Run codespell on source

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
Daniel J Walsh 2024-07-22 16:54:44 -04:00
parent 590445ce9d
commit 7768cf235e
No known key found for this signature in database
GPG Key ID: A2DF901DABE2C028
9 changed files with 11 additions and 11 deletions

View File

@ -309,7 +309,7 @@ test/version/version: version/version.go
.PHONY: codespell .PHONY: codespell
codespell: codespell:
codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"*.fish,RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,swagger.yaml,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L secon,passt,bu,hastable,te,clos,ans,pullrequest,uint,iff,od,seeked,splitted,marge,erro,hist,ether,specif -w codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"*.fish,RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,swagger.yaml,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L ddress,secon,passt,bu,hastable,te,clos,ans,pullrequest,uint,iff,od,seeked,splitted,marge,erro,hist,ether,specif -w
# Code validation target that **DOES NOT** require building podman binaries # Code validation target that **DOES NOT** require building podman binaries
.PHONY: validate-source .PHONY: validate-source

View File

@ -94,7 +94,7 @@ The installer includes a C program that checks the installation of the
pre-required virtualization providers (WSL or Hyper-V). Building this program pre-required virtualization providers (WSL or Hyper-V). Building this program
requires the requires the
[Microsoft C/C++ compiler](https://learn.microsoft.com/en-us/cpp/build/building-on-the-command-line?view=msvc-170) and the [Microsoft C/C++ compiler](https://learn.microsoft.com/en-us/cpp/build/building-on-the-command-line?view=msvc-170) and the
[PowerShell Moduel VSSetup](https://github.com/microsoft/vssetup.powershell): [PowerShell Module VSSetup](https://github.com/microsoft/vssetup.powershell):
1. Download the Build Tools for Visual Studio 2022 installer 1. Download the Build Tools for Visual Studio 2022 installer
```pwsh ```pwsh

View File

@ -396,7 +396,7 @@ case "$TEST_FLAVOR" in
showrun make .install.ginkgo showrun make .install.ginkgo
;& ;&
sys) sys)
# when run nighlty check for system test leaks # when run nightly check for system test leaks
# shellcheck disable=SC2154 # shellcheck disable=SC2154
if [[ "$CIRRUS_CRON" != '' ]]; then if [[ "$CIRRUS_CRON" != '' ]]; then
export PODMAN_BATS_LEAK_CHECK=1 export PODMAN_BATS_LEAK_CHECK=1

View File

@ -1422,7 +1422,7 @@ Valid options for `[Build]` are listed below:
Add an image *annotation* (e.g. annotation=*value*) to the image metadata. Can be used multiple Add an image *annotation* (e.g. annotation=*value*) to the image metadata. Can be used multiple
times. times.
This is equivalant to the `--annotation` option of `podman build`. This is equivalent to the `--annotation` option of `podman build`.
### `Arch=` ### `Arch=`
@ -1631,7 +1631,7 @@ particularly interesting when using special options to control image pulls.
Note: The generated service have a dependency on `network-online.target` assuring the network is reachable if Note: The generated service have a dependency on `network-online.target` assuring the network is reachable if
an image needs to be pulled. an image needs to be pulled.
If the image service needs to run without available network (e.g. early in boot), the requirement can be If the image service needs to run without available network (e.g. early in boot), the requirement can be
overriden simply by adding an empty `After=` in the unit file. This will unset all previously set After's. overridden simply by adding an empty `After=` in the unit file. This will unset all previously set After's.
Valid options for `[Image]` are listed below: Valid options for `[Image]` are listed below:

View File

@ -122,7 +122,7 @@ func (c *Container) Start(ctx context.Context, recursive bool) (finalErr error)
// Update updates the given container. // Update updates the given container.
// Either resource limits or restart policy can be updated. // Either resource limits or restart policy can be updated.
// Either resourcs or restartPolicy must not be nil. // Either resources or restartPolicy must not be nil.
// If restartRetries is not nil, restartPolicy must be set and must be "on-failure". // If restartRetries is not nil, restartPolicy must be set and must be "on-failure".
func (c *Container) Update(resources *spec.LinuxResources, restartPolicy *string, restartRetries *uint) error { func (c *Container) Update(resources *spec.LinuxResources, restartPolicy *string, restartRetries *uint) error {
if !c.batched { if !c.batched {

View File

@ -740,7 +740,7 @@ func BuildImage(w http.ResponseWriter, r *http.Request) {
platforms := query.Platform platforms := query.Platform
if len(platforms) == 1 { if len(platforms) == 1 {
// Docker API uses comma sperated platform arg so match this here // Docker API uses comma separated platform arg so match this here
platforms = strings.Split(query.Platform[0], ",") platforms = strings.Split(query.Platform[0], ",")
} }
for _, platformSpec := range platforms { for _, platformSpec := range platforms {

View File

@ -139,7 +139,7 @@ func GenerateSystemDFilesForVirtiofsMounts(mounts []machine.VirtIoFs) ([]ignitio
return unitFiles, nil return unitFiles, nil
} }
// StartGenericAppleVM is wrappered by apple provider methods and starts the vm // StartGenericAppleVM is wrapped by apple provider methods and starts the vm
func StartGenericAppleVM(mc *vmconfigs.MachineConfig, cmdBinary string, bootloader vfConfig.Bootloader, endpoint string) (func() error, func() error, error) { func StartGenericAppleVM(mc *vmconfigs.MachineConfig, cmdBinary string, bootloader vfConfig.Bootloader, endpoint string) (func() error, func() error, error) {
var ( var (
ignitionSocket *define.VMFile ignitionSocket *define.VMFile
@ -366,7 +366,7 @@ func CheckProcessRunning(processName string, pid int) error {
return nil return nil
} }
// StartGenericNetworking is wrappered by apple provider methods // StartGenericNetworking is wrapped by apple provider methods
func StartGenericNetworking(mc *vmconfigs.MachineConfig, cmd *gvproxy.GvproxyCommand) error { func StartGenericNetworking(mc *vmconfigs.MachineConfig, cmd *gvproxy.GvproxyCommand) error {
gvProxySock, err := mc.GVProxySocket() gvProxySock, err := mc.GVProxySocket()
if err != nil { if err != nil {

View File

@ -178,7 +178,7 @@ func (o *OCIArtifactDisk) get() (func(), error) {
func (o *OCIArtifactDisk) cleanCache(cachedImagePath string) func() { func (o *OCIArtifactDisk) cleanCache(cachedImagePath string) func() {
// cache miss while using an image that we cache, ie the default image // cache miss while using an image that we cache, ie the default image
// clean out all old files fron the cache dir // clean out all old files from the cache dir
if o.cache { if o.cache {
files, err := os.ReadDir(o.dirs.ImageCacheDir.GetPath()) files, err := os.ReadDir(o.dirs.ImageCacheDir.GetPath())
if err != nil { if err != nil {

View File

@ -539,7 +539,7 @@ EOF
hostfs=$(stat -f -c %T $output) hostfs=$(stat -f -c %T $output)
# stat -f -c %T seems to just return unknown for our normal bind mount for some reason. # stat -f -c %T seems to just return unknown for our normal bind mount for some reason.
# Therfore manually parse /proc/mounts to get the real fs for the bind mount. # Therefore manually parse /proc/mounts to get the real fs for the bind mount.
CONTAINERS_CONF_OVERRIDE="$containersconf" run_podman run --image-volume anonymous --rm volume_image \ CONTAINERS_CONF_OVERRIDE="$containersconf" run_podman run --image-volume anonymous --rm volume_image \
sh -c "grep ' /data ' /proc/mounts | cut -f3 -d' '" sh -c "grep ' /data ' /proc/mounts | cut -f3 -d' '"
assert "$output" == "$hostfs" "Should match hosts graphroot fs" assert "$output" == "$hostfs" "Should match hosts graphroot fs"