mirror of
https://github.com/helm/helm.git
synced 2026-04-22 23:00:01 -04:00
Spelling (#7258)
* spelling: constraint Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: cryptographic Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: dependency Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: doesnot Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: don't Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: unexpected Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: dreadnought Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: default Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: envvars Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: evaluates Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: execute Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: extractor Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: frobnitz Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: generated Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: implementation Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: jabba Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: keywords Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: kubernetes Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: override Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: package Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: parsable Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: progress Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: recursively Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: release Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: cache Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: representing Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: serializer Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: subchart Signed-off-by: Josh Soref <jsoref@users.noreply.github.com> * spelling: utilities Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
This commit is contained in:
parent
bd8dbcac8b
commit
02ad2b1187
31 changed files with 71 additions and 71 deletions
|
|
@ -111,9 +111,9 @@ func TestDependencyUpdateCmd(t *testing.T) {
|
|||
if _, err := os.Stat(expect); err != nil {
|
||||
t.Fatalf("Expected %q: %s", expect, err)
|
||||
}
|
||||
dontExpect := dir(chartname, "charts/compressedchart-0.1.0.tgz")
|
||||
if _, err := os.Stat(dontExpect); err == nil {
|
||||
t.Fatalf("Unexpected %q", dontExpect)
|
||||
unexpected := dir(chartname, "charts/compressedchart-0.1.0.tgz")
|
||||
if _, err := os.Stat(unexpected); err == nil {
|
||||
t.Fatalf("Unexpected %q", unexpected)
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -418,7 +418,7 @@ func newRootCmd(actionConfig *action.Configuration, out io.Writer, args []string
|
|||
registry.ClientOptWriter(out),
|
||||
)
|
||||
if err != nil {
|
||||
// TODO: dont panic here, refactor newRootCmd to return error
|
||||
// TODO: don't panic here, refactor newRootCmd to return error
|
||||
panic(err)
|
||||
}
|
||||
actionConfig.RegistryClient = registryClient
|
||||
|
|
|
|||
|
|
@ -31,7 +31,7 @@ func TestRootCmd(t *testing.T) {
|
|||
|
||||
tests := []struct {
|
||||
name, args, cachePath, configPath, dataPath string
|
||||
envars map[string]string
|
||||
envvars map[string]string
|
||||
}{
|
||||
{
|
||||
name: "defaults",
|
||||
|
|
@ -40,19 +40,19 @@ func TestRootCmd(t *testing.T) {
|
|||
{
|
||||
name: "with $XDG_CACHE_HOME set",
|
||||
args: "home",
|
||||
envars: map[string]string{xdg.CacheHomeEnvVar: "/bar"},
|
||||
envvars: map[string]string{xdg.CacheHomeEnvVar: "/bar"},
|
||||
cachePath: "/bar/helm",
|
||||
},
|
||||
{
|
||||
name: "with $XDG_CONFIG_HOME set",
|
||||
args: "home",
|
||||
envars: map[string]string{xdg.ConfigHomeEnvVar: "/bar"},
|
||||
envvars: map[string]string{xdg.ConfigHomeEnvVar: "/bar"},
|
||||
configPath: "/bar/helm",
|
||||
},
|
||||
{
|
||||
name: "with $XDG_DATA_HOME set",
|
||||
args: "home",
|
||||
envars: map[string]string{xdg.DataHomeEnvVar: "/bar"},
|
||||
envvars: map[string]string{xdg.DataHomeEnvVar: "/bar"},
|
||||
dataPath: "/bar/helm",
|
||||
},
|
||||
}
|
||||
|
|
@ -61,7 +61,7 @@ func TestRootCmd(t *testing.T) {
|
|||
t.Run(tt.name, func(t *testing.T) {
|
||||
defer ensure.HelmHome(t)()
|
||||
|
||||
for k, v := range tt.envars {
|
||||
for k, v := range tt.envvars {
|
||||
os.Setenv(k, v)
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -27,7 +27,7 @@ import (
|
|||
const verifyDesc = `
|
||||
Verify that the given chart has a valid provenance file.
|
||||
|
||||
Provenance files provide crytographic verification that a chart has not been
|
||||
Provenance files provide cryptographic verification that a chart has not been
|
||||
tampered with, and was packaged by a trusted provider.
