Fix typos in miscellaneous packages

pull/13461/head
Todd Persen 2019-04-17 13:30:22 -07:00
parent 52d6135daf
commit cd64ec8718
31 changed files with 51 additions and 51 deletions

2
.gitignore vendored
View File

@ -11,7 +11,7 @@ vendor
# binary databases # binary databases
influxd.bolt influxd.bolt
# Project distirbution # Project distribution
/dist /dist
# Project binaries. # Project binaries.

View File

@ -38,7 +38,7 @@ func (a *Authorization) Valid() error {
for _, p := range a.Permissions { for _, p := range a.Permissions {
if p.Resource.OrgID != nil && *p.Resource.OrgID != a.OrgID { if p.Resource.OrgID != nil && *p.Resource.OrgID != a.OrgID {
return &Error{ return &Error{
Msg: fmt.Sprintf("permisson %s is not for org id %s", p, a.OrgID), Msg: fmt.Sprintf("permission %s is not for org id %s", p, a.OrgID),
Code: EInvalid, Code: EInvalid,
} }
} }

View File

@ -95,7 +95,7 @@ func (s *SecretService) PutSecret(ctx context.Context, orgID influxdb.ID, key st
// PutSecrets checks to see if the authorizer on context has read and write access to the secret keys provided. // PutSecrets checks to see if the authorizer on context has read and write access to the secret keys provided.
func (s *SecretService) PutSecrets(ctx context.Context, orgID influxdb.ID, m map[string]string) error { func (s *SecretService) PutSecrets(ctx context.Context, orgID influxdb.ID, m map[string]string) error {
// PutSecrets operates on intersection betwen m and keys beloging to orgID. // PutSecrets operates on intersection between m and keys beloging to orgID.
// We need to have read access to those secrets since it deletes the secrets (within the intersection) that have not be overridden. // We need to have read access to those secrets since it deletes the secrets (within the intersection) that have not be overridden.
if err := authorizeReadSecret(ctx, orgID); err != nil { if err := authorizeReadSecret(ctx, orgID); err != nil {
return err return err

View File

@ -448,7 +448,7 @@ func (m *Launcher) run(ctx context.Context) (err error) {
// https://www.vaultproject.io/docs/commands/index.html#environment-variables // https://www.vaultproject.io/docs/commands/index.html#environment-variables
svc, err := vault.NewSecretService() svc, err := vault.NewSecretService()
if err != nil { if err != nil {
m.logger.Error("failed initalizing vault secret service", zap.Error(err)) m.logger.Error("failed initializing vault secret service", zap.Error(err))
return err return err
} }
secretSvc = svc secretSvc = svc

View File

@ -52,7 +52,7 @@ type DashboardService interface {
// AddDashboardCell adds a cell to a dashboard. // AddDashboardCell adds a cell to a dashboard.
AddDashboardCell(ctx context.Context, id ID, c *Cell, opts AddDashboardCellOptions) error AddDashboardCell(ctx context.Context, id ID, c *Cell, opts AddDashboardCellOptions) error
// RemoveDashboardCell removes a dashbaord. // RemoveDashboardCell removes a dashboard.
RemoveDashboardCell(ctx context.Context, dashboardID, cellID ID) error RemoveDashboardCell(ctx context.Context, dashboardID, cellID ID) error
// UpdateDashboardCell replaces the dashboard cell with the provided ID. // UpdateDashboardCell replaces the dashboard cell with the provided ID.

