Skip to content

Commit c00ede6

Browse files
authored
fix comment misspellings (#131)
This PR corrects misspellings identified by the [check-spelling action](https://github.com/marketplace/actions/check-spelling) The misspellings have been reported at https://github.com/jsoref/containerization/actions/runs/15662940240/attempts/1#summary-44123291170 The action reports that the changes in this PR would make it happy: https://github.com/jsoref/containerization/actions/runs/15662940315/attempts/1#summary-44123291367 --------- Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
1 parent f4177e7 commit c00ede6

File tree

11 files changed

+16
-16
lines changed

11 files changed

+16
-16
lines changed

Sources/CShim/exec_command.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,8 +74,8 @@ static void child_handler(const int sync_pipes[2], const char *executable,
7474
goto fail;
7575
}
7676

77-
// start shuffeling fds.
78-
// look at all the filehandles and find the highest one,
77+
// start shuffling fds.
78+
// look at all the file handles and find the highest one,
7979
// use that for our pipe,
8080
//
8181
// Then, we need to start dup2 the fds starting for the final process

Sources/Containerization/LinuxContainer.swift

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -323,7 +323,7 @@ extension LinuxContainer {
323323
/// Unix sockets to share into or out of the container.
324324
///
325325
/// The VirtualMachineAgent used to launch the container
326-
/// MUST conform to `SocketRelayAgent` to support this, otherwise
326+
/// MUST conform to `SocketRelayAgent` to support this; otherwise,
327327
/// a ContainerizationError will be returned on start with the code
328328
/// set to `.unsupported`.
329329
public var sockets: [UnixSocketConfiguration] {
@@ -465,7 +465,7 @@ extension LinuxContainer {
465465
}
466466

467467
/// Create the underlying container's virtual machine
468-
/// and setup the runtime environment.
468+
/// and set up the runtime environment.
469469
public func create() async throws {
470470
try state.setCreating()
471471

Sources/ContainerizationArchive/ArchiveWriterConfiguration.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ public enum Format: String, Sendable {
159159
}
160160
}
161161

162-
/// An enumreration of the supported filters (compression / encoding standards) for an archive.
162+
/// An enumeration of the supported filters (compression / encoding standards) for an archive.
163163
public enum Filter: String, Sendable {
164164
case none
165165
case gzip

Sources/ContainerizationEXT4/EXT4+Formatter.swift

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ extension EXT4 {
150150
// ensure that target is not a directory since hardlinks cannot be
151151
// created to directories
152152
if targetInode.mode.isDir() {
153-
throw Error.cannotCreateHardlinkstoDirTarget(link)
153+
throw Error.cannotCreateHardlinksToDirTarget(link)
154154
}
155155
targetInode.linksCount += 1
156156
targetInodePtr.initialize(to: targetInode)
@@ -628,7 +628,7 @@ extension EXT4 {
628628
var diskSize = dataSize
629629
var minimumDiskSize = (blockGroupSize.blockGroups - 1) * self.blocksPerGroup + 1
630630
if blockGroupSize.blockGroups == 1 {
631-
minimumDiskSize = self.blocksPerGroup // atleast 1 block group
631+
minimumDiskSize = self.blocksPerGroup // at least 1 block group
632632
}
633633
if diskSize < minimumDiskSize { // for data + metadata
634634
diskSize = minimumDiskSize
@@ -1266,7 +1266,7 @@ extension EXT4 {
12661266
case invalidName(_ name: String)
12671267
case noSpaceForTrailingDEntry
12681268
case insufficientSpaceForGroupDescriptorBlocks
1269-
case cannotCreateHardlinkstoDirTarget(_ path: FilePath)
1269+
case cannotCreateHardlinksToDirTarget(_ path: FilePath)
12701270
case cannotTruncateFile(_ path: FilePath)
12711271
case cannotCreateSparseFile(_ path: FilePath)
12721272
case cannotResizeFS(_ size: UInt64)
@@ -1294,7 +1294,7 @@ extension EXT4 {
12941294
return "not enough space for trailing dentry"
12951295
case .insufficientSpaceForGroupDescriptorBlocks:
12961296
return "not enough space for group descriptor blocks"
1297-
case .cannotCreateHardlinkstoDirTarget(let path):
1297+
case .cannotCreateHardlinksToDirTarget(let path):
12981298
return "cannot create hard links to directory target: \(path)"
12991299
case .cannotTruncateFile(let path):
13001300
return "cannot truncate file: \(path)"

Sources/ContainerizationOCI/MediaType.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,5 +65,5 @@ public struct MediaTypes: Codable, Sendable {
6565
public static let dockerImageLayerZstd = "application/vnd.docker.image.rootfs.diff.tar.zstd"
6666

6767
/// The media type used for in-toto attestations blobs.
68-
public static let intototAttestationBlob = "application/vnd.in-toto+json"
68+
public static let inTotoAttestationBlob = "application/vnd.in-toto+json"
6969
}

Sources/ContainerizationOCI/Platform.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -262,7 +262,7 @@ extension Platform: Hashable {
262262
// then, there is a possibility that for arm64 architecture, the variant may be set to nil
263263
// In that case, the variant should be assumed to v8
264264
if lhs.architecture == "arm64" && rhs.architecture == "arm64" {
265-
// The following checks effictively verify
265+
// The following checks effectively verify
266266
// that one operand has nil value and other has "v8"
267267
if lhs.variant == nil || rhs.variant == nil {
268268
if lhs.variant == "v8" || rhs.variant == "v8" {

Sources/ContainerizationOS/Socket/VsockType.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ public struct VsockType: SocketType, Sendable {
3636

3737
public static let anyCID: UInt32 = UInt32(bitPattern: -1)
3838
public static let hypervisorCID: UInt32 = 0x0
39-
// Supported on Linux 5.6+, otherwise will need to use getLocalCID().
39+
// Supported on Linux 5.6+; otherwise, will need to use getLocalCID().
4040
public static let localCID: UInt32 = 0x1
4141
public static let hostCID: UInt32 = 0x2
4242

Sources/Integration/Suite.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ struct IntegrationSuite: AsyncParsableCommand {
180180
// Why does this exist?
181181
//
182182
// We need the virtualization entitlement to execute these tests.
183-
// There currently does not exist a strightforward way to do this
183+
// There currently does not exist a straightforward way to do this
184184
// in a pure swift package.
185185
//
186186
// In order to not have a dependency on xcode, we create an executable

Tests/ContainerizationExtrasTests/TestNetworkAddress+Allocator.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ final class TestAddressAllocators {
215215
try allocator.release(first)
216216
let third = try allocator.allocate()
217217
// even after a release, it should continue to allocate in the range
218-
// before reusing an previous allocation on the stack.
218+
// before reusing a previous allocation on the stack.
219219
#expect(third == 5002)
220220

221221
// now the next allocation should be our first port

Tests/ContainerizationOCITests/RegistryClientTests.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -285,7 +285,7 @@ struct OCIClientTests: ~Copyable {
285285
)
286286
)
287287
do {
288-
_ = try await client.resolve(name: "conatinerization/not-exists", tag: "foo")
288+
_ = try await client.resolve(name: "containerization/not-exists", tag: "foo")
289289
} catch {
290290
#expect(counter.withLock { $0 } <= 3)
291291
}

0 commit comments

Comments
 (0)