diff --git a/cli/tsc/00_typescript.js b/cli/tsc/00_typescript.js index ea64a5896d..a9ad0713b7 100644 --- a/cli/tsc/00_typescript.js +++ b/cli/tsc/00_typescript.js @@ -150636,7 +150636,7 @@ ${newComment.split("\n").map((c) => ` * ${c}`).join("\n")} break; case 3 /* CommonJS */: case 2 /* Namespace */: - Debug.assert(entry.namespaceLikeImport === void 0 || entry.namespaceLikeImport.name === symbolName2, "Namespacelike import shoudl be missing or match symbolName"); + Debug.assert(entry.namespaceLikeImport === void 0 || entry.namespaceLikeImport.name === symbolName2, "Namespacelike import should be missing or match symbolName"); entry.namespaceLikeImport = { importKind, name: symbolName2, addAsTypeOnly }; break; } diff --git a/ext/cron/01_cron.ts b/ext/cron/01_cron.ts index 3341d1a78c..7592e75ef5 100644 --- a/ext/cron/01_cron.ts +++ b/ext/cron/01_cron.ts @@ -69,7 +69,7 @@ export function parseScheduleToString( // Automatically override unspecified values for convenience. For example, // to run every 2 hours, `{ hour: { every: 2 } }` can be specified without - // explicitely specifying `minute`. + // explicitly specifying `minute`. if (minute !== undefined) { // Nothing to override. } else if (hour !== undefined) { diff --git a/ext/node/ops/os/cpus.rs b/ext/node/ops/os/cpus.rs index bf83f7e7d5..2e3d2a954e 100644 --- a/ext/node/ops/os/cpus.rs +++ b/ext/node/ops/os/cpus.rs @@ -240,7 +240,7 @@ pub fn cpu_info() -> Option> { pub fn cpu_info() -> Option> { use std::io::BufRead; - let mut cpus = vec![CpuInfo::new(); 8192]; /* Kernel maxmimum */ + let mut cpus = vec![CpuInfo::new(); 8192]; /* Kernel maximum */ let fp = std::fs::File::open("/proc/stat").ok()?; let reader = std::io::BufReader::new(fp); diff --git a/tests/testdata/fmt/with_config/subdir/c.md b/tests/testdata/fmt/with_config/subdir/c.md index 012f7e3d49..70a426af23 100644 --- a/tests/testdata/fmt/with_config/subdir/c.md +++ b/tests/testdata/fmt/with_config/subdir/c.md @@ -5,7 +5,7 @@ unless you specifically enable it, a program run with Deno has no file, network, or environment access. Access to security sensitive functionality -requires that permisisons have been +requires that permissions have been granted to an executing script through command line flags, or a runtime permission prompt.