Fix typos in apps/ subdirectory

Found via `codespell -q 3 -S l10n,./apps/files_external/3rdparty -L adn,ba,boxs,keypair,jus,optionel,ressource,tabel ./apps/`

Signed-off-by: luz paz <luzpaz@github.com>
Signed-off-by: nextcloud-command <nextcloud-command@users.noreply.github.com>
pull/33895/head
luz paz 2 years ago committed by nextcloud-command
parent f496e471e0
commit 9d26671f05

@ -1,2 +1,2 @@
# cloud_federation_api
The cloud federation API allows to share information like files, contacts, calendars, incoming calls, etc accross Nextcloud instances
The cloud federation API allows to share information like files, contacts, calendars, incoming calls, etc across Nextcloud instances

@ -31,7 +31,7 @@
*
* @param {OCA.Activity.ActivityModel} model for this activity
* @param {jQuery} $el jQuery handle for this activity
* @param {string} view The view that displayes this activity
* @param {string} view The view that displays this activity
*/
prepareModelForDisplay(model, $el, view) {
if (model.get('app') !== 'comments' || model.get('type') !== 'comments') {

@ -50,7 +50,7 @@ export default async function({ commentsType, ressourceId }, options = {}) {
<oc:offset>${options.offset || 0}</oc:offset>
</oc:filter-comments>`,
}, options))
// See example on how it's done normaly
// See example on how it's done normally
// https://github.com/perry-mitchell/webdav-client/blob/9de2da4a2599e06bd86c2778145b7ade39fe0b3c/source/interface/stat.js#L19
// Waiting for proper REPORT integration https://github.com/perry-mitchell/webdav-client/issues/207
.then(res => {

@ -60,7 +60,7 @@ class SystemPrincipalBackend extends AbstractBackend {
}
/**
* Returns a specific principal, specified by it's path.
* Returns a specific principal, specified by its path.
* The returned structure should be the exact same as from
* getPrincipalsByPrefix.
*

@ -50,7 +50,7 @@ class CalendarShareUpdateListener implements IEventListener {
return;
}
$this->logger->debug("Creating activity for Calendar having it's shares updated");
$this->logger->debug("Creating activity for Calendar having its shares updated");
$this->activityBackend->onCalendarUpdateShares(
$event->getCalendarData(),

@ -55,7 +55,7 @@ class CalDavBackendTest extends AbstractCalDavBackend {
public function testCalendarOperations() {
$calendarId = $this->createTestCalendar();
// update it's display name
// update its display name
$patch = new PropPatch([
'{DAV:}displayname' => 'Unit test',
'{urn:ietf:params:xml:ns:caldav}calendar-description' => 'Calendar used for unit testing'

@ -193,7 +193,7 @@ class CardDavBackendTest extends TestCase {
$this->assertEquals('Example', $books[0]['{DAV:}displayname']);
$this->assertEquals('User\'s displayname', $books[0]['{http://nextcloud.com/ns}owner-displayname']);
// update it's display name
// update its display name
$patch = new PropPatch([
'{DAV:}displayname' => 'Unit test',
'{urn:ietf:params:xml:ns:carddav}addressbook-description' => 'Addressbook used for unit testing'

@ -623,7 +623,7 @@ class KeyManager {
}
/**
* creat a backup of the users private and public key and then delete it
* create a backup of the users private and public key and then delete it
*
* @param string $uid
*/

@ -969,7 +969,7 @@ class FederatedShareProvider implements IShareProvider {
* @param int $shareType
*/
public function userDeleted($uid, $shareType) {
//TODO: probabaly a good idea to send unshare info to remote servers
//TODO: probably a good idea to send unshare info to remote servers
$qb = $this->dbConnection->getQueryBuilder();

@ -69,7 +69,7 @@
var url = $(this).val();
// toggle add-button visiblity based on input length
// toggle add-button visibility based on input length
if ( url.length > 0 )
$btnSubmit.removeClass("hidden")
else

@ -155,7 +155,7 @@ class RequestSharedSecret extends Job {
$endPoints = $this->ocsDiscoveryService->discover($target, 'FEDERATED_SHARING');
$endPoint = isset($endPoints['shared-secret']) ? $endPoints['shared-secret'] : $this->defaultEndPoint;
// make sure that we have a well formated url
// make sure that we have a well formatted url
$url = rtrim($target, '/') . '/' . trim($endPoint, '/');
try {

@ -1062,7 +1062,7 @@ table.dragshadow td.size {
overflow: hidden;
// we but the thumbnail in background to ensure
// the name is the default click handler
// force back the cursor which have been overrided
// force back the cursor which has been overridden
// and disabled for some reason...
cursor: pointer !important;

@ -320,7 +320,7 @@
// depending on whether the menu was previously being shown or not.
this.$el.find('.crumbmenu').addClass('hidden');
// Show the crumbs to compress the siblings before hidding again the
// Show the crumbs to compress the siblings before hiding again the
// crumbs. This is needed when the siblings expand to fill all the
// available width, as in that case their old width would limit the
// available width for the crumbs.