View File

@ -84,9 +84,9 @@ func TestErrorMessage(t *testing.T) {
want: "simple error", want: "simple error",
}, },
{ {
name: "embeded error", name: "embedded error",
err: &platform.Error{Err: &platform.Error{Msg: "embeded error"}}, err: &platform.Error{Err: &platform.Error{Msg: "embedded error"}},
want: "embeded error", want: "embedded error",
}, },
{ {
name: "default error", name: "default error",
@ -120,12 +120,12 @@ func TestErrorOp(t *testing.T) {
want: "op1", want: "op1",
}, },
{ {
name: "embeded error", name: "embedded error",
err: &platform.Error{Op: "op1", Err: &platform.Error{Code: platform.EInvalid}}, err: &platform.Error{Op: "op1", Err: &platform.Error{Code: platform.EInvalid}},
want: "op1", want: "op1",
}, },
{ {
name: "embeded error without op in root level", name: "embedded error without op in root level",
err: &platform.Error{Err: &platform.Error{Code: platform.EInvalid, Op: "op2"}}, err: &platform.Error{Err: &platform.Error{Code: platform.EInvalid, Op: "op2"}},
want: "op2", want: "op2",
}, },
@ -160,12 +160,12 @@ func TestErrorCode(t *testing.T) {
want: platform.ENotFound, want: platform.ENotFound,
}, },
{ {
name: "embeded error", name: "embedded error",
err: &platform.Error{Code: platform.ENotFound, Err: &platform.Error{Code: platform.EInvalid}}, err: &platform.Error{Code: platform.ENotFound, Err: &platform.Error{Code: platform.EInvalid}},
want: platform.ENotFound, want: platform.ENotFound,
}, },
{ {
name: "embeded error with root level code", name: "embedded error with root level code",
err: &platform.Error{Err: &platform.Error{Code: platform.EInvalid}}, err: &platform.Error{Err: &platform.Error{Code: platform.EInvalid}},
want: platform.EInvalid, want: platform.EInvalid,
}, },

View File

@ -20,7 +20,7 @@ type AuthenticationHandler struct {
SessionService platform.SessionService SessionService platform.SessionService
// This is only really used for it's lookup method the specific http // This is only really used for it's lookup method the specific http
// hanlder used to register routes does not matter. // handler used to register routes does not matter.
noAuthRouter *httprouter.Router noAuthRouter *httprouter.Router
Handler http.Handler Handler http.Handler

View File

@ -264,7 +264,7 @@ func (h *FluxHandler) postFluxSpec(w http.ResponseWriter, r *http.Request) {
} }
} }
// fluxParams contain flux funciton parameters as defined by the semantic graph // fluxParams contain flux function parameters as defined by the semantic graph
type fluxParams map[string]string type fluxParams map[string]string
// suggestionResponse provides the parameters available for a given Flux function // suggestionResponse provides the parameters available for a given Flux function

View File

@ -433,7 +433,7 @@ func Test_decodeQueryRequest(t *testing.T) {
}, },
}, },
{ {
name: "valid query request with explict content-type", name: "valid query request with explicit content-type",
args: args{ args: args{
r: func() *http.Request { r: func() *http.Request {
r := httptest.NewRequest("POST", "/", bytes.NewBufferString(`{"query": "from()"}`)) r := httptest.NewRequest("POST", "/", bytes.NewBufferString(`{"query": "from()"}`))

View File

@ -14,7 +14,7 @@ paths:
- $ref: '#/components/parameters/TraceSpan' - $ref: '#/components/parameters/TraceSpan'
responses: responses:
'204': '204':
description: succesfully authenticated description: successfully authenticated
'401': '401':
description: unauthorized access description: unauthorized access
content: content:
@ -3007,12 +3007,12 @@ paths:
- application/vnd.flux - application/vnd.flux
- in: query - in: query
name: org name: org
description: specifies the name of the organization executing the query; if both orgID and org are specified, orgID takes precendence. description: specifies the name of the organization executing the query; if both orgID and org are specified, orgID takes precedence.
schema: schema:
type: string type: string
- in: query - in: query
name: orgID name: orgID
description: specifies the ID of the organization executing the query; if both orgID and org are specified, orgID takes precendence. description: specifies the ID of the organization executing the query; if both orgID and org are specified, orgID takes precedence.
schema: schema:
type: string type: string
requestBody: requestBody:

