Browse code

Fix misspells reported by goreportcard.com

https://goreportcard.com/report/github.com/openshift/origin#misspell

Vincent Behar authored on 2016/05/31 21:25:54
Showing 46 changed files
... ...
@@ -2036,7 +2036,7 @@
2036 2036
         "type": "string",
2037 2037
         "paramType": "query",
2038 2038
         "name": "sinceTime",
2039
-        "description": "sinceTime is an RFC3339 timestamp from which to show logs. If this value preceeds the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
2039
+        "description": "sinceTime is an RFC3339 timestamp from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
2040 2040
         "required": false,
2041 2041
         "allowMultiple": false
2042 2042
        },
... ...
@@ -5289,7 +5289,7 @@
5289 5289
         "type": "string",
5290 5290
         "paramType": "query",
5291 5291
         "name": "sinceTime",
5292
-        "description": "An RFC3339 timestamp from which to show logs. If this value preceeds the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
5292
+        "description": "An RFC3339 timestamp from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
5293 5293
         "required": false,
5294 5294
         "allowMultiple": false
5295 5295
        },
... ...
@@ -21644,7 +21644,7 @@
21644 21644
      },
21645 21645
      "tag": {
21646 21646
       "$ref": "v1.TagReference",
21647
-      "description": "Tag is the spec tag associated with this image stream tag, and it may be null if only pushes have occured to this image stream."
21647
+      "description": "Tag is the spec tag associated with this image stream tag, and it may be null if only pushes have occurred to this image stream."
21648 21648
      },
21649 21649
      "generation": {
21650 21650
       "type": "integer",
... ...
@@ -8,7 +8,7 @@ import (
8 8
 )
9 9
 
10 10
 // Convert_runtime_Object_To_runtime_RawExtension is conversion function that assumes that the runtime.Object you've embedded is in
11
-// the same GroupVersion that your containing type is in.  This is signficantly better than simply breaking.
11
+// the same GroupVersion that your containing type is in.  This is significantly better than simply breaking.
12 12
 // Given an ordered list of preferred external versions for a given encode or conversion call, the behavior of this function could be
13 13
 // made generic, predictable, and controllable.
14 14
 func Convert_runtime_Object_To_runtime_RawExtension(in runtime.Object, out *runtime.RawExtension, s conversion.Scope) error {
... ...
@@ -100,7 +100,7 @@ func createMissingScaleRefMarker(hpaNode *kubenodes.HorizontalPodAutoscalerNode,
100 100
 // can assume that it will be handled before this step. Therefore, we are only concerned with finding HPAs that are trying to
101 101
 // scale the same resources.
102 102
 //
103
-// The algorithm that is used to implement this check is decribed as follows:
103
+// The algorithm that is used to implement this check is described as follows:
104 104
 //  - create a sub-graph containing only HPA nodes and other nodes that can be scaled, as well as any scaling edges or other
105 105
 //    edges used to connect between objects that can be scaled
106 106
 //  - for every resulting edge in the new sub-graph, create an edge in the reverse direction
... ...
@@ -95,7 +95,7 @@ func (c *Fake) SearchWithPaging(searchRequest *ldap.SearchRequest, pagingSize ui
95 95
 	return c.SearchResponse, nil
96 96
 }
97 97
 
98
-// NewMatchingSearchErrorClient returns a new MatchingSeachError client sitting on top of the parent
98
+// NewMatchingSearchErrorClient returns a new MatchingSearchError client sitting on top of the parent
99 99
 // client. This client returns the given error when a search base DN matches the given base DN, and
100 100
 // defers to the parent otherwise.
101 101
 func NewMatchingSearchErrorClient(parent ldap.Client, baseDN string, returnErr error) ldap.Client {
... ...
@@ -250,7 +250,7 @@ func (m *VirtualStorage) ensurePolicyBindingToMaster(ctx kapi.Context, policyNam
250 250
 
