chore: Fix typos

This is a repeat of #11561
This commit is contained in:
Ed Page 2023-09-19 15:28:38 -05:00
parent e4de526f25
commit e4e10f2393
43 changed files with 49 additions and 49 deletions

View File

@ -429,7 +429,7 @@
[#10877](https://github.com/rust-lang/cargo/pull/10877) [#10877](https://github.com/rust-lang/cargo/pull/10877)
- SemVer: It is not a breaking change to make an unsafe function safe. - SemVer: It is not a breaking change to make an unsafe function safe.
[#12116](https://github.com/rust-lang/cargo/pull/12116) [#12116](https://github.com/rust-lang/cargo/pull/12116)
- SemVer: changeing MSRV is generally a minor change. - SemVer: changing MSRV is generally a minor change.
[#12122](https://github.com/rust-lang/cargo/pull/12122) [#12122](https://github.com/rust-lang/cargo/pull/12122)
- Clarify when and how to `cargo yank`. - Clarify when and how to `cargo yank`.
[#11862](https://github.com/rust-lang/cargo/pull/11862) [#11862](https://github.com/rust-lang/cargo/pull/11862)
@ -728,9 +728,9 @@
- Clarified the difference between `CARGO_CRATE_NAME` and `CARGO_PKG_NAME`. - Clarified the difference between `CARGO_CRATE_NAME` and `CARGO_PKG_NAME`.
[#11576](https://github.com/rust-lang/cargo/pull/11576) [#11576](https://github.com/rust-lang/cargo/pull/11576)
- Added links to the Target section of the glossary for occurences of target triple. - Added links to the Target section of the glossary for occurrences of target triple.
[#11603](https://github.com/rust-lang/cargo/pull/11603) [#11603](https://github.com/rust-lang/cargo/pull/11603)
- Described how the current resolver sometimes duplicates depenencies. - Described how the current resolver sometimes duplicates dependencies.
[#11604](https://github.com/rust-lang/cargo/pull/11604) [#11604](https://github.com/rust-lang/cargo/pull/11604)
- Added a note about verifying your email address on crates.io. - Added a note about verifying your email address on crates.io.
[#11620](https://github.com/rust-lang/cargo/pull/11620) [#11620](https://github.com/rust-lang/cargo/pull/11620)
@ -889,7 +889,7 @@
### Nightly only ### Nightly only
- Implemented a inital support of asymmetric token authentication for registries. - Implemented a initial support of asymmetric token authentication for registries.
([RFC 3231](https://github.com/rust-lang/rfcs/blob/master/text/3231-cargo-asymmetric-tokens.md)) ([RFC 3231](https://github.com/rust-lang/rfcs/blob/master/text/3231-cargo-asymmetric-tokens.md))
([docs](https://doc.rust-lang.org/nightly/cargo/reference/unstable.html#registry-auth)) ([docs](https://doc.rust-lang.org/nightly/cargo/reference/unstable.html#registry-auth))
[#10771](https://github.com/rust-lang/cargo/pull/10771) [#10771](https://github.com/rust-lang/cargo/pull/10771)

View File

@ -142,7 +142,7 @@ pub enum Error {
#[error(transparent)] #[error(transparent)]
Curl(#[from] curl::Error), Curl(#[from] curl::Error),
/// Error from seriailzing the request payload and deserialzing the /// Error from seriailzing the request payload and deserializing the
/// response body (like response body didn't match expected structure). /// response body (like response body didn't match expected structure).
#[error(transparent)] #[error(transparent)]
Json(#[from] serde_json::Error), Json(#[from] serde_json::Error),

