From 5f68678db0afdad783e1c63ddadf85de593aadf4 Mon Sep 17 00:00:00 2001 From: Divyansh Joshi Date: Thu, 30 Apr 2026 18:00:29 +0530 Subject: [PATCH] Fix typos in documentation and posts --- _includes/api/en/3x/app-VERB.md | 2 +- _includes/api/en/3x/app-engine.md | 2 +- _includes/api/en/3x/res-download.md | 4 ++-- _includes/readmes/serve-index.md | 4 ++-- _posts/2024-09-29-security-releases.md | 3 +-- _posts/2025-03-31-v5-1-latest-release.md | 4 ++-- 6 files changed, 9 insertions(+), 10 deletions(-) diff --git a/_includes/api/en/3x/app-VERB.md b/_includes/api/en/3x/app-VERB.md index 6e9b0d2759..eecdde2993 100644 --- a/_includes/api/en/3x/app-VERB.md +++ b/_includes/api/en/3x/app-VERB.md @@ -11,7 +11,7 @@ with the route matched. The following snippet illustrates the most simple route definition possible. Express translates the path strings to regular expressions, used internally to match incoming requests. -Query strings are not considered when peforming these matches, for example "GET /" +Query strings are not considered when performing these matches, for example "GET /" would match the following route, as would "GET /?name=tobi". ```js diff --git a/_includes/api/en/3x/app-engine.md b/_includes/api/en/3x/app-engine.md index fcdfd7c9d9..0359d9c829 100644 --- a/_includes/api/en/3x/app-engine.md +++ b/_includes/api/en/3x/app-engine.md @@ -30,7 +30,7 @@ Some template engines do not follow this convention, the consolidate.js library was created to map all of node's popular template engines to follow this convention, thus allowing them to -work seemlessly within Express. +work seamlessly within Express. ```js var engines = require('consolidate') diff --git a/_includes/api/en/3x/res-download.md b/_includes/api/en/3x/res-download.md index 43d48f769d..4cfb5ddf84 100644 --- a/_includes/api/en/3x/res-download.md +++ b/_includes/api/en/3x/res-download.md @@ -3,10 +3,10 @@ Transfer the file at `path` as an "attachment", typically browsers will prompt the user for download. The Content-Disposition "filename=" parameter, aka the one -that will appear in the brower dialog is set to `path` +that will appear in the browser dialog is set to `path` by default, however you may provide an override `filename`. -When an error has ocurred or transfer is complete the optional +When an error has occurred or transfer is complete the optional callback `fn` is invoked. This method uses res.sendfile() to transfer the file. diff --git a/_includes/readmes/serve-index.md b/_includes/readmes/serve-index.md index f720b0d950..3c2febfe0e 100644 --- a/_includes/readmes/serve-index.md +++ b/_includes/readmes/serve-index.md @@ -26,7 +26,7 @@ var serveIndex = require('serve-index') ### serveIndex(path, options) -Returns middlware that serves an index of the directory in the given `path`. +Returns middleware that serves an index of the directory in the given `path`. The `path` is based off the `req.url` value, so a `req.url` of `'/some/dir` with a `path` of `'public'` will look at `'public/some/dir'`. If you are using @@ -148,4 +148,4 @@ are created by/copyright of [FAMFAMFAM](http://www.famfamfam.com/). [downloads-image]: https://img.shields.io/npm/dm/serve-index.svg [downloads-url]: https://npmjs.org/package/serve-index [npm-image]: https://img.shields.io/npm/v/serve-index.svg -[npm-url]: https://npmjs.org/package/serve-index \ No newline at end of file +[npm-url]: https://npmjs.org/package/serve-index diff --git a/_posts/2024-09-29-security-releases.md b/_posts/2024-09-29-security-releases.md index 658fe345f5..9913183819 100644 --- a/_posts/2024-09-29-security-releases.md +++ b/_posts/2024-09-29-security-releases.md @@ -48,7 +48,7 @@ basic-auth-connect `<1.1.0` uses a timing-unsafe equality comparison that can le **Patched versions** - `>=1.1.0` -This vulnerability was discovered during the [OSTIF audit to Express](https://github.com/expressjs/security-wg/issues/6) and was mitigated by [the Express Securty triage team](https://github.com/expressjs/security-wg?tab=readme-ov-file#security-triage-team). +This vulnerability was discovered during the [OSTIF audit to Express](https://github.com/expressjs/security-wg/issues/6) and was mitigated by [the Express Security triage team](https://github.com/expressjs/security-wg?tab=readme-ov-file#security-triage-team). More details area available in [GHSA-7p89-p6hx-q4fw](https://github.com/expressjs/basic-auth-connect/security/advisories/GHSA-7p89-p6hx-q4fw) @@ -134,4 +134,3 @@ Because JavaScript is single-threaded and regex matching runs on the main thread Thanks to [Blake Embrey](https://github.com/blakeembrey) who reported and created the security patch. For more details, see [GHSA-9wv6-86v2-598j](https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598j) - diff --git a/_posts/2025-03-31-v5-1-latest-release.md b/_posts/2025-03-31-v5-1-latest-release.md index bb2b473ab2..fdd93503c0 100644 --- a/_posts/2025-03-31-v5-1-latest-release.md +++ b/_posts/2025-03-31-v5-1-latest-release.md @@ -115,8 +115,8 @@ starts the clock on EOL for v4 by moving it to `MAINTENANCE`. We recognize that only major version for most of the history of Node.js itself. Because of this, we want to remain flexible and also provide a bit longer support. We want to do what is best for the ecosystem, so consider these goals not commitments. -\*: v4 is a special case, and we may extend MAINTENENCE support -\*\*: v5 MAINTENENCE and EOL dates are determined by when v6 is released, these dates reflect the earliest dates if we +\*: v4 is a special case, and we may extend MAINTENANCE support +\*\*: v5 MAINTENANCE and EOL dates are determined by when v6 is released, these dates reflect the earliest dates if we were to ship v6 on 2025-10-01 \*\*\* : v6 work has not officially started yet, this is simply the earliest date we can ship based on our proposed policy