[Reproducible-commits] [reproducible-website] 39/55: Fix grammar, typos, and wordings
Chris Lamb
chris at chris-lamb.co.uk
Tue Aug 23 13:39:53 UTC 2016
This is an automated email from the git hooks/post-receive script.
lamby pushed a commit to branch master
in repository reproducible-website.
commit 5737fff894cde8637835ab92bbb721bad4905d29
Author: Georg Koppen <gk at torproject.org>
Date: Sun Dec 20 18:38:55 2015 +0100
Fix grammar, typos, and wordings
---
_docs/build_path.md | 4 ++--
_docs/build_toolchain_from_source.md | 8 ++++----
_docs/buy_in.md | 2 +-
_docs/checksums.md | 6 +++---
_docs/definition_strategies.md | 2 +-
_docs/deterministic_build_systems.md | 10 +++++-----
_docs/embedded_signatures.md | 6 +++---
_docs/formal_definition.md | 4 ++--
_docs/locales.md | 6 +++---
_docs/plans.md | 4 ++--
_docs/proprietary_os.md | 2 +-
_docs/recording.md | 2 +-
_docs/sharing_certifications.md | 2 +-
_docs/test_bench.md | 2 +-
_docs/timestamps.md | 2 +-
_docs/timezones.md | 2 +-
_docs/version_information.md | 4 ++--
_docs/volatile_inputs.md | 2 +-
18 files changed, 35 insertions(+), 35 deletions(-)
diff --git a/_docs/build_path.md b/_docs/build_path.md
index ae2938a..95994da 100644
--- a/_docs/build_path.md
+++ b/_docs/build_path.md
@@ -9,8 +9,8 @@ Some tools will record the path of the source files in their output.
Most compilers write the path of the source in the debug
information in order to locate the associated source files.
-Some tools have flags (like gzip's `-n`) that prevent them to write
-the path in their output. Proposing patches to add similar feature in
+Some tools have flags (like gzip's `-n`) that prevent them from writing
+the path in their output. Proposing patches to add a similar feature in
other tools might be sufficiently easy.
In most cases however, post-processing is required to either remove the
diff --git a/_docs/build_toolchain_from_source.md b/_docs/build_toolchain_from_source.md
index b35e892..d0bb2f2 100644
--- a/_docs/build_toolchain_from_source.md
+++ b/_docs/build_toolchain_from_source.md
@@ -5,7 +5,7 @@ permalink: /docs/build-toolchain-from-source/
---
Building the tools that make the environment from source is one way to
-allow user to reproduce it. Using source directly makes it easier to
+allow user to reproduce it. Using the source code directly makes it easier to
rely on new features, and easily works on a variety of platforms. It
might not scale well for a long list of dependencies, and asking users
to rebuild GCC for every piece of software they use might make them
@@ -18,7 +18,7 @@ Building using external resources
---------------------------------
The source for the different components can be retrieved from online
-repository. Using release tarballs might be preferable as they are
+repositories. Using release tarballs might be preferable as they are
easier to cache, [mirror, checksum and verify]({{ "/docs/volatile-inputs/" | prepend: site.baseurl }}).
When retrieving the source from a version control system repository,
it's best to have a precise reference to the code version. With Git,
@@ -36,7 +36,7 @@ Check-in everything
Another approach is to check the source of the entire toolchain in the
project's version control system.
-This is how several integrated operating systems like *BSD are
+This is how several integrated operating systems like \*BSD are
developed. “Building the world” will start by building the toolchain in
the version control system before building the rest of the system.
@@ -45,7 +45,7 @@ released [Bazel](http://bazel.io/) which is based on their
internal compilation tool. Bazel is designed to drive large scale
builds with speed and reproducibility in mind.
-Outside of fully integrated operating systems or corporate environment,
+Outside of fully integrated operating systems or corporate environments,
it might be hard to push the idea of adding ten or more times the actual
code base in the toolchain…
diff --git a/_docs/buy_in.md b/_docs/buy_in.md
index 1146426..e3bb764 100644
--- a/_docs/buy_in.md
+++ b/_docs/buy_in.md
@@ -21,7 +21,7 @@ from the Snowden leaks the abstract of a talk at an
[Strawhorse: Attacking the MacOS and iOS Software Development
Kit](https://theintercept.com/document/2015/03/10/strawhorse-attacking-macos-ios-software-development-kit/).
