From: Viktor Szakats Date: Fri, 22 Aug 2025 09:07:50 +0000 (+0200) Subject: spelling: file system X-Git-Tag: curl-8_16_0~124 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=3298a43133d5af056e407a5aad6708c5423b55d5;p=thirdparty%2Fcurl.git spelling: file system Closes #18348 --- diff --git a/.github/scripts/spellcheck.words b/.github/scripts/spellcheck.words index 3f615331b4..13b7b2f367 100644 --- a/.github/scripts/spellcheck.words +++ b/.github/scripts/spellcheck.words @@ -256,7 +256,6 @@ Fedora Feltzing ffi filesize -filesystem FindCURL FLOSS fnmatch diff --git a/docs/cmdline-opts/_EXITCODES.md b/docs/cmdline-opts/_EXITCODES.md index 20c9ff1e73..333e198d7c 100644 --- a/docs/cmdline-opts/_EXITCODES.md +++ b/docs/cmdline-opts/_EXITCODES.md @@ -61,7 +61,7 @@ HTTP page not retrieved. The requested URL was not found or returned another error with the HTTP error code being 400 or above. This return code only appears if --fail is used. ## 23 -Write error. curl could not write data to a local filesystem or similar. +Write error. curl could not write data to a local file system or similar. ## 25 Failed starting the upload. For FTP, the server typically denied the STOR command. diff --git a/docs/examples/unixsocket.c b/docs/examples/unixsocket.c index 299a121d9d..63acd4b6a2 100644 --- a/docs/examples/unixsocket.c +++ b/docs/examples/unixsocket.c @@ -31,7 +31,7 @@ #ifdef USE_ABSTRACT /* * The abstract socket namespace is a nonportable Linux extension. The name - * has no connection with filesystem pathnames. + * has no connection with file system pathnames. */ #define ABSTRACT "http-unix-domain" #else diff --git a/docs/internals/TLS-SESSIONS.md b/docs/internals/TLS-SESSIONS.md index 26fac5c784..8f887d2e07 100644 --- a/docs/internals/TLS-SESSIONS.md +++ b/docs/internals/TLS-SESSIONS.md @@ -64,8 +64,8 @@ leak the privacy of your communication. We recommend to *not* persist peer keys for this reason. **Caveat**: The key may contain filenames or paths. It does not reflect the -*contents* in the filesystem. If you change `/etc/ssl/cert.pem` and reuse a -previous ticket, curl might trust a server which no longer has a root +*contents* in the file system. If you change `/etc/ssl/cert.pem` and reuse +a previous ticket, curl might trust a server which no longer has a root certificate in the file. diff --git a/docs/libcurl/libcurl-security.md b/docs/libcurl/libcurl-security.md index e1301698bc..c6a10cd271 100644 --- a/docs/libcurl/libcurl-security.md +++ b/docs/libcurl/libcurl-security.md @@ -107,7 +107,7 @@ redirects for security reasons: only HTTP, HTTPS, FTP and FTPS are enabled by default. Applications may opt to restrict that set further. A redirect to a file: URL would cause the libcurl to read (or write) arbitrary -files from the local filesystem. If the application returns the data back to +files from the local file system. If the application returns the data back to the user (as would happen in some kinds of CGI scripts), an attacker could leverage this to read otherwise forbidden data (e.g. **file://localhost/etc/passwd**). diff --git a/docs/libcurl/opts/CURLOPT_UNIX_SOCKET_PATH.md b/docs/libcurl/opts/CURLOPT_UNIX_SOCKET_PATH.md index a061516a17..3d5520be5e 100644 --- a/docs/libcurl/opts/CURLOPT_UNIX_SOCKET_PATH.md +++ b/docs/libcurl/opts/CURLOPT_UNIX_SOCKET_PATH.md @@ -71,7 +71,7 @@ int main(void) ~~~ If you are on Linux and somehow have a need for paths larger than 107 bytes, -you can use the *proc* filesystem to bypass the limitation: +you can use the *proc* file system to bypass the limitation: ~~~c int dirfd = open(long_directory_path_to_socket, O_DIRECTORY | O_RDONLY); diff --git a/lib/url.c b/lib/url.c index 86d744a554..20161cac44 100644 --- a/lib/url.c +++ b/lib/url.c @@ -3225,7 +3225,7 @@ static CURLcode resolve_unix(struct Curl_easy *data, /* Unix domain sockets are local. The host gets ignored, just use the * specified domain socket address. Do not cache "DNS entries". There is - * no DNS involved and we already have the filesystem path available. */ + * no DNS involved and we already have the file system path available. */ hostaddr = calloc(1, sizeof(struct Curl_dns_entry)); if(!hostaddr) return CURLE_OUT_OF_MEMORY; diff --git a/lib/vtls/mbedtls.c b/lib/vtls/mbedtls.c index a820a98b82..ebf734aef1 100644 --- a/lib/vtls/mbedtls.c +++ b/lib/vtls/mbedtls.c @@ -597,7 +597,7 @@ mbed_connect_step1(struct Curl_cfilter *cf, struct Curl_easy *data) return CURLE_SSL_CACERT_BADFILE; } #else - failf(data, "mbedtls: functions that use the filesystem not built in"); + failf(data, "mbedtls: functions that use the file system not built in"); return CURLE_NOT_BUILT_IN; #endif } @@ -615,7 +615,7 @@ mbed_connect_step1(struct Curl_cfilter *cf, struct Curl_easy *data) return CURLE_SSL_CACERT_BADFILE; } #else - failf(data, "mbedtls: functions that use the filesystem not built in"); + failf(data, "mbedtls: functions that use the file system not built in"); return CURLE_NOT_BUILT_IN; #endif } @@ -635,7 +635,7 @@ mbed_connect_step1(struct Curl_cfilter *cf, struct Curl_easy *data) return CURLE_SSL_CERTPROBLEM; } #else - failf(data, "mbedtls: functions that use the filesystem not built in"); + failf(data, "mbedtls: functions that use the file system not built in"); return CURLE_NOT_BUILT_IN; #endif } @@ -681,7 +681,7 @@ mbed_connect_step1(struct Curl_cfilter *cf, struct Curl_easy *data) return CURLE_SSL_CERTPROBLEM; } #else - failf(data, "mbedtls: functions that use the filesystem not built in"); + failf(data, "mbedtls: functions that use the file system not built in"); return CURLE_NOT_BUILT_IN; #endif } @@ -724,7 +724,7 @@ mbed_connect_step1(struct Curl_cfilter *cf, struct Curl_easy *data) return CURLE_SSL_CRL_BADFILE; } #else - failf(data, "mbedtls: functions that use the filesystem not built in"); + failf(data, "mbedtls: functions that use the file system not built in"); return CURLE_NOT_BUILT_IN; #endif } diff --git a/lib/vtls/wolfssl.c b/lib/vtls/wolfssl.c index 9a84b3384c..d043962090 100644 --- a/lib/vtls/wolfssl.c +++ b/lib/vtls/wolfssl.c @@ -1275,7 +1275,7 @@ CURLcode Curl_wssl_ctx_init(struct wssl_ctx *wctx, #ifdef NO_FILESYSTEM else if(conn_config->verifypeer) { failf(data, "SSL: Certificates cannot be loaded because wolfSSL was built" - " with \"no filesystem\". Either disable peer verification" + " with \"no file system\". Either disable peer verification" " (insecure) or if you are building an application with libcurl you" " can load certificates via CURLOPT_SSL_CTX_FUNCTION."); result = CURLE_SSL_CONNECT_ERROR; diff --git a/scripts/randdisable b/scripts/randdisable index 1ccaf6f10d..89778c146c 100755 --- a/scripts/randdisable +++ b/scripts/randdisable @@ -18,7 +18,7 @@ # Tips: # # - edit the @tls array to include all TLS backends you can build