mirror of
https://github.com/containers/podman.git
synced 2025-05-20 16:47:39 +08:00
Merge pull request #14898 from eriksjolund/improve_language_and_fix_spelling_and_typos
[CI:DOCS] Improve language. Fix spelling and typos.
This commit is contained in:
@ -12,7 +12,7 @@
|
||||
| [podman-container(1)](https://podman.readthedocs.io/en/latest/managecontainers.html) | Manage Containers |
|
||||
| [podman-container-checkpoint(1)](https://podman.readthedocs.io/en/latest/markdown/podman-container-checkpoint.1.html) | Checkpoints one or more running containers |
|
||||
| [podman-container-cleanup(1)](https://podman.readthedocs.io/en/latest/markdown/podman-container-cleanup.1.html) | Clean up the container's network and mountpoints |
|
||||
| [podman-container-exists(1)](https://podman.readthedocs.io/en/latest/markdown/podman-container-exists.1.html) | Check if an container exists in local storage |
|
||||
| [podman-container-exists(1)](https://podman.readthedocs.io/en/latest/markdown/podman-container-exists.1.html) | Check if a container exists in local storage |
|
||||
| [podman-container-prune(1)](https://podman.readthedocs.io/en/latest/markdown/podman-container-prune.1.html) | Remove all stopped containers from local storage |
|
||||
| [podman-container-restore(1)](https://podman.readthedocs.io/en/latest/markdown/podman-container-restore.1.html) | Restores one or more containers from a checkpoint |
|
||||
| [podman-container-runlabel(1)](https://podman.readthedocs.io/en/latest/markdown/podman-container-runlabel.1.html) | Executes a command as described by a container image label |
|
||||
|
@ -1,4 +1,4 @@
|
||||
# The containers configuration file specifies all of the available configuration
|
||||
# The container's configuration file specifies all of the available configuration
|
||||
# command-line options/flags for container engine tools like Podman
|
||||
# but in a TOML format that can be easily modified and versioned.
|
||||
|
||||
|
@ -288,7 +288,7 @@ detached container with **podman attach**.
|
||||
|
||||
When attached in the tty mode, you can detach from the container (and leave it
|
||||
running) using a configurable key sequence. The default sequence is `ctrl-p,ctrl-q`.
|
||||
Configure the keys sequence using the **--detach-keys** option, or specifying
|
||||
Specify the key sequence using the **--detach-keys** option, or configure
|
||||
it in the **containers.conf** file: see **containers.conf(5)** for more information.
|
||||
|
||||
#### **--detach-keys**=*sequence*
|
||||
@ -300,7 +300,7 @@ This option can also be set in **containers.conf**(5) file.
|
||||
#### **--device**=_host-device_[**:**_container-device_][**:**_permissions_]
|
||||
|
||||
Add a host device to the container. Optional *permissions* parameter
|
||||
can be used to specify device permissions, it is combination of
|
||||
can be used to specify device permissions by combining
|
||||
**r** for read, **w** for write, and **m** for **mknod**(2).
|
||||
|
||||
Example: **--device=/dev/sdc:/dev/xvdc:rwm**.
|
||||
@ -1158,7 +1158,7 @@ $ podman run -d --tmpfs /tmp:rw,size=787448k,mode=1777 my_image
|
||||
|
||||
This command mounts a **tmpfs** at _/tmp_ within the container. The supported mount
|
||||
options are the same as the Linux default mount flags. If you do not specify
|
||||
any options, the systems uses the following options:
|
||||
any options, the system uses the following options:
|
||||
**rw,noexec,nosuid,nodev**.
|
||||
|
||||
#### **--tty**, **-t**
|
||||
@ -1598,7 +1598,7 @@ content. Installing packages into _/usr_, for example. In production,
|
||||
applications seldom need to write to the image. Container applications write
|
||||
to volumes if they need to write to file systems at all. Applications can be
|
||||
made more secure by running them in read-only mode using the **--read-only** switch.
