https://goreportcard.com/report/github.com/openshift/origin#misspell
Vincent Behar authored on 2016/05/31 21:25:54... | ... |
@@ -2036,7 +2036,7 @@ |
2036 | 2036 |
"type": "string", |
2037 | 2037 |
"paramType": "query", |
2038 | 2038 |
"name": "sinceTime", |
2039 |
- "description": "sinceTime is an RFC3339 timestamp from which to show logs. If this value preceeds the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
|
2039 |
+ "description": "sinceTime is an RFC3339 timestamp from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
|
2040 | 2040 |
"required": false, |
2041 | 2041 |
"allowMultiple": false |
2042 | 2042 |
}, |
... | ... |
@@ -5289,7 +5289,7 @@ |
5289 | 5289 |
"type": "string", |
5290 | 5290 |
"paramType": "query", |
5291 | 5291 |
"name": "sinceTime", |
5292 |
- "description": "An RFC3339 timestamp from which to show logs. If this value preceeds the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
|
5292 |
+ "description": "An RFC3339 timestamp from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
|
5293 | 5293 |
"required": false, |
5294 | 5294 |
"allowMultiple": false |
5295 | 5295 |
}, |
... | ... |
@@ -21644,7 +21644,7 @@ |
21644 | 21644 |
}, |
21645 | 21645 |
"tag": { |
21646 | 21646 |
"$ref": "v1.TagReference", |
21647 |
- "description": "Tag is the spec tag associated with this image stream tag, and it may be null if only pushes have occured to this image stream." |
|
21647 |
+ "description": "Tag is the spec tag associated with this image stream tag, and it may be null if only pushes have occurred to this image stream." |
|
21648 | 21648 |
}, |
21649 | 21649 |
"generation": { |
21650 | 21650 |
"type": "integer", |
... | ... |
@@ -8,7 +8,7 @@ import ( |
8 | 8 |
) |
9 | 9 |
|
10 | 10 |
// Convert_runtime_Object_To_runtime_RawExtension is conversion function that assumes that the runtime.Object you've embedded is in |
11 |
-// the same GroupVersion that your containing type is in. This is signficantly better than simply breaking. |
|
11 |
+// the same GroupVersion that your containing type is in. This is significantly better than simply breaking. |
|
12 | 12 |
// Given an ordered list of preferred external versions for a given encode or conversion call, the behavior of this function could be |
13 | 13 |
// made generic, predictable, and controllable. |
14 | 14 |
func Convert_runtime_Object_To_runtime_RawExtension(in runtime.Object, out *runtime.RawExtension, s conversion.Scope) error { |
... | ... |
@@ -100,7 +100,7 @@ func createMissingScaleRefMarker(hpaNode *kubenodes.HorizontalPodAutoscalerNode, |
100 | 100 |
// can assume that it will be handled before this step. Therefore, we are only concerned with finding HPAs that are trying to |
101 | 101 |
// scale the same resources. |
102 | 102 |
// |
103 |
-// The algorithm that is used to implement this check is decribed as follows: |
|
103 |
+// The algorithm that is used to implement this check is described as follows: |
|
104 | 104 |
// - create a sub-graph containing only HPA nodes and other nodes that can be scaled, as well as any scaling edges or other |
105 | 105 |
// edges used to connect between objects that can be scaled |
106 | 106 |
// - for every resulting edge in the new sub-graph, create an edge in the reverse direction |
... | ... |
@@ -95,7 +95,7 @@ func (c *Fake) SearchWithPaging(searchRequest *ldap.SearchRequest, pagingSize ui |
95 | 95 |
return c.SearchResponse, nil |
96 | 96 |
} |
97 | 97 |
|
98 |
-// NewMatchingSearchErrorClient returns a new MatchingSeachError client sitting on top of the parent |
|
98 |
+// NewMatchingSearchErrorClient returns a new MatchingSearchError client sitting on top of the parent |
|
99 | 99 |
// client. This client returns the given error when a search base DN matches the given base DN, and |
100 | 100 |
// defers to the parent otherwise. |
101 | 101 |
func NewMatchingSearchErrorClient(parent ldap.Client, baseDN string, returnErr error) ldap.Client { |
... | ... |
@@ -250,7 +250,7 @@ func (m *VirtualStorage) ensurePolicyBindingToMaster(ctx kapi.Context, policyNam |
250 | 250 |
|
251 | 251 |
// getPolicyBindingForPolicy returns a PolicyBinding that points to the specified policyNamespace. It will autocreate ONLY if policyNamespace equals the master namespace |
252 | 252 |
func (m *VirtualStorage) getPolicyBindingForPolicy(ctx kapi.Context, policyNamespace string, allowAutoProvision bool) (*authorizationapi.PolicyBinding, error) { |
253 |
- // we can autocreate a PolicyBinding object if the RoleBinding is for the master namespace OR if we've been explicity told to create the policying binding. |
|
253 |
