Skip to content

Commit d95abb1

Browse files
authored
Merge pull request #818 from mr-raj12/fix/spelling-typos-across-codebase
Fix spelling typos in docs, source, and scripts
2 parents b346e68 + 4350298 commit d95abb1

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+115
-115
lines changed

clearcode/cdutils.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
from packageurl import PackageURL
3535

3636
"""
37-
ClearlyDefined utlities.
37+
ClearlyDefined utilities.
3838
"""
3939

4040
TRACE_FETCH = False
@@ -532,7 +532,7 @@ def str2coord(s):
532532
segments = s.strip(splitter).split(splitter)
533533
if is_urn or is_url:
534534
segments = segments[1:]
535-
# ignore extra segments for now beyond the 5 fisrt (such as the PR of a curation)
535+
# ignore extra segments for now beyond the 5 first (such as the PR of a curation)
536536
segments = segments[:5]
537537

538538
fields = (

clearcode/store_scans.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,8 @@
3434

3535
"""
3636
The input is a bunch of scans from ClearlyDefined and
37-
the output is a bunch of git repositories with commited and
38-
pushed scans such that we balance the scans roughly evenly accross
37+
the output is a bunch of git repositories with committed and
38+
pushed scans such that we balance the scans roughly evenly across
3939
different repositories.
4040
4141
The primary reason for multiple repositories is size of a single
@@ -127,7 +127,7 @@ def get_cd_item_by_purl_hash(cd_items):
127127
def add_scancode_scan(repo, purl, scancode_scan):
128128
"""
129129
Save and commit scancode scan for purl to git repo.
130-
Return true if we commited else false
130+
Return true if we committed else false
131131
"""
132132
purl_data_dir = get_or_create_dir_for_purl(purl=purl, repo=repo)
133133
scancode_scan_path = purl_data_dir / "scancode-toolkit-scan.json"

clearindex/management/commands/run_clearindex.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ def handle(self, *args, **options):
161161
def map_definition(cditem):
162162
"""
163163
Map a CD definition. Return the Package created from a mapped CD definition
164-
or None if a Package could not be created or an Exception has occured.
164+
or None if a Package could not be created or an Exception has occurred.
165165
"""
166166
try:
167167
with transaction.atomic():
@@ -328,7 +328,7 @@ def str2coord(s):
328328
segments = s.strip(splitter).split(splitter)
329329
if is_urn or is_url:
330330
segments = segments[1:]
331-
# ignore extra segments for now beyond the 5 fisrt (such as the PR of a curation)
331+
# ignore extra segments for now beyond the 5 first (such as the PR of a curation)
332332
segments = segments[:5]
333333

334334
fields = (

docs/source/how-to-guides/deploy_to_devel.rst

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Map deployed code back to source code aka. back2source
55
=======================================================
66

7-
In this tutorial we excercise the ScanCode.io pipeline used map the deployed binaries back to the
7+
In this tutorial we exercise the ScanCode.io pipeline used map the deployed binaries back to the
88
assumed source code of a package, or map source archives to the sources from a version control
99
system (VCS) checkout.
1010

@@ -59,17 +59,17 @@ Yet these assumption are often proven wrong and the potential for many issues:
5959
<https://en.wikipedia.org/wiki/XZ_Utils_backdoor>_ incident where the source archive of the XZ
6060
Utils packages had been modified to create a malicious SSH backdoor. These cases need to be
6161
detected ideally before the source code is even built. back2source has been detecting the
62-
XZ malicious automake build scripts as requring review, and this using code available before the
62+
XZ malicious automake build scripts as requiring review, and this using code available before the
6363
XZ backdoor issue was known.
6464

65-
- Extra code may be provisioned and routinely injected or complied in the final binary without
65+
- Extra code may be provisioned and routinely injected or compiled in the final binary without
6666
malice.
6767

6868
- For instance, an "UberJAR" is created as a larger Java JAR
6969
<https://en.wikipedia.org/wiki/JAR_(file_format)>_
7070
as the combination of multiple JARS. The other JARs are fetched at built time and not present in
7171
source code form and commonly without metadata to help track their origin. This means that using
72-
package A, means really using unknowningly A, but also B and C. There are license and security
72+
package A, means really using unknowingly A, but also B and C. There are license and security
7373
implications when the license, origin and vulnerability status of B and C goes undetected. Most
7474
tools do not detect these extra package inclusions.
7575

@@ -102,12 +102,12 @@ The ScanCode.io pipeline supports these technologies:
102102

103103
- end-to-end ELF binaries package binary to source analysis. The focus is on on binaries compiled
104104
from C (C++ will be implemented separately in the future as it requires additional demangling of
105-
function signatures). This analysis is based extracting DWARF debug symbols compliation unit
105+
function signatures). This analysis is based extracting DWARF debug symbols compilation unit
106106
references.
107107

108-
- end-to-end Go binary executable to source analysis o binary to source analysis. Note that Go is
109-
special, as while its targets binaries are compiled to ELF, Macho-O and Windows PE/COFF formats,
110-
depending on the operating system target and can also be anlyzed as an ELF for Linux, a Go
108+
- end-to-end Go binary executable to source analysis or binary to source analysis. Note that Go is
109+
special, as while its targets binaries are compiled to ELF, Mach-O and Windows PE/COFF formats,
110+
depending on the operating system target and can also be analyzed as an ELF for Linux, a Go
111111
binary also contains extra information to map source and binaries together through a specific
112112
data structure. This pipeline will be using this data structure (aka. the pclntab).
113113

