Browse code

fix common misspell

Signed-off-by: Victor Vieux <vieux@docker.com>

Victor Vieux authored on 2016/02/12 08:21:52
Showing 26 changed files
... ...
@@ -79,7 +79,7 @@ func (cli *DockerCli) CmdAttach(args ...string) error {
79 79
 	if c.Config.Tty && cli.isTerminalOut {
80 80
 		height, width := cli.getTtySize()
81 81
 		// To handle the case where a user repeatedly attaches/detaches without resizing their
82
-		// terminal, the only way to get the shell prompt to display for attaches 2+ is to artifically
82
+		// terminal, the only way to get the shell prompt to display for attaches 2+ is to artificially
83 83
 		// resize it, then go back to normal. Without this, every attach after the first will
84 84
 		// require the user to manually resize or hit enter.
85 85
 		cli.resizeTtyTo(cmd.Arg(0), height+1, width+1, false)
... ...
@@ -49,7 +49,7 @@ type Command struct {
49 49
 
50 50
 	// Fields below here are platform specific
51 51
 
52
-	FirstStart  bool     `json:"first_start"`  // Optimisation for first boot of Windows
52
+	FirstStart  bool     `json:"first_start"`  // Optimization for first boot of Windows
53 53
 	Hostname    string   `json:"hostname"`     // Windows sets the hostname in the execdriver
54 54
 	LayerFolder string   `json:"layer_folder"` // Layer folder for a command
55 55
 	LayerPaths  []string `json:"layer_paths"`  // Layer paths for a command
... ...
@@ -81,10 +81,10 @@ type containerInit struct {
81 81
 	IsDummy                 bool        // Used for development purposes.
82 82
 	VolumePath              string      // Windows volume path for scratch space
83 83
 	Devices                 []device    // Devices used by the container
84
-	IgnoreFlushesDuringBoot bool        // Optimisation hint for container startup in Windows
84
+	IgnoreFlushesDuringBoot bool        // Optimization hint for container startup in Windows
85 85
 	LayerFolderPath         string      // Where the layer folders are located
86 86
 	Layers                  []layer     // List of storage layers
87
-	ProcessorWeight         int64       `json:",omitempty"` // CPU Shares 0..10000 on Windows; where 0 will be ommited and HCS will default.
87
+	ProcessorWeight         int64       `json:",omitempty"` // CPU Shares 0..10000 on Windows; where 0 will be omitted and HCS will default.
88 88
 	HostName                string      // Hostname
89 89
 	MappedDirectories       []mappedDir // List of mapped directories (volumes/mounts)
90 90
 	SandboxPath             string      // Location of unmounted sandbox (used for Hyper-V containers, not Windows Server containers)
... ...
@@ -43,7 +43,7 @@ const (
43 43
 //
44 44
 // Hard Conflict:
45 45
 // 	- a pull or build using the image.
46
-// 	- any descendent image.
46
+// 	- any descendant image.
47 47
 // 	- any running container using the image.
48 48
 //
49 49
 // Soft Conflict:
... ...
@@ -313,7 +313,7 @@ func (daemon *Daemon) imageDeleteHelper(imgID image.ID, records *[]types.ImageDe
313 313
 // image or any stopped container using the image. If ignoreSoftConflicts is
314 314
 // true, this function will not check for soft conflict conditions.
315 315
 func (daemon *Daemon) checkImageDeleteConflict(imgID image.ID, mask conflictType) *imageDeleteConflict {
316
-	// Check if the image has any descendent images.
316
+	// Check if the image has any descendant images.
317 317
 	if mask&conflictDependentChild != 0 && len(daemon.imageStore.Children(imgID)) > 0 {
318 318
 		return &imageDeleteConflict{
319 319
 			hard:    true,
... ...
@@ -379,7 +379,7 @@ func (pd *v2PushDescriptor) Upload(ctx context.Context, progressOutput progress.
379 379
 
380 380
 	pd.pushState.Lock()
381 381
 
382
-	// If Commit succeded, that's an indication that the remote registry
382
+	// If Commit succeeded, that's an indication that the remote registry
383 383
 	// speaks the v2 protocol.
384 384
 	pd.pushState.confirmedV2 = true
385 385
 
... ...
@@ -105,7 +105,7 @@ Some container-related events are not affected by container state, so they are n
105 105
 
106 106
 Running `docker rmi` emits an **untag** event when removing an image name.  The `rmi` command may also emit **delete** events when images are deleted by ID directly or by deleting the last tag referring to the image.
107 107
 
