Extensions: CodeHealth: Spell check a few files
Bug: chromium:346952289
Change-Id: Idbd784f9622adb845c187376751677a4f14f33b0
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/6497444
Reviewed-by: David Bertoni <dbertoni@chromium.org>
Commit-Queue: Solomon Kinard <solomonkinard@chromium.org>
Cr-Commit-Position: refs/heads/main@{#1453697}
diff --git a/chrome/browser/extensions/chrome_app_sorting.h b/chrome/browser/extensions/chrome_app_sorting.h
index e985a73..713355f 100644
--- a/chrome/browser/extensions/chrome_app_sorting.h
+++ b/chrome/browser/extensions/chrome_app_sorting.h
@@ -198,7 +198,7 @@
// app launch ordinals that exist on that page. This is used for mapping
// StringOrdinals to their Integer equivalent as well as quick lookup of the
// any collision of on the NTP (icons with the same page and same app launch
- // ordinals). The possiblity of collisions means that a multimap must be used
+ // ordinals). The possibility of collisions means that a multimap must be used
// (although the collisions must all be resolved once all the syncing is
// done).
PageOrdinalMap ntp_ordinal_map_;
diff --git a/chrome/browser/extensions/clipboard_extension_helper_chromeos.cc b/chrome/browser/extensions/clipboard_extension_helper_chromeos.cc
index 49b36da..f6866b1 100644
--- a/chrome/browser/extensions/clipboard_extension_helper_chromeos.cc
+++ b/chrome/browser/extensions/clipboard_extension_helper_chromeos.cc
@@ -98,7 +98,7 @@
if (clipboard_image_data_decoder_->has_request_pending())
clipboard_image_data_decoder_->Cancel();
- // Cache additonal items.
+ // Cache additional items.
additonal_items_ = std::move(additional_items);
image_save_success_callback_ = std::move(success_callback);
diff --git a/chrome/browser/extensions/content_script_apitest.cc b/chrome/browser/extensions/content_script_apitest.cc
index baabb72..da75b06 100644
--- a/chrome/browser/extensions/content_script_apitest.cc
+++ b/chrome/browser/extensions/content_script_apitest.cc
@@ -794,7 +794,7 @@
ExtensionManagementPolicyUpdater pref(&policy_provider_);
pref.AddPolicyBlockedHost(extension_id, "*://example.com");
}
- // Some policy updating operations are performed asynchronuosly. Wait for them
+ // Some policy updating operations are performed asynchronously. Wait for them
// to complete before installing extension.
base::RunLoop().RunUntilIdle();
@@ -1462,8 +1462,8 @@
// Verify that the content scripts have been injected. Content script
// injection is important even in somewhat exotic scenarios such as here
// (MHTML frames normally don't execute any scripts), because it is important
- // that some extensions (such as accessbility aids) are able to inject content
- // scripts into all frames.
+ // that some extensions (such as accessibility aids) are able to inject
+ // content scripts into all frames.
//
// Note that `<all_urls>` doesn't cover `cid:` subframes, so we don't wait for
// `listener2`.
diff --git a/chrome/browser/extensions/crx_installer.h b/chrome/browser/extensions/crx_installer.h
index fec8e88..a787099 100644
--- a/chrome/browser/extensions/crx_installer.h
+++ b/chrome/browser/extensions/crx_installer.h
@@ -539,7 +539,7 @@
// Whether we should produce an error if the manifest declares requirements
// that are not met. If false and there is an unmet requirement, the install
- // will continue but the extension will be distabled.
