Browse code

trivial: typo cleanup

Signed-off-by: David Mackey <tdmackey@booleanhaiku.com>

David Mackey authored on 2015/04/28 05:33:30
Showing 29 changed files
... ...
@@ -483,7 +483,7 @@ func (b *Builder) processImageFrom(img *imagepkg.Image) error {
483 483
 		fmt.Fprintf(b.ErrStream, "# Executing %d build triggers\n", nTriggers)
484 484
 	}
485 485
 
486
-	// Copy the ONBUILD triggers, and remove them from the config, since the config will be commited.
486
+	// Copy the ONBUILD triggers, and remove them from the config, since the config will be committed.
487 487
 	onBuildTriggers := b.Config.OnBuild
488 488
 	b.Config.OnBuild = []string{}
489 489
 
... ...
@@ -125,7 +125,7 @@ func main() {
125 125
 
126 126
 		err = devices.ResizePool(size)
127 127
 		if err != nil {
128
-			fmt.Println("Error resizeing pool: ", err)
128
+			fmt.Println("Error resizing pool: ", err)
129 129
 			os.Exit(1)
130 130
 		}
131 131
 
... ...
@@ -823,7 +823,7 @@ func NewDaemonFromDirectory(config *Config, eng *engine.Engine, registryService
823 823
 	// Load storage driver
824 824
 	driver, err := graphdriver.New(config.Root, config.GraphOptions)
825 825
 	if err != nil {
826
-		return nil, fmt.Errorf("error intializing graphdriver: %v", err)
826
+		return nil, fmt.Errorf("error initializing graphdriver: %v", err)
827 827
 	}
828 828
 	logrus.Debugf("Using graph driver %s", driver)
829 829
 	// register cleanup for graph driver
... ...
@@ -601,7 +601,7 @@ func TestRegisterBadTwice(t *testing.T) {
601 601
 		Mask: []byte{255, 255, 255, 248},
602 602
 	}
603 603
 	if err := a.RegisterSubnet(network, subnet); err != ErrNetworkAlreadyRegistered {
604
-		t.Fatalf("Expecteded ErrNetworkAlreadyRegistered error, got %v", err)
604
+		t.Fatalf("Expected ErrNetworkAlreadyRegistered error, got %v", err)
605 605
 	}
606 606
 }
607 607
 
... ...
@@ -182,7 +182,7 @@ func TestInputAddEmpty(t *testing.T) {
182 182
 		t.Fatal(err)
183 183
 	}
184 184
 	if len(data) > 0 {
185
-		t.Fatalf("Read from empty input shoul yield no data")
185
+		t.Fatalf("Read from empty input should yield no data")
186 186
 	}
187 187
 }
188 188
 
... ...
@@ -643,7 +643,7 @@ func (s *DockerSuite) TestContainerApiCommit(c *check.C) {
643 643
 	// sanity check, make sure the image is what we think it is
644 644
 	out, err = exec.Command(dockerBinary, "run", img.Id, "ls", "/test").CombinedOutput()
645 645
 	if err != nil {
646
-		c.Fatalf("error checking commited image: %v - %q", err, string(out))
646
+		c.Fatalf("error checking committed image: %v - %q", err, string(out))
647 647
 	}
648 648
 }
649 649
 
... ...
@@ -161,7 +161,7 @@ func (s *DockerSuite) TestAttachDisconnect(c *check.C) {
161 161
 		c.Fatal(err)
162 162
 	}
163 163
 	if strings.TrimSpace(out) != "hello" {
164
-		c.Fatalf("exepected 'hello', got %q", out)
164
+		c.Fatalf("expected 'hello', got %q", out)
165 165
 	}
166 166
 
167 167
 	if err := stdin.Close(); err != nil {
... ...
@@ -174,7 +174,7 @@ func (s *DockerSuite) TestAttachDisconnect(c *check.C) {
174 174
 		c.Fatal(err)
175 175
 	}
176 176
 	if running != "true" {
177
-		c.Fatal("exepected container to still be running")
177
+		c.Fatal("expected container to still be running")
178 178
 	}
179 179
 
180 180
 }
... ...
@@ -172,7 +172,7 @@ func (s *DockerSuite) TestAttachDetach(c *check.C) {
172 172
 		c.Fatal(err)
173 173
 	}
174 174
 	if strings.TrimSpace(out) != "hello" {
175
-		c.Fatalf("exepected 'hello', got %q", out)
175
+		c.Fatalf("expected 'hello', got %q", out)
176 176
 	}
177 177
 
