summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYaroslav Halchenko <debian@onerussian.com>2023-01-24 16:56:08 -0500
committerYaroslav Halchenko <debian@onerussian.com>2023-01-24 16:56:08 -0500
commit908e7c75f53025a3064e28215da62ffcfdea6daa (patch)
tree8ae79b736fc69f2c05ba1adec2ae11c4b9e4720c
parent5efa354ce9fff1217d22e52493d1442866821a7b (diff)
downloadparamiko-908e7c75f53025a3064e28215da62ffcfdea6daa.tar.gz
[DATALAD RUNCMD] Run codespell -w
=== Do not change lines below === { "chain": [], "cmd": "codespell -w", "exit": 0, "extra_inputs": [], "inputs": [], "outputs": [], "pwd": "." } ^^^ Do not change lines above ^^^
-rw-r--r--NEWS2
-rw-r--r--paramiko/agent.py4
-rw-r--r--paramiko/kex_gss.py4
-rw-r--r--paramiko/server.py8
-rw-r--r--paramiko/sftp_attr.py2
-rw-r--r--paramiko/sftp_server.py2
-rw-r--r--paramiko/transport.py6
-rw-r--r--sites/www/changelog.rst4
-rw-r--r--tests/test_proxy.py2
-rw-r--r--tests/test_sftp.py2
-rw-r--r--tests/test_transport.py2
11 files changed, 19 insertions, 19 deletions
diff --git a/NEWS b/NEWS
index 761f8e48..3c9d9abb 100644
--- a/NEWS
+++ b/NEWS
@@ -165,7 +165,7 @@ v1.7.1 (Amy) 10jun07
* SFTPClient.listdir_attr() now preserves the 'longname' field [patch from
wesley augur]
* SFTPClient.get_channel() API added
- * SSHClient constuctor takes an optional 'timeout' parameter [patch from
+ * SSHClient constructor takes an optional 'timeout' parameter [patch from
james bardin]
v1.7 (zubat) 18feb07
diff --git a/paramiko/agent.py b/paramiko/agent.py
index c1a07390..73fa1f82 100644
--- a/paramiko/agent.py
+++ b/paramiko/agent.py
@@ -314,10 +314,10 @@ class AgentServerProxy(AgentSSH):
def get_env(self):
"""
- Helper for the environnement under unix
+ Helper for the environment under unix
:return:
- a dict containing the ``SSH_AUTH_SOCK`` environnement variables
+ a dict containing the ``SSH_AUTH_SOCK`` environment variables
"""
return {"SSH_AUTH_SOCK": self._get_filename()}
diff --git a/paramiko/kex_gss.py b/paramiko/kex_gss.py
index e3fbb36e..2a5f29e3 100644
--- a/paramiko/kex_gss.py
+++ b/paramiko/kex_gss.py
@@ -125,7 +125,7 @@ class KexGSSGroup1:
Parse the next packet.
:param ptype: The (string) type of the incoming packet
- :param `.Message` m: The paket content
+ :param `.Message` m: The packet content
"""
if self.transport.server_mode and (ptype == MSG_KEXGSS_INIT):
return self._parse_kexgss_init(m)
@@ -380,7 +380,7 @@ class KexGSSGex:
Parse the next packet.
:param ptype: The (string) type of the incoming packet
- :param `.Message` m: The paket content
+ :param `.Message` m: The packet content
"""
if ptype == MSG_KEXGSS_GROUPREQ:
return self._parse_kexgss_groupreq(m)
diff --git a/paramiko/server.py b/paramiko/server.py
index a0a01fec..3875b8a2 100644
--- a/paramiko/server.py
+++ b/paramiko/server.py
@@ -255,7 +255,7 @@ class ServerInterface:
We don't check if the krb5 principal is allowed to log in on
the server, because there is no way to do that in python. So
if you develop your own SSH server with paramiko for a cetain
- plattform like Linux, you should call C{krb5_kuserok()} in
+ platform like Linux, you should call C{krb5_kuserok()} in
your local kerberos library to make sure that the
krb5_principal has an account on the server and is allowed to
log in as a user.
@@ -287,7 +287,7 @@ class ServerInterface:
We don't check if the krb5 principal is allowed to log in on
the server, because there is no way to do that in python. So
if you develop your own SSH server with paramiko for a cetain
- plattform like Linux, you should call C{krb5_kuserok()} in
+ platform like Linux, you should call C{krb5_kuserok()} in
your local kerberos library to make sure that the
krb5_principal has an account on the server and is allowed
to log in as a user.
@@ -634,7 +634,7 @@ class InteractiveQuery:
class SubsystemHandler(threading.Thread):
"""
- Handler for a subsytem in server mode. If you create a subclass of this
+ Handler for a subsystem in server mode. If you create a subclass of this
class and pass it to `.Transport.set_subsystem_handler`, an object of this
class will be created for each request for this subsystem. Each new object
will be executed within its own new thread by calling `start_subsystem`.
@@ -642,7 +642,7 @@ class SubsystemHandler(threading.Thread):
For example, if you made a subclass ``MP3Handler`` and registered it as the
handler for subsystem ``"mp3"``, then whenever a client has successfully
- authenticated and requests subsytem ``"mp3"``, an object of class
+ authenticated and requests subsystem ``"mp3"``, an object of class
``MP3Handler`` will be created, and `start_subsystem` will be called on
it from a new thread.