+ // will continue but the extension will be disabled.
bool error_on_unsupported_requirements_;
// Sequenced task runner where most file I/O operations will be performed.
diff --git a/chrome/browser/extensions/cws_info_service.cc b/chrome/browser/extensions/cws_info_service.cc
index 3a97100..3a31a3d 100644
--- a/chrome/browser/extensions/cws_info_service.cc
+++ b/chrome/browser/extensions/cws_info_service.cc
@@ -517,7 +517,7 @@
}
}
- // Process any resquested ids missing from the response. These ids represent
+ // Process any requested ids missing from the response. These ids represent
// extensions that are no longer available from the store.
for (const auto& id : active_fetch_->requests.front().ids) {
if (extension_prefs_->HasPrefForExtension(id) == false) {
diff --git a/chrome/browser/extensions/events_apitest.cc b/chrome/browser/extensions/events_apitest.cc
index e46f9378..70bc4e3e 100644
--- a/chrome/browser/extensions/events_apitest.cc
+++ b/chrome/browser/extensions/events_apitest.cc
@@ -537,7 +537,7 @@
// EXPECT_EQ(2, content::EvalJs(extension_contents, "self.receivedEvents;"));
// because each listener should fire exactly once (we only visited one new
// page).
- // However, currently we'll disptach the event to the same process twice
+ // However, currently we'll dispatch the event to the same process twice
// (once for each listener), and each dispatch will match both listeners,
// resulting in each listener being triggered twice (for a total of four
// received events).
@@ -613,7 +613,7 @@
content::RunAllPendingInMessageLoop();
content::RunAllTasksUntilIdle();
- // "chrome updates listener" registerd a listener for the onInstalled event,
+ // "chrome updates listener" registered a listener for the onInstalled event,
// whereas "chrome updates non listener" did not. Only the
// "chrome updates listener" extension should have been woken up for the
// chrome update event.
diff --git a/chrome/browser/extensions/extension_action_runner_browsertest.cc b/chrome/browser/extensions/extension_action_runner_browsertest.cc
index 4f6af99..51641c3 100644
--- a/chrome/browser/extensions/extension_action_runner_browsertest.cc
+++ b/chrome/browser/extensions/extension_action_runner_browsertest.cc
@@ -446,7 +446,7 @@
// The extension should want to run on the page, should not have
// injected, should have user site access "on click", and page interaction
- // witheld.
+ // withheld.
ExtensionActionRunner* runner =
ExtensionActionRunner::GetForWebContents(web_contents);
ASSERT_TRUE(runner);
diff --git a/chrome/browser/extensions/extension_action_runner_unittest.cc b/chrome/browser/extensions/extension_action_runner_unittest.cc
index 5405ad78..4ac5eda 100644
--- a/chrome/browser/extensions/extension_action_runner_unittest.cc
+++ b/chrome/browser/extensions/extension_action_runner_unittest.cc
@@ -255,7 +255,7 @@
EXPECT_FALSE(RequiresUserConsent(extension));
// Reloading and same-origin navigations shouldn't clear those permissions,
- // and we shouldn't require user constent again.
+ // and we shouldn't require user consent again.
content::NavigationSimulator::Reload(web_contents());
EXPECT_FALSE(RequiresUserConsent(extension));
NavigateAndCommit(GURL("https://www.google.com/foo"));
@@ -362,7 +362,7 @@
NavigateAndCommit(GURL("https://yahoo.com"));
EXPECT_TRUE(RequiresUserConsent(extension));
- // Back to the original origin should also re-require constent.
+ // Back to the original origin should also re-require consent.
NavigateAndCommit(GURL("https://www.google.com"));
EXPECT_TRUE(RequiresUserConsent(extension));
diff --git a/chrome/browser/extensions/extension_apitest.cc b/chrome/browser/extensions/extension_apitest.cc
index 427faffa..394a326 100644
--- a/chrome/browser/extensions/extension_apitest.cc
+++ b/chrome/browser/extensions/extension_apitest.cc
@@ -127,7 +127,7 @@
<< "'extension_url' and 'page_url' are mutually exclusive.";
CHECK(!run_options.open_in_incognito || run_options.page_url ||
run_options.extension_url)
- << "'open_in_incognito' is only allowed if specifiying 'page_url'";
+ << "'open_in_incognito' is only allowed if specifying 'page_url'";
CHECK(!(run_options.launch_as_platform_app && run_options.page_url))
<< "'launch_as_platform_app' and 'page_url' are mutually exclusive.";
diff --git a/chrome/browser/extensions/extension_apitest.h b/chrome/browser/extensions/extension_apitest.h
index e92bafe..03cc0d8c 100644
--- a/chrome/browser/extensions/extension_apitest.h
+++ b/chrome/browser/extensions/extension_apitest.h
@@ -99,7 +99,7 @@
//
// Starting the test server is done in two steps; first the server socket is
// created and starts listening, followed by the start of an IO thread on
- // which the test server will accept connectons.
