From 014a3b6a60610ba592c5843080686f4481553136 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jes=C3=BAs=20Espino?= Date: Thu, 29 Mar 2018 16:04:54 +0200 Subject: Fixing misspell errors (#8544) --- api4/channel.go | 2 +- api4/context.go | 2 +- api4/role_test.go | 2 +- api4/team_test.go | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) (limited to 'api4') diff --git a/api4/channel.go b/api4/channel.go index f5f6bd06d..5a43d5e4a 100644 --- a/api4/channel.go +++ b/api4/channel.go @@ -743,7 +743,7 @@ func viewChannel(c *Context, w http.ResponseWriter, r *http.Request) { c.App.UpdateLastActivityAtIfNeeded(c.Session) - // Returning {"status": "OK", ...} for backwards compatability + // Returning {"status": "OK", ...} for backwards compatibility resp := &model.ChannelViewResponse{ Status: "OK", LastViewedAtTimes: times, diff --git a/api4/context.go b/api4/context.go index 62fe55758..1f27431d2 100644 --- a/api4/context.go +++ b/api4/context.go @@ -155,7 +155,7 @@ func (h handler) ServeHTTP(w http.ResponseWriter, r *http.Request) { h.handleFunc(c, w, r) } - // Handle errors that have occured + // Handle errors that have occurred if c.Err != nil { c.Err.Translate(c.T) c.Err.RequestId = c.RequestId diff --git a/api4/role_test.go b/api4/role_test.go index c5d8e303e..8149ff3c6 100644 --- a/api4/role_test.go +++ b/api4/role_test.go @@ -129,7 +129,7 @@ func TestGetRolesByNames(t *testing.T) { assert.Contains(t, received, role2) assert.Contains(t, received, role3) - // Check a list of non-existant roles. + // Check a list of non-existent roles. received, resp = th.Client.GetRolesByNames([]string{model.NewId(), model.NewId()}) CheckNoError(t, resp) diff --git a/api4/team_test.go b/api4/team_test.go index f969d05b2..31eeb7fd8 100644 --- a/api4/team_test.go +++ b/api4/team_test.go @@ -1676,7 +1676,7 @@ func TestUpdateTeamMemberRoles(t *testing.T) { // Note from API v3 // Note to anyone who thinks this (above) test is wrong: // This operation will not affect the system admin's permissions because they have global access to all teams. - // Their team level permissions are irrelavent. A team admin should be able to manage team level permissions. + // Their team level permissions are irrelevant. A team admin should be able to manage team level permissions. // System admins should be able to manipulate permission no matter what their team level permissions are. // system admin promotes user 2 -- cgit v1.2.3-1-g7c22