Skip to content

Commit

Permalink
fix typos
Browse files Browse the repository at this point in the history
Signed-off-by: allencloud <allen.sun@daocloud.io>
  • Loading branch information
allencloud committed Jun 2, 2016
1 parent 287b0a6 commit c1be45f
Show file tree
Hide file tree
Showing 61 changed files with 77 additions and 77 deletions.
2 changes: 1 addition & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -1721,7 +1721,7 @@ With the ongoing changes to the networking and execution subsystems of docker te
+ Add -rm to docker run for removing a container on exit
- Remove error messages which are not actually errors
- Fix `docker rm` with volumes
- Fix some error cases where a HTTP body might not be closed
- Fix some error cases where an HTTP body might not be closed
- Fix panic with wrong dockercfg file
- Fix the attach behavior with -i
* Record termination time in state.
Expand Down
2 changes: 1 addition & 1 deletion CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -121,7 +121,7 @@ However, there might be a way to implement that feature *on top of* Docker.
<td>
The <a href="https://groups.google.com/forum/#!forum/docker-dev" target="_blank">docker-dev</a>
group is for contributors and other people contributing to the Docker project.
You can join them without an google account by sending an email to
You can join them without a google account by sending an email to
<a href="mailto:docker-dev+subscribe@googlegroups.com">docker-dev+subscribe@googlegroups.com</a>.
After receiving the join-request message, you can simply reply to that to confirm the subscribtion.
</td>
Expand Down
2 changes: 1 addition & 1 deletion api/client/trust.go
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ func (scs simpleCredentialStore) SetRefreshToken(*url.URL, string, string) {

// getNotaryRepository returns a NotaryRepository which stores all the
// information needed to operate on a notary repository.
// It creates a HTTP transport providing authentication support.
// It creates an HTTP transport providing authentication support.
func (cli *DockerCli) getNotaryRepository(repoInfo *registry.RepositoryInfo, authConfig types.AuthConfig, actions ...string) (*client.NotaryRepository, error) {
server, err := trustServer(repoInfo.Index)
if err != nil {
Expand Down
2 changes: 1 addition & 1 deletion api/server/httputils/httputils.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ const APIVersionKey = "api-version"
const UAStringKey = "upstream-user-agent"

// APIFunc is an adapter to allow the use of ordinary functions as Docker API endpoints.
// Any function that has the appropriate signature can be registered as a API endpoint (e.g. getVersion).
// Any function that has the appropriate signature can be registered as an API endpoint (e.g. getVersion).
type APIFunc func(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error

// HijackConnection interrupts the http response writer to get the
Expand Down
2 changes: 1 addition & 1 deletion daemon/graphdriver/driver.go
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ func init() {
drivers = make(map[string]InitFunc)
}

// Register registers a InitFunc for the driver.
// Register registers an InitFunc for the driver.
func Register(name string, initFunc InitFunc) error {
if _, exists := drivers[name]; exists {
return fmt.Errorf("Name already registered %s", name)
Expand Down
4 changes: 2 additions & 2 deletions daemon/graphdriver/graphtest/graphtest_unix.go
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ func cleanup(t *testing.T, d *Driver) {
os.RemoveAll(d.root)
}

// GetDriver create a new driver with given name or return a existing driver with the name updating the reference count.
// GetDriver create a new driver with given name or return an existing driver with the name updating the reference count.
func GetDriver(t *testing.T, name string) graphdriver.Driver {
if drv == nil {
drv = newDriver(t, name)
Expand Down Expand Up @@ -172,7 +172,7 @@ func readDir(dir string) ([]os.FileInfo, error) {
return b, nil
}

// DriverTestCreateEmpty creates an new image and verifies it is empty and the right metadata
// DriverTestCreateEmpty creates a new image and verifies it is empty and the right metadata
func DriverTestCreateEmpty(t *testing.T, drivername string) {
driver := GetDriver(t, drivername)
defer PutDriver(t)
Expand Down
10 changes: 5 additions & 5 deletions daemon/graphdriver/overlay/overlay.go
Original file line number Diff line number Diff line change
Expand Up @@ -74,8 +74,8 @@ func (d *naiveDiffDriverWithApply) ApplyDiff(id, parent string, diff archive.Rea
// layer in the overlay. The overlay itself is mounted in the "merged"
// directory, and the "work" dir is needed for overlay to work.

