Skip to content

Commit 7d3b40e

Browse files
committed
Fix some typos
1 parent 91ec389 commit 7d3b40e

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

src/acl-check.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ function modesAllowed (kb, doc, directory, aclDoc, agent, origin, trustedOrigins
8585
}
8686
if (kb.each(auth, ACL('agentGroup'), null, aclDoc).some(
8787
group => kb.holds(group, VCARD('hasMember'), agent, group.doc()))) {
88-
log(' Agent is member of group which has accees.')
88+
log(' Agent is member of group which has access.')
8989
return true
9090
}
9191
log(' Agent or group access fails for this authentication.')

test/unit/access-denied-test.js

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -88,13 +88,13 @@ test('acl-check accessDenied() test - default/inherited', function (t) {
8888
$rdf.parse(containerAclText, store, containerAcl.uri, 'text/turtle')
8989

9090
result = !aclLogic.accessDenied(store, file1, container, containerAcl, alice, [ ACL('Read')])
91-
t.ok(result, 'Alice should have Read acces inherited')
91+
t.ok(result, 'Alice should have Read access inherited')
9292

9393
result = !aclLogic.accessDenied(store, file2, container, containerAcl, alice, [ ACL('Read')])
94-
t.ok(result, 'Alice should have Read acces inherited 2')
94+
t.ok(result, 'Alice should have Read access inherited 2')
9595

9696
result = aclLogic.accessDenied(store, file2, container, containerAcl, alice, [ ACL('Write')])
97-
t.ok(result, 'Alice should NOT have Write acces inherited')
97+
t.ok(result, 'Alice should NOT have Write access inherited')
9898

9999
t.end()
100100
})
@@ -147,7 +147,7 @@ test('acl-check accessDenied() test - default/inherited', function (t) {
147147
t.ok(result, 'Bob should have read access too even with wrong origin - Public')
148148

149149
result = aclLogic.accessDenied(store, file2, container, containerAcl, alice, [ ACL('Write')])
150-
t.ok(result, 'Alice should NOT have write acces inherited - Public')
150+
t.ok(result, 'Alice should NOT have write access inherited - Public')
151151

152152
t.end()
153153
})
@@ -168,13 +168,13 @@ test('acl-check accessDenied() test - accessTo', function (t) {
168168
$rdf.parse(ACLtext, store, containerAclUrl, 'text/turtle')
169169

170170
var result = aclLogic.accessDenied(store, container, null, containerAcl, null, [ ACL('Read')])
171-
t.ok(result, 'Anonymous should NOT have Read acces to public thing - AuthenticatedAgent')
171+
t.ok(result, 'Anonymous should NOT have Read access to public thing - AuthenticatedAgent')
172172

173173
result = aclLogic.accessDenied(store, container, null, containerAcl, null, [ ACL('Write')])
174-
t.ok(result, 'Anonymous should NOT have Write acces - AuthenticatedAgent')
174+
t.ok(result, 'Anonymous should NOT have Write access - AuthenticatedAgent')
175175

176176
result = !aclLogic.accessDenied(store, container, null, containerAcl, bob, [ ACL('Write')])
177-
t.ok(result, 'Bob should have Write acces to public write - AuthenticatedAgent')
177+
t.ok(result, 'Bob should have Write access to public write - AuthenticatedAgent')
178178

179179
t.end()
180180
})
@@ -202,7 +202,7 @@ test('acl-check accessDenied() test - default/inherited', function (t) {
202202
$rdf.parse(containerAclText, store, containerAcl.uri, 'text/turtle')
203203

204204
result = aclLogic.accessDenied(store, file2, container, containerAcl, alice, [ ACL('Write')])
205-
t.ok(result, 'Alice should NOT have write acces inherited - AuthenticatedAgent')
205+
t.ok(result, 'Alice should NOT have write access inherited - AuthenticatedAgent')
206206

207207
t.end()
208208
})

0 commit comments

Comments
 (0)