"""
diff --git a/paramiko/sftp_attr.py b/paramiko/sftp_attr.py
index eb4dd900..18ffbf86 100644
--- a/paramiko/sftp_attr.py
+++ b/paramiko/sftp_attr.py
@@ -24,7 +24,7 @@ from paramiko.common import x80000000, o700, o70, xffffffff
class SFTPAttributes:
"""
Representation of the attributes of a file (or proxied file) for SFTP in
- client or server mode. It attemps to mirror the object returned by
+ client or server mode. It attempts to mirror the object returned by
`os.stat` as closely as possible, so it may have the following fields,
with the same meanings as those returned by an `os.stat` object:
diff --git a/paramiko/sftp_server.py b/paramiko/sftp_server.py
index 3bae415d..cd3910dc 100644
--- a/paramiko/sftp_server.py
+++ b/paramiko/sftp_server.py
@@ -259,7 +259,7 @@ class SFTPServer(BaseSFTP, SubsystemHandler):
desc = SFTP_DESC[code]
except IndexError:
desc = "Unknown"
- # some clients expect a "langauge" tag at the end
+ # some clients expect a "language" tag at the end
# (but don't mind it being blank)
self._response(request_number, CMD_STATUS, code, desc, "")
diff --git a/paramiko/transport.py b/paramiko/transport.py
index 9436111b..569c5cdd 100644
--- a/paramiko/transport.py
+++ b/paramiko/transport.py
@@ -1008,7 +1008,7 @@ class Transport(threading.Thread, ClosingContextManager):
:raises:
`.SSHException` -- if the request is rejected, the session ends
- prematurely or there is a timeout openning a channel
+ prematurely or there is a timeout opening a channel
.. versionchanged:: 1.15
Added the ``window_size`` and ``max_packet_size`` arguments.
@@ -1692,7 +1692,7 @@ class Transport(threading.Thread, ClosingContextManager):
def auth_interactive_dumb(self, username, handler=None, submethods=""):
"""
- Autenticate to the server interactively but dumber.
+ Authenticate to the server interactively but dumber.
Just print the prompt and / or instructions to stdout and send back
the response. This is good for situations where partial auth is
achieved by key and then the user has to enter a 2fac token.
@@ -2058,7 +2058,7 @@ class Transport(threading.Thread, ClosingContextManager):
reply.add_string("")
reply.add_string("en")
# NOTE: Post-open channel messages do not need checking; the above will
- # reject attemps to open channels, meaning that even if a malicious
+ # reject attempts to open channels, meaning that even if a malicious
# user tries to send a MSG_CHANNEL_REQUEST, it will simply fall under
# the logic that handles unknown channel IDs (as the channel list will
# be empty.)
diff --git a/sites/www/changelog.rst b/sites/www/changelog.rst
index 32e81828..ae1d7365 100644
--- a/sites/www/changelog.rst
+++ b/sites/www/changelog.rst
@@ -334,7 +334,7 @@ Changelog
This fixes a security flaw! If you are running Paramiko on 32-bit systems
with low entropy (such as any 32-bit Python 2, or a 32-bit Python 3 which
is running with ``PYTHONHASHSEED=0``) it is possible for an attacker to
- craft a new keypair from an exfiltrated public key, which Paramiko would
+ craft a new key pair from an exfiltrated public key, which Paramiko would
consider equal to the original key.
This could enable attacks such as, but not limited to, the following:
@@ -1130,7 +1130,7 @@ Changelog
functionality to address hangs from dropped network connections and/or failed
handshakes. Credit to ``@vazir`` and ``@dacut`` for the original patches and
to Olle Lundberg for reimplementation.
-- :bug:`490` Skip invalid/unparseable lines in ``known_hosts`` files, instead
+- :bug:`490` Skip invalid/unparsable lines in ``known_hosts`` files, instead
of raising `~paramiko.ssh_exception.SSHException`. This brings Paramiko's
behavior more in line with OpenSSH, which silently ignores such input. Catch
& patch courtesy of Martin Topholm.
diff --git a/tests/test_proxy.py b/tests/test_proxy.py
index 64ea5651..16bdb67c 100644
--- a/tests/test_proxy.py
+++ b/tests/test_proxy.py
@@ -122,7 +122,7 @@ class TestProxyCommand:
select.return_value = [stdout], None, None
# Base case: None timeout means no timing out
os_read.return_value = b"meh"
- proxy = ProxyCommand("yello")
+ proxy = ProxyCommand("yellow")
assert proxy.timeout is None
# Implicit 'no raise' check
assert proxy.recv(3) == b"meh"
diff --git a/tests/test_sftp.py b/tests/test_sftp.py
index 2cd68d94..cecbb305 100644
--- a/tests/test_sftp.py
+++ b/tests/test_sftp.py
@@ -724,7 +724,7 @@ class TestSFTP:
def test_seek_append(self, sftp):
"""
- verify that seek does't affect writes during append.
+ verify that seek doesn't affect writes during append.
does not work except through paramiko. :( openssh fails.
"""
diff --git a/tests/test_transport.py b/tests/test_transport.py
index 4d28199a..4062d767 100644
--- a/tests/test_transport.py
+++ b/tests/test_transport.py
@@ -891,7 +891,7 @@ class TransportTest(unittest.TestCase):
@slow
def test_handshake_timeout(self):
"""
- verify that we can get a hanshake timeout.
+ verify that we can get a handshake timeout.
"""
# Tweak client Transport instance's Packetizer instance so
# its read_message() sleeps a bit. This helps prevent race conditions