|
||||
|
||||
This command can be used to verify a local chart. Several other commands provide
|
||||
|
|
|
|||
|
|
@ -49,7 +49,7 @@ func shortDigest(digest string) string {
|
|||
return digest
|
||||
}
|
||||
|
||||
// timeAgo returns a human-readable timestamp respresenting time that has passed
|
||||
// timeAgo returns a human-readable timestamp representing time that has passed
|
||||
func timeAgo(t time.Time) string {
|
||||
return units.HumanDuration(time.Now().UTC().Sub(t))
|
||||
}
|
||||
|
|
|
|||
|
|
@ -73,7 +73,7 @@ func Parse(file io.Reader) (*Rules, error) {
|
|||
return r, s.Err()
|
||||
}
|
||||
|
||||
// Ignore evalutes the file at the given path, and returns true if it should be ignored.
|
||||
// Ignore evaluates the file at the given path, and returns true if it should be ignored.
|
||||
//
|
||||
// Ignore evaluates path against the rules in order. Evaluation stops when a match
|
||||
// is found. Matching a negative rule will stop evaluation.
|
||||
|
|
|
|||
|
|
@ -66,7 +66,7 @@ var ValidName = regexp.MustCompile("^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])+
|
|||
|
||||
// Configuration injects the dependencies that all actions share.
|
||||
type Configuration struct {
|
||||
// RESTClientGetter is an interface that loads Kuberbetes clients.
|
||||
// RESTClientGetter is an interface that loads Kubernetes clients.
|
||||
RESTClientGetter RESTClientGetter
|
||||
|
||||
// Releases stores records of releases.
|
||||
|
|
|
|||
|
|
@ -87,7 +87,7 @@ type Install struct {
|
|||
// APIVersions allows a manual set of supported API Versions to be passed
|
||||
// (for things like templating). These are ignored if ClientOnly is false
|
||||
APIVersions chartutil.VersionSet
|
||||
// Used by helm template to render charts with .Relase.IsUpgrade. Ignored if Dry-Run is false
|
||||
// Used by helm template to render charts with .Release.IsUpgrade. Ignored if Dry-Run is false
|
||||
IsUpgrade bool
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -41,7 +41,7 @@ const (
|
|||
ListPendingInstall
|
||||
// ListPendingUpgrade filters on status "pending_upgrade" (upgrade in progress)
|
||||
ListPendingUpgrade
|
||||
// ListPendingRollback filters on status "pending_rollback" (rollback in progres)
|
||||
// ListPendingRollback filters on status "pending_rollback" (rollback in progress)
|
||||
ListPendingRollback
|
||||
// ListSuperseded filters on status "superseded" (historical release version that is no longer deployed)
|
||||
ListSuperseded
|
||||
|
|
|
|||
|
|
@ -53,7 +53,7 @@ type Dependency struct {
|
|||
//
|
||||
// It represents the state that the dependencies should be in.
|
||||
type Lock struct {
|
||||
// Genderated is the date the lock file was last generated.
|
||||
// Generated is the date the lock file was last generated.
|
||||
Generated time.Time `json:"generated"`
|
||||
// Digest is a hash of the dependencies in Chart.yaml.
|
||||
Digest string `json:"digest"`
|
||||
|
|
|
|||
|
|
@ -461,7 +461,7 @@ func verifyChartFileAndTemplate(t *testing.T, c *chart.Chart, name string) {
|
|||
t.Fatalf("Expected 2 Dependency, got %d", len(dep.Dependencies()))
|
||||
}
|
||||
default:
|
||||
t.Errorf("Unexpected dependeny %s", dep.Name())
|
||||
t.Errorf("Unexpected dependency %s", dep.Name())
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -43,7 +43,7 @@ func LoadChartfile(filename string) (*chart.Metadata, error) {
|
|||
// 'filename' should be the complete path and filename ('foo/Chart.yaml')
|
||||
func SaveChartfile(filename string, cf *chart.Metadata) error {
|
||||
// Pull out the dependencies of a v1 Chart, since there's no way
|
||||
// to tell the serialiser to skip a field for just this use case
|
||||
// to tell the serializer to skip a field for just this use case
|
||||
savedDependencies := cf.Dependencies
|
||||
if cf.APIVersion == chart.APIVersionV1 {
|
||||
cf.Dependencies = nil
|
||||
|
|
|
|||
|
|
@ -17,7 +17,7 @@ limitations under the License.
|
|||
/*Package chartutil contains tools for working with charts.
|
||||
|
||||
Charts are described in the protocol buffer definition (pkg/proto/charts).
|
||||
This packe provides utilities for serializing and deserializing charts.
|
||||
This package provides utilities for serializing and deserializing charts.
|
||||
|
||||
A chart can be represented on the file system in one of two ways:
|
||||
|
||||
|
|
@ -25,7 +25,7 @@ A chart can be represented on the file system in one of two ways:
|
|||
- As a tarred gzipped file containing a directory that then contains a
|
||||
Chart.yaml file.
