From: Yu Watanabe Date: Tue, 31 Oct 2023 05:35:33 +0000 (+0900) Subject: tree-wide: fix typo X-Git-Tag: v255-rc1~94 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=d19434fbf81db04d03c8cffa87821f754a86635b;p=thirdparty%2Fsystemd.git tree-wide: fix typo --- diff --git a/catalog/systemd.catalog.in b/catalog/systemd.catalog.in index fd83d1e3dd7..37b59adbdde 100644 --- a/catalog/systemd.catalog.in +++ b/catalog/systemd.catalog.in @@ -746,5 +746,5 @@ secure (as no sandboxing restrictions can be enforced). Compatibility support for System V services in systemd is deprecated. Please make sure to update the package in question to provide proper, native systemd -unit files. Contact vendor if necesssary. Compatibility support for System V +unit files. Contact vendor if necessary. Compatibility support for System V services is deprecated and will be removed soon. diff --git a/src/libsystemd-network/sd-dhcp-client.c b/src/libsystemd-network/sd-dhcp-client.c index 2a65d6d0ea5..97250d47e84 100644 --- a/src/libsystemd-network/sd-dhcp-client.c +++ b/src/libsystemd-network/sd-dhcp-client.c @@ -2036,7 +2036,7 @@ static int client_handle_message(sd_dhcp_client *client, DHCPMessage *message, i return 0; /* invalid message, let's ignore it */ if (client->lease->rapid_commit) - /* got a succssful rapid commit */ + /* got a successful rapid commit */ r = client_enter_bound(client, r); else r = client_enter_requesting(client); diff --git a/src/libsystemd-network/sd-dhcp-lease.c b/src/libsystemd-network/sd-dhcp-lease.c index 14427469006..a8e5c683b88 100644 --- a/src/libsystemd-network/sd-dhcp-lease.c +++ b/src/libsystemd-network/sd-dhcp-lease.c @@ -737,7 +737,7 @@ int dhcp_lease_parse_options(uint8_t code, uint8_t len, const void *option, void case SD_DHCP_OPTION_RAPID_COMMIT: if (len > 0) - log_debug("Invalid DHCP Rapid Commit option, ignorning."); + log_debug("Invalid DHCP Rapid Commit option, ignoring."); lease->rapid_commit = true; break; diff --git a/src/test/test-recurse-dir.c b/src/test/test-recurse-dir.c index 3e425266792..9362d6729aa 100644 --- a/src/test/test-recurse-dir.c +++ b/src/test/test-recurse-dir.c @@ -138,9 +138,9 @@ int main(int argc, char *argv[]) { } assert_se(fd >= 0); - /* If the test directory is on an overlayfs then files and their direcory may return different st_dev - * in stat results, which confuses nftw into thinking they're on different filesystems - * and won't return the result when the FTW_MOUNT flag is set. */ + /* If the test directory is on an overlayfs then files and their directory may return different + * st_dev in stat results, which confuses nftw into thinking they're on different filesystems and + * won't return the result when the FTW_MOUNT flag is set. */ if (fd_is_fs_type(fd, OVERLAYFS_SUPER_MAGIC)) { log_tests_skipped("nftw mountpoint detection produces false-positives on overlayfs"); return EXIT_TEST_SKIP; diff --git a/src/ukify/ukify.py b/src/ukify/ukify.py index bcffd0dcf2f..b09fb4d5cc8 100755 --- a/src/ukify/ukify.py +++ b/src/ukify/ukify.py @@ -1590,7 +1590,7 @@ def finalize_options(opts): opts.sb_cert = pathlib.Path(opts.sb_cert) if bool(opts.sb_key) ^ bool(opts.sb_cert): - # one param only given, sbsign need boths + # one param only given, sbsign needs both raise ValueError('--secureboot-private-key= and --secureboot-certificate= must be specified together') elif bool(opts.sb_key) and bool(opts.sb_cert): # both param given, infer sbsign and in case it was given, ensure signtool=sbsign diff --git a/test/units/testsuite-07.exec-context.sh b/test/units/testsuite-07.exec-context.sh index 0943300424d..664acc0b64a 100755 --- a/test/units/testsuite-07.exec-context.sh +++ b/test/units/testsuite-07.exec-context.sh @@ -145,7 +145,7 @@ if ! systemd-detect-virt -cq; then -p SocketBindAllow=1234 -p SocketBindAllow=ipv4:udp:any -p SocketBindAllow=ipv6:6666 - # Everything but the last assignment is superfluous, but it still excercises + # Everything but the last assignment is superfluous, but it still exercises # the parsing machinery -p SocketBindDeny= -p SocketBindDeny=1111 diff --git a/test/units/testsuite-54.sh b/test/units/testsuite-54.sh index 3686e0ef137..bcbe7a1e6a9 100755 --- a/test/units/testsuite-54.sh +++ b/test/units/testsuite-54.sh @@ -22,7 +22,7 @@ mount -t tmpfs -o size=1,nr_inodes=1 tmpfs /tmp/full # verb: setup # Run this first, otherwise any encrypted credentials wouldn't be decryptable -# as we regnerate the host key +# as we regenerate the host key rm -fv /var/lib/systemd/credential.secret systemd-creds setup test -e /var/lib/systemd/credential.secret