trivial: typo cleanup

Signed-off-by: David Mackey <tdmackey@booleanhaiku.com>
This commit is contained in:
David Mackey 2015-04-27 13:33:30 -07:00
parent 2f513db31d
commit 3941623fbc
29 changed files with 39 additions and 39 deletions

View File

@ -483,7 +483,7 @@ func (b *Builder) processImageFrom(img *imagepkg.Image) error {
fmt.Fprintf(b.ErrStream, "# Executing %d build triggers\n", nTriggers)
}
// Copy the ONBUILD triggers, and remove them from the config, since the config will be commited.
// Copy the ONBUILD triggers, and remove them from the config, since the config will be committed.
onBuildTriggers := b.Config.OnBuild
b.Config.OnBuild = []string{}

View File

@ -125,7 +125,7 @@ func main() {
err = devices.ResizePool(size)
if err != nil {
fmt.Println("Error resizeing pool: ", err)
fmt.Println("Error resizing pool: ", err)
os.Exit(1)
}

View File

@ -823,7 +823,7 @@ func NewDaemonFromDirectory(config *Config, eng *engine.Engine, registryService
// Load storage driver
driver, err := graphdriver.New(config.Root, config.GraphOptions)
if err != nil {
return nil, fmt.Errorf("error intializing graphdriver: %v", err)
return nil, fmt.Errorf("error initializing graphdriver: %v", err)
}
logrus.Debugf("Using graph driver %s", driver)
// register cleanup for graph driver

View File

@ -601,7 +601,7 @@ func TestRegisterBadTwice(t *testing.T) {
Mask: []byte{255, 255, 255, 248},
}
if err := a.RegisterSubnet(network, subnet); err != ErrNetworkAlreadyRegistered {
t.Fatalf("Expecteded ErrNetworkAlreadyRegistered error, got %v", err)
t.Fatalf("Expected ErrNetworkAlreadyRegistered error, got %v", err)
}
}

View File

@ -182,7 +182,7 @@ func TestInputAddEmpty(t *testing.T) {
t.Fatal(err)
}
if len(data) > 0 {
t.Fatalf("Read from empty input shoul yield no data")
t.Fatalf("Read from empty input should yield no data")
}
}

View File

@ -643,7 +643,7 @@ func (s *DockerSuite) TestContainerApiCommit(c *check.C) {
// sanity check, make sure the image is what we think it is
out, err = exec.Command(dockerBinary, "run", img.Id, "ls", "/test").CombinedOutput()
if err != nil {
c.Fatalf("error checking commited image: %v - %q", err, string(out))
c.Fatalf("error checking committed image: %v - %q", err, string(out))
}
}

View File

@ -161,7 +161,7 @@ func (s *DockerSuite) TestAttachDisconnect(c *check.C) {
c.Fatal(err)
}
if strings.TrimSpace(out) != "hello" {
c.Fatalf("exepected 'hello', got %q", out)
c.Fatalf("expected 'hello', got %q", out)
}
if err := stdin.Close(); err != nil {
@ -174,7 +174,7 @@ func (s *DockerSuite) TestAttachDisconnect(c *check.C) {
c.Fatal(err)
}
if running != "true" {
c.Fatal("exepected container to still be running")
c.Fatal("expected container to still be running")
}
}

View File

@ -172,7 +172,7 @@ func (s *DockerSuite) TestAttachDetach(c *check.C) {
c.Fatal(err)
}
if strings.TrimSpace(out) != "hello" {
c.Fatalf("exepected 'hello', got %q", out)
c.Fatalf("expected 'hello', got %q", out)
}
// escape sequence
@ -195,7 +195,7 @@ func (s *DockerSuite) TestAttachDetach(c *check.C) {
c.Fatal(err)
}
if running != "true" {
c.Fatal("exepected container to still be running")
c.Fatal("expected container to still be running")
}
go func() {
@ -243,7 +243,7 @@ func (s *DockerSuite) TestAttachDetachTruncatedID(c *check.C) {
c.Fatal(err)
}
if strings.TrimSpace(out) != "hello" {
c.Fatalf("exepected 'hello', got %q", out)
c.Fatalf("expected 'hello', got %q", out)
}
// escape sequence
@ -266,7 +266,7 @@ func (s *DockerSuite) TestAttachDetachTruncatedID(c *check.C) {
c.Fatal(err)
}
if running != "true" {
c.Fatal("exepected container to still be running")
c.Fatal("expected container to still be running")
}
go func() {

