fix typos in rust documentation blocks

Signed-off-by: Maximiliano Sandoval <m.sandoval@proxmox.com>
This commit is contained in:
Maximiliano Sandoval 2024-08-07 14:10:42 +02:00 committed by Thomas Lamprecht
parent a62a9f098d
commit 1198253b20
10 changed files with 10 additions and 10 deletions

View File

@ -223,7 +223,7 @@ pub enum Role {
RemoteAudit = ROLE_REMOTE_AUDIT, RemoteAudit = ROLE_REMOTE_AUDIT,
/// Remote Administrator /// Remote Administrator
RemoteAdmin = ROLE_REMOTE_ADMIN, RemoteAdmin = ROLE_REMOTE_ADMIN,
/// Syncronisation Opertator /// Synchronization Operator
RemoteSyncOperator = ROLE_REMOTE_SYNC_OPERATOR, RemoteSyncOperator = ROLE_REMOTE_SYNC_OPERATOR,
/// Tape Auditor /// Tape Auditor
TapeAudit = ROLE_TAPE_AUDIT, TapeAudit = ROLE_TAPE_AUDIT,

View File

@ -62,7 +62,7 @@ pub struct PxarCreateOptions {
pub type MetadataArchiveReader = Arc<dyn ReadAt + Send + Sync + 'static>; pub type MetadataArchiveReader = Arc<dyn ReadAt + Send + Sync + 'static>;
/// Statefull information of previous backups snapshots for partial backups /// Stateful information of previous backups snapshots for partial backups
pub struct PxarPrevRef { pub struct PxarPrevRef {
/// Reference accessor for metadata comparison /// Reference accessor for metadata comparison
pub accessor: Accessor<MetadataArchiveReader>, pub accessor: Accessor<MetadataArchiveReader>,

View File

@ -179,7 +179,7 @@ impl CachedUserInfo {
(privs, propagated_privs) (privs, propagated_privs)
} }
/// Checks whether the `auth_id` has any of the privilegs `privs` on any object below `path`. /// Checks whether the `auth_id` has any of the privileges `privs` on any object below `path`.
pub fn any_privs_below( pub fn any_privs_below(
&self, &self,
auth_id: &Authid, auth_id: &Authid,

View File

@ -10,7 +10,7 @@ pub mod async_lru_cache;
/// Set MMAP_THRESHOLD to a fixed value (128 KiB) /// Set MMAP_THRESHOLD to a fixed value (128 KiB)
/// ///
/// This avoids the "dynamic" mmap-treshold logic from glibc's malloc, which seems misguided and /// This avoids the "dynamic" mmap-threshold logic from glibc's malloc, which seems misguided and
/// effectively avoids using mmap for all allocations smaller than 32 MiB. Which, in combination /// effectively avoids using mmap for all allocations smaller than 32 MiB. Which, in combination
/// with the allocation pattern from our/tokio's complex async machinery, resulted in very large /// with the allocation pattern from our/tokio's complex async machinery, resulted in very large
/// RSS sizes due to defragmentation and long-living (smaller) allocation on top of the heap /// RSS sizes due to defragmentation and long-living (smaller) allocation on top of the heap

View File

@ -29,7 +29,7 @@ use crate::{
#[derive(Copy, Clone, Serialize)] #[derive(Copy, Clone, Serialize)]
/// Speed test result /// Speed test result
struct Speed { struct Speed {
/// The meassured speed in Bytes/second /// The measured speed in Bytes/second
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
speed: Option<f64>, speed: Option<f64>,
/// Top result we want to compare with /// Top result we want to compare with

View File

@ -37,7 +37,7 @@ pub type Async<R> = Pin<Box<dyn Future<Output = R> + Send>>;
/// An abstract implementation for retrieving data out of a block file backup /// An abstract implementation for retrieving data out of a block file backup
pub trait BlockRestoreDriver { pub trait BlockRestoreDriver {
/// List ArchiveEntrys for the given image file and path /// List ArchiveEntries for the given image file and path
fn data_list( fn data_list(
&self, &self,
details: SnapRestoreDetails, details: SnapRestoreDetails,

View File

@ -101,7 +101,7 @@ impl SharedBackupState {
} }
} }
/// `RpcEnvironmet` implementation for backup service /// `RpcEnvironment` implementation for backup service
#[derive(Clone)] #[derive(Clone)]
pub struct BackupEnvironment { pub struct BackupEnvironment {
env_type: RpcEnvironmentType, env_type: RpcEnvironmentType,

View File

@ -306,7 +306,7 @@ fn stop_service(
permission: &Permission::Privilege(&["system", "services", "{service}"], PRIV_SYS_MODIFY, false), permission: &Permission::Privilege(&["system", "services", "{service}"], PRIV_SYS_MODIFY, false),
}, },
)] )]
/// Retart service. /// Restart service.
fn restart_service( fn restart_service(
service: String, service: String,
_param: Value, _param: Value,

View File

@ -11,7 +11,7 @@ use pbs_datastore::DataStore;
use proxmox_rest_server::formatter::*; use proxmox_rest_server::formatter::*;
use proxmox_rest_server::WorkerTask; use proxmox_rest_server::WorkerTask;
/// `RpcEnvironmet` implementation for backup reader service /// `RpcEnvironment` implementation for backup reader service
#[derive(Clone)] #[derive(Clone)]
pub struct ReaderEnvironment { pub struct ReaderEnvironment {
env_type: RpcEnvironmentType, env_type: RpcEnvironmentType,

View File

@ -150,7 +150,7 @@ pub struct MediaSetLabel {
pub seq_nr: u64, pub seq_nr: u64,
/// Creation time stamp /// Creation time stamp
pub ctime: i64, pub ctime: i64,
/// Encryption key finkerprint (if encryped) /// Encryption key finkerprint (if encrypted)
#[serde(skip_serializing_if = "Option::is_none")] #[serde(skip_serializing_if = "Option::is_none")]
pub encryption_key_fingerprint: Option<Fingerprint>, pub encryption_key_fingerprint: Option<Fingerprint>,
} }