Fix typos.

This commit is contained in:
Haosdent Huang 2019-06-09 15:34:53 +08:00
parent 5fe910191a
commit 7ce6e71891
12 changed files with 12 additions and 12 deletions

View File

@ -116,7 +116,7 @@ func (d *DataDirectory) String() string {
} }
// VersionFile provides utilities for reading and writing version.txt files // VersionFile provides utilities for reading and writing version.txt files
// to etcd "data-dir" for tracking the etcd server and storage verions // to etcd "data-dir" for tracking the etcd server and storage versions
// of the data in the directory. // of the data in the directory.
type VersionFile struct { type VersionFile struct {
path string path string

View File

@ -494,7 +494,7 @@ function dump_nodes_with_logexporter() {
if find_non_logexported_nodes; then if find_non_logexported_nodes; then
break break
else else
echo "Attempt ${retry} failed to list marker files for succeessful nodes" echo "Attempt ${retry} failed to list marker files for successful nodes"
if [[ "${retry}" == 10 ]]; then if [[ "${retry}" == 10 ]]; then
echo "Final attempt to list marker files failed.. falling back to logdump through SSH" echo "Final attempt to list marker files failed.. falling back to logdump through SSH"
"${KUBECTL}" delete namespace "${logexporter_namespace}" || true "${KUBECTL}" delete namespace "${logexporter_namespace}" || true

View File

@ -320,7 +320,7 @@ func ValidateCertSANs(altnames []string, fldPath *field.Path) field.ErrorList {
return allErrs return allErrs
} }
// ValidateURLs validates the URLs given in the string slice, makes sure they are parseable. Optionally, it can enforcs HTTPS usage. // ValidateURLs validates the URLs given in the string slice, makes sure they are parsable. Optionally, it can enforces HTTPS usage.
func ValidateURLs(urls []string, requireHTTPS bool, fldPath *field.Path) field.ErrorList { func ValidateURLs(urls []string, requireHTTPS bool, fldPath *field.Path) field.ErrorList {
allErrs := field.ErrorList{} allErrs := field.ErrorList{}
for _, urlstr := range urls { for _, urlstr := range urls {

View File

@ -87,7 +87,7 @@ func TestNewInitData(t *testing.T) {
expectError: true, expectError: true,
}, },
{ {
name: "fail if deprecetes feature gates are set", name: "fail if deprecated feature gates are set",
flags: map[string]string{ flags: map[string]string{
options.FeatureGatesString: fmt.Sprintf("%s=true", features.CoreDNS), options.FeatureGatesString: fmt.Sprintf("%s=true", features.CoreDNS),
}, },

View File

@ -31,7 +31,7 @@ func TestExpirationInfo(t *testing.T) {
e := newExpirationInfo("x", cert, false) e := newExpirationInfo("x", cert, false)
if math.Abs(float64(validity-e.ResidualTime())) > float64(5*time.Second) { // using 5s of tolerance becase the function is not determinstic (it uses time.Now()) and we want to avoid flakes if math.Abs(float64(validity-e.ResidualTime())) > float64(5*time.Second) { // using 5s of tolerance because the function is not deterministic (it uses time.Now()) and we want to avoid flakes
t.Errorf("expected IsInRenewalWindow equal to %v, saw %v", validity, e.ResidualTime()) t.Errorf("expected IsInRenewalWindow equal to %v, saw %v", validity, e.ResidualTime())
} }
} }

View File

@ -1016,7 +1016,7 @@ func RunOptionalJoinNodeChecks(execer utilsexec.Interface, cfg *kubeadmapi.Clust
return RunChecks(checks, os.Stderr, ignorePreflightErrors) return RunChecks(checks, os.Stderr, ignorePreflightErrors)
} }
// addCommonChecks is a helper function to deplicate checks that are common between both the // addCommonChecks is a helper function to duplicate checks that are common between both the
// kubeadm init and join commands // kubeadm init and join commands
func addCommonChecks(execer utilsexec.Interface, k8sVersion string, nodeReg *kubeadmapi.NodeRegistrationOptions, checks []Checker) []Checker { func addCommonChecks(execer utilsexec.Interface, k8sVersion string, nodeReg *kubeadmapi.NodeRegistrationOptions, checks []Checker) []Checker {
containerRuntime, err := utilruntime.NewContainerRuntime(execer, nodeReg.CRISocket) containerRuntime, err := utilruntime.NewContainerRuntime(execer, nodeReg.CRISocket)

