mirror of
https://github.com/kemko/nomad.git
synced 2026-01-01 16:05:42 +03:00
fix spelling errors (#6985)
This commit is contained in:
@@ -10,7 +10,7 @@ import (
|
||||
const (
|
||||
// The following levels are the only valid values for the `policy = "read"` stanza.
|
||||
// When policies are merged together, the most privilege is granted, except for deny
|
||||
// which always takes precedence and supercedes.
|
||||
// which always takes precedence and supersedes.
|
||||
PolicyDeny = "deny"
|
||||
PolicyRead = "read"
|
||||
PolicyList = "list"
|
||||
|
||||
@@ -125,7 +125,7 @@ func (a *allocHealthSetter) SetHealth(healthy, isDeploy bool, trackerTaskEvents
|
||||
a.ar.allocBroadcaster.Send(calloc)
|
||||
}
|
||||
|
||||
// initRunnerHooks intializes the runners hooks.
|
||||
// initRunnerHooks initializes the runners hooks.
|
||||
func (ar *allocRunner) initRunnerHooks(config *clientconfig.Config) error {
|
||||
hookLogger := ar.logger.Named("runner_hook")
|
||||
|
||||
|
||||
@@ -281,7 +281,7 @@ func parseSidecarTask(item *ast.ObjectItem) (*api.SidecarTask, error) {
|
||||
KillSignal: task.KillSignal,
|
||||
}
|
||||
|
||||
// Parse ShutdownDelay separately to get pointer
|
||||
// Parse ShutdownDelay separatly to get pointer
|
||||
var m map[string]interface{}
|
||||
if err := hcl.DecodeObject(&m, item.Val); err != nil {
|
||||
return nil, err
|
||||
|
||||
@@ -331,7 +331,7 @@ func (idx *NetworkIndex) AssignNetwork(ask *NetworkResource) (out *NetworkResour
|
||||
|
||||
// getDynamicPortsPrecise takes the nodes used port bitmap which may be nil if
|
||||
// no ports have been allocated yet, the network ask and returns a set of unused
|
||||
// ports to fullfil the ask's DynamicPorts or an error if it failed. An error
|
||||
// ports to fulfil the ask's DynamicPorts or an error if it failed. An error
|
||||
// means the ask can not be satisfied as the method does a precise search.
|
||||
func getDynamicPortsPrecise(nodeUsed Bitmap, ask *NetworkResource) ([]int, error) {
|
||||
// Create a copy of the used ports and apply the new reserves
|
||||
@@ -373,7 +373,7 @@ func getDynamicPortsPrecise(nodeUsed Bitmap, ask *NetworkResource) ([]int, error
|
||||
|
||||
// getDynamicPortsStochastic takes the nodes used port bitmap which may be nil if
|
||||
// no ports have been allocated yet, the network ask and returns a set of unused
|
||||
// ports to fullfil the ask's DynamicPorts or an error if it failed. An error
|
||||
// ports to fulfil the ask's DynamicPorts or an error if it failed. An error
|
||||
// does not mean the ask can not be satisfied as the method has a fixed amount
|
||||
// of random probes and if these fail, the search is aborted.
|
||||
func getDynamicPortsStochastic(nodeUsed Bitmap, ask *NetworkResource) ([]int, error) {
|
||||
|
||||
@@ -1708,7 +1708,7 @@ type Node struct {
|
||||
// COMPAT: Remove in Nomad 0.9
|
||||
// Drain is controlled by the servers, and not the client.
|
||||
// If true, no jobs will be scheduled to this node, and existing
|
||||
// allocations will be drained. Superceded by DrainStrategy in Nomad
|
||||
// allocations will be drained. Superseded by DrainStrategy in Nomad
|
||||
// 0.8 but kept for backward compat.
|
||||
Drain bool
|
||||
|
||||
|
||||
@@ -423,7 +423,7 @@ func TestVaultClient_ValidateRole_Deprecated_Success(t *testing.T) {
|
||||
})
|
||||
}
|
||||
|
||||
func TestVaultClient_ValidateRole_NonExistant(t *testing.T) {
|
||||
func TestVaultClient_ValidateRole_NonExistent(t *testing.T) {
|
||||
t.Parallel()
|
||||
v := testutil.NewTestVault(t)
|
||||
defer v.Stop()
|
||||
|
||||
@@ -426,7 +426,7 @@ var xxx_messageInfo_FingerprintRequest proto.InternalMessageInfo
|
||||
|
||||
type FingerprintResponse struct {
|
||||
// Attributes are key/value pairs that annotate the nomad client and can be
|
||||
// used in scheduling contraints and affinities.
|
||||
// used in scheduling constraints and affinities.
|
||||
Attributes map[string]*proto1.Attribute `protobuf:"bytes,1,rep,name=attributes,proto3" json:"attributes,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
|
||||
// Health is used to determine the state of the health the driver is in.
|
||||
// Health can be one of the following states:
|
||||
|
||||
@@ -109,7 +109,7 @@ message FingerprintResponse {
|
||||
|
||||
|
||||
// Attributes are key/value pairs that annotate the nomad client and can be
|
||||
// used in scheduling contraints and affinities.
|
||||
// used in scheduling constraints and affinities.
|
||||
map<string, hashicorp.nomad.plugins.shared.structs.Attribute> attributes = 1;
|
||||
|
||||
enum HealthState {
|
||||
|
||||
@@ -78,7 +78,7 @@ func (h *DriverHarness) Kill() {
|
||||
// MkAllocDir creates a temporary directory and allocdir structure.
|
||||
// If enableLogs is set to true a logmon instance will be started to write logs
|
||||
// to the LogDir of the task
|
||||
// A cleanup func is returned and should be defered so as to not leak dirs
|
||||
// A cleanup func is returned and should be deferred so as to not leak dirs
|
||||
// between tests.
|
||||
func (h *DriverHarness) MkAllocDir(t *drivers.TaskConfig, enableLogs bool) func() {
|
||||
dir, err := ioutil.TempDir("", "nomad_driver_harness-")
|
||||
|
||||
@@ -87,7 +87,7 @@ compile
|
||||
|
||||
EOF
|
||||
|
||||
echo '=======>>>> Retreiving mac compiled binaries'
|
||||
echo '=======>>>> Retrieving mac compiled binaries'
|
||||
rsync -avz --ignore-existing ${remote_macos_host}:"${REPO_REMOTE_PATH}/pkg/" "${REPO}/pkg"
|
||||
|
||||
ssh ${remote_macos_host} rm -rf "${TMP_WORKSPACE}"
|
||||
|
||||
Reference in New Issue
Block a user