changed misspelled english words (#6432)

This commit is contained in:
T.K 2019-03-19 22:32:45 +09:00 committed by Jeff Mitchell
parent e399d39f0e
commit 453f1ac109
31 changed files with 49 additions and 49 deletions

View File

@ -214,7 +214,7 @@ func TestBackend_acceptance(t *testing.T) {
PreCheck: testAccPreCheck(t, host, port),
AcceptanceTest: true,
Steps: []logicaltest.TestStep{
// Login with valid but unknown user will fail because unregistered_user_policies is emtpy
// Login with valid but unknown user will fail because unregistered_user_policies is empty
testConfigWrite(t, configDataAcceptanceNoAllowUnreg, false),
testAccUserLogin(t, username, dataRealpassword, true),
// Once the user is registered auth will succeed

View File

@ -30,7 +30,7 @@ func pathConfig(b *backend) *framework.Path {
"unregistered_user_policies": &framework.FieldSchema{
Type: framework.TypeString,
Default: "",
Description: "Comma-separated list of policies to grant upon successful RADIUS authentication of an unregisted user (default: emtpy)",
Description: "Comma-separated list of policies to grant upon successful RADIUS authentication of an unregisted user (default: empty)",
DisplayName: "Policies for unregistered users",
},
"dial_timeout": &framework.FieldSchema{

View File

@ -250,7 +250,7 @@ func createUser(t *testing.T, userName string, accessKey *awsAccessKey) {
// 1. Create user, without any permissions or credentials. At this point,
// nobody cares if creds compromised because this user can do nothing.
// 2. Attach the timebomb policy. This grants no access but puts a time limit
// on validitity of compromised credentials. If this fails, nobody cares
// on validity of compromised credentials. If this fails, nobody cares
// because the user has no permissions to do anything anyway
// 3. Attach the AdminAccess policy. The IAM user still has no credentials to
// do anything

View File

@ -2112,7 +2112,7 @@ func TestBackend_SignSelfIssued(t *testing.T) {
// top-level sequence; see
// https://lapo.it/asn1js/#3046A020060A2B060104018237140203A0120C106465766F7073406C6F63616C686F7374A022060A2B060104018237140204A0140C12322D6465766F7073406C6F63616C686F7374 for an openssl-generated example.
//
// The good news is that it's valid to simply copy and paste the PEM ouput from
// The good news is that it's valid to simply copy and paste the PEM output from
// here into the form at that site as it will do the right thing so it's pretty
// easy to validate.
func TestBackend_OID_SANs(t *testing.T) {

View File

@ -1050,7 +1050,7 @@ func testAccStepCreateKey(t *testing.T, name string, keyData map[string]interfac
urlObject, err := url.Parse(d.Url)
if err != nil {
t.Fatal("an error occured while parsing url string")
t.Fatal("an error occurred while parsing url string")
}
//Set up query object

View File

@ -98,7 +98,7 @@ func (b *backend) pathValidateCode(ctx context.Context, req *logical.Request, da
Algorithm: key.Algorithm,
})
if err != nil && err != otplib.ErrValidateInputInvalidLength {
return logical.ErrorResponse("an error occured while validating the code"), err
return logical.ErrorResponse("an error occurred while validating the code"), err
}
// Take the key skew, add two for behind and in front, and multiple that by

View File

@ -208,7 +208,7 @@ func (b *backend) pathKeyCreate(ctx context.Context, req *logical.Request, data
//Parse url
urlObject, err := url.Parse(inputURL)
if err != nil {
return logical.ErrorResponse("an error occured while parsing url string"), err
return logical.ErrorResponse("an error occurred while parsing url string"), err
}
//Set up query object
@ -241,7 +241,7 @@ func (b *backend) pathKeyCreate(ctx context.Context, req *logical.Request, data
if periodQuery != "" {
periodInt, err := strconv.Atoi(periodQuery)
if err != nil {
return logical.ErrorResponse("an error occured while parsing period value in url"), err
return logical.ErrorResponse("an error occurred while parsing period value in url"), err
}
period = periodInt
}
@ -251,7 +251,7 @@ func (b *backend) pathKeyCreate(ctx context.Context, req *logical.Request, data
if digitsQuery != "" {
digitsInt, err := strconv.Atoi(digitsQuery)
if err != nil {
return logical.ErrorResponse("an error occured while parsing digits value in url"), err
return logical.ErrorResponse("an error occurred while parsing digits value in url"), err
}
digits = digitsInt
}
@ -335,7 +335,7 @@ func (b *backend) pathKeyCreate(ctx context.Context, req *logical.Request, data
SecretSize: uintKeySize,
})
if err != nil {
return logical.ErrorResponse("an error occured while generating a key"), err
return logical.ErrorResponse("an error occurred while generating a key"), err
}
// Get key string value