|
||||
This protects the containers image from modification. Read-only containers may
|
||||
This protects the container's image from modification. Read-only containers may
|
||||
still need to write temporary data. The best way to handle this is to mount
|
||||
tmpfs directories on _/run_ and _/tmp_.
|
||||
|
||||
@ -1879,7 +1879,7 @@ $ podman run --uidmap 0:30000:7000 --gidmap 0:30000:7000 fedora echo hello
|
||||
|
||||
Podman allows for the configuration of storage by changing the values
|
||||
in the _/etc/container/storage.conf_ or by using global options. This
|
||||
shows how to set up and use fuse-overlayfs for a one time run of busybox
|
||||
shows how to set up and use fuse-overlayfs for a one-time run of busybox
|
||||
using global options.
|
||||
|
||||
```
|
||||
@ -1975,7 +1975,7 @@ in the following order of precedence (later entries override earlier entries):
|
||||
- Container image: Any environment variables specified in the container image.
|
||||
- **--http-proxy**: By default, several environment variables will be passed in from the host, such as **http_proxy** and **no_proxy**. See **--http-proxy** for details.
|
||||
- **--env-host**: Host environment of the process executing Podman is added.
|
||||
- **--env-file**: Any environment variables specified via env-files. If multiple files specified, then they override each other in order of entry.
|
||||
- **--env-file**: Any environment variables specified via env-files. If multiple files are specified, then they override each other in order of entry.
|
||||
- **--env**: Any environment variables specified will override previous settings.
|
||||
|
||||
Run containers and set the environment ending with a __*__.
|
||||
|
@ -130,7 +130,7 @@ func (c *Container) bundlePath() string {
|
||||
return c.config.StaticDir
|
||||
}
|
||||
|
||||
// ControlSocketPath returns the path to the containers control socket for things like tty
|
||||
// ControlSocketPath returns the path to the container's control socket for things like tty
|
||||
// resizing
|
||||
func (c *Container) ControlSocketPath() string {
|
||||
return filepath.Join(c.bundlePath(), "ctl")
|
||||
@ -513,8 +513,8 @@ func (c *Container) setupStorage(ctx context.Context) error {
|
||||
return fmt.Errorf("error creating container storage: %w", containerInfoErr)
|
||||
}
|
||||
|
||||
// only reconfig IDMappings if layer was mounted from storage
|
||||
// if its a external overlay do not reset IDmappings
|
||||
// Only reconfig IDMappings if layer was mounted from storage.
|
||||
// If it's an external overlay do not reset IDmappings.
|
||||
if !c.config.RootfsOverlay {
|
||||
c.config.IDMappings.UIDMap = containerInfo.UIDMap
|
||||
c.config.IDMappings.GIDMap = containerInfo.GIDMap
|
||||
@ -794,7 +794,7 @@ func (c *Container) save() error {
|
||||
}
|
||||
|
||||
// Checks the container is in the right state, then initializes the container in preparation to start the container.
|
||||
// If recursive is true, each of the containers dependencies will be started.
|
||||
// If recursive is true, each of the container's dependencies will be started.
|
||||
// Otherwise, this function will return with error if there are dependencies of this container that aren't running.
|
||||
func (c *Container) prepareToStart(ctx context.Context, recursive bool) (retErr error) {
|
||||
// Container must be created or stopped to be started
|
||||
@ -1255,7 +1255,7 @@ func (c *Container) stop(timeout uint) error {
|
||||
// If the container is running in a PID Namespace, then killing the
|
||||
// primary pid is enough to kill the container. If it is not running in
|
||||
// a pid namespace then the OCI Runtime needs to kill ALL processes in
|
||||
// the containers cgroup in order to make sure the container is stopped.
|
||||
// the container's cgroup in order to make sure the container is stopped.
|
||||
all := !c.hasNamespace(spec.PIDNamespace)
|
||||
// We can't use --all if Cgroups aren't present.
