Run codespell on podman

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
Daniel J Walsh
2023-11-06 09:23:16 -06:00
parent d68feff8cc
commit c2de6d34ca
6 changed files with 7 additions and 7 deletions

View File

@ -72,7 +72,7 @@ if [[ "${DISTRO_NV}" == "$PRIOR_FEDORA_NAME" ]]; then
showrun bash ${CIRRUS_WORKING_DIR}/.github/actions/check_cirrus_cron/test.sh
fi
# Note: This may detect leaks, but should not be considered authorative
# Note: This may detect leaks, but should not be considered authoritative
# since any PR could modify the contents or arguments. This check is
# simply here to...
msg "Checking GitLeaks functions with current CLI args, configuration, and baseline JSON"

View File

@ -75,7 +75,7 @@ func (e EventJournalD) Write(ee Event) error {
m["PODMAN_NAME"] = ee.Name
}
// starting with commmit 7e6e267329 we set LogLevel=notice for the systemd healthcheck unit
// starting with commit 7e6e267329 we set LogLevel=notice for the systemd healthcheck unit
// This so it doesn't log the started/stopped unit messages al the time which spam the
// journal if a small interval is used. That however broke the healthcheck event as it no
// longer showed up in podman events when running as root as we only send the event on info

View File

@ -31,7 +31,7 @@ func (ir *ImageEngine) fetchInfo(_ context.Context) (os, arch, variant string, n
platform := strings.SplitN(nativePlatform, "/", 3)
switch len(platform) {
case 0, 1:
return "", "", "", nil, nil, fmt.Errorf("unparseable default platform %q", nativePlatform)
return "", "", "", nil, nil, fmt.Errorf("unparsable default platform %q", nativePlatform)
case 2:
os, arch = platform[0], platform[1]
case 3:

View File

@ -880,7 +880,7 @@ EOF
fi
local net1=a-$(random_string 10)
# use /29 subnet to limt available ip space, a 29 gives 5 useable addresses (6 - 1 for the gw)
# use /29 subnet to limt available ip space, a 29 gives 5 usable addresses (6 - 1 for the gw)
local subnet="$(random_rfc1918_subnet).0/29"
run_podman network create --subnet $subnet $net1
local cname=con-$(random_string 10)
@ -898,7 +898,7 @@ EOF
run_podman inspect --format "{{.RestartCount}}" $cname
assert "$output" == "6" "RestartCount for failing container"
# Now make sure we can still run a contianer with free ips.
# Now make sure we can still run a container with free ips.
run_podman run --rm --network $net1 $IMAGE true
if ! is_rootless; then

View File

@ -411,7 +411,7 @@ _EOF
run_podman rmi -f userimage:latest
}
# Ocassionaly a remnant storage container is left behind which causes
# Occasionally a remnant storage container is left behind which causes
# podman play kube --replace to fail. This tests created a conflicting
# storage container name using buildah to make sure --replace, still
# functions proplery by removing the storage container.

View File

@ -137,7 +137,7 @@ EOF
assert "$output" = "CONF1
CONF2"
# When explicitly turned off, values are replaced/overriden again.
# When explicitly turned off, values are replaced/overridden again.
run_podman 1 --module=$conf1_tmp --module=$conf2_off_tmp run --rm $IMAGE printenv A B
assert "$output" = "CONF2_OFF"
}