View File

@ -161,7 +161,7 @@ fn bump_check(args: &clap::ArgMatches, config: &cargo::util::Config) -> CargoRes
]; ];
// Even when we test against baseline-rev, we still need to make sure a // Even when we test against baseline-rev, we still need to make sure a
// change doesn't violate SemVer rules aginst crates.io releases. The // change doesn't violate SemVer rules against crates.io releases. The
// possibility of this happening is nearly zero but no harm to check twice. // possibility of this happening is nearly zero but no harm to check twice.
let mut cmd = ProcessBuilder::new("cargo"); let mut cmd = ProcessBuilder::new("cargo");
cmd.arg("semver-checks") cmd.arg("semver-checks")
@ -397,7 +397,7 @@ fn check_crates_io<'a>(
Ok(()) Ok(())
} }
/// Checkouts a temporary workspace to do further version comparsions. /// Checkouts a temporary workspace to do further version comparisons.
fn checkout_ws<'cfg, 'a>( fn checkout_ws<'cfg, 'a>(
ws: &Workspace<'cfg>, ws: &Workspace<'cfg>,
repo: &'a git2::Repository, repo: &'a git2::Repository,

View File

@ -314,7 +314,7 @@ For more information, see issue #10049 <https://github.com/rust-lang/cargo/issue
} else { } else {
config.shell().warn(format_args!( config.shell().warn(format_args!(
"\ "\
user-defined alias `{cmd}` has the appearance of a manfiest-command user-defined alias `{cmd}` has the appearance of a manifest-command
This was previously accepted but will be phased out when `-Zscript` is stabilized. This was previously accepted but will be phased out when `-Zscript` is stabilized.
For more information, see issue #12207 <https://github.com/rust-lang/cargo/issues/12207>." For more information, see issue #12207 <https://github.com/rust-lang/cargo/issues/12207>."
))?; ))?;
@ -449,7 +449,7 @@ impl Exec {
if !config.cli_unstable().script && ext_path.is_some() { if !config.cli_unstable().script && ext_path.is_some() {
config.shell().warn(format_args!( config.shell().warn(format_args!(
"\ "\
external subcommand `{cmd}` has the appearance of a manfiest-command external subcommand `{cmd}` has the appearance of a manifest-command
This was previously accepted but will be phased out when `-Zscript` is stabilized. This was previously accepted but will be phased out when `-Zscript` is stabilized.
For more information, see issue #12207 <https://github.com/rust-lang/cargo/issues/12207>.", For more information, see issue #12207 <https://github.com/rust-lang/cargo/issues/12207>.",
))?; ))?;

View File

@ -547,7 +547,7 @@ impl<'a, 'cfg: 'a> CompilationFiles<'a, 'cfg> {
/// Gets the metadata hash for the given [`Unit`]. /// Gets the metadata hash for the given [`Unit`].
/// ///
/// Whne a metadata hash doesn't exist for the given unit, /// When a metadata hash doesn't exist for the given unit,
/// this calls itself recursively to compute metadata hashes of all its dependencies. /// this calls itself recursively to compute metadata hashes of all its dependencies.
/// See [`compute_metadata`] for how a single metadata hash is computed. /// See [`compute_metadata`] for how a single metadata hash is computed.
fn metadata_of<'a>( fn metadata_of<'a>(

View File

@ -240,7 +240,7 @@ fn emit_build_output(
/// ///
/// The construction includes: /// The construction includes:
/// ///
/// * Set environment varibles for the build script run. /// * Set environment variables for the build script run.
/// * Create the output dir (`OUT_DIR`) for the build script output. /// * Create the output dir (`OUT_DIR`) for the build script output.
/// * Determine if the build script needs a re-run. /// * Determine if the build script needs a re-run.
/// * Run the build script and store its output. /// * Run the build script and store its output.
@ -827,7 +827,7 @@ impl BuildOutput {
None => return false, None => return false,
Some(n) => n, Some(n) => n,
}; };
// ALLOWED: the process of rustc boostrapping reads this through // ALLOWED: the process of rustc bootstrapping reads this through
// `std::env`. We should make the behavior consistent. Also, we // `std::env`. We should make the behavior consistent. Also, we
// don't advertise this for bypassing nightly. // don't advertise this for bypassing nightly.
#[allow(clippy::disallowed_methods)] #[allow(clippy::disallowed_methods)]