View File

@ -3408,7 +3408,7 @@ func (s *DockerSuite) TestBuildVerifyIntString(c *check.C) {
out, rc, err := runCommandWithOutput(exec.Command(dockerBinary, "inspect", name))
if rc != 0 || err != nil {
c.Fatalf("Unexcepted error from inspect: rc: %v err: %v", rc, err)
c.Fatalf("Unexpected error from inspect: rc: %v err: %v", rc, err)
}
if !strings.Contains(out, "\"123\"") {
@ -5033,7 +5033,7 @@ RUN echo " \
expecting := "\n foo \n"
if !strings.Contains(out, expecting) {
c.Fatalf("Bad output: %q expecting to contian %q", out, expecting)
c.Fatalf("Bad output: %q expecting to contain %q", out, expecting)
}
}

View File

@ -262,7 +262,7 @@ func (s *DockerSuite) TestCommitMergeConfigRun(c *check.C) {
out, _ = dockerCmd(c, "run", "--name", name, "commit-test")
if strings.TrimSpace(out) != "testing" {
c.Fatal("run config in commited container was not merged")
c.Fatal("run config in committed container was not merged")
}
type cfg struct {

View File

@ -860,7 +860,7 @@ func (s *DockerSuite) TestDaemonwithwrongkey(c *check.C) {
if err := d1.Start(); err == nil {
d1.Stop()
c.Fatalf("It should not be succssful to start daemon with wrong key: %v", err)
c.Fatalf("It should not be successful to start daemon with wrong key: %v", err)
}
content, _ := ioutil.ReadFile(d1.logFile.Name())

View File

@ -547,7 +547,7 @@ func (s *DockerSuite) TestPsListContainersFilterExited(c *check.C) {
}
ids = strings.Split(strings.TrimSpace(out), "\n")
if len(ids) != 2 {
c.Fatalf("Should be 2 zero exited containerst got %d", len(ids))
c.Fatalf("Should be 2 zero exited containers got %d", len(ids))
}
if ids[0] != secondNonZero {
c.Fatalf("First in list should be %q, got %q", secondNonZero, ids[0])

View File

@ -41,7 +41,7 @@ func (s *DockerRegistrySuite) TestPushUntagged(c *check.C) {
expected := "Repository does not exist"
pushCmd := exec.Command(dockerBinary, "push", repoName)
if out, _, err := runCommandWithOutput(pushCmd); err == nil {
c.Fatalf("pushing the image to the private registry should have failed: outuput %q", out)
c.Fatalf("pushing the image to the private registry should have failed: output %q", out)
} else if !strings.Contains(out, expected) {
c.Fatalf("pushing the image failed with an unexpected message: expected %q, got %q", expected, out)
}
@ -53,7 +53,7 @@ func (s *DockerRegistrySuite) TestPushBadTag(c *check.C) {
expected := "does not exist"
pushCmd := exec.Command(dockerBinary, "push", repoName)
if out, _, err := runCommandWithOutput(pushCmd); err == nil {
c.Fatalf("pushing the image to the private registry should have failed: outuput %q", out)
c.Fatalf("pushing the image to the private registry should have failed: output %q", out)
} else if !strings.Contains(out, expected) {
c.Fatalf("pushing the image failed with an unexpected message: expected %q, got %q", expected, out)
}

View File

@ -108,7 +108,7 @@ func (s *DockerSuite) TestRmiImgIDForce(c *check.C) {
runCmd = exec.Command(dockerBinary, "rmi", imgID)
out, _, err = runCommandWithOutput(runCmd)
if err == nil || !strings.Contains(out, fmt.Sprintf("Conflict, cannot delete image %s because it is tagged in multiple repositories, use -f to force", imgID)) {
c.Fatalf("rmi tagged in mutiple repos should have failed without force:%s, %v", out, err)
c.Fatalf("rmi tagged in multiple repos should have failed without force:%s, %v", out, err)
}
dockerCmd(c, "rmi", "-f", imgID)

