Extensions: CodeHealth: Spell check a few files

Bug: chromium:346952289
Change-Id: Idbd784f9622adb845c187376751677a4f14f33b0
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/6497444
Reviewed-by: David Bertoni <dbertoni@chromium.org>
Commit-Queue: Solomon Kinard <solomonkinard@chromium.org>
Cr-Commit-Position: refs/heads/main@{#1453697}
diff --git a/chrome/browser/extensions/chrome_app_sorting.h b/chrome/browser/extensions/chrome_app_sorting.h
index e985a73..713355f 100644
--- a/chrome/browser/extensions/chrome_app_sorting.h
+++ b/chrome/browser/extensions/chrome_app_sorting.h
@@ -198,7 +198,7 @@
   // app launch ordinals that exist on that page. This is used for mapping
   // StringOrdinals to their Integer equivalent as well as quick lookup of the
   // any collision of on the NTP (icons with the same page and same app launch
-  // ordinals). The possiblity of collisions means that a multimap must be used
+  // ordinals). The possibility of collisions means that a multimap must be used
   // (although the collisions must all be resolved once all the syncing is
   // done).
   PageOrdinalMap ntp_ordinal_map_;
diff --git a/chrome/browser/extensions/clipboard_extension_helper_chromeos.cc b/chrome/browser/extensions/clipboard_extension_helper_chromeos.cc
index 49b36da..f6866b1 100644
--- a/chrome/browser/extensions/clipboard_extension_helper_chromeos.cc
+++ b/chrome/browser/extensions/clipboard_extension_helper_chromeos.cc
@@ -98,7 +98,7 @@
   if (clipboard_image_data_decoder_->has_request_pending())
     clipboard_image_data_decoder_->Cancel();
 
-  // Cache additonal items.
+  // Cache additional items.
   additonal_items_ = std::move(additional_items);
 
   image_save_success_callback_ = std::move(success_callback);
diff --git a/chrome/browser/extensions/content_script_apitest.cc b/chrome/browser/extensions/content_script_apitest.cc
index baabb72..da75b06 100644
--- a/chrome/browser/extensions/content_script_apitest.cc
+++ b/chrome/browser/extensions/content_script_apitest.cc
@@ -794,7 +794,7 @@
     ExtensionManagementPolicyUpdater pref(&policy_provider_);
     pref.AddPolicyBlockedHost(extension_id, "*://example.com");
   }
-  // Some policy updating operations are performed asynchronuosly. Wait for them
+  // Some policy updating operations are performed asynchronously. Wait for them
   // to complete before installing extension.
   base::RunLoop().RunUntilIdle();
 
@@ -1462,8 +1462,8 @@
   // Verify that the content scripts have been injected.  Content script
   // injection is important even in somewhat exotic scenarios such as here
   // (MHTML frames normally don't execute any scripts), because it is important
-  // that some extensions (such as accessbility aids) are able to inject content
-  // scripts into all frames.
+  // that some extensions (such as accessibility aids) are able to inject
+  // content scripts into all frames.
   //
   // Note that `<all_urls>` doesn't cover `cid:` subframes, so we don't wait for
   // `listener2`.
diff --git a/chrome/browser/extensions/crx_installer.h b/chrome/browser/extensions/crx_installer.h
index fec8e88..a787099 100644
--- a/chrome/browser/extensions/crx_installer.h
+++ b/chrome/browser/extensions/crx_installer.h
@@ -539,7 +539,7 @@
 
   // Whether we should produce an error if the manifest declares requirements
   // that are not met. If false and there is an unmet requirement, the install
-  // will continue but the extension will be distabled.
+  // will continue but the extension will be disabled.
   bool error_on_unsupported_requirements_;
 
   // Sequenced task runner where most file I/O operations will be performed.
diff --git a/chrome/browser/extensions/cws_info_service.cc b/chrome/browser/extensions/cws_info_service.cc
index 3a97100..3a31a3d 100644
--- a/chrome/browser/extensions/cws_info_service.cc
+++ b/chrome/browser/extensions/cws_info_service.cc
@@ -517,7 +517,7 @@
     }
   }
 