+ // we can autocreate a PolicyBinding object if the RoleBinding is for the master namespace OR if we've been explicitly told to create the policying binding. |
|
254 | 254 |
// the latter happens during priming |
255 | 255 |
if (policyNamespace == "") || allowAutoProvision { |
256 | 256 |
return m.ensurePolicyBindingToMaster(ctx, policyNamespace, authorizationapi.GetPolicyBindingName(policyNamespace)) |
... | ... |
@@ -875,7 +875,7 @@ type BuildLogOptions struct { |
875 | 875 |
// Only one of sinceSeconds or sinceTime may be specified. |
876 | 876 |
SinceSeconds *int64 |
877 | 877 |
// An RFC3339 timestamp from which to show logs. If this value |
878 |
- // preceeds the time a pod was started, only logs since the pod start will be returned. |
|
878 |
+ // precedes the time a pod was started, only logs since the pod start will be returned. |
|
879 | 879 |
// If this value is in the future, no logs will be returned. |
880 | 880 |
// Only one of sinceSeconds or sinceTime may be specified. |
881 | 881 |
SinceTime *unversioned.Time |
... | ... |
@@ -105,7 +105,7 @@ var map_BuildLogOptions = map[string]string{ |
105 | 105 |
"follow": "follow if true indicates that the build log should be streamed until the build terminates.", |
106 | 106 |
"previous": "previous returns previous build logs. Defaults to false.", |
107 | 107 |
"sinceSeconds": "sinceSeconds is a relative time in seconds before the current time from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
108 |
- "sinceTime": "sinceTime is an RFC3339 timestamp from which to show logs. If this value preceeds the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
|
108 |
+ "sinceTime": "sinceTime is an RFC3339 timestamp from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
|
109 | 109 |
"timestamps": "timestamps, If true, add an RFC3339 or RFC3339Nano timestamp at the beginning of every line of log output. Defaults to false.", |
110 | 110 |
"tailLines": "tailLines, If set, is the number of lines from the end of the logs to show. If not specified, logs are shown from the creation of the container or sinceSeconds or sinceTime", |
111 | 111 |
"limitBytes": "limitBytes, If set, is the number of bytes to read from the server before terminating the log output. This may not display a complete final line of logging, and may return slightly more or slightly less than the specified limit.", |
... | ... |
@@ -834,7 +834,7 @@ type BuildLogOptions struct { |
834 | 834 |
// Only one of sinceSeconds or sinceTime may be specified. |
835 | 835 |
SinceSeconds *int64 `json:"sinceSeconds,omitempty"` |
836 | 836 |
// sinceTime is an RFC3339 timestamp from which to show logs. If this value |
837 |
- // preceeds the time a pod was started, only logs since the pod start will be returned. |
|
837 |
+ // precedes the time a pod was started, only logs since the pod start will be returned. |
|
838 | 838 |
// If this value is in the future, no logs will be returned. |
839 | 839 |
// Only one of sinceSeconds or sinceTime may be specified. |
840 | 840 |
SinceTime *unversioned.Time `json:"sinceTime,omitempty"` |
... | ... |
@@ -773,7 +773,7 @@ type BuildLogOptions struct { |
773 | 773 |
// Only one of sinceSeconds or sinceTime may be specified. |
774 | 774 |
SinceSeconds *int64 `json:"sinceSeconds,omitempty"` |
775 | 775 |
// An RFC3339 timestamp from which to show logs. If this value |
776 |
- // preceeds the time a pod was started, only logs since the pod start will be returned. |
|
776 |
+ // precedes the time a pod was started, only logs since the pod start will be returned. |
|
777 | 777 |
// If this value is in the future, no logs will be returned. |
778 | 778 |
// Only one of sinceSeconds or sinceTime may be specified. |
779 | 779 |
SinceTime *unversioned.Time `json:"sinceTime,omitempty"` |
... | ... |
@@ -232,7 +232,7 @@ func (d *DockerBuilder) buildInfo() []dockerfile.KeyValue { |
232 | 232 |
// consume. |
233 | 233 |
func (d *DockerBuilder) buildLabels(dir string) []dockerfile.KeyValue { |
234 | 234 |
labels := map[string]string{} |
235 |
- // TODO: allow source info to be overriden by build |
|
235 |
+ // TODO: allow source info to be overridden by build |
|
236 | 236 |
sourceInfo := &git.SourceInfo{} |
237 | 237 |
if d.build.Spec.Source.Git != nil { |
238 | 238 |
var errors []error |
... | ... |
@@ -51,7 +51,7 @@ func readNetClsCGroup(reader io.Reader) string { |
51 | 51 |
} |
52 | 52 |
|
53 | 53 |
// getDockerNetworkMode determines whether the builder is running as a container |
54 |
-// by examining /proc/self/cgroup. This contenxt is then passed to source-to-image. |
|
54 |
+// by examining /proc/self/cgroup. This context is then passed to source-to-image. |
|
55 | 55 |
func getDockerNetworkMode() s2iapi.DockerNetworkMode { |
56 | 56 |