251 251
 // getPolicyBindingForPolicy returns a PolicyBinding that points to the specified policyNamespace.  It will autocreate ONLY if policyNamespace equals the master namespace
252 252
 func (m *VirtualStorage) getPolicyBindingForPolicy(ctx kapi.Context, policyNamespace string, allowAutoProvision bool) (*authorizationapi.PolicyBinding, error) {
253
-	// we can autocreate a PolicyBinding object if the RoleBinding is for the master namespace OR if we've been explicity told to create the policying binding.
253
+	// we can autocreate a PolicyBinding object if the RoleBinding is for the master namespace OR if we've been explicitly told to create the policying binding.
254 254
 	// the latter happens during priming
255 255
 	if (policyNamespace == "") || allowAutoProvision {
256 256
 		return m.ensurePolicyBindingToMaster(ctx, policyNamespace, authorizationapi.GetPolicyBindingName(policyNamespace))
... ...
@@ -875,7 +875,7 @@ type BuildLogOptions struct {
875 875
 	// Only one of sinceSeconds or sinceTime may be specified.
876 876
 	SinceSeconds *int64
877 877
 	// An RFC3339 timestamp from which to show logs. If this value
878
-	// preceeds the time a pod was started, only logs since the pod start will be returned.
878
+	// precedes the time a pod was started, only logs since the pod start will be returned.
879 879
 	// If this value is in the future, no logs will be returned.
880 880
 	// Only one of sinceSeconds or sinceTime may be specified.
881 881
 	SinceTime *unversioned.Time
... ...
@@ -105,7 +105,7 @@ var map_BuildLogOptions = map[string]string{
105 105
 	"follow":       "follow if true indicates that the build log should be streamed until the build terminates.",
106 106
 	"previous":     "previous returns previous build logs. Defaults to false.",
107 107
 	"sinceSeconds": "sinceSeconds is a relative time in seconds before the current time from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
108
-	"sinceTime":    "sinceTime is an RFC3339 timestamp from which to show logs. If this value preceeds the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
108
+	"sinceTime":    "sinceTime is an RFC3339 timestamp from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
109 109
 	"timestamps":   "timestamps, If true, add an RFC3339 or RFC3339Nano timestamp at the beginning of every line of log output. Defaults to false.",
110 110
 	"tailLines":    "tailLines, If set, is the number of lines from the end of the logs to show. If not specified, logs are shown from the creation of the container or sinceSeconds or sinceTime",
111 111
 	"limitBytes":   "limitBytes, If set, is the number of bytes to read from the server before terminating the log output. This may not display a complete final line of logging, and may return slightly more or slightly less than the specified limit.",
... ...
@@ -834,7 +834,7 @@ type BuildLogOptions struct {
834 834
 	// Only one of sinceSeconds or sinceTime may be specified.
835 835
 	SinceSeconds *int64 `json:"sinceSeconds,omitempty"`
836 836
 	// sinceTime is an RFC3339 timestamp from which to show logs. If this value
837
-	// preceeds the time a pod was started, only logs since the pod start will be returned.
837
+	// precedes the time a pod was started, only logs since the pod start will be returned.
838 838
 	// If this value is in the future, no logs will be returned.
839 839
 	// Only one of sinceSeconds or sinceTime may be specified.
840 840
 	SinceTime *unversioned.Time `json:"sinceTime,omitempty"`
... ...
@@ -773,7 +773,7 @@ type BuildLogOptions struct {
773 773
 	// Only one of sinceSeconds or sinceTime may be specified.
774 774
 	SinceSeconds *int64 `json:"sinceSeconds,omitempty"`
775 775
 	// An RFC3339 timestamp from which to show logs. If this value
776
-	// preceeds the time a pod was started, only logs since the pod start will be returned.
776
+	// precedes the time a pod was started, only logs since the pod start will be returned.
777 777
 	// If this value is in the future, no logs will be returned.
778 778
 	// Only one of sinceSeconds or sinceTime may be specified.
779 779
 	SinceTime *unversioned.Time `json:"sinceTime,omitempty"`
... ...
@@ -232,7 +232,7 @@ func (d *DockerBuilder) buildInfo() []dockerfile.KeyValue {
232 232
 // consume.
233 233
 func (d *DockerBuilder) buildLabels(dir string) []dockerfile.KeyValue {
234 234
 	labels := map[string]string{}
235
-	// TODO: allow source info to be overriden by build
235
+	// TODO: allow source info to be overridden by build
236 236
 	sourceInfo := &git.SourceInfo{}
237 237
 	if d.build.Spec.Source.Git != nil {
238 238
 		var errors []error
... ...
@@ -51,7 +51,7 @@ func readNetClsCGroup(reader io.Reader) string {
51 51
 }
52 52
 
