Fix problems found by codespell

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
This commit is contained in:
Daniel J Walsh 2020-09-11 10:19:16 -04:00
parent 5dd09d76c3
commit 62bafb102d
No known key found for this signature in database
GPG Key ID: A2DF901DABE2C028
7 changed files with 18 additions and 18 deletions

View File

@ -134,7 +134,7 @@ When new PRs for [containers/image](https://github.com/containers/image) break `
- create out a new branch in your `skopeo` checkout and switch to it - create out a new branch in your `skopeo` checkout and switch to it
- update `vendor.conf`. Find out the `containers/image` dependency; update it to vendor from your own branch and your own repository fork (e.g. `github.com/containers/image my-branch https://github.com/runcom/image`) - update `vendor.conf`. Find out the `containers/image` dependency; update it to vendor from your own branch and your own repository fork (e.g. `github.com/containers/image my-branch https://github.com/runcom/image`)
- run `make vendor` - run `make vendor`
- make any other necessary changes in the skopeo repo (e.g. add other dependencies now requied by `containers/image`, or update skopeo for changed `containers/image` API) - make any other necessary changes in the skopeo repo (e.g. add other dependencies now required by `containers/image`, or update skopeo for changed `containers/image` API)
- optionally add new integration tests to the skopeo repo - optionally add new integration tests to the skopeo repo
- submit the resulting branch as a skopeo PR, marked “DO NOT MERGE” - submit the resulting branch as a skopeo PR, marked “DO NOT MERGE”
- iterate until tests pass and the PR is reviewed - iterate until tests pass and the PR is reviewed

View File

@ -153,7 +153,7 @@ func (opts *inspectOptions) run(args []string, stdout io.Writer) (retErr error)
Name: "", // Set below if DockerReference() is known Name: "", // Set below if DockerReference() is known
Tag: imgInspect.Tag, Tag: imgInspect.Tag,
// Digest is set below. // Digest is set below.
RepoTags: []string{}, // Possibly overriden for docker.Transport. RepoTags: []string{}, // Possibly overridden for docker.Transport.
Created: imgInspect.Created, Created: imgInspect.Created,
DockerVersion: imgInspect.DockerVersion, DockerVersion: imgInspect.DockerVersion,
Labels: imgInspect.Labels, Labels: imgInspect.Labels,

View File

@ -26,7 +26,7 @@ import (
// syncOptions contains information retrieved from the skopeo sync command line. // syncOptions contains information retrieved from the skopeo sync command line.
type syncOptions struct { type syncOptions struct {
global *globalOptions // Global (not command dependant) skopeo options global *globalOptions // Global (not command dependent) skopeo options
srcImage *imageOptions // Source image options srcImage *imageOptions // Source image options
destImage *imageDestOptions // Destination image options destImage *imageDestOptions // Destination image options
retryOpts *retry.RetryOptions retryOpts *retry.RetryOptions

View File

@ -157,7 +157,7 @@ func (opts *imageOptions) newSystemContext() (*types.SystemContext, error) {
return ctx, nil return ctx, nil
} }
// imageDestOptions is a superset of imageOptions specialized for iamge destinations. // imageDestOptions is a superset of imageOptions specialized for image destinations.
type imageDestOptions struct { type imageDestOptions struct {
*imageOptions *imageOptions
dirForceCompression bool // Compress layers when saving to the dir: transport dirForceCompression bool // Compress layers when saving to the dir: transport

View File

@ -52,7 +52,7 @@ Path of the authentication file for the destination registry. Uses path given by
**--encryption-key** _protocol:keyfile_ specifies the encryption protocol, which can be JWE (RFC7516), PGP (RFC4880), and PKCS7 (RFC2315) and the key material required for image encryption. For instance, jwe:/path/to/key.pem or pgp:admin@example.com or pkcs7:/path/to/x509-file. **--encryption-key** _protocol:keyfile_ specifies the encryption protocol, which can be JWE (RFC7516), PGP (RFC4880), and PKCS7 (RFC2315) and the key material required for image encryption. For instance, jwe:/path/to/key.pem or pgp:admin@example.com or pkcs7:/path/to/x509-file.
**--decryption-key** _key[:passphrase]_ to be used for decryption of images. Key can point to keys and/or certificates. Decryption will be tried with all keys. If the key is protected by a passphrase, it is required to be passed in the argument and ommitted otherwise. **--decryption-key** _key[:passphrase]_ to be used for decryption of images. Key can point to keys and/or certificates. Decryption will be tried with all keys. If the key is protected by a passphrase, it is required to be passed in the argument and omitted otherwise.
**--src-creds** _username[:password]_ for accessing the source registry **--src-creds** _username[:password]_ for accessing the source registry