|
||||
// Rootless containers with Cgroups v1 and NoCgroups are both cases
|
||||
|
@ -184,11 +184,8 @@ func (c *Container) prepare() error {
|
||||
func (c *Container) isWorkDirSymlink(resolvedPath string) bool {
|
||||
// We cannot create workdir since explicit --workdir is
|
||||
// set in config but workdir could also be a symlink.
|
||||
// If its a symlink lets check if resolved link is present
|
||||
// on the container or not.
|
||||
|
||||
// If we can resolve symlink and resolved link is present on the container
|
||||
// then return nil cause its a valid use-case.
|
||||
// If it's a symlink, check if the resolved target is present in the container.
|
||||
// If so, that's a valid use case: return nil.
|
||||
|
||||
maxSymLinks := 0
|
||||
for {
|
||||
|
@ -506,8 +506,8 @@ type InspectContainerHostConfig struct {
|
||||
// CpuRealtimeRuntime is the length of time (in microseconds) allocated
|
||||
// for realtime tasks within every CpuRealtimePeriod.
|
||||
CpuRealtimeRuntime int64 `json:"CpuRealtimeRuntime"`
|
||||
// CpusetCpus is the is the set of CPUs that the container will execute
|
||||
// on. Formatted as `0-3` or `0,2`. Default (if unset) is all CPUs.
|
||||
// CpusetCpus is the set of CPUs that the container will execute on.
|
||||
// Formatted as `0-3` or `0,2`. Default (if unset) is all CPUs.
|
||||
CpusetCpus string `json:"CpusetCpus"`
|
||||
// CpusetMems is the set of memory nodes the container will use.
|
||||
// Formatted as `0-3` or `0,2`. Default (if unset) is all memory nodes.
|
||||
@ -544,7 +544,7 @@ type InspectContainerHostConfig struct {
|
||||
OomKillDisable bool `json:"OomKillDisable"`
|
||||
// Init indicates whether the container has an init mounted into it.
|
||||
Init bool `json:"Init,omitempty"`
|
||||
// PidsLimit is the maximum number of PIDs what may be created within
|
||||
// PidsLimit is the maximum number of PIDs that may be created within
|
||||
// the container. 0, the default, indicates no limit.
|
||||
PidsLimit int64 `json:"PidsLimit"`
|
||||
// Ulimits is a set of ulimits that will be set within the container.
|
||||
|
@ -205,7 +205,7 @@ var (
|
||||
// Useful for potentially long running tasks.
|
||||
ErrCanceled = errors.New("cancelled by user")
|
||||
|
||||
// ErrConmonVersionFormat is used when the expected versio-format of conmon
|
||||
// ErrConmonVersionFormat is used when the expected version format of conmon
|
||||
// has changed.
|
||||
ErrConmonVersionFormat = "conmon version changed format"
|
||||
)
|
||||
|
@ -45,7 +45,7 @@ type InspectVolumeData struct {
|
||||
// GID is the GID that the volume was created with.
|
||||
GID int `json:"GID,omitempty"`
|
||||
// Anonymous indicates that the volume was created as an anonymous
|
||||
// volume for a specific container, and will be be removed when any
|
||||
// volume for a specific container, and will be removed when any
|
||||
// container using it is removed.
|
||||
Anonymous bool `json:"Anonymous,omitempty"`
|
||||
// MountCount is the number of times this volume has been mounted.
|
||||
|
@ -19,7 +19,7 @@ func (e EventToNull) Read(ctx context.Context, options ReadOptions) error {
|
||||
}
|
||||
|
||||
// NewNullEventer returns a new null eventer. You should only do this for
|
||||
// the purposes on internal libpod testing.
|
||||
// the purposes of internal libpod testing.
|
||||
func NewNullEventer() Eventer {
|
||||
return EventToNull{}
|
||||
}
|
||||
|
@ -1388,7 +1388,7 @@ func (r *ConmonOCIRuntime) sharedConmonArgs(ctr *Container, cuuid, bundlePath, p
|
||||
}
|
||||
|
||||
func startCommand(cmd *exec.Cmd, ctr *Container) error {
|
||||
// Make sure to unset the NOTIFY_SOCKET and reset if afterwards if needed.
