From ca10bf84aa4dee1c9b9a4ec5187e46ad810f5ace Mon Sep 17 00:00:00 2001 From: "LamTrinh.Dev" Date: Mon, 11 Aug 2025 00:33:44 +0700 Subject: [PATCH] Fix spelling errors in some comments. --- packages/desktop/app/index.ts | 4 ++-- packages/sncrypto-common/src/Common/PureCryptoInterface.ts | 2 +- packages/sncrypto-web/src/crypto.ts | 2 +- packages/snjs/mocha/protection.test.js | 4 ++-- packages/snjs/mocha/sync_tests/conflicting.test.js | 2 +- .../javascripts/Components/ChallengeModal/ChallengeModal.tsx | 2 +- .../javascripts/Components/SessionsModal/SessionsModal.tsx | 4 ++-- 7 files changed, 10 insertions(+), 10 deletions(-) diff --git a/packages/desktop/app/index.ts b/packages/desktop/app/index.ts index e5779e7b268..453cbd1d63b 100644 --- a/packages/desktop/app/index.ts +++ b/packages/desktop/app/index.ts @@ -93,7 +93,7 @@ function migrateSnapStorage() { }) } catch (error) { console.error( - `Migration: error occured while moving ${fullFilePath} to ${dest}:`, + `Migration: error occurred while moving ${fullFilePath} to ${dest}:`, // eslint-disable-next-line @typescript-eslint/no-explicit-any (error as any)?.message ?? error, ) @@ -121,7 +121,7 @@ function migrateSnapStorage() { fs.copySync(store.data.backupsLocation, newLocation) } catch (error) { console.error( - `Migration: error occured while moving ${store.data.backupsLocation} to ${documentsDir}:`, + `Migration: error occurred while moving ${store.data.backupsLocation} to ${documentsDir}:`, // eslint-disable-next-line @typescript-eslint/no-explicit-any (error as any)?.message ?? error, ) diff --git a/packages/sncrypto-common/src/Common/PureCryptoInterface.ts b/packages/sncrypto-common/src/Common/PureCryptoInterface.ts index a6460cd8389..6ab4375094d 100644 --- a/packages/sncrypto-common/src/Common/PureCryptoInterface.ts +++ b/packages/sncrypto-common/src/Common/PureCryptoInterface.ts @@ -193,7 +193,7 @@ export interface PureCryptoInterface { /** * Generates a random secret for TOTP authentication * - * RFC4226 reccomends a length of at least 160 bits = 32 b32 chars + * RFC4226 recommends a length of at least 160 bits = 32 b32 chars * https://datatracker.ietf.org/doc/html/rfc4226#section-4 */ generateOtpSecret(): Promise diff --git a/packages/sncrypto-web/src/crypto.ts b/packages/sncrypto-web/src/crypto.ts index 8be0111fd58..12ede22dc28 100644 --- a/packages/sncrypto-web/src/crypto.ts +++ b/packages/sncrypto-web/src/crypto.ts @@ -441,7 +441,7 @@ export class SNWebCrypto implements PureCryptoInterface { /** * Generates a random secret for TOTP authentication * - * RFC4226 reccomends a length of at least 160 bits = 32 b32 chars + * RFC4226 recommends a length of at least 160 bits = 32 b32 chars * https://datatracker.ietf.org/doc/html/rfc4226#section-4 */ public async generateOtpSecret(): Promise { diff --git a/packages/snjs/mocha/protection.test.js b/packages/snjs/mocha/protection.test.js index faa1ef3d6b6..1ae4eb8ac35 100644 --- a/packages/snjs/mocha/protection.test.js +++ b/packages/snjs/mocha/protection.test.js @@ -522,7 +522,7 @@ describe('protections', function () { }) describe('unprotect notes', function () { - it('prompts for password and unprotects all notes if challenge is succesful', async function () { + it('prompts for password and unprotects all notes if challenge is successful', async function () { let challengePrompts = 0 application = await Factory.createApplicationWithFakeCrypto(Factory.randomString()) const passcode = 'passcode' @@ -559,7 +559,7 @@ describe('protections', function () { expect(challengePrompts).to.equal(1) }) - it('prompts for passcode and unprotects all notes if challenge is succesful', async function () { + it('prompts for passcode and unprotects all notes if challenge is successful', async function () { let challengePrompts = 0 application = await Factory.createApplicationWithFakeCrypto(Factory.randomString()) const passcode = 'passcode' diff --git a/packages/snjs/mocha/sync_tests/conflicting.test.js b/packages/snjs/mocha/sync_tests/conflicting.test.js index 2359df1e42e..ba0f01fe5a1 100644 --- a/packages/snjs/mocha/sync_tests/conflicting.test.js +++ b/packages/snjs/mocha/sync_tests/conflicting.test.js @@ -660,7 +660,7 @@ describe('online conflict handling', function () { await sharedFinalAssertions() }) - it('succesful server side saving but dropped packet response should not create sync conflict', async () => { + it('successful server side saving but dropped packet response should not create sync conflict', async () => { /** * 1. Initiate a change locally that is successfully saved by the server, but the client * drops the server response. diff --git a/packages/web/src/javascripts/Components/ChallengeModal/ChallengeModal.tsx b/packages/web/src/javascripts/Components/ChallengeModal/ChallengeModal.tsx index a2ab336e9ea..ab3f16d9bdf 100644 --- a/packages/web/src/javascripts/Components/ChallengeModal/ChallengeModal.tsx +++ b/packages/web/src/javascripts/Components/ChallengeModal/ChallengeModal.tsx @@ -92,7 +92,7 @@ const ChallengeModal: FunctionComponent = ({ application, mainApplication setIsProcessing(processingPrompts.length > 0) setProcessingPrompts(processingPrompts) /** - * Unfortunately neccessary to wait 50ms so that the above setState call completely + * Unfortunately necessary to wait 50ms so that the above setState call completely * updates the UI to change processing state, before we enter into UI blocking operation * (crypto key generation) */ diff --git a/packages/web/src/javascripts/Components/SessionsModal/SessionsModal.tsx b/packages/web/src/javascripts/Components/SessionsModal/SessionsModal.tsx index 5ac898a13cf..e0e94f1c7cd 100644 --- a/packages/web/src/javascripts/Components/SessionsModal/SessionsModal.tsx +++ b/packages/web/src/javascripts/Components/SessionsModal/SessionsModal.tsx @@ -37,7 +37,7 @@ function useSessions( if (response.data?.error?.message) { setErrorMessage(response.data?.error.message) } else { - setErrorMessage('An unknown error occured while loading sessions.') + setErrorMessage('An unknown error occurred while loading sessions.') } } else { const sessions = response.data as SessionListEntry[] @@ -71,7 +71,7 @@ function useSessions( setSessions(sessionsBeforeRevoke) } else if (isErrorResponse(response)) { setErrorMessage( - getErrorFromErrorResponse(response).message || 'An unknown error occured while revoking the session.', + getErrorFromErrorResponse(response).message || 'An unknown error occurred while revoking the session.', ) setSessions(sessionsBeforeRevoke)