-  // Process any resquested ids missing from the response. These ids represent
+  // Process any requested ids missing from the response. These ids represent
   // extensions that are no longer available from the store.
   for (const auto& id : active_fetch_->requests.front().ids) {
     if (extension_prefs_->HasPrefForExtension(id) == false) {
diff --git a/chrome/browser/extensions/events_apitest.cc b/chrome/browser/extensions/events_apitest.cc
index e46f9378..70bc4e3e 100644
--- a/chrome/browser/extensions/events_apitest.cc
+++ b/chrome/browser/extensions/events_apitest.cc
@@ -537,7 +537,7 @@
   // EXPECT_EQ(2, content::EvalJs(extension_contents, "self.receivedEvents;"));
   // because each listener should fire exactly once (we only visited one new
   // page).
-  // However, currently we'll disptach the event to the same process twice
+  // However, currently we'll dispatch the event to the same process twice
   // (once for each listener), and each dispatch will match both listeners,
   // resulting in each listener being triggered twice (for a total of four
   // received events).
@@ -613,7 +613,7 @@
   content::RunAllPendingInMessageLoop();
   content::RunAllTasksUntilIdle();
 
-  // "chrome updates listener" registerd a listener for the onInstalled event,
+  // "chrome updates listener" registered a listener for the onInstalled event,
   // whereas "chrome updates non listener" did not. Only the
   // "chrome updates listener" extension should have been woken up for the
   // chrome update event.
diff --git a/chrome/browser/extensions/extension_action_runner_browsertest.cc b/chrome/browser/extensions/extension_action_runner_browsertest.cc
index 4f6af99..51641c3 100644
--- a/chrome/browser/extensions/extension_action_runner_browsertest.cc
+++ b/chrome/browser/extensions/extension_action_runner_browsertest.cc
@@ -446,7 +446,7 @@
 
   // The extension should want to run on the page, should not have
   // injected, should have user site access "on click", and page interaction
-  // witheld.
+  // withheld.
   ExtensionActionRunner* runner =
       ExtensionActionRunner::GetForWebContents(web_contents);
   ASSERT_TRUE(runner);
diff --git a/chrome/browser/extensions/extension_action_runner_unittest.cc b/chrome/browser/extensions/extension_action_runner_unittest.cc
index 5405ad78..4ac5eda 100644
--- a/chrome/browser/extensions/extension_action_runner_unittest.cc
+++ b/chrome/browser/extensions/extension_action_runner_unittest.cc
@@ -255,7 +255,7 @@
   EXPECT_FALSE(RequiresUserConsent(extension));
 
   // Reloading and same-origin navigations shouldn't clear those permissions,
-  // and we shouldn't require user constent again.
+  // and we shouldn't require user consent again.
   content::NavigationSimulator::Reload(web_contents());
   EXPECT_FALSE(RequiresUserConsent(extension));
   NavigateAndCommit(GURL("https://www.google.com/foo"));
@@ -362,7 +362,7 @@
   NavigateAndCommit(GURL("https://yahoo.com"));
   EXPECT_TRUE(RequiresUserConsent(extension));
 
-  // Back to the original origin should also re-require constent.
+  // Back to the original origin should also re-require consent.
   NavigateAndCommit(GURL("https://www.google.com"));
   EXPECT_TRUE(RequiresUserConsent(extension));
 
diff --git a/chrome/browser/extensions/extension_apitest.cc b/chrome/browser/extensions/extension_apitest.cc
index 427faffa..394a326 100644
--- a/chrome/browser/extensions/extension_apitest.cc
+++ b/chrome/browser/extensions/extension_apitest.cc
@@ -127,7 +127,7 @@
       << "'extension_url' and 'page_url' are mutually exclusive.";
   CHECK(!run_options.open_in_incognito || run_options.page_url ||
         run_options.extension_url)
-      << "'open_in_incognito' is only allowed if specifiying 'page_url'";
+      << "'open_in_incognito' is only allowed if specifying 'page_url'";
   CHECK(!(run_options.launch_as_platform_app && run_options.page_url))
       << "'launch_as_platform_app' and 'page_url' are mutually exclusive.";
 
