Skip to content

Commit 32c2cea

Browse files
committed
Remove future tense from man pages
Remove all will, would, could, should and use present tense. Signed-off-by: Daniel J Walsh <[email protected]>
1 parent 3c8d120 commit 32c2cea

File tree

169 files changed

+619
-629
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

169 files changed

+619
-629
lines changed

RELEASE_PROCESS.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ development efforts occur on the *main* branch. Branches with a
2222
be dedicated to writing release notes.
2323
* For a **minor** or **patch** release, you have 2-4 hours of time available
2424
(minimum depends largely on the speed/reliability of automated testing)
25-
* You will annouce the release on the proper platforms
25+
* You will announce the release on the proper platforms
2626
(i.e. Podman blog, Twitter, Mastodon Podman and Podman-Desktop mailing lists)
2727

2828
# Releases

docs/source/Introduction.rst

+2-2
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You can poke around in the busybox container for a while, but you’ll quickly f
3030

3131
There’s an old saying that “nobody runs an operating system just to run an operating system” and the same is true with containers. It’s the workload running on top of an operating system or in a container that’s interesting and valuable.
3232

33-
Sometimes we can find a publicly available container image for the exact workload we’re looking for and it will already be packaged exactly how we want. But, more often than not, there’s something that we want to add, remove, or customize. It could be as simple as a configuration setting for security or performance, or as complex as adding a complex workload. Either way, containers make it fairly easy to make the changes we need.
33+
Sometimes we can find a publicly available container image for the exact workload we’re looking for and it will already be packaged exactly how we want. But, more often than not, there’s something that we want to add, remove, or customize. It can be as simple as a configuration setting for security or performance, or as complex as adding a complex workload. Either way, containers make it fairly easy to make the changes we need.
3434

3535
Container Images aren’t actually images, they’re repositories often made up of multiple layers. These layers can easily be added, saved, and shared with others by using a Containerfile (Dockerfile). This single file often contains all the instructions needed to build a new container image and can easily be shared with others publicly using tools like GitHub.
3636

@@ -49,7 +49,7 @@ Output::
4949
<p><em>Thank you for using nginx.</em></p>
5050
...
5151

52-
Building new images is great, but sharing our work with others let’s them review our work, critique how we built them, and offer improved versions. Our newly built Nginx image could be published at quay.io or docker.io to share it with the world. Everything needed to run the Nginx application is provided in the container image. Others could easily pull it down and use it, or make improvements to it.
52+
Building new images is great, but sharing our work with others lets them review our work, critique how we built them, and offer improved versions. Our newly built Nginx image can be published at quay.io or docker.io to share it with the world. Everything needed to run the Nginx application is provided in the container image. Others can easily pull it down and use it, or make improvements to it.
5353

5454
Standardizing on container images and `Container Registries`_ enable a new level of collaboration through simple consumption. This simple consumption model is possible because every major Container Engine and Registry Server uses the Open Containers Initiative (OCI_) format. This allows users to find, run, build, share and deploy containers anywhere they want. Podman and other `Container Engines`_ like CRI-O, Docker, or containerd can create and consume container images from docker.io, quay.io, an on premise registry or even one provided by a cloud provider. The OCI image format facilitates this ecosystem through a single standard.
5555

docs/source/markdown/options/README.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -16,12 +16,12 @@ The files here are included in `podman-*.md.in` files using the `@@option`
1616
mechanism:
1717

1818
```
19-
@@option foo ! will include options/foo.md
19+
@@option foo ! includes options/foo.md
2020
```
2121

2222
The tool that does this is `hack/markdown-preprocess`. It is a python
2323
script because it needs to run on `readthedocs.io`. From a given `.md.in`
24-
file, this script will create a `.md` file that can then be read by
24+
file, this script creates a `.md` file that can then be read by
2525
`go-md2man`, `sphinx`, anything that groks markdown. This runs as
2626
part of `make docs`.
2727

@@ -32,11 +32,11 @@ Some options are almost identical except for 'pod' vs 'container'
3232
differences. For those, use `<<text for pods|text for containers>>`.
3333
Order is immaterial: the important thing is the presence of the
3434
string "`pod`" in one half but not the other. The correct string
35-
will be chosen based on the filename: if the file contains `-pod`,
35+
is chosen based on the filename: if the file contains `-pod`,
3636
such as `podman-pod-create`, the string with `pod` (case-insensitive)
37-
in it will be chosen.
37+
in it is chosen.
3838

