mirror of
https://github.com/rancher/rke.git
synced 2025-08-09 18:58:38 +00:00
update misspelled common words
This commit is contained in:
parent
ead2709100
commit
1cc26ee373
@ -94,7 +94,7 @@ func saveClusterCerts(kubeClient *kubernetes.Clientset, crts map[string]pki.Cert
|
|||||||
return fmt.Errorf("Failed to save certificate [%s] to kubernetes: %v", crtName, err)
|
return fmt.Errorf("Failed to save certificate [%s] to kubernetes: %v", crtName, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
logrus.Infof("[certificates] Successfuly saved certificates as kubernetes secret [%s]", pki.CertificatesSecretName)
|
logrus.Infof("[certificates] Successfully saved certificates as kubernetes secret [%s]", pki.CertificatesSecretName)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -51,7 +51,7 @@ func (c *Cluster) GetClusterState() (*Cluster, error) {
|
|||||||
logrus.Warnf("Failed to initiate new Kubernetes Client: %v", err)
|
logrus.Warnf("Failed to initiate new Kubernetes Client: %v", err)
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
// Get pervious kubernetes state
|
// Get previous kubernetes state
|
||||||
currentCluster = getStateFromKubernetes(c.KubeClient, c.LocalKubeConfigPath)
|
currentCluster = getStateFromKubernetes(c.KubeClient, c.LocalKubeConfigPath)
|
||||||
// Get previous kubernetes certificates
|
// Get previous kubernetes certificates
|
||||||
if currentCluster != nil {
|
if currentCluster != nil {
|
||||||
|
@ -17,7 +17,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
comments = `# If you intened to deploy Kubernetes in an air-gapped envrionment,
|
comments = `# If you intened to deploy Kubernetes in an air-gapped environment,
|
||||||
# please consult the documentation on how to configure custom RKE images.`
|
# please consult the documentation on how to configure custom RKE images.`
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -111,7 +111,7 @@ func DoRemoveContainer(dClient *client.Client, containerName, hostname string) e
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
logrus.Infof("[remove/%s] Sucessfully removed container on host [%s]", containerName, hostname)
|
logrus.Infof("[remove/%s] Successfully removed container on host [%s]", containerName, hostname)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -64,7 +64,7 @@ func TestKubeletConfig(t *testing.T) {
|
|||||||
assertEqual(t, true, hostCfg.PidMode.IsHost(),
|
assertEqual(t, true, hostCfg.PidMode.IsHost(),
|
||||||
"Failed to verify that Kubelet has host PID mode")
|
"Failed to verify that Kubelet has host PID mode")
|
||||||
assertEqual(t, true, hostCfg.NetworkMode.IsHost(),
|
assertEqual(t, true, hostCfg.NetworkMode.IsHost(),
|
||||||
"Failed to verify that Kubelet has host Netowrk mode")
|
"Failed to verify that Kubelet has host Network mode")
|
||||||
assertEqual(t, isStringInSlice(TestKubeletEtcdNodeLabel, imageCfg.Cmd), true,
|
assertEqual(t, isStringInSlice(TestKubeletEtcdNodeLabel, imageCfg.Cmd), true,
|
||||||
fmt.Sprintf("Failed to find [%s] in Kubelet Command", TestKubeletEtcdNodeLabel))
|
fmt.Sprintf("Failed to find [%s] in Kubelet Command", TestKubeletEtcdNodeLabel))
|
||||||
assertEqual(t, isStringInSlice(TestKubeletCPNodeLabel, imageCfg.Cmd), true,
|
assertEqual(t, isStringInSlice(TestKubeletCPNodeLabel, imageCfg.Cmd), true,
|
||||||
|
@ -30,5 +30,5 @@ func TestKubeproxyConfig(t *testing.T) {
|
|||||||
assertEqual(t, true, hostCfg.Privileged,
|
assertEqual(t, true, hostCfg.Privileged,
|
||||||
"Failed to verify that KubeProxy is privileged")
|
"Failed to verify that KubeProxy is privileged")
|
||||||
assertEqual(t, true, hostCfg.NetworkMode.IsHost(),
|
assertEqual(t, true, hostCfg.NetworkMode.IsHost(),
|
||||||
"Failed to verify that KubeProxy has host Netowrk mode")
|
"Failed to verify that KubeProxy has host Network mode")
|
||||||
}
|
}
|
||||||
|
@ -45,5 +45,5 @@ func TestNginxProxyConfig(t *testing.T) {
|
|||||||
assertEqual(t, TestNginxProxyImage, imageCfg.Image,
|
assertEqual(t, TestNginxProxyImage, imageCfg.Image,
|
||||||
fmt.Sprintf("Failed to verify [%s] as Nginx Proxy Image", TestNginxProxyImage))
|
fmt.Sprintf("Failed to verify [%s] as Nginx Proxy Image", TestNginxProxyImage))
|
||||||
assertEqual(t, true, hostCfg.NetworkMode.IsHost(),
|
assertEqual(t, true, hostCfg.NetworkMode.IsHost(),
|
||||||
"Failed to verify that Nginx Proxy has host Netowrk mode")
|
"Failed to verify that Nginx Proxy has host Network mode")
|
||||||
}
|
}
|
||||||
|
@ -28,5 +28,5 @@ func TestSchedulerConfig(t *testing.T) {
|
|||||||
assertEqual(t, isStringInSlice(TestSchedulerExtraArgs, imageCfg.Entrypoint), true,
|
assertEqual(t, isStringInSlice(TestSchedulerExtraArgs, imageCfg.Entrypoint), true,
|
||||||
fmt.Sprintf("Failed to find [%s] in Scheduler extra args", TestSchedulerExtraArgs))
|
fmt.Sprintf("Failed to find [%s] in Scheduler extra args", TestSchedulerExtraArgs))
|
||||||
assertEqual(t, true, hostCfg.NetworkMode.IsHost(),
|
assertEqual(t, true, hostCfg.NetworkMode.IsHost(),
|
||||||
"Failed to verify that Scheduler has host Netowrk mode")
|
"Failed to verify that Scheduler has host Network mode")
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user