Apply codespell -w throughout
This commit is contained in:
parent
100f5aabb6
commit
84b0a3707a
108 changed files with 135 additions and 135 deletions
|
@ -141,7 +141,7 @@ borgSetup _ mu _ c _gc = do
|
|||
M.lookup borgrepoField c
|
||||
|
||||
-- The borgrepo is stored in git config, as well as this repo's
|
||||
-- persistant state, so it can vary between hosts.
|
||||
-- persistent state, so it can vary between hosts.
|
||||
gitConfigSpecialRemote u c [("borgrepo", borgrepo)]
|
||||
|
||||
return (c, u)
|
||||
|
|
|
@ -137,7 +137,7 @@ bupSetup _ mu _ c gc = do
|
|||
storeBupUUID u buprepo
|
||||
|
||||
-- The buprepo is stored in git config, as well as this repo's
|
||||
-- persistant state, so it can vary between hosts.
|
||||
-- persistent state, so it can vary between hosts.
|
||||
gitConfigSpecialRemote u c' [("buprepo", buprepo)]
|
||||
|
||||
return (c', u)
|
||||
|
|
|
@ -120,7 +120,7 @@ ddarSetup _ mu _ c gc = do
|
|||
(c', _encsetup) <- encryptionSetup c gc
|
||||
|
||||
-- The ddarrepo is stored in git config, as well as this repo's
|
||||
-- persistant state, so it can vary between hosts.
|
||||
-- persistent state, so it can vary between hosts.
|
||||
gitConfigSpecialRemote u c' [("ddarrepo", ddarrepo)]
|
||||
|
||||
return (c', u)
|
||||
|
|
|
@ -153,7 +153,7 @@ directorySetup _ mu _ c gc = do
|
|||
(c', _encsetup) <- encryptionSetup c gc
|
||||
|
||||
-- The directory is stored in git config, not in this remote's
|
||||
-- persistant state, so it can vary between hosts.
|
||||
-- persistent state, so it can vary between hosts.
|
||||
gitConfigSpecialRemote u c' [("directory", absdir)]
|
||||
return (M.delete directoryField c', u)
|
||||
|
||||
|
|
|
@ -536,7 +536,7 @@ receiveMessageAddonProcess p = do
|
|||
shutdownAddonProcess :: AddonProcess.ExternalAddonProcess -> Bool -> IO ()
|
||||
shutdownAddonProcess = AddonProcess.externalShutdown
|
||||
|
||||
{- A response handler can yeild a result, or it can request that another
|
||||
{- A response handler can yield a result, or it can request that another
|
||||
- message be consumed from the external. -}
|
||||
data ResponseHandlerResult a
|
||||
= Result a
|
||||
|
@ -548,7 +548,7 @@ result :: a -> Maybe (Annex (ResponseHandlerResult a))
|
|||
result = Just . return . Result
|
||||
|
||||
{- Waits for a message from the external remote, and passes it to the
|
||||
- apppropriate handler.
|
||||
- appropriate handler.
|
||||
-
|
||||
- If the handler returns Nothing, this is a protocol error.-}
|
||||
receiveMessage
|
||||
|
|
2
Remote/External/AsyncExtension.hs
vendored
2
Remote/External/AsyncExtension.hs
vendored
|
@ -46,7 +46,7 @@ runRelayToExternalAsync external st annexrunner = do
|
|||
, externalReceive = atomically (readTBMChan receiveq)
|
||||
-- This shuts down the whole relay.
|
||||
, externalShutdown = shutdown external st sendq sender receiver
|
||||
-- These three TMVars are shared amoung all
|
||||
-- These three TMVars are shared among all
|
||||
-- ExternalStates that use this relay; they're
|
||||
-- common state about the external process.
|
||||
, externalPrepared = externalPrepared st
|
||||
|
|
|
@ -84,7 +84,7 @@ urlField = Accepted "url"
|
|||
gen :: Git.Repo -> UUID -> RemoteConfig -> RemoteGitConfig -> RemoteStateHandle -> Annex (Maybe Remote)
|
||||
gen r u rc gc rs = do
|
||||
c <- parsedRemoteConfig remote rc
|
||||
-- If the repo uses gcrypt, get the underlaying repo without the
|
||||
-- If the repo uses gcrypt, get the underlying repo without the
|
||||
-- gcrypt url, to do LFS endpoint discovery on.
|
||||
r' <- if Git.GCrypt.isEncrypted r
|
||||
then do
|
||||
|
|
|
@ -212,7 +212,7 @@ adjustExportImport' isexport isimport r rs = do
|
|||
-- ones though, since they still allow accessing by Key.