diff --git a/chrome/browser/extensions/extension_apitest.h b/chrome/browser/extensions/extension_apitest.h
index e92bafe..03cc0d8c 100644
--- a/chrome/browser/extensions/extension_apitest.h
+++ b/chrome/browser/extensions/extension_apitest.h
@@ -99,7 +99,7 @@
   //
   // Starting the test server is done in two steps; first the server socket is
   // created and starts listening, followed by the start of an IO thread on
-  // which the test server will accept connectons.
+  // which the test server will accept connections.
   //
   // In general you can start the test server using StartEmbeddedTestServer()
   // which handles both steps. When you need to register request handlers that
diff --git a/chrome/browser/extensions/extension_bindings_apitest.cc b/chrome/browser/extensions/extension_bindings_apitest.cc
index 6422967..da18950 100644
--- a/chrome/browser/extensions/extension_bindings_apitest.cc
+++ b/chrome/browser/extensions/extension_bindings_apitest.cc
@@ -538,7 +538,7 @@
   EXPECT_FALSE(event_router->ExtensionHasEventListener(extension->id(),
                                                        "tabs.onCreated"));
 
-  // Register both lsiteners, and verify they were added.
+  // Register both listeners, and verify they were added.
   ASSERT_TRUE(content::ExecJs(first_tab, "registerListener()"));
   ASSERT_TRUE(content::ExecJs(second_tab, "registerListener()"));
   EXPECT_TRUE(event_router->ExtensionHasEventListener(extension->id(),
diff --git a/chrome/browser/extensions/extension_dom_clipboard_apitest.cc b/chrome/browser/extensions/extension_dom_clipboard_apitest.cc
index 802220ad..3c701b4 100644
--- a/chrome/browser/extensions/extension_dom_clipboard_apitest.cc
+++ b/chrome/browser/extensions/extension_dom_clipboard_apitest.cc
@@ -201,7 +201,7 @@
   EXPECT_TRUE(ExecuteCopyInSelectedTab()) << message_;
   EXPECT_FALSE(ExecutePasteInSelectedTab()) << message_;
 
-  // User acitvation doesn't propagate to a child frame.
+  // User activation doesn't propagate to a child frame.
   EXPECT_FALSE(ExecuteCommandInIframeInSelectedTab("copy")) << message_;
   EXPECT_FALSE(ExecuteCommandInIframeInSelectedTab("paste")) << message_;
 }
diff --git a/chrome/browser/extensions/extension_error_controller_unittest.cc b/chrome/browser/extensions/extension_error_controller_unittest.cc
index 47b10ca..1c438063 100644
--- a/chrome/browser/extensions/extension_error_controller_unittest.cc
+++ b/chrome/browser/extensions/extension_error_controller_unittest.cc
@@ -239,7 +239,7 @@
   EXPECT_FALSE(g_error_ui);
 }
 
-// Test error ui is presented and acknowledged whe an extension is blocked by
+// Test error ui is presented and acknowledged when an extension is blocked by
 // policy.
 TEST_F(ExtensionErrorControllerUnitTest, ExtensionIsBlockedByEnterprisePolicy) {
   scoped_refptr<const Extension> extension = BuildExtension();
diff --git a/chrome/browser/extensions/extension_error_ui_desktop.cc b/chrome/browser/extensions/extension_error_ui_desktop.cc
index 139b740..bb3f4b9 100644
--- a/chrome/browser/extensions/extension_error_ui_desktop.cc
+++ b/chrome/browser/extensions/extension_error_ui_desktop.cc
@@ -86,7 +86,7 @@
   message.reserve(forbidden.size());
 
   // Currently, this ignores the case where there may be an extension that is
-  // blockedlisted by enterprise and another extension blocklisted by Safe
+  // blocklisted by enterprise and another extension blocklisted by Safe
   // Browsing.
   if (item_blocked_by_policy_exists) {
     return GenerateEnterpriseMessage(forbidden);
diff --git a/chrome/browser/extensions/extension_gcm_app_handler.cc b/chrome/browser/extensions/extension_gcm_app_handler.cc
index 11f8725c..bd6352e 100644
--- a/chrome/browser/extensions/extension_gcm_app_handler.cc
+++ b/chrome/browser/extensions/extension_gcm_app_handler.cc
@@ -124,7 +124,7 @@
     // GCMAccountMapper, which is automatically added and removed by
     // GCMDriverDesktop.
     //
-    // Also note that the GCM message routing will not be interruptted during
+    // Also note that the GCM message routing will not be interrupted during
     // the update process since unloading and reloading extension are done in
     // the single function ExtensionService::AddExtension.
     AddDummyAppHandler();
@@ -135,7 +135,7 @@
                        weak_factory_.GetWeakPtr()));
   }
 
