mirror of https://github.com/kubernetes/kops.git
fix typo in log
This commit is contained in:
parent
4c9b06739c
commit
3847082704
|
|
@ -143,7 +143,7 @@ func (_ *Disk) RenderALI(t *aliup.ALIAPITarget, a, e, changes *Disk) error {
|
|||
}
|
||||
|
||||
if changes != nil && changes.Tags != nil {
|
||||
glog.V(2).Infof("Modifing tags of disk with Name:%q", fi.StringValue(e.Name))
|
||||
glog.V(2).Infof("Modifying tags of disk with Name:%q", fi.StringValue(e.Name))
|
||||
if err := t.Cloud.CreateTags(*e.DiskId, DiskResource, e.Tags); err != nil {
|
||||
return fmt.Errorf("error adding Tags to ALI YunPan: %v", err)
|
||||
}
|
||||
|
|
|
|||
|
|
@ -201,8 +201,8 @@ func (_ *LaunchConfiguration) RenderALI(t *aliup.ALIAPITarget, a, e, changes *La
|
|||
}
|
||||
e.ConfigurationId = fi.String(createScalingConfigurationResponse.ScalingConfigurationId)
|
||||
|
||||
// Disable ScalingGroup, used to bind scalingConfig, we should excute EnableScalingGroup in the task LaunchConfiguration
|
||||
// If the ScalingGroup is active, we can not excute EnableScalingGroup.
|
||||
// Disable ScalingGroup, used to bind scalingConfig, we should execute EnableScalingGroup in the task LaunchConfiguration
|
||||
// If the ScalingGroup is active, we can not execute EnableScalingGroup.
|
||||
if e.ScalingGroup.Active != nil && fi.BoolValue(e.ScalingGroup.Active) {
|
||||
|
||||
glog.V(2).Infof("Disabling LoadBalancer with id:%q", fi.StringValue(e.ScalingGroup.ScalingGroupId))
|
||||
|
|
|
|||
|
|
@ -188,7 +188,7 @@ func (_ *LoadBalancer) RenderALI(t *aliup.ALIAPITarget, a, e, changes *LoadBalan
|
|||
}
|
||||
|
||||
if a != nil && (len(a.Tags) > 0) {
|
||||
glog.V(2).Infof("Modifing LoadBalancer with Name:%q, update LoadBalancer tags", fi.StringValue(e.Name))
|
||||
glog.V(2).Infof("Modifying LoadBalancer with Name:%q, update LoadBalancer tags", fi.StringValue(e.Name))
|
||||
|
||||
tagsToDelete := e.getLoadBalancerTagsToDelete(a.Tags)
|
||||
if len(tagsToDelete) > 0 {
|
||||
|
|
|
|||
|
|
@ -157,7 +157,7 @@ func (_ *ScalingGroup) RenderALI(t *aliup.ALIAPITarget, a, e, changes *ScalingGr
|
|||
} else {
|
||||
//only support to update size
|
||||
if changes.MinSize != nil || changes.MaxSize != nil {
|
||||
glog.V(2).Infof("Modifing AutoscalingGroup with Name:%q", fi.StringValue(e.Name))
|
||||
glog.V(2).Infof("Modifying AutoscalingGroup with Name:%q", fi.StringValue(e.Name))
|
||||
|
||||
modifyScalingGroupArgs := &ess.ModifyScalingGroupArgs{
|
||||
ScalingGroupId: fi.StringValue(a.ScalingGroupId),
|
||||
|
|
@ -166,7 +166,7 @@ func (_ *ScalingGroup) RenderALI(t *aliup.ALIAPITarget, a, e, changes *ScalingGr
|
|||
}
|
||||
_, err := t.Cloud.EssClient().ModifyScalingGroup(modifyScalingGroupArgs)
|
||||
if err != nil {
|
||||
return fmt.Errorf("error modifing autoscalingGroup: %v", err)
|
||||
return fmt.Errorf("error modifying autoscalingGroup: %v", err)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -159,7 +159,7 @@ func (_ *SecurityGroup) RenderALI(t *aliup.ALIAPITarget, a, e, changes *Security
|
|||
}
|
||||
|
||||
if a != nil && (len(a.Tags) > 0) {
|
||||
glog.V(2).Infof("Modifing SecurityGroup with Name:%q", fi.StringValue(e.Name))
|
||||
glog.V(2).Infof("Modifying SecurityGroup with Name:%q", fi.StringValue(e.Name))
|
||||
|
||||
tagsToDelete := e.getGroupTagsToDelete(a.Tags)
|
||||
if len(tagsToDelete) > 0 {
|
||||
|
|
|
|||
|
|
@ -122,7 +122,7 @@ func (_ *VPCCIDRBlock) RenderTerraform(t *terraform.TerraformTarget, a, e, chang
|
|||
return fmt.Errorf("terraform does not support AdditionalCIDRs on VPCs")
|
||||
|
||||
// The code below is based on https://github.com/terraform-providers/terraform-provider-aws/pull/1568
|
||||
// and can be un-comented once it is landed.
|
||||
// and can be un-commented once it is landed.
|
||||
// When this has been enabled please fix test TestAdditionalCIDR in integration_test.go to run runTestAWS.
|
||||
// tf := &terraformVPCCIDRBlock{
|
||||
// VPCID: e.VPC.TerraformLink(),
|
||||
|
|
|
|||
|
|
@ -194,7 +194,7 @@ func (c *ClientsetSecretStore) GetOrCreateSecret(name string, secret *fi.Secret)
|
|||
// Make double-sure it round-trips
|
||||
s, err := c.loadSecret(name)
|
||||
if err != nil {
|
||||
glog.Fatalf("unable to load secret immmediately after creation %v: %v", name, err)
|
||||
glog.Fatalf("unable to load secret immediately after creation %v: %v", name, err)
|
||||
return nil, false, err
|
||||
}
|
||||
return s, true, nil
|
||||
|
|
@ -210,7 +210,7 @@ func (c *ClientsetSecretStore) ReplaceSecret(name string, secret *fi.Secret) (*f
|
|||
// Confirm the secret exists
|
||||
s, err := c.loadSecret(name)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("unable to load secret immmediately after creation: %v", err)
|
||||
return nil, fmt.Errorf("unable to load secret immediately after creation: %v", err)
|
||||
}
|
||||
return s, nil
|
||||
}
|
||||
|
|
|
|||
|
|
@ -171,7 +171,7 @@ func (c *VFSSecretStore) GetOrCreateSecret(id string, secret *fi.Secret) (*fi.Se
|
|||
// Make double-sure it round-trips
|
||||
s, err := c.loadSecret(p)
|
||||
if err != nil {
|
||||
glog.Fatalf("unable to load secret immmediately after creation %v: %v", p, err)
|
||||
glog.Fatalf("unable to load secret immediately after creation %v: %v", p, err)
|
||||
return nil, false, err
|
||||
}
|
||||
return s, true, nil
|
||||
|
|
@ -193,7 +193,7 @@ func (c *VFSSecretStore) ReplaceSecret(id string, secret *fi.Secret) (*fi.Secret
|
|||
// Confirm the secret exists
|
||||
s, err := c.loadSecret(p)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("unable to load secret immmediately after creation %v: %v", p, err)
|
||||
return nil, fmt.Errorf("unable to load secret immediately after creation %v: %v", p, err)
|
||||
}
|
||||
return s, nil
|
||||
}
|
||||
|
|
|
|||
Loading…
Reference in New Issue