Skip to content

Commit c76d616

Browse files
author
jojimt
authored
Merge pull request #624 from dseevr/typos
*: fix misspellings project-wide and integrate `misspell` tool into 'checks' target to catch them
2 parents f688944 + 7594d22 commit c76d616

27 files changed

+68
-58
lines changed

Makefile

+5-1
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,10 @@ govet-src: $(PKG_DIRS)
5555
$(info +++ govet $(PKG_DIRS))
5656
@for dir in $?; do $(GOVET_CMD) $${dir} || exit 1;done
5757

58+
misspell-src: $(PKG_DIRS)
59+
$(info +++ check spelling $(PKG_DIRS))
60+
misspell -locale US -error $?
61+
5862
go-version:
5963
$(info +++ check go version)
6064
ifneq ($(GO_VERSION), $(lastword $(sort $(GO_VERSION) $(GO_MIN_VERSION))))
@@ -64,7 +68,7 @@ ifneq ($(GO_VERSION), $(firstword $(sort $(GO_VERSION) $(GO_MAX_VERSION))))
6468
$(error go version check failed, expected <= $(GO_MAX_VERSION), found $(GO_VERSION))
6569
endif
6670

67-
checks: go-version gofmt-src golint-src govet-src
71+
checks: go-version gofmt-src golint-src govet-src misspell-src
6872

6973
# We cannot perform sudo inside a golang, the only reason to split the rules
7074
# here

core/core.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ limitations under the License.
2121
// hardware/kernel/device specific programming implementation, if any.
2222
package core
2323

24-
// Address is a string represenation of a network address (mac, ip, dns-name, url etc)
24+
// Address is a string representation of a network address (mac, ip, dns-name, url etc)
2525
type Address struct {
2626
addr string
2727
}

docs/Design.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This section provides a brief overview of some terms used in rest of the documen
2323
2424
In application delivery environments, a management system coordinates the efforts of agents to accomplish the goal of placing applications in a cluster of resources (like compute, storage and network) based on their requirements, using the available resources efficiently and effectively. The management system also provides a front end (a central command control) to accept/input the application requirements. In other contexts, application delivery environments are also referred to as orchestration or scheduling platforms, container runtimes etc and the applications are also referred to as compute jobs or services.
2525

26-
In application delivery environments there is usually atleast one agent per managed resource. And the application requirements may include (but are not limited to) specification of resource constraints and affinities; communication patterns etc.
26+
In application delivery environments there is usually at least one agent per managed resource. And the application requirements may include (but are not limited to) specification of resource constraints and affinities; communication patterns etc.
2727

2828
Unless explicitly stated otherwise, for the logic performed at the managed resource the Management Function refers to the agent running on that resource, otherwise it refers to the central command control for the user facing logic like accepting/processing application requirement.
2929

@@ -44,7 +44,7 @@ Logically centralized decision making refers to the act of reaching consensus on
4444

4545
##Design Goals
4646
Integrating a management function with a network function usually requires a coupling of the two, thereby resulting in following challenges:
47-
- There is often unclarity/uncertainity of the definition of the integrating interfaces between the two without an available implementation of atleast one. This becomes even harder if both the implementations are a work in progress by independent teams, which is usually the case.
47+
- There is often unclarity/uncertainty of the definition of the integrating interfaces between the two without an available implementation of at least one. This becomes even harder if both the implementations are a work in progress by independent teams, which is usually the case.
4848
- It is difficulty to intermix the available implementations of functions without re-writing/modifying the functions themselves.
4949
- There is a risk of exposing network function configuration (usually technology specific, imperative, procedural in nature) as management function configuration (which can be intent-based/declarative, promise-based etc), thereby complicating user experience. Example, to use a switch capable of supporting multi-teanancy using vlans and qos if the APIs exposed by the management function need to take care of specifying these values then it impedes defining a high-level API at management function.
5050

@@ -148,7 +148,7 @@ As discussed above the Plugin interface implementation invokes the Driver interf
148148
4. Resource deallocation for a network (vlan ids, vxlan ids) and endpoint (ip address) happens before the deletion of network and endpoint respectively.
149149

