From e1287846ae9cd11bddbe169e75b8879ba361e133 Mon Sep 17 00:00:00 2001 From: Anthony Scalisi Date: Mon, 20 Apr 2020 06:28:19 -0700 Subject: [PATCH] fix spelling errors (#6985) --- acl/policy.go | 2 +- client/allocrunner/alloc_runner_hooks.go | 2 +- jobspec/parse_service.go | 2 +- nomad/structs/network.go | 4 ++-- nomad/structs/structs.go | 2 +- nomad/vault_test.go | 2 +- plugins/drivers/proto/driver.pb.go | 2 +- plugins/drivers/proto/driver.proto | 2 +- plugins/drivers/testutils/testing.go | 2 +- scripts/release/mac-remote-build | 2 +- 10 files changed, 11 insertions(+), 11 deletions(-) diff --git a/acl/policy.go b/acl/policy.go index cdb1aca80c9..9ff322536ad 100644 --- a/acl/policy.go +++ b/acl/policy.go @@ -10,7 +10,7 @@ import ( const ( // The following levels are the only valid values for the `policy = "read"` stanza. // When policies are merged together, the most privilege is granted, except for deny - // which always takes precedence and supercedes. + // which always takes precedence and supersedes. PolicyDeny = "deny" PolicyRead = "read" PolicyList = "list" diff --git a/client/allocrunner/alloc_runner_hooks.go b/client/allocrunner/alloc_runner_hooks.go index af9e6b61c32..ac19ff0e383 100644 --- a/client/allocrunner/alloc_runner_hooks.go +++ b/client/allocrunner/alloc_runner_hooks.go @@ -125,7 +125,7 @@ func (a *allocHealthSetter) SetHealth(healthy, isDeploy bool, trackerTaskEvents a.ar.allocBroadcaster.Send(calloc) } -// initRunnerHooks intializes the runners hooks. +// initRunnerHooks initializes the runners hooks. func (ar *allocRunner) initRunnerHooks(config *clientconfig.Config) error { hookLogger := ar.logger.Named("runner_hook") diff --git a/jobspec/parse_service.go b/jobspec/parse_service.go index 24c35176df7..ef8eabd835c 100644 --- a/jobspec/parse_service.go +++ b/jobspec/parse_service.go @@ -281,7 +281,7 @@ func parseSidecarTask(item *ast.ObjectItem) (*api.SidecarTask, error) { KillSignal: task.KillSignal, } - // Parse ShutdownDelay separately to get pointer + // Parse ShutdownDelay separatly to get pointer var m map[string]interface{} if err := hcl.DecodeObject(&m, item.Val); err != nil { return nil, err diff --git a/nomad/structs/network.go b/nomad/structs/network.go index e37158cf184..19aa47197cc 100644 --- a/nomad/structs/network.go +++ b/nomad/structs/network.go @@ -331,7 +331,7 @@ func (idx *NetworkIndex) AssignNetwork(ask *NetworkResource) (out *NetworkResour // getDynamicPortsPrecise takes the nodes used port bitmap which may be nil if // no ports have been allocated yet, the network ask and returns a set of unused -// ports to fullfil the ask's DynamicPorts or an error if it failed. An error +// ports to fulfil the ask's DynamicPorts or an error if it failed. An error // means the ask can not be satisfied as the method does a precise search. func getDynamicPortsPrecise(nodeUsed Bitmap, ask *NetworkResource) ([]int, error) { // Create a copy of the used ports and apply the new reserves @@ -373,7 +373,7 @@ func getDynamicPortsPrecise(nodeUsed Bitmap, ask *NetworkResource) ([]int, error // getDynamicPortsStochastic takes the nodes used port bitmap which may be nil if // no ports have been allocated yet, the network ask and returns a set of unused -// ports to fullfil the ask's DynamicPorts or an error if it failed. An error +// ports to fulfil the ask's DynamicPorts or an error if it failed. An error // does not mean the ask can not be satisfied as the method has a fixed amount // of random probes and if these fail, the search is aborted. func