53 53
 // getDockerNetworkMode determines whether the builder is running as a container
54
-// by examining /proc/self/cgroup. This contenxt is then passed to source-to-image.
54
+// by examining /proc/self/cgroup. This context is then passed to source-to-image.
55 55
 func getDockerNetworkMode() s2iapi.DockerNetworkMode {
56 56
 	file, err := os.Open("/proc/self/cgroup")
57 57
 	if err != nil {
... ...
@@ -275,7 +275,7 @@ func getImageStreamImageSuggestion(imageID string, imageStream *imageapi.ImageSt
275 275
 		// this time based annotation is set by pkg/image/controller/controller.go whenever import/tag operations are performed; unless
276 276
 		// in the midst of an import/tag operation, it stays set and serves as a timestamp for when the last operation occurred;
277 277
 		// so we will check if the image stream has been updated "recently";
278
-		// in case it is a slow link to the remote repo, see if if the check annotation occured within the last 5 minutes; if so, consider that as potentially "in progress"
278
+		// in case it is a slow link to the remote repo, see if if the check annotation occurred within the last 5 minutes; if so, consider that as potentially "in progress"
279 279
 		compareTime := checkTime.Add(5 * time.Minute)
280 280
 		currentTime, _ := time.Parse(time.RFC3339, unversioned.Now().UTC().Format(time.RFC3339))
281 281
 		if compareTime.Before(currentTime) {
... ...
@@ -10,7 +10,7 @@ import (
10 10
 	buildgraph "github.com/openshift/origin/pkg/build/graph/nodes"
11 11
 )
12 12
 
13
-// RelevantBuilds returns the lastSuccessful build, lastUnsuccesful build, and a list of active builds
13
+// RelevantBuilds returns the lastSuccessful build, lastUnsuccessful build, and a list of active builds
14 14
 func RelevantBuilds(g osgraph.Graph, bcNode *buildgraph.BuildConfigNode) (*buildgraph.BuildNode, *buildgraph.BuildNode, []*buildgraph.BuildNode) {
15 15
 	var (
16 16
 		lastSuccessfulBuild   *buildgraph.BuildNode
... ...
@@ -9,7 +9,7 @@ import (
9 9
 	"k8s.io/kubernetes/pkg/client/typed/discovery"
10 10
 )
11 11
 
12
-// DiscoveryClient implements the functions that dicovery server-supported API groups,
12
+// DiscoveryClient implements the functions that discovery server-supported API groups,
13 13
 // versions and resources.
14 14
 type DiscoveryClient struct {
15 15
 	*discovery.DiscoveryClient
... ...
@@ -64,7 +64,7 @@ func (l *MemberBasedDetector) Exists(ldapGrouUID string) (bool, error) {
64 64
 // NewCompoundDetector returns an LDAPGroupDetector that subsumes some other LDAPGroupDetectors.
65 65
 // This detector checks all subordinate detectors in order to determine if a group exists. If any of
66 66
 // the subordinate detectors raise an error while being queried, the the search is abandoned and the
67
-// error returned. All detectors must successfully determine existance for the compound detector to
67
+// error returned. All detectors must successfully determine existence for the compound detector to
68 68
 // determine that the group exists.
69 69
 func NewCompoundDetector(locators ...interfaces.LDAPGroupDetector) interfaces.LDAPGroupDetector {
70 70
 	return &CompoundDetector{locators: locators}
... ...
@@ -73,7 +73,7 @@ func NewCompoundDetector(locators ...interfaces.LDAPGroupDetector) interfaces.LD
73 73
 // CompoundDetector is an LDAPGroupDetector that subsumes some other LDAPGroupDetectors.
74 74
 // This detector checks all subordinate detectors in order to determine if a group exists. If any of
75 75
 // the subordinate detectors raise an error while being queried, the the search is abandoned and the
76
-// error returned. All detectors must successfully determine existance for the compound detector to
76
+// error returned. All detectors must successfully determine existence for the compound detector to
77 77
 // determine that the group exists.
78 78
 type CompoundDetector struct {
79 79
 	locators []interfaces.LDAPGroupDetector
... ...
@@ -65,7 +65,7 @@ func NewMemberLookupMemberNotFoundSuppressor(err io.Writer) Handler {
65 65
 	return &memberLookupMemberNotFoundSuppressor{err: err}
66 66
 }
67 67
 
68
-// memberLookupMemberNotFoundSuppressor supresses member lookup errors caused by a search returning no valid entries,
68
+// memberLookupMemberNotFoundSuppressor suppresses member lookup errors caused by a search returning no valid entries,
69 69
 // which can happen in two ways:
70 70
 //   - if the search is not by DN, an empty result list is returned
71 71
 //   - if the search is by DN, an error is returned from the LDAP server: no such object
... ...
@@ -156,7 +156,7 @@ func TestCreateImageImport(t *testing.T) {
156 156
 			}},
157 157
 		},
158 158
 		{
159
-			// 7: insecure annotation should be overriden by the flag
159
+			// 7: insecure annotation should be overridden by the flag
160 160
 			name: "testis",
161 161
 			stream: &imageapi.ImageStream{
162 162
 				ObjectMeta: kapi.ObjectMeta{
... ...
@@ -64,7 +64,7 @@ func NewCommandGitServer(name string) *cobra.Command {
64 64
 }
65 65
 