108
-> **Acknowledgement**: This diagram and the accompanying text were used with the permission of Matt Good and Gilder Labs. See Matt's original blog post [Docker Events Explained](https://gliderlabs.com/blog/2015/04/14/docker-events-explained/).
108
+> **Acknowledgment**: This diagram and the accompanying text were used with the permission of Matt Good and Gilder Labs. See Matt's original blog post [Docker Events Explained](https://gliderlabs.com/blog/2015/04/14/docker-events-explained/).
109 109
 
110 110
 ## Version history
111 111
 
... ...
@@ -516,7 +516,7 @@ feature](../userguide/networking/index.md)).
516 516
     ENV <key>=<value> ...
517 517
 
518 518
 The `ENV` instruction sets the environment variable `<key>` to the value
519
-`<value>`. This value will be in the environment of all "descendent"
519
+`<value>`. This value will be in the environment of all "descendant"
520 520
 `Dockerfile` commands and can be [replaced inline](#environment-replacement) in
521 521
 many as well.
522 522
 
... ...
@@ -646,7 +646,7 @@ guide](../userguide/eng-image/dockerfile_best-practices.md#build-cache) for more
646 646
 
647 647
   > **Note**:
648 648
   > Whether a file is identified as a recognized compression format or not
649
-  > is done soley based on the contents of the file, not the name of the file.
649
+  > is done solely based on the contents of the file, not the name of the file.
650 650
   > For example, if an empty file happens to end with `.tar.gz` this will not
651 651
   > be recognized as a compressed file and **will not** generate any kind of
652 652
   > decompression error message, rather the file will simply be copied to the
... ...
@@ -802,7 +802,7 @@ cgroup.
802 802
 
803 803
 Assuming the daemon is running in cgroup `daemoncgroup`,
804 804
 `--cgroup-parent=/foobar` creates a cgroup in
805
-`/sys/fs/cgroup/memory/foobar`, wheras using `--cgroup-parent=foobar`
805
+`/sys/fs/cgroup/memory/foobar`, whereas using `--cgroup-parent=foobar`
806 806
 creates the cgroup in `/sys/fs/cgroup/memory/daemoncgroup/foobar`
807 807
 
808 808
 This setting can also be set per container, using the `--cgroup-parent`
... ...
@@ -40,7 +40,7 @@ You can specify the IP address you want to be assigned to the container's interf
40 40
 $ docker network connect --ip 10.10.36.122 multi-host-network container2
41 41
 ```
42 42
 
43
-You can use `--link` option to link another container with a prefered alias
43
+You can use `--link` option to link another container with a preferred alias
44 44
 
45 45
 ```bash
46 46
 $ docker network connect --link container1:c1 multi-host-network container2
... ...
@@ -110,7 +110,7 @@ For information on connecting a container to a network, see the ["*Docker networ
110 110
 
111 111
 ## Examples
112 112
 
113
-### Assign name and allocate psuedo-TTY (--name, -it)
113
+### Assign name and allocate pseudo-TTY (--name, -it)
114 114
 
115 115
     $ docker run --name test -it debian
116 116
     root@d6c0fe130dba:/# exit 13
... ...
@@ -455,7 +455,7 @@ step-by-step. You can see that each step creates a new container, runs
455 455
 the instruction inside that container and then commits that change -
456 456
 just like the `docker commit` work flow you saw earlier. When all the
457 457
 instructions have executed you're left with the `97feabe5d2ed` image
458
-(also helpfully tagged as `ouruser/sinatra:v2`) and all intermediate
458
+(also helpfuly tagged as `ouruser/sinatra:v2`) and all intermediate
459 459
 containers will get removed to clean things up.
460 460
 
461 461
 > **Note:**
... ...
@@ -412,7 +412,7 @@ Please note that while creating container4, we linked to a container named `cont
412 412
 which is not created yet. That is one of the differences in behavior between the
413 413
 `legacy link` in default `bridge` network and the new `link` functionality in user defined
414 414
 networks. The `legacy link` is static in nature and it hard-binds the container with the
415
-alias and it doesnt tolerate linked container restarts. While the new `link` functionality
415
+alias and it doesn't tolerate linked container restarts. While the new `link` functionality
416 416
 in user defined networks are dynamic in nature and supports linked container restarts
417 417
 including tolerating ip-address changes on the linked container.
418 418
 
... ...
@@ -25,7 +25,7 @@ Docker relies on driver technology to manage the storage and interactions associ
25 25
 
26 26
 If you are new to Docker containers make sure you read ["Understand images, containers, and storage drivers"](imagesandcontainers.md) first. It explains key concepts and technologies that can help you when working with storage drivers.
27 27
 
