Skip to content

Commit

Permalink
Typo fixes. (#141)
Browse files Browse the repository at this point in the history
* Typo fixes.
* gofmt hates me.
  • Loading branch information
notque authored and BugRoger committed Jan 2, 2018
1 parent 6f50d8a commit 8bfc0eb
Show file tree
Hide file tree
Showing 21 changed files with 33 additions and 33 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ It allows to easily manage Kubernetes clusters that are natively integrated with

* Architecured to be operated as a managed service
* Masters are managed centrally
* Nodes are dececentralized in customer's projects
* Nodes are decentralized in customer's projects
* 100% Vanilla Kubernetes
* 100% Compatible Openstack API
* Air-Gapped Masters and Nodes
Expand Down
2 changes: 1 addition & 1 deletion docs/development/changing_docs.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ title: Changing Docs

The self-hosted documentation served by the apiserver is generated using Hugo.

It constists of 2 parts:
It consists of 2 parts:

* Hugo Theme in `contrib/kubernikus-docs-builder/data`
* Markdown docs in `docs`
Expand Down
4 changes: 2 additions & 2 deletions docs/development/helm_dev.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ You will need to provide all of the options which are:
``` --auth-project-domain monsoon3``` the domain of the project
``` --auth-username techuser1``` the user with which to interact