66 66
 func RunGitServer() error {
67
-	config, err := gitserver.NewEnviromentConfig()
67
+	config, err := gitserver.NewEnvironmentConfig()
68 68
 	if err != nil {
69 69
 		return err
70 70
 	}
... ...
@@ -1191,12 +1191,12 @@ type AdmissionConfig struct {
1191 1191
 // ControllerConfig holds configuration values for controllers
1192 1192
 type ControllerConfig struct {
1193 1193
 	// ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for
1194
-	// pods fullfilling a service to serve with.
1194
+	// pods fulfilling a service to serve with.
1195 1195
 	ServiceServingCert ServiceServingCert
1196 1196
 }
1197 1197
 
1198 1198
 // ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for
1199
-// pods fullfilling a service to serve with.
1199
+// pods fulfilling a service to serve with.
1200 1200
 type ServiceServingCert struct {
1201 1201
 	// Signer holds the signing information used to automatically sign serving certificates.
1202 1202
 	// If this value is nil, then certs are not signed automatically.
... ...
@@ -345,7 +345,7 @@ func addConversionFuncs(scheme *runtime.Scheme) {
345 345
 var codec = serializer.NewCodecFactory(internal.Scheme).LegacyCodec(SchemeGroupVersion)
346 346
 
347 347
 // Convert_runtime_Object_To_runtime_RawExtension is conversion function that assumes that the runtime.Object you've embedded is in
348
-// the same GroupVersion that your containing type is in.  This is signficantly better than simply breaking.
348
+// the same GroupVersion that your containing type is in.  This is significantly better than simply breaking.
349 349
 // Given an ordered list of preferred external versions for a given encode or conversion call, the behavior of this function could be
350 350
 // made generic, predictable, and controllable.
351 351
 func convert_runtime_Object_To_runtime_RawExtension(in runtime.Object, out *runtime.RawExtension, s conversion.Scope) error {
... ...
@@ -117,7 +117,7 @@ func (CertInfo) SwaggerDoc() map[string]string {
117 117
 
118 118
 var map_ControllerConfig = map[string]string{
119 119
 	"":                   "ControllerConfig holds configuration values for controllers",
120
-	"serviceServingCert": "ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for pods fullfilling a service to serve with.",
120
+	"serviceServingCert": "ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for pods fulfilling a service to serve with.",
121 121
 }
122 122
 
123 123
 func (ControllerConfig) SwaggerDoc() map[string]string {
... ...
@@ -726,7 +726,7 @@ func (ServiceAccountConfig) SwaggerDoc() map[string]string {
726 726
 }
727 727
 
728 728
 var map_ServiceServingCert = map[string]string{
729
-	"":       "ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for pods fullfilling a service to serve with.",
729
+	"":       "ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for pods fulfilling a service to serve with.",
730 730
 	"signer": "Signer holds the signing information used to automatically sign serving certificates. If this value is nil, then certs are not signed automatically.",
731 731
 }
732 732
 
... ...
@@ -1196,12 +1196,12 @@ type AdmissionConfig struct {
1196 1196
 // ControllerConfig holds configuration values for controllers
1197 1197
 type ControllerConfig struct {
1198 1198
 	// ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for
1199
-	// pods fullfilling a service to serve with.
1199
+	// pods fulfilling a service to serve with.
1200 1200
 	ServiceServingCert ServiceServingCert `json:"serviceServingCert"`
1201 1201
 }
1202 1202
 
1203 1203
 // ServiceServingCert holds configuration for service serving cert signer which creates cert/key pairs for
1204
-// pods fullfilling a service to serve with.
1204
+// pods fulfilling a service to serve with.
1205 1205
 type ServiceServingCert struct {
1206 1206
 	// Signer holds the signing information used to automatically sign serving certificates.
1207 1207
 	// If this value is nil, then certs are not signed automatically.
... ...
@@ -586,7 +586,7 @@ func initAPIVersionRoute(root *restful.WebService, prefix string, versions ...st
586 586
 		Consumes(restful.MIME_JSON))
587 587
 }
588 588
 
589
-// initHealthCheckRoute initalizes an HTTP endpoint for health checking.
589
+// initHealthCheckRoute initializes an HTTP endpoint for health checking.
590 590
 // OpenShift is deemed healthy if the API server can respond with an OK messages
591 591
 func initHealthCheckRoute(root *restful.WebService, path string) {
592 592
 	root.Route(root.GET(path).To(func(req *restful.Request, resp *restful.Response) {
... ...
@@ -613,7 +613,7 @@ func initReadinessCheckRoute(root *restful.WebService, path string, readyFunc fu
613 613
 		Produces(restful.MIME_JSON))
614 614
 }
615 615
 