file, err := os.Open("/proc/self/cgroup") |
57 | 57 |
if err != nil { |
... | ... |
@@ -275,7 +275,7 @@ func getImageStreamImageSuggestion(imageID string, imageStream *imageapi.ImageSt |
275 | 275 |
// this time based annotation is set by pkg/image/controller/controller.go whenever import/tag operations are performed; unless |
276 | 276 |
// in the midst of an import/tag operation, it stays set and serves as a timestamp for when the last operation occurred; |
277 | 277 |
// so we will check if the image stream has been updated "recently"; |
278 |
- // in case it is a slow link to the remote repo, see if if the check annotation occured within the last 5 minutes; if so, consider that as potentially "in progress" |
|
278 |
+ // in case it is a slow link to the remote repo, see if if the check annotation occurred within the last 5 minutes; if so, consider that as potentially "in progress" |
|
279 | 279 |
compareTime := checkTime.Add(5 * time.Minute) |
280 | 280 |
currentTime, _ := time.Parse(time.RFC3339, unversioned.Now().UTC().Format(time.RFC3339)) |
281 | 281 |
if compareTime.Before(currentTime) { |
... | ... |
@@ -10,7 +10,7 @@ import ( |
10 | 10 |
buildgraph "github.com/openshift/origin/pkg/build/graph/nodes" |
11 | 11 |
) |
12 | 12 |
|
13 |
-// RelevantBuilds returns the lastSuccessful build, lastUnsuccesful build, and a list of active builds |
|
13 |
+// RelevantBuilds returns the lastSuccessful build, lastUnsuccessful build, and a list of active builds |
|
14 | 14 |
func RelevantBuilds(g osgraph.Graph, bcNode *buildgraph.BuildConfigNode) (*buildgraph.BuildNode, *buildgraph.BuildNode, []*buildgraph.BuildNode) { |
15 | 15 |
var ( |
16 | 16 |
lastSuccessfulBuild *buildgraph.BuildNode |
... | ... |
@@ -9,7 +9,7 @@ import ( |
9 | 9 |
"k8s.io/kubernetes/pkg/client/typed/discovery" |
10 | 10 |
) |
11 | 11 |
|
12 |
-// DiscoveryClient implements the functions that dicovery server-supported API groups, |
|
12 |
+// DiscoveryClient implements the functions that discovery server-supported API groups, |
|
13 | 13 |
// versions and resources. |
14 | 14 |
type DiscoveryClient struct { |
15 | 15 |
*discovery.DiscoveryClient |
... | ... |
@@ -64,7 +64,7 @@ func (l *MemberBasedDetector) Exists(ldapGrouUID string) (bool, error) { |
64 | 64 |
// NewCompoundDetector returns an LDAPGroupDetector that subsumes some other LDAPGroupDetectors. |
65 | 65 |
// This detector checks all subordinate detectors in order to determine if a group exists. If any of |
66 | 66 |
// the subordinate detectors raise an error while being queried, the the search is abandoned and the |
67 |
-// error returned. All detectors must successfully determine existance for the compound detector to |
|
67 |
+// error returned. All detectors must successfully determine existence for the compound detector to |
|
68 | 68 |
// determine that the group exists. |
69 | 69 |
func NewCompoundDetector(locators ...interfaces.LDAPGroupDetector) interfaces.LDAPGroupDetector { |
70 | 70 |
return &CompoundDetector{locators: locators} |
... | ... |
@@ -73,7 +73,7 @@ func NewCompoundDetector(locators ...interfaces.LDAPGroupDetector) interfaces.LD |
73 | 73 |
// CompoundDetector is an LDAPGroupDetector that subsumes some other LDAPGroupDetectors. |
74 | 74 |
// This detector checks all subordinate detectors in order to determine if a group exists. If any of |
75 | 75 |
// the subordinate detectors raise an error while being queried, the the search is abandoned and the |
76 |
-// error returned. All detectors must successfully determine existance for the compound detector to |
|
76 |
+// error returned. All detectors must successfully determine existence for the compound detector to |
|
77 | 77 |
// determine that the group exists. |
78 | 78 |
type CompoundDetector struct { |
79 | 79 |
locators []interfaces.LDAPGroupDetector |
... | ... |
@@ -65,7 +65,7 @@ func NewMemberLookupMemberNotFoundSuppressor(err io.Writer) Handler { |
65 | 65 |
return &memberLookupMemberNotFoundSuppressor{err: err} |
66 | 66 |
} |
67 | 67 |
|
68 |
-// memberLookupMemberNotFoundSuppressor supresses member lookup errors caused by a search returning no valid entries, |
|
68 |
+// memberLookupMemberNotFoundSuppressor suppresses member lookup errors caused by a search returning no valid entries, |
|
69 | 69 |
// which can happen in two ways: |
70 | 70 |
// - if the search is not by DN, an empty result list is returned |
71 | 71 |
// - if the search is by DN, an error is returned from the LDAP server: no such object |
... | ... |
@@ -156,7 +156,7 @@ func TestCreateImageImport(t *testing.T) { |
156 | 156 |
}}, |
157 | 157 |
}, |
158 | 158 |
{ |
159 |
- // 7: insecure annotation should be overriden by the flag |