-  // When the extention is being uninstalled, it will be unloaded first. We
+  // When the extension is being uninstalled, it will be unloaded first. We
   // should not remove the app handler in this case and it will be handled
   // in OnExtensionUninstalled.
   if (reason != UnloadedExtensionReason::UNINSTALL)
diff --git a/chrome/browser/extensions/extension_install_prompt.h b/chrome/browser/extensions/extension_install_prompt.h
index 76d1c74..8eb35ff 100644
--- a/chrome/browser/extensions/extension_install_prompt.h
+++ b/chrome/browser/extensions/extension_install_prompt.h
@@ -289,7 +289,7 @@
   // Starts the process to show the install dialog. Loads the icon (if `icon` is
   // null), sets up the Prompt, and calls `show_dialog_callback` when ready to
   // show.
-  // `extension` can be null in the case of a bndle install.
+  // `extension` can be null in the case of a bundle install.
   // If `icon` is null, this will attempt to load the extension's icon.
   // `prompt` is used to pass in a prompt with additional data (like retained
   // device permissions) or a different type. If not provided, `prompt` will
diff --git a/chrome/browser/extensions/extension_management_internal.h b/chrome/browser/extensions/extension_management_internal.h
index fbb8ecb..2a9a976 100644
--- a/chrome/browser/extensions/extension_management_internal.h
+++ b/chrome/browser/extensions/extension_management_internal.h
@@ -41,7 +41,7 @@
 // Since update URL is not directly associated to extension ID, per-extension
 // and per-update-url settings might be enforced at the same time, see per-field
 // comments below for details.
-// Some features do not support per-update-url setttings.
+// Some features do not support per-update-url settings.
 struct IndividualSettings {
   enum ParsingScope {
     // Parses the default settings.
diff --git a/chrome/browser/extensions/extension_management_unittest.cc b/chrome/browser/extensions/extension_management_unittest.cc
index cb6be39..f2d39e07 100644
--- a/chrome/browser/extensions/extension_management_unittest.cc
+++ b/chrome/browser/extensions/extension_management_unittest.cc
@@ -1314,7 +1314,7 @@
       2, kTargetExtension, Manifest::Type::TYPE_EXTENSION));
   EXPECT_TRUE(extension_management_->IsExemptFromMV2DeprecationByPolicy(
       2, kTargetExtension, Manifest::Type::TYPE_LOGIN_SCREEN_EXTENSION));
-  // Despite being force-installed, hosted apps aren't includede in the
+  // Despite being force-installed, hosted apps aren't included in the
   // MV2 deprecation, so isn't exempt by policy.
   EXPECT_FALSE(extension_management_->IsExemptFromMV2DeprecationByPolicy(
       2, kTargetExtension, Manifest::Type::TYPE_HOSTED_APP));
diff --git a/chrome/browser/extensions/extension_nacl_browsertest.cc b/chrome/browser/extensions/extension_nacl_browsertest.cc
index b345b31..36a9366 100644
--- a/chrome/browser/extensions/extension_nacl_browsertest.cc
+++ b/chrome/browser/extensions/extension_nacl_browsertest.cc
@@ -259,7 +259,7 @@
             subframe->GetProcess());
 
   // Insert a plugin element into the subframe.  Before the fix from
-  // https://crrev.com/2932703005 this would have trigerred a crash reported in
+  // https://crrev.com/2932703005 this would have triggered a crash reported in
   // https://crbug.com/728295.
   std::string script = R"(
       var embed = document.createElement("embed");
diff --git a/chrome/browser/extensions/extension_tab_util.cc b/chrome/browser/extensions/extension_tab_util.cc
index fc375bf..8c59cc8 100644
--- a/chrome/browser/extensions/extension_tab_util.cc
+++ b/chrome/browser/extensions/extension_tab_util.cc
@@ -1030,7 +1030,7 @@
   if (web_contents_browser_context == browser_context)
     return true;
 