@ -12,7 +12,7 @@
* The file upload code uses several hooks to interact with blueimps jQuery file upload library:
* 1. the core upload handling hooks are added when initializing the plugin,
* 2. if the browser supports progress events they are added in a separate set after the initialization
* 3. every app can add it's own triggers for fileupload
* 3. every app can add its own triggers for fileupload
* - files adds d'n'd handlers and also reacts to done events to add new rows to the filelist
* - TODO pictures upload button
* - TODO music upload button

@ -2591,7 +2591,7 @@
* @param fileNames array of file names to move
* @param targetPath absolute target path
* @param callback function to call when movement is finished
* @param dir the dir path where fileNames are located (optionnal, will take current folder if undefined)
* @param dir the dir path where fileNames are located (optional, will take current folder if undefined)
*/
move: function(fileNames, targetPath, callback, dir) {
var self = this;
@ -2683,7 +2683,7 @@
* @param fileNames array of file names to copy
* @param targetPath absolute target path
* @param callback to call when copy is finished with success
* @param dir the dir path where fileNames are located (optionnal, will take current folder if undefined)
* @param dir the dir path where fileNames are located (optional, will take current folder if undefined)
*/
copy: function(fileNames, targetPath, callback, dir) {
var self = this;
@ -2712,7 +2712,7 @@
if ( dotIndex > 1) {
var leftPartOfName = targetPathAndName.substr(0, dotIndex);
var fileNumber = leftPartOfName.match(/\d+/);
// TRANSLATORS name that is appended to copied files with the same name, will be put in parenthesis and appened with a number if it is the second+ copy
// TRANSLATORS name that is appended to copied files with the same name, will be put in parenthesis and appended with a number if it is the second+ copy
var copyNameLocalized = t('files', 'copy');
if (isNaN(fileNumber) ) {
fileNumber++;

@ -420,7 +420,7 @@
_initProgressListener: function (options) {
var that = this,
xhr = options.xhr ? options.xhr() : $.ajaxSettings.xhr();
// Accesss to the native XHR object is required to add event listeners
// Access to the native XHR object is required to add event listeners
// for the upload progress event:
if (xhr.upload) {
$(xhr.upload).bind('progress', function (e) {
@ -1060,7 +1060,7 @@
data.fileInputClone = inputClone;
$('<form></form>').append(inputClone)[0].reset();
// Detaching allows to insert the fileInput on another form
// without loosing the file input value:
// without losing the file input value:
input.after(inputClone).detach();
// If the fileInput had focus before it was detached,
// restore focus to the inputClone.
@ -1138,7 +1138,7 @@
dirReader = entry.createReader();
readEntries();
} else {
// Return an empy list for file system items
// Return an empty list for file system items
// other than files or directories:
dfd.resolve([]);
}

@ -68,7 +68,7 @@ class RepairTree extends Command {
->where($query->expr()->eq('fileid', $query->createParameter('fileid')));
foreach ($rows as $row) {
$output->writeln("Path of file {$row['fileid']} is {$row['path']} but should be {$row['parent_path']}/{$row['name']} based on it's parent", OutputInterface::VERBOSITY_VERBOSE);
$output->writeln("Path of file {$row['fileid']} is {$row['path']} but should be {$row['parent_path']}/{$row['name']} based on its parent", OutputInterface::VERBOSITY_VERBOSE);
if ($fix) {
$fileId = $this->getFileId((int)$row['parent_storage'], $row['parent_path'] . '/' . $row['name']);

@ -247,7 +247,7 @@ class ApiController extends Controller {
}
/**
* Returns a list of recently modifed files.
* Returns a list of recently modified files.
*
* @NoAdminRequired
*

