Skip to content

Commit 4647277

Browse files
authored
Merge pull request kubernetes#84836 from yuxiaobo96/k8s-checks
Correct spelling mistakes
2 parents e6287b0 + 81e9f21 commit 4647277

File tree

48 files changed

+63
-63
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+63
-63
lines changed

build/common.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -306,7 +306,7 @@ function kube::build::has_ip() {
306306
# Detect if a specific image exists
307307
#
308308
# $1 - image repo name
309-
# #2 - image tag
309+
# $2 - image tag
310310
function kube::build::docker_image_exists() {
311311
[[ -n $1 && -n $2 ]] || {
312312
kube::log::error "Internal error. Image not specified in docker_image_exists."

pkg/api/testing/unstructured_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ func doRoundTrip(t *testing.T, internalVersion schema.GroupVersion, externalVers
5252
fuzzer.FuzzerFor(FuzzerFuncs, rand.NewSource(seed), legacyscheme.Codecs).
5353
// We are explicitly overwriting custom fuzzing functions, to ensure
5454
// that InitContainers and their statuses are not generated. This is
55-
// because in thise test we are simply doing json operations, in which
55+
// because in this test we are simply doing json operations, in which
5656
// those disappear.
5757
Funcs(
5858
func(s *api.PodSpec, c fuzz.Continue) {

pkg/controller/certificates/authority/policies.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ type PermissiveSigningPolicy struct {
4747
// TTL is the certificate TTL. It's used to calculate the NotAfter value of
4848
// the certificate.
4949
TTL time.Duration
50-
// Usages are the allowed usages of a certficate.
50+
// Usages are the allowed usages of a certificate.
5151
Usages []capi.KeyUsage
5252
}
5353

pkg/controller/daemon/daemon_controller.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -893,7 +893,7 @@ func (dsc *DaemonSetsController) manage(ds *apps.DaemonSet, nodeList []*v1.Node,
893893
}
894894

895895
// syncNodes deletes given pods and creates new daemon set pods on the given nodes
896-
// returns slice with erros if any
896+
// returns slice with errors if any
897897
func (dsc *DaemonSetsController) syncNodes(ds *apps.DaemonSet, podsToDelete, nodesNeedingDaemonPods []string, hash string) error {
898898
// We need to set expectations before creating/deleting pods to avoid race conditions.
899899
dsKey, err := controller.KeyFunc(ds)

pkg/controller/nodeipam/ipam/range_allocator.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ import (
2323

2424
"k8s.io/klog"
2525

26-
"k8s.io/api/core/v1"
26+
v1 "k8s.io/api/core/v1"
2727
apierrors "k8s.io/apimachinery/pkg/api/errors"
2828
"k8s.io/apimachinery/pkg/types"
2929
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
@@ -61,7 +61,7 @@ type rangeAllocator struct {
6161
// This increases a throughput of CIDR assignment by not blocking on long operations.
6262
nodeCIDRUpdateChannel chan nodeReservedCIDRs
6363
recorder record.EventRecorder
64-
// Keep a set of nodes that are currectly being processed to avoid races in CIDR allocation
64+
// Keep a set of nodes that are currently being processed to avoid races in CIDR allocation
6565
lock sync.Mutex
6666
nodesInProcessing sets.String
6767
}

pkg/controller/nodelifecycle/scheduler/taint_manager.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ import (
4242

4343
const (
4444
// TODO (k82cn): Figure out a reasonable number of workers/channels and propagate
45-
// the number of workers up making it a paramater of Run() function.
45+
// the number of workers up making it a parameter of Run() function.
4646

4747
// NodeUpdateChannelSize defines the size of channel for node update events.
4848
NodeUpdateChannelSize = 10

pkg/controller/nodelifecycle/scheduler/taint_manager_test.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ func TestCreatePod(t *testing.T) {
222222
}
223223
}
224224
if podDeleted != item.expectDelete {
225-
t.Errorf("%v: Unexepected test result. Expected delete %v, got %v", item.description, item.expectDelete, podDeleted)
225+
t.Errorf("%v: Unexpected test result. Expected delete %v, got %v", item.description, item.expectDelete, podDeleted)
226226
}
227227
close(stopCh)
228228
}
@@ -319,7 +319,7 @@ func TestUpdatePod(t *testing.T) {
319319
}
320320
}
321321
if podDeleted != item.expectDelete {
322-
t.Errorf("%v: Unexepected test result. Expected delete %v, got %v", item.description, item.expectDelete, podDeleted)
322+
t.Errorf("%v: Unexpected test result. Expected delete %v, got %v", item.description, item.expectDelete, podDeleted)
323323
}
324324
close(stopCh)
325325
}
@@ -375,7 +375,7 @@ func TestCreateNode(t *testing.T) {
375375
}
376376
}
377377
if podDeleted != item.expectDelete {
378-
t.Errorf("%v: Unexepected test result. Expected delete %v, got %v", item.description, item.expectDelete, podDeleted)
378+
t.Errorf("%v: Unexpected test result. Expected delete %v, got %v", item.description, item.expectDelete, podDeleted)
379379
}
380380
close(stopCh)
381381
}
@@ -499,7 +499,7 @@ func TestUpdateNode(t *testing.T) {
499499
}
500500
}
501501
if podDeleted != item.expectDelete {
502-
t.Errorf("%v: Unexepected test result. Expected delete %v, got %v", item.description, item.expectDelete, podDeleted)
502+
t.Errorf("%v: Unexpected test result. Expected delete %v, got %v", item.description, item.expectDelete, podDeleted)
503503
}
504504
close(stopCh)
505505
}

pkg/controller/podautoscaler/horizontal_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -348,7 +348,7 @@ func (tc *testCase) prepareTestClient(t *testing.T) (*fake.Clientset, *metricsfa
348348
if err := json.Unmarshal([]byte(obj.ObjectMeta.Annotations[autoscaling.HorizontalPodAutoscalerConditionsAnnotation]), &actualConditions); err != nil {
349349
return true, nil, err
350350
}
351-
// TODO: it's ok not to sort these becaues statusOk
351+
// TODO: it's ok not to sort these because statusOk
352352
// contains all the conditions, so we'll never be appending.
353353
// Default to statusOk when missing any specific conditions
354354
if tc.expectedConditions == nil {

pkg/controller/replicaset/replica_set_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1081,7 +1081,7 @@ func TestDeleteControllerAndExpectations(t *testing.T) {
10811081
manager.syncReplicaSet(GetKey(rs, t))
10821082

10831083
if _, exists, err = manager.expectations.GetExpectations(rsKey); exists {
1084-
t.Errorf("Found expectaions, expected none since the ReplicaSet has been deleted.")
1084+
t.Errorf("Found expectations, expected none since the ReplicaSet has been deleted.")
10851085
}
10861086

10871087
// This should have no effect, since we've deleted the ReplicaSet.

pkg/controller/service/controller.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ const (
8181

8282
// serviceLoadBalancerFinalizerFeature is the feature gate name that
8383
// enables Finalizer Protection for Service LoadBalancers.
84-
// orginated from: https://github.com/kubernetes/kubernetes/blob/28e800245e/pkg/features/kube_features.go#L433
84+
// originated from: https://github.com/kubernetes/kubernetes/blob/28e800245e/pkg/features/kube_features.go#L433
8585
serviceLoadBalancerFinalizerFeature = "ServiceLoadBalancerFinalizer"
8686

8787
// legacyNodeRoleBehaviro is the feature gate name that enables legacy

0 commit comments

Comments
 (0)