178 178
 	// escape sequence
... ...
@@ -195,7 +195,7 @@ func (s *DockerSuite) TestAttachDetach(c *check.C) {
195 195
 		c.Fatal(err)
196 196
 	}
197 197
 	if running != "true" {
198
-		c.Fatal("exepected container to still be running")
198
+		c.Fatal("expected container to still be running")
199 199
 	}
200 200
 
201 201
 	go func() {
... ...
@@ -243,7 +243,7 @@ func (s *DockerSuite) TestAttachDetachTruncatedID(c *check.C) {
243 243
 		c.Fatal(err)
244 244
 	}
245 245
 	if strings.TrimSpace(out) != "hello" {
246
-		c.Fatalf("exepected 'hello', got %q", out)
246
+		c.Fatalf("expected 'hello', got %q", out)
247 247
 	}
248 248
 
249 249
 	// escape sequence
... ...
@@ -266,7 +266,7 @@ func (s *DockerSuite) TestAttachDetachTruncatedID(c *check.C) {
266 266
 		c.Fatal(err)
267 267
 	}
268 268
 	if running != "true" {
269
-		c.Fatal("exepected container to still be running")
269
+		c.Fatal("expected container to still be running")
270 270
 	}
271 271
 
272 272
 	go func() {
... ...
@@ -3408,7 +3408,7 @@ func (s *DockerSuite) TestBuildVerifyIntString(c *check.C) {
3408 3408
 
3409 3409
 	out, rc, err := runCommandWithOutput(exec.Command(dockerBinary, "inspect", name))
3410 3410
 	if rc != 0 || err != nil {
3411
-		c.Fatalf("Unexcepted error from inspect: rc: %v  err: %v", rc, err)
3411
+		c.Fatalf("Unexpected error from inspect: rc: %v  err: %v", rc, err)
3412 3412
 	}
3413 3413
 
3414 3414
 	if !strings.Contains(out, "\"123\"") {
... ...
@@ -5033,7 +5033,7 @@ RUN echo "  \
5033 5033
 
5034 5034
 	expecting := "\n    foo  \n"
5035 5035
 	if !strings.Contains(out, expecting) {
5036
-		c.Fatalf("Bad output: %q expecting to contian %q", out, expecting)
5036
+		c.Fatalf("Bad output: %q expecting to contain %q", out, expecting)
5037 5037
 	}
5038 5038
 
5039 5039
 }
... ...
@@ -262,7 +262,7 @@ func (s *DockerSuite) TestCommitMergeConfigRun(c *check.C) {
262 262
 
263 263
 	out, _ = dockerCmd(c, "run", "--name", name, "commit-test")
264 264
 	if strings.TrimSpace(out) != "testing" {
265
-		c.Fatal("run config in commited container was not merged")
265
+		c.Fatal("run config in committed container was not merged")
266 266
 	}
267 267
 
268 268
 	type cfg struct {
... ...
@@ -860,7 +860,7 @@ func (s *DockerSuite) TestDaemonwithwrongkey(c *check.C) {
860 860
 
861 861
 	if err := d1.Start(); err == nil {
862 862
 		d1.Stop()
863
-		c.Fatalf("It should not be succssful to start daemon with wrong key: %v", err)
863
+		c.Fatalf("It should not be successful to start daemon with wrong key: %v", err)
864 864
 	}
865 865
 
866 866
 	content, _ := ioutil.ReadFile(d1.logFile.Name())
... ...
@@ -547,7 +547,7 @@ func (s *DockerSuite) TestPsListContainersFilterExited(c *check.C) {
547 547
 	}
548 548
 	ids = strings.Split(strings.TrimSpace(out), "\n")
549 549
 	if len(ids) != 2 {
550
-		c.Fatalf("Should be 2 zero exited containerst got %d", len(ids))
550
+		c.Fatalf("Should be 2 zero exited containers got %d", len(ids))
551 551
 	}
552 552
 	if ids[0] != secondNonZero {
553 553
 		c.Fatalf("First in list should be %q, got %q", secondNonZero, ids[0])
... ...
@@ -41,7 +41,7 @@ func (s *DockerRegistrySuite) TestPushUntagged(c *check.C) {
41 41
 	expected := "Repository does not exist"
42 42
 	pushCmd := exec.Command(dockerBinary, "push", repoName)
43 43
 	if out, _, err := runCommandWithOutput(pushCmd); err == nil {
44
-		c.Fatalf("pushing the image to the private registry should have failed: outuput %q", out)
44
+		c.Fatalf("pushing the image to the private registry should have failed: output %q", out)
45 45
 	} else if !strings.Contains(out, expected) {
46 46
 		c.Fatalf("pushing the image failed with an unexpected message: expected %q, got %q", expected, out)
47 47
 	}
... ...
@@ -53,7 +53,7 @@ func (s *DockerRegistrySuite) TestPushBadTag(c *check.C) {
53 53
 	expected := "does not exist"
54 54
 	pushCmd := exec.Command(dockerBinary, "push", repoName)
55 55
 	if out, _, err := runCommandWithOutput(pushCmd); err == nil {
56
-		c.Fatalf("pushing the image to the private registry should have failed: outuput %q", out)
56
+		c.Fatalf("pushing the image to the private registry should have failed: output %q", out)
57 57
 	} else if !strings.Contains(out, expected) {
58 58
 		c.Fatalf("pushing the image failed with an unexpected message: expected %q, got %q", expected, out)
59 59
 	}
... ...
@@ -108,7 +108,7 @@ func (s *DockerSuite) TestRmiImgIDForce(c *check.C) {
108 108
 	runCmd = exec.Command(dockerBinary, "rmi", imgID)
109 109
 	out, _, err = runCommandWithOutput(runCmd)
110 110
 	if err == nil || !strings.Contains(out, fmt.Sprintf("Conflict, cannot delete image %s because it is tagged in multiple repositories, use -f to force", imgID)) {
111
-		c.Fatalf("rmi tagged in mutiple repos should have failed without force:%s, %v", out, err)
111
+		c.Fatalf("rmi tagged in multiple repos should have failed without force:%s, %v", out, err)
112 112
 	}
113 113
 
114 114
 	dockerCmd(c, "rmi", "-f", imgID)
... ...
@@ -329,7 +329,7 @@ func (s *DockerSuite) TestRunLinksContainerWithContainerId(c *check.C) {
329 329
 	cmd = exec.Command(dockerBinary, "inspect", "-f", "{{.NetworkSettings.IPAddress}}", cID)
330 330
 	ip, _, _, err := runCommandWithStdoutStderr(cmd)
331 331
 	if err != nil {
332
-		c.Fatalf("faild to inspect container: %v, output: %q", err, ip)
332
+		c.Fatalf("failed to inspect container: %v, output: %q", err, ip)
333 333
 	}
334 334
 	ip = strings.TrimSpace(ip)
335 335
 	cmd = exec.Command(dockerBinary, "run", "--link", cID+":test", "busybox", "/bin/cat", "/etc/hosts")
... ...
@@ -2067,7 +2067,7 @@ func (s *DockerSuite) TestRunCidFileCleanupIfEmpty(c *check.C) {
2067 2067
 	if err == nil {
2068 2068
 		c.Fatalf("Run without command must fail. out=%s", out)
2069 2069
 	} else if !strings.Contains(out, "No command specified") {
2070
-		c.Fatalf("Run without command failed with wrong outpuc. out=%s\nerr=%v", out, err)
2070
+		c.Fatalf("Run without command failed with wrong output. out=%s\nerr=%v", out, err)
2071 2071
 	}
2072 2072
 
2073 2073
 	if _, err := os.Stat(tmpCidFile); err == nil {
... ...
@@ -213,7 +213,7 @@ func (s *DockerSuite) TestRunAttachDetach(c *check.C) {
213 213
 		c.Fatal(err)
214 214
 	}
215 215
 	if strings.TrimSpace(out) != "hello" {
216
-		c.Fatalf("exepected 'hello', got %q", out)
216
+		c.Fatalf("expected 'hello', got %q", out)
217 217
 	}
218 218
 
219 219
 	// escape sequence
... ...
@@ -236,7 +236,7 @@ func (s *DockerSuite) TestRunAttachDetach(c *check.C) {
236 236
 		c.Fatal(err)
237 237
 	}
238 238
 	if running != "true" {
239
-		c.Fatal("exepected container to still be running")
239
+		c.Fatal("expected container to still be running")
240 240
 	}
241 241
 