+ // which the test server will accept connections.
//
// In general you can start the test server using StartEmbeddedTestServer()
// which handles both steps. When you need to register request handlers that
diff --git a/chrome/browser/extensions/extension_bindings_apitest.cc b/chrome/browser/extensions/extension_bindings_apitest.cc
index 6422967..da18950 100644
--- a/chrome/browser/extensions/extension_bindings_apitest.cc
+++ b/chrome/browser/extensions/extension_bindings_apitest.cc
@@ -538,7 +538,7 @@
EXPECT_FALSE(event_router->ExtensionHasEventListener(extension->id(),
"tabs.onCreated"));
- // Register both lsiteners, and verify they were added.
+ // Register both listeners, and verify they were added.
ASSERT_TRUE(content::ExecJs(first_tab, "registerListener()"));
ASSERT_TRUE(content::ExecJs(second_tab, "registerListener()"));
EXPECT_TRUE(event_router->ExtensionHasEventListener(extension->id(),
diff --git a/chrome/browser/extensions/extension_dom_clipboard_apitest.cc b/chrome/browser/extensions/extension_dom_clipboard_apitest.cc
index 802220ad..3c701b4 100644
--- a/chrome/browser/extensions/extension_dom_clipboard_apitest.cc
+++ b/chrome/browser/extensions/extension_dom_clipboard_apitest.cc
@@ -201,7 +201,7 @@
EXPECT_TRUE(ExecuteCopyInSelectedTab()) << message_;
EXPECT_FALSE(ExecutePasteInSelectedTab()) << message_;
- // User acitvation doesn't propagate to a child frame.
+ // User activation doesn't propagate to a child frame.
EXPECT_FALSE(ExecuteCommandInIframeInSelectedTab("copy")) << message_;
EXPECT_FALSE(ExecuteCommandInIframeInSelectedTab("paste")) << message_;
}
diff --git a/chrome/browser/extensions/extension_error_controller_unittest.cc b/chrome/browser/extensions/extension_error_controller_unittest.cc
index 47b10ca..1c438063 100644
--- a/chrome/browser/extensions/extension_error_controller_unittest.cc
+++ b/chrome/browser/extensions/extension_error_controller_unittest.cc
@@ -239,7 +239,7 @@
EXPECT_FALSE(g_error_ui);
}
-// Test error ui is presented and acknowledged whe an extension is blocked by
+// Test error ui is presented and acknowledged when an extension is blocked by
// policy.
TEST_F(ExtensionErrorControllerUnitTest, ExtensionIsBlockedByEnterprisePolicy) {
scoped_refptr<const Extension> extension = BuildExtension();
diff --git a/chrome/browser/extensions/extension_error_ui_desktop.cc b/chrome/browser/extensions/extension_error_ui_desktop.cc
index 139b740..bb3f4b9 100644
--- a/chrome/browser/extensions/extension_error_ui_desktop.cc
+++ b/chrome/browser/extensions/extension_error_ui_desktop.cc
@@ -86,7 +86,7 @@
message.reserve(forbidden.size());
// Currently, this ignores the case where there may be an extension that is
- // blockedlisted by enterprise and another extension blocklisted by Safe
+ // blocklisted by enterprise and another extension blocklisted by Safe
// Browsing.
if (item_blocked_by_policy_exists) {
return GenerateEnterpriseMessage(forbidden);
diff --git a/chrome/browser/extensions/extension_gcm_app_handler.cc b/chrome/browser/extensions/extension_gcm_app_handler.cc
index 11f8725c..bd6352e 100644
--- a/chrome/browser/extensions/extension_gcm_app_handler.cc
+++ b/chrome/browser/extensions/extension_gcm_app_handler.cc
@@ -124,7 +124,7 @@
// GCMAccountMapper, which is automatically added and removed by
// GCMDriverDesktop.
