Skip to content

Commit 8614201

Browse files
committed
Fix typos in code comments
1 parent f59ab50 commit 8614201

File tree

9 files changed

+15
-15
lines changed

9 files changed

+15
-15
lines changed

chromium/lru.js

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ function LRUCache (limit) {
3131
*/
3232
LRUCache.prototype.put = function(key, value) {
3333
var entry = {key:key, value:value};
34-
// Note: No protection agains replacing, and thus orphan entries. By design.
34+
// Note: No protection against replacing, and thus orphan entries. By design.
3535
this._keymap[key] = entry;
3636
if (this.tail) {
3737
// link previous tail to the new tail (entry)
@@ -123,7 +123,7 @@ LRUCache.prototype.get = function(key, returnEntry) {
123123

124124
/**
125125
* Check if <key> is in the cache without registering recent use. Feasible if
126-
* you do not want to chage the state of the cache, but only "peek" at it.
126+
* you do not want to change the state of the cache, but only "peek" at it.
127127
* Returns the entry associated with <key> if found, or undefined if not found.
128128
*/
129129
LRUCache.prototype.find = function(key) {
@@ -178,7 +178,7 @@ LRUCache.prototype.remove = function(key) {
178178

179179
/** Removes all entries */
180180
LRUCache.prototype.removeAll = function() {
181-
// This should be safe, as we never expose strong refrences to the outside
181+
// This should be safe, as we never expose strong references to the outside
182182
this.head = this.tail = undefined;
183183
this.size = 0;
184184
this._keymap = {};
@@ -200,7 +200,7 @@ if (typeof Object.keys === 'function') {
200200

201201
/**
202202
* Call `fun` for each entry. Starting with the newest entry if `desc` is a true
203-
* value, otherwise starts with the oldest (head) enrty and moves towards the
203+
* value, otherwise starts with the oldest (head) entry and moves towards the
204204
* tail.
205205
*
206206
* `fun` is called with 3 arguments in the context `context`:

chromium/rules.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -300,7 +300,7 @@ RuleSets.prototype = {
300300
},
301301

302302
/**
303-
* Check to see if the Cookie object c meets any of our cookierule citeria for being marked as secure.
303+
* Check to see if the Cookie object c meets any of our cookierule criteria for being marked as secure.
304304
* knownHttps is true if the context for this cookie being set is known to be https.
305305
* @param cookie The cookie to test
306306
* @param knownHttps Is the context for setting this cookie is https ?

src/chrome/content/code/ApplicableList.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ ApplicableList.prototype = {
2828

2929
empty: function() {
3030
// Empty everything, used when toggles occur in order to ensure that if
31-
// the reload fails, the resulting list is not eroneous
31+
// the reload fails, the resulting list is not erroneous
3232
this.active = {};
3333
this.breaking = {};
3434
this.inactive = {};

src/chrome/content/code/HTTPSRules.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -560,7 +560,7 @@ const HTTPSRules = {
560560
}
561561
} catch(e3) {
562562
this.log(INFO, "uri.host is explosive!");
563-
try { this.log(INFO, "(" + uri.spec + ")"); } // happens for about: uris and soforth
563+
try { this.log(INFO, "(" + uri.spec + ")"); } // happens for about: uris and so forth
564564
catch(e4) { this.log(WARN, "(and unprintable!!!!!!)"); }
565565
}
566566
return uri;
@@ -676,7 +676,7 @@ const HTTPSRules = {
676676
},
677677

678678
/**
679-
* Check to see if the Cookie object c meets any of our cookierule citeria
679+
* Check to see if the Cookie object c meets any of our cookierule criteria
680680
* for being marked as secure.
681681
*
682682
* @param applicable_list {ApplicableList} an ApplicableList for record keeping

src/chrome/content/code/IOUtil.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ const IO = {
1414
res = sis.read(sis.available());
1515
is.close();
1616

17-
if (charset !== null) { // use "null" if you want uncoverted data...
17+
if (charset !== null) { // use "null" if you want unconverted data...
1818
const unicodeConverter = Cc["@mozilla.org/intl/scriptableunicodeconverter"]
1919
.createInstance(Ci.nsIScriptableUnicodeConverter);
2020
try {

src/components/https-everywhere.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -601,7 +601,7 @@ HTTPSEverywhere.prototype = {
601601
},
602602

603603
maybeCleanupObservatoryPrefs: function(ssl_observatory) {
604-
// Recover from a past UI processing bug that would leave the Obsevatory
604+
// Recover from a past UI processing bug that would leave the Observatory
605605
// accidentally disabled for some users
606606
// https://trac.torproject.org/projects/tor/ticket/10728
607607
var clean = ssl_observatory.myGetBoolPref("clean_config");
@@ -852,7 +852,7 @@ function https_everywhereLog(level, str) {
852852
if (level >= threshold) {
853853
var levelName = ["", "VERB", "DBUG", "INFO", "NOTE", "WARN"][level];
854854
var prefix = "HTTPS Everywhere " + levelName + ": ";
855-
// dump() prints to browser stdout. That's sometimes undesireable,
855+
// dump() prints to browser stdout. That's sometimes undesirable,
856856
// so only do it when a pref is set (running from test.sh enables
857857
// this pref).
858858
if (prefs.getBoolPref("log_to_stdout")) {

src/components/ssl-observatory.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -841,7 +841,7 @@ SSLObservatory.prototype = {
841841
* custom_proxy_type == "direct" is indicative of the user having selected "submit certs even if
842842
* Tor is not available", rather than true custom Tor proxy settings. So in that case, there's
843843
* not much point probing to see if the direct proxy is actually a Tor connection, and
844-
* localhost:9050 is a better bet. People whose networks send all traffc through Tor can just
844+
* localhost:9050 is a better bet. People whose networks send all traffic through Tor can just
845845
* tell the Observatory to submit certs without Tor.
846846
*/
847847
} else if (this.myGetBoolPref("use_custom_proxy") && !(testingForTor && custom_proxy_type == "direct")) {
@@ -924,7 +924,7 @@ SSLObservatory.prototype = {
924924
if (level >= threshold) {
925925
var levelName = ["", "VERB", "DBUG", "INFO", "NOTE", "WARN"][level];
926926
var prefix = "SSL Observatory " + levelName + ": ";
927-
// dump() prints to browser stdout. That's sometimes undesireable,
927+
// dump() prints to browser stdout. That's sometimes undesirable,
928928
// so only do it when a pref is set (running from test.sh enables
929929
// this pref).
930930
if (this.prefs.getBoolPref("extensions.https_everywhere.log_to_stdout")) {

src/defaults/preferences/preferences.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ pref("extensions.https_everywhere.http_nowhere.orig.ocsp.required", false);
2323
// SSl Observatory preferences
2424
pref("extensions.https_everywhere._observatory.enabled",false);
2525

26-
// "testing" currently means send unecessary fingerprints and other test-suite
26+
// "testing" currently means send unnecessary fingerprints and other test-suite
2727
// type stuff
2828
pref("extensions.https_everywhere._observatory.testing",false);
2929

test/firefox/test_profile_skeleton/prefs.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ user_pref("extensions.https_everywhere.LogLevel", 0);
88
user_pref("extensions.https_everywhere.log_to_stdout", true);
99
// Make it quicker to make manual config changes.
1010
user_pref("general.warnOnAboutConfig", false);
11-
// Minimize unnecesary requests.
11+
// Minimize unnecessary requests.
1212
user_pref("browser.safebrowsing.enabled", false);
1313
user_pref("browser.safebrowsing.malware.enabled", false);
1414
// These two preferences allow debugging the extension

0 commit comments

Comments
 (0)