fix current typos

Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
This commit is contained in:
Riyaz Faizullabhoy 2016-02-16 13:36:57 -08:00
parent 9010989a20
commit 5931f93134
6 changed files with 6 additions and 6 deletions

View File

@ -195,7 +195,7 @@ func TestValidateRoot(t *testing.T) {
}
//
// This call to ValidateRoot will suceed in getting to the TUF validation, since
// This call to ValidateRoot will succeed in getting to the TUF validation, since
// we are using a valid PEM encoded certificate chain of intermediate + leaf cert
// that are signed by a trusted root authority and the leaf cert has a correct CN.
// It will, however, fail to validate, because it has an invalid TUF signature

View File

@ -17,7 +17,7 @@ const (
// Types for TufChanges are namespaced by the Role they
// are relevant for. The Root and Targets roles are the
// only ones for which user action can cause a change, as
// all changes in Snapshot and Timestamp are programatically
// all changes in Snapshot and Timestamp are programmatically
// generated base on Root and Targets changes.
const (
TypeRootRole = "role"

View File

@ -572,7 +572,7 @@ func (r *NotaryRepository) Publish() error {
r.tufRepo, data.CanonicalSnapshotRole)
if err == nil {
// Only update the snapshot if we've sucessfully signed it.
// Only update the snapshot if we've successfully signed it.
updatedFiles[data.CanonicalSnapshotRole] = snapshotJSON
} else if _, ok := err.(signed.ErrNoKeys); ok {
// If signing fails due to us not having the snapshot key, then

View File

@ -29,7 +29,7 @@ however in attempting to add delegations I found I was making such
significant changes that I could not maintain backwards compatibility
without the code becoming overly convoluted.
Some features such as pluggable verifiers have alreayd been merged upstream to flynn/go-tuf
Some features such as pluggable verifiers have already been merged upstream to flynn/go-tuf
and we are in discussion with [titanous](https://github.com/titanous) about working to merge the 2 implementations.
This implementation retains the same 3 Clause BSD license present on

View File

@ -25,7 +25,7 @@ const (
const (
// N parameter was chosen to be ~100ms of work using the default implementation
// on the 2.3GHz Core i7 Haswell processor in a late-2013 Apple Retina Macbook
// on the 2.3GHz Core i7 processor in a late-2013 Apple Retina Macbook
// Pro (it takes ~113ms).
scryptN = 32768
scryptR = 8

View File

@ -484,7 +484,7 @@ func TestDeleteDelegationsRoleNotExist(t *testing.T) {
repo := initRepo(t, ed25519, keyDB)
// initRepo leaves all the roles as Dirty. Set to false
// to test removing a non-existant role doesn't mark
// to test removing a non-existent role doesn't mark
// a role as dirty
repo.Targets[data.CanonicalTargetsRole].Dirty = false