Run codespell on source
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
		
							parent
							
								
									590445ce9d
								
							
						
					
					
						commit
						7768cf235e
					
				
							
								
								
									
										2
									
								
								Makefile
								
								
								
								
							
							
						
						
									
										2
									
								
								Makefile
								
								
								
								
							|  | @ -309,7 +309,7 @@ test/version/version: version/version.go | |||
| 
 | ||||
| .PHONY: codespell | ||||
| codespell: | ||||
| 	codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"*.fish,RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,swagger.yaml,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L secon,passt,bu,hastable,te,clos,ans,pullrequest,uint,iff,od,seeked,splitted,marge,erro,hist,ether,specif -w | ||||
| 	codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"*.fish,RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,swagger.yaml,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L ddress,secon,passt,bu,hastable,te,clos,ans,pullrequest,uint,iff,od,seeked,splitted,marge,erro,hist,ether,specif -w | ||||
| 
 | ||||
| # Code validation target that **DOES NOT** require building podman binaries
 | ||||
| .PHONY: validate-source | ||||
|  |  | |||
|  | @ -94,7 +94,7 @@ The installer includes a C program that checks the installation of the | |||
| pre-required virtualization providers (WSL or Hyper-V). Building this program | ||||
| requires the | ||||
| [Microsoft C/C++ compiler](https://learn.microsoft.com/en-us/cpp/build/building-on-the-command-line?view=msvc-170) and the | ||||
| [PowerShell Moduel VSSetup](https://github.com/microsoft/vssetup.powershell): | ||||
| [PowerShell Module VSSetup](https://github.com/microsoft/vssetup.powershell): | ||||
| 
 | ||||
| 1. Download the Build Tools for Visual Studio 2022 installer | ||||
| ```pwsh | ||||
|  |  | |||
|  | @ -396,7 +396,7 @@ case "$TEST_FLAVOR" in | |||
|         showrun make .install.ginkgo | ||||
|         ;& | ||||
|     sys) | ||||
|         # when run nighlty check for system test leaks | ||||
|         # when run nightly check for system test leaks | ||||
|         # shellcheck disable=SC2154 | ||||
|         if [[ "$CIRRUS_CRON" != '' ]]; then | ||||
|             export PODMAN_BATS_LEAK_CHECK=1 | ||||
|  |  | |||
|  | @ -1422,7 +1422,7 @@ Valid options for `[Build]` are listed below: | |||
| Add an image *annotation* (e.g. annotation=*value*) to the image metadata. Can be used multiple | ||||
| times. | ||||
| 
 | ||||
| This is equivalant to the `--annotation` option of `podman build`. | ||||
| This is equivalent to the `--annotation` option of `podman build`. | ||||
| 
 | ||||
| ### `Arch=` | ||||
| 
 | ||||
|  | @ -1631,7 +1631,7 @@ particularly interesting when using special options to control image pulls. | |||
| Note: The generated service have a dependency on `network-online.target` assuring the network is reachable if | ||||
| an image needs to be pulled. | ||||
| If the image service needs to run without available network (e.g. early in boot), the requirement can be | ||||
| overriden simply by adding an empty `After=` in the unit file. This will unset all previously set After's. | ||||
| overridden simply by adding an empty `After=` in the unit file. This will unset all previously set After's. | ||||
| 
 | ||||
| Valid options for `[Image]` are listed below: | ||||
| 
 | ||||
|  |  | |||
|  | @ -122,7 +122,7 @@ func (c *Container) Start(ctx context.Context, recursive bool) (finalErr error) | |||
| 
 | ||||
| // Update updates the given container.
 | ||||
| // Either resource limits or restart policy can be updated.
 | ||||
| // Either resourcs or restartPolicy must not be nil.
 | ||||
| // Either resources or restartPolicy must not be nil.
 | ||||
| // If restartRetries is not nil, restartPolicy must be set and must be "on-failure".
 | ||||
| func (c *Container) Update(resources *spec.LinuxResources, restartPolicy *string, restartRetries *uint) error { | ||||
| 	if !c.batched { | ||||
|  |  | |||
|  | @ -740,7 +740,7 @@ func BuildImage(w http.ResponseWriter, r *http.Request) { | |||
| 
 | ||||
| 	platforms := query.Platform | ||||
| 	if len(platforms) == 1 { | ||||
| 		// Docker API uses comma sperated platform arg so match this here
 | ||||
| 		// Docker API uses comma separated platform arg so match this here
 | ||||
| 		platforms = strings.Split(query.Platform[0], ",") | ||||
| 	} | ||||
| 	for _, platformSpec := range platforms { | ||||
|  |  | |||
|  | @ -139,7 +139,7 @@ func GenerateSystemDFilesForVirtiofsMounts(mounts []machine.VirtIoFs) ([]ignitio | |||
| 	return unitFiles, nil | ||||
| } | ||||
| 
 | ||||
| // StartGenericAppleVM is wrappered by apple provider methods and starts the vm
 | ||||
| // StartGenericAppleVM is wrapped by apple provider methods and starts the vm
 | ||||
| func StartGenericAppleVM(mc *vmconfigs.MachineConfig, cmdBinary string, bootloader vfConfig.Bootloader, endpoint string) (func() error, func() error, error) { | ||||
| 	var ( | ||||
| 		ignitionSocket *define.VMFile | ||||
|  | @ -366,7 +366,7 @@ func CheckProcessRunning(processName string, pid int) error { | |||
| 	return nil | ||||
| } | ||||
| 
 | ||||
| // StartGenericNetworking is wrappered by apple provider methods
 | ||||
| // StartGenericNetworking is wrapped by apple provider methods
 | ||||
| func StartGenericNetworking(mc *vmconfigs.MachineConfig, cmd *gvproxy.GvproxyCommand) error { | ||||
| 	gvProxySock, err := mc.GVProxySocket() | ||||
| 	if err != nil { | ||||
|  |  | |||
|  | @ -178,7 +178,7 @@ func (o *OCIArtifactDisk) get() (func(), error) { | |||
| 
 | ||||
| func (o *OCIArtifactDisk) cleanCache(cachedImagePath string) func() { | ||||
| 	// cache miss while using an image that we cache, ie the default image
 | ||||
| 	// clean out all old files fron the cache dir
 | ||||
| 	// clean out all old files from the cache dir
 | ||||
| 	if o.cache { | ||||
| 		files, err := os.ReadDir(o.dirs.ImageCacheDir.GetPath()) | ||||
| 		if err != nil { | ||||
|  |  | |||
|  | @ -539,7 +539,7 @@ EOF | |||
|     hostfs=$(stat -f -c %T $output) | ||||
| 
 | ||||
|     # stat -f -c %T seems to just return unknown for our normal bind mount for some reason. | ||||
|     # Therfore manually parse /proc/mounts to get the real fs for the bind mount. | ||||
|     # Therefore manually parse /proc/mounts to get the real fs for the bind mount. | ||||
|     CONTAINERS_CONF_OVERRIDE="$containersconf" run_podman run --image-volume anonymous --rm volume_image \ | ||||
|         sh -c "grep ' /data ' /proc/mounts | cut -f3 -d' '" | ||||
|     assert "$output" == "$hostfs" "Should match hosts graphroot fs" | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue