Signed-off-by: Victor Vieux <vieux@docker.com>
| ... | ... |
@@ -79,7 +79,7 @@ func (cli *DockerCli) CmdAttach(args ...string) error {
|
| 79 | 79 |
if c.Config.Tty && cli.isTerminalOut {
|
| 80 | 80 |
height, width := cli.getTtySize() |
| 81 | 81 |
// To handle the case where a user repeatedly attaches/detaches without resizing their |
| 82 |
- // terminal, the only way to get the shell prompt to display for attaches 2+ is to artifically |
|
| 82 |
+ // terminal, the only way to get the shell prompt to display for attaches 2+ is to artificially |
|
| 83 | 83 |
// resize it, then go back to normal. Without this, every attach after the first will |
| 84 | 84 |
// require the user to manually resize or hit enter. |
| 85 | 85 |
cli.resizeTtyTo(cmd.Arg(0), height+1, width+1, false) |
| ... | ... |
@@ -49,7 +49,7 @@ type Command struct {
|
| 49 | 49 |
|
| 50 | 50 |
// Fields below here are platform specific |
| 51 | 51 |
|
| 52 |
- FirstStart bool `json:"first_start"` // Optimisation for first boot of Windows |
|
| 52 |
+ FirstStart bool `json:"first_start"` // Optimization for first boot of Windows |
|
| 53 | 53 |
Hostname string `json:"hostname"` // Windows sets the hostname in the execdriver |
| 54 | 54 |
LayerFolder string `json:"layer_folder"` // Layer folder for a command |
| 55 | 55 |
LayerPaths []string `json:"layer_paths"` // Layer paths for a command |
| ... | ... |
@@ -81,10 +81,10 @@ type containerInit struct {
|
| 81 | 81 |
IsDummy bool // Used for development purposes. |
| 82 | 82 |
VolumePath string // Windows volume path for scratch space |
| 83 | 83 |
Devices []device // Devices used by the container |
| 84 |
- IgnoreFlushesDuringBoot bool // Optimisation hint for container startup in Windows |
|
| 84 |
+ IgnoreFlushesDuringBoot bool // Optimization hint for container startup in Windows |
|
| 85 | 85 |
LayerFolderPath string // Where the layer folders are located |
| 86 | 86 |
Layers []layer // List of storage layers |
| 87 |
- ProcessorWeight int64 `json:",omitempty"` // CPU Shares 0..10000 on Windows; where 0 will be ommited and HCS will default. |
|
| 87 |
+ ProcessorWeight int64 `json:",omitempty"` // CPU Shares 0..10000 on Windows; where 0 will be omitted and HCS will default. |
|
| 88 | 88 |
HostName string // Hostname |
| 89 | 89 |
MappedDirectories []mappedDir // List of mapped directories (volumes/mounts) |
| 90 | 90 |
SandboxPath string // Location of unmounted sandbox (used for Hyper-V containers, not Windows Server containers) |
| ... | ... |
@@ -43,7 +43,7 @@ const ( |
| 43 | 43 |
// |
| 44 | 44 |
// Hard Conflict: |
| 45 | 45 |
// - a pull or build using the image. |
| 46 |
-// - any descendent image. |
|
| 46 |
+// - any descendant image. |
|
| 47 | 47 |
// - any running container using the image. |
| 48 | 48 |
// |
| 49 | 49 |
// Soft Conflict: |
| ... | ... |
@@ -313,7 +313,7 @@ func (daemon *Daemon) imageDeleteHelper(imgID image.ID, records *[]types.ImageDe |
| 313 | 313 |
// image or any stopped container using the image. If ignoreSoftConflicts is |
| 314 | 314 |
// true, this function will not check for soft conflict conditions. |
| 315 | 315 |
func (daemon *Daemon) checkImageDeleteConflict(imgID image.ID, mask conflictType) *imageDeleteConflict {
|
| 316 |
- // Check if the image has any descendent images. |
|
| 316 |
+ // Check if the image has any descendant images. |
|
| 317 | 317 |
if mask&conflictDependentChild != 0 && len(daemon.imageStore.Children(imgID)) > 0 {
|
| 318 | 318 |
return &imageDeleteConflict{
|
| 319 | 319 |
hard: true, |
| ... | ... |
@@ -379,7 +379,7 @@ func (pd *v2PushDescriptor) Upload(ctx context.Context, progressOutput progress. |
| 379 | 379 |
|
| 380 | 380 |
pd.pushState.Lock() |
| 381 | 381 |
|
| 382 |
- // If Commit succeded, that's an indication that the remote registry |