View File

@ -39,7 +39,7 @@ func NewMockTaskBackend(t *testing.T) *TaskBackend {
FindOrganizationF: func(ctx context.Context, filter platform.OrganizationFilter) (*platform.Organization, error) { FindOrganizationF: func(ctx context.Context, filter platform.OrganizationFilter) (*platform.Organization, error) {
org := &platform.Organization{} org := &platform.Organization{}
if filter.Name != nil { if filter.Name != nil {
if *filter.Name == "non-existant-org" { if *filter.Name == "non-existent-org" {
return nil, &platform.Error{ return nil, &platform.Error{
Err: errors.New("org not found or unauthorized"), Err: errors.New("org not found or unauthorized"),
Msg: "org " + *filter.Name + " not found or unauthorized", Msg: "org " + *filter.Name + " not found or unauthorized",
@ -329,7 +329,7 @@ func TestTaskHandler_handleGetTasks(t *testing.T) {
}, },
{ {
name: "get tasks by org name bad", name: "get tasks by org name bad",
getParams: "org=non-existant-org", getParams: "org=non-existent-org",
fields: fields{ fields: fields{
taskService: &mock.TaskService{ taskService: &mock.TaskService{
FindTasksFn: func(ctx context.Context, f platform.TaskFilter) ([]*platform.Task, int, error) { FindTasksFn: func(ctx context.Context, f platform.TaskFilter) ([]*platform.Task, int, error) {
@ -375,7 +375,7 @@ func TestTaskHandler_handleGetTasks(t *testing.T) {
"error": { "error": {
"code": "not found", "code": "not found",
"error": "org not found or unauthorized", "error": "org not found or unauthorized",
"message": "org non-existant-org not found or unauthorized" "message": "org non-existent-org not found or unauthorized"
}, },
"message": "failed to decode request" "message": "failed to decode request"
}`, }`,

View File

@ -358,7 +358,7 @@ func TestVariableService_handleGetVariable(t *testing.T) {
}, },
}, },
{ {
name: "get a non-existant variable", name: "get a non-existent variable",
args: args{ args: args{
id: "75650d0a636f6d70", id: "75650d0a636f6d70",
}, },
@ -695,7 +695,7 @@ func TestVariableService_handleDeleteVariable(t *testing.T) {
}, },
}, },
{ {
name: "delete a non-existant variable", name: "delete a non-existent variable",
fields: fields{ fields: fields{
&mock.VariableService{ &mock.VariableService{
DeleteVariableF: func(ctx context.Context, id platform.ID) error { DeleteVariableF: func(ctx context.Context, id platform.ID) error {

View File

@ -260,7 +260,7 @@ func (s *Service) createCellView(ctx context.Context, cell *platform.Cell) *plat
return nil return nil
} }
// PutDashboardCell replaces a dashboad cell with the cell contents. // PutDashboardCell replaces a dashboard cell with the cell contents.
func (s *Service) PutDashboardCell(ctx context.Context, id platform.ID, cell *platform.Cell) error { func (s *Service) PutDashboardCell(ctx context.Context, id platform.ID, cell *platform.Cell) error {
d, err := s.FindDashboardByID(ctx, id) d, err := s.FindDashboardByID(ctx, id)
if err != nil { if err != nil {

View File

@ -83,7 +83,7 @@ func (c *Check) CheckHealth(ctx context.Context) Response {
} }
overrideResponse := Response{ overrideResponse := Response{
Name: "manual-override", Name: "manual-override",
Message: "health manually overriden", Message: "health manually overridden",
} }
response.Checks = append(response.Checks, overrideResponse) response.Checks = append(response.Checks, overrideResponse)
} }
@ -117,7 +117,7 @@ func (c *Check) CheckReady(ctx context.Context) Response {
} }
// SetPassthrough allows you to set a handler to use if the request is not a ready or health check. // SetPassthrough allows you to set a handler to use if the request is not a ready or health check.
// This can be usefull if you intend to use this as a middleware. // This can be useful if you intend to use this as a middleware.
func (c *Check) SetPassthrough(h http.Handler) { func (c *Check) SetPassthrough(h http.Handler) {
c.passthroughHandler = h c.passthroughHandler = h
} }