View File

@ -248,7 +248,7 @@ func TestPullImage(t *testing.T) {
{"valid: pull image using CRI", "unix:///var/run/crio/crio.sock", "image1", false}, {"valid: pull image using CRI", "unix:///var/run/crio/crio.sock", "image1", false},
{"invalid: CRI pull error", "unix:///var/run/crio/crio.sock", "image2", true}, {"invalid: CRI pull error", "unix:///var/run/crio/crio.sock", "image2", true},
{"valid: pull image using docker", constants.DefaultDockerCRISocket, "image1", false}, {"valid: pull image using docker", constants.DefaultDockerCRISocket, "image1", false},
{"invalide: docer pull error", constants.DefaultDockerCRISocket, "image2", true}, {"invalid: docker pull error", constants.DefaultDockerCRISocket, "image2", true},
} }
for _, tc := range cases { for _, tc := range cases {

View File

@ -16,7 +16,7 @@ limitations under the License.
package system package system
// KernelConfig defines one kernel configration item. // KernelConfig defines one kernel configuration item.
type KernelConfig struct { type KernelConfig struct {
// Name is the general name of the kernel configuration. It is used to // Name is the general name of the kernel configuration. It is used to
// match kernel configuration. // match kernel configuration.

View File

@ -54,7 +54,7 @@ type EndpointsHandler interface {
// OnEndpointsUpdate is called whenever modification of an existing // OnEndpointsUpdate is called whenever modification of an existing
// endpoints object is observed. // endpoints object is observed.
OnEndpointsUpdate(oldEndpoints, endpoints *v1.Endpoints) OnEndpointsUpdate(oldEndpoints, endpoints *v1.Endpoints)
// OnEndpointsDelete is called whever deletion of an existing endpoints // OnEndpointsDelete is called whenever deletion of an existing endpoints
// object is observed. // object is observed.
OnEndpointsDelete(endpoints *v1.Endpoints) OnEndpointsDelete(endpoints *v1.Endpoints)
// OnEndpointsSynced is called once all the initial event handlers were // OnEndpointsSynced is called once all the initial event handlers were

View File

@ -556,7 +556,7 @@ func (proxier *Proxier) OnEndpointsUpdate(oldEndpoints, endpoints *v1.Endpoints)
} }
} }
// OnEndpointsDelete is called whever deletion of an existing endpoints // OnEndpointsDelete is called whenever deletion of an existing endpoints
// object is observed. // object is observed.
func (proxier *Proxier) OnEndpointsDelete(endpoints *v1.Endpoints) { func (proxier *Proxier) OnEndpointsDelete(endpoints *v1.Endpoints) {
proxier.OnEndpointsUpdate(endpoints, nil) proxier.OnEndpointsUpdate(endpoints, nil)

View File

@ -25,7 +25,7 @@ type FakeCustomStore struct {
ListKeysFunc func() []string ListKeysFunc func() []string
GetFunc func(obj interface{}) (item interface{}, exists bool, err error) GetFunc func(obj interface{}) (item interface{}, exists bool, err error)
GetByKeyFunc func(key string) (item interface{}, exists bool, err error) GetByKeyFunc func(key string) (item interface{}, exists bool, err error)
ReplaceFunc func(list []interface{}, resourceVerion string) error ReplaceFunc func(list []interface{}, resourceVersion string) error
ResyncFunc func() error ResyncFunc func() error
} }

View File

@ -161,7 +161,7 @@ type TestContextType struct {
// The DNS Domain of the cluster. // The DNS Domain of the cluster.
ClusterDNSDomain string ClusterDNSDomain string
// The configration of NodeKiller. // The configuration of NodeKiller.
NodeKiller NodeKillerConfig NodeKiller NodeKillerConfig
} }