Run codespell on code

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
Daniel J Walsh
2022-01-21 07:02:54 -05:00
parent c6fd8a4212
commit 5736649eb8
13 changed files with 15 additions and 15 deletions

View File

@ -282,7 +282,7 @@ test/version/version: .gopathok version/version.go
.PHONY: codespell .PHONY: codespell
codespell: codespell:
codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L uint,iff,od,seeked,splitted,marge,ERRO,hist,ether -w codespell -S bin,vendor,.git,go.sum,.cirrus.yml,"RELEASE_NOTES.md,*.xz,*.gz,*.ps1,*.tar,swagger.yaml,*.tgz,bin2img,*ico,*.png,*.1,*.5,copyimg,*.orig,apidoc.go" -L uint,iff,od,seeked,splitted,marge,ERRO,hist,ether -w
.PHONY: validate .PHONY: validate
validate: gofmt lint .gitvalidation validate.completions man-page-check swagger-check tests-included tests-expect-exit validate: gofmt lint .gitvalidation validate.completions man-page-check swagger-check tests-included tests-expect-exit

View File

@ -32,7 +32,7 @@ Valid placeholders for the Go template are listed below:
| .DiskSize | Disk size of machine | | .DiskSize | Disk size of machine |
| .LastUp | Time machine was last up | | .LastUp | Time machine was last up |
| .LastUp | Time since the VM was last run | | .LastUp | Time since the VM was last run |
| .Memory | Allocated memeory for machine | | .Memory | Allocated memory for machine |
| .Name | VM name | | .Name | VM name |
| .Running | Is machine running | | .Running | Is machine running |
| .Stream | Stream name | | .Stream | Stream name |

View File

@ -274,7 +274,7 @@ func (c *Container) GetInspectMounts(namedVolumes []*ContainerNamedVolume, image
return inspectMounts, nil return inspectMounts, nil
} }
// GetSecurityOptions retrives and returns the security related annotations and process information upon inspection // GetSecurityOptions retrieves and returns the security related annotations and process information upon inspection
func (c *Container) GetSecurityOptions() []string { func (c *Container) GetSecurityOptions() []string {
ctrSpec := c.config.Spec ctrSpec := c.config.Spec
SecurityOpt := []string{} SecurityOpt := []string{}

View File

@ -31,7 +31,7 @@ var largeAuthFileValues = map[string]types.DockerAuthConfig{
// systemContextForAuthFile returns a types.SystemContext with AuthFilePath pointing // systemContextForAuthFile returns a types.SystemContext with AuthFilePath pointing
// to a temporary file with fileContents, or nil if fileContents is empty; and a cleanup // to a temporary file with fileContents, or nil if fileContents is empty; and a cleanup
// function the calle rmust arrange to call. // function the caller must arrange to call.
func systemContextForAuthFile(t *testing.T, fileContents string) (*types.SystemContext, func()) { func systemContextForAuthFile(t *testing.T, fileContents string) (*types.SystemContext, func()) {
if fileContents == "" { if fileContents == "" {
return nil, func() {} return nil, func() {}

View File

@ -714,7 +714,7 @@ var _ = Describe("Podman containers ", func() {
var name = "top" var name = "top"
cid, err := bt.RunTopContainer(&name, nil) cid, err := bt.RunTopContainer(&name, nil)
Expect(err).To(BeNil()) Expect(err).To(BeNil())
// Forcably Removing running container should succeed // Forcibly Removing running container should succeed
rmResponse, err := containers.Remove(bt.conn, cid, new(containers.RemoveOptions).WithForce(true)) rmResponse, err := containers.Remove(bt.conn, cid, new(containers.RemoveOptions).WithForce(true))
Expect(err).To(BeNil()) Expect(err).To(BeNil())
Expect(len(reports.RmReportsErrs(rmResponse))).To(Equal(0)) Expect(len(reports.RmReportsErrs(rmResponse))).To(Equal(0))

View File

@ -567,7 +567,7 @@ func installWslKernel() error {
} }
// In case of unusual circumstances (e.g. race with installer actions) // In case of unusual circumstances (e.g. race with installer actions)
// retry a few times // retry a few times
message = "An error occured attempting the WSL Kernel update, retrying..." message = "An error occurred attempting the WSL Kernel update, retrying..."
fmt.Println(message) fmt.Println(message)
fmt.Fprintln(log, message) fmt.Fprintln(log, message)
time.Sleep(backoff) time.Sleep(backoff)

View File

@ -94,7 +94,7 @@ type PodNetworkConfig struct {
// Only available if NetNS is set to Bridge or Slirp. // Only available if NetNS is set to Bridge or Slirp.
// Optional. // Optional.
PortMappings []types.PortMapping `json:"portmappings,omitempty"` PortMappings []types.PortMapping `json:"portmappings,omitempty"`
// Map of networks names ot ids the container should join to. // Map of networks names to ids the container should join to.
// You can request additional settings for each network, you can // You can request additional settings for each network, you can
// set network aliases, static ips, static mac address and the // set network aliases, static ips, static mac address and the
// network interface name for this container on the specific network. // network interface name for this container on the specific network.