### Chaging values.yaml
### Changing values.yaml
After the fact some values have to be added to the ```values.yaml```:
```
api:
Expand All @@ -37,7 +37,7 @@ The api part represents the host of the ingress definition and has to have some

These openstack things need also be added:
```region``` the region in which this is running
```lbSubnetID``` the private _subnet_ to which the loadbalancer should be added
```lbSubnetID``` the private _subnet_ to which the load balancer should be added
```routerID``` the id of your router.

### The user
Expand Down
2 changes: 1 addition & 1 deletion docs/features.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ type: index

* Architecured to be operated as a managed service
* Masters are managed centrally
* Nodes are dececentralized in customer's projects
* Nodes are decentralized in customer's projects

## Compliant

Expand Down
2 changes: 1 addition & 1 deletion docs/guide/best_practices.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ title: Best Practices

## Automating Authentication Refresh

## Integrationn for CI Systems
## Integration for CI Systems
6 changes: 3 additions & 3 deletions pkg/api/auth/authorizer_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -36,10 +36,10 @@ func TestAuthorizer(t *testing.T) {
assert.NoError(t, err)

req := httptest.NewRequest("GET", "/api/v1/clusters", nil)
assert.NoError(t, authorizer.Authorize(req, &admin), "admin can list clustes")
assert.NoError(t, authorizer.Authorize(req, &admin), "admin can list clusters")
assert.NoError(t, authorizer.Authorize(req, &user), "user can list clusters")

req = httptest.NewRequest("POST", "/api/v1/clusters", nil)
assert.NoError(t, authorizer.Authorize(req, &admin), "admin can create clustes")
assert.Error(t, authorizer.Authorize(req, &user), "user can not create clustes")
assert.NoError(t, authorizer.Authorize(req, &admin), "admin can create clusters")
assert.Error(t, authorizer.Authorize(req, &user), "user can not create clusters")
}
2 changes: 1 addition & 1 deletion pkg/api/rest/api_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -208,7 +208,7 @@ func TestClusterUpdate(t *testing.T) {
},
}
jsonPayload, err := updateObject.MarshalBinary()
assert.NoError(t, err, "marsheling update payload failed")
assert.NoError(t, err, "marshaling update payload failed")
req := createRequest("PUT", "/api/v1/clusters/nase", string(jsonPayload))
code, _, body := result(handler, req)
if !assert.Equal(t, 200, code) {
Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/kubernikus/factory.go
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ func (klusterFactory) KlusterFor(spec models.KlusterSpec) (*v1.Kluster, error) {
}

if k.Spec.Version != util.DEFAULT_KUBERNETES_VERSION {
return nil, fmt.Errorf("Unabled to create cluster. Unsupported Kubernetes version.")
return nil, fmt.Errorf("Unable to create cluster. Unsupported Kubernetes version.")
}

if k.ObjectMeta.Name == "" {
Expand Down
2 changes: 1 addition & 1 deletion pkg/client/helm/client.go
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ func NewClient(kubeClient kubernetes.Interface, kubeConfig *rest.Config, logger
//Lets see how this goes: We close the tunnel as soon as the client is GC'ed.
runtime.SetFinalizer(client, func(_ *helm.Client) {
logger.Log(
"msg", "trearing down tunnel to tiller",
"msg", "tearing down tunnel to tiller",
"host", tillerHost,
"v", 2)
tunnel.Close()
Expand Down
2 changes: 1 addition & 1 deletion pkg/client/openstack/client.go
Original file line number Diff line number Diff line change
Expand Up @@ -497,7 +497,7 @@ func (c *client) getDomainID(client *gophercloud.ServiceClient, domainName strin
c.domainNameToID.Store(domainName, domains[0].ID)
return false, nil
default:
return false, errors.New("More then one domain found")
return false, errors.New("More than one domain found")
}
})
id, _ := c.domainNameToID.Load(domainName)
Expand Down
2 changes: 1 addition & 1 deletion pkg/cmd/kubernikus/certificates/sign.go
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ func (o *SignOptions) BindFlags(flags *pflag.FlagSet) {
flags.StringVar(&o.KubeConfig, "kubeconfig", o.KubeConfig, "Path to the kubeconfig file to use to talk to the Kubernetes apiserver. If unset, try the environment variable KUBECONFIG, as well as in-cluster configuration")
flags.StringVar(&o.Namespace, "namespace", o.Namespace, "Namespace where the kluster is located")
flags.StringVar(&o.CN, "cn", o.CN, "Common name in the certificate")
flags.StringVar(&o.Organization, "organizaion", o.Organization, "Common name in the certificate")
flags.StringVar(&o.Organization, "organization", o.Organization, "Common name in the certificate")
flags.StringVar(&o.ApiURL, "api-url", o.ApiURL, "URL for the apiserver")
}

Expand Down
8 changes: 4 additions & 4 deletions pkg/cmd/kubernikusctl/auth/refresh.go
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ func (o *RefreshOptions) Run(c *cobra.Command) error {
}

if ok, err := o.isCertificateValid(); err != nil {
return errors.Wrap(err, "Verification of certifcates failed.")
return errors.Wrap(err, "Verification of certificates failed.")
} else {
if ok && !o.force {
glog.V(2).Infof("Certificates are good. Doing nothing.")
Expand Down Expand Up @@ -200,7 +200,7 @@ func (o *RefreshOptions) loadKubeconfig() (err error) {
}

func (o *RefreshOptions) isKubernikusContext() (bool, error) {
caCert, err := o.getCACertifciate()
caCert, err := o.getCACertificate()
if err != nil {
return false, err
}
Expand Down Expand Up @@ -235,7 +235,7 @@ func (o *RefreshOptions) autoDetectKubernikusClientMetadata() (string, string, e

parts := strings.Split(cert.Subject.CommonName, "@")
if len(parts) != 2 {
return "", "", errors.Errorf("Couldln't extract username/domain from client certificate %v", parts)
return "", "", errors.Errorf("Couldn't extract username/domain from client certificate %v", parts)
}

