mirror of https://github.com/docker/docs.git
fix current typos
Signed-off-by: Riyaz Faizullabhoy <riyaz.faizullabhoy@docker.com>
This commit is contained in:
parent
9010989a20
commit
5931f93134
|
@ -195,7 +195,7 @@ func TestValidateRoot(t *testing.T) {
|
|||
}
|
||||
|
||||
//
|
||||
// This call to ValidateRoot will suceed in getting to the TUF validation, since
|
||||
// This call to ValidateRoot will succeed in getting to the TUF validation, since
|
||||
// we are using a valid PEM encoded certificate chain of intermediate + leaf cert
|
||||
// that are signed by a trusted root authority and the leaf cert has a correct CN.
|
||||
// It will, however, fail to validate, because it has an invalid TUF signature
|
||||
|
|
|
@ -17,7 +17,7 @@ const (
|
|||
// Types for TufChanges are namespaced by the Role they
|
||||
// are relevant for. The Root and Targets roles are the
|
||||
// only ones for which user action can cause a change, as
|
||||
// all changes in Snapshot and Timestamp are programatically
|
||||
// all changes in Snapshot and Timestamp are programmatically
|
||||
// generated base on Root and Targets changes.
|
||||
const (
|
||||
TypeRootRole = "role"
|
||||
|
|
|
@ -572,7 +572,7 @@ func (r *NotaryRepository) Publish() error {
|
|||
r.tufRepo, data.CanonicalSnapshotRole)
|
||||
|
||||
if err == nil {
|
||||
// Only update the snapshot if we've sucessfully signed it.
|
||||
// Only update the snapshot if we've successfully signed it.
|
||||
updatedFiles[data.CanonicalSnapshotRole] = snapshotJSON
|
||||
} else if _, ok := err.(signed.ErrNoKeys); ok {
|
||||
// If signing fails due to us not having the snapshot key, then
|
||||
|
|
|
@ -29,7 +29,7 @@ however in attempting to add delegations I found I was making such
|
|||
significant changes that I could not maintain backwards compatibility
|
||||
without the code becoming overly convoluted.
|
||||
|
||||
Some features such as pluggable verifiers have alreayd been merged upstream to flynn/go-tuf
|
||||
Some features such as pluggable verifiers have already been merged upstream to flynn/go-tuf
|
||||
and we are in discussion with [titanous](https://github.com/titanous) about working to merge the 2 implementations.
|
||||
|
||||
This implementation retains the same 3 Clause BSD license present on
|
||||
|
|
|
@ -25,7 +25,7 @@ const (
|
|||
|
||||
const (
|
||||
// N parameter was chosen to be ~100ms of work using the default implementation
|
||||
// on the 2.3GHz Core i7 Haswell processor in a late-2013 Apple Retina Macbook
|
||||
// on the 2.3GHz Core i7 processor in a late-2013 Apple Retina Macbook
|
||||
// Pro (it takes ~113ms).
|
||||
scryptN = 32768
|
||||
scryptR = 8
|
||||
|
|
|
@ -484,7 +484,7 @@ func TestDeleteDelegationsRoleNotExist(t *testing.T) {
|
|||
repo := initRepo(t, ed25519, keyDB)
|
||||
|
||||
// initRepo leaves all the roles as Dirty. Set to false
|
||||
// to test removing a non-existant role doesn't mark
|
||||
// to test removing a non-existent role doesn't mark
|
||||
// a role as dirty
|
||||
repo.Targets[data.CanonicalTargetsRole].Dirty = false
|
||||
|
||||
|
|
Loading…
Reference in New Issue