fix typo in log

This commit is contained in:
Rongxiang Song 2018-10-24 16:24:56 +08:00
parent 4c9b06739c
commit 3847082704
8 changed files with 12 additions and 12 deletions

View File

@ -143,7 +143,7 @@ func (_ *Disk) RenderALI(t *aliup.ALIAPITarget, a, e, changes *Disk) error {
}
if changes != nil && changes.Tags != nil {
glog.V(2).Infof("Modifing tags of disk with Name:%q", fi.StringValue(e.Name))
glog.V(2).Infof("Modifying tags of disk with Name:%q", fi.StringValue(e.Name))
if err := t.Cloud.CreateTags(*e.DiskId, DiskResource, e.Tags); err != nil {
return fmt.Errorf("error adding Tags to ALI YunPan: %v", err)
}

View File

@ -201,8 +201,8 @@ func (_ *LaunchConfiguration) RenderALI(t *aliup.ALIAPITarget, a, e, changes *La
}
e.ConfigurationId = fi.String(createScalingConfigurationResponse.ScalingConfigurationId)
// Disable ScalingGroup, used to bind scalingConfig, we should excute EnableScalingGroup in the task LaunchConfiguration
// If the ScalingGroup is active, we can not excute EnableScalingGroup.
// Disable ScalingGroup, used to bind scalingConfig, we should execute EnableScalingGroup in the task LaunchConfiguration
// If the ScalingGroup is active, we can not execute EnableScalingGroup.
if e.ScalingGroup.Active != nil && fi.BoolValue(e.ScalingGroup.Active) {
glog.V(2).Infof("Disabling LoadBalancer with id:%q", fi.StringValue(e.ScalingGroup.ScalingGroupId))

View File

@ -188,7 +188,7 @@ func (_ *LoadBalancer) RenderALI(t *aliup.ALIAPITarget, a, e, changes *LoadBalan
}
if a != nil && (len(a.Tags) > 0) {
glog.V(2).Infof("Modifing LoadBalancer with Name:%q, update LoadBalancer tags", fi.StringValue(e.Name))
glog.V(2).Infof("Modifying LoadBalancer with Name:%q, update LoadBalancer tags", fi.StringValue(e.Name))
tagsToDelete := e.getLoadBalancerTagsToDelete(a.Tags)
if len(tagsToDelete) > 0 {

View File

@ -157,7 +157,7 @@ func (_ *ScalingGroup) RenderALI(t *aliup.ALIAPITarget, a, e, changes *ScalingGr
} else {
//only support to update size
if changes.MinSize != nil || changes.MaxSize != nil {
glog.V(2).Infof("Modifing AutoscalingGroup with Name:%q", fi.StringValue(e.Name))
glog.V(2).Infof("Modifying AutoscalingGroup with Name:%q", fi.StringValue(e.Name))
modifyScalingGroupArgs := &ess.ModifyScalingGroupArgs{
ScalingGroupId: fi.StringValue(a.ScalingGroupId),
@ -166,7 +166,7 @@ func (_ *ScalingGroup) RenderALI(t *aliup.ALIAPITarget, a, e, changes *ScalingGr
}
_, err := t.Cloud.EssClient().ModifyScalingGroup(modifyScalingGroupArgs)
if err != nil {
return fmt.Errorf("error modifing autoscalingGroup: %v", err)
return fmt.Errorf("error modifying autoscalingGroup: %v", err)
}
}
}

View File

@ -159,7 +159,7 @@ func (_ *SecurityGroup) RenderALI(t *aliup.ALIAPITarget, a, e, changes *Security
}
if a != nil && (len(a.Tags) > 0) {
glog.V(2).Infof("Modifing SecurityGroup with Name:%q", fi.StringValue(e.Name))
glog.V(2).Infof("Modifying SecurityGroup with Name:%q", fi.StringValue(e.Name))
tagsToDelete := e.getGroupTagsToDelete(a.Tags)
if len(tagsToDelete) > 0 {

View File

@ -122,7 +122,7 @@ func (_ *VPCCIDRBlock) RenderTerraform(t *terraform.TerraformTarget, a, e, chang
return fmt.Errorf("terraform does not support AdditionalCIDRs on VPCs")
// The code below is based on https://github.com/terraform-providers/terraform-provider-aws/pull/1568
// and can be un-comented once it is landed.
// and can be un-commented once it is landed.
// When this has been enabled please fix test TestAdditionalCIDR in integration_test.go to run runTestAWS.
// tf := &terraformVPCCIDRBlock{
// VPCID: e.VPC.TerraformLink(),

View File

@ -194,7 +194,7 @@ func (c *ClientsetSecretStore) GetOrCreateSecret(name string, secret *fi.Secret)
// Make double-sure it round-trips
s, err := c.loadSecret(name)
if err != nil {
glog.Fatalf("unable to load secret immmediately after creation %v: %v", name, err)
glog.Fatalf("unable to load secret immediately after creation %v: %v", name, err)
return nil, false, err
}
return s, true, nil
@ -210,7 +210,7 @@ func (c *ClientsetSecretStore) ReplaceSecret(name string, secret *fi.Secret) (*f
// Confirm the secret exists
s, err := c.loadSecret(name)
if err != nil {
return nil, fmt.Errorf("unable to load secret immmediately after creation: %v", err)
return nil, fmt.Errorf("unable to load secret immediately after creation: %v", err)
}
return s, nil
}

View File

@ -171,7 +171,7 @@ func (c *VFSSecretStore) GetOrCreateSecret(id string, secret *fi.Secret) (*fi.Se
// Make double-sure it round-trips
s, err := c.loadSecret(p)
if err != nil {
glog.Fatalf("unable to load secret immmediately after creation %v: %v", p, err)
glog.Fatalf("unable to load secret immediately after creation %v: %v", p, err)
return nil, false, err
}
return s, true, nil
@ -193,7 +193,7 @@ func (c *VFSSecretStore) ReplaceSecret(id string, secret *fi.Secret) (*fi.Secret
// Confirm the secret exists
s, err := c.loadSecret(p)
if err != nil {
return nil, fmt.Errorf("unable to load secret immmediately after creation %v: %v", p, err)
return nil, fmt.Errorf("unable to load secret immediately after creation %v: %v", p, err)
}
return s, nil
}