//
- // Also note that the GCM message routing will not be interruptted during
+ // Also note that the GCM message routing will not be interrupted during
// the update process since unloading and reloading extension are done in
// the single function ExtensionService::AddExtension.
AddDummyAppHandler();
@@ -135,7 +135,7 @@
weak_factory_.GetWeakPtr()));
}
- // When the extention is being uninstalled, it will be unloaded first. We
+ // When the extension is being uninstalled, it will be unloaded first. We
// should not remove the app handler in this case and it will be handled
// in OnExtensionUninstalled.
if (reason != UnloadedExtensionReason::UNINSTALL)
diff --git a/chrome/browser/extensions/extension_install_prompt.h b/chrome/browser/extensions/extension_install_prompt.h
index 76d1c74..8eb35ff 100644
--- a/chrome/browser/extensions/extension_install_prompt.h
+++ b/chrome/browser/extensions/extension_install_prompt.h
@@ -289,7 +289,7 @@
// Starts the process to show the install dialog. Loads the icon (if `icon` is
// null), sets up the Prompt, and calls `show_dialog_callback` when ready to
// show.
- // `extension` can be null in the case of a bndle install.
+ // `extension` can be null in the case of a bundle install.
// If `icon` is null, this will attempt to load the extension's icon.
// `prompt` is used to pass in a prompt with additional data (like retained
// device permissions) or a different type. If not provided, `prompt` will
diff --git a/chrome/browser/extensions/extension_management_internal.h b/chrome/browser/extensions/extension_management_internal.h
index fbb8ecb..2a9a976 100644
--- a/chrome/browser/extensions/extension_management_internal.h
+++ b/chrome/browser/extensions/extension_management_internal.h
@@ -41,7 +41,7 @@
// Since update URL is not directly associated to extension ID, per-extension
// and per-update-url settings might be enforced at the same time, see per-field
// comments below for details.
-// Some features do not support per-update-url setttings.
+// Some features do not support per-update-url settings.
struct IndividualSettings {
enum ParsingScope {
// Parses the default settings.
diff --git a/chrome/browser/extensions/extension_management_unittest.cc b/chrome/browser/extensions/extension_management_unittest.cc
index cb6be39..f2d39e07 100644
--- a/chrome/browser/extensions/extension_management_unittest.cc
+++ b/chrome/browser/extensions/extension_management_unittest.cc
@@ -1314,7 +1314,7 @@
2, kTargetExtension, Manifest::Type::TYPE_EXTENSION));
EXPECT_TRUE(extension_management_->IsExemptFromMV2DeprecationByPolicy(
2, kTargetExtension, Manifest::Type::TYPE_LOGIN_SCREEN_EXTENSION));
- // Despite being force-installed, hosted apps aren't includede in the
+ // Despite being force-installed, hosted apps aren't included in the
// MV2 deprecation, so isn't exempt by policy.
EXPECT_FALSE(extension_management_->IsExemptFromMV2DeprecationByPolicy(
2, kTargetExtension, Manifest::Type::TYPE_HOSTED_APP));
diff --git a/chrome/browser/extensions/extension_nacl_browsertest.cc b/chrome/browser/extensions/extension_nacl_browsertest.cc
index b345b31..36a9366 100644
--- a/chrome/browser/extensions/extension_nacl_browsertest.cc
+++ b/chrome/browser/extensions/extension_nacl_browsertest.cc
@@ -259,7 +259,7 @@
subframe->GetProcess());
// Insert a plugin element into the subframe. Before the fix from
- // https://crrev.com/2932703005 this would have trigerred a crash reported in
+ // https://crrev.com/2932703005 this would have triggered a crash reported in
// https://crbug.com/728295.
std::string script = R"(
var embed = document.createElement("embed");
diff --git a/chrome/browser/extensions/extension_tab_util.cc b/chrome/browser/extensions/extension_tab_util.cc
index fc375bf..8c59cc8 100644
--- a/chrome/browser/extensions/extension_tab_util.cc
+++ b/chrome/browser/extensions/extension_tab_util.cc
@@ -1030,7 +1030,7 @@
if (web_contents_browser_context == browser_context)
return true;
- // If not it might be to include the incongito mode, so we if the profiles
+ // If not it might be to include the incognito mode, so we if the profiles
// are the same or the parent.
