fix-up some spelling mistakes in /pkg

This commit is contained in:
chentanjun 2019-09-26 10:15:44 +08:00
parent ba69006d17
commit 3d1966df84
9 changed files with 10 additions and 10 deletions

View File

@ -146,7 +146,7 @@ type KubeletConfigSpec struct {
EvictionMaxPodGracePeriod int32 `json:"evictionMaxPodGracePeriod,omitempty" flag:"eviction-max-pod-grace-period" flag-empty:"0"`
// Comma-delimited list of minimum reclaims (e.g. imagefs.available=2Gi) that describes the minimum amount of resource the kubelet will reclaim when performing a pod eviction if that resource is under pressure.
EvictionMinimumReclaim string `json:"evictionMinimumReclaim,omitempty" flag:"eviction-minimum-reclaim"`
// The full path of the directory in which to search for additional third party volume plugins (this path must be writeable, dependant on your choice of OS)
// The full path of the directory in which to search for additional third party volume plugins (this path must be writeable, dependent on your choice of OS)
VolumePluginDirectory string `json:"volumePluginDirectory,omitempty" flag:"volume-plugin-dir"`
// Taints to add when registering a node in the cluster
Taints []string `json:"taints,omitempty" flag:"register-with-taints"`

View File

@ -146,7 +146,7 @@ type KubeletConfigSpec struct {
EvictionMaxPodGracePeriod int32 `json:"evictionMaxPodGracePeriod,omitempty" flag:"eviction-max-pod-grace-period" flag-empty:"0"`
// Comma-delimited list of minimum reclaims (e.g. imagefs.available=2Gi) that describes the minimum amount of resource the kubelet will reclaim when performing a pod eviction if that resource is under pressure.
EvictionMinimumReclaim string `json:"evictionMinimumReclaim,omitempty" flag:"eviction-minimum-reclaim"`
// The full path of the directory in which to search for additional third party volume plugins (this path must be writeable, dependant on your choice of OS)
// The full path of the directory in which to search for additional third party volume plugins (this path must be writeable, dependent on your choice of OS)
VolumePluginDirectory string `json:"volumePluginDirectory,omitempty" flag:"volume-plugin-dir"`
// Taints to add when registering a node in the cluster
Taints []string `json:"taints,omitempty" flag:"register-with-taints"`

View File

@ -146,7 +146,7 @@ type KubeletConfigSpec struct {
EvictionMaxPodGracePeriod int32 `json:"evictionMaxPodGracePeriod,omitempty" flag:"eviction-max-pod-grace-period" flag-empty:"0"`
// Comma-delimited list of minimum reclaims (e.g. imagefs.available=2Gi) that describes the minimum amount of resource the kubelet will reclaim when performing a pod eviction if that resource is under pressure.
EvictionMinimumReclaim string `json:"evictionMinimumReclaim,omitempty" flag:"eviction-minimum-reclaim"`
// The full path of the directory in which to search for additional third party volume plugins (this path must be writeable, dependant on your choice of OS)
// The full path of the directory in which to search for additional third party volume plugins (this path must be writeable, dependent on your choice of OS)
VolumePluginDirectory string `json:"volumePluginDirectory,omitempty" flag:"volume-plugin-dir"`
// Taints to add when registering a node in the cluster
Taints []string `json:"taints,omitempty" flag:"register-with-taints"`

View File

@ -422,7 +422,7 @@ func ValidateCluster(c *kops.Cluster, strict bool) *field.Error {
return field.Invalid(path.Child("tokenTTL"), c.Spec.NodeAuthorization.NodeAuthorizer.TokenTTL, "must be greater than or equal to zero")
}
// @question: we could probably just default theses settings in the model when the node-authorizer is enabled??
// @question: we could probably just default these settings in the model when the node-authorizer is enabled??
if c.Spec.KubeAPIServer == nil {
return field.Invalid(field.NewPath("kubeAPIServer"), c.Spec.KubeAPIServer, "bootstrap token authentication is not enabled in the kube-apiserver")
}
@ -720,7 +720,7 @@ func validateEtcdStorage(specs []*kops.EtcdClusterSpec, fieldPath *field.Path) *
// validateEtcdVersion is responsible for validating the storage version of etcd
// @TODO semvar package doesn't appear to ignore a 'v' in v1.1.1 should could be a problem later down the line
func validateEtcdVersion(spec *kops.EtcdClusterSpec, fieldPath *field.Path, minimalVersion *semver.Version) *field.Error {
// @check if the storage is specified, thats is valid
// @check if the storage is specified, that's is valid
if minimalVersion == nil {
v := semver.MustParse("0.0.0")

View File

@ -47,7 +47,7 @@ func (m *imageRemapVisitor) VisitString(path []string, v string, mutator func(st
return nil
}
// Deployments/DaemonSets/Jobs/StatefulSets have two imapge fields
// Deployments/DaemonSets/Jobs/StatefulSets have two image fields
// - spec.template.spec.containers.[2].image
// - spec.template.spec.initContainers.[2].image
if n < 3 || (path[n-3] != "containers" && path[n-3] != "initContainers") {

View File

@ -52,7 +52,7 @@ func (b *AutoscalingGroupModelBuilder) Build(c *fi.ModelBuilderContext) error {
for _, ig := range b.InstanceGroups {
name := b.AutoscalingGroupName(ig)
// @check if his instancegroup is backed by a fleet and overide with a launch template
// @check if his instancegroup is backed by a fleet and override with a launch template
task, err := func() (fi.Task, error) {
switch UseLaunchTemplate(ig) {
case true:

View File

@ -272,7 +272,7 @@ func (b *FirewallModelBuilder) addHTTPSRules(c *fi.ModelBuilderContext, sgMap ma
// addKubeletRules - Add rules to 10250 port
func (b *FirewallModelBuilder) addKubeletRules(c *fi.ModelBuilderContext, sgMap map[string]*openstacktasks.SecurityGroup) error {
//TODO: This is the default port for kubelet and may be overwridden
//TODO: This is the default port for kubelet and may be overridden
masterName := b.SecurityGroupName(kops.InstanceGroupRoleMaster)
nodeName := b.SecurityGroupName(kops.InstanceGroupRoleNode)
masterSG := sgMap[masterName]

View File

@ -89,7 +89,7 @@ func SignNewCertificate(privateKey *PrivateKey, template *x509.Certificate, sign
if template.ExtKeyUsage == nil && !template.IsCA {
template.ExtKeyUsage = []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}
}
//c.SignatureAlgorithm = do we want to overrride?
//c.SignatureAlgorithm = do we want to override?
certificateData, err := x509.CreateCertificate(crypto_rand.Reader, template, parent, template.PublicKey, signerPrivateKey.Key)
if err != nil {

View File

@ -200,7 +200,7 @@ func listDNS(cloud fi.Cloud, clusterName string) ([]*resources.Resource, error)
records, err := getAllRecordsByDomain(c, domainName)
if err != nil {
return nil, fmt.Errorf("faile to list records for domain %s: %s", domainName, err)
return nil, fmt.Errorf("failed to list records for domain %s: %s", domainName, err)
}
var resourceTrackers []*resources.Resource