Bug 1599180 - Fix some trivial "browing" typos. r=ehsan draft
authorAndrew McCreight <continuation@gmail.com>
Mon, 25 Nov 2019 10:19:37 -0800
changeset 2496068 7f996d69bb08843ba8e51d72ae694148376d839a
parent 2496067 a958af7762aba767148a8b25478ebc7e936dfe05
child 2496069 505817db5977035f35932db5913bf4c8f08d597e
push id455279
push useramccreight@mozilla.com
push dateMon, 25 Nov 2019 19:56:04 +0000
treeherdertry@59b13b57567a [default view] [failures only]
reviewersehsan
bugs1599180
milestone72.0a1
Bug 1599180 - Fix some trivial "browing" typos. r=ehsan Differential Revision: https://phabricator.services.mozilla.com/D54570
browser/components/sessionstore/test/browser_354894_perwindowpb.js
dom/serviceworkers/ServiceWorkerScriptCache.cpp
netwerk/test/unit/test_cookiejars_safebrowsing.js
testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-closed.html
testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-multiple.html
testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-noopener.html
testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-noreferrer.html
testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-setter.html
testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener.html
toolkit/components/url-classifier/HashStore.cpp
--- a/browser/components/sessionstore/test/browser_354894_perwindowpb.js
+++ b/browser/components/sessionstore/test/browser_354894_perwindowpb.js
@@ -276,17 +276,17 @@ add_task(async function test_open_close_
   await setupTest({}, async function(newWin, obs) {
     let closed = await closeWindowForRestoration(newWin);
     ok(closed, "Should be able to close the window");
 
     newWin = await promiseNewWindowLoaded({ private: true });
     is(
       newWin.gBrowser.browsers.length,
       1,
-      "Did not restore in private browing mode"
+      "Did not restore in private browsing mode"
     );
 
     closed = await closeWindowForRestoration(newWin);
     ok(closed, "Should be able to close the window");
 
     newWin = await promiseNewWindowLoaded();
     is(
       newWin.gBrowser.browsers.length,
--- a/dom/serviceworkers/ServiceWorkerScriptCache.cpp
+++ b/dom/serviceworkers/ServiceWorkerScriptCache.cpp
@@ -65,17 +65,17 @@ already_AddRefed<CacheStorage> CreateCac
     aRv.Throw(NS_ERROR_FAILURE);
     return nullptr;
   }
 