// When a overlay layer is created there are two cases, either the
// parent has a "root" dir, then we start out with a empty "upper"
// When an overlay layer is created there are two cases, either the
// parent has a "root" dir, then we start out with an empty "upper"
// directory overlaid on the parents root. This is typically the
// case with the init layer of a container which is based on an image.
// If there is no "root" in the parent, we inherit the lower-id from
Expand Down Expand Up @@ -103,7 +103,7 @@ func init() {

// Init returns the NaiveDiffDriver, a native diff driver for overlay filesystem.
// If overlay filesystem is not supported on the host, graphdriver.ErrNotSupported is returned as error.
// If a overlay filesystem is not supported over a existing filesystem then error graphdriver.ErrIncompatibleFS is returned.
// If an overlay filesystem is not supported over an existing filesystem then error graphdriver.ErrIncompatibleFS is returned.
func Init(home string, options []string, uidMaps, gidMaps []idtools.IDMap) (graphdriver.Driver, error) {

if err := supportsOverlay(); err != nil {
Expand Down Expand Up @@ -265,7 +265,7 @@ func (d *Driver) Create(id, parent, mountLabel string, storageOpt map[string]str
return err
}

// If parent has a root, just do a overlay to it
// If parent has a root, just do an overlay to it
parentRoot := path.Join(parentDir, "root")

if s, err := os.Lstat(parentRoot); err == nil {
Expand Down Expand Up @@ -386,7 +386,7 @@ func (d *Driver) Put(id string) error {
return nil
}

// ApplyDiff applies the new layer on top of the root, if parent does not exist with will return a ErrApplyDiffFallback error.
// ApplyDiff applies the new layer on top of the root, if parent does not exist with will return an ErrApplyDiffFallback error.
func (d *Driver) ApplyDiff(id string, parent string, diff archive.Reader) (size int64, err error) {
dir := d.dir(id)

Expand Down
2 changes: 1 addition & 1 deletion daemon/graphdriver/zfs/zfs.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ func (*Logger) Log(cmd []string) {
}

// Init returns a new ZFS driver.
// It takes base mount path and a array of options which are represented as key value pairs.
// It takes base mount path and an array of options which are represented as key value pairs.
// Each option is in the for key=value. 'zfs.fsname' is expected to be a valid key in the options.
func Init(base string, opt []string, uidMaps, gidMaps []idtools.IDMap) (graphdriver.Driver, error) {
var err error
Expand Down
2 changes: 1 addition & 1 deletion daemon/logger/etwlogs/etwlogs_windows.go
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
// 3. logman stop -ets DockerContainerLogs
// 4. You can then convert the etl log file to XML using: tracerpt -y trace.etl
//
// Each container log message generates a ETW event that also contains:
// Each container log message generates an ETW event that also contains:
// the container name and ID, the timestamp, and the stream type.
package etwlogs

Expand Down
2 changes: 1 addition & 1 deletion daemon/oci_linux.go
Original file line number Diff line number Diff line change
Expand Up @@ -305,7 +305,7 @@ func setNamespaces(daemon *Daemon, s *specs.Spec, c *container.Container) error
ns.Path = fmt.Sprintf("/proc/%d/ns/pid", pc.State.GetPID())
setNamespace(s, ns)
if userNS {
// to share an PID namespace, they must also share a user namespace
// to share a PID namespace, they must also share a user namespace
nsUser := specs.Namespace{Type: "user"}
nsUser.Path = fmt.Sprintf("/proc/%d/ns/user", pc.State.GetPID())
setNamespace(s, nsUser)
Expand Down
2 changes: 1 addition & 1 deletion distribution/registry.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ func (dcs dumbCredentialStore) RefreshToken(*url.URL, string) string {
func (dcs dumbCredentialStore) SetRefreshToken(*url.URL, string, string) {
}

// NewV2Repository returns a repository (v2 only). It creates a HTTP transport
// NewV2Repository returns a repository (v2 only). It creates an HTTP transport
// providing timeout settings and authentication support, and also verifies the
// remote API version.
func NewV2Repository(ctx context.Context, repoInfo *registry.RepositoryInfo, endpoint registry.APIEndpoint, metaHeaders http.Header, authConfig *types.AuthConfig, actions ...string) (repo distribution.Repository, foundVersion bool, err error) {
Expand Down
2 changes: 1 addition & 1 deletion docs/admin/configuring.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ Some of the daemon's options are:
| `--tls=false` | Enable or disable TLS. By default, this is false. |