|
| 382 |
+ // If Commit succeeded, that's an indication that the remote registry |
|
| 383 | 383 |
// speaks the v2 protocol. |
| 384 | 384 |
pd.pushState.confirmedV2 = true |
| 385 | 385 |
|
| ... | ... |
@@ -105,7 +105,7 @@ Some container-related events are not affected by container state, so they are n |
| 105 | 105 |
|
| 106 | 106 |
Running `docker rmi` emits an **untag** event when removing an image name. The `rmi` command may also emit **delete** events when images are deleted by ID directly or by deleting the last tag referring to the image. |
| 107 | 107 |
|
| 108 |
-> **Acknowledgement**: This diagram and the accompanying text were used with the permission of Matt Good and Gilder Labs. See Matt's original blog post [Docker Events Explained](https://gliderlabs.com/blog/2015/04/14/docker-events-explained/). |
|
| 108 |
+> **Acknowledgment**: This diagram and the accompanying text were used with the permission of Matt Good and Gilder Labs. See Matt's original blog post [Docker Events Explained](https://gliderlabs.com/blog/2015/04/14/docker-events-explained/). |
|
| 109 | 109 |
|
| 110 | 110 |
## Version history |
| 111 | 111 |
|
| ... | ... |
@@ -516,7 +516,7 @@ feature](../userguide/networking/index.md)). |
| 516 | 516 |
ENV <key>=<value> ... |
| 517 | 517 |
|
| 518 | 518 |
The `ENV` instruction sets the environment variable `<key>` to the value |
| 519 |
-`<value>`. This value will be in the environment of all "descendent" |
|
| 519 |
+`<value>`. This value will be in the environment of all "descendant" |
|
| 520 | 520 |
`Dockerfile` commands and can be [replaced inline](#environment-replacement) in |
| 521 | 521 |
many as well. |
| 522 | 522 |
|
| ... | ... |
@@ -646,7 +646,7 @@ guide](../userguide/eng-image/dockerfile_best-practices.md#build-cache) for more |
| 646 | 646 |
|
| 647 | 647 |
> **Note**: |
| 648 | 648 |
> Whether a file is identified as a recognized compression format or not |
| 649 |
- > is done soley based on the contents of the file, not the name of the file. |
|
| 649 |
+ > is done solely based on the contents of the file, not the name of the file. |
|
| 650 | 650 |
> For example, if an empty file happens to end with `.tar.gz` this will not |
| 651 | 651 |
> be recognized as a compressed file and **will not** generate any kind of |
| 652 | 652 |
> decompression error message, rather the file will simply be copied to the |
| ... | ... |
@@ -802,7 +802,7 @@ cgroup. |
| 802 | 802 |
|
| 803 | 803 |
Assuming the daemon is running in cgroup `daemoncgroup`, |
| 804 | 804 |
`--cgroup-parent=/foobar` creates a cgroup in |
| 805 |
-`/sys/fs/cgroup/memory/foobar`, wheras using `--cgroup-parent=foobar` |
|
| 805 |
+`/sys/fs/cgroup/memory/foobar`, whereas using `--cgroup-parent=foobar` |
|
| 806 | 806 |
creates the cgroup in `/sys/fs/cgroup/memory/daemoncgroup/foobar` |
| 807 | 807 |
|
| 808 | 808 |
This setting can also be set per container, using the `--cgroup-parent` |
| ... | ... |
@@ -40,7 +40,7 @@ You can specify the IP address you want to be assigned to the container's interf |
| 40 | 40 |
$ docker network connect --ip 10.10.36.122 multi-host-network container2 |
| 41 | 41 |
``` |
| 42 | 42 |
|
| 43 |
-You can use `--link` option to link another container with a prefered alias |
|
| 43 |
+You can use `--link` option to link another container with a preferred alias |
|
| 44 | 44 |
|
| 45 | 45 |
```bash |
| 46 | 46 |
$ docker network connect --link container1:c1 multi-host-network container2 |
| ... | ... |
@@ -110,7 +110,7 @@ For information on connecting a container to a network, see the ["*Docker networ |
| 110 | 110 |
|
| 111 | 111 |
## Examples |
| 112 | 112 |
|
| 113 |
-### Assign name and allocate psuedo-TTY (--name, -it) |
|
| 113 |
+### Assign name and allocate pseudo-TTY (--name, -it) |