-  // If not it might be to include the incongito mode, so we if the profiles
+  // If not it might be to include the incognito mode, so we if the profiles
   // are the same or the parent.
   return include_incognito && Profile::FromBrowserContext(browser_context)
                                   ->IsSameOrParent(Profile::FromBrowserContext(
diff --git a/chrome/browser/extensions/extension_util_unittest.cc b/chrome/browser/extensions/extension_util_unittest.cc
index a083023..b0de5b3a 100644
--- a/chrome/browser/extensions/extension_util_unittest.cc
+++ b/chrome/browser/extensions/extension_util_unittest.cc
@@ -304,7 +304,7 @@
   extension_registry->AddTerminated(policy_extension);
   EXPECT_TRUE(util::HasIsolatedStorage(policy_extension_id, signin_profile_));
 
-  // Extension blockedlisted.
+  // Extension blocklisted.
   extension_registry->RemoveTerminated(policy_extension_id);
   extension_registry->AddBlocklisted(policy_extension);
   EXPECT_TRUE(util::HasIsolatedStorage(policy_extension_id, signin_profile_));
diff --git a/chrome/browser/extensions/external_provider_manager.h b/chrome/browser/extensions/external_provider_manager.h
index 73fb0c8..9e72e92 100644
--- a/chrome/browser/extensions/external_provider_manager.h
+++ b/chrome/browser/extensions/external_provider_manager.h
@@ -106,7 +106,7 @@
   // Callback for installation finish of an extension from external file, since
   // we need to remove this extension from the pending extension manager in case
   // of installation failure. This is only a need for extensions installed
-  // by file, since extensions installed by URL will be intentinally kept in
+  // by file, since extensions installed by URL will be intentionally kept in
   // the manager and retried later.
   void InstallationFromExternalFileFinished(
       const std::string& extension_id,
diff --git a/chrome/browser/extensions/install_signer.cc b/chrome/browser/extensions/install_signer.cc
index cc45197d..ebd091d 100644
--- a/chrome/browser/extensions/install_signer.cc
+++ b/chrome/browser/extensions/install_signer.cc
@@ -57,7 +57,7 @@
 
 // This allows us to version the format of what we write into the prefs,
 // allowing for forward migration, as well as detecting forwards/backwards
-// incompatabilities, etc.
+// incompatibilities, etc.
 const int kSignatureFormatVersion = 2;
 
 const size_t kSaltBytes = 32;
@@ -153,7 +153,7 @@
   std::unique_ptr<InstallSignature> result =
       std::make_unique<InstallSignature>();
 
-  // For now we don't want to support any backwards compability, but in the
+  // For now we don't want to support any backwards compatibility, but in the
   // future if we do, we would want to put the migration code here.
   if (dict.FindInt(kSignatureFormatVersionKey) != kSignatureFormatVersion)
     return nullptr;
diff --git a/chrome/browser/extensions/install_verifier.h b/chrome/browser/extensions/install_verifier.h
index 6083057..f19b1bc 100644
--- a/chrome/browser/extensions/install_verifier.h
+++ b/chrome/browser/extensions/install_verifier.h
@@ -86,7 +86,7 @@
   void VerifyAllExtensions();
 
   // Call this to add a set of ids that will immediately be considered allowed,
-  // and kick off an aysnchronous request to Add.
+  // and kick off an asynchronous request to Add.
   void AddProvisional(const ExtensionIdSet& ids);
 
   // Removes an id or set of ids from the verified list.
diff --git a/chrome/browser/extensions/native_bindings_apitest.cc b/chrome/browser/extensions/native_bindings_apitest.cc
index c7bfa85..bd6a1c1c 100644
--- a/chrome/browser/extensions/native_bindings_apitest.cc
+++ b/chrome/browser/extensions/native_bindings_apitest.cc
@@ -656,7 +656,7 @@
 