getDynamicPortsStochastic(nodeUsed Bitmap, ask *NetworkResource) ([]int, error) { diff --git a/nomad/structs/structs.go b/nomad/structs/structs.go index f11de79026c..ce36d15fb41 100644 --- a/nomad/structs/structs.go +++ b/nomad/structs/structs.go @@ -1708,7 +1708,7 @@ type Node struct { // COMPAT: Remove in Nomad 0.9 // Drain is controlled by the servers, and not the client. // If true, no jobs will be scheduled to this node, and existing - // allocations will be drained. Superceded by DrainStrategy in Nomad + // allocations will be drained. Superseded by DrainStrategy in Nomad // 0.8 but kept for backward compat. Drain bool diff --git a/nomad/vault_test.go b/nomad/vault_test.go index 1bbdcf7aeca..552ef9908e1 100644 --- a/nomad/vault_test.go +++ b/nomad/vault_test.go @@ -423,7 +423,7 @@ func TestVaultClient_ValidateRole_Deprecated_Success(t *testing.T) { }) } -func TestVaultClient_ValidateRole_NonExistant(t *testing.T) { +func TestVaultClient_ValidateRole_NonExistent(t *testing.T) { t.Parallel() v := testutil.NewTestVault(t) defer v.Stop() diff --git a/plugins/drivers/proto/driver.pb.go b/plugins/drivers/proto/driver.pb.go index 7b521867c4d..77da6902a8f 100644 --- a/plugins/drivers/proto/driver.pb.go +++ b/plugins/drivers/proto/driver.pb.go @@ -426,7 +426,7 @@ var xxx_messageInfo_FingerprintRequest proto.InternalMessageInfo type FingerprintResponse struct { // Attributes are key/value pairs that annotate the nomad client and can be - // used in scheduling contraints and affinities. + // used in scheduling constraints and affinities. Attributes map[string]*proto1.Attribute `protobuf:"bytes,1,rep,name=attributes,proto3" json:"attributes,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"` // Health is used to determine the state of the health the driver is in. // Health can be one of the following states: diff --git a/plugins/drivers/proto/driver.proto b/plugins/drivers/proto/driver.proto index 653fe348663..59a0c10bb72 100644 --- a/plugins/drivers/proto/driver.proto +++ b/plugins/drivers/proto/driver.proto @@ -109,7 +109,7 @@ message FingerprintResponse { // Attributes are key/value pairs that annotate the nomad client and can be - // used in scheduling contraints and affinities. + // used in scheduling constraints and affinities. map attributes = 1; enum HealthState { diff --git a/plugins/drivers/testutils/testing.go b/plugins/drivers/testutils/testing.go index eba3fda700a..85152a540f2 100644 --- a/plugins/drivers/testutils/testing.go +++ b/plugins/drivers/testutils/testing.go @@ -78,7 +78,7 @@ func (h *DriverHarness) Kill() { // MkAllocDir creates a temporary directory and allocdir structure. // If enableLogs is set to true a logmon instance will be started to write logs // to the LogDir of the task -// A cleanup func is returned and should be defered so as to not leak dirs +// A cleanup func is returned and should be deferred so as to not leak dirs // between tests. func (h *DriverHarness) MkAllocDir(t *drivers.TaskConfig, enableLogs bool) func() { dir, err := ioutil.TempDir("", "nomad_driver_harness-") diff --git a/scripts/release/mac-remote-build b/scripts/release/mac-remote-build index 4a08c20d9a9..0758382775d 100755 --- a/scripts/release/mac-remote-build +++ b/scripts/release/mac-remote-build @@ -87,7 +87,7 @@ compile EOF -echo '=======>>>> Retreiving mac compiled binaries' +echo '=======>>>> Retrieving mac compiled binaries' rsync -avz --ignore-existing ${remote_macos_host}:"${REPO_REMOTE_PATH}/pkg/" "${REPO}/pkg" ssh ${remote_macos_host} rm -rf "${TMP_WORKSPACE}"