View File

@ -1764,7 +1764,7 @@ fn compare_old_fingerprint(
/// Logs the result of fingerprint comparison. /// Logs the result of fingerprint comparison.
/// ///
/// TODO: Obsolete and mostly superceded by [`DirtyReason`]. Could be removed. /// TODO: Obsolete and mostly superseded by [`DirtyReason`]. Could be removed.
fn log_compare(unit: &Unit, compare: &CargoResult<Option<DirtyReason>>) { fn log_compare(unit: &Unit, compare: &CargoResult<Option<DirtyReason>>) {
match compare { match compare {
Ok(None) => {} Ok(None) => {}
@ -1820,7 +1820,7 @@ pub fn parse_dep_info(
Ok(Some(ret)) Ok(Some(ret))
} }
/// Calcuates the fingerprint of a unit thats contains no dep-info files. /// Calculates the fingerprint of a unit thats contains no dep-info files.
fn pkg_fingerprint(bcx: &BuildContext<'_, '_>, pkg: &Package) -> CargoResult<String> { fn pkg_fingerprint(bcx: &BuildContext<'_, '_>, pkg: &Package) -> CargoResult<String> {
let source_id = pkg.package_id().source_id(); let source_id = pkg.package_id().source_id();
let sources = bcx.packages.sources(); let sources = bcx.packages.sources();

View File

@ -11,7 +11,7 @@
//! like what rustc has done[^1]. Also, no one knows if Cargo really needs that. //! like what rustc has done[^1]. Also, no one knows if Cargo really needs that.
//! To be pragmatic, here we list a handful of items you may want to learn: //! To be pragmatic, here we list a handful of items you may want to learn:
//! //!
//! * [`BuildContext`] is a static context containg all information you need //! * [`BuildContext`] is a static context containing all information you need
//! before a build gets started. //! before a build gets started.
//! * [`Context`] is the center of the world, coordinating a running build and //! * [`Context`] is the center of the world, coordinating a running build and
//! collecting information from it. //! collecting information from it.
@ -19,7 +19,7 @@
//! * [`fingerprint`] not only defines but also executes a set of rules to //! * [`fingerprint`] not only defines but also executes a set of rules to
//! determine if a re-compile is needed. //! determine if a re-compile is needed.
//! * [`job_queue`] is where the parallelism, job scheduling, and communication //! * [`job_queue`] is where the parallelism, job scheduling, and communication
//! machinary happen between Cargo and the compiler. //! machinery happen between Cargo and the compiler.
//! * [`layout`] defines and manages output artifacts of a build in the filesystem. //! * [`layout`] defines and manages output artifacts of a build in the filesystem.
//! * [`unit_dependencies`] is for building a dependency graph for compilation //! * [`unit_dependencies`] is for building a dependency graph for compilation
//! from a result of dependency resolution. //! from a result of dependency resolution.

View File

@ -1209,7 +1209,7 @@ pub fn channel() -> String {
if let Ok(override_channel) = env::var("__CARGO_TEST_CHANNEL_OVERRIDE_DO_NOT_USE_THIS") { if let Ok(override_channel) = env::var("__CARGO_TEST_CHANNEL_OVERRIDE_DO_NOT_USE_THIS") {
return override_channel; return override_channel;
} }
// ALLOWED: the process of rustc boostrapping reads this through // ALLOWED: the process of rustc bootstrapping reads this through
// `std::env`. We should make the behavior consistent. Also, we // `std::env`. We should make the behavior consistent. Also, we
// don't advertise this for bypassing nightly. // don't advertise this for bypassing nightly.
#[allow(clippy::disallowed_methods)] #[allow(clippy::disallowed_methods)]

