Skip to content

Commit 2c0d6fd

Browse files
authored
fix: typos (docker#23435)
<!--Delete sections as needed --> ## Description Fixed typos ## Related issues or tickets <!-- Related issues, pull requests, or Jira tickets --> ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Technical review - [ ] Editorial review - [ ] Product review
1 parent 479e7dc commit 2c0d6fd

File tree

15 files changed

+18
-18
lines changed

15 files changed

+18
-18
lines changed

content/get-started/workshop/04_sharing_app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ In the following image, you can see an example Docker command from Docker Hub. T
4040

4141
Let's try to push the image to Docker Hub.
4242

43-
1. In the command line, run the following commmand:
43+
1. In the command line, run the following command:
4444

4545
```console
4646
docker push docker/getting-started

content/guides/testcontainers-cloud/common-questions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Testcontainers Cloud supports any language that works with the open-source Testc
3636

3737
### How is container cleanup handled in Testcontainers Cloud?
3838

39-
While Testcontainers library automatically handles container lifecycle management, Testcontainers Cloud manages the allocated cloud worker lifetime. This means that containers are spun up, monitored, and cleaned up after tests are completed by Testcontainers library, and the worker where these containers have being running will be removed automatically after the ~35 min idle period by Testcontainers Cloud. This approach frees developers from manually managing containers and assosiated cloud resources.
39+
While Testcontainers library automatically handles container lifecycle management, Testcontainers Cloud manages the allocated cloud worker lifetime. This means that containers are spun up, monitored, and cleaned up after tests are completed by Testcontainers library, and the worker where these containers have being running will be removed automatically after the ~35 min idle period by Testcontainers Cloud. This approach frees developers from manually managing containers and associated cloud resources.
4040

4141
### Is there a free tier or pricing model for Testcontainers Cloud?
4242

content/manuals/admin/company/users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Manage company members
33
description: Learn how to manage company users in the Docker Admin Console.
4-
keywords: company, company users, users, admin, Admin Console, memeber management, organization management, company management, bulk invite, resend invites
4+
keywords: company, company users, users, admin, Admin Console, member management, organization management, company management, bulk invite, resend invites
55
---
66

77
{{< summary-bar feature_name="Company" >}}

content/manuals/admin/organization/onboard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Onboarding your organization includes:
2323
- Enforce sign-in for Docker Desktop to ensure security best practices
2424

2525
These actions help administrators gain visibility into user activity and
26-
enforce security settings. Organization memebers also receive increased pull
26+
enforce security settings. Organization members also receive increased pull
2727
limits and other benefits when they are signed in.
2828

2929
## Prerequisites

content/manuals/build/building/variables.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -323,7 +323,7 @@ They're used to configure the Buildx client, or the BuildKit daemon.
323323
| [BUILDX_GIT_INFO](#buildx_git_info) | Boolean | Remove Git information in provenance attestations. |
324324
| [BUILDX_GIT_LABELS](#buildx_git_labels) | String \| Boolean | Add Git provenance labels to images. |
325325
| [BUILDX_MEM_PROFILE](#buildx_mem_profile) | String | Generate a `pprof` memory profile at the specified location. |
326-
| [BUILDX_METADATA_PROVENANCE](#buildx_metadata_provenance) | String \| Boolean | Customize provenance informations included in the metadata file. |
326+
| [BUILDX_METADATA_PROVENANCE](#buildx_metadata_provenance) | String \| Boolean | Customize provenance information included in the metadata file. |
327327
| [BUILDX_METADATA_WARNINGS](#buildx_metadata_warnings) | String | Include build warnings in the metadata file. |
328328
| [BUILDX_NO_DEFAULT_ATTESTATIONS](#buildx_no_default_attestations) | Boolean | Turn off default provenance attestations. |
329329
| [BUILDX_NO_DEFAULT_LOAD](#buildx_no_default_load) | Boolean | Turn off loading images to image store by default. |

content/manuals/desktop/setup/vm-vdi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,6 @@ Docker Desktop follows the VDI support definitions outlined [previously](#virtua