242 242
 	go func() {
... ...
@@ -333,7 +333,7 @@ func (s *DockerSuite) TestSaveRepoWithMultipleImages(c *check.C) {
333 333
 	sort.Strings(actual)
334 334
 	sort.Strings(expected)
335 335
 	if !reflect.DeepEqual(expected, actual) {
336
-		c.Fatalf("achive does not contains the right layers: got %v, expected %v", actual, expected)
336
+		c.Fatalf("archive does not contains the right layers: got %v, expected %v", actual, expected)
337 337
 	}
338 338
 
339 339
 }
... ...
@@ -205,7 +205,7 @@ func (s *DockerSuite) TestStartMultipleContainers(c *check.C) {
205 205
 		c.Fatal("Container should be stopped")
206 206
 	}
207 207
 
208
-	// start all the three containers, container `child_first` start first which should be faild
208
+	// start all the three containers, container `child_first` start first which should be failed
209 209
 	// container 'parent' start second and then start container 'child_second'
210 210
 	cmd = exec.Command(dockerBinary, "start", "child_first", "parent", "child_second")
211 211
 	out, _, err = runCommandWithOutput(cmd)
... ...
@@ -434,7 +434,7 @@ func TestGetEnabledCors(t *testing.T) {
434 434
 		t.Errorf("Expected header Access-Control-Allow-Headers to be \"Origin, X-Requested-With, Content-Type, Accept, X-Registry-Auth\", %s found.", allowHeaders)
435 435
 	}
436 436
 	if allowMethods != "GET, POST, DELETE, PUT, OPTIONS" {
437
-		t.Errorf("Expected hearder Access-Control-Allow-Methods to be \"GET, POST, DELETE, PUT, OPTIONS\", %s found.", allowMethods)
437
+		t.Errorf("Expected header Access-Control-Allow-Methods to be \"GET, POST, DELETE, PUT, OPTIONS\", %s found.", allowMethods)
438 438
 	}
439 439
 }
440 440
 
... ...
@@ -648,7 +648,7 @@ func TestConstainersStartChunkedEncodingHostConfig(t *testing.T) {
648 648
 	}
649 649
 
650 650
 	if c.HostConfig.Binds[0] != "/tmp:/foo" {
651
-		t.Fatal("Chunked encoding not properly handled, execpted binds to be /tmp:/foo, got:", c.HostConfig.Binds[0])
651
+		t.Fatal("Chunked encoding not properly handled, expected binds to be /tmp:/foo, got:", c.HostConfig.Binds[0])
652 652
 	}
653 653
 }
654 654
 
... ...
@@ -213,7 +213,7 @@ func BenchmarkRunParallel(b *testing.B) {
213 213
 				return
214 214
 			}
215 215
 			// if string(output) != "foo" {
216
-			// 	complete <- fmt.Errorf("Unexecpted output: %v", string(output))
216
+			// 	complete <- fmt.Errorf("Unexpected output: %v", string(output))
217 217
 			// }
218 218
 			if err := daemon.Rm(container); err != nil {
219 219
 				complete <- err
... ...
@@ -837,7 +837,7 @@ func TestDestroyWithInitLayer(t *testing.T) {
837 837
 
838 838
 	// Make sure that the container does not exist in the driver
839 839
 	if _, err := driver.Get(container.ID, ""); err == nil {
840
-		t.Fatal("Conttainer should not exist in the driver")
840
+		t.Fatal("Container should not exist in the driver")
841 841
 	}
842 842
 
843 843
 	// Make sure that the init layer is removed from the driver
... ...
@@ -41,7 +41,7 @@ func waitContainerStart(t *testing.T, timeout time.Duration) *daemon.Container {
41 41
 	})
42 42
 
43 43
 	if container == nil {
44
-		t.Fatal("An error occured while waiting for the container to start")
44
+		t.Fatal("An error occurred while waiting for the container to start")
45 45
 	}
46 46
 
47 47
 	return container
... ...
@@ -20,7 +20,7 @@ func TestCanonicalTarNameForPath(t *testing.T) {
20 20
 		if out, err := CanonicalTarNameForPath(v.in); err != nil && !v.shouldFail {
21 21
 			t.Fatalf("cannot get canonical name for path: %s: %v", v.in, err)
22 22
 		} else if v.shouldFail && err == nil {
23
-			t.Fatalf("canonical path call should have pailed with error. in=%s out=%s", v.in, out)
23
+			t.Fatalf("canonical path call should have failed with error. in=%s out=%s", v.in, out)
24 24
 		} else if !v.shouldFail && out != v.expected {
25 25
 			t.Fatalf("wrong canonical tar name. expected:%s got:%s", v.expected, out)
26 26
 		}
... ...
@@ -52,7 +52,7 @@ func TestGetRootEntity(t *testing.T) {
52 52
 		t.Fatal("Entity should not be nil")
53 53
 	}
54 54
 	if e.ID() != "0" {
55
-		t.Fatalf("Enity id should be 0, got %s", e.ID())
55
+		t.Fatalf("Entity id should be 0, got %s", e.ID())
56 56
 	}
57 57
 }
58 58
 
