diff --git a/kokoro/linux/aarch64/dockcross_helpers/run_dockcross_manylinux2014_aarch64.sh b/kokoro/linux/aarch64/dockcross_helpers/run_dockcross_manylinux2014_aarch64.sh index beb3a3d2310e..806c90f25a46 100755 --- a/kokoro/linux/aarch64/dockcross_helpers/run_dockcross_manylinux2014_aarch64.sh +++ b/kokoro/linux/aarch64/dockcross_helpers/run_dockcross_manylinux2014_aarch64.sh @@ -19,7 +19,7 @@ sed -i 's/\r//g' dockcross-manylinux2014-aarch64.sh # The dockcross wrapper script runs arbitrary commands under the selected dockcross # image with the following properties which make its use very convenient: # * the current working directory is mounted under /work so the container can easily -# access the curent workspace +# access the current workspace # * the processes in the container run under the same UID and GID as the host process so unlike # vanilla "docker run" invocations, the workspace doesn't get polluted with files # owned by root. diff --git a/kokoro/linux/aarch64/python_run_tests_with_qemu_aarch64.sh b/kokoro/linux/aarch64/python_run_tests_with_qemu_aarch64.sh index a835eae0ce80..527fc4849d3e 100755 --- a/kokoro/linux/aarch64/python_run_tests_with_qemu_aarch64.sh +++ b/kokoro/linux/aarch64/python_run_tests_with_qemu_aarch64.sh @@ -25,4 +25,4 @@ ${PYTHON} -m auditwheel show dist/protobuf-*-manylinux2014_aarch64.whl # step 3: smoketest that the wheel can be installed and run a smokecheck ${PYTHON} -m pip install dist/protobuf-*-manylinux2014_aarch64.whl # when python cpp extension is on, simply importing a message type will trigger loading the cpp extension -PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=cpp ${PYTHON} -c 'import google.protobuf.timestamp_pb2; print("Successfuly loaded the python cpp extension!")' +PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=cpp ${PYTHON} -c 'import google.protobuf.timestamp_pb2; print("Successfully loaded the python cpp extension!")'