|
159 |
+ // 7: insecure annotation should be overridden by the flag |
|
160 | 160 |
name: "testis", |
161 | 161 |
stream: &imageapi.ImageStream{ |
162 | 162 |
ObjectMeta: kapi.ObjectMeta{ |
... | ... |
@@ -1191,12 +1191,12 @@ type AdmissionConfig struct { |
1191 | 1191 |
// ControllerConfig holds configuration values for controllers |
1192 | 1192 |
type ControllerConfig struct { |
1193 | 1193 |
// ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for |
1194 |
- // pods fullfilling a service to serve with. |
|
1194 |
+ // pods fulfilling a service to serve with. |
|
1195 | 1195 |
ServiceServingCert ServiceServingCert |
1196 | 1196 |
} |
1197 | 1197 |
|
1198 | 1198 |
// ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for |
1199 |
-// pods fullfilling a service to serve with. |
|
1199 |
+// pods fulfilling a service to serve with. |
|
1200 | 1200 |
type ServiceServingCert struct { |
1201 | 1201 |
// Signer holds the signing information used to automatically sign serving certificates. |
1202 | 1202 |
// If this value is nil, then certs are not signed automatically. |
... | ... |
@@ -345,7 +345,7 @@ func addConversionFuncs(scheme *runtime.Scheme) { |
345 | 345 |
var codec = serializer.NewCodecFactory(internal.Scheme).LegacyCodec(SchemeGroupVersion) |
346 | 346 |
|
347 | 347 |
// Convert_runtime_Object_To_runtime_RawExtension is conversion function that assumes that the runtime.Object you've embedded is in |
348 |
-// the same GroupVersion that your containing type is in. This is signficantly better than simply breaking. |
|
348 |
+// the same GroupVersion that your containing type is in. This is significantly better than simply breaking. |
|
349 | 349 |
// Given an ordered list of preferred external versions for a given encode or conversion call, the behavior of this function could be |
350 | 350 |
// made generic, predictable, and controllable. |
351 | 351 |
func convert_runtime_Object_To_runtime_RawExtension(in runtime.Object, out *runtime.RawExtension, s conversion.Scope) error { |
... | ... |
@@ -117,7 +117,7 @@ func (CertInfo) SwaggerDoc() map[string]string { |
117 | 117 |
|
118 | 118 |
var map_ControllerConfig = map[string]string{ |
119 | 119 |
"": "ControllerConfig holds configuration values for controllers", |
120 |
- "serviceServingCert": "ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for pods fullfilling a service to serve with.", |
|
120 |
+ "serviceServingCert": "ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for pods fulfilling a service to serve with.", |
|
121 | 121 |
} |
122 | 122 |
|
123 | 123 |
func (ControllerConfig) SwaggerDoc() map[string]string { |
... | ... |
@@ -726,7 +726,7 @@ func (ServiceAccountConfig) SwaggerDoc() map[string]string { |
726 | 726 |
} |
727 | 727 |
|
728 | 728 |
var map_ServiceServingCert = map[string]string{ |
729 |
- "": "ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for pods fullfilling a service to serve with.", |
|
729 |
+ "": "ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for pods fulfilling a service to serve with.", |
|
730 | 730 |
"signer": "Signer holds the signing information used to automatically sign serving certificates. If this value is nil, then certs are not signed automatically.", |
731 | 731 |
} |
732 | 732 |
|
... | ... |
@@ -1196,12 +1196,12 @@ type AdmissionConfig struct { |
1196 | 1196 |
// ControllerConfig holds configuration values for controllers |
1197 | 1197 |
type ControllerConfig struct { |
1198 | 1198 |
// ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for |
1199 |
- // pods fullfilling a service to serve with. |
|
1199 |
+ // pods fulfilling a service to serve with. |
|
1200 | 1200 |
ServiceServingCert ServiceServingCert `json:"serviceServingCert"` |
1201 | 1201 |
} |
1202 | 1202 |
|
1203 | 1203 |
// ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for |
1204 |
-// pods fullfilling a service to serve with. |
|
1204 |
+// pods fulfilling a service to serve with. |
|
1205 | 1205 |
type ServiceServingCert struct { |
1206 | 1206 |
// Signer holds the signing information used to automatically sign serving certificates. |
1207 | 1207 |
// If this value is nil, then certs are not signed automatically. |
... | ... |
@@ -586,7 +586,7 @@ func initAPIVersionRoute(root *restful.WebService, prefix string, versions ...st |
586 | 586 |
Consumes(restful.MIME_JSON)) |
587 | 587 |
} |
588 | 588 |
|
589 |
-// initHealthCheckRoute initalizes an HTTP endpoint for health checking. |
|
589 |
+// initHealthCheckRoute initializes an HTTP endpoint for health checking. |
|
590 | 590 |
// OpenShift is deemed healthy if the API server can respond with an OK messages |
591 | 591 |
func initHealthCheckRoute(root *restful.WebService, path string) { |