|
||||
|
||||
This package provides utilitites for working with those file formats.
|
||||
This package provides utilities for working with those file formats.
|
||||
|
||||
The preferred way of loading a chart is using 'loader.Load`:
|
||||
|
||||
|
|
|
|||
|
|
@ -20,7 +20,7 @@ import (
|
|||
"testing"
|
||||
)
|
||||
|
||||
func TestErrorNoTableDoesntPanic(t *testing.T) {
|
||||
func TestErrorNoTableDoesNotPanic(t *testing.T) {
|
||||
x := "empty"
|
||||
|
||||
y := ErrNoTable{x}
|
||||
|
|
@ -28,7 +28,7 @@ func TestErrorNoTableDoesntPanic(t *testing.T) {
|
|||
t.Logf("error is: %s", y)
|
||||
}
|
||||
|
||||
func TestErrorNoValueDoesntPanic(t *testing.T) {
|
||||
func TestErrorNoValueDoesNotPanic(t *testing.T) {
|
||||
x := "empty"
|
||||
|
||||
y := ErrNoValue{x}
|
||||
|
|
|
|||
|
|
@ -39,10 +39,10 @@ func ValidateAgainstSchema(chrt *chart.Chart, values map[string]interface{}) err
|
|||
}
|
||||
}
|
||||
|
||||
// For each dependency, recurively call this function with the coalesced values
|
||||
for _, subchrt := range chrt.Dependencies() {
|
||||
subchrtValues := values[subchrt.Name()].(map[string]interface{})
|
||||
if err := ValidateAgainstSchema(subchrt, subchrtValues); err != nil {
|
||||
// For each dependency, recursively call this function with the coalesced values
|
||||
for _, subchart := range chrt.Dependencies() {
|
||||
subchartValues := values[subchart.Name()].(map[string]interface{})
|
||||
if err := ValidateAgainstSchema(subchart, subchartValues); err != nil {
|
||||
sb.WriteString(err.Error())
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -63,7 +63,7 @@ func TestValidateAgainstSingleSchemaNegative(t *testing.T) {
|
|||
}
|
||||
}
|
||||
|
||||
const subchrtSchema = `{
|
||||
const subchartSchema = `{
|
||||
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||
"title": "Values",
|
||||
"type": "object",
|
||||
|
|
@ -81,23 +81,23 @@ const subchrtSchema = `{
|
|||
`
|
||||
|
||||
func TestValidateAgainstSchema(t *testing.T) {
|
||||
subchrtJSON := []byte(subchrtSchema)
|
||||
subchrt := &chart.Chart{
|
||||
subchartJSON := []byte(subchartSchema)
|
||||
subchart := &chart.Chart{
|
||||
Metadata: &chart.Metadata{
|
||||
Name: "subchrt",
|
||||
Name: "subchart",
|
||||
},
|
||||
Schema: subchrtJSON,
|
||||
Schema: subchartJSON,
|
||||
}
|
||||
chrt := &chart.Chart{
|
||||
Metadata: &chart.Metadata{
|
||||
Name: "chrt",
|
||||
},
|
||||
}
|
||||
chrt.AddDependency(subchrt)
|
||||
chrt.AddDependency(subchart)
|
||||
|
||||
vals := map[string]interface{}{
|
||||
"name": "John",
|
||||
"subchrt": map[string]interface{}{
|
||||
"subchart": map[string]interface{}{
|
||||
"age": 25,
|
||||
},
|
||||
}
|
||||
|
|
@ -108,23 +108,23 @@ func TestValidateAgainstSchema(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestValidateAgainstSchemaNegative(t *testing.T) {
|
||||
subchrtJSON := []byte(subchrtSchema)
|
||||
subchrt := &chart.Chart{
|
||||
subchartJSON := []byte(subchartSchema)
|
||||
subchart := &chart.Chart{
|
||||
Metadata: &chart.Metadata{
|
||||
Name: "subchrt",
|
||||
Name: "subchart",
|
||||
},
|
||||
Schema: subchrtJSON,
|
||||
Schema: subchartJSON,
|