616
-// initHealthCheckRoute initalizes an HTTP endpoint for health checking.
616
+// initHealthCheckRoute initializes an HTTP endpoint for health checking.
617 617
 // OpenShift is deemed healthy if the API server can respond with an OK messages
618 618
 func initMetricsRoute(root *restful.WebService, path string) {
619 619
 	h := prometheus.Handler()
... ...
@@ -15,7 +15,7 @@ import (
15 15
 	"k8s.io/kubernetes/pkg/runtime"
16 16
 )
17 17
 
18
-// CachedDiscoveryClient implements the functions that dicovery server-supported API groups,
18
+// CachedDiscoveryClient implements the functions that discovery server-supported API groups,
19 19
 // versions and resources.
20 20
 type CachedDiscoveryClient struct {
21 21
 	discovery.DiscoveryInterface
... ...
@@ -497,7 +497,7 @@ func (f *Factory) UpdatePodSpecForObject(obj runtime.Object, fn func(*api.PodSpe
497 497
 
498 498
 // ApproximatePodTemplateForObject returns a pod template object for the provided source.
499 499
 // It may return both an error and a object. It attempt to return the best possible template
500
-// avaliable at the current time.
500
+// available at the current time.
501 501
 func (w *Factory) ApproximatePodTemplateForObject(object runtime.Object) (*api.PodTemplateSpec, error) {
502 502
 	switch t := object.(type) {
503 503
 	case *imageapi.ImageStreamTag:
... ...
@@ -15,7 +15,7 @@ const (
15 15
 
16 16
 // NewPullProgressWriter creates a writer that periodically reports
17 17
 // on pull progress of an image. It only reports when the state of the
18
-// different layers has changed and uses time threshholds to limit the
18
+// different layers has changed and uses time thresholds to limit the
19 19
 // rate of the reports.
20 20
 func NewPullProgressWriter(reportFn func(*ProgressReport)) io.Writer {
21 21
 	pipeIn, pipeOut := io.Pipe()
... ...
@@ -445,7 +445,7 @@ type DeploymentLogOptions struct {
445 445
 	// Only one of sinceSeconds or sinceTime may be specified.
446 446
 	SinceSeconds *int64
447 447
 	// An RFC3339 timestamp from which to show logs. If this value
448
-	// preceeds the time a pod was started, only logs since the pod start will be returned.
448
+	// precedes the time a pod was started, only logs since the pod start will be returned.
449 449
 	// If this value is in the future, no logs will be returned.
450 450
 	// Only one of sinceSeconds or sinceTime may be specified.
451 451
 	SinceTime *unversioned.Time
... ...
@@ -127,7 +127,7 @@ var map_DeploymentLogOptions = map[string]string{
127 127
 	"follow":       "Follow if true indicates that the build log should be streamed until the build terminates.",
128 128
 	"previous":     "Return previous deployment logs. Defaults to false.",
129 129
 	"sinceSeconds": "A relative time in seconds before the current time from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
130
-	"sinceTime":    "An RFC3339 timestamp from which to show logs. If this value preceeds the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
130
+	"sinceTime":    "An RFC3339 timestamp from which to show logs. If this value precedes the time a pod was started, only logs since the pod start will be returned. If this value is in the future, no logs will be returned. Only one of sinceSeconds or sinceTime may be specified.",
131 131
 	"timestamps":   "If true, add an RFC3339 or RFC3339Nano timestamp at the beginning of every line of log output. Defaults to false.",
132 132
 	"tailLines":    "If set, the number of lines from the end of the logs to show. If not specified, logs are shown from the creation of the container or sinceSeconds or sinceTime",
133 133
 	"limitBytes":   "If set, the number of bytes to read from the server before terminating the log output. This may not display a complete final line of logging, and may return slightly more or slightly less than the specified limit.",
... ...
@@ -402,7 +402,7 @@ type DeploymentLogOptions struct {
402 402
 	// Only one of sinceSeconds or sinceTime may be specified.
403 403
 	SinceSeconds *int64 `json:"sinceSeconds,omitempty"`
404 404
 	// An RFC3339 timestamp from which to show logs. If this value
405
-	// preceeds the time a pod was started, only logs since the pod start will be returned.
405
+	// precedes the time a pod was started, only logs since the pod start will be returned.
406 406
 	// If this value is in the future, no logs will be returned.
407 407
 	// Only one of sinceSeconds or sinceTime may be specified.
408 408
 	SinceTime *unversioned.Time `json:"sinceTime,omitempty"`
... ...
@@ -413,7 +413,7 @@ type DeploymentLogOptions struct {
413 413
 	// Only one of sinceSeconds or sinceTime may be specified.
414 414
 	SinceSeconds *int64 `json:"sinceSeconds,omitempty"`
415 415
 	// An RFC3339 timestamp from which to show logs. If this value
416
-	// preceeds the time a pod was started, only logs since the pod start will be returned.
416
+	// precedes the time a pod was started, only logs since the pod start will be returned.
417 417
 	// If this value is in the future, no logs will be returned.
418 418
 	// Only one of sinceSeconds or sinceTime may be specified.
419 419
 	SinceTime *unversioned.Time `json:"sinceTime,omitempty"`
... ...
@@ -104,7 +104,7 @@ func canTrigger(config, decoded *deployapi.DeploymentConfig) (bool, []deployapi.
104 104
 		}
105 105
 		ictCount++
106 106
 