View File

@ -329,7 +329,7 @@ func (s *DockerSuite) TestRunLinksContainerWithContainerId(c *check.C) {
cmd = exec.Command(dockerBinary, "inspect", "-f", "{{.NetworkSettings.IPAddress}}", cID)
ip, _, _, err := runCommandWithStdoutStderr(cmd)
if err != nil {
c.Fatalf("faild to inspect container: %v, output: %q", err, ip)
c.Fatalf("failed to inspect container: %v, output: %q", err, ip)
}
ip = strings.TrimSpace(ip)
cmd = exec.Command(dockerBinary, "run", "--link", cID+":test", "busybox", "/bin/cat", "/etc/hosts")
@ -2067,7 +2067,7 @@ func (s *DockerSuite) TestRunCidFileCleanupIfEmpty(c *check.C) {
if err == nil {
c.Fatalf("Run without command must fail. out=%s", out)
} else if !strings.Contains(out, "No command specified") {
c.Fatalf("Run without command failed with wrong outpuc. out=%s\nerr=%v", out, err)
c.Fatalf("Run without command failed with wrong output. out=%s\nerr=%v", out, err)
}
if _, err := os.Stat(tmpCidFile); err == nil {

View File

@ -213,7 +213,7 @@ func (s *DockerSuite) TestRunAttachDetach(c *check.C) {
c.Fatal(err)
}
if strings.TrimSpace(out) != "hello" {
c.Fatalf("exepected 'hello', got %q", out)
c.Fatalf("expected 'hello', got %q", out)
}
// escape sequence
@ -236,7 +236,7 @@ func (s *DockerSuite) TestRunAttachDetach(c *check.C) {
c.Fatal(err)
}
if running != "true" {
c.Fatal("exepected container to still be running")
c.Fatal("expected container to still be running")
}
go func() {

View File

@ -333,7 +333,7 @@ func (s *DockerSuite) TestSaveRepoWithMultipleImages(c *check.C) {
sort.Strings(actual)
sort.Strings(expected)
if !reflect.DeepEqual(expected, actual) {
c.Fatalf("achive does not contains the right layers: got %v, expected %v", actual, expected)
c.Fatalf("archive does not contains the right layers: got %v, expected %v", actual, expected)
}
}

View File

@ -205,7 +205,7 @@ func (s *DockerSuite) TestStartMultipleContainers(c *check.C) {
c.Fatal("Container should be stopped")
}
// start all the three containers, container `child_first` start first which should be faild
// start all the three containers, container `child_first` start first which should be failed
// container 'parent' start second and then start container 'child_second'
cmd = exec.Command(dockerBinary, "start", "child_first", "parent", "child_second")
out, _, err = runCommandWithOutput(cmd)

View File

@ -434,7 +434,7 @@ func TestGetEnabledCors(t *testing.T) {
t.Errorf("Expected header Access-Control-Allow-Headers to be \"Origin, X-Requested-With, Content-Type, Accept, X-Registry-Auth\", %s found.", allowHeaders)
}
if allowMethods != "GET, POST, DELETE, PUT, OPTIONS" {
t.Errorf("Expected hearder Access-Control-Allow-Methods to be \"GET, POST, DELETE, PUT, OPTIONS\", %s found.", allowMethods)
t.Errorf("Expected header Access-Control-Allow-Methods to be \"GET, POST, DELETE, PUT, OPTIONS\", %s found.", allowMethods)
}
}
@ -648,7 +648,7 @@ func TestConstainersStartChunkedEncodingHostConfig(t *testing.T) {
}
if c.HostConfig.Binds[0] != "/tmp:/foo" {
t.Fatal("Chunked encoding not properly handled, execpted binds to be /tmp:/foo, got:", c.HostConfig.Binds[0])
t.Fatal("Chunked encoding not properly handled, expected binds to be /tmp:/foo, got:", c.HostConfig.Binds[0])
}
}

View File

@ -213,7 +213,7 @@ func BenchmarkRunParallel(b *testing.B) {
return
}
// if string(output) != "foo" {
// complete <- fmt.Errorf("Unexecpted output: %v", string(output))
// complete <- fmt.Errorf("Unexpected output: %v", string(output))
// }
if err := daemon.Rm(container); err != nil {
complete <- err

View File

@ -837,7 +837,7 @@ func TestDestroyWithInitLayer(t *testing.T) {
// Make sure that the container does not exist in the driver
if _, err := driver.Get(container.ID, ""); err == nil {
t.Fatal("Conttainer should not exist in the driver")
t.Fatal("Container should not exist in the driver")
}
// Make sure that the init layer is removed from the driver