View File

@ -189,7 +189,7 @@ func TestForceHealth(t *testing.T) {
Name: "Health", Name: "Health",
Status: "fail", Status: "fail",
Checks: Responses{ Checks: Responses{
Response{Name: "manual-override", Message: "health manually overriden"}, Response{Name: "manual-override", Message: "health manually overridden"},
Response{Name: "a", Status: "pass"}, Response{Name: "a", Status: "pass"},
}, },
} }

View File

@ -147,7 +147,7 @@ type Point interface {
// the result, potentially reducing string allocations. // the result, potentially reducing string allocations.
AppendString(buf []byte) []byte AppendString(buf []byte) []byte
// FieldIterator retuns a FieldIterator that can be used to traverse the // FieldIterator returns a FieldIterator that can be used to traverse the
// fields of a point without constructing the in-memory map. // fields of a point without constructing the in-memory map.
FieldIterator() FieldIterator FieldIterator() FieldIterator
} }
@ -2266,7 +2266,7 @@ func DeepCopyTags(a Tags) Tags {
// values. // values.
type Fields map[string]interface{} type Fields map[string]interface{}
// FieldIterator retuns a FieldIterator that can be used to traverse the // FieldIterator returns a FieldIterator that can be used to traverse the
// fields of a point without constructing the in-memory map. // fields of a point without constructing the in-memory map.
func (p *point) FieldIterator() FieldIterator { func (p *point) FieldIterator() FieldIterator {
p.Reset() p.Reset()
@ -2387,7 +2387,7 @@ func (p *point) Reset() {
} }
// MarshalBinary encodes all the fields to their proper type and returns the binary // MarshalBinary encodes all the fields to their proper type and returns the binary
// represenation // representation
// NOTE: uint64 is specifically not supported due to potential overflow when we decode // NOTE: uint64 is specifically not supported due to potential overflow when we decode
// again later to an int64 // again later to an int64
// NOTE2: uint is accepted, and may be 64 bits, and is for some reason accepted... // NOTE2: uint is accepted, and may be 64 bits, and is for some reason accepted...

View File

@ -10,7 +10,7 @@ import (
) )
const ( const (
// MinNanoTime is the minumum time that can be represented. // MinNanoTime is the minimum time that can be represented.
// //
// 1677-09-21 00:12:43.145224194 +0000 UTC // 1677-09-21 00:12:43.145224194 +0000 UTC
// //

View File

@ -1,4 +1,4 @@
// Package simple8b implements the 64bit integer encoding algoritm as published // Package simple8b implements the 64bit integer encoding algorithm as published
// by Ann and Moffat in "Index compression using 64-bit words", Softw. Pract. Exper. 2010; 40:131147 // by Ann and Moffat in "Index compression using 64-bit words", Softw. Pract. Exper. 2010; 40:131147
// //
// It is capable of encoding multiple integers with values betweeen 0 and to 1^60 -1, in a single word. // It is capable of encoding multiple integers with values betweeen 0 and to 1^60 -1, in a single word.
@ -21,7 +21,7 @@ package simple8b
// └──────────────┴─────────────────────────────────────────────────────────────┘ // └──────────────┴─────────────────────────────────────────────────────────────┘
// //
// For example, when the number of values can be encoded using 4 bits, selected 5 is encoded in the // For example, when the number of values can be encoded using 4 bits, selected 5 is encoded in the
// 4 most significant bits followed by 15 values encoded used 4 bits each in the remaing 60 bits. // 4 most significant bits followed by 15 values encoded used 4 bits each in the remaining 60 bits.
import ( import (
"encoding/binary" "encoding/binary"
"errors" "errors"

View File

@ -64,7 +64,7 @@ type Plus struct {
tmpSet set tmpSet set
denseList []uint8 // The dense representation of the HLL. denseList []uint8 // The dense representation of the HLL.
sparseList *compressedList // values that can be stored in the sparse represenation. sparseList *compressedList // values that can be stored in the sparse representation.
} }
// NewPlus returns a new Plus with precision p. p must be between 4 and 18. // NewPlus returns a new Plus with precision p. p must be between 4 and 18.

