@@ -94,7 +94,7 @@ var _ = Describe("LoginRecord", func() {
|
||||
controller = NewLoginRecordController(k8sClient, ksClient, loginRecordInformer, userInformer, time.Hour, 1)
|
||||
})
|
||||
|
||||
// Add Tests for OpenAPI validation (or additonal CRD features) specified in
|
||||
// Add Tests for OpenAPI validation (or additional CRD features) specified in
|
||||
// your API definition.
|
||||
// Avoid adding tests for vanilla CRUD operations because they would
|
||||
// test Kubernetes API server, which isn't the goal here.
|
||||
|
||||
@@ -46,7 +46,7 @@ var _ = Describe("Namespace", func() {
|
||||
Expect(k8sClient.Create(context.Background(), workspace)).Should(Succeed())
|
||||
})
|
||||
|
||||
// Add Tests for OpenAPI validation (or additonal CRD features) specified in
|
||||
// Add Tests for OpenAPI validation (or additional CRD features) specified in
|
||||
// your API definition.
|
||||
// Avoid adding tests for vanilla CRUD operations because they would
|
||||
// test Kubernetes API server, which isn't the goal here.
|
||||
|
||||
@@ -76,7 +76,7 @@ var _ = Describe("ServiceAccount", func() {
|
||||
}
|
||||
})
|
||||
|
||||
// Add Tests for OpenAPI validation (or additonal CRD features) specified in
|
||||
// Add Tests for OpenAPI validation (or additional CRD features) specified in
|
||||
// your API definition.
|
||||
// Avoid adding tests for vanilla CRUD operations because they would
|
||||
// test Kubernetes API server, which isn't the goal here.
|
||||
|
||||
@@ -128,7 +128,7 @@ func NewController(
|
||||
|
||||
// ProvisionerCapability acts as a value source of its relevant StorageClassCapabilities
|
||||
// so when a PC is created/updated, the corresponding SCCs should be created(if not exists)/updated
|
||||
// we achive this by simply enqueueing the StorageClasses of the same provisioner
|
||||
// we achieve this by simply enqueueing the StorageClasses of the same provisioner
|
||||
// but don't overdo by cascade deleting the SCCs when a PC is deleted
|
||||
// since the role of PCs is more like a template rather than owner to SCCs
|
||||
|
||||
|
||||
@@ -33,7 +33,7 @@ var _ = Describe("Workspace", func() {
|
||||
const timeout = time.Second * 30
|
||||
const interval = time.Second * 1
|
||||
|
||||
// Add Tests for OpenAPI validation (or additonal CRD features) specified in
|
||||
// Add Tests for OpenAPI validation (or additional CRD features) specified in
|
||||
// your API definition.
|
||||
// Avoid adding tests for vanilla CRUD operations because they would
|
||||
// test Kubernetes API server, which isn't the goal here.
|
||||
|
||||
@@ -47,7 +47,7 @@ var _ = Describe("WorkspaceRole", func() {
|
||||
Expect(k8sClient.Create(context.Background(), workspace)).Should(Succeed())
|
||||
})
|
||||
|
||||
// Add Tests for OpenAPI validation (or additonal CRD features) specified in
|
||||
// Add Tests for OpenAPI validation (or additional CRD features) specified in
|
||||
// your API definition.
|
||||
// Avoid adding tests for vanilla CRUD operations because they would
|
||||
// test Kubernetes API server, which isn't the goal here.
|
||||
|
||||
@@ -47,7 +47,7 @@ var _ = Describe("WorkspaceRoleBinding", func() {
|
||||
Expect(k8sClient.Create(context.Background(), workspace)).Should(Succeed())
|
||||
})
|
||||
|
||||
// Add Tests for OpenAPI validation (or additonal CRD features) specified in
|
||||
// Add Tests for OpenAPI validation (or additional CRD features) specified in
|
||||
// your API definition.