View File

@ -223,7 +223,7 @@ type ContainerStorageConfig struct {
// Conflicts with Image. // Conflicts with Image.
// At least one of Image or Rootfs must be specified. // At least one of Image or Rootfs must be specified.
Rootfs string `json:"rootfs,omitempty"` Rootfs string `json:"rootfs,omitempty"`
// RootfsOverlay tells if rootfs is actuall an overlay on top of base path // RootfsOverlay tells if rootfs is actually an overlay on top of base path
RootfsOverlay bool `json:"rootfs_overlay,omitempty"` RootfsOverlay bool `json:"rootfs_overlay,omitempty"`
// ImageVolumeMode indicates how image volumes will be created. // ImageVolumeMode indicates how image volumes will be created.
// Supported modes are "ignore" (do not create), "tmpfs" (create as // Supported modes are "ignore" (do not create), "tmpfs" (create as
@ -423,7 +423,7 @@ type ContainerNetworkConfig struct {
// PublishExposedPorts is set. // PublishExposedPorts is set.
// Optional. // Optional.
Expose map[uint16]string `json:"expose,omitempty"` Expose map[uint16]string `json:"expose,omitempty"`
// Map of networks names ot ids the container should join to. // Map of networks names or ids that the container should join.
// You can request additional settings for each network, you can // You can request additional settings for each network, you can
// set network aliases, static ips, static mac address and the // set network aliases, static ips, static mac address and the
// network interface name for this container on the specific network. // network interface name for this container on the specific network.

View File

@ -893,7 +893,7 @@ func parseSecrets(secrets []string) ([]specgen.Secret, map[string]string, error)
source = kv[1] source = kv[1]
case "type": case "type":
if secretType != "" { if secretType != "" {
return nil, nil, errors.Wrap(secretParseError, "cannot set more tha one secret type") return nil, nil, errors.Wrap(secretParseError, "cannot set more than one secret type")
} }
if kv[1] != "mount" && kv[1] != "env" { if kv[1] != "mount" && kv[1] != "env" {
return nil, nil, errors.Wrapf(secretParseError, "type %s is invalid", kv[1]) return nil, nil, errors.Wrapf(secretParseError, "type %s is invalid", kv[1])

View File

@ -173,7 +173,7 @@ LABEL marge=mom
err = writeYaml(testYAML, filepath.Join(yamlDir, "top.yaml")) err = writeYaml(testYAML, filepath.Join(yamlDir, "top.yaml"))
Expect(err).To(BeNil()) Expect(err).To(BeNil())
// build an image called foobar but make sure it doesnt have // build an image called foobar but make sure it doesn't have
// the same label as the yaml buildfile, so we can check that // the same label as the yaml buildfile, so we can check that
// the image is NOT rebuilt. // the image is NOT rebuilt.
err = writeYaml(prebuiltImage, filepath.Join(yamlDir, "Containerfile")) err = writeYaml(prebuiltImage, filepath.Join(yamlDir, "Containerfile"))
@ -220,7 +220,7 @@ LABEL marge=mom
err = writeYaml(testYAML, filepath.Join(yamlDir, "top.yaml")) err = writeYaml(testYAML, filepath.Join(yamlDir, "top.yaml"))
Expect(err).To(BeNil()) Expect(err).To(BeNil())
// build an image called foobar but make sure it doesnt have // build an image called foobar but make sure it doesn't have
// the same label as the yaml buildfile, so we can check that // the same label as the yaml buildfile, so we can check that
// the image is NOT rebuilt. // the image is NOT rebuilt.
err = writeYaml(prebuiltImage, filepath.Join(yamlDir, "Containerfile")) err = writeYaml(prebuiltImage, filepath.Join(yamlDir, "Containerfile"))

View File

@ -144,7 +144,7 @@ var _ = Describe("Podman volume create", func() {
Expect(inspectGID).Should(Exit(0)) Expect(inspectGID).Should(Exit(0))
Expect(inspectGID.OutputToString()).To(Equal(gid)) Expect(inspectGID.OutputToString()).To(Equal(gid))
// options should containt `uid=3000,gid=4000:3000:4000` // options should contain `uid=3000,gid=4000:3000:4000`
optionFormat := `{{ .Options.o }}:{{ .Options.UID }}:{{ .Options.GID }}` optionFormat := `{{ .Options.o }}:{{ .Options.UID }}:{{ .Options.GID }}`
optionStrFormatExpect := fmt.Sprintf(`uid=%s,gid=%s:%s:%s`, uid, gid, uid, gid) optionStrFormatExpect := fmt.Sprintf(`uid=%s,gid=%s:%s:%s`, uid, gid, uid, gid)
inspectOpts := podmanTest.Podman([]string{"volume", "inspect", "--format", optionFormat, volName}) inspectOpts := podmanTest.Podman([]string{"volume", "inspect", "--format", optionFormat, volName})

View File

@ -375,7 +375,7 @@ NeedsChown | true
run_podman run --rm --volume $myvolume:/etc $IMAGE ls /etc/passwd run_podman run --rm --volume $myvolume:/etc $IMAGE ls /etc/passwd
run_podman volume inspect --format '{{ .NeedsCopyUp }}' $myvolume run_podman volume inspect --format '{{ .NeedsCopyUp }}' $myvolume
is "${output}" "false" "If content in dest '/etc' non-empty NeedsCopyUP should still have happend and be false" is "${output}" "false" "If content in dest '/etc' non-empty NeedsCopyUP should still have happened and be false"
run_podman volume inspect --format '{{.Mountpoint}}' $myvolume run_podman volume inspect --format '{{.Mountpoint}}' $myvolume
mountpoint="$output" mountpoint="$output"

View File

@ -689,7 +689,7 @@ file `/etc/systemd/system/user@.service.d/delegate.conf` with the contents:
[Service] [Service]
Delegate=memory pids cpu io Delegate=memory pids cpu io
After logging out and loggin back in, you should have permission to set CPU After logging out and logging back in, you should have permission to set CPU
limits. limits.
### 26) `exec container process '/bin/sh': Exec format error` (or another binary than `bin/sh`) ### 26) `exec container process '/bin/sh': Exec format error` (or another binary than `bin/sh`)