@ -278,7 +278,7 @@ class Notifier implements INotifier, IDismissableNotifier {
throw new \InvalidArgumentException('Unhandled app');
}
// TODO: This should all be moved to a service that also the transferownershipContoller uses.
// TODO: This should all be moved to a service that also the transferownershipController uses.
try {
$transferOwnership = $this->mapper->getById((int)$notification->getObjectId());
} catch (DoesNotExistException $e) {

@ -456,7 +456,7 @@ export default {
/**
* Allow to set the Sidebar as fullscreen from OCA.Files.Sidebar
*
* @param {boolean} isFullScreen - Wether or not to render the Sidebar in fullscreen.
* @param {boolean} isFullScreen - Whether or not to render the Sidebar in fullscreen.
*/
setFullScreenMode(isFullScreen) {
this.isFullScreen = isFullScreen

@ -266,7 +266,7 @@ describe('OCA.Files.FileList tests', function() {
type: OCA.Files.FileActions.TYPE_INLINE,
permissions: OC.PERMISSION_ALL,
icon: function() {
// Specify icon for hitory button
// Specify icon for history button
return OC.imagePath('core','actions/history');
},
actionHandler: actionStub
@ -2474,7 +2474,7 @@ describe('OCA.Files.FileList tests', function() {
type: OCA.Files.FileActions.TYPE_INLINE,
permissions: OC.PERMISSION_ALL,
icon: function() {
// Specify icon for hitory button
// Specify icon for history button
return OC.imagePath('core','actions/history');
},
actionHandler: actionStub
@ -2539,7 +2539,7 @@ describe('OCA.Files.FileList tests', function() {
type: OCA.Files.FileActions.TYPE_INLINE,
permissions: OC.PERMISSION_ALL,
icon: function() {
// Specify icon for hitory button
// Specify icon for history button
return OC.imagePath('core','actions/history');
},
actionHandler: actionStub

@ -145,7 +145,7 @@ class GlobalStoragesController extends StoragesController {
* @param int $id storage id
* @param string $mountPoint storage mount point
* @param string $backend backend identifier
* @param string $authMechanism authentication mechansim identifier
* @param string $authMechanism authentication mechanism identifier
* @param array $backendOptions backend-specific options
* @param array $mountOptions mount-specific options
* @param array $applicableUsers users for which to mount the storage

@ -37,7 +37,7 @@ use OCA\Files_External\Lib\VisibilityTrait;
* such as \OCP\IDB for database operations. This allows an authentication
* mechanism to perform advanced operations based on provided information.
*
* An authenication scheme defines the parameter interface, common to the
* An authentication scheme defines the parameter interface, common to the
* storage implementation, the backend and the authentication mechanism.
* A storage implementation expects parameters according to the authentication
* scheme, which are provided from the authentication mechanism.

@ -38,7 +38,7 @@ use OCA\Files_External\Lib\VisibilityTrait;
* such as \OCP\IDB for database operations. This allows a backend
* to perform advanced operations based on provided information.
*
* An authenication scheme defines the parameter interface, common to the
* An authentication scheme defines the parameter interface, common to the
* storage implementation, the backend and the authentication mechanism.
* A storage implementation expects parameters according to the authentication
* scheme, which are provided from the authentication mechanism.

@ -261,7 +261,7 @@ class StorageConfig implements \JsonSerializable {
}
/**
* Sets the mount priotity
* Sets the mount priority
*
* @param int $priority priority
*/

@ -345,7 +345,7 @@ abstract class StoragesService {
* Triggers the given hook signal for all the applicables given
*
* @param string $signal signal
* @param string $mountPoint hook mount pount param
* @param string $mountPoint hook mount point param
* @param string $mountType hook mount type param
* @param array $applicableArray array of applicable users/groups for which to trigger the hook
*/

@ -135,7 +135,7 @@ class SmbTest extends \Test\Files\Storage\Storage {
$result = null;
// since the notify handler buffers untill we start listening we will get the above changes
// since the notify handler buffers until we start listening we will get the above changes
$notifyHandler->listen(function (IChange $change) use (&$result) {
$result = $change;
return false;//stop listening

@ -97,7 +97,7 @@
Drop.addFileToUpload(e, data);
$('#drop-upload-status').text(t('files_sharing', 'Waiting…'));
//we return true to keep trying to upload next file even
//if addFileToUpload did not like the privious one
//if addFileToUpload did not like the previous one
return true;
},
done: function(e, data) {