592 | 592 |
root.Route(root.GET(path).To(func(req *restful.Request, resp *restful.Response) { |
... | ... |
@@ -613,7 +613,7 @@ func initReadinessCheckRoute(root *restful.WebService, path string, readyFunc fu |
613 | 613 |
Produces(restful.MIME_JSON)) |
614 | 614 |
} |
615 | 615 |
|
616 |
-// initHealthCheckRoute initalizes an HTTP endpoint for health checking. |
|
616 |
+// initHealthCheckRoute initializes an HTTP endpoint for health checking. |
|
617 | 617 |
// OpenShift is deemed healthy if the API server can respond with an OK messages |
618 | 618 |
func initMetricsRoute(root *restful.WebService, path string) { |
619 | 619 |
h := prometheus.Handler() |
... | ... |
@@ -15,7 +15,7 @@ import ( |
15 | 15 |
"k8s.io/kubernetes/pkg/runtime" |
16 | 16 |
) |
17 | 17 |
|
18 |
-// CachedDiscoveryClient implements the functions that dicovery server-supported API groups, |
|
18 |
+// CachedDiscoveryClient implements the functions that discovery server-supported API groups, |
|
19 | 19 |
// versions and resources. |
20 | 20 |
type CachedDiscoveryClient struct { |
21 | 21 |
discovery.DiscoveryInterface |
... | ... |
@@ -497,7 +497,7 @@ func (f *Factory) UpdatePodSpecForObject(obj runtime.Object, fn func(*api.PodSpe |
497 | 497 |
|
498 | 498 |
// ApproximatePodTemplateForObject returns a pod template object for the provided source. |
499 | 499 |
// It may return both an error and a object. It attempt to return the best possible template |
500 |
-// avaliable at the current time. |
|
500 |
+// available at the current time. |
|
501 | 501 |
func (w *Factory) ApproximatePodTemplateForObject(object runtime.Object) (*api.PodTemplateSpec, error) { |
502 | 502 |
switch t := object.(type) { |
503 | 503 |
case *imageapi.ImageStreamTag: |
... | ... |
@@ -15,7 +15,7 @@ const ( |
15 | 15 |
|
16 | 16 |
// NewPullProgressWriter creates a writer that periodically reports |
17 | 17 |
// on pull progress of an image. It only reports when the state of the |
18 |
-// different layers has changed and uses time threshholds to limit the |
|
18 |
+// different layers has changed and uses time thresholds to limit the |
|
19 | 19 |
// rate of the reports. |
20 | 20 |
func NewPullProgressWriter(reportFn func(*ProgressReport)) io.Writer { |
21 | 21 |
pipeIn, pipeOut := io.Pipe() |
... | ... |
@@ -445,7 +445,7 @@ type DeploymentLogOptions struct { |
445 | 445 |
// Only one of sinceSeconds or sinceTime may be specified. |
446 | 446 |
SinceSeconds *int64 |
447 | 447 |
// An RFC3339 timestamp from which to show logs. If this value |
448 |
- // preceeds the time a pod was started, only logs since the pod start will be returned. |
|
448 |
+ // precedes the time a pod was started, only logs since the pod start will be returned. |
|
449 | 449 |
// If this value is in the future, no logs will be returned. |
450 | 450 |
// Only one of sinceSeconds or sinceTime may be specified. |
451 | 451 |
SinceTime *unversioned.Time |
... | ... |
@@ -127,7 +127,7 @@ var map_DeploymentLogOptions = map[string]string{ |
127 | 127 |
"follow": "Follow if true indicates that the build log should be streamed until the build terminates.", |
128 | 128 |
"previous": "Return previous deployment logs. Defaults to false.", |
129 | 129 |
"sinceSeconds": "A relative time in seconds before the current time from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
130 |
- "sinceTime": "An RFC3339 timestamp from which to show logs. If this value preceeds the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
|
130 |
+ "sinceTime": "An RFC3339 timestamp from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.", |
|
131 | 131 |
"timestamps": "If true, add an RFC3339 or RFC3339Nano timestamp at the beginning of every line of log output. Defaults to false.", |
132 | 132 |
"tailLines": "If set, the number of lines from the end of the logs to show. If not specified, logs are shown from the creation of the container or sinceSeconds or sinceTime", |
133 | 133 |
"limitBytes": "If set, the number of bytes to read from the server before terminating the log output. This may not display a complete final line of logging, and may return slightly more or slightly less than the specified limit.", |
... | ... |
@@ -402,7 +402,7 @@ type DeploymentLogOptions struct { |
402 | 402 |
// Only one of sinceSeconds or sinceTime may be specified. |
403 | 403 |
SinceSeconds *int64 `json:"sinceSeconds,omitempty"` |
404 | 404 |
// An RFC3339 timestamp from which to show logs. If this value |
405 |
- // preceeds the time a pod was started, only logs since the pod start will be returned. |
|
405 |
+ // precedes the time a pod was started, only logs since the pod start will be returned. |
