a
|
||||
button in the Zulip web UI, with no code deployment effort required.
|
||||
|
||||
@@ -1887,7 +1887,7 @@ class BillingSession(ABC):
|
||||
_("Please add a credit card to schedule upgrade."),
|
||||
)
|
||||
|
||||
# Setting status > CustomerPLan.LIVE_STATUS_THRESHOLD makes sure we
|
||||
# Setting status > CustomerPlan.LIVE_STATUS_THRESHOLD makes sure we
|
||||
# don't have to worry about this plan being used for any other purpose.
|
||||
# NOTE: This is the 2nd plan for the customer.
|
||||
plan_params["status"] = CustomerPlan.NEVER_STARTED
|
||||
|
||||
@@ -155,7 +155,7 @@ If one of these services is not installed or functioning correctly,
|
||||
Zulip will not work. Below we detail some common configuration
|
||||
problems and how to resolve them:
|
||||
|
||||
- If your browser reports no webserver is running, that is likely
|
||||
- If your browser reports no web server is running, that is likely
|
||||
because nginx is not configured properly and thus failed to start.
|
||||
nginx will fail to start if you configured SSL incorrectly or did
|
||||
not provide SSL certificates. To fix this, configure them properly
|
||||
|
||||
@@ -302,7 +302,7 @@ _"Suchen" (YouTube, Google, Facebook, Transifex)_
|
||||
|
||||
- Pin/Unpin - **Anpinnen/Loslösen**
|
||||
|
||||
While "pinnen" is shorter than "anpinnen", "anpinnen" sweeps any amiguity out of
|
||||
While "pinnen" is shorter than "anpinnen", "anpinnen" sweeps any ambiguity out of
|
||||
the way. This term is not used too often on Zulip, so the length shouldn't be a
|
||||
problem.
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
; Used in docker.pp, starts nginx webserver (for docker use only)
|
||||
; Used in docker.pp, starts nginx web server (for docker use only)
|
||||
[program:nginx]
|
||||
command = /usr/sbin/nginx -g 'daemon off;'
|
||||
stdout_events_enabled=true
|
||||
|
||||
@@ -237,9 +237,9 @@ async function delete_realm_icon(page: Page): Promise<void> {
|
||||
|
||||
async function test_organization_profile(page: Page): Promise<void> {
|
||||
await page.click("li[data-section='organization-profile']");
|
||||
const gravatar_selctor =
|
||||
const gravatar_selector =
|
||||
'#realm-icon-upload-widget .image-block[src^="https://secure.gravatar.com/avatar/"]';
|
||||
await page.waitForSelector(gravatar_selctor, {visible: true});
|
||||
await page.waitForSelector(gravatar_selector, {visible: true});
|
||||
await page.waitForSelector("#realm-icon-upload-widget .image-delete-button", {hidden: true});
|
||||
|
||||
await test_upload_realm_icon_image(page);
|
||||
@@ -247,7 +247,7 @@ async function test_organization_profile(page: Page): Promise<void> {
|
||||
|
||||
await delete_realm_icon(page);
|
||||
await page.waitForSelector("#realm-icon-upload-widget .image-delete-button", {hidden: true});
|
||||
await page.waitForSelector(gravatar_selctor, {visible: true});
|
||||
await page.waitForSelector(gravatar_selector, {visible: true});
|
||||
}
|
||||
|
||||
async function test_authentication_methods(page: Page): Promise<void> {
|
||||
|
||||
@@ -726,7 +726,7 @@ export function process_hotkey(e, hotkey) {
|
||||
|
||||
// modals.any_active() and modals.active_modal() both query the dom to
|
||||
// find and retrieve any active modal. Thus, we limit the number of calls
|
||||
// to the DOM by storing these values as constansts to be reused.
|
||||
// to the DOM by storing these values as constants to be reused.
|
||||
const is_any_modal_active = modals.any_active();
|
||||
const active_modal = is_any_modal_active ? modals.active_modal() : null;
|
||||
|
||||
|
||||
@@ -437,7 +437,7 @@ export function populate_auth_methods(auth_method_to_bool_map: Record<string, bo
|
||||
enabled: value,
|
||||
disable_configure_auth_method: !can_configure_auth_methods() || cant_be_enabled,
|
||||
// The negated character class regexp serves as an allowlist - the replace() will
|
||||
// remove *all* symbols *but* digits (\d) and lowecase letters (a-z),
|
||||
// remove *all* symbols *but* digits (\d) and lowercase letters (a-z),
|
||||
// so that we can make assumptions on this string elsewhere in the code.
