You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@mesos.apache.org by mp...@apache.org on 2017/02/08 00:38:18 UTC
[2/7] mesos git commit: Fixed a few typos.
Fixed a few typos.
Review: https://reviews.apache.org/r/56246/
Project: http://git-wip-us.apache.org/repos/asf/mesos/repo
Commit: http://git-wip-us.apache.org/repos/asf/mesos/commit/02a7cf2a
Tree: http://git-wip-us.apache.org/repos/asf/mesos/tree/02a7cf2a
Diff: http://git-wip-us.apache.org/repos/asf/mesos/diff/02a7cf2a
Branch: refs/heads/master
Commit: 02a7cf2a66a97f1f16a8b7b05e2129876d99b375
Parents: 5032943
Author: Neil Conway <ne...@gmail.com>
Authored: Mon Feb 6 13:04:49 2017 -0800
Committer: Michael Park <mp...@apache.org>
Committed: Tue Feb 7 16:22:41 2017 -0800
----------------------------------------------------------------------
src/authentication/cram_md5/authenticatee.cpp | 2 +-
src/launcher/fetcher.cpp | 2 +-
src/master/validation.cpp | 2 +-
src/slave/flags.cpp | 2 +-
src/tests/master_quota_tests.cpp | 22 +++++++++++-----------
5 files changed, 15 insertions(+), 15 deletions(-)
----------------------------------------------------------------------
http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/authentication/cram_md5/authenticatee.cpp
----------------------------------------------------------------------
diff --git a/src/authentication/cram_md5/authenticatee.cpp b/src/authentication/cram_md5/authenticatee.cpp
index 16291a1..7b3f767 100644
--- a/src/authentication/cram_md5/authenticatee.cpp
+++ b/src/authentication/cram_md5/authenticatee.cpp
@@ -130,7 +130,7 @@ public:
// NOTE: Some SASL mechanisms do not allow/enable "proxying",
// i.e., authorization. Therefore, some mechanisms send _only_ the
- // authoriation name rather than both the user (authentication
+ // authorization name rather than both the user (authentication
// name) and authorization name. Thus, for now, we assume
// authorization is handled out of band. Consider the
// SASL_NEED_PROXY flag if we want to reconsider this in the
http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/launcher/fetcher.cpp
----------------------------------------------------------------------
diff --git a/src/launcher/fetcher.cpp b/src/launcher/fetcher.cpp
index a1dcced..362ad06 100644
--- a/src/launcher/fetcher.cpp
+++ b/src/launcher/fetcher.cpp
@@ -225,7 +225,7 @@ static Try<string> download(
}
// 1. Try to fetch using a local copy.
- // We regard as local: "file://" or the absense of any URI scheme.
+ // We regard as local: "file://" or the absence of any URI scheme.
Result<string> sourcePath =
Fetcher::uriToLocalPath(sourceUri, frameworksHome);
http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/master/validation.cpp
----------------------------------------------------------------------
diff --git a/src/master/validation.cpp b/src/master/validation.cpp
index 2beee16..226c526 100644
--- a/src/master/validation.cpp
+++ b/src/master/validation.cpp
@@ -1624,7 +1624,7 @@ Option<Error> validate(const Offer::Operation::Unreserve& unreserve)
// NOTE: We don't check that 'FrameworkInfo.principal' matches
// 'Resource.ReservationInfo.principal' here because the authorization
// depends on the "unreserve" ACL which specifies which 'principal' can
- // unreserve which 'principal's resources. In the absense of an ACL, we allow
+ // unreserve which 'principal's resources. In the absence of an ACL, we allow
// any 'principal' to unreserve any other 'principal's resources.