The abstract clearly explains how unnamed researchers have been creating
-modified version of XCode that would — without any knowledge of the
+a modified version of XCode that would — without any knowledge of the
developer — watermark or insert spyware in the compiled applications.
A few months later, a malware dubbed “XcodeGhost” has been found
diff --git a/_docs/checksums.md b/_docs/checksums.md
index 27fc6d5..a68370c 100644
--- a/_docs/checksums.md
+++ b/_docs/checksums.md
@@ -7,11 +7,11 @@ permalink: /docs/checksums/
How can users know that the build they just made has successfully
reproduced the original build?
-The easiest way is to make sure that the build output are always
-byte-for-byte identical. Byte for byte comparison is a trivial operation
+The easiest way is to make sure that the build outputs are always
+byte-for-byte identical. Byte-for-byte comparison is a trivial operation
and can be performed in many different environments.
-The other benefit of having identical bytes is that it makes possible to
+The other benefit of having identical bytes is that it makes it possible to
use [cryptographic
checksums](https://en.wikipedia.org/wiki/Cryptographic_hash_function).
Such checksums are really tiny compared to the full build products. They
diff --git a/_docs/definition_strategies.md b/_docs/definition_strategies.md
index 0c4bd20..7752f13 100644
--- a/_docs/definition_strategies.md
+++ b/_docs/definition_strategies.md
@@ -58,7 +58,7 @@ easily perform the build in a more controlled environment. The build
user, system hostname, network configuration, or other aspects can be
enforced easily on all systems.
-The downside is that it can introduce a lot of software that has be
+The downside is that it can introduce a lot of software that has to be
trusted somehow. For example, it's currently not possible to install
Debian in a reproducible manner[^reproducible-install]. This makes it
harder to compare different installations.
diff --git a/_docs/deterministic_build_systems.md b/_docs/deterministic_build_systems.md
index 2d811f1..aea81a5 100644
--- a/_docs/deterministic_build_systems.md
+++ b/_docs/deterministic_build_systems.md
@@ -4,7 +4,7 @@ layout: docs
permalink: /docs/deterministic-build-systems/
---
-A software cannot be easily be built reproducibly if the source varies
+A software cannot easily be built reproducibly if the source varies
depending on factors that are hard or impossible to control like the
ordering of files on a filesystem or the current time.
@@ -24,7 +24,7 @@ or `sed` where the requirement for the environment can be as loose as
But it's hardly a good idea to mandate that the system pseudo-random
number generator be initialized with a given value before performing a
-build, so better not have randomness affect a build output.
+build, so better not having randomness affect a build output.
Another concrete example on where to draw the line: there is no need to
care about making the build system give constant output when run in
@@ -43,15 +43,15 @@ as:
* Capture as little as possible from the environment.
What follows are some advices on common issues that can affect source
-code or build systems that makes multiple builds from the exact same
+code or build systems that make multiple builds from the exact same
source different.
Disclaimer
----------
-Not all problems currently have solutions. Some tools that might be used
+Not all problems have solutions currently. Some tools that might be used
in a build process might require fixes to become non-deterministic. The
-Debian effort keep a list of [all issues
+Debian effort keeps a list of [all issues
found](https://reproducible.debian.net/index_issues.html) while
investigating reproducibility problems in its 22,000+ source packages.
While some require changes in the package source itself, some can be
diff --git a/_docs/embedded_signatures.md b/_docs/embedded_signatures.md
index 34460dd..956844a 100644
--- a/_docs/embedded_signatures.md
+++ b/_docs/embedded_signatures.md
@@ -4,7 +4,7 @@ layout: docs
permalink: /docs/embedded-signatures/
---
-Software that are distributed using embedded cryptographic signatures
+Software that is distributed using embedded cryptographic signatures
can pose a challenge to allow users to reproduce identical results.