@ -77,7 +77,7 @@ class Cache extends CacheJail {
// the sourceRootInfo path is the absolute path of the folder in the "real" storage
// in the case where a folder is shared from a Jail we need to ensure that the share Jail
// has it's root set relative to the source Jail
// has its root set relative to the source Jail
$currentStorage = $this->storage->getSourceStorage();
if ($currentStorage->instanceOfStorage(Jail::class)) {
/** @var Jail $currentStorage */

@ -382,7 +382,7 @@ class ShareAPIController extends OCSController {
return new DataResponse([$share]);
}
} catch (NotFoundException $e) {
// Fall trough
// Fall through
}
throw new OCSNotFoundException($this->l->t('Wrong share ID, share does not exist'));
@ -1219,7 +1219,7 @@ class ShareAPIController extends OCSController {
if ($label !== null) {
if (strlen($label) > 255) {
throw new OCSBadRequestException("Maxmimum label length is 255");
throw new OCSBadRequestException("Maximum label length is 255");
}
$share->setLabel($label);
}

@ -324,7 +324,7 @@ class ShareController extends AuthPublicShareController {
* @return bool
*/
private function validateShare(\OCP\Share\IShare $share) {
// If the owner is disabled no access to the linke is granted
// If the owner is disabled no access to the link is granted
$owner = $this->userManager->get($share->getShareOwner());
if ($owner === null || !$owner->isEnabled()) {
return false;

@ -436,7 +436,7 @@ class SharedStorage extends \OC\Files\Storage\Wrapper\Jail implements ISharedSto
public function getWatcher($path = '', $storage = null): Watcher {
$mountManager = \OC::$server->getMountManager();
// Get node informations
// Get node information
$node = $this->getShare()->getNodeCacheEntry();
if ($node) {
$mount = $mountManager->findByNumericId($node->getStorageId());

@ -824,7 +824,7 @@ export default {
},
/**
* Menu have been closed or password has been submited.
* Menu have been closed or password has been submitted.
* The only property that does not get
* synced automatically is the password
* So let's check if we have an unsaved

@ -249,7 +249,7 @@ export default {
const allSuggestions = exactSuggestions.concat(suggestions).concat(externalResults).concat(lookupEntry)
// Count occurances of display names in order to provide a distinguishable description if needed
// Count occurrences of display names in order to provide a distinguishable description if needed
const nameCounts = allSuggestions.reduce((nameCounts, result) => {
if (!result.displayName) {
return nameCounts
@ -383,7 +383,7 @@ export default {
shareTypeToIcon(type) {
switch (type) {
case this.SHARE_TYPES.SHARE_TYPE_GUEST:
// default is a user, other icons are here to differenciate
// default is a user, other icons are here to differentiate
// themselves from it, so let's not display the user icon
// case this.SHARE_TYPES.SHARE_TYPE_REMOTE:
// case this.SHARE_TYPES.SHARE_TYPE_USER:

@ -392,7 +392,7 @@ export default class Share {
/**
* Password expiration time
*
* @param {string} password exipration time
* @param {string} password expiration time
* @memberof Share
*/
set passwordExpirationTime(passwordExpirationTime) {

@ -75,7 +75,7 @@
:name="fileInfo.name" />
</template>
<!-- additionnal entries, use it with cautious -->
<!-- additional entries, use it with cautious -->
<div v-for="(section, index) in sections"
:ref="'section-' + index"
:key="index"

@ -54,7 +54,7 @@ use OCP\UserStatus\IManager as IUserStatusManager;
* Class ApiTest
*
* @group DB
* TODO: convert to real intergration tests
* TODO: convert to real integration tests
*/
class ApiTest extends TestCase {
public const TEST_FOLDER_NAME = '/folder_share_api_test';

@ -247,7 +247,7 @@ class SharedMountTest extends TestCase {
if ($exception) {
$this->assertSame(10, $e->getCode());
} else {
$this->assertTrue(false, 'Exception catched, but expected: ' . $expectedResult);
$this->assertTrue(false, 'Exception caught, but expected: ' . $expectedResult);
}
}
}

@ -932,7 +932,7 @@ class Trashbin {
* recursive copy to copy a whole directory
*
* @param string $source source path, relative to the users files directory
* @param string $destination destination path relative to the users root directoy
* @param string $destination destination path relative to the users root directory
* @param View $view file view for the users root directory
* @return int
* @throws Exceptions\CopyRecursiveException

