summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHaelwenn <contact+git.pleroma.social@hacktivis.me>2022-07-31 21:34:23 +0000
committertusooa <tusooa@kazv.moe>2022-07-31 21:34:23 +0000
commit5ef2dc317d49453153855f106fa098625b6e55ae (patch)
treef6eb654fd6f6274bd3c186e6190b134a3a3198a0
parentc80096522cad1255f53e171359bc0266822c6441 (diff)
Change test case wording
-rw-r--r--test/pleroma/web/twitter_api/util_controller_test.exs10
1 files changed, 5 insertions, 5 deletions
diff --git a/test/pleroma/web/twitter_api/util_controller_test.exs b/test/pleroma/web/twitter_api/util_controller_test.exs
index 7d7eb39ff..5dc72b177 100644
--- a/test/pleroma/web/twitter_api/util_controller_test.exs
+++ b/test/pleroma/web/twitter_api/util_controller_test.exs
@@ -553,7 +553,7 @@ defmodule Pleroma.Web.TwitterAPI.UtilControllerTest do
assert json_response_and_validate_schema(conn, 200) == %{"error" => "Invalid password."}
end
- test "with proper permissions, valid password and target account does not alias this",
+ test "with proper permissions, valid password and target account does not alias it",
%{
conn: conn
} do
@@ -592,7 +592,7 @@ defmodule Pleroma.Web.TwitterAPI.UtilControllerTest do
}
end
- test "with proper permissions, valid password, remote target account aliases this and local cache does not exist",
+ test "with proper permissions, valid password, remote target account aliases it and local cache does not exist",
%{} do
user = insert(:user, ap_id: "https://lm.kazv.moe/users/testuser")
%{user: _user, conn: conn} = oauth_access(["write:accounts"], user: user)
@@ -610,7 +610,7 @@ defmodule Pleroma.Web.TwitterAPI.UtilControllerTest do
assert json_response_and_validate_schema(conn, 200) == %{"status" => "success"}
end
- test "with proper permissions, valid password, remote target account aliases this and local cache does not alias this",
+ test "with proper permissions, valid password, remote target account aliases it and local cache does not aliases it",
%{} do
user = insert(:user, ap_id: "https://lm.kazv.moe/users/testuser")
%{user: _user, conn: conn} = oauth_access(["write:accounts"], user: user)
@@ -636,7 +636,7 @@ defmodule Pleroma.Web.TwitterAPI.UtilControllerTest do
assert json_response_and_validate_schema(conn, 200) == %{"status" => "success"}
end
- test "with proper permissions, valid password, remote target account does not alias this and local cache aliases this",
+ test "with proper permissions, valid password, remote target account does not aliases it and local cache aliases it",
%{
user: user,
conn: conn
@@ -665,7 +665,7 @@ defmodule Pleroma.Web.TwitterAPI.UtilControllerTest do
}
end
- test "with proper permissions, valid password and target account aliases this", %{
+ test "with proper permissions, valid password and target account aliases it", %{
conn: conn,
user: user
} do