|
||||
// Avoid adding tests for vanilla CRUD operations because they would
|
||||
// test Kubernetes API server, which isn't the goal here.
|
||||
|
||||
@@ -61,7 +61,7 @@ var _ = Describe("WorkspaceTemplate", func() {
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
})
|
||||
|
||||
// Add Tests for OpenAPI validation (or additonal CRD features) specified in
|
||||
// Add Tests for OpenAPI validation (or additional CRD features) specified in
|
||||
// your API definition.
|
||||
// Avoid adding tests for vanilla CRUD operations because they would
|
||||
// test Kubernetes API server, which isn't the goal here.
|
||||
|
||||
@@ -203,7 +203,7 @@ func updateMetricStatData(metric monitoring.Metric, scalingMap map[string]float6
|
||||
metricData := metric.MetricData
|
||||
for index, metricValue := range metricData.MetricValues {
|
||||
|
||||
// calulate min, max, avg value first, then squash points with factor
|
||||
// calculate min, max, avg value first, then squash points with factor
|
||||
if metricData.MetricType == monitoring.MetricTypeMatrix {
|
||||
metricData.MetricValues[index].MinValue = getMinPointValue(metricValue.Series)
|
||||
metricData.MetricValues[index].MaxValue = getMaxPointValue(metricValue.Series)
|
||||
|
||||
@@ -47,7 +47,7 @@ func TestOpenPitrixApp(t *testing.T) {
|
||||
// validate package
|
||||
validateResp, err := appOperator.ValidatePackage(validateReq)
|
||||
if err != nil || validateResp.Error != "" {
|
||||
klog.Errorf("validate pacakge failed, error: %s", err)
|
||||
klog.Errorf("validate package failed, error: %s", err)
|
||||
t.FailNow()
|
||||
}
|
||||
|
||||
@@ -58,7 +58,7 @@ func TestOpenPitrixApp(t *testing.T) {
|
||||
// validate corrupted package
|
||||
validateResp, err = appOperator.ValidatePackage(validateReq)
|
||||
if err == nil {
|
||||
klog.Errorf("validate pacakge failed, error: %s", err)
|
||||
klog.Errorf("validate package failed, error: %s", err)
|
||||
t.FailNow()
|
||||
}
|
||||
|
||||
|
||||
@@ -56,7 +56,7 @@ func ParsePaging(req *restful.Request) (limit, offset int) {
|
||||
}
|
||||
offset = (page - 1) * limit
|
||||
|
||||
// use the explict offset
|
||||
// use the explicit offset
|
||||
if start := req.QueryParameter("start"); start != "" {
|
||||
offset = AtoiOrDefault(start, offset)
|
||||
}
|
||||
|
||||
@@ -115,7 +115,7 @@ func (p *Pipeline) ListPipelines() (*devops.PipelineList, error) {
|
||||
}
|
||||
klog.Errorf("API '%s' request response code is '%d'", p.Path, jErr.Code)
|
||||
} else {
|
||||
err = fmt.Errorf("unknow errors happend when communicate with Jenkins")
|
||||
err = fmt.Errorf("unknow errors happened when communicate with Jenkins")
|
||||
}
|
||||
return nil, err
|
||||
}
|
||||
|
||||
@@ -237,7 +237,7 @@ func (c IPAMClient) autoAssign(handleID string, attrs map[string]string, request
|
||||
func (c IPAMClient) assignFromExistingBlock(block *v1alpha1.IPAMBlock, handleID string, attrs map[string]string) (*cnet.IPNet, error) {
|
||||
ips := block.AutoAssign(1, handleID, attrs)
|
||||
if len(ips) == 0 {
|
||||
return nil, fmt.Errorf("block %s has no availabe IP", block.BlockName())
|
||||
return nil, fmt.Errorf("block %s has no available IP", block.BlockName())
|
||||
}
|
||||
|
||||
err := c.incrementHandle(handleID, block, 1)
|
||||
|
||||
Reference in New Issue
Block a user