||||
}
|
||||
chrt := &chart.Chart{
|
||||
Metadata: &chart.Metadata{
|
||||
Name: "chrt",
|
||||
},
|
||||
}
|
||||
chrt.AddDependency(subchrt)
|
||||
chrt.AddDependency(subchart)
|
||||
|
||||
vals := map[string]interface{}{
|
||||
"name": "John",
|
||||
"subchrt": map[string]interface{}{},
|
||||
"name": "John",
|
||||
"subchart": map[string]interface{}{},
|
||||
}
|
||||
|
||||
var errString string
|
||||
|
|
@ -134,7 +134,7 @@ func TestValidateAgainstSchemaNegative(t *testing.T) {
|
|||
errString = err.Error()
|
||||
}
|
||||
|
||||
expectedErrString := `subchrt:
|
||||
expectedErrString := `subchart:
|
||||
- (root): age is required
|
||||
`
|
||||
if errString != expectedErrString {
|
||||
|
|
|
|||
|
|
@ -142,7 +142,7 @@ func writeTarContents(out *tar.Writer, c *chart.Chart, prefix string) error {
|
|||
base := filepath.Join(prefix, c.Name())
|
||||
|
||||
// Pull out the dependencies of a v1 Chart, since there's no way
|
||||
// to tell the serialiser to skip a field for just this use case
|
||||
// to tell the serializer to skip a field for just this use case
|
||||
savedDependencies := c.Metadata.Dependencies
|
||||
if c.Metadata.APIVersion == chart.APIVersionV1 {
|
||||
c.Metadata.Dependencies = nil
|
||||
|
|
|
|||
|
|
@ -23,7 +23,7 @@ overridden-chartA:
|
|||
SCAbool: true
|
||||
SCAfloat: 3.14
|
||||
SCAint: 100
|
||||
SCAstring: "jabathehut"
|
||||
SCAstring: "jabbathehut"
|
||||
SC1extra3: true
|
||||
|
||||
imported-chartA-B:
|
||||
|
|
|
|||
|
|
@ -76,7 +76,7 @@ func TestToRenderValues(t *testing.T) {
|
|||
},
|
||||
}
|
||||
|
||||
overideValues := map[string]interface{}{
|
||||
overrideValues := map[string]interface{}{
|
||||
"name": "Haroun",
|
||||
"where": map[string]interface{}{
|
||||
"city": "Baghdad",
|
||||
|
|
@ -103,7 +103,7 @@ func TestToRenderValues(t *testing.T) {
|
|||
IsInstall: true,
|
||||
}
|
||||
|
||||
res, err := ToRenderValues(c, overideValues, o, nil)
|
||||
res, err := ToRenderValues(c, overrideValues, o, nil)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
|
@ -275,10 +275,10 @@ chapter:
|
|||
} else if v != "Loomings" {
|
||||
t.Errorf("No error but got wrong value for title: %s\n%v", err, d)
|
||||
}
|
||||
if _, err := d.PathValue("chapter.one.doesntexist"); err == nil {
|
||||
if _, err := d.PathValue("chapter.one.doesnotexist"); err == nil {
|
||||
t.Errorf("Non-existent key should return error: %s\n%v", err, d)
|
||||
}
|
||||
if _, err := d.PathValue("chapter.doesntexist.one"); err == nil {
|
||||
if _, err := d.PathValue("chapter.doesnotexist.one"); err == nil {
|
||||
t.Errorf("Non-existent key in middle of path should return error: %s\n%v", err, d)
|
||||
}
|
||||
if _, err := d.PathValue(""); err == nil {
|
||||
|
|
|
|||
|
|
@ -52,7 +52,7 @@ type EnvSettings struct {
|
|||
RegistryConfig string
|
||||
// RepositoryConfig is the path to the repositories file.
|
||||
RepositoryConfig string
|
||||
// Repositoryache is the path to the repository cache directory.
|
||||
// RepositoryCache is the path to the repository cache directory.
|
||||
RepositoryCache string
|
||||
// PluginsDirectory is the path to the plugins directory.
