Skip to content

Commit a850164

Browse files
committed
Fix some typos
1 parent 0d36460 commit a850164

5 files changed

Lines changed: 6 additions & 6 deletions

File tree

internal/api/js/chrome/chrome.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ type Browser struct {
7070
Cancel func()
7171
}
7272

73-
func RunHeadless(onConsoleLog func(s string), requiresPersistance bool, listenPort int) (*Browser, error) {
73+
func RunHeadless(onConsoleLog func(s string), requiresPersistence bool, listenPort int) (*Browser, error) {
7474
ansiRedForeground := "\x1b[31m"
7575
ansiYellowForeground := "\x1b[33m"
7676
ansiResetForeground := "\x1b[39m"
@@ -83,7 +83,7 @@ func RunHeadless(onConsoleLog func(s string), requiresPersistance bool, listenPo
8383
}
8484
}
8585
opts := chromedp.DefaultExecAllocatorOptions[:]
86-
if requiresPersistance {
86+
if requiresPersistence {
8787
os.Mkdir("chromedp", os.ModePerm) // ignore errors to allow repeated runs
8888
wd, _ := os.Getwd()
8989
userDir := filepath.Join(wd, "chromedp")

internal/cc/test_context.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ func (c *TestContext) WithClientSyncing(t *testing.T, req *ClientCreationRequest
8383
//
8484
// All clients are logged in FIRST before syncing any one of them. As Login() is supposed to block until all keys
8585
// are uploaded, this guarantees that device keys / OTKs / etc exist prior to syncing. This means it is not
86-
// neccessary to synchronise device list changes between these clients.
86+
// necessary to synchronise device list changes between these clients.
8787
//
8888
// The callback function is invoked after this, and cleanup functions are called on your behalf when the
8989
// callback function ends.

internal/deploy/rpc/server.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ func NewServer() *Server {
4343

4444
type ClientCreationOpts struct {
4545
api.ClientCreationOpts
46-
Lang api.ClientTypeLang // need to know the type for pulling out the corret bindings
46+
Lang api.ClientTypeLang // need to know the type for pulling out the correct bindings
4747
ContextID string
4848
}
4949

internal/tests/client_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ func TestCanWaitUntilEventInRoomBeforeRoomIsKnown(t *testing.T) {
184184
completed := helpers.NewWaiter()
185185
waiter := client.WaitUntilEventInRoom(t, roomID, api.CheckEventHasEventID(eventID))
186186
go func() {
187-
waiter.Waitf(t, 5*time.Second, "client did not seee event %s", eventID)
187+
waiter.Waitf(t, 5*time.Second, "client did not see event %s", eventID)
188188
completed.Finish()
189189
}()
190190
t.Logf("waiting for event %s", eventID)

tests/federation_connectivity_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ func TestNewUserCannotGetKeysForOfflineServer(t *testing.T) {
7474
t.Logf("sleeping until client timeout is ready...")
7575
time.Sleep(10 * time.Second)
7676
// we may need to kick hs1 into letting it know that hs2 is back, we do this by sending a typing notif
77-
// in the room, whic will send an EDU over federation which should inform hs1 that hs2 is back online.
77+
// in the room, which will send an EDU over federation which should inform hs1 that hs2 is back online.
7878
tc.Bob.MustSendTyping(t, roomID, true, 1000)
7979
// wait the remaining client timeout time
8080
time.Sleep(23 * time.Second)

0 commit comments

Comments
 (0)