|
| 114 | 114 |
|
| 115 | 115 |
$ docker run --name test -it debian |
| 116 | 116 |
root@d6c0fe130dba:/# exit 13 |
| ... | ... |
@@ -455,7 +455,7 @@ step-by-step. You can see that each step creates a new container, runs |
| 455 | 455 |
the instruction inside that container and then commits that change - |
| 456 | 456 |
just like the `docker commit` work flow you saw earlier. When all the |
| 457 | 457 |
instructions have executed you're left with the `97feabe5d2ed` image |
| 458 |
-(also helpfully tagged as `ouruser/sinatra:v2`) and all intermediate |
|
| 458 |
+(also helpfuly tagged as `ouruser/sinatra:v2`) and all intermediate |
|
| 459 | 459 |
containers will get removed to clean things up. |
| 460 | 460 |
|
| 461 | 461 |
> **Note:** |
| ... | ... |
@@ -412,7 +412,7 @@ Please note that while creating container4, we linked to a container named `cont |
| 412 | 412 |
which is not created yet. That is one of the differences in behavior between the |
| 413 | 413 |
`legacy link` in default `bridge` network and the new `link` functionality in user defined |
| 414 | 414 |
networks. The `legacy link` is static in nature and it hard-binds the container with the |
| 415 |
-alias and it doesnt tolerate linked container restarts. While the new `link` functionality |
|
| 415 |
+alias and it doesn't tolerate linked container restarts. While the new `link` functionality |
|
| 416 | 416 |
in user defined networks are dynamic in nature and supports linked container restarts |
| 417 | 417 |
including tolerating ip-address changes on the linked container. |
| 418 | 418 |
|
| ... | ... |
@@ -25,7 +25,7 @@ Docker relies on driver technology to manage the storage and interactions associ |
| 25 | 25 |
|
| 26 | 26 |
If you are new to Docker containers make sure you read ["Understand images, containers, and storage drivers"](imagesandcontainers.md) first. It explains key concepts and technologies that can help you when working with storage drivers. |
| 27 | 27 |
|
| 28 |
-### Acknowledgement |
|
| 28 |
+### Acknowledgment |
|
| 29 | 29 |
|
| 30 | 30 |
The Docker storage driver material was created in large part by our guest author |
| 31 | 31 |
Nigel Poulton with a bit of help from Docker's own Jérôme Petazzoni. In his |
| ... | ... |
@@ -111,7 +111,7 @@ directories. |
| 111 | 111 |
drwxr-xr-x 4 root root 4096 Oct 28 11:06 upper |
| 112 | 112 |
drwx------ 3 root root 4096 Oct 28 11:06 work |
| 113 | 113 |
|
| 114 |
-These four filesystem objects are all artefacts of OverlayFS. The "lower-id" |
|
| 114 |
+These four filesystem objects are all artifacts of OverlayFS. The "lower-id" |
|
| 115 | 115 |
file contains the ID of the top layer of the image the container is based on. |
| 116 | 116 |
This is used by OverlayFS as the "lowerdir". |
| 117 | 117 |
|
| ... | ... |
@@ -2,7 +2,7 @@ |
| 2 | 2 |
set -e |
| 3 | 3 |
|
| 4 | 4 |
# This script updates the apt repo in $DOCKER_RELEASE_DIR/apt/repo. |
| 5 |
-# This script is a "fix all" for any sort of problems that might have occured with |
|
| 5 |
+# This script is a "fix all" for any sort of problems that might have occurred with |
|
| 6 | 6 |
# the Release or Package files in the repo. |
| 7 | 7 |
# It should only be used in the rare case of extreme emergencies to regenerate |
| 8 | 8 |
# Release and Package files for the apt repo. |
| ... | ... |
@@ -176,7 +176,7 @@ Here is an example image JSON file: |
| 176 | 176 |
should be omitted. A collection of images may share many of the same |
| 177 | 177 |
ancestor layers. This organizational structure is strictly a tree with |
| 178 | 178 |
any one layer having either no parent or a single parent and zero or |
| 179 |
- more descendent layers. Cycles are not allowed and implementations |
|
| 179 |
+ more descendant layers. Cycles are not allowed and implementations |