   // The above test makes 2 calls to chrome.tabs.create, so check that those
   // have been logged in the histograms we expect, but not to the histograms
-  // specifcally tracking service worker and MV3 calls.
+  // specifically tracking service worker and MV3 calls.
   EXPECT_EQ(2, histogram_tester.GetBucketCount(
                    "Extensions.Functions.ExtensionCalls",
                    functions::HistogramValue::TABS_CREATE));
diff --git a/chrome/browser/extensions/omnibox_focus_interactive_test.cc b/chrome/browser/extensions/omnibox_focus_interactive_test.cc
index 64f48525..b171c36 100644
--- a/chrome/browser/extensions/omnibox_focus_interactive_test.cc
+++ b/chrome/browser/extensions/omnibox_focus_interactive_test.cc
@@ -550,7 +550,7 @@
   EXPECT_TRUE(ui_test_utils::IsViewFocused(browser(), VIEW_ID_TAB_CONTAINER));
 
   // FencedFrameTestHelper uses eval() function that is blocked by the
-  // document's CSP on this page. So need to maually create a fenced frame for
+  // document's CSP on this page. So need to manually create a fenced frame for
   // avoiding the CSP policy.
   constexpr char kAddFencedFrameScript[] = R"({
       const fenced_frame = document.createElement('fencedframe');
diff --git a/chrome/browser/extensions/orb_and_cors_extension_browsertest.cc b/chrome/browser/extensions/orb_and_cors_extension_browsertest.cc
index 9d3aedb..2116f19 100644
--- a/chrome/browser/extensions/orb_and_cors_extension_browsertest.cc
+++ b/chrome/browser/extensions/orb_and_cors_extension_browsertest.cc
@@ -418,7 +418,7 @@
   // |url|. Returns the body of the response.
   //
   // The method below uses "programmatic" (rather than "declarative") way to
-  // inject a content script, but the behavior and permissions of the conecnt
+  // inject a content script, but the behavior and permissions of the content
   // script should be the same in both cases.  See also
   // https://developer.chrome.com/extensions/content_scripts#programmatic.
   std::string FetchViaContentScript(const GURL& url,
@@ -486,7 +486,7 @@
   // Asks the test |extension_| to inject |content_script| into |web_contents|.
   //
   // This is an implementation of FetchCallback.
-  // Returns true if the content script execution started succeessfully.
+  // Returns true if the content script execution started successfully.
   bool ExecuteContentScript(content::WebContents* web_contents,
                             const std::string& content_script) {
     int tab_id = ExtensionTabUtil::GetTabId(web_contents);
@@ -503,7 +503,7 @@
   // Executes |regular_script| in |web_contents|.
   //
   // This is an implementation of FetchCallback.
-  // Returns true if the script execution started succeessfully.
+  // Returns true if the script execution started successfully.
   bool ExecuteRegularScript(content::RenderFrameHost* frame,
                             const std::string& regular_script) {
     content::ExecuteScriptAsync(frame, regular_script);
@@ -520,7 +520,7 @@
   // commit is happening.
   //
   // This is an implementation of FetchCallback.
-  // Returns true if the script execution started succeessfully.
+  // Returns true if the script execution started successfully.
   bool ExecuteInSrcDocFrame(content::RenderFrameHost* parent_frame,
                             const std::string& script_to_run_in_subframe) {
     static int sequence_id = 0;
@@ -1942,7 +1942,7 @@
           // Note that these requests will use the URLLoaderFactory owned by
           // ServiceWorkerSubresourceLoader which can be different to the
           // network loader factory owned by the ServiceWorker thread (which is
-          // used for fetch intiated by the service worker above).
+          // used for fetch initiated by the service worker above).
       }); )";
   ASSERT_TRUE(RegisterServiceWorkerForExtension(kServiceWorkerScript));
 
@@ -2194,7 +2194,7 @@
   EXPECT_EQ(false, content::EvalJs(active_web_contents(),
                                    kInjectionVerificationScript));
 
-  // Try to fetch a WebUI resource (i.e. verify that the unsucessful content
+  // Try to fetch a WebUI resource (i.e. verify that the unsuccessful content
   // script injection above didn't clobber the WebUI-specific URLLoaderFactory).
   const char kScript[] = R"(
       var img = document.createElement('img');
@@ -2709,7 +2709,7 @@
   }
 }
 
-// Similar to FromBackgroundPage_ActiveTabPermission, but focues on interaction
+// Similar to FromBackgroundPage_ActiveTabPermission, but focuses on interaction
 // between the regular background page and the separate incognito background
 // page in "split" mode.
 IN_PROC_BROWSER_TEST_F(OrbAndCorsExtensionBrowserTest,
@@ -2944,7 +2944,7 @@
   }
 }
 