39-
The string `<<subcommand>>` will be replaced with the podman subcommand
39+
The string `<<subcommand>>` is replaced with the podman subcommand
4040
as determined from the filename, e.g., `create` for `podman-create.1.md.in`.
4141
This allows the shared use of examples in the option file:
4242
```
@@ -54,7 +54,7 @@ back-ticks in the front and the end of the line. For instance:
5454

5555
\`\`\`Some man page text\`\`\`
5656

57-
This is currently not allowed and will cause a corruption of the
57+
This is currently not allowed and causes a corruption of the
5858
compiled man page. Instead, put the three back-ticks on separate
5959
lines like:
6060

docs/source/markdown/options/arch.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@
44
####> are applicable to all of those.
55
#### **--arch**=*ARCH*
66
Override the architecture, defaults to hosts, of the image to be pulled. For example, `arm`.
7-
Unless overridden, subsequent lookups of the same image in the local storage will match this architecture, regardless of the host.
7+
Unless overridden, subsequent lookups of the same image in the local storage matches this architecture, regardless of the host.

docs/source/markdown/options/cgroup-parent.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,6 @@
44
####> are applicable to all of those.
55
#### **--cgroup-parent**=*path*
66

7-
Path to cgroups under which the cgroup for the <<container|pod>> will be created. If the
7+
Path to cgroups under which the cgroup for the <<container|pod>> is created. If the
88
path is not absolute, the path is considered to be relative to the cgroups path
9-
of the init process. Cgroups will be created if they do not already exist.
9+
of the init process. Cgroups are created if they do not already exist.

docs/source/markdown/options/cgroups.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@
44
####> are applicable to all of those.
55
#### **--cgroups**=*how*
66

7-
Determines whether the container will create CGroups.
7+
Determines whether the container creates CGroups.
88

99
Default is **enabled**.
1010

11-
The **enabled** option will create a new cgroup under the cgroup-parent.
12-
The **disabled** option will force the container to not create CGroups, and thus conflicts with CGroup options (**--cgroupns** and **--cgroup-parent**).
11+
The **enabled** option creates a new cgroup under the cgroup-parent.
12+
The **disabled** option forces the container to not create CGroups, and thus conflicts with CGroup options (**--cgroupns** and **--cgroup-parent**).
1313
The **no-conmon** option disables a new CGroup only for the **conmon** process.
1414
The **split** option splits the current CGroup in two sub-cgroups: one for conmon and one for the container payload. It is not possible to set **--cgroup-parent** with **split**.

docs/source/markdown/options/chrootdirs.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,6 @@
44
####> are applicable to all of those.
55
#### **--chrootdirs**=*path*
66

7-
Path to a directory inside the container that should be treated as a `chroot` directory.
8-
Any Podman managed file (e.g., /etc/resolv.conf, /etc/hosts, etc/hostname) that is mounted into the root directory will be mounted into that location as well.
9-
Multiple directories should be separated with a comma.
7+
Path to a directory inside the container that is treated as a `chroot` directory.
8+
Any Podman managed file (e.g., /etc/resolv.conf, /etc/hosts, etc/hostname) that is mounted into the root directory is mounted into that location as well.
9+
Multiple directories are separated with a comma.

docs/source/markdown/options/cidfile.write.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@
44
####> are applicable to all of those.
55
#### **--cidfile**=*file*
66

7-
Write the container ID to *file*. The file will be removed along with the container.
7+
Write the container ID to *file*. The file is removed along with the container.

docs/source/markdown/options/cpu-period.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@
55
#### **--cpu-period**=*limit*
66

77
Set the CPU period for the Completely Fair Scheduler (CFS), which is a
8-
duration in microseconds. Once the container's CPU quota is used up, it will
9-
not be scheduled to run until the current period ends. Defaults to 100000
8+
duration in microseconds. Once the container's CPU quota is used up, it will not
9+
be scheduled to run until the current period ends. Defaults to 100000
1010
microseconds.
1111

1212
On some systems, changing the resource limits may not be allowed for non-root

docs/source/markdown/options/cpu-quota.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Limit the CPU Completely Fair Scheduler (CFS) quota.
88

99
Limit the container's CPU usage. By default, containers run with the full
1010
CPU resource. The limit is a number in microseconds. If a number is provided,
11-
the container will be allowed to use that much CPU time until the CPU period
11+
the container is allowed to use that much CPU time until the CPU period
1212
ends (controllable via **--cpu-period**).
1313

1414
On some systems, changing the resource limits may not be allowed for non-root

docs/source/markdown/options/cpu-rt-runtime.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
Limit the CPU real-time runtime in microseconds.
88

99
Limit the containers Real Time CPU usage. This option tells the kernel to limit the amount of time in a given CPU period Real Time tasks may consume. Ex:
10-
Period of 1,000,000us and Runtime of 950,000us means that this container could consume 95% of available CPU and leave the remaining 5% to normal priority tasks.
10+
Period of 1,000,000us and Runtime of 950,000us means that this container can consume 95% of available CPU and leave the remaining 5% to normal priority tasks.