return include_incognito && Profile::FromBrowserContext(browser_context)
->IsSameOrParent(Profile::FromBrowserContext(
diff --git a/chrome/browser/extensions/extension_util_unittest.cc b/chrome/browser/extensions/extension_util_unittest.cc
index a083023..b0de5b3a 100644
--- a/chrome/browser/extensions/extension_util_unittest.cc
+++ b/chrome/browser/extensions/extension_util_unittest.cc
@@ -304,7 +304,7 @@
extension_registry->AddTerminated(policy_extension);
EXPECT_TRUE(util::HasIsolatedStorage(policy_extension_id, signin_profile_));
- // Extension blockedlisted.
+ // Extension blocklisted.
extension_registry->RemoveTerminated(policy_extension_id);
extension_registry->AddBlocklisted(policy_extension);
EXPECT_TRUE(util::HasIsolatedStorage(policy_extension_id, signin_profile_));
diff --git a/chrome/browser/extensions/external_provider_manager.h b/chrome/browser/extensions/external_provider_manager.h
index 73fb0c8..9e72e92 100644
--- a/chrome/browser/extensions/external_provider_manager.h
+++ b/chrome/browser/extensions/external_provider_manager.h
@@ -106,7 +106,7 @@
// Callback for installation finish of an extension from external file, since
// we need to remove this extension from the pending extension manager in case
// of installation failure. This is only a need for extensions installed
- // by file, since extensions installed by URL will be intentinally kept in
+ // by file, since extensions installed by URL will be intentionally kept in
// the manager and retried later.
void InstallationFromExternalFileFinished(
const std::string& extension_id,
diff --git a/chrome/browser/extensions/install_signer.cc b/chrome/browser/extensions/install_signer.cc
index cc45197d..ebd091d 100644
--- a/chrome/browser/extensions/install_signer.cc
+++ b/chrome/browser/extensions/install_signer.cc
@@ -57,7 +57,7 @@
// This allows us to version the format of what we write into the prefs,
// allowing for forward migration, as well as detecting forwards/backwards
-// incompatabilities, etc.
+// incompatibilities, etc.
const int kSignatureFormatVersion = 2;
const size_t kSaltBytes = 32;
@@ -153,7 +153,7 @@
std::unique_ptr<InstallSignature> result =
std::make_unique<InstallSignature>();
- // For now we don't want to support any backwards compability, but in the
+ // For now we don't want to support any backwards compatibility, but in the
// future if we do, we would want to put the migration code here.
if (dict.FindInt(kSignatureFormatVersionKey) != kSignatureFormatVersion)
return nullptr;
diff --git a/chrome/browser/extensions/install_verifier.h b/chrome/browser/extensions/install_verifier.h
index 6083057..f19b1bc 100644
--- a/chrome/browser/extensions/install_verifier.h
+++ b/chrome/browser/extensions/install_verifier.h
@@ -86,7 +86,7 @@
void VerifyAllExtensions();
// Call this to add a set of ids that will immediately be considered allowed,
- // and kick off an aysnchronous request to Add.
+ // and kick off an asynchronous request to Add.
void AddProvisional(const ExtensionIdSet& ids);
// Removes an id or set of ids from the verified list.
diff --git a/chrome/browser/extensions/native_bindings_apitest.cc b/chrome/browser/extensions/native_bindings_apitest.cc
index c7bfa85..bd6a1c1c 100644
--- a/chrome/browser/extensions/native_bindings_apitest.cc
+++ b/chrome/browser/extensions/native_bindings_apitest.cc
@@ -656,7 +656,7 @@
// The above test makes 2 calls to chrome.tabs.create, so check that those
// have been logged in the histograms we expect, but not to the histograms
- // specifcally tracking service worker and MV3 calls.
+ // specifically tracking service worker and MV3 calls.