28
-### Acknowledgement
28
+### Acknowledgment
29 29
 
30 30
 The Docker storage driver material was created in large part by our guest author
31 31
 Nigel Poulton with a bit of help from Docker's own Jérôme Petazzoni. In his
... ...
@@ -111,7 +111,7 @@ directories.
111 111
     drwxr-xr-x 4 root root 4096 Oct 28 11:06 upper
112 112
     drwx------ 3 root root 4096 Oct 28 11:06 work
113 113
 
114
-These four filesystem objects are all artefacts of OverlayFS. The "lower-id" 
114
+These four filesystem objects are all artifacts of OverlayFS. The "lower-id" 
115 115
 file contains the ID of the top layer of the image the container is based on. 
116 116
 This is used by OverlayFS as the "lowerdir".
117 117
 
... ...
@@ -2,7 +2,7 @@
2 2
 set -e
3 3
 
4 4
 # This script updates the apt repo in $DOCKER_RELEASE_DIR/apt/repo.
5
-# This script is a "fix all" for any sort of problems that might have occured with
5
+# This script is a "fix all" for any sort of problems that might have occurred with
6 6
 # the Release or Package files in the repo.
7 7
 # It should only be used in the rare case of extreme emergencies to regenerate
8 8
 # Release and Package files for the apt repo.
... ...
@@ -176,7 +176,7 @@ Here is an example image JSON file:
176 176
         should be omitted. A collection of images may share many of the same
177 177
         ancestor layers. This organizational structure is strictly a tree with
178 178
         any one layer having either no parent or a single parent and zero or
179
-        more descendent layers. Cycles are not allowed and implementations
179
+        more descendant layers. Cycles are not allowed and implementations
180 180
         should be careful to avoid creating them or iterating through a cycle
181 181
         indefinitely.
182 182
     </dd>
... ...
@@ -227,7 +227,7 @@ func (s *DockerAuthzSuite) TestAuthZPluginDenyResponse(c *check.C) {
227 227
 	c.Assert(res, check.Equals, fmt.Sprintf("Error response from daemon: authorization denied by plugin %s: %s\n", testAuthZPlugin, unauthorizedMessage))
228 228
 }
229 229
 
230
-// TestAuthZPluginAllowEventStream verifies event stream propogates correctly after request pass through by the authorization plugin
230
+// TestAuthZPluginAllowEventStream verifies event stream propagates correctly after request pass through by the authorization plugin
231 231
 func (s *DockerAuthzSuite) TestAuthZPluginAllowEventStream(c *check.C) {
232 232
 	testRequires(c, DaemonIsLinux)
233 233
 
... ...
@@ -20,7 +20,7 @@ func (s *DockerSuite) TestEventsTimestampFormats(c *check.C) {
20 20
 	image := "busybox"
21 21
 
22 22
 	// Start stopwatch, generate an event
23
-	time.Sleep(1 * time.Second) // so that we don't grab events from previous test occured in the same second
23
+	time.Sleep(1 * time.Second) // so that we don't grab events from previous test occurred in the same second
24 24
 	start := daemonTime(c)
25 25
 	dockerCmd(c, "tag", image, "timestamptest:1")
26 26
 	dockerCmd(c, "rmi", "timestamptest:1")
... ...
@@ -248,7 +248,7 @@ func isNwPresent(c *check.C, name string) bool {
248 248
 	return false
249 249
 }
250 250
 
251
-// assertNwList checks network list retrived with ls command
251
+// assertNwList checks network list retrieved with ls command
252 252
 // equals to expected network list
253 253
 // note: out should be `network ls [option]` result
254 254
 func assertNwList(c *check.C, out string, expectNws []string) {
... ...
@@ -1232,7 +1232,7 @@ func (s *DockerSuite) TestUserDefinedNetworkConnectDisconnectLink(c *check.C) {
1232 1232
 	c.Assert(waitRun("first"), check.IsNil)
1233 1233
 
1234 1234
 	// run a container in a user-defined network with a link for an existing container
1235
-	// and a link for a container that doesnt exist
1235
+	// and a link for a container that doesn't exist
1236 1236
 	dockerCmd(c, "run", "-d", "--net=foo1", "--name=second", "--link=first:FirstInFoo1",
1237 1237
 		"--link=third:bar", "busybox", "top")
1238 1238
 	c.Assert(waitRun("second"), check.IsNil)
... ...
@@ -206,7 +206,7 @@ func (s *DockerSuite) TestUserDefinedNetworkLinks(c *check.C) {
206 206
 	c.Assert(waitRun("first"), check.IsNil)
207 207
 
