mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-22 03:11:40 +00:00
Fix typos.
This commit is contained in:
parent
5fe910191a
commit
7ce6e71891
@ -116,7 +116,7 @@ func (d *DataDirectory) String() string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// VersionFile provides utilities for reading and writing version.txt files
|
// VersionFile provides utilities for reading and writing version.txt files
|
||||||
// to etcd "data-dir" for tracking the etcd server and storage verions
|
// to etcd "data-dir" for tracking the etcd server and storage versions
|
||||||
// of the data in the directory.
|
// of the data in the directory.
|
||||||
type VersionFile struct {
|
type VersionFile struct {
|
||||||
path string
|
path string
|
||||||
|
@ -494,7 +494,7 @@ function dump_nodes_with_logexporter() {
|
|||||||
if find_non_logexported_nodes; then
|
if find_non_logexported_nodes; then
|
||||||
break
|
break
|
||||||
else
|
else
|
||||||
echo "Attempt ${retry} failed to list marker files for succeessful nodes"
|
echo "Attempt ${retry} failed to list marker files for successful nodes"
|
||||||
if [[ "${retry}" == 10 ]]; then
|
if [[ "${retry}" == 10 ]]; then
|
||||||
echo "Final attempt to list marker files failed.. falling back to logdump through SSH"
|
echo "Final attempt to list marker files failed.. falling back to logdump through SSH"
|
||||||
"${KUBECTL}" delete namespace "${logexporter_namespace}" || true
|
"${KUBECTL}" delete namespace "${logexporter_namespace}" || true
|
||||||
|
@ -320,7 +320,7 @@ func ValidateCertSANs(altnames []string, fldPath *field.Path) field.ErrorList {
|
|||||||
return allErrs
|
return allErrs
|
||||||
}
|
}
|
||||||
|
|
||||||
// ValidateURLs validates the URLs given in the string slice, makes sure they are parseable. Optionally, it can enforcs HTTPS usage.
|
// ValidateURLs validates the URLs given in the string slice, makes sure they are parsable. Optionally, it can enforces HTTPS usage.
|
||||||
func ValidateURLs(urls []string, requireHTTPS bool, fldPath *field.Path) field.ErrorList {
|
func ValidateURLs(urls []string, requireHTTPS bool, fldPath *field.Path) field.ErrorList {
|
||||||
allErrs := field.ErrorList{}
|
allErrs := field.ErrorList{}
|
||||||
for _, urlstr := range urls {
|
for _, urlstr := range urls {
|
||||||
|
@ -87,7 +87,7 @@ func TestNewInitData(t *testing.T) {
|
|||||||
expectError: true,
|
expectError: true,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "fail if deprecetes feature gates are set",
|
name: "fail if deprecated feature gates are set",
|
||||||
flags: map[string]string{
|
flags: map[string]string{
|
||||||
options.FeatureGatesString: fmt.Sprintf("%s=true", features.CoreDNS),
|
options.FeatureGatesString: fmt.Sprintf("%s=true", features.CoreDNS),
|
||||||
},
|
},
|
||||||
|
@ -31,7 +31,7 @@ func TestExpirationInfo(t *testing.T) {
|
|||||||
|
|
||||||
e := newExpirationInfo("x", cert, false)
|
e := newExpirationInfo("x", cert, false)
|
||||||
|
|
||||||
if math.Abs(float64(validity-e.ResidualTime())) > float64(5*time.Second) { // using 5s of tolerance becase the function is not determinstic (it uses time.Now()) and we want to avoid flakes
|
if math.Abs(float64(validity-e.ResidualTime())) > float64(5*time.Second) { // using 5s of tolerance because the function is not deterministic (it uses time.Now()) and we want to avoid flakes
|
||||||
t.Errorf("expected IsInRenewalWindow equal to %v, saw %v", validity, e.ResidualTime())
|
t.Errorf("expected IsInRenewalWindow equal to %v, saw %v", validity, e.ResidualTime())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1016,7 +1016,7 @@ func RunOptionalJoinNodeChecks(execer utilsexec.Interface, cfg *kubeadmapi.Clust
|
|||||||
return RunChecks(checks, os.Stderr, ignorePreflightErrors)
|
return RunChecks(checks, os.Stderr, ignorePreflightErrors)
|
||||||
}
|
}
|
||||||
|
|
||||||
// addCommonChecks is a helper function to deplicate checks that are common between both the
|
// addCommonChecks is a helper function to duplicate checks that are common between both the
|
||||||
// kubeadm init and join commands
|
// kubeadm init and join commands
|
||||||
func addCommonChecks(execer utilsexec.Interface, k8sVersion string, nodeReg *kubeadmapi.NodeRegistrationOptions, checks []Checker) []Checker {
|
func addCommonChecks(execer utilsexec.Interface, k8sVersion string, nodeReg *kubeadmapi.NodeRegistrationOptions, checks []Checker) []Checker {
|
||||||
containerRuntime, err := utilruntime.NewContainerRuntime(execer, nodeReg.CRISocket)
|
containerRuntime, err := utilruntime.NewContainerRuntime(execer, nodeReg.CRISocket)
|
||||||
|
@ -248,7 +248,7 @@ func TestPullImage(t *testing.T) {
|
|||||||
{"valid: pull image using CRI", "unix:///var/run/crio/crio.sock", "image1", false},
|
{"valid: pull image using CRI", "unix:///var/run/crio/crio.sock", "image1", false},
|
||||||
{"invalid: CRI pull error", "unix:///var/run/crio/crio.sock", "image2", true},
|
{"invalid: CRI pull error", "unix:///var/run/crio/crio.sock", "image2", true},
|
||||||
{"valid: pull image using docker", constants.DefaultDockerCRISocket, "image1", false},
|
{"valid: pull image using docker", constants.DefaultDockerCRISocket, "image1", false},
|
||||||
{"invalide: docer pull error", constants.DefaultDockerCRISocket, "image2", true},
|
{"invalid: docker pull error", constants.DefaultDockerCRISocket, "image2", true},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tc := range cases {
|
for _, tc := range cases {
|
||||||
|
@ -16,7 +16,7 @@ limitations under the License.
