aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMartin Pärtel <martin.partel@gmail.com>2023-11-27 19:28:00 +0200
committerGitHub <noreply@github.com>2023-11-27 19:28:00 +0200
commit47f4cac457c3583548c0d7dba402568a1e0871b8 (patch)
treed1154d31d6419094601c5e0b41cdc1084cf28589
parent5e7ddd09888a7825aeb4ecf4da69bdf52af76bb2 (diff)
parent4e4c9a75b1fd4ea42e645d87152fa5028c0d80d1 (diff)
downloadbindfs-47f4cac457c3583548c0d7dba402568a1e0871b8.tar.gz
Merge pull request #151 from hartwork/codespell-ci
Make CI reject spelling errors using codespell + fix five typos
-rw-r--r--.github/workflows/codespell.yml23
-rw-r--r--src/bindfs.18
-rwxr-xr-xtests/test_bindfs.rb2
3 files changed, 28 insertions, 5 deletions
diff --git a/.github/workflows/codespell.yml b/.github/workflows/codespell.yml
new file mode 100644
index 0000000..8789c12
--- /dev/null
+++ b/.github/workflows/codespell.yml
@@ -0,0 +1,23 @@
+# Copyright (c) 2023 Sebastian Pipping <sebastian@pipping.org>
+# Licensed under GPL v2 or later
+
+name: Enforce codespell-clean spelling
+
+on:
+ pull_request:
+ push:
+ schedule:
+ - cron: '0 3 * * 5' # Every Friday at 3am
+ workflow_dispatch:
+
+# Minimum permissions for security
+permissions:
+ contents: read
+
+jobs:
+ codespell:
+ name: Enforce codespell-clean spelling
+ runs-on: ubuntu-22.04
+ steps:
+ - uses: actions/checkout@v4
+ - uses: codespell-project/actions-codespell@v2.0
diff --git a/src/bindfs.1 b/src/bindfs.1
index ca470ed..e89ba2d 100644
--- a/src/bindfs.1
+++ b/src/bindfs.1
@@ -133,7 +133,7 @@ have bindfs try to change the owner to a particular user or group.
.B \-\-create\-as\-user, \-o create\-as\-user
Tries to change the owner and group of new files and directories to the
uid and gid of the caller. This can work only if the mounter is root.
-It is also the default behavior (mimicing mount \-\-bind) if the mounter is root.
+It is also the default behavior (mimicking mount \-\-bind) if the mounter is root.
.TP
.B \-\-create\-as\-mounter, \-o create\-as\-mounter
@@ -234,7 +234,7 @@ Allows setting and clearing the executable attribute on files
chmods will only affect execute bits on files and changes to other bits are
discarded.
With \-\-chmod\-deny, all chmods that would change any bits except
-excecute bits on files will still fail with a 'permission denied'.
+execute bits on files will still fail with a 'permission denied'.
This option does nothing with \-\-chmod\-normal.
@@ -442,7 +442,7 @@ See \fBfuse\fP(8) for the full list of FUSE options. Some of the more common one
Make the mount strictly read-only.
This even prevents root from writing to it.
If this is all you need, then (since Linux 2.6.26) you can get a
-more efficent mount with \fBmount \-\-bind\fP and then \fBmount \-o remount,ro\fP.
+more efficient mount with \fBmount \-\-bind\fP and then \fBmount \-o remount,ro\fP.
.TP
.B \-d, \-o debug
@@ -523,7 +523,7 @@ and adds the user execute bit for directories and executables.
.TP
.B bindfs \-ono\-allow\-other,perms=a\-w somedir somedir
-Makes a directory read\-only and accessable only by the current user.
+Makes a directory read\-only and accessible only by the current user.
.TP
.B /home/bob/shared /var/www/shared/bob fuse.bindfs perms=0000:u+rD 0 0
diff --git a/tests/test_bindfs.rb b/tests/test_bindfs.rb
index 5adda52..22f356f 100755
--- a/tests/test_bindfs.rb
+++ b/tests/test_bindfs.rb
@@ -973,7 +973,7 @@ testenv("", :title => "socket files") do
end
end
-# FIXME: this stuff around testenv is a hax, and testenv may also exit(), which defeats the 'ensure' below.
+# FIXME: this stuff around testenv is a hack, and testenv may also exit(), which defeats the 'ensure' below.
# the test setup ought to be refactored. It might well use MiniTest or something.
# TODO: support FreeBSD in this test (different group management commands)
if Process.uid == 0 && `uname`.strip == 'Linux'