with -# - do a checkout in a ram-based filesystem +# - do a checkout in a ram-based file system # use strict; use warnings; diff --git a/src/tool_help.c b/src/tool_help.c index 3cdd522c29..58d3a2c1f2 100644 --- a/src/tool_help.c +++ b/src/tool_help.c @@ -54,7 +54,7 @@ static const struct category_descriptors categories[] = { {"http", "HTTP and HTTPS protocol", CURLHELP_HTTP}, {"imap", "IMAP protocol", CURLHELP_IMAP}, {"ldap", "LDAP protocol", CURLHELP_LDAP}, - {"output", "Filesystem output", CURLHELP_OUTPUT}, + {"output", "File system output", CURLHELP_OUTPUT}, {"pop3", "POP3 protocol", CURLHELP_POP3}, {"post", "HTTP POST specific", CURLHELP_POST}, {"proxy", "Options for proxies", CURLHELP_PROXY}, diff --git a/tests/data/test1443 b/tests/data/test1443 index 45aead932c..c42480ae87 100644 --- a/tests/data/test1443 +++ b/tests/data/test1443 @@ -35,7 +35,7 @@ HTTP GET with -O and --remote-time http://%HOSTIP:%HTTPPORT/%TESTNUMBER -O --remote-time --output-dir %LOGDIR # Verify the mtime of the file. The mtime is specifically chosen to be an even -# number so that it can be represented exactly on a FAT filesystem. +# number so that it can be represented exactly on a FAT file system. # diff --git a/tests/data/test1444 b/tests/data/test1444 index ad1dc4634a..860c663040 100644 --- a/tests/data/test1444 +++ b/tests/data/test1444 @@ -47,7 +47,7 @@ RETR %TESTNUMBER QUIT # Verify the mtime of the file. The mtime is specifically chosen to be an even -# number so that it can be represented exactly on a FAT filesystem. +# number so that it can be represented exactly on a FAT file system. %PERL -e 'exit((stat("%LOGDIR/curl%TESTNUMBER.out"))[9] != 1234567890)' diff --git a/tests/data/test1462 b/tests/data/test1462 index a3cc46e31d..0865912865 100644 --- a/tests/data/test1462 +++ b/tests/data/test1462 @@ -44,7 +44,7 @@ Unknown category provided, here is a list of all categories: http HTTP and HTTPS protocol imap IMAP protocol ldap LDAP protocol - output Filesystem output + output File system output pop3 POP3 protocol post HTTP POST specific proxy Options for proxies diff --git a/tests/libtest/test613.pl b/tests/libtest/test613.pl index 429168abfc..48179833f3 100755 --- a/tests/libtest/test613.pl +++ b/tests/libtest/test613.pl @@ -55,7 +55,7 @@ if($ARGV[0] eq "prepare") { print FILE "Test file to support curl test suite\n"; close(FILE); # The mtime is specifically chosen to be an even number so that it can be - # represented exactly on a FAT filesystem. + # represented exactly on a FAT file system. utime time, timegm(0,0,12,1,0,100), "plainfile.txt"; chmod 0666, "plainfile.txt"; @@ -64,7 +64,7 @@ if($ARGV[0] eq "prepare") { print FILE "Read-only test file to support curl test suite\n"; close(FILE); # The mtime is specifically chosen to be an even number so that it can be - # represented exactly on a FAT filesystem. + # represented exactly on a FAT file system. utime time, timegm(0,0,12,31,11,100), "rofile.txt"; chmod 0444, "rofile.txt"; if($^O eq 'cygwin') { @@ -114,7 +114,7 @@ elsif($ARGV[0] eq "postprocess") { next; } # Erase all directory metadata except for the name, as it is not - # consistent for across all test systems and filesystems + # consistent for across all test systems and file systems push @canondir, "d????????? N U U N ??? N NN:NN $8\n"; } elsif($1 eq "-") { # Ignore group and other permissions, because these may vary on