chore: fixed typos in code comments (#1701)

This commit is contained in:
freddii 2021-01-28 06:09:37 +01:00 committed by GitHub
parent b93388b330
commit 229fcc18b7
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
7 changed files with 8 additions and 8 deletions

View file

@ -27,7 +27,7 @@ gem 'uglifier'
gem 'flag_shih_tzu'
# Random name generator for user names
gem 'haikunator'
# Template parsing safetly
# Template parsing safely
gem 'liquid'
# Parse Markdown to HTML
gem 'redcarpet'

View file

@ -12,7 +12,7 @@ class Api::V1::Widget::ContactsController < Api::V1::Widget::BaseController
def process_hmac
return if params[:identifier_hash].blank?
raise StandardError, 'HMAC failed: Invalid Identifer Hash Provided' unless valid_hmac?
raise StandardError, 'HMAC failed: Invalid Identifier Hash Provided' unless valid_hmac?
@contact_inbox.update(hmac_verified: true)
end

View file

@ -143,7 +143,7 @@ export default {
this.showAlert(this.$t('LOGIN.API.SUCCESS_MESSAGE'));
})
.catch(response => {
// Reset URL Params if the authenication is invalid
// Reset URL Params if the authentication is invalid
if (this.email) {
window.location = '/app/login';
}

View file

@ -24,7 +24,7 @@ class ApplicationMailer < ActionMailer::Base
def send_mail_with_liquid(*args)
mail(*args) do |format|
# explored sending a multipart email containg both text type and html
# explored sending a multipart email containing both text type and html
# parsing the html with nokogiri will remove the links as well
# might also remove tags like b,li etc. so lets rethink about this later
# format.text { Nokogiri::HTML(render(layout: false)).text }

View file

@ -1,4 +1,4 @@
# This concern is primarily targetted for business models dependant on external services
# This concern is primarily targeted for business models dependent on external services
# The auth tokens we obtained on their behalf could expire or becomes invalid.
# We would be aware of it until we make the API call to the service and it throws error
@ -25,7 +25,7 @@ module Reauthorizable
::Redis::Alfred.get(authorization_error_count_key).to_i
end
# action to be performed when we recieve authorization errors
# action to be performed when we receive authorization errors
# Implement in your exception handling logic for authorization errors
def authorization_error!
::Redis::Alfred.incr(authorization_error_count_key)

View file

@ -13,7 +13,7 @@ describe ::ContactIdentifyAction do
expect(ContactAvatarJob).not_to receive(:perform_later).with(contact, params[:avatar_url])
contact_identify
expect(contact.reload.name).to eq 'test'
# custom attributes are merged properly without overwritting existing ones
# custom attributes are merged properly without overwriting existing ones
expect(contact.custom_attributes).to eq({ 'test' => 'new test', 'test1' => 'test1', 'test2' => 'test2' })
expect(contact.reload.identifier).to eq 'test_id'
end

View file

@ -217,7 +217,7 @@ RSpec.describe 'Contacts API', type: :request do
expect(response).to have_http_status(:success)
expect(contact.reload.name).to eq('Test Blub')
# custom attributes are merged properly without overwritting existing ones
# custom attributes are merged properly without overwriting existing ones
expect(contact.custom_attributes).to eq({ 'test' => 'new test', 'test1' => 'test1', 'test2' => 'test2' })
end