Skip to content

Commit 458a794

Browse files
authored
Merge branch 'main' into patch-1
2 parents 8e2c080 + d06f9ce commit 458a794

File tree

93 files changed

+168
-142
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

93 files changed

+168
-142
lines changed

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -297,7 +297,7 @@ misspell-check:
297297
GO111MODULE=off $(GO) get -u github.com/client9/misspell/cmd/misspell; \
298298
fi
299299
@echo "Running misspell-check..."
300-
@misspell -error -i unknwon,destory $(GO_SOURCES_OWN)
300+
@misspell -error -i unknwon $(GO_SOURCES_OWN)
301301

302302
.PHONY: misspell
303303
misspell:

cmd/dump.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ func runDump(ctx *cli.Context) error {
280280
}
281281

282282
if ctx.IsSet("skip-custom-dir") && ctx.Bool("skip-custom-dir") {
283-
log.Info("Skiping custom directory")
283+
log.Info("Skipping custom directory")
284284
} else {
285285
customDir, err := os.Stat(setting.CustomPath)
286286
if err == nil && customDir.IsDir() {

cmd/hook.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Gitea or set your environment appropriately.`, "")
165165
}
166166
}
167167

168-
// the environment setted on serv command
168+
// the environment is set by serv command
169169
isWiki := os.Getenv(models.EnvRepoIsWiki) == "true"
170170
username := os.Getenv(models.EnvRepoUsername)
171171
reponame := os.Getenv(models.EnvRepoName)
@@ -320,7 +320,7 @@ Gitea or set your environment appropriately.`, "")
320320
}
321321
}
322322

323-
// the environment setted on serv command
323+
// the environment is set by serv command
324324
repoUser := os.Getenv(models.EnvRepoUsername)
325325
isWiki := os.Getenv(models.EnvRepoIsWiki) == "true"
326326
repoName := os.Getenv(models.EnvRepoName)

cmd/migrate_storage.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ func runMigrateStorage(ctx *cli.Context) error {
184184
return fmt.Errorf("Unsupported storage: %s", ctx.String("type"))
185185
}
186186

187-
log.Warn("All files have been copied to the new placement but old files are still on the orignial placement.")
187+
log.Warn("All files have been copied to the new placement but old files are still on the original placement.")
188188

189189
return nil
190190
}

cmd/web_letsencrypt.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ import (
1919
func runLetsEncrypt(listenAddr, domain, directory, email string, m http.Handler) error {
2020

2121
// If HTTP Challenge enabled, needs to be serving on port 80. For TLSALPN needs 443.
22-
// Due to docker port mapping this can't be checked programatically
22+
// Due to docker port mapping this can't be checked programmatically
2323
// TODO: these are placeholders until we add options for each in settings with appropriate warning
2424
enableHTTPChallenge := true
2525
enableTLSALPNChallenge := true

custom/conf/app.example.ini

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -659,7 +659,7 @@ PATH =
659659
;; Public is for users visible for everyone
660660
;DEFAULT_USER_VISIBILITY = public
661661
;;
662-
;; Set whitch visibibilty modes a user can have
662+
;; Set which visibility modes a user can have
663663
;ALLOWED_USER_VISIBILITY_MODES = public,limited,private
664664
;;
665665
;; Either "public", "limited" or "private", default is "public"

docker/root/etc/s6/gitea/setup

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ if [ ! -f ${GITEA_CUSTOM}/conf/app.ini ]; then
2323
INSTALL_LOCK=true
2424
fi
2525

26-
# Substitude the environment variables in the template
26+
# Substitute the environment variables in the template
2727
APP_NAME=${APP_NAME:-"Gitea: Git with a cup of tea"} \
2828
RUN_MODE=${RUN_MODE:-"prod"} \
2929
DOMAIN=${DOMAIN:-"localhost"} \

docker/rootless/usr/local/bin/docker-setup.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ if [ ! -f ${GITEA_APP_INI} ]; then
2525
INSTALL_LOCK=true
2626
fi
2727