@ -133,7 +133,7 @@ class OauthApiController extends Controller {
$decryptedToken = $this->crypto->decrypt($accessToken->getEncryptedToken(), $code);
// Obtain the appToken assoicated
// Obtain the appToken associated
try {
$appToken = $this->tokenProvider->getTokenById($accessToken->getTokenId());
} catch (ExpiredTokenException $e) {

@ -477,7 +477,7 @@ class UsersController extends AUserData {
throw new OCSException($e->getHint(), 107);
} catch (OCSException $e) {
$this->logger->warning(
'Failed addUser attempt with ocs exeption.',
'Failed addUser attempt with ocs exception.',
[
'app' => 'ocs_api',
'exception' => $e,
@ -486,7 +486,7 @@ class UsersController extends AUserData {
throw $e;
} catch (InvalidArgumentException $e) {
$this->logger->error(
'Failed addUser attempt with invalid argument exeption.',
'Failed addUser attempt with invalid argument exception.',
[
'app' => 'ocs_api',
'exception' => $e,

@ -445,7 +445,7 @@ export default {
/**
* Set user password
*
* @param {string} password The email adress
* @param {string} password The email address
*/
updatePassword() {
const password = this.$refs.password.value
@ -463,7 +463,7 @@ export default {
/**
* Set user mailAddress
*
* @param {string} mailAddress The email adress
* @param {string} mailAddress The email address
*/
updateEmail() {
const mailAddress = this.$refs.mailAddress.value

@ -39,7 +39,7 @@ const state = {
const mutations = {
APPS_API_FAILURE(state, error) {
showError(t('settings', 'An error occured during the request. Unable to proceed.') + '<br>' + error.error.response.data.data.message, { isHTML: true })
showError(t('settings', 'An error occurred during the request. Unable to proceed.') + '<br>' + error.error.response.data.data.message, { isHTML: true })
console.error(state, error)
},

@ -197,7 +197,7 @@ const mutations = {
break
default:
logger.error(`Unknown action type in updateUserCounts: '${actionType}'`)
// not throwing error to interupt execution as this is not fatal
// not throwing error to interrupt execution as this is not fatal
}
},
setUserData(state, { userid, key, value }) {

@ -47,7 +47,7 @@ try {
if ($configurationOk) {
//Configuration is okay
/*
* Clossing the session since it won't be used from this point on. There might be a potential
* Closing the session since it won't be used from this point on. There might be a potential
* race condition if a second request is made: either this request or the other might not
* contact the LDAP backup server the first time when it should, but there shouldn't be any
* problem with that other than the extra connection.

@ -40,7 +40,7 @@ OCA = OCA || {};
},
/**
* applies click events to the forward and backword buttons
* applies click events to the forward and backward buttons
*/
initControls: function() {
var view = this;

@ -1751,7 +1751,7 @@ class Access extends LDAPUtility {
/**
* converts a binary ObjectGUID into a string representation
*
* @param string $oguid the ObjectGUID in it's binary form as retrieved from AD
* @param string $oguid the ObjectGUID in its binary form as retrieved from AD
* @link https://www.php.net/manual/en/function.ldap-get-values-len.php#73198
*/
private function convertObjectGUID2Str(string $oguid): string {
@ -1777,8 +1777,8 @@ class Access extends LDAPUtility {
/**
* the first three blocks of the string-converted GUID happen to be in
* reverse order. In order to use it in a filter, this needs to be
* corrected. Furthermore the dashes need to be replaced and \\ preprended
* to every two hax figures.
* corrected. Furthermore the dashes need to be replaced and \\ prepended
* to every two hex figures.
*
* If an invalid string is passed, it will be returned without change.
*/
@ -2003,7 +2003,7 @@ class Access extends LDAPUtility {
$this->logger->debug('Ready for a paged search', ['app' => 'user_ldap']);
}
/* ++ Fixing RHDS searches with pages with zero results ++
* We coudn't get paged searches working with our RHDS for login ($limit = 0),
* We couldn't get paged searches working with our RHDS for login ($limit = 0),
* due to pages with zero results.
* So we added "&& !empty($this->lastCookie)" to this test to ignore pagination
* if we don't have a previous paged search.

