Verified Commit bac451f1 authored by Dave Long's avatar Dave Long
Browse files

Issue #3420661 by quietone, smustgrave: Fix property related words

parent 8fb7b4a1
Loading
Loading
Loading
Loading
Loading
+2 −0
Original line number Diff line number Diff line
@@ -2,6 +2,8 @@

namespace Drupal\Core\Password;

// cspell:ignore abcdefghijkmnopqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ23456789'

/**
 * Provides a default password generator.
 */
+2 −0
Original line number Diff line number Diff line
@@ -2,6 +2,8 @@

namespace Drupal\Core\Password;

// cspell:ignore ITOA64

/**
 * Legacy password hashing framework.
 *
+0 −7
Original line number Diff line number Diff line
abcdefghijkmnopqrstuvwxyz
abcdefghjklmnpqrstuvwxyz
absolutezero
accesslog
adamson
@@ -103,8 +101,6 @@ buttonset
buttontext
buytaert
bytea
cachebackend
cachebackends
cachetag
cachetags
cafr
@@ -322,7 +318,6 @@ hateoas
hexcode
hilited
hinode
hippopotamidae
hmac
hoglet
hookname
@@ -354,7 +349,6 @@ invalididentifier
invokable
isam
isinstallable
itoa
itok
ized
javascripts
@@ -543,7 +537,6 @@ phpcbf
phpcodesniffer
phpcs
phpdocumentor
phpfile
phpserialize
phpspec
pickable
+1 −1
Original line number Diff line number Diff line
@@ -16,7 +16,7 @@
use Drupal\user\Entity\Role;
use Drupal\user\RoleInterface;

// cspell:ignore amphibius
// cspell:ignore amphibius Hippopotamidae

/**
 * Tests the Comment entity's cache tags.
+8 −8
Original line number Diff line number Diff line
@@ -46,7 +46,7 @@ class SaveUploadFormTest extends FileManagedTestBase {
   *
   * @var string
   */
  protected $phpfile;
  protected $phpFile;

  /**
   * The largest file id when the test starts.
@@ -76,8 +76,8 @@ protected function setUp(): void {
    [, $this->imageExtension] = explode('.', $this->image->getFilename());
    $this->assertFileExists($this->image->getFileUri());

    $this->phpfile = current($this->drupalGetTestFiles('php'));
    $this->assertFileExists($this->phpfile->uri);
    $this->phpFile = current($this->drupalGetTestFiles('php'));
    $this->assertFileExists($this->phpFile->uri);

    $this->maxFidBefore = (int) \Drupal::entityQueryAggregate('file')
      ->accessCheck(FALSE)
@@ -238,7 +238,7 @@ public function testHandleDangerousFile() {
    // safety. Also check to make sure its MIME type was changed.
    $edit = [
      'file_test_replace' => FileSystemInterface::EXISTS_REPLACE,
      'files[file_test_upload][]' => $file_system->realpath($this->phpfile->uri),
      'files[file_test_upload][]' => $file_system->realpath($this->phpFile->uri),
      'is_image_file' => FALSE,
      'extensions' => 'php txt',
    ];
@@ -246,7 +246,7 @@ public function testHandleDangerousFile() {
    $this->drupalGet('file-test/save_upload_from_form_test');
    $this->submitForm($edit, 'Submit');
    $this->assertSession()->statusCodeEquals(200);
    $this->assertSession()->responseContains('For security reasons, your upload has been renamed to <em class="placeholder">' . $this->phpfile->filename . '_.txt' . '</em>');
    $this->assertSession()->responseContains('For security reasons, your upload has been renamed to <em class="placeholder">' . $this->phpFile->filename . '_.txt' . '</em>');
    $this->assertSession()->pageTextContains('File MIME type is text/plain.');
    $this->assertSession()->pageTextContains("You WIN!");

@@ -263,7 +263,7 @@ public function testHandleDangerousFile() {
    $this->submitForm($edit, 'Submit');
    $this->assertSession()->statusCodeEquals(200);
    $this->assertSession()->pageTextNotContains('For security reasons, your upload has been renamed');
    $this->assertSession()->pageTextContains("File name is {$this->phpfile->filename}");
    $this->assertSession()->pageTextContains("File name is {$this->phpFile->filename}");
    $this->assertSession()->pageTextContains("You WIN!");

    // Check that the correct hooks were called.
@@ -277,7 +277,7 @@ public function testHandleDangerousFile() {

    $edit = [
      'file_test_replace' => FileSystemInterface::EXISTS_REPLACE,
      'files[file_test_upload]' => \Drupal::service('file_system')->realpath($this->phpfile->uri),
      'files[file_test_upload]' => \Drupal::service('file_system')->realpath($this->phpFile->uri),
      'is_image_file' => FALSE,
      'extensions' => 'php',
    ];
@@ -566,7 +566,7 @@ public function testCombinedErrorMessages() {
      'extensions' => 'jpeg',
    ];
    $edit += $form->getPhpValues();
    $files['files']['file_test_upload'][0] = $file_system->realpath($this->phpfile->uri);
    $files['files']['file_test_upload'][0] = $file_system->realpath($this->phpFile->uri);
    $files['files']['file_test_upload'][1] = $file_system->realpath($text_file->uri);
    $client->request($form->getMethod(), $form->getUri(), $edit, $files);
    $this->assertSession()->statusCodeEquals(200);
Loading