foreach (const Resource& resource, unreserve.resources()) {
http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/slave/flags.cpp
----------------------------------------------------------------------
diff --git a/src/slave/flags.cpp b/src/slave/flags.cpp
index b48678b..71935de 100644
--- a/src/slave/flags.cpp
+++ b/src/slave/flags.cpp
@@ -526,7 +526,7 @@ mesos::internal::slave::Flags::Flags()
"To set capabilities the agent should have the `SETPCAP` capability.\n"
"\n"
"This flag is effective iff `capabilities` isolation is enabled.\n"
- "When `capabilities` isolation is enabled, the absense of this flag\n"
+ "When `capabilities` isolation is enabled, the absence of this flag\n"
"would imply that the operator would allow ALL capabilities.\n"
"\n"
"Example:\n"
http://git-wip-us.apache.org/repos/asf/mesos/blob/02a7cf2a/src/tests/master_quota_tests.cpp
----------------------------------------------------------------------
diff --git a/src/tests/master_quota_tests.cpp b/src/tests/master_quota_tests.cpp
index b25f591..dbf0fdf 100644
--- a/src/tests/master_quota_tests.cpp
+++ b/src/tests/master_quota_tests.cpp
@@ -182,7 +182,7 @@ TEST_F(MasterQuotaTest, SetForNonExistentRole)
}
-// Quota requests with invalid structure should return a '400 Bad Request'.
+// Quota requests with invalid structure should return '400 Bad Request'.
TEST_F(MasterQuotaTest, InvalidSetRequest)
{
Try<Owned<cluster::Master>> master = StartMaster();
@@ -264,8 +264,8 @@ TEST_F(MasterQuotaTest, InvalidSetRequest)
}
-// Checks that a quota set request is not satisfied if any invalid field is
-// set or provided data are not supported.
+// Checks that a quota set request is not satisfied if an invalid
+// field is set or provided data are not supported.
TEST_F(MasterQuotaTest, SetRequestWithInvalidData)
{
Try<Owned<cluster::Master>> master = StartMaster();
@@ -356,8 +356,8 @@ TEST_F(MasterQuotaTest, SetRequestWithInvalidData)
}
-// Updating an exiting quota via POST to the '/master/quota endpoint' should
-// return a '400 BadRequest'.
+// Updating an existing quota via POST to the '/master/quota' endpoint should
+// return '400 BadRequest'.
TEST_F(MasterQuotaTest, SetExistingQuota)
{
Try<Owned<cluster::Master>> master = StartMaster();
@@ -395,8 +395,8 @@ TEST_F(MasterQuotaTest, SetExistingQuota)
}
-// Tests whether we can remove a quota from the '/master/quota endpoint' via a
-// DELETE request against /quota.
+// Tests whether we can remove a quota from the '/master/quota'
+// endpoint via a DELETE request against /quota.
TEST_F(MasterQuotaTest, RemoveSingleQuota)
{
TestAllocator<> allocator;
@@ -418,7 +418,7 @@ TEST_F(MasterQuotaTest, RemoveSingleQuota)
};
// Ensure that we can't remove quota for a role that is unknown to
- // the master when using explicitly configured list of role names.
+ // the master when using an explicitly configured list of role names.
{
Future<Response> response = removeQuota("quota/" + UNKNOWN_ROLE);
@@ -1187,7 +1187,7 @@ TEST_F(MasterQuotaTest, UnauthenticatedQuotaRequest)
<< response.get().body;
}
- // The absense of credentials leads to authentication failure as well.
+ // The absence of credentials leads to authentication failure as well.
{
Future<Response> response = process::http::post(
master.get()->pid,
@@ -1291,7 +1291,7 @@ TEST_F(MasterQuotaTest, AuthorizeGetUpdateQuotaRequests)
EXPECT_EQ(quotaResources, quota.get().info.guarantee());
}
- // Try to get the previously requested quota using a princilal that is
+ // Try to get the previously requested quota using a principal that is
// not authorized to see it. This will result in empty information
// returned.
{
@@ -1622,7 +1622,7 @@ TEST_F(MasterQuotaTest, AuthorizeGetUpdateQuotaRequestsWithoutPrincipal)
<< response.get().body;
}
- // Get the previously requested quota without providing authoriation
+ // Get the previously requested quota without providing authorization
// headers.
{
Future<Response> response = process::http::get(