Fix a couple typos in the docs (#41822)

This commit is contained in:
Alec Scott 2023-12-22 12:08:53 -08:00 committed by GitHub
parent dd8941abc9
commit 2f0df0131c
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
3 changed files with 7 additions and 7 deletions

View file

@ -90,7 +90,7 @@ and optimizers do require a paid license. In Spack, they are packaged as:
TODO: Confirm and possible change(!) the scope of MPI components (runtime TODO: Confirm and possible change(!) the scope of MPI components (runtime
vs. devel) in current (and previous?) *cluster/professional/composer* vs. devel) in current (and previous?) *cluster/professional/composer*
editions, i.e., presence in downloads, possibly subject to license editions, i.e., presence in downloads, possibly subject to license
coverage(!); see `disussion in PR #4300 coverage(!); see `discussion in PR #4300
<https://github.com/spack/spack/pull/4300#issuecomment-305582898>`_. [NB: <https://github.com/spack/spack/pull/4300#issuecomment-305582898>`_. [NB:
An "mpi" subdirectory is not indicative of the full MPI SDK being present An "mpi" subdirectory is not indicative of the full MPI SDK being present
(i.e., ``mpicc``, ..., and header files). The directory may just as well (i.e., ``mpicc``, ..., and header files). The directory may just as well

View file

@ -5284,7 +5284,7 @@ installed example.
example = which(self.prefix.bin.example) example = which(self.prefix.bin.example)
example() example()
Output showing the identification of each test part after runnig the tests Output showing the identification of each test part after running the tests
is illustrated below. is illustrated below.
.. code-block:: console .. code-block:: console
@ -5781,7 +5781,7 @@ with those implemented in the package itself.
* - `Cxx * - `Cxx
<https://github.com/spack/spack/blob/develop/var/spack/repos/builtin/packages/cxx>`_ <https://github.com/spack/spack/blob/develop/var/spack/repos/builtin/packages/cxx>`_
- Compiles and runs several ``hello`` programs - Compiles and runs several ``hello`` programs
* - `Fortan * - `Fortran
<https://github.com/spack/spack/blob/develop/var/spack/repos/builtin/packages/fortran>`_ <https://github.com/spack/spack/blob/develop/var/spack/repos/builtin/packages/fortran>`_
- Compiles and runs ``hello`` programs (``F`` and ``f90``) - Compiles and runs ``hello`` programs (``F`` and ``f90``)
* - `Mpi * - `Mpi

View file

@ -142,7 +142,7 @@ Reputational Key
---------------- ----------------
The Reputational Key is the public facing key used to sign complete groups of The Reputational Key is the public facing key used to sign complete groups of
development and release packages. Only one key pair exsits in this class of development and release packages. Only one key pair exists in this class of
keys. In contrast to the Intermediate CI Key the Reputational Key *should* be keys. In contrast to the Intermediate CI Key the Reputational Key *should* be
used to verify package integrity. At the end of develop and release pipeline a used to verify package integrity. At the end of develop and release pipeline a
final pipeline job pulls down all signed package metadata built by the pipeline, final pipeline job pulls down all signed package metadata built by the pipeline,
@ -272,7 +272,7 @@ Internal Implementation
The technical implementation of the pipeline signing process includes components The technical implementation of the pipeline signing process includes components
defined in Amazon Web Services, the Kubernetes cluster, at affilicated defined in Amazon Web Services, the Kubernetes cluster, at affilicated
institutions, and the GitLab/GitLab Runner deployment. We present the techincal institutions, and the GitLab/GitLab Runner deployment. We present the technical
implementation in two interdependent sections. The first addresses how secrets implementation in two interdependent sections. The first addresses how secrets
are managed through the lifecycle of a develop or release pipeline. The second are managed through the lifecycle of a develop or release pipeline. The second
section describes how Gitlab Runner and pipelines are configured and managed to section describes how Gitlab Runner and pipelines are configured and managed to
@ -295,7 +295,7 @@ infrastructure.
----------------------- -----------------------
Multiple intermediate CI signing keys exist, one Intermediate CI Key for jobs Multiple intermediate CI signing keys exist, one Intermediate CI Key for jobs
run in AWS, and one key for each affiliated institution (e.g. Univerity of run in AWS, and one key for each affiliated institution (e.g. University of
Oregon). Here we describe how the Intermediate CI Key is managed in AWS: Oregon). Here we describe how the Intermediate CI Key is managed in AWS:
The Intermediate CI Key (including the Signing Intermediate CI Private Key is The Intermediate CI Key (including the Signing Intermediate CI Private Key is
@ -305,7 +305,7 @@ contains an ASCII-armored export of just the *public* components of the
Reputational Key. This secret also contains the *public* components of each of Reputational Key. This secret also contains the *public* components of each of
the affiliated institutions' Intermediate CI Key. These are potentially needed the affiliated institutions' Intermediate CI Key. These are potentially needed
to verify dependent packages which may have been found in the public mirror or to verify dependent packages which may have been found in the public mirror or
built by a protected job running on an affiliated institution's infrastrcuture built by a protected job running on an affiliated institution's infrastructure
in an earlier stage of the pipeline. in an earlier stage of the pipeline.
Procedurally the ``spack-intermediate-ci-signing-key`` secret is used in Procedurally the ``spack-intermediate-ci-signing-key`` secret is used in