|
||||
-- And for thirdPartyPopulated, it depends on how the
|
||||
-- content gets actually stored in the remote, so
|
||||
-- is not overriddden here.
|
||||
-- is not overridden here.
|
||||
, untrustworthy =
|
||||
if versioned || thirdPartyPopulated (remotetype r)
|
||||
then untrustworthy r
|
||||
|
@ -235,7 +235,7 @@ adjustExportImport' isexport isimport r rs = do
|
|||
where
|
||||
thirdpartypopulated = thirdPartyPopulated (remotetype r)
|
||||
|
||||
-- exportActions adjusted to use the equivilant import actions,
|
||||
-- exportActions adjusted to use the equivalent import actions,
|
||||
-- which take ContentIdentifiers into account.
|
||||
exportActionsForImport dbv ciddbv ea = ea
|
||||
{ storeExport = \f k loc p -> do
|
||||
|
|
|
@ -151,7 +151,7 @@ rsyncParamsRemote r direction key file = do
|
|||
{- The rsync shell parameter controls where rsync
|
||||
- goes, so the source/dest parameter can be a dummy value,
|
||||
- that just enables remote rsync mode.
|
||||
- For maximum compatability with some patched rsyncs,
|
||||
- For maximum compatibility with some patched rsyncs,
|
||||
- the dummy value needs to still contain a hostname,
|
||||
- even though this hostname will never be used. -}
|
||||
dummy = Param "dummy:"
|
||||
|
|
|
@ -205,7 +205,7 @@ rsyncSetup _ mu _ c gc = do
|
|||
(c', _encsetup) <- encryptionSetup c gc
|
||||
|
||||
-- The rsyncurl is stored in git config, not only in this remote's
|
||||
-- persistant state, so it can vary between hosts.
|
||||
-- persistent state, so it can vary between hosts.
|
||||
gitConfigSpecialRemote u c' [("rsyncurl", url)]
|
||||
return (c', u)
|
||||
|
||||
|
@ -283,7 +283,7 @@ removeGeneric o includes = do
|
|||
ps <- sendParams
|
||||
opts <- rsyncOptions o
|
||||
ok <- withRsyncScratchDir $ \tmp -> liftIO $ do
|
||||
{- Send an empty directory to rysnc to make it delete. -}
|
||||
{- Send an empty directory to rsync to make it delete. -}
|
||||
rsync $ opts ++ ps ++
|
||||
map (\s -> Param $ "--include=" ++ s) includes ++
|
||||
[ Param "--exclude=*" -- exclude everything else
|
||||
|
|
|
@ -868,7 +868,7 @@ giveupS3HandleProblem S3HandleNeedCreds u = do
|
|||
warning $ needS3Creds u
|
||||
giveup "No S3 credentials configured"
|
||||
giveupS3HandleProblem S3HandleAnonymousOldAws _ =
|
||||
giveup "This S3 special remote is configured with signature=anonymous, but git-annex is buit with too old a version of the aws library to support that."
|
||||
giveup "This S3 special remote is configured with signature=anonymous, but git-annex is built with too old a version of the aws library to support that."
|
||||
|
||||
{- Prepares a S3Handle for later use. Does not connect to S3 or do anything
|
||||
- else expensive. -}
|
||||
|
|
|
@ -237,7 +237,7 @@ removeExportDav hdl _k loc = case exportLocation loc of
|
|||
Right p -> withDavHandle hdl $ \h -> runExport h $ \_dav ->
|
||||
removeHelper p
|
||||
-- When the exportLocation is not legal for webdav,
|
||||
-- the content is certianly not stored there, so it's ok for
|
||||
-- the content is certainly not stored there, so it's ok for
|
||||
-- removal to succeed. This allows recovery after failure to store
|
||||
-- content there, as the user can rename the problem file and
|
||||
-- this will be called to make sure it's gone.
|
||||
|
|
|
@ -66,7 +66,7 @@ keyTmpLocation = tmpLocation . fromRawFilePath . keyFile
|
|||
-
|
||||
- This could be just the keyTmpLocation, but when the file is in a
|
||||
- subdirectory, the temp file is put in there. Partly this is to keep
|
||||
- it close to the final destination; also certian webdav servers
|
||||
- it close to the final destination; also certain webdav servers
|
||||
- seem to be buggy when renaming files from the root into a subdir,
|
||||
- and so writing to the subdir avoids such problems.
|
||||
-}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue