Fixed a bunch of typos (#7146)

This commit is contained in:
Christian Muehlhaeuser 2019-07-19 03:10:15 +02:00 committed by Jeff Mitchell
parent 128257ef50
commit e6febc5839
12 changed files with 12 additions and 12 deletions

View File

@ -173,7 +173,7 @@ func processTokenLookupResponse(ctx context.Context, logger hclog.Logger, inmemS
resp.Response.Body = ioutil.NopCloser(bytes.NewReader(bodyBytes))
resp.Response.ContentLength = int64(len(bodyBytes))
// Serialize and re-read the reponse
// Serialize and re-read the response
var respBytes bytes.Buffer
err = resp.Response.Write(&respBytes)
if err != nil {

View File

@ -153,7 +153,7 @@ func TestLeaseCache_SendCacheable(t *testing.T) {
t.Fatalf("expected getting proxied response: got %v", diff)
}
// Make the same request again and ensure that the same reponse is returned
// Make the same request again and ensure that the same response is returned
// again.
sendReq = &SendRequest{
Token: "autoauthtoken",

View File

@ -33,7 +33,7 @@ type BoltStore struct {
path string
}
// Options contains all the configuraiton used to open the BoltDB
// Options contains all the configuration used to open the BoltDB
type Options struct {
// Path is the file path to the BoltDB to use
Path string

View File

@ -239,7 +239,7 @@ type RaftConfigurationResponse struct {
Index uint64 `json:"index"`
}
// Peer defines the ID and Adress for a given member of the raft cluster.
// Peer defines the ID and Address for a given member of the raft cluster.
type Peer struct {
ID string `json:"id"`
Address string `json:"address"`

View File

@ -237,7 +237,7 @@ func (s *BoltSnapshotSink) Write(b []byte) (int, error) {
s.l.Lock()
defer s.l.Unlock()
// If someone is writting to this sink then we need to create a file sink to
// If someone is writing to this sink then we need to create a file sink to
// capture the data. This currently only happens when a follower is being
// sent a snapshot.
if s.fileSink == nil {

View File

@ -63,7 +63,7 @@ func (b *backendGRPCPluginClient) Initialize(ctx context.Context, _ *logical.Ini
}
// If the plugin doesn't have Initialize implemented we should not fail
// the initalize call; otherwise this could halt startup of vault.
// the initialize call; otherwise this could halt startup of vault.
grpcStatus, ok := status.FromError(err)
if ok && grpcStatus.Code() == codes.Unimplemented {
return nil

View File

@ -183,7 +183,7 @@ func TestPriorityQueue_PopByKey(t *testing.T) {
testValidateInternalData(t, pq, len(tc)-len(popKeys)-1, true)
}
// testValidateInternalData checks the internal data stucture of the PriorityQueue
// testValidateInternalData checks the internal data structure of the PriorityQueue
// and verifies that items are in-sync. Use drain only at the end of a test,
// because it will mutate the input queue
func testValidateInternalData(t *testing.T, pq *PriorityQueue, expectedSize int, drain bool) {

View File

@ -79,7 +79,7 @@ func TestIdentityStore_EntityDisabled(t *testing.T) {
t.Fatal(err)
}
// Here, should suceed but we should not see the header since it's
// Here, should succeed but we should not see the header since it's
// not in the allowed list
req := client.NewRequest("GET", "/v1/auth/headtest/loginnoerror")
resp, err := client.RawRequest(req)

View File

@ -1175,7 +1175,7 @@ func (i *IdentityStore) pathOIDCIntrospect(ctx context.Context, req *logical.Req
}
// namedKey.rotate(overrides) performs a key rotation on a namedKey and returns the
// verification_ttl that was applied. verification_ttl can be overriden with an
// verification_ttl that was applied. verification_ttl can be overridden with an
// overrideVerificationTTL value >= 0
func (k *namedKey) rotate(ctx context.Context, s logical.Storage, overrideVerificationTTL time.Duration) error {
verificationTTL := k.VerificationTTL

View File

@ -524,7 +524,7 @@ func (ps *PolicyStore) switchedGetPolicy(ctx context.Context, name string, polic
}
}
// Nil-check on the view before proceeding to retrive from storage
// Nil-check on the view before proceeding to retrieve from storage
if view == nil {
return nil, fmt.Errorf("unable to get the barrier subview for policy type %q", policyType)
}

View File

@ -64,7 +64,7 @@ func (s *forwardedRequestRPCServer) ForwardRequest(ctx context.Context, freq *fo
}
// Performance standby nodes will use this value to do wait for WALs to ship
// in order to do a best-effort read after write gurantee
// in order to do a best-effort read after write guarantee
resp.LastRemoteWal = LastWAL(s.core)
return resp, nil

View File

@ -260,7 +260,7 @@ func (m *RollbackManager) Rollback(ctx context.Context, path string) error {
rs := m.startOrLookupRollback(ctx, fullPath, false)
// Since we have the statelock held, tell any inflight rollback to give up
// trying to aquire it. This will prevent deadlocks in the case where we
// trying to acquire it. This will prevent deadlocks in the case where we
// have the write lock. In the case where it was waiting to grab
// a read lock it will then simply continue with the rollback
// operation under the protection of our write lock.