Fix typos (#599)

* Fix typos

* Fix typos in excluded files
This commit is contained in:
Viktor Szépe 2024-07-08 15:28:32 +02:00 committed by GitHub
parent 4164598ac2
commit 82f7311a4d
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
20 changed files with 30 additions and 30 deletions

View file

@ -119,7 +119,7 @@ All documentation is available at [stalw.art/docs/get-started](https://stalw.art
## Support
If you are having problems running Stalwart Mail Server, you found a bug or just have a question,
do not hesitate to reach us on [Github Discussions](https://github.com/stalwartlabs/mail-server/discussions),
do not hesitate to reach us on [GitHub Discussions](https://github.com/stalwartlabs/mail-server/discussions),
[Reddit](https://www.reddit.com/r/stalwartlabs), [Discord](https://discord.gg/aVQr3jF8jd) or [Matrix](https://matrix.to/#/#stalwart:matrix.org).
Additionally you may purchase a subscription to obtain priority support from Stalwart Labs Ltd.

View file

@ -18,7 +18,7 @@ use utils::{config::Config, map::vec_map::VecMap};
use super::settings::JmapConfig;
impl JmapConfig {
pub fn add_capabilites(&mut self, config: &mut Config) {
pub fn add_capabilities(&mut self, config: &mut Config) {
// Add core capabilities
self.capabilities.session.append(
Capability::Core,

View file

@ -436,7 +436,7 @@ impl JmapConfig {
};
// Add capabilities
jmap.add_capabilites(config);
jmap.add_capabilities(config);
jmap
}
}

View file

@ -113,7 +113,7 @@ pub struct Rcpt {
// Limits
pub max_recipients: IfBlock,
// Catch-all and sub-adressing
// Catch-all and sub-addressing
pub catch_all: AddressMapping,
pub subaddressing: AddressMapping,
}

View file

@ -96,7 +96,7 @@ impl Capability {
}
pub fn all_capabilities(is_authenticated: bool, is_tls: bool) -> Vec<Capability> {
let mut capabilties = vec![
let mut capabilities = vec![
Capability::IMAP4rev2,
Capability::IMAP4rev1,
Capability::Enable,
@ -107,7 +107,7 @@ impl Capability {
];
if is_authenticated {
capabilties.extend([
capabilities.extend([
Capability::Idle,
Capability::Namespace,
Capability::Children,
@ -135,16 +135,16 @@ impl Capability {
Capability::Preview,
]);
} else {
capabilties.extend([
capabilities.extend([
Capability::Auth(Mechanism::OAuthBearer),
Capability::Auth(Mechanism::Plain),
]);
}
if !is_tls {
capabilties.push(Capability::StartTLS);
capabilities.push(Capability::StartTLS);
}
capabilties
capabilities
}
}

View file

@ -767,7 +767,7 @@ impl DeliveryAttempt {
}
// Say EHLO
let capabilties = match say_helo(&mut smtp_client, &params).await {
let capabilities = match say_helo(&mut smtp_client, &params).await {
Ok(capabilities) => capabilities,
Err(status) => {
tracing::info!(
@ -794,7 +794,7 @@ impl DeliveryAttempt {
smtp_client,
tls_connector,
envelope.mx,
&capabilties,
&capabilities,
)
.await
{

View file

@ -38,7 +38,7 @@ impl Status<(), Error> {
mail_send::Error::Io(_)
| mail_send::Error::Tls(_)
| mail_send::Error::Base64(_)
| mail_send::Error::UnparseableReply
| mail_send::Error::UnparsableReply
| mail_send::Error::AuthenticationFailed(_)
| mail_send::Error::MissingCredentials
| mail_send::Error::MissingMailFrom

View file

@ -258,7 +258,7 @@ impl Message {
}
} else {
// Handle LMTP responses
match read_lmtp_data_respone(
match read_lmtp_data_response(
&mut smtp_client,
params.hostname,
accepted_rcpts.len(),
@ -481,7 +481,7 @@ pub async fn read_smtp_data_response<T: AsyncRead + AsyncWrite + Unpin>(
})
}
pub async fn read_lmtp_data_respone<T: AsyncRead + AsyncWrite + Unpin>(
pub async fn read_lmtp_data_response<T: AsyncRead + AsyncWrite + Unpin>(
smtp_client: &mut SmtpClient<T>,
hostname: &str,
num_responses: usize,

View file

@ -240,7 +240,7 @@ impl<T: SessionStream> Session<T> {
}
}
// Send agregate reports
// Send aggregate reports
let interval = self
.core
.core