-// Similar to FromBackgroundPage_ActiveTabPermission, but focues on behavior
+// Similar to FromBackgroundPage_ActiveTabPermission, but focuses on behavior
 // of the background page when it is shared between the regular and the
 // incognito profiles in "spanning" mode.
 IN_PROC_BROWSER_TEST_F(OrbAndCorsExtensionBrowserTest,
diff --git a/chrome/browser/extensions/script_executor_browsertest.cc b/chrome/browser/extensions/script_executor_browsertest.cc
index 0b18e74..9c3255e7 100644
--- a/chrome/browser/extensions/script_executor_browsertest.cc
+++ b/chrome/browser/extensions/script_executor_browsertest.cc
@@ -287,7 +287,7 @@
   {
     // Inject two pieces of code. They each evaluate to a promise. The second,
     // `kCode2`, evaluates to a promise that resolves immediately, and then
-    // asynchronously resovles the promise from the first, `kCode1`, which
+    // asynchronously resolves the promise from the first, `kCode1`, which
     // changes the title of the page.
     // This guarantees that the renderer code properly waits for *all* results
     // to resolve, and not simply the last one.
diff --git a/chrome/browser/extensions/service_worker_apitest.cc b/chrome/browser/extensions/service_worker_apitest.cc
index 65567776..9a7c882a 100644
--- a/chrome/browser/extensions/service_worker_apitest.cc
+++ b/chrome/browser/extensions/service_worker_apitest.cc
@@ -1123,7 +1123,7 @@
 IN_PROC_BROWSER_TEST_F(ServiceWorkerTest, FetchArbitraryPaths) {
   const Extension* extension = StartTestFromBackgroundPage("fetch.js");
 
-  // Open some arbirary paths. Their contents should be what the service worker
+  // Open some arbitrary paths. Their contents should be what the service worker
   // responds with, which in this case is the path of the fetch.
   EXPECT_EQ(
       "Caught a fetch for /index.html",
diff --git a/chrome/browser/extensions/side_panel_manifest_browsertest.cc b/chrome/browser/extensions/side_panel_manifest_browsertest.cc
index f60acb3..5a45d19 100644
--- a/chrome/browser/extensions/side_panel_manifest_browsertest.cc
+++ b/chrome/browser/extensions/side_panel_manifest_browsertest.cc
@@ -16,7 +16,7 @@
 
 // Succeed when a file exists, when there is a query, or a bookmark.
 IN_PROC_BROWSER_TEST_F(SidePanelManifestBrowserTest, ValidateSuccess) {
-  // Load the extenesion and a real file for validation.
+  // Load the extension and a real file for validation.
   static constexpr char kManifest[] =
       R"({
         "name": "Test",
diff --git a/chrome/browser/extensions/tab_helper_unittest.cc b/chrome/browser/extensions/tab_helper_unittest.cc
index f81e33f..9935e97 100644
--- a/chrome/browser/extensions/tab_helper_unittest.cc
+++ b/chrome/browser/extensions/tab_helper_unittest.cc
@@ -67,7 +67,7 @@
   PermissionsManager* permissions_manager() { return permissions_manager_; }
 
  private:
-  // The browser and accompaying window.
+  // The browser and accompanying window.
   std::unique_ptr<Browser> browser_;
   std::unique_ptr<TestBrowserWindow> browser_window_;
 
diff --git a/chrome/browser/extensions/test_blocklist_state_fetcher.h b/chrome/browser/extensions/test_blocklist_state_fetcher.h
index 00fe1a84..58bff43 100644
--- a/chrome/browser/extensions/test_blocklist_state_fetcher.h
+++ b/chrome/browser/extensions/test_blocklist_state_fetcher.h
@@ -28,7 +28,7 @@
                            ClientCRXListInfoResponse_Verdict state);
 
   // Send the appropriate response for the request for extension with id `id`.
-  // Return false, if fetcher with fiven id doesn't exist or in case of
+  // Return false, if fetcher with given id doesn't exist or in case of
   // incorrect request. Otherwise return true.
   bool HandleFetcher(const std::string& id);
 
diff --git a/chrome/browser/extensions/unpacked_installer.h b/chrome/browser/extensions/unpacked_installer.h
index 4c97855..10db41f 100644
--- a/chrome/browser/extensions/unpacked_installer.h
+++ b/chrome/browser/extensions/unpacked_installer.h
@@ -39,7 +39,7 @@
 class PreloadCheckGroup;
 