Here is a an example of running the `docker` daemon with configuration options:
Here is an example of running the `docker` daemon with configuration options:

$ dockerd -D --tls=true --tlscert=/var/docker/server.pem --tlskey=/var/docker/serverkey.pem -H tcp://192.168.59.3:2376

Expand Down
2 changes: 1 addition & 1 deletion docs/admin/logging/fluentd.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@ and [its documents](http://docs.fluentd.org/).
To use this logging driver, start the `fluentd` daemon on a host. We recommend
that you use [the Fluentd docker
image](https://hub.docker.com/r/fluent/fluentd/). This image is
especially useful if you want to aggregate multiple container logs on a each
especially useful if you want to aggregate multiple container logs on each
host then, later, transfer the logs to another Fluentd node to create an
aggregate store.

Expand Down
2 changes: 1 addition & 1 deletion docs/admin/systemd.md
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ If you fail to specify an empty configuration, Docker reports an error such as:

This example overrides the default `docker.service` file.

If you are behind a HTTP proxy server, for example in corporate settings,
If you are behind an HTTP proxy server, for example in corporate settings,
you will need to add this configuration in the Docker systemd service file.

First, create a systemd drop-in directory for the docker service:
Expand Down
2 changes: 1 addition & 1 deletion docs/examples/running_redis_service.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
<!--[metadata]>
+++
title = "Dockerizing a Redis service"
description = "Installing and running an redis service"
description = "Installing and running a redis service"
keywords = ["docker, example, package installation, networking, redis"]
[menu.main]
parent = "engine_dockerize"
Expand Down
2 changes: 1 addition & 1 deletion docs/installation/linux/fedora.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ version, open a terminal and use `uname -r` to display your kernel version:
$ uname -r
3.19.5-100.fc21.x86_64

If your kernel is at a older version, you must update it.
If your kernel is at an older version, you must update it.

Finally, is it recommended that you fully update your system. Please keep in
mind that your system should be fully patched to fix any potential kernel bugs. Any
Expand Down
2 changes: 1 addition & 1 deletion docs/installation/windows.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ Docker container using standard localhost addressing such as `localhost:8000` or

![Linux Architecture Diagram](images/linux_docker_host.svg)

In an Windows installation, the `docker` daemon is running inside a Linux virtual
In a Windows installation, the `docker` daemon is running inside a Linux virtual
machine. You use the Windows Docker client to talk to the Docker host VM. Your
Docker containers run inside this host.

Expand Down
4 changes: 2 additions & 2 deletions docs/reference/api/docker_remote_api.md
Original file line number Diff line number Diff line change
Expand Up @@ -116,8 +116,8 @@ This section lists each version from latest to oldest. Each listing includes a
* `GET /info` now returns `SecurityOptions` field, showing if `apparmor`, `seccomp`, or `selinux` is supported.
* `GET /networks` now supports filtering by `label` and `driver`.
* `POST /containers/create` now takes `MaximumIOps` and `MaximumIOBps` fields. Windows daemon only.
* `POST /containers/create` now returns a HTTP 400 "bad parameter" message
if no command is specified (instead of a HTTP 500 "server error")
* `POST /containers/create` now returns an HTTP 400 "bad parameter" message
if no command is specified (instead of an HTTP 500 "server error")
* `GET /images/search` now takes a `filters` query parameter.
* `GET /events` now supports a `reload` event that is emitted when the daemon configuration is reloaded.
* `GET /events` now supports filtering by daemon name or ID.
Expand Down
2 changes: 1 addition & 1 deletion docs/reference/api/docker_remote_api_v1.20.md
Original file line number Diff line number Diff line change
Expand Up @@ -1128,7 +1128,7 @@ following section.

`GET /containers/(id or name)/archive`

Get an tar archive of a resource in the filesystem of container `id`.
Get a tar archive of a resource in the filesystem of container `id`.

Query Parameters:

Expand Down
2 changes: 1 addition & 1 deletion docs/reference/api/docker_remote_api_v1.21.md
Original file line number Diff line number Diff line change
Expand Up @@ -1219,7 +1219,7 @@ following section.

`GET /containers/(id or name)/archive`

Get an tar archive of a resource in the filesystem of container `id`.
Get a tar archive of a resource in the filesystem of container `id`.

Query Parameters:

Expand Down
2 changes: 1 addition & 1 deletion docs/reference/api/docker_remote_api_v1.22.md
Original file line number Diff line number Diff line change
Expand Up @@ -1390,7 +1390,7 @@ following section.