|
| 180 | 180 |
should be careful to avoid creating them or iterating through a cycle |
| 181 | 181 |
indefinitely. |
| 182 | 182 |
</dd> |
| ... | ... |
@@ -227,7 +227,7 @@ func (s *DockerAuthzSuite) TestAuthZPluginDenyResponse(c *check.C) {
|
| 227 | 227 |
c.Assert(res, check.Equals, fmt.Sprintf("Error response from daemon: authorization denied by plugin %s: %s\n", testAuthZPlugin, unauthorizedMessage))
|
| 228 | 228 |
} |
| 229 | 229 |
|
| 230 |
-// TestAuthZPluginAllowEventStream verifies event stream propogates correctly after request pass through by the authorization plugin |
|
| 230 |
+// TestAuthZPluginAllowEventStream verifies event stream propagates correctly after request pass through by the authorization plugin |
|
| 231 | 231 |
func (s *DockerAuthzSuite) TestAuthZPluginAllowEventStream(c *check.C) {
|
| 232 | 232 |
testRequires(c, DaemonIsLinux) |
| 233 | 233 |
|
| ... | ... |
@@ -20,7 +20,7 @@ func (s *DockerSuite) TestEventsTimestampFormats(c *check.C) {
|
| 20 | 20 |
image := "busybox" |
| 21 | 21 |
|
| 22 | 22 |
// Start stopwatch, generate an event |
| 23 |
- time.Sleep(1 * time.Second) // so that we don't grab events from previous test occured in the same second |
|
| 23 |
+ time.Sleep(1 * time.Second) // so that we don't grab events from previous test occurred in the same second |
|
| 24 | 24 |
start := daemonTime(c) |
| 25 | 25 |
dockerCmd(c, "tag", image, "timestamptest:1") |
| 26 | 26 |
dockerCmd(c, "rmi", "timestamptest:1") |
| ... | ... |
@@ -248,7 +248,7 @@ func isNwPresent(c *check.C, name string) bool {
|
| 248 | 248 |
return false |
| 249 | 249 |
} |
| 250 | 250 |
|
| 251 |
-// assertNwList checks network list retrived with ls command |
|
| 251 |
+// assertNwList checks network list retrieved with ls command |
|
| 252 | 252 |
// equals to expected network list |
| 253 | 253 |
// note: out should be `network ls [option]` result |
| 254 | 254 |
func assertNwList(c *check.C, out string, expectNws []string) {
|
| ... | ... |
@@ -1232,7 +1232,7 @@ func (s *DockerSuite) TestUserDefinedNetworkConnectDisconnectLink(c *check.C) {
|
| 1232 | 1232 |
c.Assert(waitRun("first"), check.IsNil)
|
| 1233 | 1233 |
|
| 1234 | 1234 |
// run a container in a user-defined network with a link for an existing container |
| 1235 |
- // and a link for a container that doesnt exist |
|
| 1235 |
+ // and a link for a container that doesn't exist |
|
| 1236 | 1236 |
dockerCmd(c, "run", "-d", "--net=foo1", "--name=second", "--link=first:FirstInFoo1", |
| 1237 | 1237 |
"--link=third:bar", "busybox", "top") |
| 1238 | 1238 |
c.Assert(waitRun("second"), check.IsNil)
|
| ... | ... |
@@ -206,7 +206,7 @@ func (s *DockerSuite) TestUserDefinedNetworkLinks(c *check.C) {
|
| 206 | 206 |
c.Assert(waitRun("first"), check.IsNil)
|
| 207 | 207 |
|
| 208 | 208 |
// run a container in user-defined network udlinkNet with a link for an existing container |
| 209 |
- // and a link for a container that doesnt exist |
|
| 209 |
+ // and a link for a container that doesn't exist |
|
| 210 | 210 |
dockerCmd(c, "run", "-d", "--net=udlinkNet", "--name=second", "--link=first:foo", |
| 211 | 211 |
"--link=third:bar", "busybox", "top") |
| 212 | 212 |
c.Assert(waitRun("second"), check.IsNil)
|
| ... | ... |
@@ -32,7 +32,7 @@ func TestFileSpecPlugin(t *testing.T) {
|
| 32 | 32 |
addr string |
| 33 | 33 |
fail bool |
| 34 | 34 |
}{
|
| 35 |
- // TODO Windows: Factor out the unix:// varients. |
|
| 35 |
+ // TODO Windows: Factor out the unix:// variants. |
|
| 36 | 36 |
{filepath.Join(tmpdir, "echo.spec"), "echo", "unix://var/lib/docker/plugins/echo.sock", false},
|
| 37 | 37 |
{filepath.Join(tmpdir, "echo", "echo.spec"), "echo", "unix://var/lib/docker/plugins/echo.sock", false},
|
| 38 | 38 |
{filepath.Join(tmpdir, "foo.spec"), "foo", "tcp://localhost:8080", false},
