Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: fix typos #4597

Merged
merged 1 commit into from Jan 9, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/source/commands/peerlifecycle.md
Expand Up @@ -512,7 +512,7 @@ This command will be useful, for example, in the following cases:
* To check whether a particular chaincode package is installed or not without
installing that package.

Calcuate the package ID for the `mycc.tar.gz` package:
Calculate the package ID for the `mycc.tar.gz` package:

```
peer lifecycle chaincode calculatepackageid mycc.tar.gz
Expand Down
4 changes: 2 additions & 2 deletions docs/source/orderer/ordering_service.md
Expand Up @@ -39,7 +39,7 @@ policies that the relevant administrators set when they created the channel.
Configuration transactions are processed by the orderer,
as it needs to know the current set of policies to execute its basic
form of access control. In this case, the orderer processes the
configuration update to make sure that the requestor has the proper
configuration update to make sure that the requester has the proper
administrative rights. If so, the orderer validates the update request against
the existing configuration, generates a new configuration transaction,
and packages it into a block that is relayed to all peers on the channel. The
Expand Down Expand Up @@ -367,7 +367,7 @@ the BFT protocol withstands failures of up to (and not including) a third of the
If a third or more of the nodes crash or are unreachable, no blocks can be agreed upon.

The advantage of the BFT orderer over the Raft orderer is that it can withstand some of the nodes being compromised.
Indeed, if up to (but not including) a third of the orderer nodes are controlled by a malicous party,
Indeed, if up to (but not including) a third of the orderer nodes are controlled by a malicious party,
the system can still accept new transactions, order them, and most importantly ensure the same blocks are committed
by the rest of the ordering nodes. This is in contrast to Raft, which is not suitable to be deployed in such a harsh adversary model.

Expand Down
2 changes: 1 addition & 1 deletion docs/source/prereqs.md
Expand Up @@ -147,7 +147,7 @@ Finally, you need to ensure Docker Desktop has integration enabled for your dist

### Microsoft VS Code (Optional)

Microsoft VS Code provides an IDE that has tight integration with WSL2 Linux Distibutions. Search the Microsoft Marketplace in VS Code for the Remote Development extension pack for more information. This pack includes, among other things, the `Remote - WSL extension` and the `Remote - Containers` extension.
Microsoft VS Code provides an IDE that has tight integration with WSL2 Linux Distributions. Search the Microsoft Marketplace in VS Code for the Remote Development extension pack for more information. This pack includes, among other things, the `Remote - WSL extension` and the `Remote - Containers` extension.

### Git For Windows (Optional)

Expand Down
2 changes: 1 addition & 1 deletion docs/source/security_model.md
Expand Up @@ -87,7 +87,7 @@ Ordering service nodes have an identity of their own, and are managed by an admi

For more information see the [Ordering Nodes and Identity topic](./orderer/ordering_service.html#orderer-nodes-and-identity) and [Ordering Node Deployment and Administration topic](./deployorderer/ordererdeploy.html).

## Tranport Layer Security (TLS)
## Transport Layer Security (TLS)

Fabric supports secure communication between nodes using Transport Layer Security (TLS).
TLS communication can use both one-way (server only) and two-way (server and client) authentication.
Expand Down