9393

9494
For WSL 2-related issues, contact Nutanix support. For Docker Desktop-specific issues, contact Docker support.
9595

96-
## Aditional resources
96+
## Additional resources
9797

9898
- [Docker Desktop on Microsoft Dev Box](/manuals/enterprise/enterprise-deployment/dev-box.md)

content/manuals/dhi/core-concepts/attestations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ details](../how-to/explore.md#view-image-variant-details) in Docker Hub.
6969
|----------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------|
7070
| CycloneDX SBOM | A software bill of materials in [CycloneDX](https://cyclonedx.org/) format, listing components, libraries, and versions. | `https://cyclonedx.org/bom/v1.5` |
7171
| STIG scan | Results of a STIG scan, with output in HTML and XCCDF formats. | `https://docker.com/dhi/stig/v0.1` |
72-
| CVEs (In-Toto format) | A list of known vulnerabilities (CVEs) affecting the image's components, based on package and distrobution scanning. | `https://in-toto.io/attestation/vulns/v0.1` |
72+
| CVEs (In-Toto format) | A list of known vulnerabilities (CVEs) affecting the image's components, based on package and distribution scanning. | `https://in-toto.io/attestation/vulns/v0.1` |
7373
| VEX | A [Vulnerability Exploitability eXchange (VEX)](https://openvex.dev/) document that identifies vulnerabilities that do not apply to the image and explains why (e.g., not reachable or not present). | `https://openvex.dev/ns/v0.2.0` |
7474
| Scout health score | A signed attestation from Docker Scout that summarizes the overall security and quality posture of the image. | `https://scout.docker.com/health/v0.1` |
7575
| Scout provenance | Provenance metadata generated by Docker Scout, including the source Git commit, build parameters, and environment details. | `https://scout.docker.com/provenance/v0.1` |

content/manuals/dhi/how-to/migrate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Dockerfile:
3434
| Non-root user | By default, images intended for runtime, run as the nonroot user. Ensure that necessary files and directories are accessible to the nonroot user. |
3535
| Multi-stage build | Utilize images with a `dev` or `sdk` tags for build stages and non-dev images for runtime. |
3636
| TLS certificates | DHIs contain standard TLS certificates by default. There is no need to install TLS certificates. |
37-
| Ports | DHIs intented for runtime run as a nonroot user by default. As a result, applications in these images can't bind to privileged ports (below 1024) when running in Kubernetes or in Docker Engine versions older than 20.10. To avoid issues, configure your application to listen on port 1025 or higher inside the container. |
37+
| Ports | DHIs intended for runtime run as a nonroot user by default. As a result, applications in these images can't bind to privileged ports (below 1024) when running in Kubernetes or in Docker Engine versions older than 20.10. To avoid issues, configure your application to listen on port 1025 or higher inside the container. |
3838
| Entry point | DHIs may have different entry points than images such as Docker Official Images. Inspect entry points for DHIs and update your Dockerfile if necessary. |
3939
| No shell | DHIs intended for runtime don't contain a shell. Use dev images in build stages to run shell commands and then copy artifacts to the runtime stage. |
4040

content/manuals/enterprise/security/hardened-desktop/enhanced-container-isolation/enable-eci.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ Settings Management:
159159
- The **Use Enhanced Container Isolation** setting appears turned on in
160160
Docker Desktop settings.
161161
- If set to `"locked": true`, the setting is locked and greyed out.
162-
- All new containers automatically use Linux user namepsaces.
162+
- All new containers automatically use Linux user namespaces.
163163
- Existing development workflows continue to work without modification.
164164
- Users see `sysbox-runc` as the container runtime in `docker inspect` output.
165165

content/manuals/enterprise/security/hardened-desktop/registry-access-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Before configuring Registry Access Management, you must:
4545
To configure registry permissions:
4646

4747
1. Sign in to [Docker Home](https://app.docker.com) and select your organization.
48-
1. Select **Admin Console**, then **Regsitry access**.
48+
1. Select **Admin Console**, then **Registry access**.
4949
1. Use the **toggle** to enable registry access. By default, Docker Hub is enabled
5050
in the registry list.
5151
1. To add additional registries, select **Add registry** and provide

0 commit comments

Comments
 (0)