View File

@ -90,7 +90,7 @@ func TestTransit_Restore(t *testing.T) {
// Seed dermines if we start the test by restoring the initial backup we
// took, to test a restore operation based on the key existing or not
Seed bool
// Force is a pointer to differenciate between default false and given false
// Force is a pointer to differentiate between default false and given false
Force *bool
// The error we expect, if any
ExpectedErr error

View File

@ -113,7 +113,7 @@ func (c *AgentCommand) Flags() *FlagSets {
//
// Why hello there little source code reader! Welcome to the Vault source
// code. The remaining options are intentionally undocumented and come with
// no warranty or backwards-compatability promise. Do not use these flags
// no warranty or backwards-compatibility promise. Do not use these flags
// in production. Do not build automation using these flags. Unless you are
// developing against Vault, you should not need any of these flags.

View File

@ -136,15 +136,15 @@ func (a *approleMethod) Authenticate(ctx context.Context, client *api.Client) (s
return "", nil, errors.New("response nil when looking up wrapped secret ID")
}
if resp.Data == nil {
return "", nil, errors.New("data in repsonse nil when looking up wrapped secret ID")
return "", nil, errors.New("data in response nil when looking up wrapped secret ID")
}
creationPathRaw, ok := resp.Data["creation_path"]
if !ok {
return "", nil, errors.New("creation_path in repsonse nil when looking up wrapped secret ID")
return "", nil, errors.New("creation_path in response nil when looking up wrapped secret ID")
}
creationPath, ok := creationPathRaw.(string)
if !ok {
return "", nil, errors.New("creation_path in repsonse could not be parsed as string when looking up wrapped secret ID")
return "", nil, errors.New("creation_path in response could not be parsed as string when looking up wrapped secret ID")
}
if creationPath != a.secretIDResponseWrappingPath {
a.logger.Error("SECURITY: unable to validate wrapping token creation path", "expected", a.secretIDResponseWrappingPath, "found", creationPath)
@ -159,15 +159,15 @@ func (a *approleMethod) Authenticate(ctx context.Context, client *api.Client) (s
return "", nil, errors.New("response nil when unwrapping secret ID")
}
if resp.Data == nil {
return "", nil, errors.New("data in repsonse nil when unwrapping secret ID")
return "", nil, errors.New("data in response nil when unwrapping secret ID")
}
secretIDRaw, ok := resp.Data["secret_id"]
if !ok {
return "", nil, errors.New("secret_id in repsonse nil when unwrapping secret ID")
return "", nil, errors.New("secret_id in response nil when unwrapping secret ID")
}
secretID, ok := secretIDRaw.(string)
if !ok {
return "", nil, errors.New("secret_id in repsonse could not be parsed as string when unwrapping secret ID")
return "", nil, errors.New("secret_id in response could not be parsed as string when unwrapping secret ID")
}
stringSecretID = secretID
}

View File

@ -88,7 +88,7 @@ func Run(args []string) int {
}
// RunCustom allows passing in a base command template to pass to other
// commands. Currenty, this is only used for setting a custom token helper.
// commands. Currently, this is only used for setting a custom token helper.
func RunCustom(args []string, runOpts *RunOptions) int {
if runOpts == nil {
runOpts = &RunOptions{}

View File

@ -203,7 +203,7 @@ func (c *ServerCommand) Flags() *FlagSets {
//
// Why hello there little source code reader! Welcome to the Vault source
// code. The remaining options are intentionally undocumented and come with
// no warranty or backwards-compatability promise. Do not use these flags
// no warranty or backwards-compatibility promise. Do not use these flags
// in production. Do not build automation using these flags. Unless you are
// developing against Vault, you should not need any of these flags.

View File

@ -292,7 +292,7 @@ func (c *ServerCommand) enableFourClusterDev(base *vault.CoreConfig, info map[st
case <-c.ShutdownCh:
c.UI.Output("==> Vault shutdown triggered")
// Stop the listners so that we don't process further client requests.
// Stop the listeners so that we don't process further client requests.
c.cleanupGuard.Do(clusterCleanup)
shutdownTriggered = true

View File

@ -310,7 +310,7 @@ func (c *SSHCommand) Run(args []string) int {
}
// If no mode was given, perform the old-school lookup. Keep this now for
// backwards-compatability, but print a warning.
// backwards-compatibility, but print a warning.
//
// TODO: remove in 0.9.0, convert to validation error
if c.flagMode == "" {
@ -863,7 +863,7 @@ func (c *SSHCommand) parseSSHCommand(args []string) (hostname string, username s
continue
} else {
// The second bare argument is the command to run on the remote host.
// We need to break out and stop parsing arugments now
// We need to break out and stop parsing arguments now
break
}