@@ -450,6 +450,6 @@ Here is how the project creation looks like:
450450
.. image:: images/d2d-images/43a5ff56-fb36-45c7-82bb-8b5256759eee.png
451451

452452

453-
- Inthe resource page, there are also file-level mappings details:
453+
- In the resource page, there are also file-level mappings details:
454454

455455
.. image:: images/d2d-images/4acd087e-0cd1-4361-a8ee-f7af7681c74e.png

docs/source/how-to-guides/symbols_and_strings.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Binary analysis
7676
~~~~~~~~~~~~~~~~
7777

7878
Once we have collected symbols and strings from the source code, we can search these in a binary.
79-
The presence of these symbols in the binaries can be used to find the origin of code complied in
79+
The presence of these symbols in the binaries can be used to find the origin of code compiled in
8080
binaries with a lightweight "reverse" engineering process. For instance, a tool like BANG
8181
<https://github.com/armijnhemel/binaryanalysis-ng/>_ can use the source symbols to build
8282
automatons-based search indexes to support an efficient binary origin analysis.

docs/source/purldb/rest_api.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ An API endpoint that provides the ability to list and get packages.
133133
"parties": [
134134
{
135135
"type": "person",
136-
"role": "developper",
136+
"role": "developer",
137137
"name": "Elastic",
138138
"email": null,
139139
"url": "https://www.elastic.co"
@@ -277,7 +277,7 @@ The package details view returns all information available about a package.
277277
"parties": [
278278
{
279279
"type": "person",
280-
"role": "developper",
280+
"role": "developer",
281281
"name": "Elastic",
282282
"email": null,
283283
"url": "https://www.elastic.co"
@@ -468,7 +468,7 @@ Using cURL to get enhanced package data:
468468
"parties": [
469469
{
470470
"type": "person",
471-
"role": "developper",
471+
"role": "developer",
472472
"name": "Elastic",
473473
"email": null,
474474
"url": "https://www.elastic.co"
@@ -550,7 +550,7 @@ Using cURL to reindex a package:
550550
Filter by checksum
551551
~~~~~~~~~~~~~~~~~~
552552

553-
Take a mapping, where the keys are the names of the checksum algorthm and the
553+
Take a mapping, where the keys are the names of the checksum algorithm and the
554554
values is a list of checksum values and query those values against the
555555
packagedb.
556556

@@ -666,7 +666,7 @@ One action is available on resources:
666666
Filter by checksum
667667
~~~~~~~~~~~~~~~~~~
668668

669-
Take a mapping, where the keys are the names of the checksum algorthm and the
669+
Take a mapping, where the keys are the names of the checksum algorithm and the
670670
values is a list of checksum values and query those values against the
671671
packagedb.
672672

docs/source/purldb/symbol_and_string_collection.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ pipeline and stores them in the ``extra_data`` field of the resource model.
1111
What are symbols?
1212
------------------
1313

14-
Source code symbols are the names of the functions, methods, classes, varibales and data structures
15-
as found in source code. Another name is "identifiers". Source code iterals (or "strings") are the
16-
string values of variables, such as messages asssigned to a variable or constant in the source code
14+
Source code symbols are the names of the functions, methods, classes, variables and data structures
15+
as found in source code. Another name is "identifiers". Source code literals (or "strings") are the
16+
string values of variables, such as messages assigned to a variable or constant in the source code
1717
of a program.
1818

1919
Why would you want to collect source symbols?

etc/ci/macports-ci

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ do
190190
# this check confirms that ports were installed
191191
# notice that port -N selfupdate && break is not sufficient as a test
192192
# (sometime it returns a success even though ports have not been installed)
193-
# for some misterious reasons, running without "-d" does not work in some case
193+
# for some mysterious reasons, running without "-d" does not work in some case
194194
sudo port -d -N selfupdate 2>&1 | grep -v DEBUG | awk '{if($1!="x")print}'
195195
port info xdrfile > /dev/null && break || true
196196
sleep 5

etc/scripts/fetch_thirdparty.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ def fetch_thirdparty(
166166
Download the PyPI packages listed in the combination of:
167167
- the pip requirements --requirements REQUIREMENT-FILE(s),
168168
- the pip name==version --specifier SPECIFIER(s)
169-
- any pre-existing wheels or sdsists found in --dest-dir THIRDPARTY_DIR.
169+
- any pre-existing wheels or sdists found in --dest-dir THIRDPARTY_DIR.
170170
171171
Download wheels with the --wheels option for the ``--python-version``
172172
PYVER(s) and ``--operating_system`` OS(s) combinations defaulting to all

etc/scripts/gen_pypi_simple.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ def simple_index_entry(self, base_url):
177177
def build_pypi_index(directory, base_url="https://thirdparty.aboutcode.org/pypi"):
178178
"""
179179
Create the a PyPI simple directory index using a ``directory`` directory of wheels and sdists in
180-
the direvctory at ``directory``/simple/ populated with the proper PyPI simple index directory
180+
the directory at ``directory``/simple/ populated with the proper PyPI simple index directory
181181
structure crafted using symlinks.
182182
183183
WARNING: The ``directory``/simple/ directory is removed if it exists. NOTE: in addition to the a

0 commit comments

Comments
 (0)