107
-		// If this is the inital deployment then we need to wait for the image change controller
107
+		// If this is the initial deployment then we need to wait for the image change controller
108 108
 		// to resolve the image inside the pod template.
109 109
 		lastTriggered := t.ImageChangeParams.LastTriggeredImage
110 110
 		if len(lastTriggered) == 0 {
... ...
@@ -146,7 +146,7 @@ func (c *DeployerPodController) Handle(pod *kapi.Pod) error {
146 146
 		}
147 147
 		glog.V(4).Infof("Updated deployment %s status from %s to %s (scale: %d)", deployutil.LabelForDeployment(deployment), currentStatus, nextStatus, deployment.Spec.Replicas)
148 148
 
149
-		// If the deployment was canceled, trigger a reconcilation of its deployment config
149
+		// If the deployment was canceled, trigger a reconciliation of its deployment config
150 150
 		// so that the latest complete deployment can immediately rollback in place of the
151 151
 		// canceled deployment.
152 152
 		if nextStatus == deployapi.DeploymentStatusFailed && deployutil.IsDeploymentCancelled(deployment) {
... ...
@@ -411,7 +411,7 @@ func TestHandle_cleanupDesiredReplicasAnnotation(t *testing.T) {
411 411
 }
412 412
 
413 413
 // TestHandle_canceledDeploymentTrigger ensures that a canceled deployment
414
-// will trigger a reconcilation of its deploymentconfig (via an annotation
414
+// will trigger a reconciliation of its deploymentconfig (via an annotation
415 415
 // update) so that rolling back can happen on the spot and not rely on the
416 416
 // deploymentconfig cache resync interval.
417 417
 func TestHandle_canceledDeploymentTriggerTest(t *testing.T) {
... ...
@@ -1,6 +1,6 @@
1 1
 package types
2 2
 
3
-// SystemdUnit represents the information we gather about a single sytemd unit of interest.
3
+// SystemdUnit represents the information we gather about a single systemd unit of interest.
4 4
 type SystemdUnit struct {
5 5
 	// The systemd unit name, e.g. "openshift-master"
6 6
 	Name string
... ...
@@ -491,7 +491,7 @@ func (repo *v2repository) getTags(c *connection) (map[string]string, error) {
491 491
 				return repo.getTags(c)
492 492
 			}
493 493
 			delete(c.cached, repo.name)
494
-			// docker will not return a NotFound on any repository URL - for backwards compatibilty, return NotFound on the
494
+			// docker will not return a NotFound on any repository URL - for backwards compatibility, return NotFound on the
495 495
 			// repo
496 496
 			return nil, errRepositoryNotFound{repo.name}
497 497
 		}
... ...
@@ -549,7 +549,7 @@ func (repo *v2repository) getTaggedImage(c *connection, tag, userTag string) (*I
549 549
 				return repo.getTaggedImage(c, tag, userTag)
550 550
 			}
551 551
 			delete(c.cached, repo.name)
552
-			// docker will not return a NotFound on any repository URL - for backwards compatibilty, return NotFound on the
552
+			// docker will not return a NotFound on any repository URL - for backwards compatibility, return NotFound on the
553 553
 			// repo
554 554
 			body, _ := ioutil.ReadAll(resp.Body)
555 555
 			glog.V(4).Infof("passed valid auth token, but unable to find tagged image at %q, %d %v: %s", req.URL.String(), resp.StatusCode, resp.Header, body)
... ...
@@ -142,8 +142,8 @@ func NewDefaultConfig() *Config {
142 142
 	}
143 143
 }
144 144
 
145
-// NewEnviromentConfig sets up the initial config from environment variables
146
-func NewEnviromentConfig() (*Config, error) {
145
+// NewEnvironmentConfig sets up the initial config from environment variables
146
+func NewEnvironmentConfig() (*Config, error) {
147 147
 	config := NewDefaultConfig()
148 148
 