@ -245,7 +245,7 @@ class Group_LDAP extends BackendUtility implements GroupInterface, IGroupLDAP, I
private function _groupMembers(string $dnGroup, ?array &$seen = null): array {
if ($seen === null) {
$seen = [];
// the root entry has to be marked as processed to avoind infinit loops,
// the root entry has to be marked as processed to avoid infinite loops,
// but not included in the results laters on
$excludeFromResult = $dnGroup;
}

@ -80,7 +80,7 @@ interface IAdapter {
public function getResponseCallArgs(array $originalArgs): array;
/**
* the adapter should do it's LDAP function call and return success state
* the adapter should do its LDAP function call and return success state
*
* @param resource|\LDAP\Connection $link LDAP resource
* @return bool

@ -209,7 +209,7 @@ class Manager {
}
/**
* @brief returns a User object by it's Nextcloud username
* @brief returns a User object by its Nextcloud username
* @param string $id the DN or username of the user
* @return \OCA\User_LDAP\User\User|\OCA\User_LDAP\User\OfflineUser|null
*/
@ -226,7 +226,7 @@ class Manager {
}
/**
* @brief returns a User object by it's DN or Nextcloud username
* @brief returns a User object by its DN or Nextcloud username
* @param string $id the DN or username of the user
* @return \OCA\User_LDAP\User\User|\OCA\User_LDAP\User\OfflineUser|null
* @throws \Exception when connection could not be established

@ -682,7 +682,7 @@ class Wizard extends LDAPUtility {
'Wiz: trying port '. $p . ', TLS '. $t,
['app' => 'user_ldap']
);
//connectAndBind may throw Exception, it needs to be catched by the
//connectAndBind may throw Exception, it needs to be caught by the
//callee of this method
try {
@ -1077,7 +1077,7 @@ class Wizard extends LDAPUtility {
}
$this->logger->debug(
'Wiz: Attemping to Bind',
'Wiz: Attempting to Bind',
['app' => 'user_ldap']
);
//interesting part: do the bind!

@ -154,7 +154,7 @@ class Group_LDAPTest extends TestCase {
->method('readAttribute')
->willReturnCallback(function ($name) {
//the search operation will call readAttribute, thus we need
//to anaylze the "dn". All other times we just need to return
//to analyze the "dn". All other times we just need to return
//something that is neither null or false, but once an array
//with the users in the group so we do so all other times for
//simplicicity.
@ -724,7 +724,7 @@ class Group_LDAPTest extends TestCase {
}
/**
* tests that a user listing is complete, if all it's members have the group
* tests that a user listing is complete, if all its members have the group
* as their primary.
*/
public function testUsersInGroupPrimaryMembersOnly() {
@ -770,7 +770,7 @@ class Group_LDAPTest extends TestCase {
}
/**
* tests that a user listing is complete, if all it's members have the group
* tests that a user listing is complete, if all its members have the group
* as their primary.
*/
public function testUsersInGroupPrimaryAndUnixMembers() {
@ -814,7 +814,7 @@ class Group_LDAPTest extends TestCase {
}
/**
* tests that a user counting is complete, if all it's members have the group
* tests that a user counting is complete, if all its members have the group
* as their primary.
*/
public function testCountUsersInGroupPrimaryMembersOnly() {

@ -82,7 +82,7 @@ abstract class AbstractMappingTest extends \Test\TestCase {
}
/**
* initalizes environment for a test run and returns an array with
* initializes environment for a test run and returns an array with
* test objects. Preparing environment means that all mappings are cleared
* first and then filled with test entries.
* @return array 0 = \OCA\User_LDAP\Mapping\AbstractMapping, 1 = array of

@ -493,7 +493,7 @@ class UserTest extends \Test\TestCase {
$this->user->updateQuota();
}
//the testUpdateAvatar series also implicitely tests getAvatarImage
//the testUpdateAvatar series also implicitly tests getAvatarImage
public function XtestUpdateAvatarJpegPhotoProvided() {
$this->access->expects($this->once())
->method('readAttribute')

@ -43,7 +43,7 @@ class PredefinedStatusService {
private const VACATIONING = 'vacationing';
private const REMOTE_WORK = 'remote-work';
/**
* @depreacted See \OCP\UserStatus\IUserStatus::MESSAGE_CALL
* @deprecated See \OCP\UserStatus\IUserStatus::MESSAGE_CALL
*/
public const CALL = 'call';

@ -42,7 +42,7 @@ import ShippedChecks from './components/Checks'
*/
/**
* A plugin for extending the admin page repesentation of a operator
* A plugin for extending the admin page representation of an operator
*
* @typedef {object} OperatorPlugin
* @property {string} id - The PHP class name of the check

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long
Loading…
Cancel
Save