View file

@ -196,7 +196,7 @@ impl SMTP {
pub async fn schedule_report(&self, report: impl Into<Event>) {
if self.inner.report_tx.send(report.into()).await.is_err() {
tracing::warn!(contex = "report", "Channel send failed.");
tracing::warn!(context = "report", "Channel send failed.");
}
}

View file

@ -611,7 +611,7 @@ if eval "!is_empty(rto_raw)" {
}
} else {
let "t.REPLYTO_UNPARSEABLE" "1";
let "t.REPLYTO_UNPARSABLE" "1";
}
if eval "is_ascii(header.reply-to) && contains(rto_raw, '=?') && contains(rto_raw, '?=')" {
@ -2793,7 +2793,7 @@ spam-scores = {"ABUSE_SURBL" = "5.0",
"REPLYTO_EQ_TO_ADDR" = "5.0",
"REPLYTO_EXCESS_BASE64" = "1.5",
"REPLYTO_EXCESS_QP" = "1.2",
"REPLYTO_UNPARSEABLE" = "1.0",
"REPLYTO_UNPARSABLE" = "1.0",
"RWL_MAILSPIKE_EXCELLENT" = "-0.4",
"RWL_MAILSPIKE_GOOD" = "-0.1",
"RWL_MAILSPIKE_NEUTRAL" = "0.0",

View file

@ -270,7 +270,7 @@ spam-scores = {"ABUSE_SURBL" = "5.0",
"REPLYTO_EQ_TO_ADDR" = "5.0",
"REPLYTO_EXCESS_BASE64" = "1.5",
"REPLYTO_EXCESS_QP" = "1.2",
"REPLYTO_UNPARSEABLE" = "1.0",
"REPLYTO_UNPARSABLE" = "1.0",
"RWL_MAILSPIKE_EXCELLENT" = "-0.4",
"RWL_MAILSPIKE_GOOD" = "-0.1",
"RWL_MAILSPIKE_NEUTRAL" = "0.0",

View file

@ -59,7 +59,7 @@ if eval "!is_empty(rto_raw)" {
}
} else {
let "t.REPLYTO_UNPARSEABLE" "1";
let "t.REPLYTO_UNPARSABLE" "1";
}
if eval "is_ascii(header.reply-to) && contains(rto_raw, '=?') && contains(rto_raw, '?=')" {

View file

@ -15,7 +15,7 @@ if specialuse_exists "dingleberry" {
}
if specialuse_exists "archive" {
error "A non-existant special-use exists.";
error "A non-existent special-use exists.";
}
# MailboxId tests

View file

@ -1,4 +1,4 @@
expect REPLYTO_UNPARSEABLE
expect REPLYTO_UNPARSABLE
Reply-to: hello

View file

@ -180,7 +180,7 @@ pub async fn test(params: &mut JMAPTest) {
.await
.unwrap();
// John shoud have ReadItems access to Inbox
// John should have ReadItems access to Inbox
assert_eq!(
john_client
.set_default_account_id(&jane_id.to_string())

View file

@ -498,7 +498,7 @@ impl SmtpConnection {
pub trait AssertResult: Sized {
fn assert_contains(self, text: &str) -> Self;
fn assert_count(self, text: &str, occurences: usize) -> Self;
fn assert_count(self, text: &str, occurrences: usize) -> Self;
fn assert_equals(self, text: &str) -> Self;
}
@ -512,12 +512,12 @@ impl AssertResult for Vec<String> {
panic!("Expected response to contain {:?}, got {:?}", text, self);
}
fn assert_count(self, text: &str, occurences: usize) -> Self {
fn assert_count(self, text: &str, occurrences: usize) -> Self {
assert_eq!(
self.iter().filter(|l| l.contains(text)).count(),
occurences,
occurrences,
"Expected {} occurrences of {:?}, found {}.",
occurences,
occurrences,
text,
self.iter().filter(|l| l.contains(text)).count()
);

View file

@ -290,7 +290,7 @@ async fn dmarc() {
.await;
qr.assert_no_events();
// Messagess passing DMARC should be accepted
// Messages passing DMARC should be accepted
session
.send_message(
"bill@example.com",

View file

@ -303,7 +303,7 @@ async fn mail() {
assert_eq!(session.data.future_release, 10);
session.rset().await;
// Test FUTURERELEASE extension with invalud HOLDUNTIL value
// Test FUTURERELEASE extension with invalid HOLDUNTIL value
session
.ingest(format!("MAIL FROM:<jane@foobar.org> HOLDUNTIL={}\r\n", now + 99999).as_bytes())
.await

View file

@ -220,7 +220,7 @@ async fn lookup_sql() {
// External domain
session.rcpt_to("user@otherdomain.org", "550 5.1.2").await;
// Non-existant user
// Non-existent user
session.rcpt_to("jack@foobar.org", "550 5.1.2").await;
// Valid users