Fix problems found by codespell
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
parent
4ef38e52c2
commit
c93f642c7e
|
|
@ -12,7 +12,7 @@ export HOME="$(getent passwd $USER | cut -d : -f 6)"
|
|||
[[ -n "$UID" ]] || UID=$(getent passwd $USER | cut -d : -f 3)
|
||||
GID=$(getent passwd $USER | cut -d : -f 4)
|
||||
|
||||
# Essential default paths, many are overriden when executing under Cirrus-CI
|
||||
# Essential default paths, many are overridden when executing under Cirrus-CI
|
||||
# others are duplicated here, to assist in debugging.
|
||||
export GOPATH="${GOPATH:-/var/tmp/go}"
|
||||
if type -P go &> /dev/null
|
||||
|
|
|
|||
|
|
@ -75,7 +75,7 @@ The `storage.options` table supports the following options:
|
|||
remap-group = "containers"
|
||||
|
||||
**root-auto-userns-user**=""
|
||||
Root-auto-userns-user is a user name which can be used to look up one or more UID/GID ranges in the /etc/subuid and /etc/subgid file. These ranges will be partioned to containers configured to create automatically a user namespace. Containers configured to automatically create a user namespace can still overlap with containers having an explicit mapping set. This setting is ignored when running as rootless.
|
||||
Root-auto-userns-user is a user name which can be used to look up one or more UID/GID ranges in the /etc/subuid and /etc/subgid file. These ranges will be partitioned to containers configured to create automatically a user namespace. Containers configured to automatically create a user namespace can still overlap with containers having an explicit mapping set. This setting is ignored when running as rootless.
|
||||
|
||||
**auto-userns-min-size**=1024
|
||||
Auto-userns-min-size is the minimum size for a user namespace created automatically.
|
||||
|
|
|
|||
|
|
@ -422,7 +422,7 @@ func subvolLimitQgroup(path string, size uint64) error {
|
|||
|
||||
// subvolQgroupStatus performs a BTRFS_IOC_TREE_SEARCH on the root path
|
||||
// with search key of BTRFS_QGROUP_STATUS_KEY.
|
||||
// In case qgroup is enabled, the retuned key type will match BTRFS_QGROUP_STATUS_KEY.
|
||||
// In case qgroup is enabled, the returned key type will match BTRFS_QGROUP_STATUS_KEY.
|
||||
// For more details please see https://github.com/kdave/btrfs-progs/blob/v4.9/qgroup.c#L1035
|
||||
func subvolQgroupStatus(path string) error {
|
||||
dir, err := openDir(path)
|
||||
|
|
|
|||
|
|
@ -75,7 +75,7 @@ const (
|
|||
maxDepth = 128
|
||||
|
||||
// idLength represents the number of random characters
|
||||
// which can be used to create the unique link identifer
|
||||
// which can be used to create the unique link identifier
|
||||
// for every layer. If this value is too long then the
|
||||
// page size limit for the mount command may be exceeded.
|
||||
// The idLength should be selected such that following equation
|
||||
|
|
|
|||
|
|
@ -28,7 +28,7 @@ STORAGEROOT=$(realpath "$(dirname $0)/../")
|
|||
# else: Assume $PWD is the root of the storage repository
|
||||
[[ "$STORAGEROOT" != "/" ]] || STORAGEROOT=$PWD
|
||||
|
||||
# Command shortcuts save some typing (asumes $STORAGEROOT is subdir of $HOME)
|
||||
# Command shortcuts save some typing (assumes $STORAGEROOT is subdir of $HOME)
|
||||
PGCLOUD="$GCLOUD_SUDO podman run -it --rm -e AS_ID=$UID -e AS_USER=$USER --security-opt label=disable -v $TMPDIR:$HOME -v $HOME/.config/gcloud:$HOME/.config/gcloud -v $HOME/.config/gcloud/ssh:$HOME/.ssh -v $STORAGEROOT:$STORAGEROOT $GCLOUD_IMAGE --configuration=storage --project=$PROJECT"
|
||||
SCP_CMD="$PGCLOUD compute scp"
|
||||
|
||||
|
|
|
|||
|
|
@ -157,7 +157,7 @@ func TestValidateDNSSearch(t *testing.T) {
|
|||
`foo.bar-.baz`,
|
||||
`foo.-bar`,
|
||||
`foo.-bar.baz`,
|
||||
`foo.bar.baz.this.should.fail.on.long.name.beause.it.is.longer.thanisshouldbethis.should.fail.on.long.name.beause.it.is.longer.thanisshouldbethis.should.fail.on.long.name.beause.it.is.longer.thanisshouldbethis.should.fail.on.long.name.beause.it.is.longer.thanisshouldbe`,
|
||||
`foo.bar.baz.this.should.fail.on.long.name.because.it.is.longer.thanisshouldbethis.should.fail.on.long.name.because.it.is.longer.thanisshouldbethis.should.fail.on.long.name.because.it.is.longer.thanisshouldbethis.should.fail.on.long.name.because.it.is.longer.thanisshouldbe`,
|
||||
}
|
||||
|
||||
for _, domain := range valid {
|
||||
|
|
|
|||
|
|
@ -23,7 +23,7 @@ package opts
|
|||
// time="2015-11-06T13:38:37.263626300-08:00" level=debug msg="After setHostConfig"
|
||||
// time="2015-11-06T13:38:37.267631200-08:00" level=debug msg="before createContainerPl...."
|
||||
// time="2015-11-06T13:38:37.271629500-08:00" level=debug msg=ToDiskLocking....
|
||||
// time="2015-11-06T13:38:37.275643200-08:00" level=debug msg="loggin event...."
|
||||
// time="2015-11-06T13:38:37.275643200-08:00" level=debug msg="login event...."
|
||||
// time="2015-11-06T13:38:37.277627600-08:00" level=debug msg="logged event...."
|
||||
// time="2015-11-06T13:38:37.279631800-08:00" level=debug msg="In defer func"
|
||||
// time="2015-11-06T13:38:37.282628100-08:00" level=debug msg="After daemon.create"
|
||||
|
|
|
|||
|
|
@ -12,7 +12,7 @@ import (
|
|||
)
|
||||
|
||||
// DevmapperLogger defines methods required to register as a callback for
|
||||
// logging events recieved from devicemapper. Note that devicemapper will send
|
||||
// logging events received from devicemapper. Note that devicemapper will send
|
||||
// *all* logs regardless to callbacks (including debug logs) so it's
|
||||
// recommended to not spam the console with the outputs.
|
||||
type DevmapperLogger interface {
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@ import (
|
|||
"github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
// PatternMatcher allows checking paths agaist a list of patterns
|
||||
// PatternMatcher allows checking paths against a list of patterns
|
||||
type PatternMatcher struct {
|
||||
patterns []*Pattern
|
||||
exclusions bool
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@ var (
|
|||
)
|
||||
|
||||
func init() {
|
||||
flag.Bool([]string{"#hp", "#-halp"}, false, "display the halp")
|
||||
flag.Bool([]string{"#hp", "#-help"}, false, "display the help")
|
||||
flag.BoolVar(&b, []string{"b", "#bal", "#bol", "-bal"}, false, "a simple bool")
|
||||
flag.BoolVar(&b, []string{"g", "#gil"}, false, "a simple bool")
|
||||
flag.BoolVar(&b2, []string{"#-bool"}, false, "a simple bool")
|
||||
|
|
|
|||
|
|
@ -90,7 +90,7 @@ func RecursiveUnmount(target string) error {
|
|||
if err := Unmount(m.Mountpoint); err != nil && i == len(mounts)-1 {
|
||||
return err
|
||||
// Ignore errors for submounts and continue trying to unmount others
|
||||
// The final unmount should fail if there ane any submounts remaining
|
||||
// The final unmount should fail if there are any submounts remaining
|
||||
}
|
||||
}
|
||||
return nil
|
||||
|
|
|
|||
|
|
@ -112,9 +112,9 @@ func TestShellQuoteArgumentsEmpty(t *testing.T) {
|
|||
|
||||
func TestShellQuoteArguments(t *testing.T) {
|
||||
simpleString := "simpleString"
|
||||
complexString := "This is a 'more' complex $tring with some special char *"
|
||||
complexString := "This is a 'more' complex $string with some special char *"
|
||||
actual := ShellQuoteArguments([]string{simpleString, complexString})
|
||||
expected := "simpleString 'This is a '\\''more'\\'' complex $tring with some special char *'"
|
||||
expected := "simpleString 'This is a '\\''more'\\'' complex $string with some special char *'"
|
||||
if actual != expected {
|
||||
t.Fatalf("Expected \"%v\", got \"%v\"", expected, actual)
|
||||
}
|
||||
|
|
|
|||
|
|
@ -47,7 +47,7 @@ additionalimagestores = [
|
|||
# remap-group = "containers"
|
||||
|
||||
# Root-auto-userns-user is a user name which can be used to look up one or more UID/GID
|
||||
# ranges in the /etc/subuid and /etc/subgid file. These ranges will be partioned
|
||||
# ranges in the /etc/subuid and /etc/subgid file. These ranges will be partitioned
|
||||
# to containers configured to create automatically a user namespace. Containers
|
||||
# configured to automatically create a user namespace can still overlap with containers
|
||||
# having an explicit mapping set.
|
||||
|
|
|
|||
|
|
@ -14,7 +14,7 @@ function execute() {
|
|||
# Tests to run. Defaults to all.
|
||||
TESTS=${@:-.}
|
||||
|
||||
# N/B: Testing in parallel under automation is discourraged in this instance
|
||||
# N/B: Testing in parallel under automation is discouraged in this instance
|
||||
# (so `export JOBS=1`). It has been observed to cause errors on Ubuntu,
|
||||
# and with so few tests here anyway, doesn't save much time (i.e. maybe a
|
||||
# few seconds at most)
|
||||
|
|
|
|||
Loading…
Reference in New Issue