You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@mesos.apache.org by mp...@apache.org on 2017/02/08 00:38:18 UTC

[2/7] mesos git commit: Fixed a few typos.

Fixed a few typos.

Review: https://reviews.apache.org/r/56246/


Project: http://git-wip-us.apache.org/repos/asf/mesos/repo
Commit: http://git-wip-us.apache.org/repos/asf/mesos/commit/02a7cf2a
Tree: http://git-wip-us.apache.org/repos/asf/mesos/tree/02a7cf2a
Diff: http://git-wip-us.apache.org/repos/asf/mesos/diff/02a7cf2a

Branch: refs/heads/master
Commit: 02a7cf2a66a97f1f16a8b7b05e2129876d99b375
Parents: 5032943
Author: Neil Conway <ne...@gmail.com>
Authored: Mon Feb 6 13:04:49 2017 -0800
Committer: Michael Park <mp...@apache.org>
Committed: Tue Feb 7 16:22:41 2017 -0800

----------------------------------------------------------------------
 src/authentication/cram_md5/authenticatee.cpp |  2 +-
 src/launcher/fetcher.cpp                      |  2 +-
 src/master/validation.cpp                     |  2 +-
 src/slave/flags.cpp                           |  2 +-
 src/tests/master_quota_tests.cpp              | 22 +++++++++++-----------
 5 files changed, 15 insertions(+), 15 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/authentication/cram_md5/authenticatee.cpp
----------------------------------------------------------------------
diff --git a/src/authentication/cram_md5/authenticatee.cpp b/src/authentication/cram_md5/authenticatee.cpp
index 16291a1..7b3f767 100644
--- a/src/authentication/cram_md5/authenticatee.cpp
+++ b/src/authentication/cram_md5/authenticatee.cpp
@@ -130,7 +130,7 @@ public:
 
     // NOTE: Some SASL mechanisms do not allow/enable "proxying",
     // i.e., authorization. Therefore, some mechanisms send _only_ the
-    // authoriation name rather than both the user (authentication
+    // authorization name rather than both the user (authentication
     // name) and authorization name. Thus, for now, we assume
     // authorization is handled out of band. Consider the
     // SASL_NEED_PROXY flag if we want to reconsider this in the

http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/launcher/fetcher.cpp
----------------------------------------------------------------------
diff --git a/src/launcher/fetcher.cpp b/src/launcher/fetcher.cpp
index a1dcced..362ad06 100644
--- a/src/launcher/fetcher.cpp
+++ b/src/launcher/fetcher.cpp
@@ -225,7 +225,7 @@ static Try<string> download(
   }
 
   // 1. Try to fetch using a local copy.
-  // We regard as local: "file://" or the absense of any URI scheme.
+  // We regard as local: "file://" or the absence of any URI scheme.
   Result<string> sourcePath =
     Fetcher::uriToLocalPath(sourceUri, frameworksHome);
 

http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/master/validation.cpp
----------------------------------------------------------------------
diff --git a/src/master/validation.cpp b/src/master/validation.cpp
index 2beee16..226c526 100644
--- a/src/master/validation.cpp
+++ b/src/master/validation.cpp
@@ -1624,7 +1624,7 @@ Option<Error> validate(const Offer::Operation::Unreserve& unreserve)
   // NOTE: We don't check that 'FrameworkInfo.principal' matches
   // 'Resource.ReservationInfo.principal' here because the authorization
   // depends on the "unreserve" ACL which specifies which 'principal' can
-  // unreserve which 'principal's resources. In the absense of an ACL, we allow
+  // unreserve which 'principal's resources. In the absence of an ACL, we allow
   // any 'principal' to unreserve any other 'principal's resources.
 
