Fix some codespell errors
[NO NEW TESTS NEEDED] Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
This commit is contained in:
parent
f0361414de
commit
c2b42c5e4f
|
@ -77,12 +77,12 @@ func sameDevice(a, b os.FileInfo) bool {
|
||||||
if aSys == nil || bSys == nil {
|
if aSys == nil || bSys == nil {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
au, aok := aSys.(*syscall.Stat_t)
|
uA, okA := aSys.(*syscall.Stat_t)
|
||||||
bu, bok := bSys.(*syscall.Stat_t)
|
uB, okB := bSys.(*syscall.Stat_t)
|
||||||
if !aok || !bok {
|
if !okA || !okB {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
return au.Dev == bu.Dev
|
return uA.Dev == uB.Dev
|
||||||
}
|
}
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
|
|
@ -909,7 +909,7 @@ Pass secret information to be used in the Containerfile for building images
|
||||||
in a safe way that will not end up stored in the final image, or be seen in other stages.
|
in a safe way that will not end up stored in the final image, or be seen in other stages.
|
||||||
The value of the secret will be read from an environment variable or file named
|
The value of the secret will be read from an environment variable or file named
|
||||||
by the "id" option, or named by the "src" option if it is specified, or from an
|
by the "id" option, or named by the "src" option if it is specified, or from an
|
||||||
environment variable specifed by the "env" option.
|
environment variable specified by the "env" option.
|
||||||
The secret will be mounted in the container at `/run/secrets/*id*` by default.
|
The secret will be mounted in the container at `/run/secrets/*id*` by default.
|
||||||
|
|
||||||
To later use the secret, use the --mount flag in a `RUN` instruction within a `Containerfile`:
|
To later use the secret, use the --mount flag in a `RUN` instruction within a `Containerfile`:
|
||||||
|
|
|
@ -205,7 +205,7 @@ func TestParsePullPolicy(t *testing.T) {
|
||||||
"newer": true,
|
"newer": true,
|
||||||
"false": true,
|
"false": true,
|
||||||
"never": true,
|
"never": true,
|
||||||
"trye": false,
|
"try": false,
|
||||||
"truth": false,
|
"truth": false,
|
||||||
}
|
}
|
||||||
for value, result := range testCases {
|
for value, result := range testCases {
|
||||||
|
|
|
@ -39,7 +39,6 @@ load helpers
|
||||||
# Inspect the config
|
# Inspect the config
|
||||||
run jq -r .created $srcdir/blobs/sha256/$configDigest
|
run jq -r .created $srcdir/blobs/sha256/$configDigest
|
||||||
assert "$status" -eq 0 "status of jq .created on configDigest"
|
assert "$status" -eq 0 "status of jq .created on configDigest"
|
||||||
creatd=$output
|
|
||||||
run date --date="$output"
|
run date --date="$output"
|
||||||
assert "$status" -eq 0 "status of date (this should never ever fail)"
|
assert "$status" -eq 0 "status of date (this should never ever fail)"
|
||||||
run jq -r .author $srcdir/blobs/sha256/$configDigest
|
run jq -r .author $srcdir/blobs/sha256/$configDigest
|
||||||
|
|
Loading…
Reference in New Issue