View File

@ -41,7 +41,7 @@ func waitContainerStart(t *testing.T, timeout time.Duration) *daemon.Container {
})
if container == nil {
t.Fatal("An error occured while waiting for the container to start")
t.Fatal("An error occurred while waiting for the container to start")
}
return container

View File

@ -20,7 +20,7 @@ func TestCanonicalTarNameForPath(t *testing.T) {
if out, err := CanonicalTarNameForPath(v.in); err != nil && !v.shouldFail {
t.Fatalf("cannot get canonical name for path: %s: %v", v.in, err)
} else if v.shouldFail && err == nil {
t.Fatalf("canonical path call should have pailed with error. in=%s out=%s", v.in, out)
t.Fatalf("canonical path call should have failed with error. in=%s out=%s", v.in, out)
} else if !v.shouldFail && out != v.expected {
t.Fatalf("wrong canonical tar name. expected:%s got:%s", v.expected, out)
}

View File

@ -52,7 +52,7 @@ func TestGetRootEntity(t *testing.T) {
t.Fatal("Entity should not be nil")
}
if e.ID() != "0" {
t.Fatalf("Enity id should be 0, got %s", e.ID())
t.Fatalf("Entity id should be 0, got %s", e.ID())
}
}
@ -74,7 +74,7 @@ func TestSetDuplicateEntity(t *testing.T) {
t.Fatal(err)
}
if _, err := db.Set("/foo", "43"); err == nil {
t.Fatalf("Creating an entry with a duplciate path did not cause an error")
t.Fatalf("Creating an entry with a duplicate path did not cause an error")
}
}

View File

@ -18,7 +18,7 @@ func helpsTestParseInt16OrDefault(t *testing.T, expectedValue int16, shouldFail
t.Errorf(format, args)
}
if expectedValue != value {
t.Errorf("The value returned does not macth expected\n\tExpected:%v\n\t:Actual%v", expectedValue, value)
t.Errorf("The value returned does not match expected\n\tExpected:%v\n\t:Actual%v", expectedValue, value)
t.Errorf(format, args)
}
}

View File

@ -736,7 +736,7 @@ func TestSearchRepositories(t *testing.T) {
}
assertEqual(t, results.NumResults, 1, "Expected 1 search results")
assertEqual(t, results.Query, "fakequery", "Expected 'fakequery' as query")
assertEqual(t, results.Results[0].StarCount, 42, "Expected 'fakeimage' a ot hae 42 stars")
assertEqual(t, results.Results[0].StarCount, 42, "Expected 'fakeimage' to have 42 stars")
}
func TestValidRemoteName(t *testing.T) {

View File

@ -104,7 +104,7 @@ func TestParseRunVolumes(t *testing.T) {
if config, hostConfig := mustParse(t, "-v /tmp -v /var"); hostConfig.Binds != nil {
t.Fatalf("Error parsing volume flags, `-v /tmp -v /var` should not mount-bind anything. Received %v", hostConfig.Binds)
} else if _, exists := config.Volumes["/tmp"]; !exists {
t.Fatalf("Error parsing volume flags, `-v /tmp` is missing from volumes. Recevied %v", config.Volumes)
t.Fatalf("Error parsing volume flags, `-v /tmp` is missing from volumes. Received %v", config.Volumes)
} else if _, exists := config.Volumes["/var"]; !exists {
t.Fatalf("Error parsing volume flags, `-v /var` is missing from volumes. Received %v", config.Volumes)
}

View File

@ -41,7 +41,7 @@ func Merge(userConf, imageConf *Config) error {
}
if len(imageConf.PortSpecs) > 0 {
// FIXME: I think we can safely remove this. Leaving it for now for the sake of reverse-compat paranoia.
logrus.Debugf("Migrating image port specs to containter: %s", strings.Join(imageConf.PortSpecs, ", "))
logrus.Debugf("Migrating image port specs to container: %s", strings.Join(imageConf.PortSpecs, ", "))
if userConf.ExposedPorts == nil {
userConf.ExposedPorts = make(nat.PortSet)
}

View File

@ -58,7 +58,7 @@ func (r *Repository) newVolume(path string, writable bool) (*Volume, error) {
path = filepath.Clean(path)
// Ignore the error here since the path may not exist
// Really just want to make sure the path we are using is real(or non-existant)
// Really just want to make sure the path we are using is real(or nonexistent)
if cleanPath, err := filepath.EvalSymlinks(path); err == nil {
path = cleanPath
}