   foreach (const Resource& resource, unreserve.resources()) {

http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/slave/flags.cpp
----------------------------------------------------------------------
diff --git a/src/slave/flags.cpp b/src/slave/flags.cpp
index b48678b..71935de 100644
--- a/src/slave/flags.cpp
+++ b/src/slave/flags.cpp
@@ -526,7 +526,7 @@ mesos::internal::slave::Flags::Flags()
       "To set capabilities the agent should have the `SETPCAP` capability.\n"
       "\n"
       "This flag is effective iff `capabilities` isolation is enabled.\n"
-      "When `capabilities` isolation is enabled, the absense of this flag\n"
+      "When `capabilities` isolation is enabled, the absence of this flag\n"
       "would imply that the operator would allow ALL capabilities.\n"
       "\n"
       "Example:\n"

http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/tests/master_quota_tests.cpp
----------------------------------------------------------------------
diff --git a/src/tests/master_quota_tests.cpp b/src/tests/master_quota_tests.cpp
index b25f591..dbf0fdf 100644
--- a/src/tests/master_quota_tests.cpp
+++ b/src/tests/master_quota_tests.cpp
@@ -182,7 +182,7 @@ TEST_F(MasterQuotaTest, SetForNonExistentRole)
 }
 
 
-// Quota requests with invalid structure should return a '400 Bad Request'.
+// Quota requests with invalid structure should return '400 Bad Request'.
 TEST_F(MasterQuotaTest, InvalidSetRequest)
 {
   Try<Owned<cluster::Master>> master = StartMaster();
@@ -264,8 +264,8 @@ TEST_F(MasterQuotaTest, InvalidSetRequest)
 }
 
 
-// Checks that a quota set request is not satisfied if any invalid field is
-// set or provided data are not supported.
+// Checks that a quota set request is not satisfied if an invalid
+// field is set or provided data are not supported.
 TEST_F(MasterQuotaTest, SetRequestWithInvalidData)
 {
   Try<Owned<cluster::Master>> master = StartMaster();
@@ -356,8 +356,8 @@ TEST_F(MasterQuotaTest, SetRequestWithInvalidData)
 }
 
 
-// Updating an exiting quota via POST to the '/master/quota endpoint' should
-// return a '400 BadRequest'.
+// Updating an existing quota via POST to the '/master/quota' endpoint should
+// return '400 BadRequest'.
 TEST_F(MasterQuotaTest, SetExistingQuota)
 {
   Try<Owned<cluster::Master>> master = StartMaster();
@@ -395,8 +395,8 @@ TEST_F(MasterQuotaTest, SetExistingQuota)
 }
 
 
-// Tests whether we can remove a quota from the '/master/quota endpoint' via a
-// DELETE request against /quota.
+// Tests whether we can remove a quota from the '/master/quota'
+// endpoint via a DELETE request against /quota.
 TEST_F(MasterQuotaTest, RemoveSingleQuota)
 {
   TestAllocator<> allocator;
@@ -418,7 +418,7 @@ TEST_F(MasterQuotaTest, RemoveSingleQuota)
   };
 
   // Ensure that we can't remove quota for a role that is unknown to
-  // the master when using explicitly configured list of role names.
+  // the master when using an explicitly configured list of role names.
   {
     Future<Response> response = removeQuota("quota/" + UNKNOWN_ROLE);
 
@@ -1187,7 +1187,7 @@ TEST_F(MasterQuotaTest, UnauthenticatedQuotaRequest)
       << response.get().body;
   }
 
-  // The absense of credentials leads to authentication failure as well.
+  // The absence of credentials leads to authentication failure as well.
   {
     Future<Response> response = process::http::post(
         master.get()->pid,
@@ -1291,7 +1291,7 @@ TEST_F(MasterQuotaTest, AuthorizeGetUpdateQuotaRequests)
     EXPECT_EQ(quotaResources, quota.get().info.guarantee());
   }
 
-  // Try to get the previously requested quota using a princilal that is
+  // Try to get the previously requested quota using a principal that is
   // not authorized to see it. This will result in empty information
   // returned.
   {
@@ -1622,7 +1622,7 @@ TEST_F(MasterQuotaTest, AuthorizeGetUpdateQuotaRequestsWithoutPrincipal)
       << response.get().body;
   }
 
-  // Get the previously requested quota without providing authoriation
+  // Get the previously requested quota without providing authorization
   // headers.
   {
     Future<Response> response = process::http::get(