150150
Notes:
151-
- The above constraints provide guarantees wrt the order of Driver interface invocation. However, they do not guarantee the presence/absence of the state when the Driver interface is actually invoked. The driver implementations are expected to deal with such scenarios. Example, when a delete for endpoint is received it is not guranteed that the network state will exist. So a driver implementation might need to cache/keep enough state to handle endpoint deletion gracefully.
151+
- The above constraints provide guarantees wrt the order of Driver interface invocation. However, they do not guarantee the presence/absence of the state when the Driver interface is actually invoked. The driver implementations are expected to deal with such scenarios. Example, when a delete for endpoint is received it is not guaranteed that the network state will exist. So a driver implementation might need to cache/keep enough state to handle endpoint deletion gracefully.
152152
- The Constraints 'c' and 'd' might become out of scope of the Plugin interface based on design approach we pick. See section on [open design items](#open-items-and-ongoing-work>)
153153

154154
##Integration Details

mgmtfn/dockplugin/dockplugin.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ func httpError(w http.ResponseWriter, message string, err error) {
129129

130130
content, errc := json.Marshal(api.Response{Err: fullError})
131131
if errc != nil {
132-
log.Warnf("Error received marshalling error response: %v, original error: %s", errc, fullError)
132+
log.Warnf("Error received marshaling error response: %v, original error: %s", errc, fullError)
133133
return
134134
}
135135

mgmtfn/k8splugin/types.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ const (
195195
ServiceAffinityNone ServiceAffinity = "None"
196196
)
197197

198-
// Protocol defines network protocols supported for things like conatiner ports.
198+
// Protocol defines network protocols supported for things like container ports.
199199
type Protocol string
200200

201201
const (
@@ -288,7 +288,7 @@ type ServiceSpec struct {
288288
SessionAffinity ServiceAffinity `json:"sessionAffinity,omitempty"`
289289
}
290290

291-
// ServicePort conatins information on service's port.
291+
// ServicePort contains information on service's port.
292292
type ServicePort struct {
293293
// The name of this port within the service. This must be a DNS_LABEL.
294294
// All ports within a ServiceSpec must have unique names. This maps to

mgmtfn/mesosplugin/netcontiv/cniplugin.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -194,15 +194,15 @@ func (cniApp *cniAppInfo) handleHTTP(url string, jsonReq *bytes.Buffer) int {
194194
switch httpResp.StatusCode {
195195

196196
case http.StatusOK:
197-
cniLog.Infof("received http OK reponse from netplugin")
197+
cniLog.Infof("received http OK response from netplugin")
198198
info, err := ioutil.ReadAll(httpResp.Body)
199199
if err != nil {
200200
return cniApp.sendCniErrorResp("failed to read success response from netplugin :" + err.Error())
201201
}
202202
return cniApp.sendCniResp(info, cniapi.CniStatusSuccess)
203203

204204
case http.StatusInternalServerError:
205-
cniLog.Infof("received http error reponse from netplugin")
205+
cniLog.Infof("received http error response from netplugin")
206206
info, err := ioutil.ReadAll(httpResp.Body)
207207
if err != nil {
208208
return cniApp.sendCniErrorResp("failed to read error response from netplugin :" + err.Error())

netmaster/daemon/daemon.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ func (d *MasterDaemon) registerRoutes(router *mux.Router) {
200200
resp, err := json.Marshal(info)
201201
if err != nil {
202202
http.Error(w,
203-
core.Errorf("marshalling json failed. Error: %s", err).Error(),
203+
core.Errorf("marshaling json failed. Error: %s", err).Error(),
204204
http.StatusInternalServerError)
205205
return
206206
}

netmaster/daemon/utils.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ func getVersion(w http.ResponseWriter, r *http.Request) {
4242
resp, err := json.Marshal(ver)
4343
if err != nil {
4444
http.Error(w,
45-
core.Errorf("marshalling json failed. Error: %s", err).Error(),
45+
core.Errorf("marshaling json failed. Error: %s", err).Error(),
4646
http.StatusInternalServerError)
4747
return
4848
}
@@ -185,7 +185,7 @@ func get(getAll bool, hook func(id string) ([]core.State, error)) func(http.Resp
185185

186186
if resp, err = json.Marshal(states); err != nil {
187187
http.Error(w,
188-
core.Errorf("marshalling json failed. Error: %s", err).Error(),
188+
core.Errorf("marshaling json failed. Error: %s", err).Error(),
189189
http.StatusInternalServerError)
190190
return
191191
}

netmaster/master/provider.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ import (
2121
"github.com/contiv/netplugin/utils"
2222
)
2323

24-
//SvcProviderUpdate propogates service provider updates to netplugins
24+
//SvcProviderUpdate propagates service provider updates to netplugins
2525
func SvcProviderUpdate(serviceID string, isDelete bool) error {
2626
providerList := []string{}
2727

netmaster/objApi/objapi_test.go

+17-17
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ func cleanupState() {
130130
}
131131
}
132132