View File

@ -1,4 +1,4 @@
// Package pointer provides utilities for pointer handling that aren't avaliable in go. // Package pointer provides utilities for pointer handling that aren't available in go.
// Feel free to add more pointerification functions for more types as you need them. // Feel free to add more pointerification functions for more types as you need them.
package pointer package pointer

View File

@ -19,7 +19,7 @@ type Encoder interface {
Encode(mfs []*dto.MetricFamily) ([]byte, error) Encode(mfs []*dto.MetricFamily) ([]byte, error)
} }
// Expfmt is encodes metric familes into promtheus exposition format. // Expfmt encodes metric families into prometheus exposition format.
type Expfmt struct { type Expfmt struct {
Format expfmt.Format Format expfmt.Format
} }
@ -64,7 +64,7 @@ func EncodeExpfmt(mfs []*dto.MetricFamily, opts ...expfmt.Format) ([]byte, error
return buf.Bytes(), nil return buf.Bytes(), nil
} }
// JSON is encodes metric familes into JSON. // JSON encodes metric families into JSON.
type JSON struct{} type JSON struct{}
// Encode encodes metrics JSON bytes. This not always works // Encode encodes metrics JSON bytes. This not always works
@ -100,7 +100,7 @@ const (
nsPerMilliseconds = int64(time.Millisecond / time.Nanosecond) nsPerMilliseconds = int64(time.Millisecond / time.Nanosecond)
) )
// LineProtocol is encodes metric familes into influxdb lineprotocl. // LineProtocol encodes metric families into influxdb line protocol.
type LineProtocol struct{} type LineProtocol struct{}
// Encode encodes metrics into line protocol format bytes. // Encode encodes metrics into line protocol format bytes.

View File

@ -24,7 +24,7 @@ type IteratorOptions struct {
// This can be VarRef or a Call. // This can be VarRef or a Call.
Expr influxql.Expr Expr influxql.Expr
// Auxilary tags or values to also retrieve for the point. // Auxiliary tags or values to also retrieve for the point.
Aux []influxql.VarRef Aux []influxql.VarRef
// Data sources from which to receive data. This is only used for encoding // Data sources from which to receive data. This is only used for encoding
@ -489,12 +489,12 @@ var OpenAuthorizer = openAuthorizer{}
// AuthorizeDatabase returns true to allow any operation on a database. // AuthorizeDatabase returns true to allow any operation on a database.
func (a openAuthorizer) AuthorizeDatabase(influxql.Privilege, string) bool { return true } func (a openAuthorizer) AuthorizeDatabase(influxql.Privilege, string) bool { return true }
// AuthorizeSeriesRead allows accesss to any series. // AuthorizeSeriesRead allows access to any series.
func (a openAuthorizer) AuthorizeSeriesRead(database string, measurement []byte, tags models.Tags) bool { func (a openAuthorizer) AuthorizeSeriesRead(database string, measurement []byte, tags models.Tags) bool {
return true return true
} }
// AuthorizeSeriesWrite allows accesss to any series. // AuthorizeSeriesWrite allows access to any series.
func (a openAuthorizer) AuthorizeSeriesWrite(database string, measurement []byte, tags models.Tags) bool { func (a openAuthorizer) AuthorizeSeriesWrite(database string, measurement []byte, tags models.Tags) bool {
return true return true
} }

View File

@ -122,7 +122,7 @@ func NewWAL(path string) *WAL {
path: path, path: path,
enabled: true, enabled: true,
// these options should be overriden by any options in the config // these options should be overridden by any options in the config
SegmentSize: DefaultSegmentSize, SegmentSize: DefaultSegmentSize,
closing: make(chan struct{}), closing: make(chan struct{}),
syncWaiters: make(chan chan error, 1024), syncWaiters: make(chan chan error, 1024),

View File

@ -657,7 +657,7 @@ func (s *Store) Close() error {
return s.db.Close() return s.db.Close()
} }
// DeleteOrg syncronously deletes an org and all their tasks from a bolt store. // DeleteOrg synchronously deletes an org and all their tasks from a bolt store.
func (s *Store) DeleteOrg(ctx context.Context, id platform.ID) error { func (s *Store) DeleteOrg(ctx context.Context, id platform.ID) error {
orgID, err := id.Encode() orgID, err := id.Encode()
if err != nil { if err != nil {