EXPECT_EQ(2, histogram_tester.GetBucketCount(
"Extensions.Functions.ExtensionCalls",
functions::HistogramValue::TABS_CREATE));
diff --git a/chrome/browser/extensions/omnibox_focus_interactive_test.cc b/chrome/browser/extensions/omnibox_focus_interactive_test.cc
index 64f48525..b171c36 100644
--- a/chrome/browser/extensions/omnibox_focus_interactive_test.cc
+++ b/chrome/browser/extensions/omnibox_focus_interactive_test.cc
@@ -550,7 +550,7 @@
EXPECT_TRUE(ui_test_utils::IsViewFocused(browser(), VIEW_ID_TAB_CONTAINER));
// FencedFrameTestHelper uses eval() function that is blocked by the
- // document's CSP on this page. So need to maually create a fenced frame for
+ // document's CSP on this page. So need to manually create a fenced frame for
// avoiding the CSP policy.
constexpr char kAddFencedFrameScript[] = R"({
const fenced_frame = document.createElement('fencedframe');
diff --git a/chrome/browser/extensions/orb_and_cors_extension_browsertest.cc b/chrome/browser/extensions/orb_and_cors_extension_browsertest.cc
index 9d3aedb..2116f19 100644
--- a/chrome/browser/extensions/orb_and_cors_extension_browsertest.cc
+++ b/chrome/browser/extensions/orb_and_cors_extension_browsertest.cc
@@ -418,7 +418,7 @@
// |url|. Returns the body of the response.
//
// The method below uses "programmatic" (rather than "declarative") way to
- // inject a content script, but the behavior and permissions of the conecnt
+ // inject a content script, but the behavior and permissions of the content
// script should be the same in both cases. See also
// https://developer.chrome.com/extensions/content_scripts#programmatic.
std::string FetchViaContentScript(const GURL& url,
@@ -486,7 +486,7 @@
// Asks the test |extension_| to inject |content_script| into |web_contents|.
//
// This is an implementation of FetchCallback.
- // Returns true if the content script execution started succeessfully.
+ // Returns true if the content script execution started successfully.
bool ExecuteContentScript(content::WebContents* web_contents,
const std::string& content_script) {
int tab_id = ExtensionTabUtil::GetTabId(web_contents);
@@ -503,7 +503,7 @@
// Executes |regular_script| in |web_contents|.
//
// This is an implementation of FetchCallback.
- // Returns true if the script execution started succeessfully.
+ // Returns true if the script execution started successfully.
bool ExecuteRegularScript(content::RenderFrameHost* frame,
const std::string& regular_script) {
content::ExecuteScriptAsync(frame, regular_script);
@@ -520,7 +520,7 @@
// commit is happening.
//
// This is an implementation of FetchCallback.
- // Returns true if the script execution started succeessfully.
+ // Returns true if the script execution started successfully.
bool ExecuteInSrcDocFrame(content::RenderFrameHost* parent_frame,
const std::string& script_to_run_in_subframe) {
static int sequence_id = 0;
@@ -1942,7 +1942,7 @@
// Note that these requests will use the URLLoaderFactory owned by
// ServiceWorkerSubresourceLoader which can be different to the
// network loader factory owned by the ServiceWorker thread (which is
- // used for fetch intiated by the service worker above).
+ // used for fetch initiated by the service worker above).
}); )";
ASSERT_TRUE(RegisterServiceWorkerForExtension(kServiceWorkerScript));
@@ -2194,7 +2194,7 @@
EXPECT_EQ(false, content::EvalJs(active_web_contents(),
kInjectionVerificationScript));
- // Try to fetch a WebUI resource (i.e. verify that the unsucessful content
+ // Try to fetch a WebUI resource (i.e. verify that the unsuccessful content
// script injection above didn't clobber the WebUI-specific URLLoaderFactory).
const char kScript[] = R"(
var img = document.createElement('img');
@@ -2709,7 +2709,7 @@
}
}
-// Similar to FromBackgroundPage_ActiveTabPermission, but focues on interaction
+// Similar to FromBackgroundPage_ActiveTabPermission, but focuses on interaction
// between the regular background page and the separate incognito background
// page in "split" mode.
