Skip to content

Commit

Permalink
fix typo in log
Browse files Browse the repository at this point in the history
  • Loading branch information
bobsongplus committed Oct 24, 2018
1 parent 4c9b067 commit 3847082
Show file tree
Hide file tree
Showing 8 changed files with 12 additions and 12 deletions.
2 changes: 1 addition & 1 deletion upup/pkg/fi/cloudup/alitasks/disk.go
Original file line number Diff line number Diff line change
Expand Up @@ -143,7 +143,7 @@ func (_ *Disk) RenderALI(t *aliup.ALIAPITarget, a, e, changes *Disk) error {
}

if changes != nil && changes.Tags != nil {
glog.V(2).Infof("Modifing tags of disk with Name:%q", fi.StringValue(e.Name))
glog.V(2).Infof("Modifying tags of disk with Name:%q", fi.StringValue(e.Name))
if err := t.Cloud.CreateTags(*e.DiskId, DiskResource, e.Tags); err != nil {
return fmt.Errorf("error adding Tags to ALI YunPan: %v", err)
}
Expand Down
4 changes: 2 additions & 2 deletions upup/pkg/fi/cloudup/alitasks/launchconfiguration.go
Original file line number Diff line number Diff line change
Expand Up @@ -201,8 +201,8 @@ func (_ *LaunchConfiguration) RenderALI(t *aliup.ALIAPITarget, a, e, changes *La
}
e.ConfigurationId = fi.String(createScalingConfigurationResponse.ScalingConfigurationId)

// Disable ScalingGroup, used to bind scalingConfig, we should excute EnableScalingGroup in the task LaunchConfiguration
// If the ScalingGroup is active, we can not excute EnableScalingGroup.
// Disable ScalingGroup, used to bind scalingConfig, we should execute EnableScalingGroup in the task LaunchConfiguration
// If the ScalingGroup is active, we can not execute EnableScalingGroup.
if e.ScalingGroup.Active != nil && fi.BoolValue(e.ScalingGroup.Active) {

glog.V(2).Infof("Disabling LoadBalancer with id:%q", fi.StringValue(e.ScalingGroup.ScalingGroupId))
Expand Down
2 changes: 1 addition & 1 deletion upup/pkg/fi/cloudup/alitasks/loadbalancer.go
Original file line number Diff line number Diff line change
Expand Up @@ -188,7 +188,7 @@ func (_ *LoadBalancer) RenderALI(t *aliup.ALIAPITarget, a, e, changes *LoadBalan
}

if a != nil && (len(a.Tags) > 0) {
glog.V(2).Infof("Modifing LoadBalancer with Name:%q, update LoadBalancer tags", fi.StringValue(e.Name))
glog.V(2).Infof("Modifying LoadBalancer with Name:%q, update LoadBalancer tags", fi.StringValue(e.Name))

tagsToDelete := e.getLoadBalancerTagsToDelete(a.Tags)
if len(tagsToDelete) > 0 {
Expand Down
4 changes: 2 additions & 2 deletions upup/pkg/fi/cloudup/alitasks/scalinggroup.go
Original file line number Diff line number Diff line change
Expand Up @@ -157,7 +157,7 @@ func (_ *ScalingGroup) RenderALI(t *aliup.ALIAPITarget, a, e, changes *ScalingGr
} else {
//only support to update size
if changes.MinSize != nil || changes.MaxSize != nil {
glog.V(2).Infof("Modifing AutoscalingGroup with Name:%q", fi.StringValue(e.Name))
glog.V(2).Infof("Modifying AutoscalingGroup with Name:%q", fi.StringValue(e.Name))

modifyScalingGroupArgs := &ess.ModifyScalingGroupArgs{
ScalingGroupId: fi.StringValue(a.ScalingGroupId),
Expand All @@ -166,7 +166,7 @@ func (_ *ScalingGroup) RenderALI(t *aliup.ALIAPITarget, a, e, changes *ScalingGr
}
_, err := t.Cloud.EssClient().ModifyScalingGroup(modifyScalingGroupArgs)
if err != nil {
return fmt.Errorf("error modifing autoscalingGroup: %v", err)
return fmt.Errorf("error modifying autoscalingGroup: %v", err)
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion upup/pkg/fi/cloudup/alitasks/securitygroup.go
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ func (_ *SecurityGroup) RenderALI(t *aliup.ALIAPITarget, a, e, changes *Security
}

if a != nil && (len(a.Tags) > 0) {
glog.V(2).Infof("Modifing SecurityGroup with Name:%q", fi.StringValue(e.Name))
glog.V(2).Infof("Modifying SecurityGroup with Name:%q", fi.StringValue(e.Name))

tagsToDelete := e.getGroupTagsToDelete(a.Tags)
if len(tagsToDelete) > 0 {
Expand Down
2 changes: 1 addition & 1 deletion upup/pkg/fi/cloudup/awstasks/vpccidrblock.go
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,7 @@ func (_ *VPCCIDRBlock) RenderTerraform(t *terraform.TerraformTarget, a, e, chang
return fmt.Errorf("terraform does not support AdditionalCIDRs on VPCs")

// The code below is based on https://github.com/terraform-providers/terraform-provider-aws/pull/1568
// and can be un-comented once it is landed.
// and can be un-commented once it is landed.
// When this has been enabled please fix test TestAdditionalCIDR in integration_test.go to run runTestAWS.
// tf := &terraformVPCCIDRBlock{
// VPCID: e.VPC.TerraformLink(),
Expand Down
4 changes: 2 additions & 2 deletions upup/pkg/fi/secrets/clientset_secretstore.go
Original file line number Diff line number Diff line change
Expand Up @@ -194,7 +194,7 @@ func (c *ClientsetSecretStore) GetOrCreateSecret(name string, secret *fi.Secret)
// Make double-sure it round-trips
s, err := c.loadSecret(name)
if err != nil {
glog.Fatalf("unable to load secret immmediately after creation %v: %v", name, err)
glog.Fatalf("unable to load secret immediately after creation %v: %v", name, err)
return nil, false, err
}
return s, true, nil
Expand All @@ -210,7 +210,7 @@ func (c *ClientsetSecretStore) ReplaceSecret(name string, secret *fi.Secret) (*f
// Confirm the secret exists
s, err := c.loadSecret(name)
if err != nil {
return nil, fmt.Errorf("unable to load secret immmediately after creation: %v", err)
return nil, fmt.Errorf("unable to load secret immediately after creation: %v", err)
}
return s, nil
}
Expand Down
4 changes: 2 additions & 2 deletions upup/pkg/fi/secrets/vfs_secretstore.go
Original file line number Diff line number Diff line change
Expand Up @@ -171,7 +171,7 @@ func (c *VFSSecretStore) GetOrCreateSecret(id string, secret *fi.Secret) (*fi.Se
// Make double-sure it round-trips
s, err := c.loadSecret(p)
if err != nil {
glog.Fatalf("unable to load secret immmediately after creation %v: %v", p, err)
glog.Fatalf("unable to load secret immediately after creation %v: %v", p, err)
return nil, false, err
}
return s, true, nil
Expand All @@ -193,7 +193,7 @@ func (c *VFSSecretStore) ReplaceSecret(id string, secret *fi.Secret) (*fi.Secret
// Confirm the secret exists
s, err := c.loadSecret(p)
if err != nil {
return nil, fmt.Errorf("unable to load secret immmediately after creation %v: %v", p, err)
return nil, fmt.Errorf("unable to load secret immediately after creation %v: %v", p, err)
}
return s, nil
}
Expand Down

0 comments on commit 3847082

Please sign in to comment.