return parts[0], parts[1], nil
Expand Down Expand Up @@ -317,7 +317,7 @@ func (o *RefreshOptions) getRawCACertificate() ([]byte, error) {
return certData, nil
}

func (o *RefreshOptions) getCACertifciate() (*x509.Certificate, error) {
func (o *RefreshOptions) getCACertificate() (*x509.Certificate, error) {
data, err := o.getRawCACertificate()
if err != nil {
return nil, err
Expand Down
2 changes: 1 addition & 1 deletion pkg/cmd/kubernikusctl/get/common.go
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ func (o *GetOptions) SetupKubernikusClient() error {
if o._url == "" {
fmt.Println("Auto-Detecting Kubernikus Host ...")
if o.url, err = o.Openstack.DefaultKubernikusURL(); err != nil {
glog.V(2).Infof("Error detecting kubernikust host: %+v", err)
glog.V(2).Infof("Error detecting kubernikus host: %+v", err)
return errors.Errorf("You need to provide --url. Auto-Detection failed.")
}
} else {
Expand Down
2 changes: 1 addition & 1 deletion pkg/cmd/kubernikusctl/get/nodepool.go
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ func validateNodePoolCommandArgs(args []string) error {
return errors.Errorf("Surplus arguments to nodepool, %v", args)
}
if len(args) < 1 {
return errors.Errorf("No clustername given, %v", args)
return errors.Errorf("No cluster name given, %v", args)
}
return nil
}
2 changes: 1 addition & 1 deletion pkg/cmd/kubernikusctl/kubernikusctl.go
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ func NewCommand(name string) *cobra.Command {
c := &cobra.Command{
Use: name,
Short: "Kubernikus Kubectl Plugin",
Long: "Plugin that extends kubectl with Kubernikus convinience features",
Long: "Plugin that extends kubectl with Kubernikus convenience features",
}

c.AddCommand(
Expand Down
2 changes: 1 addition & 1 deletion pkg/controller/base/controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ const (
KLUSTER_RECHECK_INTERVAL = 5 * time.Minute
)

var ErrUnkownKluster = errors.New("unkown kluster")
var ErrUnkownKluster = errors.New("unknown kluster")

type Controller interface {
Run(int, <-chan struct{}, *sync.WaitGroup)
Expand Down
8 changes: 4 additions & 4 deletions pkg/controller/events/event.go
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
package events

const (
FailedCreateNode = "FailedCreateNode"
FailedDeleteNode = "FailedDeleteNode"
SuccessfullCreateNode = "SuccessfullCreateNode"
SuccessfullDeleteNode = "SuccessfullDeleteNode"
FailedCreateNode = "FailedCreateNode"
FailedDeleteNode = "FailedDeleteNode"
SuccessfulCreateNode = "SuccessfulCreateNode"
SuccessfulDeleteNode = "SuccessfulDeleteNode"
)
6 changes: 3 additions & 3 deletions pkg/controller/ground.go
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ func (op *GroundControl) Run(threadiness int, stopCh <-chan struct{}, wg *sync.W
select {
case <-ticker.C:
op.Logger.Log(
"msg", "I now would do reconciliation if its was implemented",
"msg", "I now would do reconciliation if it was implemented",
"kluster_recheck_interval", KLUSTER_RECHECK_INTERVAL,
"v", 2)
//op.queue.Add(true)
Expand Down Expand Up @@ -310,7 +310,7 @@ func (op *GroundControl) klusterUpdate(cur, old interface{}) {

func (op *GroundControl) updatePhase(kluster *v1.Kluster, phase models.KlusterPhase, message string) error {

//Never modify the cache, at leasts thats what I've been told
//Never modify the cache, at least that's what I've been told
kluster, err := op.Clients.Kubernikus.Kubernikus().Klusters(kluster.Namespace).Get(kluster.Name, metav1.GetOptions{})
if err != nil {
return err
Expand Down Expand Up @@ -539,7 +539,7 @@ func (op *GroundControl) discoverOpenstackInfo(kluster *v1.Kluster) error {
"project", kluster.Account())
copy.Spec.Openstack.RouterID = selectedRouter.ID
} else {
return fmt.Errorf("Found %d routers in project. Autoconfiguration not possible.", numRouters)
return fmt.Errorf("Found %d routers in project. Auto-configuration not possible.", numRouters)
}
}

Expand Down
4 changes: 2 additions & 2 deletions pkg/controller/launch/eventing.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ func (epm *EventingPoolManager) CreateNode() (id string, err error) {
id, err = epm.PoolManager.CreateNode()

if err == nil {
epm.Recorder.Eventf(epm.Kluster, api_v1.EventTypeNormal, events.SuccessfullCreateNode, "Successfully created node %v", id)
epm.Recorder.Eventf(epm.Kluster, api_v1.EventTypeNormal, events.SuccessfulCreateNode, "Successfully created node %v", id)
} else {
epm.Recorder.Eventf(epm.Kluster, api_v1.EventTypeWarning, events.FailedCreateNode, "Failed to created node: %v", err)
}
Expand All @@ -38,7 +38,7 @@ func (epm *EventingPoolManager) DeleteNode(id string) (err error) {
err = epm.PoolManager.DeleteNode(id)

if err == nil {
epm.Recorder.Eventf(epm.Kluster, api_v1.EventTypeNormal, events.SuccessfullDeleteNode, "Successfully deleted node %v", id)
epm.Recorder.Eventf(epm.Kluster, api_v1.EventTypeNormal, events.SuccessfulDeleteNode, "Successfully deleted node %v", id)
} else {
epm.Recorder.Eventf(epm.Kluster, api_v1.EventTypeWarning, events.FailedDeleteNode, "Failed to delete node: %v", err)
}
Expand Down
2 changes: 1 addition & 1 deletion pkg/wormhole/server/tunnel.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ func NewTunnel(options *Options) (*Tunnel, error) {
}
caPool, err := loadCAFile(options.ClientCA)
if err != nil {
return nil, fmt.Errorf("Faile to load ca file %s: %s", options.ClientCA, err)
return nil, fmt.Errorf("Failed to load ca file %s: %s", options.ClientCA, err)
}
tlsConfig.ClientAuth = tls.RequireAndVerifyClientCert
tlsConfig.ClientCAs = caPool
Expand Down
2 changes: 1 addition & 1 deletion test/e2e/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ Triggering a specific phase ca be done as seen below:
```
make tests-e2e <phase>
```
Availabe phases are:
Available phases are:
```
create - create a new cluster
api - run API tests
Expand Down

0 comments on commit 8bfc0eb

Please sign in to comment.