|
406 | 406 |
// If this value is in the future, no logs will be returned. |
407 | 407 |
// Only one of sinceSeconds or sinceTime may be specified. |
408 | 408 |
SinceTime *unversioned.Time `json:"sinceTime,omitempty"` |
... | ... |
@@ -413,7 +413,7 @@ type DeploymentLogOptions struct { |
413 | 413 |
// Only one of sinceSeconds or sinceTime may be specified. |
414 | 414 |
SinceSeconds *int64 `json:"sinceSeconds,omitempty"` |
415 | 415 |
// An RFC3339 timestamp from which to show logs. If this value |
416 |
- // preceeds the time a pod was started, only logs since the pod start will be returned. |
|
416 |
+ // precedes the time a pod was started, only logs since the pod start will be returned. |
|
417 | 417 |
// If this value is in the future, no logs will be returned. |
418 | 418 |
// Only one of sinceSeconds or sinceTime may be specified. |
419 | 419 |
SinceTime *unversioned.Time `json:"sinceTime,omitempty"` |
... | ... |
@@ -104,7 +104,7 @@ func canTrigger(config, decoded *deployapi.DeploymentConfig) (bool, []deployapi. |
104 | 104 |
} |
105 | 105 |
ictCount++ |
106 | 106 |
|
107 |
- // If this is the inital deployment then we need to wait for the image change controller |
|
107 |
+ // If this is the initial deployment then we need to wait for the image change controller |
|
108 | 108 |
// to resolve the image inside the pod template. |
109 | 109 |
lastTriggered := t.ImageChangeParams.LastTriggeredImage |
110 | 110 |
if len(lastTriggered) == 0 { |
... | ... |
@@ -146,7 +146,7 @@ func (c *DeployerPodController) Handle(pod *kapi.Pod) error { |
146 | 146 |
} |
147 | 147 |
glog.V(4).Infof("Updated deployment %s status from %s to %s (scale: %d)", deployutil.LabelForDeployment(deployment), currentStatus, nextStatus, deployment.Spec.Replicas) |
148 | 148 |
|
149 |
- // If the deployment was canceled, trigger a reconcilation of its deployment config |
|
149 |
+ // If the deployment was canceled, trigger a reconciliation of its deployment config |
|
150 | 150 |
// so that the latest complete deployment can immediately rollback in place of the |
151 | 151 |
// canceled deployment. |
152 | 152 |
if nextStatus == deployapi.DeploymentStatusFailed && deployutil.IsDeploymentCancelled(deployment) { |
... | ... |
@@ -411,7 +411,7 @@ func TestHandle_cleanupDesiredReplicasAnnotation(t *testing.T) { |
411 | 411 |
} |
412 | 412 |
|
413 | 413 |
// TestHandle_canceledDeploymentTrigger ensures that a canceled deployment |
414 |
-// will trigger a reconcilation of its deploymentconfig (via an annotation |
|
414 |
+// will trigger a reconciliation of its deploymentconfig (via an annotation |
|
415 | 415 |
// update) so that rolling back can happen on the spot and not rely on the |
416 | 416 |
// deploymentconfig cache resync interval. |
417 | 417 |
func TestHandle_canceledDeploymentTriggerTest(t *testing.T) { |
... | ... |
@@ -1,6 +1,6 @@ |
1 | 1 |
package types |
2 | 2 |
|
3 |
-// SystemdUnit represents the information we gather about a single sytemd unit of interest. |
|
3 |
+// SystemdUnit represents the information we gather about a single systemd unit of interest. |
|
4 | 4 |
type SystemdUnit struct { |
5 | 5 |
// The systemd unit name, e.g. "openshift-master" |
6 | 6 |
Name string |
... | ... |
@@ -491,7 +491,7 @@ func (repo *v2repository) getTags(c *connection) (map[string]string, error) { |
491 | 491 |
return repo.getTags(c) |
492 | 492 |
} |
493 | 493 |
delete(c.cached, repo.name) |
494 |
- // docker will not return a NotFound on any repository URL - for backwards compatibilty, return NotFound on the |
|
494 |
+ // docker will not return a NotFound on any repository URL - for backwards compatibility, return NotFound on the |
|
495 | 495 |
// repo |
496 | 496 |
return nil, errRepositoryNotFound{repo.name} |
497 | 497 |
} |
... | ... |
@@ -549,7 +549,7 @@ func (repo *v2repository) getTaggedImage(c *connection, tag, userTag string) (*I |
549 | 549 |
return repo.getTaggedImage(c, tag, userTag) |
550 | 550 |
} |
551 | 551 |
delete(c.cached, repo.name) |
552 |
- // docker will not return a NotFound on any repository URL - for backwards compatibilty, return NotFound on the |
|
552 |
+ // docker will not return a NotFound on any repository URL - for backwards compatibility, return NotFound on the |
|
553 | 553 |
// repo |
554 | 554 |
body, _ := ioutil.ReadAll(resp.Body) |
555 | 555 |
glog.V(4).Infof("passed valid auth token, but unable to find tagged image at %q, %d %v: %s", req.URL.String(), resp.StatusCode, resp.Header, body) |
... | ... |
@@ -142,8 +142,8 @@ func NewDefaultConfig() *Config { |
142 | 142 |
} |
143 | 143 |
} |
144 | 144 |
|
145 |
-// NewEnviromentConfig sets up the initial config from environment variables |