View File

@ -488,7 +488,7 @@ func (s *CopySuite) TestCopySimpleAtomicRegistry(c *check.C) {
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
defer os.RemoveAll(dir2) defer os.RemoveAll(dir2)
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
// "pull": docker: → dir: // "pull": docker: → dir:
assertSkopeoSucceeds(c, "", "copy", "docker://estesp/busybox:amd64", "dir:"+dir1) assertSkopeoSucceeds(c, "", "copy", "docker://estesp/busybox:amd64", "dir:"+dir1)
// "push": dir: → atomic: // "push": dir: → atomic:
@ -509,7 +509,7 @@ func (s *CopySuite) TestCopySimple(c *check.C) {
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
defer os.RemoveAll(dir2) defer os.RemoveAll(dir2)
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
// "pull": docker: → dir: // "pull": docker: → dir:
assertSkopeoSucceeds(c, "", "copy", "docker://busybox", "dir:"+dir1) assertSkopeoSucceeds(c, "", "copy", "docker://busybox", "dir:"+dir1)
// "push": dir: → docker(v2s2): // "push": dir: → docker(v2s2):
@ -626,7 +626,7 @@ func (s *CopySuite) TestCopyEncryption(c *check.C) {
// Since the image is partially encrypted we should find layers that aren't encrypted // Since the image is partially encrypted we should find layers that aren't encrypted
matchLayerBlobBinaryType(c, partiallyEncryptedImgDir+"/blobs/sha256", "application/x-gzip", 2) matchLayerBlobBinaryType(c, partiallyEncryptedImgDir+"/blobs/sha256", "application/x-gzip", 2)
// Decrypt the partically encrypted image // Decrypt the partially encrypted image
assertSkopeoSucceeds(c, "", "copy", "--decryption-key", keysDir+"/private.key", assertSkopeoSucceeds(c, "", "copy", "--decryption-key", keysDir+"/private.key",
"oci:"+partiallyEncryptedImgDir+":encrypted", "oci:"+partiallyDecryptedImgDir+":decrypted") "oci:"+partiallyEncryptedImgDir+":encrypted", "oci:"+partiallyDecryptedImgDir+":decrypted")
@ -720,7 +720,7 @@ func (s *CopySuite) TestCopyStreaming(c *check.C) {
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
defer os.RemoveAll(dir2) defer os.RemoveAll(dir2)
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
// streaming: docker: → atomic: // streaming: docker: → atomic:
assertSkopeoSucceeds(c, "", "--tls-verify=false", "--debug", "copy", "docker://estesp/busybox:amd64", "atomic:localhost:5000/myns/unsigned:streaming") assertSkopeoSucceeds(c, "", "--tls-verify=false", "--debug", "copy", "docker://estesp/busybox:amd64", "atomic:localhost:5000/myns/unsigned:streaming")
// Compare (copies of) the original and the copy: // Compare (copies of) the original and the copy:
@ -1087,7 +1087,7 @@ func (s *CopySuite) TestCopyVerifyingMirroredSignatures(c *check.C) {
defer os.Remove(policy) defer os.Remove(policy)
// We use X-R-S-S for this testing to avoid having to deal with the sigstores. // We use X-R-S-S for this testing to avoid having to deal with the sigstores.
// A downside is that OpenShift records signatures per image, so the error messsages below // A downside is that OpenShift records signatures per image, so the error messages below
// list all signatures for other tags used for the same image as well. // list all signatures for other tags used for the same image as well.
// So, make sure to never create a signature that could be considered valid in a different part of the test (i.e. don't reuse tags). // So, make sure to never create a signature that could be considered valid in a different part of the test (i.e. don't reuse tags).
@ -1103,7 +1103,7 @@ func (s *CopySuite) TestCopyVerifyingMirroredSignatures(c *check.C) {
// Sign the image for the mirror // Sign the image for the mirror
assertSkopeoSucceeds(c, "", "--registries.d", registriesDir, "copy", "--src-tls-verify=false", "--dest-tls-verify=false", "--sign-by", "personal@example.com", regPrefix+"primary:unsigned", regPrefix+"mirror:mirror-signed") assertSkopeoSucceeds(c, "", "--registries.d", registriesDir, "copy", "--src-tls-verify=false", "--dest-tls-verify=false", "--sign-by", "personal@example.com", regPrefix+"primary:unsigned", regPrefix+"mirror:mirror-signed")
// Verify that a correctly signed image for the mirror is acessible using the mirror's reference // Verify that a correctly signed image for the mirror is accessible using the mirror's reference
assertSkopeoSucceeds(c, "", "--policy", policy, "--registries.d", registriesDir, "--registries-conf", "fixtures/registries.conf", "copy", "--src-tls-verify=false", regPrefix+"mirror:mirror-signed", dirDest) assertSkopeoSucceeds(c, "", "--policy", policy, "--registries.d", registriesDir, "--registries-conf", "fixtures/registries.conf", "copy", "--src-tls-verify=false", regPrefix+"mirror:mirror-signed", dirDest)
// … but verify that while it is accessible using the primary location redirecting to the mirror, … // … but verify that while it is accessible using the primary location redirecting to the mirror, …
assertSkopeoSucceeds(c, "" /* no --policy */, "--registries-conf", "fixtures/registries.conf", "copy", "--src-tls-verify=false", regPrefix+"primary:mirror-signed", dirDest) assertSkopeoSucceeds(c, "" /* no --policy */, "--registries-conf", "fixtures/registries.conf", "copy", "--src-tls-verify=false", regPrefix+"primary:mirror-signed", dirDest)