View File

@ -105,7 +105,7 @@ func (qlr *QueryLogReader) ListRuns(ctx context.Context, orgID platform.ID, runF
// Because flux doesnt support piviting on a rowkey that might not exist we need first check if we can pivot with "requestedAt" // Because flux doesnt support piviting on a rowkey that might not exist we need first check if we can pivot with "requestedAt"
// and if that fails we can fall back to pivot without "requestedAt" // and if that fails we can fall back to pivot without "requestedAt"
// TODO(lh): After we transition to a seperation of transactional and analytical stores this can be simplified. // TODO(lh): After we transition to a separation of transactional and analytical stores this can be simplified.
pivotWithRequestedAt := `|> pivot(rowKey:["runID", "scheduledFor", "requestedAt"], columnKey: ["status"], valueColumn: "_time")` pivotWithRequestedAt := `|> pivot(rowKey:["runID", "scheduledFor", "requestedAt"], columnKey: ["status"], valueColumn: "_time")`
pivotWithOutRequestedAt := `|> pivot(rowKey:["runID", "scheduledFor"], columnKey: ["status"], valueColumn: "_time")` pivotWithOutRequestedAt := `|> pivot(rowKey:["runID", "scheduledFor"], columnKey: ["status"], valueColumn: "_time")`

View File

@ -281,7 +281,7 @@ func (d *TaskControlService) AddRunLog(ctx context.Context, taskID, runID influx
run := d.runs[taskID][runID] run := d.runs[taskID][runID]
if run == nil { if run == nil {
panic("cannot add a log to a non existant run") panic("cannot add a log to a non existent run")
} }
run.Log = append(run.Log, influxdb.Log{Time: when.Format(time.RFC3339Nano), Message: log}) run.Log = append(run.Log, influxdb.Log{Time: when.Format(time.RFC3339Nano), Message: log})
return nil return nil

View File

@ -122,7 +122,7 @@ type TestCreds struct {
Token string Token string
} }
// Authorizer returns an authorizer for the credentails in the struct // Authorizer returns an authorizer for the credentials in the struct
func (tc TestCreds) Authorizer() influxdb.Authorizer { func (tc TestCreds) Authorizer() influxdb.Authorizer {
return &influxdb.Authorization{ return &influxdb.Authorization{
ID: tc.AuthorizationID, ID: tc.AuthorizationID,

View File

@ -573,7 +573,7 @@ func DeleteLabel(
}, },
}, },
{ {
name: "deleting a non-existant label", name: "deleting a non-existent label",
fields: LabelFields{ fields: LabelFields{
Labels: []*influxdb.Label{ Labels: []*influxdb.Label{
{ {

View File

@ -183,7 +183,7 @@ func FindSession(
}, },
}, },
{ {
name: "look for not exising session", name: "look for not existing session",
args: args{ args: args{
key: "abc123xyz", key: "abc123xyz",
}, },

View File

@ -216,7 +216,7 @@ func DeleteUserResourceMapping(
}, },
}, },
{ {
name: "deleting a non-existant user", name: "deleting a non-existent user",
fields: UserResourceFields{ fields: UserResourceFields{
UserResourceMappings: []*platform.UserResourceMapping{}, UserResourceMappings: []*platform.UserResourceMapping{},
}, },

View File

@ -275,7 +275,7 @@ func FindVariableByID(init func(VariableFields, *testing.T) (platform.VariableSe
}, },
}, },
{ {
name: "finding a non-existant variable", name: "finding a non-existent variable",
fields: VariableFields{ fields: VariableFields{
Variables: []*platform.Variable{}, Variables: []*platform.Variable{},
}, },
@ -538,7 +538,7 @@ func UpdateVariable(init func(VariableFields, *testing.T) (platform.VariableServ
}, },
}, },
{ {
name: "updating a non-existant variable fails", name: "updating a non-existent variable fails",
fields: VariableFields{ fields: VariableFields{
Variables: []*platform.Variable{}, Variables: []*platform.Variable{},
}, },