`GET /containers/(id or name)/archive`

Get an tar archive of a resource in the filesystem of container `id`.
Get a tar archive of a resource in the filesystem of container `id`.

Query Parameters:

Expand Down
2 changes: 1 addition & 1 deletion docs/reference/api/docker_remote_api_v1.23.md
Original file line number Diff line number Diff line change
Expand Up @@ -1420,7 +1420,7 @@ following section.

`GET /containers/(id or name)/archive`

Get an tar archive of a resource in the filesystem of container `id`.
Get a tar archive of a resource in the filesystem of container `id`.

Query Parameters:

Expand Down
2 changes: 1 addition & 1 deletion docs/reference/api/docker_remote_api_v1.24.md
Original file line number Diff line number Diff line change
Expand Up @@ -1430,7 +1430,7 @@ following section.

`GET /containers/(id or name)/archive`

Get an tar archive of a resource in the filesystem of container `id`.
Get a tar archive of a resource in the filesystem of container `id`.

Query Parameters:

Expand Down
2 changes: 1 addition & 1 deletion docs/reference/commandline/attach.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ foreground over a slow client connection. Instead, users should use the

## Override the detach sequence

If you want, you can configure a override the Docker key sequence for detach.
If you want, you can configure an override the Docker key sequence for detach.
This is is useful if the Docker default sequence conflicts with key squence you
use for other applications. There are two ways to defines a your own detach key
sequence, as a per-container override or as a configuration property on your
Expand Down
4 changes: 2 additions & 2 deletions docs/reference/commandline/dockerd.md
Original file line number Diff line number Diff line change
Expand Up @@ -587,9 +587,9 @@ system's list of trusted CAs instead of enabling `--insecure-registry`.
Enabling `--disable-legacy-registry` forces a docker daemon to only interact with registries which support the V2 protocol. Specifically, the daemon will not attempt `push`, `pull` and `login` to v1 registries. The exception to this is `search` which can still be performed on v1 registries.
## Running a Docker daemon behind a HTTPS_PROXY
## Running a Docker daemon behind an HTTPS_PROXY
When running inside a LAN that uses a `HTTPS` proxy, the Docker Hub
When running inside a LAN that uses an `HTTPS` proxy, the Docker Hub
certificates will be replaced by the proxy's certificates. These certificates
need to be added to your Docker host's configuration:
Expand Down
2 changes: 1 addition & 1 deletion docs/reference/commandline/pull.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ use `docker pull`.

## Proxy configuration

If you are behind a HTTP proxy server, for example in corporate settings,
If you are behind an HTTP proxy server, for example in corporate settings,
before open a connect to registry, you may need to configure the Docker
daemon's proxy settings, using the `HTTP_PROXY`, `HTTPS_PROXY`, and `NO_PROXY`
environment variables. To set these environment variables on a host using
Expand Down
2 changes: 1 addition & 1 deletion docs/security/https.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ parent = "smn_secure_docker"
# Protect the Docker daemon socket

By default, Docker runs via a non-networked Unix socket. It can also
optionally communicate using a HTTP socket.
optionally communicate using an HTTP socket.

If you need Docker to be reachable via the network in a safe manner, you can
enable TLS by specifying the `tlsverify` flag and pointing Docker's
Expand Down
2 changes: 1 addition & 1 deletion docs/security/trust/content_trust.md
Original file line number Diff line number Diff line change
Expand Up @@ -107,7 +107,7 @@ Trust for an image tag is managed through the use of signing keys. A key set is
created when an operation using content trust is first invoked. A key set consists
of the following classes of keys:

- an offline key that is the root of content trust for a image tag
- an offline key that is the root of content trust for an image tag
- repository or tagging keys that sign tags
- server-managed keys such as the timestamp key, which provides freshness
security guarantees for your repository
Expand Down
2 changes: 1 addition & 1 deletion docs/security/trust/trust_delegation.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ e is 65537 (0x10001)
They should keep `delegation.key` private - this is what they will use to sign
tags.

