Skip to content

Commit 4dd7b7b

Browse files
authored
Merge pull request rust-osdev#687 from phip1611/typos
ci: add spellcheck with "typos"
2 parents 39fee66 + c5e8b95 commit 4dd7b7b

File tree

16 files changed

+43
-18
lines changed

16 files changed

+43
-18
lines changed

.github/workflows/qa.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
name: QA
2+
3+
on: [ push, pull_request ]
4+
5+
jobs:
6+
spellcheck:
7+
name: Spellcheck
8+
runs-on: ubuntu-22.04
9+
steps:
10+
- uses: actions/checkout@v3
11+
# Executes "typos ."
12+
- uses: crate-ci/typos@v1.13.20

.typos.toml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
# Configuration for the typos spell checker utility (<https://github.com/crate-ci/typos>).
2+
3+
[files]
4+
extend-exclude = [
5+
# "uefi/src/table/boot.rs"
6+
]
7+
8+
[default.extend-words]
9+
# FOOBAR = "FOOBAR"
10+
11+
[default.extend-identifiers]
12+
# FOOBAR = "FOOBAR"
13+

PUBLISHING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ which crates were modified and how should their version numbers be incremented.
1515

1616
Incrementing the version number of a crate is as simple as editing
1717
the corresponding `Cargo.toml` file and updating the `version = ...` line,
18-
then commiting the change (preferrably on a new branch, so that all of the version bumps
18+
then committing the change (preferably on a new branch, so that all the version bumps
1919
can be combined in a single pull request).
2020

2121
### Crate dependencies

book/src/concepts/gpt.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ systems too. There are a couple big advantages of using GPT over MBR:
1010

1111
A GPT disk contains a primary header near the beginning of the disk,
1212
followed by a partition entry array. The header and partition entry
13-
array have a secondary copy at the end of the disk for redundency. The
13+
array have a secondary copy at the end of the disk for redundancy. The
1414
partition entry arrays contain structures that describe each partition,
1515
including a GUID to identify the individual partition, a partition type
1616
GUID to indicate the purpose of the partition, and start/end block

uefi-test-runner/src/proto/debug.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ fn test_invalidate_instruction_cache(debug_support: &mut DebugSupport) {
9696
debug_support
9797
.invalidate_instruction_cache(0, ptr, 64)
9898
// Should always pass, since the spec says this always returns EFI_SUCCESS
99-
.expect("Error occured while invalidating instruction cache");
99+
.expect("Error occurred while invalidating instruction cache");
100100
}
101101
}
102102

uefi/src/data_types/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ mod tests {
176176
assert_eq!(X::round_up_to_alignment(7), 8);
177177
assert_eq!(X::round_up_to_alignment(8), 8);
178178

179-
// Get an intentionally mis-aligned buffer.
179+
// Get an intentionally misaligned buffer.
180180
let mut buffer = [0u8; 16];
181181
let mut buffer = &mut buffer[..];
182182
if (buffer.as_ptr() as usize) % X::alignment() == 0 {

uefi/src/proto/console/gop.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -631,7 +631,7 @@ impl<'gop> FrameBuffer<'gop> {
631631
/// # Safety
632632
///
633633
/// This operation is unsafe because...
634-
/// - It is your reponsibility to make sure that the value type makes sense
634+
/// - It is your responsibility to make sure that the value type makes sense
635635
/// - You must honor the pixel format and stride specified by the mode info
636636
/// - There is no bound checking on memory accesses in release mode
637637
#[inline]
@@ -653,7 +653,7 @@ impl<'gop> FrameBuffer<'gop> {
653653
/// # Safety
654654
///
655655
/// This operation is unsafe because...
656-
/// - It is your reponsibility to make sure that the value type makes sense
656+
/// - It is your responsibility to make sure that the value type makes sense
657657
/// - You must honor the pixel format and stride specified by the mode info
658658
/// - There is no bound checking on memory accesses in release mode
659659
#[inline]

uefi/src/proto/console/pointer/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ impl<'boot> Pointer<'boot> {
2727
(self.reset)(self, extended_verification).into()
2828
}
2929

30-
/// Retrieves the pointer device's current state, if a state change occured
30+
/// Retrieves the pointer device's current state, if a state change occurred
3131
/// since the last time this function was called.
3232
///
3333
/// Use `wait_for_input_event()` with the `BootServices::wait_for_event()`

uefi/src/proto/debug/context.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// note from the spec:
22
// When the context record field is larger than the register being stored in it, the upper bits of the
33
// context record field are unused and ignored
4-
/// Universal EFI_SYSTEM_CONTEXT defintion
4+
/// Universal EFI_SYSTEM_CONTEXT definition
55
/// This is passed to debug callbacks
66
#[repr(C)]
77
pub union SystemContext {

uefi/src/proto/device_path/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
//! Device Path protocol
22
//!
33
//! A UEFI device path is a very flexible structure for encoding a
4-
//! programatic path such as a hard drive or console.
4+
//! programmatic path such as a hard drive or console.
55
//!
66
//! A device path is made up of a packed list of variable-length nodes of
77
//! various types. The entire device path is terminated with an

0 commit comments

Comments
 (0)