28-
# Substitude the environment variables in the template
28+
# Substitute the environment variables in the template
2929
APP_NAME=${APP_NAME:-"Gitea: Git with a cup of tea"} \
3030
RUN_MODE=${RUN_MODE:-"prod"} \
3131
RUN_USER=${USER:-"git"} \

docs/content/doc/advanced/config-cheat-sheet.en-us.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -128,8 +128,8 @@ Values containing `#` or `;` must be quoted using `` ` `` or `"""`.
128128
- Options other than `never` and `always` can be combined as a comma separated list.
129129
- `DEFAULT_TRUST_MODEL`: **collaborator**: \[collaborator, committer, collaboratorcommitter\]: The default trust model used for verifying commits.
130130
- `collaborator`: Trust signatures signed by keys of collaborators.
131-
- `committer`: Trust signatures that match committers (This matches GitHub and will force Gitea signed commits to have Gitea as the commmitter).
132-
- `collaboratorcommitter`: Trust signatures signed by keys of collaborators which match the commiter.
131+
- `committer`: Trust signatures that match committers (This matches GitHub and will force Gitea signed commits to have Gitea as the committer).
132+
- `collaboratorcommitter`: Trust signatures signed by keys of collaborators which match the committer.
133133
- `WIKI`: **never**: \[never, pubkey, twofa, always, parentsigned\]: Sign commits to wiki.
134134
- `CRUD_ACTIONS`: **pubkey, twofa, parentsigned**: \[never, pubkey, twofa, parentsigned, always\]: Sign CRUD actions.
135135
- Options as above, with the addition of:
@@ -345,9 +345,9 @@ The following configuration set `Content-Type: application/vnd.android.package-a
345345
- `PATH`: **data/gitea.db**: For SQLite3 only, the database file path.
346346
- `LOG_SQL`: **true**: Log the executed SQL.
347347
- `DB_RETRIES`: **10**: How many ORM init / DB connect attempts allowed.
348-
- `DB_RETRY_BACKOFF`: **3s**: time.Duration to wait before trying another ORM init / DB connect attempt, if failure occured.
348+
- `DB_RETRY_BACKOFF`: **3s**: time.Duration to wait before trying another ORM init / DB connect attempt, if failure occurred.
349349
- `MAX_OPEN_CONNS` **0**: Database maximum open connections - default is 0, meaning there is no limit.
350-
- `MAX_IDLE_CONNS` **2**: Max idle database connections on connnection pool, default is 2 - this will be capped to `MAX_OPEN_CONNS`.
350+
- `MAX_IDLE_CONNS` **2**: Max idle database connections on connection pool, default is 2 - this will be capped to `MAX_OPEN_CONNS`.
351351
- `CONN_MAX_LIFETIME` **0 or 3s**: Sets the maximum amount of time a DB connection may be reused - default is 0, meaning there is no limit (except on MySQL where it is 3s - see #6804 & #7071).
352352

