Browse code

duplicated the

Signed-off-by: Jie Luo <luo612@zju.edu.cn>

typo

Signed-off-by: Jie Luo <luo612@zju.edu.cn>

fix some typos

Signed-off-by: Jie Luo <luo612@zju.edu.cn>

Jie Luo authored on 2016/12/21 12:03:39
Showing 9 changed files
... ...
@@ -3907,7 +3907,7 @@ paths:
3907 3907
           default: false
3908 3908
         - name: "stream"
3909 3909
           in: "query"
3910
-          description: "Stream attached streams from the the time the request was made onwards"
3910
+          description: "Stream attached streams from the time the request was made onwards"
3911 3911
           type: "boolean"
3912 3912
           default: false
3913 3913
         - name: "stdin"
... ...
@@ -12,7 +12,7 @@ import (
12 12
 )
13 13
 
14 14
 func init() {
15
-	// Reduce the size the the base fs and loopback for the tests
15
+	// Reduce the size of the base fs and loopback for the tests
16 16
 	defaultDataLoopbackSize = 300 * 1024 * 1024
17 17
 	defaultMetaDataLoopbackSize = 200 * 1024 * 1024
18 18
 	defaultBaseFsSize = 300 * 1024 * 1024
... ...
@@ -216,7 +216,7 @@ ip a show eth0
216 216
     inet 192.168.1.250/24 brd 192.168.1.255 scope global eth0
217 217
 ```
218 218
 
219
--A traditional gateway doesn't mean much to an L3 mode Ipvlan interface since there is no broadcast traffic allowed. Because of that, the container default gateway simply point the the containers `eth0` device. See below for CLI output of `ip route` or `ip -6 route` from inside an L3 container for details.
219
+-A traditional gateway doesn't mean much to an L3 mode Ipvlan interface since there is no broadcast traffic allowed. Because of that, the container default gateway simply points to the containers `eth0` device. See below for CLI output of `ip route` or `ip -6 route` from inside an L3 container for details.
220 220
 
221 221
 The mode ` -o ipvlan_mode=l3` must be explicitly specified since the default ipvlan mode is `l2`.
222 222
 
... ...
@@ -627,7 +627,7 @@ func (d *Daemon) SockRequestRaw(method, endpoint string, data io.Reader, ct stri
627 627
 	return SockRequestRawToDaemon(method, endpoint, data, ct, d.Sock())
628 628
 }
629 629
 
630
-// LogFileName returns the path the the daemon's log file
630
+// LogFileName returns the path the daemon's log file
631 631
 func (d *Daemon) LogFileName() string {
632 632
 	return d.logFile.Name()
633 633
 }
... ...
@@ -69,7 +69,7 @@ func (s *DockerSuite) TestExecTTY(c *check.C) {
69 69
 	c.Assert(bytes.Contains(buf, []byte("hello")), checker.Equals, true, check.Commentf(string(buf[:read])))
70 70
 }
71 71
 
72
-// Test the the TERM env var is set when -t is provided on exec
72
+// Test the TERM env var is set when -t is provided on exec
73 73
 func (s *DockerSuite) TestExecWithTERM(c *check.C) {
74 74
 	testRequires(c, DaemonIsLinux, SameHostDaemon)
75 75
 	out, _ := dockerCmd(c, "run", "-id", "busybox", "/bin/cat")
... ...
@@ -110,7 +110,7 @@ func (s *DockerHubPullSuite) TestPullNonExistingImage(c *check.C) {
110 110
 }
111 111
 
112 112
 // TestPullFromCentralRegistryImplicitRefParts pulls an image from the central registry and verifies
113
-// that pulling the same image with different combinations of implicit elements of the the image
113
+// that pulling the same image with different combinations of implicit elements of the image
114 114
 // reference (tag, repository, central registry url, ...) doesn't trigger a new pull nor leads to
115 115
 // multiple images.
116 116
 func (s *DockerHubPullSuite) TestPullFromCentralRegistryImplicitRefParts(c *check.C) {
... ...
@@ -24,7 +24,7 @@ func TestDownload(t *testing.T) {
24 24
 	response.Body.Close()
25 25
 
26 26
 	if err != nil || string(actual) != expected {
27
-		t.Fatalf("Expected the response %q, got err:%v, response:%v, actual:%s", expected, err, response, string(actual))
27
+		t.Fatalf("Expected the response %q, got err:%q, response:%q, actual:%q", expected, err, response, string(actual))
28 28
 	}
29 29
 }
30 30
 
... ...
@@ -37,13 +37,13 @@ func TestDownload400Errors(t *testing.T) {
37 37
 	defer ts.Close()
38 38
 	// Expected status code = 403
39 39
 	if _, err := Download(ts.URL); err == nil || err.Error() != expectedError {
40
-		t.Fatalf("Expected the the error %q, got %v", expectedError, err)
40
+		t.Fatalf("Expected the error %q, got %q", expectedError, err)
41 41
 	}
42 42
 }
43 43
 
44 44
 func TestDownloadOtherErrors(t *testing.T) {
45 45
 	if _, err := Download("I'm not an url.."); err == nil || !strings.Contains(err.Error(), "unsupported protocol scheme") {
46
-		t.Fatalf("Expected an error with 'unsupported protocol scheme', got %v", err)
46
+		t.Fatalf("Expected an error with 'unsupported protocol scheme', got %q", err)
47 47
 	}
48 48
 }
49 49
 
... ...
@@ -59,7 +59,7 @@ func TestNewHTTPRequestError(t *testing.T) {
59 59
 		t.Fatal(err)
60 60
 	}
61 61
 	if err := NewHTTPRequestError(errorMessage, httpResponse); err.Error() != errorMessage {
62
-		t.Fatalf("Expected err to be %q, got %v", errorMessage, err)
62
+		t.Fatalf("Expected err to be %q, got %q", errorMessage, err)
63 63
 	}
64 64
 }
65 65
 
... ...
@@ -59,7 +59,7 @@ function (or before doing anything with the underlying state), this ensures any
59 59
 other function that is dealing with the same name will block.
60 60
 
61 61
 When needing to modify the underlying data, use the global lock to ensure nothing
62
-else is modfying it at the same time.
62
+else is modifying it at the same time.
63 63
 Since name lock is already in place, no reads will occur while the modification
64 64
 is being performed.
65 65
 
... ...
@@ -30,7 +30,7 @@ Where:
30 30
 - `--type` is the name of the interface to use
31 31
 - `--name` is the subsystem that the plugin "Implements"
32 32
 - `-i` is the input file containing the interface definition
33
-- `-o` is the output file where the the generated code should go
33
+- `-o` is the output file where the generated code should go
34 34
 
35 35
 **Note**: The generated code will use the same package name as the one defined in the input file
36 36