View File

@ -122,7 +122,7 @@ func TestParseSSHCommand(t *testing.T) {
nil,
},
{
"Flags after the ssh command are not pased because they are part of the command",
"Flags after the ssh command are not passed because they are part of the command",
[]string{
"username@hostname",
"command",

View File

@ -17,7 +17,7 @@ import (
// functions or block ciphers.
type PRF func([]byte, []byte) ([]byte, error)
// CounterMode implements the counter mode KDF that uses a psuedo-random-function (PRF)
// CounterMode implements the counter mode KDF that uses a pseudo-random-function (PRF)
// along with a counter to generate derived keys. The KDF takes a base key
// a derivation context, and the required number of output bits.
func CounterMode(prf PRF, prfLen uint32, key []byte, context []byte, bits uint32) ([]byte, error) {

View File

@ -128,7 +128,7 @@ func (lm *LockManager) RestorePolicy(ctx context.Context, storage logical.Storag
// and we do not look the policy up from storage
//
// - If it was found in cache and we are not using 'force', we should have
// returned above wih error
// returned above with error
var p *Policy
if pRaw == nil {
p, err = lm.getPolicyFromStorage(ctx, storage, name)

View File

@ -305,7 +305,7 @@ func SetupTwoClusterPerfReplication(t testing.T, perfPrimary, perfSecondary *vau
token := secret.WrapInfo.Token
// enable performace secondary
// enable performance secondary
secret, err = perfSecondary.Cores[0].Client.Logical().Write("sys/replication/performance/secondary/enable", map[string]interface{}{
"token": token,
"ca_file": perfPrimary.CACertPEMFile,

View File

@ -779,7 +779,7 @@ func parseMFAHeader(req *logical.Request) error {
// Handle the case where only method name is mentioned and no value
// is supplied
if !strings.Contains(mfaHeaderValue, ":") {
// Mark the presense of method name, but set an empty set to it
// Mark the presence of method name, but set an empty set to it
// indicating that there were no values supplied for the method
if req.MFACreds[mfaHeaderValue] == nil {
req.MFACreds[mfaHeaderValue] = []string{}

View File

@ -71,7 +71,7 @@ func (s *StatusBadRequest) Error() string {
// This is a new type declared to not cause potential compatibility problems if
// the logic around the CodedError changes; in particular for logical request
// paths it is basically ignored, and changing that behavior might cause
// unforseen issues.
// unforeseen issues.
type ReplicationCodedError struct {
Msg string
Code int

View File

@ -150,7 +150,7 @@ func (b *backendGRPCPluginClient) Cleanup(ctx context.Context) {
// This will block until Setup has run the function to create a new server
// in b.server. If we stop here before it has a chance to actually start
// listening, when it starts listening it will immediatley error out and
// listening, when it starts listening it will immediately error out and
// exit, which is fine. Overall this ensures that we do not miss stopping
// the server if it ends up being created after Cleanup is called.
<-b.cleanupCh

View File

@ -561,8 +561,8 @@ var (
// ErrUnlockFailed
ErrUnlockFailed = errors.New("mysql: unable to release lock, already released or not held by this session")
// You were unable to update that you are the new leader in the DB
ErrClaimFailed = errors.New("mysql: unable to update DB with new leader infromation")
// Error to thow if inbetween getting the lock and checking the ID of it we lost it.
ErrClaimFailed = errors.New("mysql: unable to update DB with new leader information")
// Error to throw if between getting the lock and checking the ID of it we lost it.
ErrSettingGlobalID = errors.New("mysql: getting global lock id failed")
)
@ -639,7 +639,7 @@ func (i *MySQLLock) Lock() error {
}
// 1 is returned from GET_LOCK if it was able to get the lock
// 0 if it failed and NULL if some stange error happened.
// 0 if it failed and NULL if some strange error happened.
// https://dev.mysql.com/doc/refman/8.0/en/miscellaneous-functions.html#function_get-lock
if !lock.Valid || lock.Int64 != 1 {
return ErrLockHeld

View File

@ -94,7 +94,7 @@ func TestCassandra_Initialize(t *testing.T) {
}
if !db.Initialized {
t.Fatal("Database should be initalized")
t.Fatal("Database should be initialized")
}
err = db.Close()

View File

@ -90,7 +90,7 @@ func TestInfluxdb_Initialize(t *testing.T) {
}
if !db.Initialized {
t.Fatal("Database should be initalized")
t.Fatal("Database should be initialized")
}
err = db.Close()