View File

@ -399,7 +399,7 @@ impl<'cfg> PackageRegistry<'cfg> {
// Note that this is somewhat subtle where the list of `ids` for a // Note that this is somewhat subtle where the list of `ids` for a
// canonical URL is extend with possibly two ids per summary. This is done // canonical URL is extend with possibly two ids per summary. This is done
// to handle the transition from the v2->v3 lock file format where in // to handle the transition from the v2->v3 lock file format where in
// v2 DefeaultBranch was either DefaultBranch or Branch("master") for // v2 DefaultBranch was either DefaultBranch or Branch("master") for
// git dependencies. In this case if `summary.package_id()` is // git dependencies. In this case if `summary.package_id()` is
// Branch("master") then alt_package_id will be DefaultBranch. This // Branch("master") then alt_package_id will be DefaultBranch. This
// signifies that there's a patch available for either of those // signifies that there's a patch available for either of those

View File

@ -7,7 +7,7 @@
//! - <https://doc.rust-lang.org/nightly/nightly-rustc/cargo>: targeted at cargo contributors //! - <https://doc.rust-lang.org/nightly/nightly-rustc/cargo>: targeted at cargo contributors
//! - Updated on each update of the `cargo` submodule in `rust-lang/rust` //! - Updated on each update of the `cargo` submodule in `rust-lang/rust`
//! //!
//! **WARNING:** Using Cargo as a library has drawbacks, particulary the API is unstable, //! **WARNING:** Using Cargo as a library has drawbacks, particularly the API is unstable,
//! and there is no clear path to stabilize it soon at the time of writing. See [The Cargo Book: //! and there is no clear path to stabilize it soon at the time of writing. See [The Cargo Book:
//! External tools] for more on this topic. //! External tools] for more on this topic.
//! //!

View File

@ -316,7 +316,7 @@ fn build_resolve_graph_r(
dep_kinds, dep_kinds,
}, },
// No lib or artifact dep exists. // No lib or artifact dep exists.
// Ususally this mean parent depending on non-lib bin crate. // Usually this mean parent depending on non-lib bin crate.
(None, _) => continue, (None, _) => continue,
}; };

View File

@ -2,7 +2,7 @@
//! //!
//! Apparently, the most important type in this module is [`GitSource`]. //! Apparently, the most important type in this module is [`GitSource`].
//! [`utils`] provides libgit2 utilities like fetch and checkout, whereas //! [`utils`] provides libgit2 utilities like fetch and checkout, whereas
//! [`oxide`] is the couterpart for gitoxide integration. [`known_hosts`] //! [`oxide`] is the counterpart for gitoxide integration. [`known_hosts`]
//! is the mitigation of [CVE-2022-46176]. //! is the mitigation of [CVE-2022-46176].
//! //!
//! [CVE-2022-46176]: https://blog.rust-lang.org/2023/01/10/cve-2022-46176.html //! [CVE-2022-46176]: https://blog.rust-lang.org/2023/01/10/cve-2022-46176.html

View File

@ -353,7 +353,7 @@ pub fn cargo_config_to_gitoxide_overrides(config: &Config) -> CargoResult<Vec<BS
Ok(values) Ok(values)
} }
/// Reinitializes a given Git repository. This is useful when a Git repoistory /// Reinitializes a given Git repository. This is useful when a Git repository
/// seems corrupted and we want to start over. /// seems corrupted and we want to start over.
pub fn reinitialize(git_dir: &Path) -> CargoResult<()> { pub fn reinitialize(git_dir: &Path) -> CargoResult<()> {
fn init(path: &Path, bare: bool) -> CargoResult<()> { fn init(path: &Path, bare: bool) -> CargoResult<()> {

View File

@ -73,7 +73,7 @@ pub struct GitSource<'cfg> {
source_id: SourceId, source_id: SourceId,
/// The underlying path source to discover packages inside the Git repository. /// The underlying path source to discover packages inside the Git repository.
path_source: Option<PathSource<'cfg>>, path_source: Option<PathSource<'cfg>>,
/// The identifer of this source for Cargo's Git cache directory. /// The identifier of this source for Cargo's Git cache directory.
/// See [`ident`] for more. /// See [`ident`] for more.
ident: String, ident: String,
config: &'cfg Config, config: &'cfg Config,