149 149
 	home := os.Getenv("GIT_HOME")
... ...
@@ -198,7 +198,7 @@ type ImageStreamTag struct {
198 198
 	kapi.ObjectMeta
199 199
 
200 200
 	// Tag is the spec tag associated with this image stream tag, and it may be null
201
-	// if only pushes have occured to this image stream.
201
+	// if only pushes have occurred to this image stream.
202 202
 	Tag *TagReference
203 203
 
204 204
 	// Generation is the current generation of the tagged image - if tag is provided
... ...
@@ -173,7 +173,7 @@ func (ImageStreamStatus) SwaggerDoc() map[string]string {
173 173
 var map_ImageStreamTag = map[string]string{
174 174
 	"":           "ImageStreamTag represents an Image that is retrieved by tag name from an ImageStream.",
175 175
 	"metadata":   "Standard object's metadata.",
176
-	"tag":        "Tag is the spec tag associated with this image stream tag, and it may be null if only pushes have occured to this image stream.",
176
+	"tag":        "Tag is the spec tag associated with this image stream tag, and it may be null if only pushes have occurred to this image stream.",
177 177
 	"generation": "Generation is the current generation of the tagged image - if tag is provided and this value is not equal to the tag generation, a user has requested an import that has not completed, or Conditions will be filled out indicating any error.",
178 178
 	"conditions": "Conditions is an array of conditions that apply to the image stream tag.",
179 179
 	"image":      "Image associated with the ImageStream and tag.",
... ...
@@ -175,7 +175,7 @@ type ImageStreamTag struct {
175 175
 	kapi.ObjectMeta `json:"metadata,omitempty"`
176 176
 
177 177
 	// Tag is the spec tag associated with this image stream tag, and it may be null
178
-	// if only pushes have occured to this image stream.
178
+	// if only pushes have occurred to this image stream.
179 179
 	Tag *TagReference `json:"tag"`
180 180
 
181 181
 	// Generation is the current generation of the tagged image - if tag is provided
... ...
@@ -68,7 +68,7 @@ type f5LTM struct {
68 68
 	passthroughRoutes map[string]passthroughRoute
69 69
 }
70 70
 
71
-// f5LTMCfg holds configuration for connecting to and issueing iControl
71
+// f5LTMCfg holds configuration for connecting to and issuing iControl
72 72
 // requests against an F5 BIG-IP instance.
73 73
 type f5LTMCfg struct {
74 74
 	// host specifies the hostname or IP address of the F5 BIG-IP host.
... ...
@@ -708,7 +708,7 @@ func (f5 *f5LTM) checkPartitionPathExists(pathName string) (bool, error) {
708 708
 	return true, nil
709 709
 }
710 710
 
711
-// addPartitionPath adds a new partition path to the folder heirarchy.
711
+// addPartitionPath adds a new partition path to the folder hierarchy.
712 712
 func (f5 *f5LTM) addPartitionPath(pathName string) (bool, error) {
713 713
 	glog.V(4).Infof("Creating partition path %q ...", pathName)
714 714
 
... ...
@@ -744,7 +744,7 @@ func (f5 *f5LTM) ensurePartitionPathExists(pathName string) error {
744 744
 		return nil
745 745
 	}
746 746
 
747
-	// We have to loop thru the path hierarchy and add components
747
+	// We have to loop through the path hierarchy and add components
748 748
 	// individually if they don't exist.
749 749
 
750 750
 	// Get path components - we need to remove the leading empty path
... ...
@@ -42,7 +42,7 @@ func bashQuote(env string) string {
42 42
 	return string(out)
43 43
 }
44 44
 
45
-// hasEnvName returns true if the provided enviroment contains the named ENV var.
45
+// hasEnvName returns true if the provided environment contains the named ENV var.
46 46
 func hasEnvName(env []string, name string) bool {
47 47
 	for _, e := range env {
48 48
 		if strings.HasPrefix(e, name+"=") {
... ...
@@ -48,7 +48,7 @@ func waitForJenkinsActivity(uri, verificationString string, status int) error {
48 48
 		req.SetBasicAuth("admin", "password")
49 49
 		client := &http.Client{}
50 50
 		resp, _ := client.Do(req)
51
-		// the http req failing here (which we see occassionally in the ci.jenkins runs) could stem
51
+		// the http req failing here (which we see occasionally in the ci.jenkins runs) could stem
52 52
 		// from simply hitting our test jenkins server too soon ... so rather than returning false,err
53 53
 		// and aborting the poll, we return false, nil to try again
54 54
 		if resp == nil {
... ...
@@ -163,7 +163,7 @@ var _ = g.Describe("[jenkins][Slow] openshift pipeline plugin", func() {
163 163
 