208 208
 	// run a container in user-defined network udlinkNet with a link for an existing container
209
-	// and a link for a container that doesnt exist
209
+	// and a link for a container that doesn't exist
210 210
 	dockerCmd(c, "run", "-d", "--net=udlinkNet", "--name=second", "--link=first:foo",
211 211
 		"--link=third:bar", "busybox", "top")
212 212
 	c.Assert(waitRun("second"), check.IsNil)
... ...
@@ -32,7 +32,7 @@ func TestFileSpecPlugin(t *testing.T) {
32 32
 		addr string
33 33
 		fail bool
34 34
 	}{
35
-		// TODO Windows: Factor out the unix:// varients.
35
+		// TODO Windows: Factor out the unix:// variants.
36 36
 		{filepath.Join(tmpdir, "echo.spec"), "echo", "unix://var/lib/docker/plugins/echo.sock", false},
37 37
 		{filepath.Join(tmpdir, "echo", "echo.spec"), "echo", "unix://var/lib/docker/plugins/echo.sock", false},
38 38
 		{filepath.Join(tmpdir, "foo.spec"), "foo", "tcp://localhost:8080", false},
... ...
@@ -223,7 +223,7 @@ with matching paths, and orders the list of file sums accordingly [3].
223 223
 * [2] Tar http://en.wikipedia.org/wiki/Tar_%28computing%29
224 224
 * [3] Name collision https://github.com/docker/docker/commit/c5e6362c53cbbc09ddbabd5a7323e04438b57d31
225 225
 
226
-## Acknowledgements
226
+## Acknowledgments
227 227
 
228 228
 Joffrey F (shin-) and Guillaume J. Charmes (creack) on the initial work of the
229 229
 TarSum calculation.
... ...
@@ -42,7 +42,7 @@ The gordon-bot repository is maintained at
42 42
 ### NSQ
43 43
 
44 44
 We use [NSQ](https://github.com/bitly/nsq) for various aspects of the project
45
-infrastucture.
45
+infrastructure.
46 46
 
47 47
 #### Hooks
48 48
 
... ...
@@ -43,7 +43,7 @@ type volumeDriver interface {
43 43
 	Unmount(name string) (err error)
44 44
 	// List lists all the volumes known to the driver
45 45
 	List() (volumes list, err error)
46
-	// Get retreives the volume with the requested name
46
+	// Get retrieves the volume with the requested name
47 47
 	Get(name string) (volume *proxyVolume, err error)
48 48
 }
49 49
 
... ...
@@ -168,7 +168,7 @@ func (s *VolumeStore) Create(name, driverName string, opts map[string]string) (v
168 168
 // create asks the given driver to create a volume with the name/opts.
169 169
 // If a volume with the name is already known, it will ask the stored driver for the volume.
170 170
 // If the passed in driver name does not match the driver name which is stored for the given volume name, an error is returned.
171
-// It is expected that callers of this function hold any neccessary locks.
171
+// It is expected that callers of this function hold any necessary locks.
172 172
 func (s *VolumeStore) create(name, driverName string, opts map[string]string) (volume.Volume, error) {
173 173
 	// Validate the name in a platform-specific manner
174 174
 	valid, err := volume.IsVolumeNameValid(name)
... ...
@@ -197,7 +197,7 @@ func (s *VolumeStore) create(name, driverName string, opts map[string]string) (v
197 197
 
198 198
 // GetWithRef gets a volume with the given name from the passed in driver and stores the ref
199 199
 // This is just like Get(), but we store the reference while holding the lock.
200
-// This makes sure there are no races between checking for the existance of a volume and adding a reference for it
200
+// This makes sure there are no races between checking for the existence of a volume and adding a reference for it
201 201
 func (s *VolumeStore) GetWithRef(name, driverName, ref string) (volume.Volume, error) {
202 202
 	name = normaliseVolumeName(name)
203 203
 	s.locks.Lock(name)
... ...
@@ -233,7 +233,7 @@ func (s *VolumeStore) Get(name string) (volume.Volume, error) {
233 233
 
234 234
 // get requests the volume, if the driver info is stored it just access that driver,
235 235
 // if the driver is unknown it probes all drivers until it finds the first volume with that name.
236
-// it is expected that callers of this function hold any neccessary locks
236
+// it is expected that callers of this function hold any necessary locks
237 237
 func (s *VolumeStore) getVolume(name string) (volume.Volume, error) {
238 238
 	logrus.Debugf("Getting volume reference for name: %s", name)
239 239
 	if v, exists := s.names[name]; exists {
... ...
@@ -24,7 +24,7 @@ type Driver interface {
24 24
 	Remove(vol Volume) (err error)
25 25
 	// List lists all the volumes the driver has
26 26
 	List() ([]Volume, error)
27
-	// Get retreives the volume with the requested name
27
+	// Get retrieves the volume with the requested name
28 28
 	Get(name string) (Volume, error)
29 29
 }
30 30