View File

@ -264,7 +264,7 @@ impl<'a> GitCheckout<'a> {
/// is done. Use [`GitCheckout::is_fresh`] to check. /// is done. Use [`GitCheckout::is_fresh`] to check.
/// ///
/// * The `database` is where this checkout is from. /// * The `database` is where this checkout is from.
/// * The `repo` will be the checked out Git repoistory. /// * The `repo` will be the checked out Git repository.
fn new( fn new(
database: &'a GitDatabase, database: &'a GitDatabase,
revision: git2::Oid, revision: git2::Oid,
@ -394,7 +394,7 @@ impl<'a> GitCheckout<'a> {
fn update_submodules(&self, cargo_config: &Config) -> CargoResult<()> { fn update_submodules(&self, cargo_config: &Config) -> CargoResult<()> {
return update_submodules(&self.repo, cargo_config, self.remote_url().as_str()); return update_submodules(&self.repo, cargo_config, self.remote_url().as_str());
/// Recusive helper for [`GitCheckout::update_submodules`]. /// Recursive helper for [`GitCheckout::update_submodules`].
fn update_submodules( fn update_submodules(
repo: &git2::Repository, repo: &git2::Repository,
cargo_config: &Config, cargo_config: &Config,
@ -1086,7 +1086,7 @@ pub fn fetch(
debug!("fetch failed: {}", err); debug!("fetch failed: {}", err);
if !repo_reinitialized.load(Ordering::Relaxed) if !repo_reinitialized.load(Ordering::Relaxed)
// We check for errors that could occour if the configuration, refs or odb files are corrupted. // We check for errors that could occur if the configuration, refs or odb files are corrupted.
// We don't check for errors related to writing as `gitoxide` is expected to create missing leading // We don't check for errors related to writing as `gitoxide` is expected to create missing leading
// folder before writing files into it, or else not even open a directory as git repository (which is // folder before writing files into it, or else not even open a directory as git repository (which is
// also handled here). // also handled here).
@ -1331,7 +1331,7 @@ fn clean_repo_temp_files(repo: &git2::Repository) {
} }
} }
/// Reinitializes a given Git repository. This is useful when a Git repoistory /// Reinitializes a given Git repository. This is useful when a Git repository
/// seems corrupted and we want to start over. /// seems corrupted and we want to start over.
fn reinitialize(repo: &mut git2::Repository) -> CargoResult<()> { fn reinitialize(repo: &mut git2::Repository) -> CargoResult<()> {
// Here we want to drop the current repository object pointed to by `repo`, // Here we want to drop the current repository object pointed to by `repo`,

View File

@ -1,4 +1,4 @@
//! The trait for sources of Cargo packages and its built-in implemetations. //! The trait for sources of Cargo packages and its built-in implementations.
//! //!
//! A source is a provider that contains source files and metadata of packages. //! A source is a provider that contains source files and metadata of packages.
//! It provides a number of methods to fetch those package information, for //! It provides a number of methods to fetch those package information, for

View File

@ -323,7 +323,7 @@ struct SummariesCache<'a> {
/// A single line in the index representing a single version of a package. /// A single line in the index representing a single version of a package.
#[derive(Deserialize)] #[derive(Deserialize)]
pub struct IndexPackage<'a> { pub struct IndexPackage<'a> {
/// Name of the pacakge. /// Name of the package.
name: InternedString, name: InternedString,
/// The version of this dependency. /// The version of this dependency.
vers: Version, vers: Version,
@ -522,7 +522,7 @@ impl<'cfg> RegistryIndex<'cfg> {
/// The actual kind index file being parsed depends on which kind of /// The actual kind index file being parsed depends on which kind of
/// [`RegistryData`] the `load` argument is given. For example, a /// [`RegistryData`] the `load` argument is given. For example, a
/// Git-based [`RemoteRegistry`] will first try a on-disk index cache /// Git-based [`RemoteRegistry`] will first try a on-disk index cache
/// file, and then try parsing registry raw index fomr Git repository. /// file, and then try parsing registry raw index from Git repository.
/// ///
/// In effect, this is intended to be a quite cheap operation. /// In effect, this is intended to be a quite cheap operation.
/// ///