|
146 |
-func NewEnviromentConfig() (*Config, error) { |
|
145 |
+// NewEnvironmentConfig sets up the initial config from environment variables |
|
146 |
+func NewEnvironmentConfig() (*Config, error) { |
|
147 | 147 |
config := NewDefaultConfig() |
148 | 148 |
|
149 | 149 |
home := os.Getenv("GIT_HOME") |
... | ... |
@@ -198,7 +198,7 @@ type ImageStreamTag struct { |
198 | 198 |
kapi.ObjectMeta |
199 | 199 |
|
200 | 200 |
// Tag is the spec tag associated with this image stream tag, and it may be null |
201 |
- // if only pushes have occured to this image stream. |
|
201 |
+ // if only pushes have occurred to this image stream. |
|
202 | 202 |
Tag *TagReference |
203 | 203 |
|
204 | 204 |
// Generation is the current generation of the tagged image - if tag is provided |
... | ... |
@@ -173,7 +173,7 @@ func (ImageStreamStatus) SwaggerDoc() map[string]string { |
173 | 173 |
var map_ImageStreamTag = map[string]string{ |
174 | 174 |
"": "ImageStreamTag represents an Image that is retrieved by tag name from an ImageStream.", |
175 | 175 |
"metadata": "Standard object's metadata.", |
176 |
- "tag": "Tag is the spec tag associated with this image stream tag, and it may be null if only pushes have occured to this image stream.", |
|
176 |
+ "tag": "Tag is the spec tag associated with this image stream tag, and it may be null if only pushes have occurred to this image stream.", |
|
177 | 177 |
"generation": "Generation is the current generation of the tagged image - if tag is provided and this value is not equal to the tag generation, a user has requested an import that has not completed, or Conditions will be filled out indicating any error.", |
178 | 178 |
"conditions": "Conditions is an array of conditions that apply to the image stream tag.", |
179 | 179 |
"image": "Image associated with the ImageStream and tag.", |
... | ... |
@@ -175,7 +175,7 @@ type ImageStreamTag struct { |
175 | 175 |
kapi.ObjectMeta `json:"metadata,omitempty"` |
176 | 176 |
|
177 | 177 |
// Tag is the spec tag associated with this image stream tag, and it may be null |
178 |
- // if only pushes have occured to this image stream. |
|
178 |
+ // if only pushes have occurred to this image stream. |
|
179 | 179 |
Tag *TagReference `json:"tag"` |
180 | 180 |
|
181 | 181 |
// Generation is the current generation of the tagged image - if tag is provided |
... | ... |
@@ -68,7 +68,7 @@ type f5LTM struct { |
68 | 68 |
passthroughRoutes map[string]passthroughRoute |
69 | 69 |
} |
70 | 70 |
|
71 |
-// f5LTMCfg holds configuration for connecting to and issueing iControl |
|
71 |
+// f5LTMCfg holds configuration for connecting to and issuing iControl |
|
72 | 72 |
// requests against an F5 BIG-IP instance. |
73 | 73 |
type f5LTMCfg struct { |
74 | 74 |
// host specifies the hostname or IP address of the F5 BIG-IP host. |
... | ... |
@@ -708,7 +708,7 @@ func (f5 *f5LTM) checkPartitionPathExists(pathName string) (bool, error) { |
708 | 708 |
return true, nil |
709 | 709 |
} |
710 | 710 |
|
711 |
-// addPartitionPath adds a new partition path to the folder heirarchy. |
|
711 |
+// addPartitionPath adds a new partition path to the folder hierarchy. |
|
712 | 712 |
func (f5 *f5LTM) addPartitionPath(pathName string) (bool, error) { |
713 | 713 |
glog.V(4).Infof("Creating partition path %q ...", pathName) |
714 | 714 |
|
... | ... |
@@ -744,7 +744,7 @@ func (f5 *f5LTM) ensurePartitionPathExists(pathName string) error { |
744 | 744 |
return nil |
745 | 745 |
} |
746 | 746 |
|
747 |
- // We have to loop thru the path hierarchy and add components |
|
747 |
+ // We have to loop through the path hierarchy and add components |
|
748 | 748 |
// individually if they don't exist. |
749 | 749 |
|
750 | 750 |
// Get path components - we need to remove the leading empty path |
... | ... |
@@ -42,7 +42,7 @@ func bashQuote(env string) string { |
42 | 42 |
return string(out) |
43 | 43 |
} |
44 | 44 |
|
45 |
-// hasEnvName returns true if the provided enviroment contains the named ENV var. |
|
45 |
+// hasEnvName returns true if the provided environment contains the named ENV var. |
|
46 | 46 |
func hasEnvName(env []string, name string) bool { |
47 | 47 |
for _, e := range env { |
48 | 48 |
if strings.HasPrefix(e, name+"=") { |
... | ... |
@@ -48,7 +48,7 @@ func waitForJenkinsActivity(uri, verificationString string, status int) error { |
48 | 48 |
req.SetBasicAuth("admin", "password") |
49 | 49 |
client := &http.Client{} |
50 | 50 |
resp, _ := client.Do(req) |
51 |
- // the http req failing here (which we see occassionally in the ci.jenkins runs) could stem |
|
51 |
+ // the http req failing here (which we see occasionally in the ci.jenkins runs) could stem |
|
52 | 52 |