   // We assume private browsing is not enabled here.  The ScriptLoader
   // explicitly fails for private browsing so there should never be
   // a service worker running in private browsing mode.  Therefore if
   // we are purging scripts or running a comparison algorithm we cannot
-  // be in private browing.
+  // be in private browsing.
   //
   // Also, bypass the CacheStorage trusted origin checks.  The ServiceWorker
   // has validated the origin prior to this point.  All the information
   // to revalidate is not available now.
   return CacheStorage::CreateOnMainThread(cache::CHROME_ONLY_NAMESPACE,
                                           sandboxGlobalObject, aPrincipal,
                                           true /* force trusted origin */, aRv);
 }
--- a/netwerk/test/unit/test_cookiejars_safebrowsing.js
+++ b/netwerk/test/unit/test_cookiejars_safebrowsing.js
@@ -2,17 +2,17 @@
  * License, v. 2.0. If a copy of the MPL was not distributed with this
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 /*
  * Description of the test:
  *   We show that we can separate the safebrowsing cookie by creating a custom
  *   OriginAttributes using a unique safebrowsing first-party domain. Setting this
  *   custom OriginAttributes on the loadInfo of the channel allows us to query the
- *   first-party domain and therefore separate the safebrowing cookie in its own
+ *   first-party domain and therefore separate the safebrowsing cookie in its own
  *   cookie-jar. For testing safebrowsing update we do >> NOT << emulate a response
  *   in the body, rather we only set the cookies in the header of the response
  *   and confirm that cookies are separated in their own cookie-jar.
  *
  * 1) We init safebrowsing and simulate an update (cookies are set for localhost)
  *
  * 2) We open a channel that should send regular cookies, but not the
  *    safebrowsing cookie.
--- a/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-closed.html
+++ b/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-closed.html
@@ -1,13 +1,13 @@
 <!doctype html>
 <meta charset="utf-8">
 <html>
   <head>
-    <title>Auxiliary Browing Contexts: window.opener when Opener Removed/Closed</title>
+    <title>Auxiliary Browsing Contexts: window.opener when Opener Removed/Closed</title>
     <script src="/resources/testharness.js"></script>
     <script src="/resources/testharnessreport.js"></script>
     <script src="/common/PrefixedLocalStorage.js"></script>
   </head>
   <body>
     <div id="log"></div>
     <script>
     var prefixedLocalStorage;
--- a/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-multiple.html
+++ b/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-multiple.html
@@ -1,12 +1,12 @@
 <!doctype html>
 <html>
   <head>
-    <title>Auxiliary Browing Contexts: window.opener, multiple</title>
+    <title>Auxiliary Browsing Contexts: window.opener, multiple</title>
     <script src="/resources/testharness.js"></script>
     <script src="/resources/testharnessreport.js"></script>
     <script src="/common/PrefixedLocalStorage.js"></script>
   </head>
   <body>
     <div id="log"></div>
     <script>
     var prefixedLocalStorage;
--- a/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-noopener.html
+++ b/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-noopener.html
@@ -1,12 +1,12 @@
 <!doctype html>
 <html>
   <head>
-    <title>Auxiliary Browing Contexts: window.opener noopener</title>
+    <title>Auxiliary Browsing Contexts: window.opener noopener</title>
     <script src="/resources/testharness.js"></script>
     <script src="/resources/testharnessreport.js"></script>
     <script src="/common/PrefixedLocalStorage.js"></script>
   </head>
   <body>
     <div id="log"></div>
     <script>
     var prefixedLocalStorage;
--- a/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-noreferrer.html
+++ b/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-noreferrer.html
@@ -1,12 +1,12 @@
 <!doctype html>
 <html>
   <head>
-    <title>Auxiliary Browing Contexts: window.opener noreferrer</title>
+    <title>Auxiliary Browsing Contexts: window.opener noreferrer</title>
     <script src="/resources/testharness.js"></script>
     <script src="/resources/testharnessreport.js"></script>
     <script src="/common/PrefixedLocalStorage.js"></script>
   </head>
   <body>
     <div id="log"></div>
     <script>
     var prefixedLocalStorage;
--- a/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-setter.html
+++ b/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener-setter.html
@@ -1,12 +1,12 @@
 <!doctype html>
 <html>
   <head>
-    <title>Auxiliary Browing Contexts: window.opener setter</title>
+    <title>Auxiliary Browsing Contexts: window.opener setter</title>
     <meta name=timeout content=long>
     <script src="/resources/testharness.js"></script>
     <script src="/resources/testharnessreport.js"></script>
     <script src="/common/PrefixedLocalStorage.js"></script>
   </head>
   <body>
     <div id="log"></div>
     <script>
--- a/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener.html
+++ b/testing/web-platform/tests/html/browsers/windows/auxiliary-browsing-contexts/opener.html
@@ -1,12 +1,12 @@
 <!doctype html>
 <html>
   <head>
-    <title>Auxiliary Browing Contexts: window.opener</title>
+    <title>Auxiliary Browsing Contexts: window.opener</title>
     <script src="/resources/testharness.js"></script>
     <script src="/resources/testharnessreport.js"></script>
     <script src="/common/PrefixedLocalStorage.js"></script>
   </head>
   <body>
     <div id="log"></div>
     <script>
     var prefixedLocalStorage;
--- a/toolkit/components/url-classifier/HashStore.cpp
+++ b/toolkit/components/url-classifier/HashStore.cpp
@@ -277,29 +277,29 @@ nsresult HashStore::CheckChecksum(uint32
   uint32_t read;
 
   nsresult rv = CalculateChecksum(hash, aFileSize, true);
   NS_ENSURE_SUCCESS(rv, rv);
 
   compareHash.SetLength(hash.Length());
 
   if (hash.Length() > aFileSize) {
-    NS_WARNING("SafeBrowing file not long enough to store its hash");
+    NS_WARNING("SafeBrowsing file not long enough to store its hash");
     return NS_ERROR_FAILURE;
   }
   nsCOMPtr<nsISeekableStream> seekIn = do_QueryInterface(mInputStream);
   rv = seekIn->Seek(nsISeekableStream::NS_SEEK_SET, aFileSize - hash.Length());
   NS_ENSURE_SUCCESS(rv, rv);
 
   rv = mInputStream->Read(compareHash.BeginWriting(), hash.Length(), &read);
   NS_ENSURE_SUCCESS(rv, rv);
   NS_ASSERTION(read == hash.Length(), "Could not read hash bytes");
 
   if (!hash.Equals(compareHash)) {
-    NS_WARNING("Safebrowing file failed checksum.");
+    NS_WARNING("SafeBrowsing file failed checksum.");
     return NS_ERROR_FAILURE;
   }
 
   return NS_OK;
 }
 
 nsresult HashStore::Open(uint32_t aVersion) {
   nsCOMPtr<nsIFile> storeFile;