View File

@ -59,7 +59,7 @@ pub struct RemoteRegistry<'cfg> {
/// A Git [tree object] to help this registry find crate metadata from the /// A Git [tree object] to help this registry find crate metadata from the
/// underlying Git repository. /// underlying Git repository.
/// ///
/// This is stored here to prevent Git from repeatly creating a tree object /// This is stored here to prevent Git from repeatedly creating a tree object
/// during each call into `load()`. /// during each call into `load()`.
/// ///
/// [tree object]: https://git-scm.com/book/en/v2/Git-Internals-Git-Objects#_tree_objects /// [tree object]: https://git-scm.com/book/en/v2/Git-Internals-Git-Objects#_tree_objects

View File

@ -49,7 +49,7 @@ impl ConfigKey {
/// equivalent to accessing a sub-table in TOML. /// equivalent to accessing a sub-table in TOML.
/// ///
/// Note that this considers `name` to be case-insensitive, meaning that the /// Note that this considers `name` to be case-insensitive, meaning that the
/// corrseponding toml key is appended with this `name` as-is and the /// corresponding toml key is appended with this `name` as-is and the
/// corresponding env key is appended with `name` after transforming it to /// corresponding env key is appended with `name` after transforming it to
/// uppercase characters. /// uppercase characters.
pub fn push(&mut self, name: &str) { pub fn push(&mut self, name: &str) {

View File

@ -161,7 +161,7 @@ pub fn try_canonicalize<P: AsRef<Path>>(path: P) -> std::io::Result<PathBuf> {
// On Windows `canonicalize` may fail, so we fall back to getting an absolute path. // On Windows `canonicalize` may fail, so we fall back to getting an absolute path.
std::fs::canonicalize(&path).or_else(|_| { std::fs::canonicalize(&path).or_else(|_| {
// Return an error if a file does not exist for better compatiblity with `canonicalize` // Return an error if a file does not exist for better compatibility with `canonicalize`
if !path.as_ref().try_exists()? { if !path.as_ref().try_exists()? {
return Err(Error::new(ErrorKind::NotFound, "the path was not found")); return Err(Error::new(ErrorKind::NotFound, "the path was not found"));
} }
@ -224,7 +224,7 @@ pub fn get_umask() -> u32 {
use std::sync::OnceLock; use std::sync::OnceLock;
static UMASK: OnceLock<libc::mode_t> = OnceLock::new(); static UMASK: OnceLock<libc::mode_t> = OnceLock::new();
// SAFETY: Syscalls are unsafe. Calling `umask` twice is even unsafer for // SAFETY: Syscalls are unsafe. Calling `umask` twice is even unsafer for
// multithreading program, since it doesn't provide a way to retrive the // multithreading program, since it doesn't provide a way to retrieve the
// value without modifications. We use a static `OnceLock` here to ensure // value without modifications. We use a static `OnceLock` here to ensure
// it only gets call once during the entire program lifetime. // it only gets call once during the entire program lifetime.
*UMASK.get_or_init(|| unsafe { *UMASK.get_or_init(|| unsafe {

View File

@ -244,9 +244,9 @@ impl std::str::FromStr for PartialVersion {
} }
Err(_) => anyhow::bail!("expected a version like \"1.32\""), Err(_) => anyhow::bail!("expected a version like \"1.32\""),
}; };
assert_eq!(version_req.comparators.len(), 1, "guarenteed by is_req"); assert_eq!(version_req.comparators.len(), 1, "guaranteed by is_req");
let comp = version_req.comparators.pop().unwrap(); let comp = version_req.comparators.pop().unwrap();
assert_eq!(comp.op, semver::Op::Caret, "guarenteed by is_req"); assert_eq!(comp.op, semver::Op::Caret, "guaranteed by is_req");
let pre = if comp.pre.is_empty() { let pre = if comp.pre.is_empty() {
None None
} else { } else {

