fix spelling errors (#7135)

This commit is contained in:
Anthony Scalisi 2020-01-27 05:00:33 -08:00 committed by Sarah Christoff
parent d74f605f5c
commit 4b92c2deee
11 changed files with 12 additions and 12 deletions

View File

@ -456,7 +456,7 @@ func TestAgent_Service(t *testing.T) {
// state from config/snapshot again). If we do that naively then we don't
// just get a spurios wakeup on the watch if the service didn't change,
// but we get it wakeup and then race with the reload and probably see no
// services and return a 404 error which is gross. This test excercises
// services and return a 404 error which is gross. This test exercises
// that - even though the registrations were from API not config, they are
// persisted and cleared/reloaded from snapshot which has same effect.
//

View File

@ -29,7 +29,7 @@ func (c *CatalogDatacenters) Fetch(opts cache.FetchOptions, req cache.Request) (
dup := *reqReal
reqReal = &dup
// Allways allow stale - there's no point in hitting leader if the request is
// Always allow stale - there's no point in hitting leader if the request is
// going to be served from cache and endup arbitrarily stale anyway. This
// allows cached service-discover to automatically read scale across all
// servers too.

View File

@ -34,7 +34,7 @@ func (c *HealthServices) Fetch(opts cache.FetchOptions, req cache.Request) (cach
reqReal.QueryOptions.MinQueryIndex = opts.MinIndex
reqReal.QueryOptions.MaxQueryTime = opts.Timeout
// Allways allow stale - there's no point in hitting leader if the request is
// Always allow stale - there's no point in hitting leader if the request is
// going to be served from cache and endup arbitrarily stale anyway. This
// allows cached service-discover to automatically read scale across all
// servers too.

View File

@ -34,7 +34,7 @@ func (c *NodeServices) Fetch(opts cache.FetchOptions, req cache.Request) (cache.
reqReal.QueryOptions.MinQueryIndex = opts.MinIndex
reqReal.QueryOptions.MaxQueryTime = opts.Timeout
// Allways allow stale - there's no point in hitting leader if the request is
// Always allow stale - there's no point in hitting leader if the request is
// going to be served from cache and endup arbitrarily stale anyway. This
// allows cached service-discover to automatically read scale across all
// servers too.

View File

@ -30,7 +30,7 @@ func (c *PreparedQuery) Fetch(opts cache.FetchOptions, req cache.Request) (cache
dup := *reqReal
reqReal = &dup
// Allways allow stale - there's no point in hitting leader if the request is
// Always allow stale - there's no point in hitting leader if the request is
// going to be served from cache and endup arbitrarily stale anyway. This
// allows cached service-discover to automatically read scale across all
// servers too.

View File

@ -59,7 +59,7 @@ func (e *cacheEntryExpiry) Reset() {
}
// expiryHeap is a heap implementation that stores information about
// when entires expire. Implements container/heap.Interface.
// when entries expire. Implements container/heap.Interface.
//
// All operations on the heap and read/write of the heap contents require
// the proper entriesLock to be held on Cache.

View File

@ -30,7 +30,7 @@ const (
MinInterval = time.Second
// DefaultBufSize is the maximum size of the captured
// check output by defaut. Prevents an enormous buffer
// check output by default. Prevents an enormous buffer
// from being captured
DefaultBufSize = 4 * 1024 // 4KB

View File

@ -339,12 +339,12 @@ type RuntimeConfig struct {
// flag: -recursor string [-recursor string]
DNSRecursors []string
// DNSUseCache wether or not to use cache for dns queries
// DNSUseCache whether or not to use cache for dns queries
//
// hcl: dns_config { use_cache = (true|false) }
DNSUseCache bool
// DNSUseCache wether or not to use cache for dns queries
// DNSUseCache whether or not to use cache for dns queries
//
// hcl: dns_config { cache_max_age = "duration" }
DNSCacheMaxAge time.Duration

View File

@ -163,7 +163,7 @@ func TestCoordinate_Nodes(t *testing.T) {
if len(coordinates) != 2 ||
coordinates[0].Node != "bar" ||
coordinates[1].Node != "foo" {
r.Fatalf("expected: bar, foo recieved: %v", coordinates)
r.Fatalf("expected: bar, foo received: %v", coordinates)
}
})
// Filter on a nonexistent node segment

View File

@ -47,7 +47,7 @@ func (s *HTTPServer) addEnterpriseHTMLTemplateVars(vars map[string]interface{})
func parseACLAuthMethodEnterpriseMeta(req *http.Request, _ *structs.ACLAuthMethodEnterpriseMeta) error {
if methodNS := req.URL.Query().Get("authmethod-ns"); methodNS != "" {
return BadRequestError{Reason: "Invalid query paramter: \"authmethod-ns\" - Namespaces is a Consul Enterprise feature"}
return BadRequestError{Reason: "Invalid query parameter: \"authmethod-ns\" - Namespaces is a Consul Enterprise feature"}
}
return nil

View File

@ -25,7 +25,7 @@ const (
// RegisterMonitor registers the proxy with the local Consul agent with a TTL
// health check that is kept alive.
//
// This struct should be intialized with NewRegisterMonitor instead of being
// This struct should be initialized with NewRegisterMonitor instead of being
// allocated directly. Using this struct without calling NewRegisterMonitor
// will result in panics.
type RegisterMonitor struct {