|
| ... | ... |
@@ -223,7 +223,7 @@ with matching paths, and orders the list of file sums accordingly [3]. |
| 223 | 223 |
* [2] Tar http://en.wikipedia.org/wiki/Tar_%28computing%29 |
| 224 | 224 |
* [3] Name collision https://github.com/docker/docker/commit/c5e6362c53cbbc09ddbabd5a7323e04438b57d31 |
| 225 | 225 |
|
| 226 |
-## Acknowledgements |
|
| 226 |
+## Acknowledgments |
|
| 227 | 227 |
|
| 228 | 228 |
Joffrey F (shin-) and Guillaume J. Charmes (creack) on the initial work of the |
| 229 | 229 |
TarSum calculation. |
| ... | ... |
@@ -43,7 +43,7 @@ type volumeDriver interface {
|
| 43 | 43 |
Unmount(name string) (err error) |
| 44 | 44 |
// List lists all the volumes known to the driver |
| 45 | 45 |
List() (volumes list, err error) |
| 46 |
- // Get retreives the volume with the requested name |
|
| 46 |
+ // Get retrieves the volume with the requested name |
|
| 47 | 47 |
Get(name string) (volume *proxyVolume, err error) |
| 48 | 48 |
} |
| 49 | 49 |
|
| ... | ... |
@@ -168,7 +168,7 @@ func (s *VolumeStore) Create(name, driverName string, opts map[string]string) (v |
| 168 | 168 |
// create asks the given driver to create a volume with the name/opts. |
| 169 | 169 |
// If a volume with the name is already known, it will ask the stored driver for the volume. |
| 170 | 170 |
// If the passed in driver name does not match the driver name which is stored for the given volume name, an error is returned. |
| 171 |
-// It is expected that callers of this function hold any neccessary locks. |
|
| 171 |
+// It is expected that callers of this function hold any necessary locks. |
|
| 172 | 172 |
func (s *VolumeStore) create(name, driverName string, opts map[string]string) (volume.Volume, error) {
|
| 173 | 173 |
// Validate the name in a platform-specific manner |
| 174 | 174 |
valid, err := volume.IsVolumeNameValid(name) |
| ... | ... |
@@ -197,7 +197,7 @@ func (s *VolumeStore) create(name, driverName string, opts map[string]string) (v |
| 197 | 197 |
|
| 198 | 198 |
// GetWithRef gets a volume with the given name from the passed in driver and stores the ref |
| 199 | 199 |
// This is just like Get(), but we store the reference while holding the lock. |
| 200 |
-// This makes sure there are no races between checking for the existance of a volume and adding a reference for it |
|
| 200 |
+// This makes sure there are no races between checking for the existence of a volume and adding a reference for it |
|
| 201 | 201 |
func (s *VolumeStore) GetWithRef(name, driverName, ref string) (volume.Volume, error) {
|
| 202 | 202 |
name = normaliseVolumeName(name) |
| 203 | 203 |
s.locks.Lock(name) |
| ... | ... |
@@ -233,7 +233,7 @@ func (s *VolumeStore) Get(name string) (volume.Volume, error) {
|
| 233 | 233 |
|
| 234 | 234 |
// get requests the volume, if the driver info is stored it just access that driver, |
| 235 | 235 |
// if the driver is unknown it probes all drivers until it finds the first volume with that name. |
| 236 |
-// it is expected that callers of this function hold any neccessary locks |
|
| 236 |
+// it is expected that callers of this function hold any necessary locks |
|
| 237 | 237 |
func (s *VolumeStore) getVolume(name string) (volume.Volume, error) {
|
| 238 | 238 |
logrus.Debugf("Getting volume reference for name: %s", name)
|
| 239 | 239 |
if v, exists := s.names[name]; exists {
|
| ... | ... |
@@ -24,7 +24,7 @@ type Driver interface {
|
| 24 | 24 |
Remove(vol Volume) (err error) |
| 25 | 25 |
// List lists all the volumes the driver has |
| 26 | 26 |
List() ([]Volume, error) |
| 27 |
- // Get retreives the volume with the requested name |
|
| 27 |
+ // Get retrieves the volume with the requested name |
|
| 28 | 28 |
Get(name string) (Volume, error) |
| 29 | 29 |
} |
| 30 | 30 |
|