From 5ef2dc317d49453153855f106fa098625b6e55ae Mon Sep 17 00:00:00 2001 From: Haelwenn Date: Sun, 31 Jul 2022 21:34:23 +0000 Subject: [PATCH] Change test case wording --- test/pleroma/web/twitter_api/util_controller_test.exs | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/test/pleroma/web/twitter_api/util_controller_test.exs b/test/pleroma/web/twitter_api/util_controller_test.exs index 7d7eb39ff..5dc72b177 100644 --- a/test/pleroma/web/twitter_api/util_controller_test.exs +++ b/test/pleroma/web/twitter_api/util_controller_test.exs @@ -553,7 +553,7 @@ test "with proper permissions and invalid password", %{conn: conn} do assert json_response_and_validate_schema(conn, 200) == %{"error" => "Invalid password."} end - test "with proper permissions, valid password and target account does not alias this", + test "with proper permissions, valid password and target account does not alias it", %{ conn: conn } do @@ -592,7 +592,7 @@ test "with proper permissions, valid password and target account does not exist" } end - test "with proper permissions, valid password, remote target account aliases this and local cache does not exist", + test "with proper permissions, valid password, remote target account aliases it and local cache does not exist", %{} do user = insert(:user, ap_id: "https://lm.kazv.moe/users/testuser") %{user: _user, conn: conn} = oauth_access(["write:accounts"], user: user) @@ -610,7 +610,7 @@ test "with proper permissions, valid password, remote target account aliases thi assert json_response_and_validate_schema(conn, 200) == %{"status" => "success"} end - test "with proper permissions, valid password, remote target account aliases this and local cache does not alias this", + test "with proper permissions, valid password, remote target account aliases it and local cache does not aliases it", %{} do user = insert(:user, ap_id: "https://lm.kazv.moe/users/testuser") %{user: _user, conn: conn} = oauth_access(["write:accounts"], user: user) @@ -636,7 +636,7 @@ test "with proper permissions, valid password, remote target account aliases thi assert json_response_and_validate_schema(conn, 200) == %{"status" => "success"} end - test "with proper permissions, valid password, remote target account does not alias this and local cache aliases this", + test "with proper permissions, valid password, remote target account does not aliases it and local cache aliases it", %{ user: user, conn: conn @@ -665,7 +665,7 @@ test "with proper permissions, valid password, remote target account does not al } end - test "with proper permissions, valid password and target account aliases this", %{ + test "with proper permissions, valid password and target account aliases it", %{ conn: conn, user: user } do