View File

@ -27,7 +27,7 @@ for a Rust API for reading the metadata.
Within the same output format version, the compatibility is maintained, except Within the same output format version, the compatibility is maintained, except
some scenarios. The following is a non-exhaustive list of changes that are not some scenarios. The following is a non-exhaustive list of changes that are not
considersed as incompatibile: considersed as incompatible:
* **Adding new fields** — New fields will be added when needed. Reserving this * **Adding new fields** — New fields will be added when needed. Reserving this
helps Cargo evolve without bumping the format version too often. helps Cargo evolve without bumping the format version too often.

View File

@ -22,7 +22,7 @@ OUTPUT FORMAT
Compatibility Compatibility
Within the same output format version, the compatibility is maintained, Within the same output format version, the compatibility is maintained,
except some scenarios. The following is a non-exhaustive list of changes except some scenarios. The following is a non-exhaustive list of changes
that are not considersed as incompatibile: that are not considersed as incompatible:
o Adding new fields — New fields will be added when needed. Reserving o Adding new fields — New fields will be added when needed. Reserving
this helps Cargo evolve without bumping the format version too often. this helps Cargo evolve without bumping the format version too often.

View File

@ -27,7 +27,7 @@ for a Rust API for reading the metadata.
Within the same output format version, the compatibility is maintained, except Within the same output format version, the compatibility is maintained, except
some scenarios. The following is a non-exhaustive list of changes that are not some scenarios. The following is a non-exhaustive list of changes that are not
considersed as incompatibile: considersed as incompatible:
* **Adding new fields** — New fields will be added when needed. Reserving this * **Adding new fields** — New fields will be added when needed. Reserving this
helps Cargo evolve without bumping the format version too often. helps Cargo evolve without bumping the format version too often.

View File

@ -118,7 +118,7 @@ When testing the latest versions some considerations are:
- Rate of new dependencies being published - Rate of new dependencies being published
- Level of risk a project is willing to accept - Level of risk a project is willing to accept
- CI costs, including indirect costs like if a CI service has a maximum for - CI costs, including indirect costs like if a CI service has a maximum for
parallel runners, causing new jobs to be serialized when at the maxium. parallel runners, causing new jobs to be serialized when at the maximum.
Some potential solutions include: Some potential solutions include:
- [Not checking in the `Cargo.lock`](../faq.md#why-have-cargolock-in-version-control) - [Not checking in the `Cargo.lock`](../faq.md#why-have-cargolock-in-version-control)

View File

@ -1,7 +1,7 @@
# Registry Authentication # Registry Authentication
Cargo authenticates to registries with through credential providers. These Cargo authenticates to registries with through credential providers. These
credential providers are external executables or built-in providers that Cargo credential providers are external executables or built-in providers that Cargo
uses to store and retreive credentials. uses to store and retrieve credentials.
Using alternative registries with authentication *requires* a credential provider to be configured Using alternative registries with authentication *requires* a credential provider to be configured
to avoid unknowningly storing unecrypted credentials on disk. For historical reasons, public to avoid unknowningly storing unecrypted credentials on disk. For historical reasons, public
@ -54,7 +54,7 @@ may change in future Cargo releases (though there are currently no plans to do s
### `cargo:token` ### `cargo:token`
Uses Cargo's [credentials](config.md#credentials) file to store tokens unencrypted in plain text. Uses Cargo's [credentials](config.md#credentials) file to store tokens unencrypted in plain text.
When retreiving tokens, checks the `CARGO_REGISTRIES_<NAME>_TOKEN` environment variable. When retrieving tokens, checks the `CARGO_REGISTRIES_<NAME>_TOKEN` environment variable.
If this credential provider is not listed, then the `*_TOKEN` environment variables will not work. If this credential provider is not listed, then the `*_TOKEN` environment variables will not work.
### `cargo:wincred` ### `cargo:wincred`