Then they need to generate a x509 certificate containing the public key, which is
Then they need to generate an x509 certificate containing the public key, which is
what they will give to you. Here is the command to generate a CSR (certificate
signing request):

Expand Down
2 changes: 1 addition & 1 deletion docs/security/trust/trust_key_mng.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ trust makes use of five different types of keys:

| Key | Description |
|---------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| root key | Root of content trust for a image tag. When content trust is enabled, you create the root key once. Also known as the offline key, because it should be kept offline. |
| root key | Root of content trust for an image tag. When content trust is enabled, you create the root key once. Also known as the offline key, because it should be kept offline. |
| targets | This key allows you to sign image tags, to manage delegations including delegated keys or permitted delegation paths. Also known as the repository key, since this key determines what tags can be signed into an image repository. |
| snapshot | This key signs the current collection of image tags, preventing mix and match attacks.
| timestamp | This key allows Docker image repositories to have freshness security guarantees without requiring periodic content refreshes on the client's side. |
Expand Down
2 changes: 1 addition & 1 deletion docs/userguide/intro.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ Go to [Docker Machine user guide](https://docs.docker.com/machine/).

### Docker Compose

Docker Compose allows you to define a application's components -- their containers,
Docker Compose allows you to define an application's components -- their containers,
configuration, links and volumes -- in a single file. Then a single command
will set everything up and start your application running.

Expand Down
2 changes: 1 addition & 1 deletion integration-cli/docker_cli_authz_unix_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@ func (s *DockerAuthzSuite) TearDownTest(c *check.C) {
func (s *DockerAuthzSuite) SetUpSuite(c *check.C) {
mux := http.NewServeMux()
s.server = httptest.NewServer(mux)
c.Assert(s.server, check.NotNil, check.Commentf("Failed to start a HTTP Server"))
c.Assert(s.server, check.NotNil, check.Commentf("Failed to start an HTTP Server"))

mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
b, err := json.Marshal(plugins.Manifest{Implements: []string{authorization.AuthZApiImplements}})
Expand Down
2 changes: 1 addition & 1 deletion integration-cli/docker_cli_by_digest_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -346,7 +346,7 @@ func (s *DockerRegistrySuite) TestPsListContainersFilterAncestorImageByDigest(c
// pull from the registry using the <name>@<digest> reference
dockerCmd(c, "pull", imageReference)

// build a image from it
// build an image from it
imageName1 := "images_ps_filter_test"
_, err = buildImage(imageName1, fmt.Sprintf(
`FROM %s
Expand Down
2 changes: 1 addition & 1 deletion integration-cli/docker_cli_cp_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -647,7 +647,7 @@ func (s *DockerSuite) TestCpSymlinkFromConToHostFollowSymlink(c *check.C) {
}
os.Remove(expectedPath)

// now test copy symbol link to an non-existing file in host
// now test copy symbol link to a non-existing file in host
expectedPath = filepath.Join(testDir, "somefile_host")
// expectedPath shouldn't exist, if exists, remove it
if _, err := os.Lstat(expectedPath); err == nil {
Expand Down
2 changes: 1 addition & 1 deletion integration-cli/docker_cli_daemon_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -449,7 +449,7 @@ func (s *DockerDaemonSuite) TestDaemonIPv6FixedCIDR(c *check.C) {
}

// TestDaemonIPv6FixedCIDRAndMac checks that when the daemon is started with ipv6 fixed CIDR
// the running containers are given a an IPv6 address derived from the MAC address and the ipv6 fixed CIDR
// the running containers are given an IPv6 address derived from the MAC address and the ipv6 fixed CIDR
func (s *DockerDaemonSuite) TestDaemonIPv6FixedCIDRAndMac(c *check.C) {
// IPv6 setup is messing with local bridge address.
testRequires(c, SameHostDaemon)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ func (s *DockerExternalVolumeSuite) SetUpSuite(c *check.C) {
type vol struct {
Name string
Mountpoint string
Ninja bool // hack used to trigger an null volume return on `Get`
Ninja bool // hack used to trigger a null volume return on `Get`
Status map[string]interface{}
}
var volList []vol
Expand Down
2 changes: 1 addition & 1 deletion integration-cli/docker_cli_history_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ func (s *DockerSuite) TestHistoryNonExistentImage(c *check.C) {
func (s *DockerSuite) TestHistoryImageWithComment(c *check.C) {
name := "testhistoryimagewithcomment"

// make a image through docker commit <container id> [ -m messages ]
// make an image through docker commit <container id> [ -m messages ]

dockerCmd(c, "run", "--name", name, "busybox", "true")
dockerCmd(c, "wait", name)
Expand Down
Loading

0 comments on commit c1be45f

Please sign in to comment.