|
||||
// As a result, the only two "incoming" assumptions on the auth method name are:
|
||||
// 1) It contains at least one allowed symbol
|
||||
|
||||
@@ -155,7 +155,7 @@ function update_group_permission_settings_elements(group: UserGroup): void {
|
||||
return;
|
||||
}
|
||||
|
||||
// We are concerend with the General tab for changing group permissions.
|
||||
// We are concerned with the General tab for changing group permissions.
|
||||
const $group_permission_settings = $("#group_permission_settings");
|
||||
|
||||
const $permission_pill_container_elements = $group_permission_settings.find(".pill-container");
|
||||
|
||||
@@ -825,7 +825,7 @@ class InviteUserTest(InviteUserBase):
|
||||
self.assert_json_error(result, "Insufficient permission")
|
||||
|
||||
# Test that user having permission to manage all groups can
|
||||
# add user to groups through invitiation.
|
||||
# add user to groups through invitation.
|
||||
owners_group = NamedUserGroup.objects.get(
|
||||
name=SystemGroups.OWNERS, realm=realm, is_system_group=True
|
||||
)
|
||||
@@ -859,7 +859,7 @@ class InviteUserTest(InviteUserBase):
|
||||
self.assertTrue(find_key_by_email(invitee))
|
||||
|
||||
# Test that user having permission to add members to a group can
|
||||
# add user to that group through invitiation.
|
||||
# add user to that group through invitation.
|
||||
do_change_user_group_permission_setting(
|
||||
test_group,
|
||||
"can_add_members_group",
|
||||
@@ -880,7 +880,7 @@ class InviteUserTest(InviteUserBase):
|
||||
self.assertTrue(find_key_by_email(invitee))
|
||||
|
||||
# Test that user having permission to manage a group can
|
||||
# add user to that group through invitiation.
|
||||
# add user to that group through invitation.
|
||||
do_change_user_group_permission_setting(
|
||||
hamletcharacters_group,
|
||||
"can_manage_group",
|
||||
@@ -3190,7 +3190,7 @@ class MultiuseInviteTest(ZulipTestCase):
|
||||
)
|
||||
|
||||
# Test that user having permission to manage all groups can
|
||||
# add users to groups through invitiation.
|
||||
# add users to groups through invitation.
|
||||
owners_group = NamedUserGroup.objects.get(
|
||||
name=SystemGroups.OWNERS, realm=realm, is_system_group=True
|
||||
)
|
||||
@@ -3217,7 +3217,7 @@ class MultiuseInviteTest(ZulipTestCase):
|
||||
check_create_multiuse_invite("desdemona", [test_group.id, hamletcharacters_group.id])
|
||||
|
||||
# Test that user having permission to add members to a group can
|
||||
# add user to that group through invitiation.
|
||||
# add user to that group through invitation.
|
||||
do_change_user_group_permission_setting(
|
||||
test_group,
|
||||
"can_add_members_group",
|
||||
@@ -3234,7 +3234,7 @@ class MultiuseInviteTest(ZulipTestCase):
|
||||
check_create_multiuse_invite("shiva", [test_group.id])
|
||||
|
||||
# Test that user having permission to manage a group can
|
||||
# add user to that group through invitiation.
|
||||
# add user to that group through invitation.
|
||||
do_change_user_group_permission_setting(
|
||||
hamletcharacters_group,
|
||||
"can_manage_group",
|
||||
|
||||
@@ -1964,7 +1964,7 @@ class EmojiTest(UploadSerializeMixin, ZulipTestCase):
|
||||
self.assert_json_error(result, "Invalid image format")
|
||||
resize_mock.assert_not_called()
|
||||
|
||||
def test_upsupported_format(self) -> None:
|
||||
def test_unsupported_format(self) -> None:
|
||||
"""Invalid format is not resized"""
|
||||
self.login("iago")
|
||||
with (
|
||||
|
||||
@@ -137,7 +137,7 @@ def handle_upload_pre_finish_hook(
|
||||
request: HttpRequest, user_profile: UserProfile, data: TusUpload
|
||||
) -> HttpResponse:
|
||||
# With an S3 backend, the filename we passed in pre_create's
|
||||
# data.id has a randomly-generated "mutlipart-id" appended with a
|
||||
# data.id has a randomly-generated "multipart-id" appended with a
|
||||
# `+`. Our path_ids cannot contain `+`, so we strip any suffix
|
||||
# starting with `+`.
|
||||
path_id = data.id.partition("+")[0]
|
||||
|
||||
Reference in New Issue
Block a user