By definition, they will not be able to generate an identical signature.
This can either be solved by making the signature part of the build
@@ -16,7 +16,7 @@ Pasting signatures
One way to handle embedded cryptographic signatures is to make the
signature an (optional) input of the build process. When a signature
-is available, it just get copied at the right location.
+is available, it just gets copied at the right location.
This enables the following workflow:
@@ -48,7 +48,7 @@ Another option is to ship a tool that can strip the signatures from the
official releases. The result can then be compared byte-for-byte with
the results from the user.
-This method has the downside that it requires user to download the
+This method has the downside that it requires a user to download the
official releases to do the comparison. It's also harder to attest that
the data that is being removed will not make the software behave
differently.
diff --git a/_docs/formal_definition.md b/_docs/formal_definition.md
index 3243709..237473f 100644
--- a/_docs/formal_definition.md
+++ b/_docs/formal_definition.md
@@ -4,8 +4,8 @@ layout: docs
permalink: /docs/formal-definition/
---
-Most free software distribution are self-contained: all tools required
-to build its component are part of the distribution. In such cases, it's
+Most free software distributions are self-contained: all tools required
+to build their components are part of the distribution. In such cases, it's
possible to specify the build environment in a machine readable format
that can be later used to reinstall the environment.
diff --git a/_docs/locales.md b/_docs/locales.md
index 04ba2a5..2c0bae4 100644
--- a/_docs/locales.md
+++ b/_docs/locales.md
@@ -17,7 +17,7 @@ Time format
-----------
Several common time formatting functions will have output depending
-on the current locale. On POSIX system the formatting will depend on
+on the current locale. On a POSIX system the formatting will depend on
the `LC_CTIME` environment variable, which can be overridden by
`LC_ALL`.
@@ -38,8 +38,8 @@ Collation order
---------------
Common sorting functions are affected by the `LC_COLLATE` environment
-variable, which can which can be overridden by `LC_ALL`. Some locales can
-be quite surprising:
+variable, which can be overridden by `LC_ALL`. Some locales can
+be quite surprising.
This typically shows when using `sort`. The `fr_FR` locale will sort
independently of the character case:
diff --git a/_docs/plans.md b/_docs/plans.md
index 521187e..0dfed7e 100644
--- a/_docs/plans.md
+++ b/_docs/plans.md
@@ -40,7 +40,7 @@ developed or it can be recorded at build time.
Distributing the build environment
----------------------------------
-Users need to be able to know what build environment needs to be setup
+Users need to be able to know what build environment needs to be set up
to rebuild the software.
If the build environment is defined ahead and part of the source code,
@@ -59,7 +59,7 @@ source code, perform the build, and compare the results.
Ideally, the comparison protocol should be simple to see if resulting
binaries are identical. Comparing bytes or cryptographic hash
-functions is easy to do and understand.
+values is easy to do and understand.
Other technologies might require removing cryptographic signatures or
ignore specific parts. Such operations must be both documented and
diff --git a/_docs/proprietary_os.md b/_docs/proprietary_os.md
index 4e992b1..f37f8b5 100644
--- a/_docs/proprietary_os.md
+++ b/_docs/proprietary_os.md
@@ -17,7 +17,7 @@ the technique to build their Windows and Mac OS X versions.
Windows
-------
-For Windows, [ming-w64](http://mingw-w64.org/) will build Windows
+For Windows, [mingw-w64](http://mingw-w64.org/) will build Windows
binaries on POSIX compatible operating systems.
[NSIS](http://nsis.sourceforge.net/) can be used to create integrated
diff --git a/_docs/recording.md b/_docs/recording.md
index 633dca7..3c321c7 100644
--- a/_docs/recording.md
+++ b/_docs/recording.md
@@ -14,7 +14,7 @@ of the build environment irrelevant to the build output, or ensure they
are mandatory to rebuild the software exactly as distributed.
