fix some typos from module contrib to man
Signed-off-by: Aaron.L.Xu <likexu@harmonycloud.cn> Upstream-commit: e0577d5fe876ec92de21c808c31e97e052654223 Component: engine
This commit is contained in:
@ -10,7 +10,7 @@ import (
|
||||
gogotypes "github.com/gogo/protobuf/types"
|
||||
)
|
||||
|
||||
func networkAttachementFromGRPC(na *swarmapi.NetworkAttachment) types.NetworkAttachment {
|
||||
func networkAttachmentFromGRPC(na *swarmapi.NetworkAttachment) types.NetworkAttachment {
|
||||
if na != nil {
|
||||
return types.NetworkAttachment{
|
||||
Network: networkFromGRPC(na.Network),
|
||||
|
||||
@ -179,7 +179,7 @@ func ServiceSpecToGRPC(s types.ServiceSpec) (swarmapi.ServiceSpec, error) {
|
||||
case types.UpdateFailureActionContinue:
|
||||
failureAction = swarmapi.UpdateConfig_CONTINUE
|
||||
default:
|
||||
return swarmapi.ServiceSpec{}, fmt.Errorf("unrecongized update failure action %s", s.UpdateConfig.FailureAction)
|
||||
return swarmapi.ServiceSpec{}, fmt.Errorf("unrecognized update failure action %s", s.UpdateConfig.FailureAction)
|
||||
}
|
||||
spec.Update = &swarmapi.UpdateConfig{
|
||||
Parallelism: s.UpdateConfig.Parallelism,
|
||||
|
||||
@ -60,7 +60,7 @@ func TaskFromGRPC(t swarmapi.Task) types.Task {
|
||||
|
||||
// NetworksAttachments
|
||||
for _, na := range t.Networks {
|
||||
task.NetworksAttachments = append(task.NetworksAttachments, networkAttachementFromGRPC(na))
|
||||
task.NetworksAttachments = append(task.NetworksAttachments, networkAttachmentFromGRPC(na))
|
||||
}
|
||||
|
||||
if t.Status.PortStatus == nil {
|
||||
|
||||
@ -22,7 +22,7 @@ func NewRefCounter(c Checker) *RefCounter {
|
||||
}
|
||||
}
|
||||
|
||||
// Increment increaes the ref count for the given id and returns the current count
|
||||
// Increment increases the ref count for the given id and returns the current count
|
||||
func (c *RefCounter) Increment(path string) int {
|
||||
c.mu.Lock()
|
||||
m := c.counts[path]
|
||||
|
||||
@ -30,7 +30,7 @@ var (
|
||||
|
||||
// ErrNotSupported returned when driver is not supported.
|
||||
ErrNotSupported = errors.New("driver not supported")
|
||||
// ErrPrerequisites retuned when driver does not meet prerequisites.
|
||||
// ErrPrerequisites returned when driver does not meet prerequisites.
|
||||
ErrPrerequisites = errors.New("prerequisites for driver not satisfied (wrong filesystem?)")
|
||||
// ErrIncompatibleFS returned when file system is not supported.
|
||||
ErrIncompatibleFS = fmt.Errorf("backing file system is unsupported for this graph driver")
|
||||
|
||||
@ -171,7 +171,7 @@ func (daemon *Daemon) Images(imageFilters filters.Args, all bool, withExtraAttrs
|
||||
}
|
||||
|
||||
if withExtraAttrs {
|
||||
// lazyly init variables
|
||||
// lazily init variables
|
||||
if imagesMap == nil {
|
||||
allContainers = daemon.List()
|
||||
allLayers = daemon.layerStore.Map()
|
||||
|
||||
@ -87,7 +87,7 @@ func initGCP() {
|
||||
// These will fail on instances if the metadata service is
|
||||
// down or the client is compiled with an API version that
|
||||
// has been removed. Since these are not vital, let's ignore
|
||||
// them and make their fields in the dockeLogEntry ,omitempty
|
||||
// them and make their fields in the dockerLogEntry ,omitempty
|
||||
projectID, _ = metadata.ProjectID()
|
||||
zone, _ = metadata.Zone()
|
||||
instanceName, _ = metadata.InstanceName()
|
||||
@ -111,7 +111,7 @@ func New(info logger.Info) (logger.Logger, error) {
|
||||
project = projectID
|
||||
}
|
||||
if project == "" {
|
||||
return nil, fmt.Errorf("No project was specified and couldn't read project from the meatadata server. Please specify a project")
|
||||
return nil, fmt.Errorf("No project was specified and couldn't read project from the metadata server. Please specify a project")
|
||||
}
|
||||
|
||||
// Issue #29344: gcplogs segfaults (static binary)
|
||||
|
||||
@ -104,7 +104,7 @@ func TestRingClose(t *testing.T) {
|
||||
t.Fatal("expected empty queue")
|
||||
}
|
||||
if m, err := r.Dequeue(); err == nil || m != nil {
|
||||
t.Fatal("exepcted err on Dequeue after close")
|
||||
t.Fatal("expected err on Dequeue after close")
|
||||
}
|
||||
|
||||
ls := r.Drain()
|
||||
|
||||
@ -74,7 +74,7 @@ func rfc5424formatterWithAppNameAsTag(p syslog.Priority, hostname, tag, content
|
||||
}
|
||||
|
||||
// The timestamp field in rfc5424 is derived from rfc3339. Whereas rfc3339 makes allowances
|
||||
// for multiple syntaxes, there are further restrictions in rfc5424, i.e., the maximium
|
||||
// for multiple syntaxes, there are further restrictions in rfc5424, i.e., the maximum
|
||||
// resolution is limited to "TIME-SECFRAC" which is 6 (microsecond resolution)
|
||||
func rfc5424microformatterWithAppNameAsTag(p syslog.Priority, hostname, tag, content string) string {
|
||||
timestamp := time.Now().Format("2006-01-02T15:04:05.999999Z07:00")
|
||||
|
||||
@ -253,7 +253,7 @@ func backportMountSpec(container *container.Container) error {
|
||||
m.Type = mounttypes.TypeVolume
|
||||
m.Spec.Type = mounttypes.TypeVolume
|
||||
|
||||
// make sure this is not an anyonmous volume before setting the spec source
|
||||
// make sure this is not an anonymous volume before setting the spec source
|
||||
if _, exists := container.Config.Volumes[target]; !exists {
|
||||
m.Spec.Source = m.Name
|
||||
}
|
||||
|
||||
@ -12,7 +12,7 @@ import (
|
||||
// setupMounts configures the mount points for a container by appending each
|
||||
// of the configured mounts on the container to the OCI mount structure
|
||||
// which will ultimately be passed into the oci runtime during container creation.
|
||||
// It also ensures each of the mounts are lexographically sorted.
|
||||
// It also ensures each of the mounts are lexicographically sorted.
|
||||
|
||||
// BUGBUG TODO Windows containerd. This would be much better if it returned
|
||||
// an array of runtime spec mounts, not container mounts. Then no need to
|
||||
|
||||
Reference in New Issue
Block a user