From 195ed3c97f481c04eaad8e309de3704b4f8c0b0f Mon Sep 17 00:00:00 2001 From: "Kian-Meng, Ang" Date: Wed, 27 Oct 2021 05:52:11 +0800 Subject: [PATCH] Fix typos --- docs/config/runtime.md | 2 +- docs/guides/deploying_to_aws.md | 2 +- docs/introduction/installation.md | 2 +- docs/introduction/walkthrough.md | 2 +- priv/libexec/config.sh | 2 +- test/cases/shell_test.exs | 6 +++--- 6 files changed, 8 insertions(+), 8 deletions(-) diff --git a/docs/config/runtime.md b/docs/config/runtime.md index 36334f22..4f3ad5e4 100644 --- a/docs/config/runtime.md +++ b/docs/config/runtime.md @@ -19,7 +19,7 @@ This meant that some constructs for runtime configuration, namely dynamic things, like `System.get_env/1` would be evaluated at build time, not runtime, which was a source of confusion. Older tools introduced `REPLACE_OS_VARS`, an environment variable you export at runtime which instructed the tool to replace -occurances of `${VAR}` with the value from the system environment in the +occurrences of `${VAR}` with the value from the system environment in the `sys.config` file. The problem with `REPLACE_OS_VARS` is that it's essentially a hack, and as such diff --git a/docs/guides/deploying_to_aws.md b/docs/guides/deploying_to_aws.md index c2c068c6..8e732d96 100644 --- a/docs/guides/deploying_to_aws.md +++ b/docs/guides/deploying_to_aws.md @@ -75,7 +75,7 @@ following is a list of the benefits: same node * _Secure Configuration_ - secrets are stored via SSM in the parameter store as secure strings, encrypted with a key dedicated to the stack. Only the - application and adminstrators can access the secrets + application and administrators can access the secrets * _Secure Networking_ - use of security groups and network rules ensure that only the traffic which we want to allow is permitted to reach each area of the infrastructure diff --git a/docs/introduction/installation.md b/docs/introduction/installation.md index 4ced5cd3..3a437bea 100644 --- a/docs/introduction/installation.md +++ b/docs/introduction/installation.md @@ -81,7 +81,7 @@ Generated test app ==> Assembling release.. ==> Building release test:0.1.0 using environment dev ==> You have set dev_mode to true, skipping archival phase -Release succesfully built! +Release successfully built! To start the release you have built, you can use one of the following tasks: # start a shell, like 'iex -S mix' diff --git a/docs/introduction/walkthrough.md b/docs/introduction/walkthrough.md index b4595995..ee1dbb01 100644 --- a/docs/introduction/walkthrough.md +++ b/docs/introduction/walkthrough.md @@ -168,7 +168,7 @@ When you run `mix distillery.release`, you should see something like the followi ==> Assembling release.. ==> Building release myapp:0.1.0 using environment dev ==> You have set dev_mode to true, skipping archival phase -Release succesfully built! +Release successfully built! To start the release you have built, you can use one of the following tasks: # start a shell, like 'iex -S mix' diff --git a/priv/libexec/config.sh b/priv/libexec/config.sh index 875b7a96..e47b8121 100755 --- a/priv/libexec/config.sh +++ b/priv/libexec/config.sh @@ -197,7 +197,7 @@ _replace_os_vars() { mv -- "$1.bak" "$1" } -# Do a textual replacement of ${VAR} occurrances in $1 and pipe to stdout +# Do a textual replacement of ${VAR} occurrences in $1 and pipe to stdout _replace_os_vars_str() { awk ' function escape(s) { diff --git a/test/cases/shell_test.exs b/test/cases/shell_test.exs index 7dda97c7..ccaf6b32 100644 --- a/test/cases/shell_test.exs +++ b/test/cases/shell_test.exs @@ -63,7 +63,7 @@ defmodule Distillery.Test.ShellTest do end describe "silent mode" do - test "all output should be supressed" do + test "all output should be suppressed" do Shell.configure(:silent) assert capture_io(fn -> @@ -97,7 +97,7 @@ defmodule Distillery.Test.ShellTest do end describe "quiet mode" do - test "debug and info messages should be supressed" do + test "debug and info messages should be suppressed" do Shell.configure(:quiet) assert capture_io(fn -> @@ -136,7 +136,7 @@ defmodule Distillery.Test.ShellTest do end describe "normal mode" do - test "debug messages should be supressed" do + test "debug messages should be suppressed" do Shell.configure(:normal) assert capture_io(fn ->