Skip to content

Commit 02ebb4c

Browse files
authored
docs: Fix typos in documentation (#8361)
1 parent 7b10def commit 02ebb4c

File tree

14 files changed

+16
-16
lines changed

14 files changed

+16
-16
lines changed

docs/community/contribute/checks/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ The package name should be in the format `builtin.PROVIDER.SERVICE.ID`, e.g. `bu
8080

8181
## Generating an ID
8282

83-
Every check has a custom ID that is referenced throughout the metadata of the check to uniquely identify the check. If you plan to contribue your check back into the [trivy-checks](https://github.com/aquasecurity/trivy-checks) repository, it will require a valid ID.
83+
Every check has a custom ID that is referenced throughout the metadata of the check to uniquely identify the check. If you plan to contribute your check back into the [trivy-checks](https://github.com/aquasecurity/trivy-checks) repository, it will require a valid ID.
8484

8585
Running `make id` in the root of the trivy-checks repository will provide you with the next available _ID_ for your rule.
8686

docs/community/contribute/checks/service-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ type AWS struct {
5757

5858
### Update Adapters
5959

60-
Now you'll need to update all of the [adapters](https://github.com/aquasecurity/trivy/tree/main/pkg/iac/adapters) which populate the struct of the provider that you have been using. Following the example above, if you want to add support for CodeBuild in Terraform, you'll need to update the Terraform AWS adatper as shown here: [`trivy/pkg/iac/adapters/terraform/aws/codebuild/adapt.go`](https://github.com/aquasecurity/trivy/blob/main/pkg/iac/adapters/terraform/aws/codebuild/adapt.go).
60+
Now you'll need to update all of the [adapters](https://github.com/aquasecurity/trivy/tree/main/pkg/iac/adapters) which populate the struct of the provider that you have been using. Following the example above, if you want to add support for CodeBuild in Terraform, you'll need to update the Terraform AWS adapter as shown here: [`trivy/pkg/iac/adapters/terraform/aws/codebuild/adapt.go`](https://github.com/aquasecurity/trivy/blob/main/pkg/iac/adapters/terraform/aws/codebuild/adapt.go).
6161

6262
Another example for updating the adapters is provided in the [following PR.](https://github.com/aquasecurity/defsec/pull/1000/files) Additionally, please refer to the respective Terraform documentation on the provider to which you are adding the service. For instance, the Terraform documentation for AWS CodeBuild is provided [here.](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/codebuild_project)
6363

docs/docs/compliance/compliance.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ Example of how to define command data under [commands folder](https://github.com
166166
title: kubelet.conf file permissions
167167
nodeType: worker
168168
audit: stat -c %a $kubelet.kubeconfig
169-
platfroms:
169+
platforms:
170170
- k8s
171171
- aks
172172
```
@@ -181,7 +181,7 @@ make command-id
181181

182182
#### Command Key
183183

184-
- Re-use an existing key or specifiy a new one (make sure key name has no spaces)
184+
- Re-use an existing key or specify a new one (make sure key name has no spaces)
185185

186186
Note: The key value should match the key name evaluated by the Rego check.
187187

@@ -198,7 +198,7 @@ Specify the node type on which the command is supposed to run.
198198

199199
### Command Audit
200200

201-
Specify here the shell command to be used please make sure to add error supression (2>/dev/null)
201+
Specify here the shell command to be used please make sure to add error suppression (2>/dev/null)
202202

203203
### Command Platforms
204204

docs/docs/compliance/contrib-compliance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Thus, we can use the information already present:
5656
```
5757

5858
- The `ID`, `name`, and `description` is taken directly from the AWS EKS CIS Benchmarks
59-
- The `check` and `severity` are taken from the existing complaince check in the `k8s-cis-1.23.yaml`
59+
- The `check` and `severity` are taken from the existing compliance check in the `k8s-cis-1.23.yaml`
6060

6161

6262
#### 2. Referencing a check manually that is not part of the Trivy default checks

docs/docs/coverage/language/golang.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ $ trivy rootfs ./your_binary
100100
It doesn't work with UPX-compressed binaries.
101101

102102
### Main Module
103-
Go binaries installed using the `go install` command contains correct (semver) version for the main module and therefor are detected by Trivy.
103+
Go binaries installed using the `go install` command contains correct (semver) version for the main module and therefore are detected by Trivy.
104104
In other cases, Go uses the `(devel)` version[^2].
105105
In this case, Trivy will attempt to parse any `-ldflags` as it's a common practice to pass versions this way.
106106
If unsuccessful, the version will be empty[^3].

docs/docs/scanner/license.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ To enable extended license scanning, you can use `--license-full`.
2323
In addition to package licenses, Trivy scans source code files, Markdown documents, text files and `LICENSE` documents to identify license usage within the image or filesystem.
2424

2525
By default, Trivy only classifies licenses that are matched with a confidence level of 0.9 or more by the classifier.
26-
To configure the confidence level, you can use `--license-confidence-level`. This enables us to classify licenses that might be matched with a lower confidence level by the classifer.
26+
To configure the confidence level, you can use `--license-confidence-level`. This enables us to classify licenses that might be matched with a lower confidence level by the classifier.
2727

2828
!!! note
2929
The full license scanning is expensive. It takes a while.

docs/docs/scanner/misconfiguration/custom/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Services are defined within a provider. For instance, RDS is a service and AWS i
149149

150150
#### custom.input
151151

152-
The `input` tells Trivy what inputs this check should be applied to. Cloud provider checks should always use the `selector` input, and should always use the `type` selector with `cloud`. Check targeting Kubernetes yaml can use `kubenetes`, RBAC can use `rbac`, and so on.
152+
The `input` tells Trivy what inputs this check should be applied to. Cloud provider checks should always use the `selector` input, and should always use the `type` selector with `cloud`. Check targeting Kubernetes yaml can use `kubernetes`, RBAC can use `rbac`, and so on.
153153

154154
#### Subtypes in the custom data
155155

docs/docs/scanner/misconfiguration/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -407,7 +407,7 @@ If the schema is specified in the check metadata and is in the directory specifi
407407
If a user specifies the `--config-file-schemas` flag, all input IaC config files are ensured that they pass type-checking. It is not required to pass an input schema in case type checking is not required. This is helpful for scenarios where you simply want to write a Rego check and pass in IaC input for it. Such a use case could include scanning for a new service which Trivy might not support just yet.
408408
409409
!!! tip
410-
It is also possible to specify multiple input schemas with `--config-file-schema` flag as it can accept a comma seperated list of file paths or a directory as input. In the case of multiple schemas being specified, all of them will be evaluated against all the input files.
410+
It is also possible to specify multiple input schemas with `--config-file-schema` flag as it can accept a comma separated list of file paths or a directory as input. In the case of multiple schemas being specified, all of them will be evaluated against all the input files.
411411
412412
413413
### Passing custom data

docs/docs/target/container_image.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ See https://avd.aquasec.com/misconfig/ds005
144144
145145
LOW: Add HEALTHCHECK instruction in your Dockerfile
146146
════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════
147-
You shoud add HEALTHCHECK instruction in your docker container images to perform the health check on running containers.
147+
You should add HEALTHCHECK instruction in your docker container images to perform the health check on running containers.
148148
149149
See https://avd.aquasec.com/misconfig/ds026
150150
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────

docs/docs/target/kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ trivy k8s --report summary --disable-node-collector
180180
181181
The node-collector scan-job will run on every node. In case the node has been tainted, it is possible to add toleration to the scan job for it to be scheduled on the tainted node. for more details [see k8s docs](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/)
182182
183-
- `--tolerations key1=value1:NoExecute,key2=value2:NoSchedule` this flag wil enable node-collector to be schedule on tainted Node
183+
- `--tolerations key1=value1:NoExecute,key2=value2:NoSchedule` this flag will enable node-collector to be schedule on tainted Node
184184
185185
Example:
186186

docs/ecosystem/ide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Web application that allows to load a Trivy report in json format and displays t
5858

5959
## Trivy pre-commit (Community)
6060

61-
A trivy pre-commit hook that runs a `trivy fs` in your git repo before commiting, preventing you from commiting secrets in the first place.
61+
A trivy pre-commit hook that runs a `trivy fs` in your git repo before committing, preventing you from committing secrets in the first place.
6262

6363
👉 Get it at: <https://github.com/mxab/pre-commit-trivy>
6464

docs/getting-started/installation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ See their respective documentation for more information of how to install them a
167167
- [asdf](https://asdf-vm.com/guide/getting-started.html)
168168
- [mise](https://mise.jdx.dev/getting-started.html)
169169

170-
The plugin used by both tools is developped [here](https://github.com/zufardhiyaulhaq/asdf-trivy)
170+
The plugin used by both tools is developed [here](https://github.com/zufardhiyaulhaq/asdf-trivy)
171171

172172

173173
=== "asdf"

docs/tutorials/misconfiguration/custom-checks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Let's look at the check line by line:
8686
Note that Rego
8787

8888
* uses `AND` automatically to combine conditions in this check
89-
* automatically iterates through the array of commands in the Dockefile and allowed images
89+
* automatically iterates through the array of commands in the Dockerfile and allowed images
9090

9191
## Run the check in a Trivy misconfiguration scan
9292

docs/tutorials/misconfiguration/terraform.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Git clone the tutorial and cd into the directory:
3131
git clone [email protected]:Cloud-Native-Security/trivy-demo.git
3232
cd bad_iac/terraform
3333
```
34-
In this case, the folder only containes Terraform configuration files. However, you could scan a directory that contains several different configurations e.g. Kubernetes YAML manifests, Dockerfile, and Terraform. Trivy will then detect the different configuration files and apply the right rules automatically.
34+
In this case, the folder only contains Terraform configuration files. However, you could scan a directory that contains several different configurations e.g. Kubernetes YAML manifests, Dockerfile, and Terraform. Trivy will then detect the different configuration files and apply the right rules automatically.
3535

3636
## Different types of `trivy config` scans
3737

0 commit comments

Comments
 (0)