summaryrefslogtreecommitdiffstats
path: root/api
diff options
context:
space:
mode:
authorJesús Espino <jespinog@gmail.com>2018-03-29 16:04:54 +0200
committerHarrison Healey <harrisonmhealey@gmail.com>2018-03-29 10:04:54 -0400
commit014a3b6a60610ba592c5843080686f4481553136 (patch)
tree883ac2be9c96de5a8c4f34b2881da84c1fd65e21 /api
parenteb48292a3a69ac5ffac91cdb0c5e5349ae8f85eb (diff)
downloadchat-014a3b6a60610ba592c5843080686f4481553136.tar.gz
chat-014a3b6a60610ba592c5843080686f4481553136.tar.bz2
chat-014a3b6a60610ba592c5843080686f4481553136.zip
Fixing misspell errors (#8544)
Diffstat (limited to 'api')
-rw-r--r--api/admin_test.go2
-rw-r--r--api/command_loadtest_test.go2
-rw-r--r--api/command_me_test.go2
-rw-r--r--api/command_shrug_test.go2
-rw-r--r--api/general.go2
-rw-r--r--api/oauth_test.go2
-rw-r--r--api/team_test.go2
7 files changed, 7 insertions, 7 deletions
diff --git a/api/admin_test.go b/api/admin_test.go
index 00e5b3c7f..dfa6cd3b9 100644
--- a/api/admin_test.go
+++ b/api/admin_test.go
@@ -573,7 +573,7 @@ func TestAdminResetPassword(t *testing.T) {
Client.SetTeamId(team.Id)
if _, err := Client.AdminResetPassword(user.Id, "newpwd1"); err == nil {
- t.Fatal("Should have errored - not sytem admin")
+ t.Fatal("Should have errored - not system admin")
}
}
diff --git a/api/command_loadtest_test.go b/api/command_loadtest_test.go
index e5f95881d..570b8a09b 100644
--- a/api/command_loadtest_test.go
+++ b/api/command_loadtest_test.go
@@ -38,7 +38,7 @@ func TestLoadTestSetupCommands(t *testing.T) {
th.App.UpdateConfig(func(cfg *model.Config) { cfg.ServiceSettings.EnableTesting = true })
rs := Client.Must(Client.Command(channel.Id, "/test setup fuzz 1 1 1")).Data.(*model.CommandResponse)
- if rs.Text != "Created enviroment" {
+ if rs.Text != "Created environment" {
t.Fatal(rs.Text)
}
diff --git a/api/command_me_test.go b/api/command_me_test.go
index 7ca21ae6c..63718ca68 100644
--- a/api/command_me_test.go
+++ b/api/command_me_test.go
@@ -32,7 +32,7 @@ func TestMeCommand(t *testing.T) {
} else {
if p1.Posts[p1.Order[0]].Message != `*hello*` {
t.Log(p1.Posts[p1.Order[0]].Message)
- t.Fatal("invalid shrug reponse")
+ t.Fatal("invalid shrug response")
}
}
}
diff --git a/api/command_shrug_test.go b/api/command_shrug_test.go
index b524a588f..9b453a48d 100644
--- a/api/command_shrug_test.go
+++ b/api/command_shrug_test.go
@@ -32,7 +32,7 @@ func TestShrugCommand(t *testing.T) {
} else {
if p1.Posts[p1.Order[0]].Message != `¯\\\_(ツ)\_/¯` {
t.Log(p1.Posts[p1.Order[0]].Message)
- t.Fatal("invalid shrug reponse")
+ t.Fatal("invalid shrug response")
}
}
}
diff --git a/api/general.go b/api/general.go
index 94da47330..51c491526 100644
--- a/api/general.go
+++ b/api/general.go
@@ -40,7 +40,7 @@ func logClient(c *Context, w http.ResponseWriter, r *http.Request) {
lvl := m["level"]
msg := m["message"]
- // filter out javascript errors from franz that are poluting the log files
+ // filter out javascript errors from franz that are polluting the log files
if strings.Contains(msg, "/franz") {
forceToDebug = true
}
diff --git a/api/oauth_test.go b/api/oauth_test.go
index 2663c784b..2428441b1 100644
--- a/api/oauth_test.go
+++ b/api/oauth_test.go
@@ -428,7 +428,7 @@ func TestOAuthRegenerateAppSecret(t *testing.T) {
}
if app2.ClientSecret == oauthApp.ClientSecret {
- t.Fatal("Should have been diferent client Secrets")
+ t.Fatal("Should have been different client Secrets")
}
}
}
diff --git a/api/team_test.go b/api/team_test.go
index 3db454b62..b7af0f1e8 100644
--- a/api/team_test.go
+++ b/api/team_test.go
@@ -931,7 +931,7 @@ func TestUpdateTeamMemberRoles(t *testing.T) {
t.Fatal("Should have worked, user is team admin and has the ability to manage permissions on this team.")
// Note to anyone who thinks this test is wrong:
// This operation will not effect the system admin's permissions because they have global access to all teams.
- // Their team level permissions are irrelavent. A team admin should be able to manage team level permissions.
+ // Their team level permissions are irrelevant. A team admin should be able to manage team level permissions.
}
// System admins should be able to manipulate permission no matter what their team level permissions are.