|
|||||||
|
|
||||||
package system
|
package system
|
||||||
|
|
||||||
// KernelConfig defines one kernel configration item.
|
// KernelConfig defines one kernel configuration item.
|
||||||
type KernelConfig struct {
|
type KernelConfig struct {
|
||||||
// Name is the general name of the kernel configuration. It is used to
|
// Name is the general name of the kernel configuration. It is used to
|
||||||
// match kernel configuration.
|
// match kernel configuration.
|
||||||
|
@ -54,7 +54,7 @@ type EndpointsHandler interface {
|
|||||||
// OnEndpointsUpdate is called whenever modification of an existing
|
// OnEndpointsUpdate is called whenever modification of an existing
|
||||||
// endpoints object is observed.
|
// endpoints object is observed.
|
||||||
OnEndpointsUpdate(oldEndpoints, endpoints *v1.Endpoints)
|
OnEndpointsUpdate(oldEndpoints, endpoints *v1.Endpoints)
|
||||||
// OnEndpointsDelete is called whever deletion of an existing endpoints
|
// OnEndpointsDelete is called whenever deletion of an existing endpoints
|
||||||
// object is observed.
|
// object is observed.
|
||||||
OnEndpointsDelete(endpoints *v1.Endpoints)
|
OnEndpointsDelete(endpoints *v1.Endpoints)
|
||||||
// OnEndpointsSynced is called once all the initial event handlers were
|
// OnEndpointsSynced is called once all the initial event handlers were
|
||||||
|
@ -556,7 +556,7 @@ func (proxier *Proxier) OnEndpointsUpdate(oldEndpoints, endpoints *v1.Endpoints)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// OnEndpointsDelete is called whever deletion of an existing endpoints
|
// OnEndpointsDelete is called whenever deletion of an existing endpoints
|
||||||
// object is observed.
|
// object is observed.
|
||||||
func (proxier *Proxier) OnEndpointsDelete(endpoints *v1.Endpoints) {
|
func (proxier *Proxier) OnEndpointsDelete(endpoints *v1.Endpoints) {
|
||||||
proxier.OnEndpointsUpdate(endpoints, nil)
|
proxier.OnEndpointsUpdate(endpoints, nil)
|
||||||
|
@ -25,7 +25,7 @@ type FakeCustomStore struct {
|
|||||||
ListKeysFunc func() []string
|
ListKeysFunc func() []string
|
||||||
GetFunc func(obj interface{}) (item interface{}, exists bool, err error)
|
GetFunc func(obj interface{}) (item interface{}, exists bool, err error)
|
||||||
GetByKeyFunc func(key string) (item interface{}, exists bool, err error)
|
GetByKeyFunc func(key string) (item interface{}, exists bool, err error)
|
||||||
ReplaceFunc func(list []interface{}, resourceVerion string) error
|
ReplaceFunc func(list []interface{}, resourceVersion string) error
|
||||||
ResyncFunc func() error
|
ResyncFunc func() error
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -161,7 +161,7 @@ type TestContextType struct {
|
|||||||
// The DNS Domain of the cluster.
|
// The DNS Domain of the cluster.
|
||||||
ClusterDNSDomain string
|
ClusterDNSDomain string
|
||||||
|
|
||||||
// The configration of NodeKiller.
|
// The configuration of NodeKiller.
|
||||||
NodeKiller NodeKillerConfig
|
NodeKiller NodeKillerConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user