View File

@ -94,7 +94,7 @@ func (s *SyncSuite) TestDocker2DirTagged(c *check.C) {
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
defer os.RemoveAll(tmpDir) defer os.RemoveAll(tmpDir)
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
image := "busybox:latest" image := "busybox:latest"
imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image)) imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image))
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
@ -118,7 +118,7 @@ func (s *SyncSuite) TestDocker2DirTagged(c *check.C) {
} }
func (s *SyncSuite) TestScoped(c *check.C) { func (s *SyncSuite) TestScoped(c *check.C) {
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
image := "busybox:latest" image := "busybox:latest"
imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image)) imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image))
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
@ -138,7 +138,7 @@ func (s *SyncSuite) TestScoped(c *check.C) {
} }
func (s *SyncSuite) TestDirIsNotOverwritten(c *check.C) { func (s *SyncSuite) TestDirIsNotOverwritten(c *check.C) {
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
image := "busybox:latest" image := "busybox:latest"
imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image)) imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image))
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
@ -173,7 +173,7 @@ func (s *SyncSuite) TestDocker2DirUntagged(c *check.C) {
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
defer os.RemoveAll(tmpDir) defer os.RemoveAll(tmpDir)
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
image := "alpine" image := "alpine"
imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image)) imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image))
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
@ -350,7 +350,7 @@ func (s *SyncSuite) TestYamlTLSVerify(c *check.C) {
image := "busybox" image := "busybox"
tag := "latest" tag := "latest"
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
// copy docker => docker // copy docker => docker
assertSkopeoSucceeds(c, "", "copy", "--dest-tls-verify=false", "docker://"+image+":"+tag, localRegURL+image+":"+tag) assertSkopeoSucceeds(c, "", "copy", "--dest-tls-verify=false", "docker://"+image+":"+tag, localRegURL+image+":"+tag)
@ -403,7 +403,7 @@ func (s *SyncSuite) TestDocker2DockerTagged(c *check.C) {
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
defer os.RemoveAll(tmpDir) defer os.RemoveAll(tmpDir)
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
image := "busybox:latest" image := "busybox:latest"
imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image)) imageRef, err := docker.ParseReference(fmt.Sprintf("//%s", image))
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
@ -436,7 +436,7 @@ func (s *SyncSuite) TestDir2DockerTagged(c *check.C) {
c.Assert(err, check.IsNil) c.Assert(err, check.IsNil)
defer os.RemoveAll(tmpDir) defer os.RemoveAll(tmpDir)
// FIXME: It would be nice to use one of the local Docker registries instead of neeeding an Internet connection. // FIXME: It would be nice to use one of the local Docker registries instead of needing an Internet connection.
image := "busybox:latest" image := "busybox:latest"
dir1 := path.Join(tmpDir, "dir1") dir1 := path.Join(tmpDir, "dir1")