IN_PROC_BROWSER_TEST_F(OrbAndCorsExtensionBrowserTest,
@@ -2944,7 +2944,7 @@
}
}
-// Similar to FromBackgroundPage_ActiveTabPermission, but focues on behavior
+// Similar to FromBackgroundPage_ActiveTabPermission, but focuses on behavior
// of the background page when it is shared between the regular and the
// incognito profiles in "spanning" mode.
IN_PROC_BROWSER_TEST_F(OrbAndCorsExtensionBrowserTest,
diff --git a/chrome/browser/extensions/script_executor_browsertest.cc b/chrome/browser/extensions/script_executor_browsertest.cc
index 0b18e74..9c3255e7 100644
--- a/chrome/browser/extensions/script_executor_browsertest.cc
+++ b/chrome/browser/extensions/script_executor_browsertest.cc
@@ -287,7 +287,7 @@
{
// Inject two pieces of code. They each evaluate to a promise. The second,
// `kCode2`, evaluates to a promise that resolves immediately, and then
- // asynchronously resovles the promise from the first, `kCode1`, which
+ // asynchronously resolves the promise from the first, `kCode1`, which
// changes the title of the page.
// This guarantees that the renderer code properly waits for *all* results
// to resolve, and not simply the last one.
diff --git a/chrome/browser/extensions/service_worker_apitest.cc b/chrome/browser/extensions/service_worker_apitest.cc
index 65567776..9a7c882a 100644
--- a/chrome/browser/extensions/service_worker_apitest.cc
+++ b/chrome/browser/extensions/service_worker_apitest.cc
@@ -1123,7 +1123,7 @@
IN_PROC_BROWSER_TEST_F(ServiceWorkerTest, FetchArbitraryPaths) {
const Extension* extension = StartTestFromBackgroundPage("fetch.js");
- // Open some arbirary paths. Their contents should be what the service worker
+ // Open some arbitrary paths. Their contents should be what the service worker
// responds with, which in this case is the path of the fetch.
EXPECT_EQ(
"Caught a fetch for /index.html",
diff --git a/chrome/browser/extensions/side_panel_manifest_browsertest.cc b/chrome/browser/extensions/side_panel_manifest_browsertest.cc
index f60acb3..5a45d19 100644
--- a/chrome/browser/extensions/side_panel_manifest_browsertest.cc
+++ b/chrome/browser/extensions/side_panel_manifest_browsertest.cc
@@ -16,7 +16,7 @@
// Succeed when a file exists, when there is a query, or a bookmark.
IN_PROC_BROWSER_TEST_F(SidePanelManifestBrowserTest, ValidateSuccess) {
- // Load the extenesion and a real file for validation.
+ // Load the extension and a real file for validation.
static constexpr char kManifest[] =
R"({
"name": "Test",
diff --git a/chrome/browser/extensions/tab_helper_unittest.cc b/chrome/browser/extensions/tab_helper_unittest.cc
index f81e33f..9935e97 100644
--- a/chrome/browser/extensions/tab_helper_unittest.cc
+++ b/chrome/browser/extensions/tab_helper_unittest.cc
@@ -67,7 +67,7 @@
PermissionsManager* permissions_manager() { return permissions_manager_; }
private:
- // The browser and accompaying window.
+ // The browser and accompanying window.
std::unique_ptr<Browser> browser_;
std::unique_ptr<TestBrowserWindow> browser_window_;
diff --git a/chrome/browser/extensions/test_blocklist_state_fetcher.h b/chrome/browser/extensions/test_blocklist_state_fetcher.h
index 00fe1a84..58bff43 100644
--- a/chrome/browser/extensions/test_blocklist_state_fetcher.h
+++ b/chrome/browser/extensions/test_blocklist_state_fetcher.h
@@ -28,7 +28,7 @@
ClientCRXListInfoResponse_Verdict state);
// Send the appropriate response for the request for extension with id `id`.