View File

@ -22,7 +22,7 @@ for a Rust API for reading the metadata.
.SS "Compatibility" .SS "Compatibility"
Within the same output format version, the compatibility is maintained, except Within the same output format version, the compatibility is maintained, except
some scenarios. The following is a non\-exhaustive list of changes that are not some scenarios. The following is a non\-exhaustive list of changes that are not
considersed as incompatibile: considersed as incompatible:
.sp .sp
.RS 4 .RS 4
\h'-04'\(bu\h'+02'\fBAdding new fields\fR \[em] New fields will be added when needed. Reserving this \h'-04'\(bu\h'+02'\fBAdding new fields\fR \[em] New fields will be added when needed. Reserving this

View File

@ -4,4 +4,4 @@ mod inherit_workspace_package_table;
mod inherit_workspace_package_table_with_edition; mod inherit_workspace_package_table_with_edition;
mod inherit_workspace_package_table_with_registry; mod inherit_workspace_package_table_with_registry;
mod inherit_workspace_package_table_without_version; mod inherit_workspace_package_table_without_version;
mod not_inherit_workspace_package_table_if_not_memebers; mod not_inherit_workspace_package_table_if_not_members;

View File

@ -546,7 +546,7 @@ You may press ctrl-c [..]
[PUBLISHED] foo v0.1.0 [..] [PUBLISHED] foo v0.1.0 [..]
"#; "#;
// The output should contain two JSON messages from the provider in boths cases: // The output should contain two JSON messages from the provider in both cases:
// The first because the credential is expired, the second because the provider // The first because the credential is expired, the second because the provider
// indicated that the token was non-operation-independent. // indicated that the token was non-operation-independent.
p.cargo("publish --registry alternative --no-verify") p.cargo("publish --registry alternative --no-verify")

View File

@ -2786,7 +2786,7 @@ fn verify_source_before_recompile() {
"vendor/bar/src/lib.rs", "vendor/bar/src/lib.rs",
r#"compile_error!("You shall not pass!");"#, r#"compile_error!("You shall not pass!");"#,
); );
// Should ignore modifed sources without any recompile. // Should ignore modified sources without any recompile.
p.cargo("check --verbose") p.cargo("check --verbose")
.with_stderr( .with_stderr(
"\ "\
@ -2799,7 +2799,7 @@ fn verify_source_before_recompile() {
// Add a `RUSTFLAGS` to trigger a recompile. // Add a `RUSTFLAGS` to trigger a recompile.
// //
// Cargo should refuse to build because of checksum verfication failure. // Cargo should refuse to build because of checksum verification failure.
// Cargo shouldn't recompile dependency `bar`. // Cargo shouldn't recompile dependency `bar`.
p.cargo("check --verbose") p.cargo("check --verbose")
.env("RUSTFLAGS", "-W warnings") .env("RUSTFLAGS", "-W warnings")

View File

@ -370,7 +370,7 @@ fn profile_config_mixed_types() {
#[cargo_test] #[cargo_test]
fn named_config_profile() { fn named_config_profile() {
// Exercises config named profies. // Exercises config named profiles.
// foo -> middle -> bar -> dev // foo -> middle -> bar -> dev
// middle exists in Cargo.toml, the others in .cargo/config // middle exists in Cargo.toml, the others in .cargo/config
use super::config::ConfigBuilder; use super::config::ConfigBuilder;

View File

@ -162,7 +162,7 @@ fn warn_when_plugin_masks_manifest_on_stable() {
.with_stdout("") .with_stdout("")
.with_stderr( .with_stderr(
"\ "\
warning: external subcommand `echo.rs` has the appearance of a manfiest-command warning: external subcommand `echo.rs` has the appearance of a manifest-command
This was previously accepted but will be phased out when `-Zscript` is stabilized. This was previously accepted but will be phased out when `-Zscript` is stabilized.
For more information, see issue #12207 <https://github.com/rust-lang/cargo/issues/12207>. For more information, see issue #12207 <https://github.com/rust-lang/cargo/issues/12207>.
", ",