View File

@ -29,7 +29,7 @@ func TestMSSQL_Initialize(t *testing.T) {
}
if !db.Initialized {
t.Fatal("Database should be initalized")
t.Fatal("Database should be initialized")
}
err = db.Close()
@ -112,7 +112,7 @@ func TestMSSQL_RotateRootCredentials(t *testing.T) {
}
if !connProducer.Initialized {
t.Fatal("Database should be initalized")
t.Fatal("Database should be initialized")
}
newConf, err := db.RotateRootCredentials(context.Background(), nil)

View File

@ -77,7 +77,7 @@ func TestMySQL_Initialize(t *testing.T) {
}
if !db.Initialized {
t.Fatal("Database should be initalized")
t.Fatal("Database should be initialized")
}
err = db.Close()
@ -227,7 +227,7 @@ func TestMySQL_RotateRootCredentials(t *testing.T) {
}
if !db.Initialized {
t.Fatal("Database should be initalized")
t.Fatal("Database should be initialized")
}
newConf, err := db.RotateRootCredentials(context.Background(), nil)

View File

@ -76,7 +76,7 @@ func TestPostgreSQL_Initialize(t *testing.T) {
}
if !db.Initialized {
t.Fatal("Database should be initalized")
t.Fatal("Database should be initialized")
}
err = db.Close()
@ -186,7 +186,7 @@ func TestPostgreSQL_RenewUser(t *testing.T) {
t.Fatalf("err: %s", err)
}
// Sleep longer than the inital expiration time
// Sleep longer than the initial expiration time
time.Sleep(2 * time.Second)
if err = testCredsExist(t, connURL, username, password); err != nil {
@ -207,7 +207,7 @@ func TestPostgreSQL_RenewUser(t *testing.T) {
t.Fatalf("err: %s", err)
}
// Sleep longer than the inital expiration time
// Sleep longer than the initial expiration time
time.Sleep(2 * time.Second)
if err = testCredsExist(t, connURL, username, password); err != nil {
@ -239,7 +239,7 @@ func TestPostgreSQL_RotateRootCredentials(t *testing.T) {
}
if !connProducer.Initialized {
t.Fatal("Database should be initalized")
t.Fatal("Database should be initialized")
}
newConf, err := db.RotateRootCredentials(context.Background(), nil)

View File

@ -7,10 +7,10 @@ import (
)
var (
ErrNotInitialized = errors.New("connection has not been initalized")
ErrNotInitialized = errors.New("connection has not been initialized")
)
// ConnectionProducer can be used as an embeded interface in the Database
// ConnectionProducer can be used as an embedded interface in the Database
// definition. It implements the methods dealing with individual database
// connections and is used in all the builtin database types.
type ConnectionProducer interface {

View File

@ -9,7 +9,7 @@ import (
"github.com/hashicorp/vault/helper/base62"
)
// CredentialsProducer can be used as an embeded interface in the Database
// CredentialsProducer can be used as an embedded interface in the Database
// definition. It implements the methods for generating user information for a
// particular database type and is used in all the builtin database types.
type CredentialsProducer interface {

View File

@ -10,7 +10,7 @@ import (
// Serve is used to start a plugin's RPC server. It takes an interface that must
// implement a known plugin interface to vault and an optional api.TLSConfig for
// use during the inital unwrap request to vault. The api config is particularly
// use during the initial unwrap request to vault. The api config is particularly
// useful when vault is setup to require client cert checking.
func Serve(plugin interface{}, tlsConfig *api.TLSConfig) {
tlsProvider := pluginutil.VaultPluginTLSProvider(tlsConfig)

View File

@ -1734,7 +1734,7 @@ func (c *Core) PhysicalSealConfigs(ctx context.Context) (*SealConfig, *SealConfi
return nil, nil, errwrap.Wrapf("failed to validate barrier seal configuration at migration check time: {{err}}", err)
}
// In older versions of vault the default seal would not store a type. This
// is here to offer backwards compatability for older seal configs.
// is here to offer backwards compatibility for older seal configs.
if barrierConf.Type == "" {
barrierConf.Type = seal.Shamir
}
@ -1754,7 +1754,7 @@ func (c *Core) PhysicalSealConfigs(ctx context.Context) (*SealConfig, *SealConfi
return nil, nil, errwrap.Wrapf("failed to validate seal configuration at migration check time: {{err}}", err)
}
// In older versions of vault the default seal would not store a type. This
// is here to offer backwards compatability for older seal configs.
// is here to offer backwards compatibility for older seal configs.
if recoveryConf.Type == "" {
recoveryConf.Type = seal.Shamir
}