diff options
author | Sebastian Pipping <sebastian@pipping.org> | 2023-11-27 18:06:56 +0100 |
---|---|---|
committer | Sebastian Pipping <sebastian@pipping.org> | 2023-11-27 18:08:35 +0100 |
commit | 45ecfd3673cdbddad3bba434233eff4c2145c07a (patch) | |
tree | 9826ec13d6268be72dc9ff1d7d07bc2c0baa1257 | |
parent | 5e7ddd09888a7825aeb4ecf4da69bdf52af76bb2 (diff) | |
download | bindfs-45ecfd3673cdbddad3bba434233eff4c2145c07a.tar.gz |
Fix five typos pointed out by codespell
codespell report was:
> # git ls-files | xargs codespell
> src/bindfs.1:136: mimicing ==> mimicking
> src/bindfs.1:237: excecute ==> execute
> src/bindfs.1:445: efficent ==> efficient
> src/bindfs.1:526: accessable ==> accessible
> tests/test_bindfs.rb:976: hax ==> hex # not agreeing on a fix here
-rw-r--r-- | src/bindfs.1 | 8 | ||||
-rwxr-xr-x | tests/test_bindfs.rb | 2 |
2 files changed, 5 insertions, 5 deletions
diff --git a/src/bindfs.1 b/src/bindfs.1 index ca470ed..e89ba2d 100644 --- a/src/bindfs.1 +++ b/src/bindfs.1 @@ -133,7 +133,7 @@ have bindfs try to change the owner to a particular user or group. .B \-\-create\-as\-user, \-o create\-as\-user Tries to change the owner and group of new files and directories to the uid and gid of the caller. This can work only if the mounter is root. -It is also the default behavior (mimicing mount \-\-bind) if the mounter is root. +It is also the default behavior (mimicking mount \-\-bind) if the mounter is root. .TP .B \-\-create\-as\-mounter, \-o create\-as\-mounter @@ -234,7 +234,7 @@ Allows setting and clearing the executable attribute on files chmods will only affect execute bits on files and changes to other bits are discarded. With \-\-chmod\-deny, all chmods that would change any bits except -excecute bits on files will still fail with a 'permission denied'. +execute bits on files will still fail with a 'permission denied'. This option does nothing with \-\-chmod\-normal. @@ -442,7 +442,7 @@ See \fBfuse\fP(8) for the full list of FUSE options. Some of the more common one Make the mount strictly read-only. This even prevents root from writing to it. If this is all you need, then (since Linux 2.6.26) you can get a -more efficent mount with \fBmount \-\-bind\fP and then \fBmount \-o remount,ro\fP. +more efficient mount with \fBmount \-\-bind\fP and then \fBmount \-o remount,ro\fP. .TP .B \-d, \-o debug @@ -523,7 +523,7 @@ and adds the user execute bit for directories and executables. .TP .B bindfs \-ono\-allow\-other,perms=a\-w somedir somedir -Makes a directory read\-only and accessable only by the current user. +Makes a directory read\-only and accessible only by the current user. .TP .B /home/bob/shared /var/www/shared/bob fuse.bindfs perms=0000:u+rD 0 0 diff --git a/tests/test_bindfs.rb b/tests/test_bindfs.rb index 5adda52..22f356f 100755 --- a/tests/test_bindfs.rb +++ b/tests/test_bindfs.rb @@ -973,7 +973,7 @@ testenv("", :title => "socket files") do end end -# FIXME: this stuff around testenv is a hax, and testenv may also exit(), which defeats the 'ensure' below. +# FIXME: this stuff around testenv is a hack, and testenv may also exit(), which defeats the 'ensure' below. # the test setup ought to be refactored. It might well use MiniTest or something. # TODO: support FreeBSD in this test (different group management commands) if Process.uid == 0 && `uname`.strip == 'Linux' |