1111

1212
The sum of all runtimes across containers cannot exceed the amount allotted to the parent cgroup.
1313

docs/source/markdown/options/cpu-shares.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,14 @@ proportion can be modified by changing the container's CPU share weighting
1111
relative to the combined weight of all the running containers.
1212
Default weight is **1024**.
1313

14-
The proportion will only apply when CPU-intensive processes are running.
14+
The proportion only applies when CPU-intensive processes are running.
1515
When tasks in one container are idle, other containers can use the
16-
left-over CPU time. The actual amount of CPU time will vary depending on
16+
left-over CPU time. The actual amount of CPU time varies depending on
1717
the number of containers running on the system.
1818

1919
For example, consider three containers, one has a cpu-share of 1024 and
2020
two others have a cpu-share setting of 512. When processes in all three
21-
containers attempt to use 100% of CPU, the first container would receive
21+
containers attempt to use 100% of CPU, the first container receives
2222
50% of the total CPU time. If a fourth container is added with a cpu-share
2323
of 1024, the first container only gets 33% of the CPU. The remaining containers
2424
receive 16.5%, 16.5% and 33% of the CPU.

docs/source/markdown/options/cpuset-mems.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Memory nodes (MEMs) in which to allow execution (0-3, 0,1). Only effective on
88
NUMA systems.
99

1010
If there are four memory nodes on the system (0-3), use **--cpuset-mems=0,1**
11-
then processes in the container will only use memory from the first
11+
then processes in the container only uses memory from the first
1212
two memory nodes.
1313

1414
On some systems, changing the resource limits may not be allowed for non-root

docs/source/markdown/options/creds.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
#### **--creds**=*[username[:password]]*
66

77
The [username[:password]] to use to authenticate with the registry, if required.
8-
If one or both values are not supplied, a command line prompt will appear and the
8+
If one or both values are not supplied, a command line prompt appears and the
99
value can be entered. The password is entered without echo.
1010

1111
Note that the specified credentials are only used to authenticate against

docs/source/markdown/options/decryption-key.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@
44
####> are applicable to all of those.
55
#### **--decryption-key**=*key[:passphrase]*
66

7-
The [key[:passphrase]] to be used for decryption of images. Key can point to keys and/or certificates. Decryption will be tried with all keys. If the key is protected by a passphrase, it is required to be passed in the argument and omitted otherwise.
7+
The [key[:passphrase]] to be used for decryption of images. Key can point to keys and/or certificates. Decryption is tried with all keys. If the key is protected by a passphrase, it is required to be passed in the argument and omitted otherwise.

docs/source/markdown/options/detach-keys.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,6 @@
44
####> are applicable to all of those.
55
#### **--detach-keys**=*sequence*
66

7-
Specify the key sequence for detaching a container. Format is a single character `[a-Z]` or one or more `ctrl-<value>` characters where `<value>` is one of: `a-z`, `@`, `^`, `[`, `,` or `_`. Specifying "" will disable this feature. The default is *ctrl-p,ctrl-q*.
7+
Specify the key sequence for detaching a container. Format is a single character `[a-Z]` or one or more `ctrl-<value>` characters where `<value>` is one of: `a-z`, `@`, `^`, `[`, `,` or `_`. Specifying "" disables this feature. The default is *ctrl-p,ctrl-q*.
88

99
This option can also be set in **containers.conf**(5) file.

docs/source/markdown/options/device.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@ can be used to specify device permissions by combining
1010

1111
Example: **--device=/dev/sdc:/dev/xvdc:rwm**.
1212

13-
Note: if *host-device* is a symbolic link then it will be resolved first.
14-
The <<container|pod>> will only store the major and minor numbers of the host device.
13+
Note: if *host-device* is a symbolic link then it is resolved first.
14+
The <<container|pod>> only stores the major and minor numbers of the host device.
1515

1616
Podman may load kernel modules required for using the specified
17-
device. The devices that Podman will load modules for when necessary are:
17+
device. The devices that Podman loads modules for when necessary are:
1818
/dev/fuse.
1919

2020
In rootless mode, the new device is bind mounted in the container from the host

docs/source/markdown/options/dns.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ host DNS configuration is invalid for the container (e.g., **127.0.0.1**). When
1212
is the case the **--dns** flag is necessary for every run.
1313

1414
The special value **none** can be specified to disable creation of _/etc/resolv.conf_ in the container by Podman.
15-
The _/etc/resolv.conf_ file in the image will be used without changes.
15+
The _/etc/resolv.conf_ file in the image is used without changes.

docs/source/markdown/options/env-merge.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@
66

77
Preprocess default environment variables for the containers. For example
88
if image contains environment variable `hello=world` user can preprocess
9-
it using `--env-merge hello=${hello}-some` so new value will be `hello=world-some`.
9+
it using `--env-merge hello=${hello}-some` so new value is `hello=world-some`.

docs/source/markdown/options/env.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@
66

77
Set environment variables.
88

9-
This option allows arbitrary environment variables that are available for the process to be launched inside of the container. If an environment variable is specified without a value, Podman will check the host environment for a value and set the variable only if it is set on the host. As a special case, if an environment variable ending in __*__ is specified without a value, Podman will search the host environment for variables starting with the prefix and will add those variables to the container.
9+
This option allows arbitrary environment variables that are available for the process to be launched inside of the container. If an environment variable is specified without a value, Podman checks the host environment for a value and set the variable only if it is set on the host. As a special case, if an environment variable ending in __*__ is specified without a value, Podman searches the host environment for variables starting with the prefix and adds those variables to the container.

docs/source/markdown/options/follow.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,4 @@ Follow log output. Default is false.
88

99
Note: When following a <<container|pod>> which is removed by `podman <<container|pod>> rm`
1010
or removed on exit (`podman run --rm ...`), there is a chance that the log
11-
file will be removed before `podman<< pod|>> logs` reads the final content.
11+
file is removed before `podman<< pod|>> logs` reads the final content.

docs/source/markdown/options/gidmap.pod.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,5 @@
44
####> are applicable to all of those.
55
#### **--gidmap**=*pod_gid:host_gid:amount*
66

7-
GID map for the user namespace. Using this flag will run all containers in the pod with user namespace enabled.
7+
GID map for the user namespace. Using this flag runs all containers in the pod with user namespace enabled.
88
It conflicts with the **--userns** and **--subgidname** flags.

docs/source/markdown/options/health-cmd.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ Set or alter a healthcheck command for a container. The command is a command to
88
container that determines the container health. The command is required for other healthcheck options
99
to be applied. A value of **none** disables existing healthchecks.
1010

11-
Multiple options can be passed in the form of a JSON array; otherwise, the command will be interpreted
11+
Multiple options can be passed in the form of a JSON array; otherwise, the command is interpreted
1212
as an argument to **/bin/sh -c**.

docs/source/markdown/options/health-startup-cmd.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
####> are applicable to all of those.
55
#### **--health-startup-cmd**=*"command"* | *'["command", "arg1", ...]'*
66

7-
Set a startup healthcheck command for a container. This command will be executed inside the container and is used to gate the regular
8-
healthcheck. When the startup command succeeds, the regular healthcheck will begin and the startup healthcheck will cease. Optionally,
9-
if the command fails for a set number of attempts, the container will be restarted. A startup healthcheck can be used to ensure that
7+
Set a startup healthcheck command for a container. This command is executed inside the container and is used to gate the regular
8+
healthcheck. When the startup command succeeds, the regular healthcheck begins and the startup healthcheck ceases. Optionally,
9+
if the command fails for a set number of attempts, the container is restarted. A startup healthcheck can be used to ensure that
1010
containers with an extended startup period are not marked as unhealthy until they are fully started. Startup healthchecks can only be
1111
used when a regular healthcheck (from the container's image or the **--health-cmd** option) is also set.

docs/source/markdown/options/health-startup-retries.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,4 @@
44
####> are applicable to all of those.
55
#### **--health-startup-retries**=*retries*
66

7-
The number of attempts allowed before the startup healthcheck restarts the container. If set to **0**, the container will never be
8-
restarted. The default is **0**.
7+
The number of attempts allowed before the startup healthcheck restarts the container. If set to **0**, the container is never restarted. The default is **0**.

docs/source/markdown/options/health-startup-success.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,5 @@
44
####> are applicable to all of those.
55
#### **--health-startup-success**=*retries*
66

7-
The number of successful runs required before the startup healthcheck will succeed and the regular healthcheck will begin. A value
8-
of **0** means that any success will begin the regular healthcheck. The default is **0**.
7+
The number of successful runs required before the startup healthcheck succeeds and the regular healthcheck begins. A value
8+
of **0** means that any success begins the regular healthcheck. The default is **0**.

docs/source/markdown/options/hostname.container.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@
66

77
Container host name
88

9-
Sets the container host name that is available inside the container. Can only be used with a private UTS namespace `--uts=private` (default). If `--pod` is specified and the pod shares the UTS namespace (default) the pod's hostname will be used.
9+
Sets the container host name that is available inside the container. Can only be used with a private UTS namespace `--uts=private` (default). If `--pod` is specified and the pod shares the UTS namespace (default) the pod's hostname is used.

0 commit comments

Comments
 (0)