 // Installs and loads an unpacked extension. Because internal state needs to be
-// held about the instalation process, only one call to Load*() should be made
+// held about the installation process, only one call to Load*() should be made
 // per UnpackedInstaller.
 // TODO(erikkay): It might be useful to be able to load a packed extension
 // (presumably into memory) without installing it.
diff --git a/chrome/browser/extensions/webstore_installer.cc b/chrome/browser/extensions/webstore_installer.cc
index b75cb45..52f71027 100644
--- a/chrome/browser/extensions/webstore_installer.cc
+++ b/chrome/browser/extensions/webstore_installer.cc
@@ -504,7 +504,7 @@
 // http://crbug.com/165634
 // http://crbug.com/126013
 // The current working theory is that one of the many pointers dereferenced in
-// here is occasionally deleted before all of its referers are nullified,
+// here is occasionally deleted before all of its referrers are nullified,
 // probably in a callback race. After this comment is released, the crash
 // reports should narrow down exactly which pointer it is.  Collapsing all the
 // early-returns into a single branch makes it hard to see exactly which pointer
diff --git a/chrome/browser/extensions/webstore_installer_browsertest.cc b/chrome/browser/extensions/webstore_installer_browsertest.cc
index 8f6c2ac..9322087 100644
--- a/chrome/browser/extensions/webstore_installer_browsertest.cc
+++ b/chrome/browser/extensions/webstore_installer_browsertest.cc
@@ -253,7 +253,7 @@
   content::WebContents* active_web_contents = GetActiveWebContents();
   ASSERT_TRUE(active_web_contents);
 
-  // Create an approval that withhelds permissions when the checkbox is not
+  // Create an approval that withholds permissions when the checkbox is not
   // selected.
   std::unique_ptr<InstallApproval> approval =
       InstallApproval::CreateWithNoInstallPrompt(
diff --git a/chrome/browser/extensions/webstore_reinstaller.h b/chrome/browser/extensions/webstore_reinstaller.h
index d521e76..dde6d3c 100644
--- a/chrome/browser/extensions/webstore_reinstaller.h
+++ b/chrome/browser/extensions/webstore_reinstaller.h
@@ -14,7 +14,7 @@
 namespace extensions {
 
 // Reinstalls an extension from the webstore. This will first prompt the user if
-// they want to reinstall (using the verbase "Repair", since this is our action
+// they want to reinstall (using the verbiage "Repair", since this is our action
 // for repairing corrupted extensions), and, if the user agrees, will uninstall
 // the extension and reinstall it directly from the webstore.
 class WebstoreReinstaller : public WebstoreStandaloneInstaller,
diff --git a/chrome/browser/extensions/window_controller.h b/chrome/browser/extensions/window_controller.h
index d34070e..2f1509c 100644
--- a/chrome/browser/extensions/window_controller.h
+++ b/chrome/browser/extensions/window_controller.h
@@ -50,7 +50,7 @@
     REASON_NOT_EDITABLE,
   };
 
-  // A bitmaks used as filter on window types.
+  // A bitmask used as filter on window types.
   using TypeFilter = uint32_t;
 
   // Represents the lack of any window filter, implying
diff --git a/extensions/common/manifest_handlers/oauth2_manifest_unittest.cc b/extensions/common/manifest_handlers/oauth2_manifest_unittest.cc
index cc351a4..9c947fc 100644
--- a/extensions/common/manifest_handlers/oauth2_manifest_unittest.cc
+++ b/extensions/common/manifest_handlers/oauth2_manifest_unittest.cc
@@ -116,7 +116,7 @@
   // OAuth2 section should be parsed for an extension.
   {
     base::Value::Dict ext_manifest;
-    // Lack of "app" section representa an extension. So the base manifest
+    // Lack of "app" section represents an extension. So the base manifest
     // itself represents an extension.
     ext_manifest.Merge(base_manifest.Clone());
     ext_manifest.Set(keys::kKey, kExtensionKey);