... ...
@@ -74,7 +74,7 @@ func TestSetDuplicateEntity(t *testing.T) {
74 74
 		t.Fatal(err)
75 75
 	}
76 76
 	if _, err := db.Set("/foo", "43"); err == nil {
77
-		t.Fatalf("Creating an entry with a duplciate path did not cause an error")
77
+		t.Fatalf("Creating an entry with a duplicate path did not cause an error")
78 78
 	}
79 79
 }
80 80
 
... ...
@@ -18,7 +18,7 @@ func helpsTestParseInt16OrDefault(t *testing.T, expectedValue int16, shouldFail
18 18
 		t.Errorf(format, args)
19 19
 	}
20 20
 	if expectedValue != value {
21
-		t.Errorf("The value returned does not macth expected\n\tExpected:%v\n\t:Actual%v", expectedValue, value)
21
+		t.Errorf("The value returned does not match expected\n\tExpected:%v\n\t:Actual%v", expectedValue, value)
22 22
 		t.Errorf(format, args)
23 23
 	}
24 24
 }
... ...
@@ -736,7 +736,7 @@ func TestSearchRepositories(t *testing.T) {
736 736
 	}
737 737
 	assertEqual(t, results.NumResults, 1, "Expected 1 search results")
738 738
 	assertEqual(t, results.Query, "fakequery", "Expected 'fakequery' as query")
739
-	assertEqual(t, results.Results[0].StarCount, 42, "Expected 'fakeimage' a ot hae 42 stars")
739
+	assertEqual(t, results.Results[0].StarCount, 42, "Expected 'fakeimage' to have 42 stars")
740 740
 }
741 741
 
742 742
 func TestValidRemoteName(t *testing.T) {
... ...
@@ -104,7 +104,7 @@ func TestParseRunVolumes(t *testing.T) {
104 104
 	if config, hostConfig := mustParse(t, "-v /tmp -v /var"); hostConfig.Binds != nil {
105 105
 		t.Fatalf("Error parsing volume flags, `-v /tmp -v /var` should not mount-bind anything. Received %v", hostConfig.Binds)
106 106
 	} else if _, exists := config.Volumes["/tmp"]; !exists {
107
-		t.Fatalf("Error parsing volume flags, `-v /tmp` is missing from volumes. Recevied %v", config.Volumes)
107
+		t.Fatalf("Error parsing volume flags, `-v /tmp` is missing from volumes. Received %v", config.Volumes)
108 108
 	} else if _, exists := config.Volumes["/var"]; !exists {
109 109
 		t.Fatalf("Error parsing volume flags, `-v /var` is missing from volumes. Received %v", config.Volumes)
110 110
 	}
... ...
@@ -41,7 +41,7 @@ func Merge(userConf, imageConf *Config) error {
41 41
 	}
42 42
 	if len(imageConf.PortSpecs) > 0 {
43 43
 		// FIXME: I think we can safely remove this. Leaving it for now for the sake of reverse-compat paranoia.
44
-		logrus.Debugf("Migrating image port specs to containter: %s", strings.Join(imageConf.PortSpecs, ", "))
44
+		logrus.Debugf("Migrating image port specs to container: %s", strings.Join(imageConf.PortSpecs, ", "))
45 45
 		if userConf.ExposedPorts == nil {
46 46
 			userConf.ExposedPorts = make(nat.PortSet)
47 47
 		}
... ...
@@ -58,7 +58,7 @@ func (r *Repository) newVolume(path string, writable bool) (*Volume, error) {
58 58
 	path = filepath.Clean(path)
59 59
 
60 60
 	// Ignore the error here since the path may not exist
61
-	// Really just want to make sure the path we are using is real(or non-existant)
61
+	// Really just want to make sure the path we are using is real(or nonexistent)
62 62
 	if cleanPath, err := filepath.EvalSymlinks(path); err == nil {
63 63
 		path = cleanPath
64 64
 	}