Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions packages/desktop/app/index.ts
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ function migrateSnapStorage() {
})
} catch (error) {
console.error(
`Migration: error occured while moving ${fullFilePath} to ${dest}:`,
`Migration: error occurred while moving ${fullFilePath} to ${dest}:`,
// eslint-disable-next-line @typescript-eslint/no-explicit-any
(error as any)?.message ?? error,
)
Expand Down Expand Up @@ -121,7 +121,7 @@ function migrateSnapStorage() {
fs.copySync(store.data.backupsLocation, newLocation)
} catch (error) {
console.error(
`Migration: error occured while moving ${store.data.backupsLocation} to ${documentsDir}:`,
`Migration: error occurred while moving ${store.data.backupsLocation} to ${documentsDir}:`,
// eslint-disable-next-line @typescript-eslint/no-explicit-any
(error as any)?.message ?? error,
)
Expand Down
2 changes: 1 addition & 1 deletion packages/sncrypto-common/src/Common/PureCryptoInterface.ts
Original file line number Diff line number Diff line change
Expand Up @@ -193,7 +193,7 @@ export interface PureCryptoInterface {
/**
* Generates a random secret for TOTP authentication
*
* RFC4226 reccomends a length of at least 160 bits = 32 b32 chars
* RFC4226 recommends a length of at least 160 bits = 32 b32 chars
* https://datatracker.ietf.org/doc/html/rfc4226#section-4
*/
generateOtpSecret(): Promise<string>
Expand Down
2 changes: 1 addition & 1 deletion packages/sncrypto-web/src/crypto.ts
Original file line number Diff line number Diff line change
Expand Up @@ -441,7 +441,7 @@ export class SNWebCrypto implements PureCryptoInterface {
/**
* Generates a random secret for TOTP authentication
*
* RFC4226 reccomends a length of at least 160 bits = 32 b32 chars
* RFC4226 recommends a length of at least 160 bits = 32 b32 chars
* https://datatracker.ietf.org/doc/html/rfc4226#section-4
*/
public async generateOtpSecret(): Promise<string> {
Expand Down
4 changes: 2 additions & 2 deletions packages/snjs/mocha/protection.test.js
Original file line number Diff line number Diff line change
Expand Up @@ -522,7 +522,7 @@ describe('protections', function () {
})

describe('unprotect notes', function () {
it('prompts for password and unprotects all notes if challenge is succesful', async function () {
it('prompts for password and unprotects all notes if challenge is successful', async function () {
let challengePrompts = 0
application = await Factory.createApplicationWithFakeCrypto(Factory.randomString())
const passcode = 'passcode'
Expand Down Expand Up @@ -559,7 +559,7 @@ describe('protections', function () {
expect(challengePrompts).to.equal(1)
})

it('prompts for passcode and unprotects all notes if challenge is succesful', async function () {
it('prompts for passcode and unprotects all notes if challenge is successful', async function () {
let challengePrompts = 0
application = await Factory.createApplicationWithFakeCrypto(Factory.randomString())
const passcode = 'passcode'
Expand Down
2 changes: 1 addition & 1 deletion packages/snjs/mocha/sync_tests/conflicting.test.js
Original file line number Diff line number Diff line change
Expand Up @@ -660,7 +660,7 @@ describe('online conflict handling', function () {
await sharedFinalAssertions()
})

it('succesful server side saving but dropped packet response should not create sync conflict', async () => {
it('successful server side saving but dropped packet response should not create sync conflict', async () => {
/**
* 1. Initiate a change locally that is successfully saved by the server, but the client
* drops the server response.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ const ChallengeModal: FunctionComponent<Props> = ({ application, mainApplication
setIsProcessing(processingPrompts.length > 0)
setProcessingPrompts(processingPrompts)
/**
* Unfortunately neccessary to wait 50ms so that the above setState call completely
* Unfortunately necessary to wait 50ms so that the above setState call completely
* updates the UI to change processing state, before we enter into UI blocking operation
* (crypto key generation)
*/
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ function useSessions(
if (response.data?.error?.message) {
setErrorMessage(response.data?.error.message)
} else {
setErrorMessage('An unknown error occured while loading sessions.')
setErrorMessage('An unknown error occurred while loading sessions.')
}
} else {
const sessions = response.data as SessionListEntry[]
Expand Down Expand Up @@ -71,7 +71,7 @@ function useSessions(
setSessions(sessionsBeforeRevoke)
} else if (isErrorResponse(response)) {
setErrorMessage(
getErrorFromErrorResponse(response).message || 'An unknown error occured while revoking the session.',
getErrorFromErrorResponse(response).message || 'An unknown error occurred while revoking the session.',
)

setSessions(sessionsBeforeRevoke)
Expand Down
Loading