// from simply hitting our test jenkins server too soon ... so rather than returning false,err |
53 | 53 |
// and aborting the poll, we return false, nil to try again |
54 | 54 |
if resp == nil { |
... | ... |
@@ -163,7 +163,7 @@ var _ = g.Describe("[jenkins][Slow] openshift pipeline plugin", func() { |
163 | 163 |
|
164 | 164 |
// the build and deployment is by far the most time consuming portion of the test jenkins job; |
165 | 165 |
// we leverage some of the openshift utilities for waiting for the deployment before we poll |
166 |
- // jenkins for the sucessful job completion |
|
166 |
+ // jenkins for the successful job completion |
|
167 | 167 |
g.By("waiting for frontend, frontend-prod deployments as signs that the build has finished") |
168 | 168 |
err := exutil.WaitForADeploymentToComplete(oc.KubeREST().ReplicationControllers(oc.Namespace()), "frontend") |
169 | 169 |
if err != nil { |
... | ... |
@@ -25,7 +25,7 @@ type testDataParser struct { |
25 | 25 |
testResultPattern *regexp.Regexp |
26 | 26 |
} |
27 | 27 |
|
28 |
-// MarksBeginning determines if the line marks the begining of a test case |
|
28 |
+// MarksBeginning determines if the line marks the beginning of a test case |
|
29 | 29 |
func (p *testDataParser) MarksBeginning(line string) bool { |
30 | 30 |
return p.testStartPattern.MatchString(line) |
31 | 31 |
} |
... | ... |
@@ -38,7 +38,7 @@ type testDataParser struct { |
38 | 38 |
testEndPattern *regexp.Regexp |
39 | 39 |
} |
40 | 40 |
|
41 |
-// MarksBeginning determines if the line marks the begining of a test case |
|
41 |
+// MarksBeginning determines if the line marks the beginning of a test case |
|
42 | 42 |
func (p *testDataParser) MarksBeginning(line string) bool { |
43 | 43 |
return p.testStartPattern.MatchString(line) |
44 | 44 |
} |
... | ... |
@@ -82,7 +82,7 @@ func (p *testDataParser) ExtractDuration(line string) (string, bool) { |
82 | 82 |
return "", false |
83 | 83 |
} |
84 | 84 |
|
85 |
-// ExtractMessage extracts a message (e.g. for signalling why a failure or skip occured) from a test output line |
|
85 |
+// ExtractMessage extracts a message (e.g. for signalling why a failure or skip occurred) from a test output line |
|
86 | 86 |
func (p *testDataParser) ExtractMessage(line string) (string, bool) { |
87 | 87 |
if matches := p.testConclusionPattern.FindStringSubmatch(line); len(matches) > 5 && len(matches[5]) > 0 { |
88 | 88 |
return matches[5], true |
... | ... |
@@ -112,7 +112,7 @@ type testSuiteDataParser struct { |
112 | 112 |
suiteConclusionPattern *regexp.Regexp |
113 | 113 |
} |
114 | 114 |
|
115 |
-// MarksBeginning determines if the line marks the begining of a test suite |
|
115 |
+// MarksBeginning determines if the line marks the beginning of a test suite |
|
116 | 116 |
func (p *testSuiteDataParser) MarksBeginning(line string) bool { |
117 | 117 |
return p.suiteDeclarationPattern.MatchString(line) |
118 | 118 |
} |
... | ... |
@@ -4,7 +4,7 @@ import "github.com/openshift/origin/tools/junitreport/pkg/api" |
4 | 4 |
|
5 | 5 |
// TestDataParser knows how to take raw test data and extract the useful information from it |
6 | 6 |
type TestDataParser interface { |
7 |
- // MarksBeginning determines if the line marks the begining of a test case |
|
7 |
+ // MarksBeginning determines if the line marks the beginning of a test case |
|
8 | 8 |
MarksBeginning(line string) bool |
9 | 9 |
|
10 | 10 |
// ExtractName extracts the name of the test case from test output lines |
... | ... |
@@ -16,7 +16,7 @@ type TestDataParser interface { |
16 | 16 |
// ExtractDuration extracts the test duration from a test output line |
17 | 17 |
ExtractDuration(line string) (duration string, succeeded bool) |
18 | 18 |
|
19 |
- // ExtractMessage extracts a message (e.g. for signalling why a failure or skip occured) from a test output line |
|
19 |
+ // ExtractMessage extracts a message (e.g. for signalling why a failure or skip occurred) from a test output line |
|
20 | 20 |
ExtractMessage(line string) (message string, succeeded bool) |
21 | 21 |
|
22 | 22 |
// MarksCompletion determines if the line marks the completion of a test case |
... | ... |
@@ -25,7 +25,7 @@ type TestDataParser interface { |
25 | 25 |
|
26 | 26 |
// TestSuiteDataParser knows how to take raw test suite data and extract the useful information from it |
27 | 27 |
type TestSuiteDataParser interface { |
28 |
- // MarksBeginning determines if the line marks the begining of a test suite |
|
28 |
+ // MarksBeginning determines if the line marks the beginning of a test suite |
|
29 | 29 |
MarksBeginning(line string) bool |
30 | 30 |
|
31 | 31 |
// ExtractName extracts the name of the test suite from a test output line |