133-
// checkError checks for error and fails teh test
133+
// checkError checks for error and fails the test
134134
func checkError(t *testing.T, testStr string, err error) {
135135
if err != nil {
136136
t.Fatalf("Error during %s. Err: %v", testStr, err)
@@ -405,7 +405,7 @@ func checkCreateNetProfile(t *testing.T, expError bool, dscp, burst int, bandwid
405405
if err != nil && !expError {
406406
t.Fatalf("Error creating Netprofile {%+v}. Err: %v", np, err)
407407
} else if err == nil && expError {
408-
t.Fatalf("Create NetProfile {%+v} succeded while expecing error", np)
408+
t.Fatalf("Create NetProfile {%+v} succeeded while expecing error", np)
409409
} else if err == nil {
410410
//check if netprofile is created.
411411
_, err := contivClient.NetprofileGet(tenantName, profileName)
@@ -435,7 +435,7 @@ func checkDeleteNetProfile(t *testing.T, expError bool, profileName, tenantName
435435
if err != nil && !expError {
436436
t.Fatalf("Error deleting Netprofile %s/%s Err: %v", profileName, tenantName, err)
437437
} else if err == nil && expError {
438-
t.Fatalf("delete NetProfile %s/%s succeded while expecing error", profileName, tenantName)
438+
t.Fatalf("delete NetProfile %s/%s succeeded while expecing error", profileName, tenantName)
439439
} else if err == nil {
440440
//check if netprofile is deleted.
441441
_, err := contivClient.NetprofileGet(tenantName, profileName)
@@ -491,7 +491,7 @@ func checkCreateEpgNp(t *testing.T, expError bool, tenant, ProfileName, network,
491491
if err != nil && !expError {
492492
t.Fatalf("Error creating epg {%+v}. Err: %v", epg, err)
493493
} else if err == nil && expError {
494-
t.Fatalf("Create epg {%+v} succeded while expecing error", epg)
494+
t.Fatalf("Create epg {%+v} succeeded while expecing error", epg)
495495
} else if err == nil {
496496
// verify epg is created
497497
_, err := contivClient.EndpointGroupGet(tenant, group)
@@ -834,34 +834,34 @@ func TestTenantAddDelete(t *testing.T) {
834834

835835
// Try creating invalid names and verify we get an error
836836
if contivClient.TenantPost(&client.Tenant{TenantName: "tenant:invalid"}) == nil {
837-
t.Fatalf("tenant create succedded while expecting error")
837+
t.Fatalf("tenant create succeeded while expecting error")
838838
}
839839
if contivClient.TenantPost(&client.Tenant{TenantName: "tenant|invalid"}) == nil {
840-
t.Fatalf("tenant create succedded while expecting error")
840+
t.Fatalf("tenant create succeeded while expecting error")
841841
}
842842
if contivClient.TenantPost(&client.Tenant{TenantName: "tenant\\invalid"}) == nil {
843-
t.Fatalf("tenant create succedded while expecting error")
843+
t.Fatalf("tenant create succeeded while expecting error")
844844
}
845845
if contivClient.TenantPost(&client.Tenant{TenantName: "tenant#invalid"}) == nil {
846-
t.Fatalf("tenant create succedded while expecting error")
846+
t.Fatalf("tenant create succeeded while expecting error")
847847
}
848848
if contivClient.TenantPost(&client.Tenant{TenantName: "-tenant"}) == nil {
849-
t.Fatalf("tenant create succedded while expecting error")
849+
t.Fatalf("tenant create succeeded while expecting error")
850850
}
851851
if contivClient.TenantPost(&client.Tenant{TenantName: "tenant@invalid"}) == nil {
852-
t.Fatalf("tenant create succedded while expecting error")
852+
t.Fatalf("tenant create succeeded while expecting error")
853853
}
854854
if contivClient.TenantPost(&client.Tenant{TenantName: "tenant!invalid"}) == nil {
855-
t.Fatalf("tenant create succedded while expecting error")
855+
t.Fatalf("tenant create succeeded while expecting error")
856856
}
857857
if contivClient.TenantPost(&client.Tenant{TenantName: "tenant~invalid"}) == nil {
858-
t.Fatalf("tenant create succedded while expecting error")
858+
t.Fatalf("tenant create succeeded while expecting error")
859859
}
860860
if contivClient.TenantPost(&client.Tenant{TenantName: "tenant*invalid"}) == nil {
861-
t.Fatalf("tenant create succedded while expecting error")
861+
t.Fatalf("tenant create succeeded while expecting error")
862862
}
863863
if contivClient.TenantPost(&client.Tenant{TenantName: "tenant^invalid"}) == nil {
864-
t.Fatalf("tenant create succedded while expecting error")
864+
t.Fatalf("tenant create succeeded while expecting error")
865865
}
866866

