You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@mesos.apache.org by vi...@apache.org on 2017/04/24 20:18:47 UTC

mesos git commit: Updated code and docs to use gender neutral pronoun.

Repository: mesos
Updated Branches:
  refs/heads/master 00569bfcf -> 2f4c71a5e


Updated code and docs to use gender neutral pronoun.

Used "singular they" based on Chromium's gender neutral code guideline.

Review: https://reviews.apache.org/r/58683


Project: http://git-wip-us.apache.org/repos/asf/mesos/repo
Commit: http://git-wip-us.apache.org/repos/asf/mesos/commit/2f4c71a5
Tree: http://git-wip-us.apache.org/repos/asf/mesos/tree/2f4c71a5
Diff: http://git-wip-us.apache.org/repos/asf/mesos/diff/2f4c71a5

Branch: refs/heads/master
Commit: 2f4c71a5eaf5cc90cfdbbbf31783eda72dd8c096
Parents: 00569bf
Author: Vinod Kone <vi...@gmail.com>
Authored: Mon Apr 24 12:44:14 2017 -0700
Committer: Vinod Kone <vi...@gmail.com>
Committed: Mon Apr 24 13:18:11 2017 -0700

----------------------------------------------------------------------
 docs/committer-candidate-checklist.md | 2 +-
 docs/versioning.md                    | 2 +-
 src/linux/cgroups.cpp                 | 2 +-
 src/log/catchup.hpp                   | 2 +-
 src/tests/authorization_tests.cpp     | 8 ++++----
 5 files changed, 8 insertions(+), 8 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/mesos/blob/2f4c71a5/docs/committer-candidate-checklist.md
----------------------------------------------------------------------
diff --git a/docs/committer-candidate-checklist.md b/docs/committer-candidate-checklist.md
index 3315d08..bf67473 100644
--- a/docs/committer-candidate-checklist.md
+++ b/docs/committer-candidate-checklist.md
@@ -29,7 +29,7 @@ Demonstrated by: <input type="text"/>
 * Knowledge and activity breadth and depth in the Mesos project as well as areas where the candidate could be a maintainer:
 <input type="text"/>
 
-* Can the candidate be trusted to act the right way outside of known areas where he/she has already demonstrated committer-level expertise and behavior:
+* Can the candidate be trusted to act the right way outside of known areas where they have already demonstrated committer-level expertise and behavior:
 <input type="text"/>
 
 * High quality source code.

http://git-wip-us.apache.org/repos/asf/mesos/blob/2f4c71a5/docs/versioning.md
----------------------------------------------------------------------
diff --git a/docs/versioning.md b/docs/versioning.md
index 3ad1249..178026c 100644
--- a/docs/versioning.md
+++ b/docs/versioning.md
@@ -40,7 +40,7 @@ Once an issue is deemed critical, it will be fixed in only those **affected** re
 
 Patch releases are normally done once **a month**.
 
-If a particular issue is affecting a user and the user cannot wait until the next scheduled patch release, he/she can request an off-schedule patch release for a specific supported version. This should be done by sending an email to the dev list.
+If a particular issue is affecting a user and the user cannot wait until the next scheduled patch release, they can request an off-schedule patch release for a specific supported version. This should be done by sending an email to the dev list.
 
 ## Upgrades
 

http://git-wip-us.apache.org/repos/asf/mesos/blob/2f4c71a5/src/linux/cgroups.cpp
----------------------------------------------------------------------
diff --git a/src/linux/cgroups.cpp b/src/linux/cgroups.cpp
index 3a85329..334005a 100644
--- a/src/linux/cgroups.cpp
+++ b/src/linux/cgroups.cpp
@@ -1200,7 +1200,7 @@ public:
   // call to 'listen' returns a failure, all subsequent calls to
   // 'listen' will return failures as well (in that case, the user
   // should consider terminate this process and create a new one if
-  // he/she still wants to monitor the events).
+  // they still want to monitor the events).
   // TODO(chzhcn): If the user discards the returned future, currently
   // we do not do anything. Consider a better discard semantics here.
   Future<uint64_t> listen()

http://git-wip-us.apache.org/repos/asf/mesos/blob/2f4c71a5/src/log/catchup.hpp
----------------------------------------------------------------------
diff --git a/src/log/catchup.hpp b/src/log/catchup.hpp
index 1e6d4c2..123bc7a 100644
--- a/src/log/catchup.hpp
+++ b/src/log/catchup.hpp
@@ -38,7 +38,7 @@ namespace log {
 // this function can provide a hint on the proposal number that will
 // be used for Paxos. This could potentially save us a few Paxos
 // rounds. However, if the user has no idea what proposal number to
-// use, he can just use none. We also allow the user to specify a
+// use, they can just use none. We also allow the user to specify a
 // timeout for the catch-up operation on each position and retry the
 // operation if timeout happens. This can help us tolerate network
 // blips.

http://git-wip-us.apache.org/repos/asf/mesos/blob/2f4c71a5/src/tests/authorization_tests.cpp
----------------------------------------------------------------------
diff --git a/src/tests/authorization_tests.cpp b/src/tests/authorization_tests.cpp
index 3e18c70..937a726 100644
--- a/src/tests/authorization_tests.cpp
+++ b/src/tests/authorization_tests.cpp
@@ -2410,8 +2410,8 @@ TYPED_TEST(AuthorizationTest, LaunchNestedContainerSessions)
 
   {
     // "foo" principal cannot launch sessions as commands in any parent
-    // container. He may still get to launch container sessions if he
-    // is allowed launch nested container sessions whose executors are
+    // container. They may still get to launch container sessions if they
+    // are allowed to launch nested container sessions whose executors are
     // running as a given user for which "foo" has permissions and the
     // session uses a `container_info` instead of a `command_info`.
     mesos::ACL::LaunchNestedContainerSessionAsUser* acl =
@@ -3015,8 +3015,8 @@ TYPED_TEST(AuthorizationTest, LaunchNestedContainers)
 
   {
     // "foo" principal cannot launch nested containers as commands
-    // under any parent container. He may still get to launch nested
-    // container if he is allowed to do so for executors which run as
+    // under any parent container. They may still get to launch nested
+    // container if they are allowed to do so for executors which run as
     // a given user for which "foo" has permissions and the session
     // uses a `container_info` instead of a `command_info`.
     mesos::ACL::LaunchNestedContainerAsUser* acl =