353353
Please see #8540 & #8273 for further discussion of the appropriate values for `MAX_OPEN_CONNS`, `MAX_IDLE_CONNS` & `CONN_MAX_LIFETIME` and their
@@ -385,7 +385,7 @@ relation to port exhaustion.
385385
- `LENGTH`: **20**: Maximal queue size before channel queues block
386386
- `BATCH_LENGTH`: **20**: Batch data before passing to the handler
387387
- `CONN_STR`: **redis://127.0.0.1:6379/0**: Connection string for the redis queue type. Options can be set using query params. Similarly LevelDB options can also be set using: **leveldb://relative/path?option=value** or **leveldb:///absolute/path?option=value**, and will override `DATADIR`
388-
- `QUEUE_NAME`: **_queue**: The suffix for default redis and disk queue name. Individual queues will default to **`name`**`QUEUE_NAME` but can be overriden in the specific `queue.name` section.
388+
- `QUEUE_NAME`: **_queue**: The suffix for default redis and disk queue name. Individual queues will default to **`name`**`QUEUE_NAME` but can be overridden in the specific `queue.name` section.
389389
- `SET_NAME`: **_unique**: The suffix that will be added to the default redis and disk queue `set` name for unique queues. Individual queues will default to
390390
**`name`**`QUEUE_NAME`_`SET_NAME`_ but can be overridden in the specific `queue.name` section.
391391
- `WRAP_IF_NECESSARY`: **true**: Will wrap queues with a timeoutable queue if the selected queue is not ready to be created - (Only relevant for the level queue.)
@@ -516,7 +516,7 @@ relation to port exhaustion.
516516
- `AUTO_WATCH_NEW_REPOS`: **true**: Enable this to let all organisation users watch new repos when they are created
517517
- `AUTO_WATCH_ON_CHANGES`: **false**: Enable this to make users watch a repository after their first commit to it
518518
- `DEFAULT_USER_VISIBILITY`: **public**: Set default visibility mode for users, either "public", "limited" or "private".
519-
- `ALLOWED_USER_VISIBILITY_MODES`: **public,limited,private**: Set whitch visibibilty modes a user can have
519+
- `ALLOWED_USER_VISIBILITY_MODES`: **public,limited,private**: Set which visibility modes a user can have
520520
- `DEFAULT_ORG_VISIBILITY`: **public**: Set default visibility mode for organisations, either "public", "limited" or "private".
521521
- `DEFAULT_ORG_MEMBER_VISIBLE`: **false** True will make the membership of the users visible when added to the organisation.
522522
- `ALLOW_ONLY_INTERNAL_REGISTRATION`: **false** Set to true to force registration only via gitea.
@@ -895,7 +895,7 @@ IS_INPUT_FILE = false
895895
- ENABLED: **false** Enable markup support; set to **true** to enable this renderer.
896896
- NEED\_POSTPROCESS: **true** set to **true** to replace links / sha1 and etc.
897897
- FILE\_EXTENSIONS: **\<empty\>** List of file extensions that should be rendered by an external
898-
command. Multiple extentions needs a comma as splitter.
898+
command. Multiple extensions needs a comma as splitter.
899899
- RENDER\_COMMAND: External command to render all matching extensions.
900900
- IS\_INPUT\_FILE: **false** Input is not a standard input but a file param followed `RENDER_COMMAND`.
901901

@@ -927,7 +927,7 @@ If the rule is defined above the renderer ini section or the name does not match
927927

928928
## Time (`time`)
929929

930-
- `FORMAT`: Time format to diplay on UI. i.e. RFC1123 or 2006-01-02 15:04:05
930+
- `FORMAT`: Time format to display on UI. i.e. RFC1123 or 2006-01-02 15:04:05
931931
- `DEFAULT_UI_LOCATION`: Default location of time on the UI, so that we can display correct user's time on UI. i.e. Shanghai/Asia
932932

933933
## Task (`task`)

docs/content/doc/advanced/logging-documentation.en-us.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -282,7 +282,7 @@ ROUTER = console
282282
COLORIZE = false ; this can be true if you can strip out the ansi coloring
283283
```
284284

285-
Sometimes it will be helpful get some specific `TRACE` level logging retricted
285+
Sometimes it will be helpful get some specific `TRACE` level logging restricted
286286
to messages that match a specific `EXPRESSION`. Adjusting the `MODE` in the
287287
`[log]` section to `MODE = console,traceconsole` to add a new logger output
288288
`traceconsole` and then adding its corresponding section would be helpful:

docs/content/doc/advanced/protected-tags.en-us.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To protect a tag, you need to follow these steps:
2727

2828
1. Go to the repository’s **Settings** > **Tags** page.
2929
1. Type a pattern to match a name. You can use a single name, a [glob pattern](https://pkg.go.dev/github.com/gobwas/glob#Compile) or a regular expression.
30-
1. Choose the allowed users and/or teams. If you leave these fields empty noone is allowed to create or modify this tag.
30+
1. Choose the allowed users and/or teams. If you leave these fields empty no one is allowed to create or modify this tag.
3131
1. Select **Save** to save the configuration.
3232

3333
## Pattern protected tags

docs/content/doc/features/authentication.en-us.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ Before activating SSPI single sign-on authentication (SSO) you have to prepare y
259259

260260
- Create a service principal name for the host where `gitea.exe` is running with class `HTTP`:
261261

262-
- Start `Command Prompt` or `PowerShell` as a priviledged domain user (eg. Domain Administrator)
262+
- Start `Command Prompt` or `PowerShell` as a privileged domain user (eg. Domain Administrator)
263263
- Run the command below, replacing `host.domain.local` with the fully qualified domain name (FQDN) of the server where the web application will be running, and `domain\user` with the name of the account created in the previous step:
264264

265265
```sh
@@ -283,7 +283,7 @@ Before activating SSPI single sign-on authentication (SSO) you have to prepare y
283283
- Click the `Sign In` button on the dashboard and choose SSPI to be automatically logged in with the same user that is currently logged on to the computer
284284

285285
- If it does not work, make sure that:
286-
- You are not running the web browser on the same server where gitea is running. You should be running the web browser on a domain joined computer (client) that is different from the server. If both the client and server are runnning on the same computer NTLM will be prefered over Kerberos.
286+
- You are not running the web browser on the same server where gitea is running. You should be running the web browser on a domain joined computer (client) that is different from the server. If both the client and server are running on the same computer NTLM will be preferred over Kerberos.
287287
- There is only one `HTTP/...` SPN for the host
288288
- The SPN contains only the hostname, without the port
289289
- You have added the URL of the web app to the `Local intranet zone`

docs/content/doc/help/faq.en-us.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ The current way to achieve this is to create/modify a user with a max repo creat
142142

143143
Restricted users are limited to a subset of the content based on their organization/team memberships and collaborations, ignoring the public flag on organizations/repos etc.\_\_
144144

145-
Example use case: A company runs a Gitea instance that requires login. Most repos are public (accessible/browseable by all co-workers).
145+
Example use case: A company runs a Gitea instance that requires login. Most repos are public (accessible/browsable by all co-workers).
146146

147147
At some point, a customer or third party needs access to a specific repo and only that repo. Making such a customer account restricted and granting any needed access using team membership(s) and/or collaboration(s) is a simple way to achieve that without the need to make everything private.
148148

docs/content/page/index.en-us.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ Windows, on architectures like amd64, i386, ARM, PowerPC, and others.
117117
- Configuration viewer
118118
- Everything in config file
119119
- System notices
120-
- When somthing unexpected happens
120+
- When something unexpected happens
121121
- Monitoring
122122
- Current processes
123123
- Cron jobs
@@ -155,7 +155,7 @@ Windows, on architectures like amd64, i386, ARM, PowerPC, and others.
155155
- Libravatar
156156
- Custom
157157
- Password
158-
- Mutiple email addresses
158+
- Multiple email addresses
159159
- SSH Keys
160160
- Connected applications
161161
- Two factor authentication