867867
// delete tenant
@@ -1921,11 +1921,11 @@ func verifyServiceCreate(t *testing.T, tenant, network, serviceName string, port
19211921
}
19221922

19231923
if serviceLbState.IPAddress == "" {
1924-
t.Fatalf("Service Created does not have an ip addres allocated")
1924+
t.Fatalf("Service Created does not have an ip address allocated")
19251925
}
19261926

19271927
if preferredIP != "" && serviceLbState.IPAddress != preferredIP {
1928-
t.Fatalf("Service Created does not have preferred ip addres allocated")
1928+
t.Fatalf("Service Created does not have preferred ip address allocated")
19291929
}
19301930

19311931
}
@@ -2100,7 +2100,7 @@ func get(getAll bool, hook func(id string) ([]core.State, error)) func(http.Resp
21002100

21012101
if resp, err = json.Marshal(states); err != nil {
21022102
http.Error(w,
2103-
core.Errorf("marshalling json failed. Error: %s", err).Error(),
2103+
core.Errorf("marshaling json failed. Error: %s", err).Error(),
21042104
http.StatusInternalServerError)
21052105
return
21062106
}

netplugin/agent/agent.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ func (ag *Agent) HandleEvents() error {
218218
}
219219
err := <-recvErr
220220
if err != nil {
221-
log.Errorf("Failure occured. Error: %s", err)
221+
log.Errorf("Failure occurred. Error: %s", err)
222222
return err
223223
}
224224

scripts/deps

+6
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,12 @@ then
1010
exit 1
1111
fi
1212

13+
if ! go get -u github.com/client9/misspell/cmd/misspell
14+
then
15+
echo "!!! Could not install misspell"
16+
exit 1
17+
fi
18+
1319
# this is necessary because presumably the `vet` tool needs to be installed in
1420
# $GOROOT. I have not investigated the reason fully yet.
1521
# the check right below this line is to avoid a sudo call on each invocation,

scripts/netContain/contivNet.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ netplugin=false
1212
vlan_if="invalid"
1313

1414
#This needs to be fixed, we cant rely on the value being supplied from
15-
# paramters, just explosion of parameters is not a great solution
15+
# parameters, just explosion of parameters is not a great solution
1616
#export no_proxy="0.0.0.0, 172.28.11.253"
1717
#echo "172.28.11.253 netmaster" > /etc/hosts
1818

scripts/python/api/container.py

+3-3
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ def execCmd(self, cmd):
3939
return self.node.runCmd("docker exec " + self.cid + " " + cmd)
4040
return out, err, exitCode
4141

42-
# Execute a command inside a container in backgroud
42+
# Execute a command inside a container in background
4343
def execBgndCmd(self, cmd):
4444
out, err, exitCode = self.node.runCmd("docker exec -d " + self.cid + " " + cmd)
4545
# Retry failures once to workaround docker issue #15713
@@ -90,7 +90,7 @@ def checkPing(self, ipAddr):
9090
print err
9191
tutils.exit("Ping failed")
9292

93-
# Check if ping succeded
93+
# Check if ping succeeded
9494
pingOutput = ''.join(out)
9595
if "0 received, 100% packet loss" in pingOutput:
9696
print "Ping failed. Output: " + pingOutput
@@ -108,7 +108,7 @@ def checkPingFailure(self, ipAddr):
108108
tutils.log("Ping failed as expected.")
109109
return True
110110

111-
# Check if ping succeded
111+
# Check if ping succeeded
112112
if "0 received, 100% packet loss" in pingOutput:
113113
tutils.log("Ping failed as expected. Output: " + pingOutput)
114114
return True

scripts/python/cleanup.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
# Create the parser and sub parser
1111
parser = argparse.ArgumentParser()
1212
parser.add_argument('--version', action='version', version='1.0.0')
13-
parser.add_argument("-nodes", required=True, help="list of nodes(comma seperated)")
13+
parser.add_argument("-nodes", required=True, help="list of nodes(comma separated)")
1414
parser.add_argument("-user", default='vagrant', help="User id for ssh")
1515
parser.add_argument("-password", default='vagrant', help="password for ssh")
1616

scripts/python/policyScale.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ def testConnections(testbed, numContainer):
4242
if testbed.checkConnections(containers, 8000, True) != True:
4343
api.tutils.exit("Connection failed")
4444
if testbed.checkConnections(containers, 7999, False) != False:
45-
api.tutils.exit("Connection succeded while expecting it to fail")
45+
api.tutils.exit("Connection succeeded while expecting it to fail")
4646

