1
0
mirror of https://blitiri.com.ar/repos/chasquid synced 2025-12-17 14:37:02 +00:00

Fix documentation/comment typos

This patch fixes a variety of typos in documentation and comments, found
by running `codespell`.
This commit is contained in:
Alberto Bertogli
2023-10-07 12:40:59 +01:00
parent 43e98e08a8
commit 5cdbd9ff6e
15 changed files with 16 additions and 16 deletions

View File

@@ -1,5 +1,5 @@
# Break the handhake early.
# Break the handshake early.
client unix_listen .dovecot-client
c = ./dovecot-auth-cli .dovecot auth username password

View File

@@ -32,7 +32,7 @@ For example:
# Redirect mail to pepe@ to jose@ on the same domain.
pepe: jose
# Redirect mail to flowers@ to the indvidual flowers.
# Redirect mail to flowers@ to the individual flowers.
flowers: rose@backgarden, lilly@pond
```

View File

@@ -68,7 +68,7 @@ The output of the command will be parsed as if it was the right-hand side of
the aliases configuration file (see [Aliases](aliases.md) for more details).
Results are appended to the results of the file-based alias resolution.
If there is no alias for the address, the hook should just exit successfuly
If there is no alias for the address, the hook should just exit successfully
without emitting any output.
There is a 5 second timeout for hook execution. If the hook exits with an

View File

@@ -86,7 +86,7 @@ type Recipient struct {
Type RType
}
// RType represents a recipient type, see the contants below for valid values.
// RType represents a recipient type, see the constants below for valid values.
type RType string
// Valid recipient types.

View File

@@ -90,7 +90,7 @@ func TestNewDomain(t *testing.T) {
for _, c := range cases {
// The other tests do an incoming check first, so new domains would get
// created via that path. We switch the order here to exercise that
// OutgoingSecLevel also handles new domains successfuly.
// OutgoingSecLevel also handles new domains successfully.
if !db.OutgoingSecLevel(tr, c.domain, c.level) {
t.Errorf("domain %q not allowed (out) at %s", c.domain, c.level)
}

View File

@@ -239,7 +239,7 @@ func write(conn *textproto.Conn, msg string) error {
}
// isUsernameSafe to use in the dovecot protocol?
// Unfotunately dovecot's protocol is not very robust wrt. whitespace,
// Unfortunately dovecot's protocol is not very robust wrt. whitespace,
// so we need to be careful.
func isUsernameSafe(user string) bool {
for _, r := range user {

View File

@@ -19,7 +19,7 @@
// and it is possible that it will change in the future.
//
// Backwards compatibility is NOT guaranteed, until the format is fully
// standarized.
// standardized.
package expvarom
import (

View File

@@ -2,7 +2,7 @@
//
// This is a simple RPC package that uses a line-oriented protocol for
// encoding and decoding, and Unix sockets for transport. It is meant to be
// used for lightweight occassional communication between processes on the
// used for lightweight occasional communication between processes on the
// same machine.
package localrpc

View File

@@ -301,7 +301,7 @@ func (tr *trace) IsError() bool {
// We keep this many buckets of finished traces.
const nBuckets = 8
// Buckets to use. Lenght must match nBuckets.
// Buckets to use. Length must match nBuckets.
// "Traces with a latency >= $duration".
var buckets = []time.Duration{
time.Duration(0),

View File

@@ -845,7 +845,7 @@ func (c *Conn) runPostDataHook(data []byte) ([]byte, bool, error) {
cmd.Stdin = bytes.NewReader(data)
// Prepare the environment, copying some common variables so the hook has
// someting reasonable, and then setting the specific ones for this case.
// something reasonable, and then setting the specific ones for this case.
for _, v := range strings.Fields("USER PWD SHELL PATH") {
cmd.Env = append(cmd.Env, v+"="+os.Getenv(v))
}

View File

@@ -550,7 +550,7 @@ func TestHTTPGet(t *testing.T) {
t.Errorf("content type != text/plain was allowed: got %q, %v", raw, err)
}
// Invalid (unparseable) media type.
// Invalid (unparsable) media type.
srv4 := httptest.NewServer(
http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "invalid/content/type")

View File

@@ -37,7 +37,7 @@ if ! run_msmtp -a subm_tls someone@testserver < content 2> /dev/null; then
fi
if run_msmtp nobody@testserver < content 2> /dev/null; then
fail "successfuly sent an email to a non-existent user"
fail "successfully sent an email to a non-existent user"
fi
if run_msmtp -a baduser someone@testserver < content 2> /dev/null; then

View File

@@ -18,7 +18,7 @@ fi
# Create a temporary directory for dovecot to use, and generate the dovecot
# config based on the template.
# Note the lenght of the path must be < 100, because unix sockets have a low
# Note the length of the path must be < 100, because unix sockets have a low
# limitation, so we use a directory in /tmp, which is not ideal, as a
# workaround.
export ROOT="/tmp/chasquid-dovecot-test"
@@ -69,7 +69,7 @@ mail_diff content .mail/naked@srv
# Fail to send to nobody@srv (user does not exist).
if run_msmtp nobody@srv < content 2> /dev/null; then
fail "successfuly sent an email to a non-existent user"
fail "successfully sent an email to a non-existent user"
fi
# Fail to send from baduser@srv (user does not exist).

View File

@@ -37,7 +37,7 @@ if [ "$AUTH_AS" != "" ]; then
rm "$TF.dkimout"
else
# NOTE: This is using driusan/dkim instead of dkimpy, because dkimpy can't be
# overriden to get the DNS information from anywhere else (text file or custom
# overridden to get the DNS information from anywhere else (text file or custom
# DNS server).
dkimverify -txt ../.dkimcerts/private.dns < "$TF"
fi

View File

@@ -56,7 +56,7 @@ fi
# Verify the signature manually, just in case.
# NOTE: This is using driusan/dkim instead of dkimpy, because dkimpy can't be
# overriden to get the DNS information from anywhere else (text file or custom
# overridden to get the DNS information from anywhere else (text file or custom
# DNS server).
dkimverify -txt .dkimcerts/private.dns < .mail/someone@testserver