integrations/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ make test-sqlite
2828
Setup a mysql database inside docker
2929
```
3030
docker run -e "MYSQL_DATABASE=test" -e "MYSQL_ALLOW_EMPTY_PASSWORD=yes" -p 3306:3306 --rm --name mysql mysql:latest #(just ctrl-c to stop db and clean the container)
31-
docker run -p 9200:9200 -p 9300:9300 -e "discovery.type=single-node" --rm --name elasticsearch elasticsearch:7.6.0 #(in a secound terminal, just ctrl-c to stop db and clean the container)
31+
docker run -p 9200:9200 -p 9300:9300 -e "discovery.type=single-node" --rm --name elasticsearch elasticsearch:7.6.0 #(in a second terminal, just ctrl-c to stop db and clean the container)
3232
```
3333
Start tests based on the database container
3434
```

integrations/api_repo_lfs_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ func TestAPILFSBatch(t *testing.T) {
135135
assert.Equal(t, "Oid or size are invalid", br.Objects[1].Error.Message)
136136
})
137137

138-
t.Run("PointerSizeMissmatch", func(t *testing.T) {
138+
t.Run("PointerSizeMismatch", func(t *testing.T) {
139139
defer PrintCurrentTest(t)()
140140

141141
req := newRequest(t, &lfs.BatchRequest{
@@ -376,15 +376,15 @@ func TestAPILFSUpload(t *testing.T) {
376376
session.MakeRequest(t, req, http.StatusOK)
377377
})
378378

379-
t.Run("HashMissmatch", func(t *testing.T) {
379+
t.Run("HashMismatch", func(t *testing.T) {
380380
defer PrintCurrentTest(t)()
381381

382382
req := newRequest(t, lfs.Pointer{Oid: "2581dd7bbc1fe44726de4b7dd806a087a978b9c5aec0a60481259e34be09b06a", Size: 1}, "a")
383383

384384
session.MakeRequest(t, req, http.StatusUnprocessableEntity)
385385
})
386386

387-
t.Run("SizeMissmatch", func(t *testing.T) {
387+
t.Run("SizeMismatch", func(t *testing.T) {
388388
defer PrintCurrentTest(t)()
389389

390390
req := newRequest(t, lfs.Pointer{Oid: "ca978112ca1bbdcafac231b39a23dc4da786eff8147c4e72b9807785afee48bb", Size: 2}, "a")

integrations/release_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ func TestCreateReleasePaging(t *testing.T) {
116116
setting.API.DefaultPagingNum = 10
117117

118118
session := loginUser(t, "user2")
119-
// Create enaugh releases to have paging
119+
// Create enough releases to have paging
120120
for i := 0; i < 12; i++ {
121121
version := fmt.Sprintf("v0.0.%d", i)
122122
createNewRelease(t, session, "/user2/repo1", version, version, false, false)

integrations/repo_branch_test.go

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ import (
1111
"strings"
1212
"testing"
1313

14+
"code.gitea.io/gitea/modules/setting"
1415
"code.gitea.io/gitea/modules/test"
1516

1617
"github.com/stretchr/testify/assert"
@@ -134,5 +135,13 @@ func TestCreateBranchInvalidCSRF(t *testing.T) {
134135
"_csrf": "fake_csrf",
135136
"new_branch_name": "test",
136137
})
137-
session.MakeRequest(t, req, http.StatusBadRequest)
138+
resp := session.MakeRequest(t, req, http.StatusFound)
139+
loc := resp.Header().Get("Location")
140+
assert.Equal(t, setting.AppSubURL+"/", loc)
141+
resp = session.MakeRequest(t, NewRequest(t, "GET", loc), http.StatusOK)
142+
htmlDoc := NewHTMLParser(t, resp.Body)
143+
assert.Equal(t,
144+
"Bad Request: Invalid CSRF token",
145+
strings.TrimSpace(htmlDoc.doc.Find(".ui.message").Text()),
146+
)
138147
}

models/branches.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ func (protectBranch *ProtectedBranch) GetProtectedFilePatterns() []glob.Glob {
219219
expr = strings.TrimSpace(expr)
220220
if expr != "" {
221221
if g, err := glob.Compile(expr, '.', '/'); err != nil {
222-
log.Info("Invalid glob expresion '%s' (skipped): %v", expr, err)
222+
log.Info("Invalid glob expression '%s' (skipped): %v", expr, err)
223223
} else {
224224
extarr = append(extarr, g)
225225
}

models/context.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ func WithContext(f func(ctx DBContext) error) error {
4242
return f(DBContext{x})
4343
}
4444

45-
// WithTx represents executing database operations on a trasaction
45+
// WithTx represents executing database operations on a transaction
4646
func WithTx(f func(ctx DBContext) error) error {
4747
sess := x.NewSession()
4848
if err := sess.Begin(); err != nil {

models/error.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1114,7 +1114,7 @@ func IsErrUserDoesNotHaveAccessToRepo(err error) bool {
11141114
}
11151115

11161116
func (err ErrUserDoesNotHaveAccessToRepo) Error() string {
1117-
return fmt.Sprintf("user doesn't have acces to repo [user_id: %d, repo_name: %s]", err.UserID, err.RepoName)
1117+
return fmt.Sprintf("user doesn't have access to repo [user_id: %d, repo_name: %s]", err.UserID, err.RepoName)
11181118
}
11191119

11201120
// ErrWontSign explains the first reason why a commit would not be signed
@@ -1289,7 +1289,7 @@ func IsErrSHAOrCommitIDNotProvided(err error) bool {
12891289
}
12901290

12911291
func (err ErrSHAOrCommitIDNotProvided) Error() string {
1292-
return "a SHA or commmit ID must be proved when updating a file"
1292+
return "a SHA or commit ID must be proved when updating a file"
12931293
}
12941294

12951295
// __ __ ___. .__ __

models/gpg_key.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -622,7 +622,7 @@ func ParseCommitWithSignature(c *git.Commit) *CommitVerification {
622622
var err error
623623
// Find Committer account
624624
committer, err = GetUserByEmail(c.Committer.Email) // This finds the user by primary email or activated email so commit will not be valid if email is not
625-
if err != nil { // Skipping not user for commiter
625+
if err != nil { // Skipping not user for committer
626626
committer = &User{
627627
Name: c.Committer.Name,
628628
Email: c.Committer.Email,
@@ -698,7 +698,7 @@ func ParseCommitWithSignature(c *git.Commit) *CommitVerification {
698698
}
699699

700700
for _, k := range keys {
701-
// Pre-check (& optimization) that emails attached to key can be attached to the commiter email and can validate
701+
// Pre-check (& optimization) that emails attached to key can be attached to the committer email and can validate
702702
canValidate := false
703703
email := ""
704704
for _, e := range k.Emails {

models/issue_comment.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ type Comment struct {
184184
RefRepoID int64 `xorm:"index"` // Repo where the referencing
185185
RefIssueID int64 `xorm:"index"`
186186
RefCommentID int64 `xorm:"index"` // 0 if origin is Issue title or content (or PR's)
187-
RefAction references.XRefAction `xorm:"SMALLINT"` // What hapens if RefIssueID resolves
187+
RefAction references.XRefAction `xorm:"SMALLINT"` // What happens if RefIssueID resolves
188188
RefIsPull bool
189189

190190
RefRepo *Repository `xorm:"-"`
@@ -1228,7 +1228,7 @@ func UpdateCommentsMigrationsByType(tp structs.GitServiceType, originalAuthorID
12281228
return err
12291229
}
12301230

1231-
// CreatePushPullComment create push code to pull base commend
1231+
// CreatePushPullComment create push code to pull base comment
12321232
func CreatePushPullComment(pusher *User, pr *PullRequest, oldCommitID, newCommitID string) (comment *Comment, err error) {
12331233
if pr.HasMerged || oldCommitID == "" || newCommitID == "" {
12341234
return nil, nil
@@ -1262,7 +1262,7 @@ func CreatePushPullComment(pusher *User, pr *PullRequest, oldCommitID, newCommit
12621262
return
12631263
}
12641264

1265-
// getCommitsFromRepo get commit IDs from repo in betwern oldCommitID and newCommitID
1265+
// getCommitsFromRepo get commit IDs from repo in between oldCommitID and newCommitID
12661266
// isForcePush will be true if oldCommit isn't on the branch
12671267
// Commit on baseBranch will skip
12681268
func getCommitIDsFromRepo(repo *Repository, oldCommitID, newCommitID, baseBranch string) (commitIDs []string, isForcePush bool, err error) {

0 commit comments

Comments
 (0)