|
||||
// Make sure to unset the NOTIFY_SOCKET and reset it afterwards if needed.
|
||||
switch ctr.config.SdNotifyMode {
|
||||
case define.SdNotifyModeContainer, define.SdNotifyModeIgnore:
|
||||
if ctr.notifySocket != "" {
|
||||
@ -1667,7 +1667,7 @@ func httpAttachNonTerminalCopy(container *net.UnixConn, http *bufio.ReadWriter,
|
||||
// multiplexing by Conmon).
|
||||
headerLen := uint32(numR - 1)
|
||||
// Practically speaking, we could make this buf[0] - 1,
|
||||
// but we need to validate it anyways...
|
||||
// but we need to validate it anyway.
|
||||
switch buf[0] {
|
||||
case AttachPipeStdin:
|
||||
headerBuf = makeHTTPAttachHeader(0, headerLen)
|
||||
|
@ -31,7 +31,7 @@ func (r *Runtime) NewVolume(ctx context.Context, options ...VolumeCreateOption)
|
||||
|
||||
// newVolume creates a new empty volume with the given options.
|
||||
// The createPluginVolume can be set to true to make it not create the volume in the volume plugin,
|
||||
// this is required for the UpdateVolumePlugins() function. If you are not sure set this to false.
|
||||
// this is required for the UpdateVolumePlugins() function. If you are not sure, set this to false.
|
||||
func (r *Runtime) newVolume(noCreatePluginVolume bool, options ...VolumeCreateOption) (_ *Volume, deferredErr error) {
|
||||
volume := newVolume(r)
|
||||
for _, option := range options {
|
||||
@ -216,7 +216,7 @@ func (r *Runtime) UpdateVolumePlugins(ctx context.Context) *define.VolumeReload
|
||||
for _, vol := range libpodVolumes {
|
||||
if vol.UsesVolumeDriver() {
|
||||
if _, ok := allPluginVolumes[vol.Name()]; !ok {
|
||||
// The volume is no longer in the plugin, lets remove it from the libpod db.
|
||||
// The volume is no longer in the plugin. Let's remove it from the libpod db.
|
||||
if err := r.removeVolume(ctx, vol, false, nil, true); err != nil {
|
||||
if errors.Is(err, define.ErrVolumeBeingUsed) {
|
||||
// Volume is still used by at least one container. This is very bad,
|
||||
|
@ -247,7 +247,7 @@ var _ = Describe("Podman stop", func() {
|
||||
|
||||
It("podman stop should return silent success on stopping configured containers", func() {
|
||||
// following container is not created on OCI runtime
|
||||
// so we return success and assume that is is stopped
|
||||
// so we return success and assume that it is stopped
|
||||
session2 := podmanTest.Podman([]string{"create", "--name", "stopctr", ALPINE, "/bin/sh"})
|
||||
session2.WaitWithDefaultTimeout()
|
||||
Expect(session2).Should(Exit(0))
|
||||
|
@ -640,7 +640,7 @@ function assert() {
|
||||
fi
|
||||
|
||||
# This is a multi-line message, which may in turn contain multi-line
|
||||
# output, so let's format it ourself, readably
|
||||
# output, so let's format it ourself to make it more readable.
|
||||
local actual_split
|
||||
IFS=$'\n' read -rd '' -a actual_split <<<"$actual_string" || true
|
||||
printf "#/vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv\n" >&2
|
||||
@ -690,7 +690,7 @@ function is() {
|
||||
fi
|
||||
|
||||
# This is a multi-line message, which may in turn contain multi-line
|
||||
# output, so let's format it ourself, readably
|
||||
# output, so let's format it ourself to make it more readable.
|
||||
local -a actual_split
|
||||
readarray -t actual_split <<<"$actual"
|
||||
printf "#/vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv\n" >&2
|
||||
|
Reference in New Issue
Block a user