164 164
 			// the build and deployment is by far the most time consuming portion of the test jenkins job;
165 165
 			// we leverage some of the openshift utilities for waiting for the deployment before we poll
166
-			// jenkins for the sucessful job completion
166
+			// jenkins for the successful job completion
167 167
 			g.By("waiting for frontend, frontend-prod deployments as signs that the build has finished")
168 168
 			err := exutil.WaitForADeploymentToComplete(oc.KubeREST().ReplicationControllers(oc.Namespace()), "frontend")
169 169
 			if err != nil {
... ...
@@ -7,6 +7,6 @@ type TestSuitesBuilder interface {
7 7
 	// AddSuite adds a test suite to the collection
8 8
 	AddSuite(suite *api.TestSuite)
9 9
 
10
-	// Build retuns the built structure
10
+	// Build returns the built structure
11 11
 	Build() *api.TestSuites
12 12
 }
... ...
@@ -25,7 +25,7 @@ type testDataParser struct {
25 25
 	testResultPattern *regexp.Regexp
26 26
 }
27 27
 
28
-// MarksBeginning determines if the line marks the begining of a test case
28
+// MarksBeginning determines if the line marks the beginning of a test case
29 29
 func (p *testDataParser) MarksBeginning(line string) bool {
30 30
 	return p.testStartPattern.MatchString(line)
31 31
 }
... ...
@@ -38,7 +38,7 @@ type testDataParser struct {
38 38
 	testEndPattern         *regexp.Regexp
39 39
 }
40 40
 
41
-// MarksBeginning determines if the line marks the begining of a test case
41
+// MarksBeginning determines if the line marks the beginning of a test case
42 42
 func (p *testDataParser) MarksBeginning(line string) bool {
43 43
 	return p.testStartPattern.MatchString(line)
44 44
 }
... ...
@@ -82,7 +82,7 @@ func (p *testDataParser) ExtractDuration(line string) (string, bool) {
82 82
 	return "", false
83 83
 }
84 84
 
85
-// ExtractMessage extracts a message (e.g. for signalling why a failure or skip occured) from a test output line
85
+// ExtractMessage extracts a message (e.g. for signalling why a failure or skip occurred) from a test output line
86 86
 func (p *testDataParser) ExtractMessage(line string) (string, bool) {
87 87
 	if matches := p.testConclusionPattern.FindStringSubmatch(line); len(matches) > 5 && len(matches[5]) > 0 {
88 88
 		return matches[5], true
... ...
@@ -112,7 +112,7 @@ type testSuiteDataParser struct {
112 112
 	suiteConclusionPattern  *regexp.Regexp
113 113
 }
114 114
 
115
-// MarksBeginning determines if the line marks the begining of a test suite
115
+// MarksBeginning determines if the line marks the beginning of a test suite
116 116
 func (p *testSuiteDataParser) MarksBeginning(line string) bool {
117 117
 	return p.suiteDeclarationPattern.MatchString(line)
118 118
 }
... ...
@@ -4,7 +4,7 @@ import "github.com/openshift/origin/tools/junitreport/pkg/api"
4 4
 
5 5
 // TestDataParser knows how to take raw test data and extract the useful information from it
6 6
 type TestDataParser interface {
7
-	// MarksBeginning determines if the line marks the begining of a test case
7
+	// MarksBeginning determines if the line marks the beginning of a test case
8 8
 	MarksBeginning(line string) bool
9 9
 
10 10
 	// ExtractName extracts the name of the test case from test output lines
... ...
@@ -16,7 +16,7 @@ type TestDataParser interface {
16 16
 	// ExtractDuration extracts the test duration from a test output line
17 17
 	ExtractDuration(line string) (duration string, succeeded bool)
18 18
 
19
-	// ExtractMessage extracts a message (e.g. for signalling why a failure or skip occured) from a test output line
19
+	// ExtractMessage extracts a message (e.g. for signalling why a failure or skip occurred) from a test output line
20 20
 	ExtractMessage(line string) (message string, succeeded bool)
21 21
 
22 22
 	// MarksCompletion determines if the line marks the completion of a test case
... ...
@@ -25,7 +25,7 @@ type TestDataParser interface {
25 25
 
26 26
 // TestSuiteDataParser knows how to take raw test suite data and extract the useful information from it
27 27
 type TestSuiteDataParser interface {
28
-	// MarksBeginning determines if the line marks the begining of a test suite
28
+	// MarksBeginning determines if the line marks the beginning of a test suite
29 29
 	MarksBeginning(line string) bool
30 30
 
31 31
 	// ExtractName extracts the name of the test suite from a test output line