All irrelevant information should not be recorded. What information is
-irrelevant depends on what defined to be
+irrelevant depends on what is defined to be
[part of the build environment]({{ "/docs/perimeter/" | prepend: site.baseurl }}),
but it likely includes information such as date and time of the build, build
system hostname, path, network configuration, CPU type, memory size,
diff --git a/_docs/sharing_certifications.md b/_docs/sharing_certifications.md
index 7303ef3..4afa4b6 100644
--- a/_docs/sharing_certifications.md
+++ b/_docs/sharing_certifications.md
@@ -10,7 +10,7 @@ get the same build results?
Debian is thinking of allowing [multiple Debian Developers to upload
signatures](https://wiki.debian.org/ReproducibleBuilds/BuildinfoSpecification#buildinfo_signatures)
-attesting that they have been to reproduce a build.
+attesting that they have been able to reproduce a build.
The question is also related to the work lead by Ben Laurie on [binary
transparency](https://groups.google.com/forum/#!forum/binary-transparency).
diff --git a/_docs/test_bench.md b/_docs/test_bench.md
index b4b8eee..6af18e1 100644
--- a/_docs/test_bench.md
+++ b/_docs/test_bench.md
@@ -7,7 +7,7 @@ permalink: /docs/test-bench/
It is important to detect reproducibility problems in the build system
before the users do, to avoid any false alarms.
-The method is usually as followed:
+The method is usually as follows:
1. Build a first time.
2. Save the result.
diff --git a/_docs/timestamps.md b/_docs/timestamps.md
index ebe86a8..cdbf12d 100644
--- a/_docs/timestamps.md
+++ b/_docs/timestamps.md
@@ -18,7 +18,7 @@ Often the time of the build was used as an approximate way to know which
version of the source has been built, and which tools had been used to do
it. With reproducible builds, recording the time of the build becomes
meaningless: on one side, the source code needs to be tracked more accurately
-that just a timestamp, and on the other side, the build environment needs to be
+than just a timestamp, and on the other side, the build environment needs to be
defined or extensively recorded.
If a date is required to give users an idea on when the software was
diff --git a/_docs/timezones.md b/_docs/timezones.md
index e6a0189..876f073 100644
--- a/_docs/timezones.md
+++ b/_docs/timezones.md
@@ -20,7 +20,7 @@ Tue, 19 Jan 2038 04:14:07 +0100
{% endhighlight %}
</div>
-Despite being given a pre-determined time in the form of an [Unix
+Despite being given a pre-determined time in the form of a [Unix
time](https://en.wikipedia.org/wiki/Unix_time) (also called *epoch*),
this output would fail to be reproducible in a different timezone
than UTC+0100. The easy solution is to set the required environment
diff --git a/_docs/version_information.md b/_docs/version_information.md
index dca49ba..c2b04b4 100644
--- a/_docs/version_information.md
+++ b/_docs/version_information.md
@@ -4,13 +4,13 @@ layout: docs
permalink: /docs/version-information/
---
-Version information embedded in the software need to be made
+Version information embedded in the software needs to be made
deterministic. Counter-examples are using the current date or an
incremental build counter.
The date and time of the build itself is hardly of value as an old
source code can always be compiled long after it has been released.
-It's best when version information give a good indication of what source
+It's best when version information gives a good indication of what source
code has been built.
The version number can come from a dedicated source file, a *changelog*,
diff --git a/_docs/volatile_inputs.md b/_docs/volatile_inputs.md
index 43fb745..d0c1157 100644
--- a/_docs/volatile_inputs.md
+++ b/_docs/volatile_inputs.md
@@ -21,6 +21,6 @@ contain a list of
[`MASTER_SITES`](https://www.freebsd.org/doc/en/books/porters-handbook/makefile-distfiles.html#makefile-master_sites),
a list of files to be retrieved in `DISTFILES`, and a `distinfo` file
with cryptographic checksums for each of these files. The FreeBSD
-infrastructure ensure that a copy of all *distfiles* are kept available
+infrastructure ensures that a copy of all *distfiles* are kept available
on a mirror network. When building a port, the files will be downloaded
from there if the original *master site* is unreachable.
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/reproducible/reproducible-website.git
More information about the Reproducible-commits
mailing list