- // Return false, if fetcher with fiven id doesn't exist or in case of
+ // Return false, if fetcher with given id doesn't exist or in case of
// incorrect request. Otherwise return true.
bool HandleFetcher(const std::string& id);
diff --git a/chrome/browser/extensions/unpacked_installer.h b/chrome/browser/extensions/unpacked_installer.h
index 4c97855..10db41f 100644
--- a/chrome/browser/extensions/unpacked_installer.h
+++ b/chrome/browser/extensions/unpacked_installer.h
@@ -39,7 +39,7 @@
class PreloadCheckGroup;
// Installs and loads an unpacked extension. Because internal state needs to be
-// held about the instalation process, only one call to Load*() should be made
+// held about the installation process, only one call to Load*() should be made
// per UnpackedInstaller.
// TODO(erikkay): It might be useful to be able to load a packed extension
// (presumably into memory) without installing it.
diff --git a/chrome/browser/extensions/webstore_installer.cc b/chrome/browser/extensions/webstore_installer.cc
index b75cb45..52f71027 100644
--- a/chrome/browser/extensions/webstore_installer.cc
+++ b/chrome/browser/extensions/webstore_installer.cc
@@ -504,7 +504,7 @@
// http://crbug.com/165634
// http://crbug.com/126013
// The current working theory is that one of the many pointers dereferenced in
-// here is occasionally deleted before all of its referers are nullified,
+// here is occasionally deleted before all of its referrers are nullified,
// probably in a callback race. After this comment is released, the crash
// reports should narrow down exactly which pointer it is. Collapsing all the
// early-returns into a single branch makes it hard to see exactly which pointer
diff --git a/chrome/browser/extensions/webstore_installer_browsertest.cc b/chrome/browser/extensions/webstore_installer_browsertest.cc
index 8f6c2ac..9322087 100644
--- a/chrome/browser/extensions/webstore_installer_browsertest.cc
+++ b/chrome/browser/extensions/webstore_installer_browsertest.cc
@@ -253,7 +253,7 @@
content::WebContents* active_web_contents = GetActiveWebContents();
ASSERT_TRUE(active_web_contents);
- // Create an approval that withhelds permissions when the checkbox is not
+ // Create an approval that withholds permissions when the checkbox is not
// selected.
std::unique_ptr<InstallApproval> approval =
InstallApproval::CreateWithNoInstallPrompt(
diff --git a/chrome/browser/extensions/webstore_reinstaller.h b/chrome/browser/extensions/webstore_reinstaller.h
index d521e76..dde6d3c 100644
--- a/chrome/browser/extensions/webstore_reinstaller.h
+++ b/chrome/browser/extensions/webstore_reinstaller.h
@@ -14,7 +14,7 @@
namespace extensions {
// Reinstalls an extension from the webstore. This will first prompt the user if
-// they want to reinstall (using the verbase "Repair", since this is our action
+// they want to reinstall (using the verbiage "Repair", since this is our action
// for repairing corrupted extensions), and, if the user agrees, will uninstall
// the extension and reinstall it directly from the webstore.
class WebstoreReinstaller : public WebstoreStandaloneInstaller,
diff --git a/chrome/browser/extensions/window_controller.h b/chrome/browser/extensions/window_controller.h
index d34070e..2f1509c 100644
--- a/chrome/browser/extensions/window_controller.h
+++ b/chrome/browser/extensions/window_controller.h
@@ -50,7 +50,7 @@
REASON_NOT_EDITABLE,
};
- // A bitmaks used as filter on window types.
+ // A bitmask used as filter on window types.
using TypeFilter = uint32_t;
// Represents the lack of any window filter, implying
diff --git a/extensions/common/manifest_handlers/oauth2_manifest_unittest.cc b/extensions/common/manifest_handlers/oauth2_manifest_unittest.cc
index cc351a4..9c947fc 100644
--- a/extensions/common/manifest_handlers/oauth2_manifest_unittest.cc
+++ b/extensions/common/manifest_handlers/oauth2_manifest_unittest.cc
@@ -116,7 +116,7 @@
// OAuth2 section should be parsed for an extension.
{
base::Value::Dict ext_manifest;
- // Lack of "app" section representa an extension. So the base manifest
+ // Lack of "app" section represents an extension. So the base manifest
// itself represents an extension.
ext_manifest.Merge(base_manifest.Clone());
ext_manifest.Set(keys::kKey, kExtensionKey);