4747
# stop netcast listeners
4848
testbed.stopListeners(containers)

scripts/python/startPlugin.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
# Create the parser and sub parser
1212
parser = argparse.ArgumentParser()
1313
parser.add_argument('--version', action='version', version='1.0.0')
14-
parser.add_argument("-nodes", required=True, help="list of nodes(comma seperated)")
14+
parser.add_argument("-nodes", required=True, help="list of nodes(comma separated)")
1515
parser.add_argument("-user", default='vagrant', help="User id for ssh")
1616
parser.add_argument("-password", default='vagrant', help="password for ssh")
1717
parser.add_argument("-binpath", default='/opt/gopath/bin', help="netplugin/netmaster binary path")

scripts/python/startSwarm.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
# Parse command line args
1111
# Create the parser and sub parser
1212
parser = argparse.ArgumentParser()
13-
parser.add_argument("-nodes", required=True, help="list of nodes(comma seperated)")
13+
parser.add_argument("-nodes", required=True, help="list of nodes(comma separated)")
1414
parser.add_argument("-user", default='vagrant', help="User id for ssh")
1515
parser.add_argument("-password", default='vagrant', help="password for ssh")
1616
parser.add_argument("-binpath", default='/opt/gopath/bin', help="netplugin/netmaster binary path")

state/cfgtool/cfgtool.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ func processResource(stateDriver core.StateDriver, rsrcName, rsrcVal string) err
179179
func processState(stateDriver core.StateDriver, stateName, stateID, fieldName, setVal string) error {
180180
var typeRegistry = make(map[string]core.State)
181181

182-
// build the type registery
182+
// build the type registry
183183
typeRegistry[reflect.TypeOf(mastercfg.CfgEndpointState{}).Name()] = &mastercfg.CfgEndpointState{}
184184
typeRegistry[reflect.TypeOf(mastercfg.CfgNetworkState{}).Name()] = &mastercfg.CfgNetworkState{}
185185
typeRegistry[reflect.TypeOf(mastercfg.CfgBgpState{}).Name()] = &mastercfg.CfgBgpState{}
@@ -231,7 +231,7 @@ func processState(stateDriver core.StateDriver, stateName, stateID, fieldName, s
231231
// print the object
232232
content, err := json.MarshalIndent(cfgType, "", " ")
233233
if err != nil {
234-
log.Errorf("Error marshalling json: %+v", cfgType)
234+
log.Errorf("Error marshaling json: %+v", cfgType)
235235
return err
236236
}
237237
fmt.Printf("Current value of id: %s{ id: %s }\n%s\n", stateName, stateID, content)
@@ -282,7 +282,7 @@ func processState(stateDriver core.StateDriver, stateName, stateID, fieldName, s
282282
// print the modified object
283283
content, err := json.MarshalIndent(cfgType, "", " ")
284284
if err != nil {
285-
log.Errorf("Error marshalling json: %+v", cfgType)
285+
log.Errorf("Error marshaling json: %+v", cfgType)
286286
return err
287287
}
288288
fmt.Printf("Writing values:\n%s\n", content)

state/consulstatedriver.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -261,7 +261,7 @@ func (d *ConsulStateDriver) ClearState(key string) error {
261261
return err
262262
}
263263

264-
// ReadState reads key into a core.State with the unmarshalling function.
264+
// ReadState reads key into a core.State with the unmarshaling function.
265265
func (d *ConsulStateDriver) ReadState(key string, value core.State,
266266
unmarshal func([]byte, interface{}) error) error {
267267
key = processKey(key)
@@ -304,7 +304,7 @@ func (d *ConsulStateDriver) WatchAllState(baseKey string, sType core.State,
304304

305305
}
306306

307-
// WriteState writes a value of core.State into a key with a given marshalling function.
307+
// WriteState writes a value of core.State into a key with a given marshaling function.
308308
func (d *ConsulStateDriver) WriteState(key string, value core.State,
309309
marshal func(interface{}) ([]byte, error)) error {
310310
key = processKey(key)

0 commit comments

Comments
 (0)