|
||||
PluginsDirectory string
|
||||
|
|
|
|||
|
|
@ -29,8 +29,8 @@ func TestEnvSettings(t *testing.T) {
|
|||
name string
|
||||
|
||||
// input
|
||||
args string
|
||||
envars map[string]string
|
||||
args string
|
||||
envvars map[string]string
|
||||
|
||||
// expected values
|
||||
ns, kcontext string
|
||||
|
|
@ -47,17 +47,17 @@ func TestEnvSettings(t *testing.T) {
|
|||
debug: true,
|
||||
},
|
||||
{
|
||||
name: "with envvars set",
|
||||
envars: map[string]string{"HELM_DEBUG": "1", "HELM_NAMESPACE": "yourns"},
|
||||
ns: "yourns",
|
||||
debug: true,
|
||||
name: "with envvars set",
|
||||
envvars: map[string]string{"HELM_DEBUG": "1", "HELM_NAMESPACE": "yourns"},
|
||||
ns: "yourns",
|
||||
debug: true,
|
||||
},
|
||||
{
|
||||
name: "with flags and envvars set",
|
||||
args: "--debug --namespace=myns",
|
||||
envars: map[string]string{"HELM_DEBUG": "1", "HELM_NAMESPACE": "yourns"},
|
||||
ns: "myns",
|
||||
debug: true,
|
||||
name: "with flags and envvars set",
|
||||
args: "--debug --namespace=myns",
|
||||
envvars: map[string]string{"HELM_DEBUG": "1", "HELM_NAMESPACE": "yourns"},
|
||||
ns: "myns",
|
||||
debug: true,
|
||||
},
|
||||
}
|
||||
|
||||
|
|
@ -65,7 +65,7 @@ func TestEnvSettings(t *testing.T) {
|
|||
t.Run(tt.name, func(t *testing.T) {
|
||||
defer resetEnv()()
|
||||
|
||||
for k, v := range tt.envars {
|
||||
for k, v := range tt.envvars {
|
||||
os.Setenv(k, v)
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -100,7 +100,7 @@ func (e Engine) initFunMap(t *template.Template, referenceTpls map[string]render
|
|||
var buf strings.Builder
|
||||
for _, n := range includedNames {
|
||||
if n == name {
|
||||
return "", errors.Wrapf(fmt.Errorf("unable to excute template"), "rendering template has a nested reference name: %s", name)
|
||||
return "", errors.Wrapf(fmt.Errorf("unable to execute template"), "rendering template has a nested reference name: %s", name)
|
||||
}
|
||||
}
|
||||
includedNames = append(includedNames, name)
|
||||
|
|
|
|||
|
|
@ -27,7 +27,7 @@ import (
|
|||
"helm.sh/helm/v3/internal/version"
|
||||
)
|
||||
|
||||
// HTTPGetter is the efault HTTP(/S) backend handler
|
||||
// HTTPGetter is the default HTTP(/S) backend handler
|
||||
type HTTPGetter struct {
|
||||
opts options
|
||||
}
|
||||
|
|
|
|||
|
|
@ -40,7 +40,7 @@ func Chartfile(linter *support.Linter) {
|
|||
chartFile, err := chartutil.LoadChartfile(chartPath)
|
||||
validChartFile := linter.RunLinterRule(support.ErrorSev, chartFileName, validateChartYamlFormat(err))
|
||||
|
||||
// Guard clause. Following linter rules require a parseable ChartFile
|
||||
// Guard clause. Following linter rules require a parsable ChartFile
|
||||
if !validChartFile {
|
||||
return
|
||||
}
|
||||
|
|
|
|||
|
|
@ -234,12 +234,12 @@ func TestExtract(t *testing.T) {
|
|||
gz.Close()
|
||||
// END tarball creation
|
||||
|
||||
extr, err := NewExtractor(source)
|
||||
extractor, err := NewExtractor(source)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if err = extr.Extract(&buf, tempDir); err != nil {
|
||||
if err = extractor.Extract(&buf, tempDir); err != nil {
|
||||
t.Errorf("Did not expect error but got error: %v", err)
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -135,7 +135,7 @@ func (i *VCSInstaller) solveVersion(repo vcs.Repo) (string, error) {
|
|||
sort.Sort(sort.Reverse(semver.Collection(semvers)))
|
||||
for _, v := range semvers {
|
||||
if constraint.Check(v) {
|
||||
// If the constrint passes get the original reference
|
||||
// If the constraint passes get the original reference
|
||||
ver := v.Original()
|
||||
debug("setting to %s", ver)
|
||||
return ver, nil
|
||||
|
|
|
|||
|
|
@ -25,7 +25,7 @@ const (
|
|||
StatusUnknown Status = "unknown"
|
||||
// StatusDeployed indicates that the release has been pushed to Kubernetes.
|
||||
StatusDeployed Status = "deployed"
|
||||
// StatusUninstalled indicates that a release has been uninstalled from Kubermetes.
|
||||
// StatusUninstalled indicates that a release has been uninstalled from Kubernetes.
|
||||
StatusUninstalled Status = "uninstalled"
|
||||
// StatusSuperseded indicates that this release object is outdated and a newer one exists.
|
||||
StatusSuperseded Status = "superseded"
|
||||
|
|
|
|||
|
|
@ -237,7 +237,7 @@ func verifyIndex(t *testing.T, actual *IndexFile) {
|
|||
t.Errorf("Expected %q, got %q", e.Version, g.Version)
|
||||
}
|
||||
if len(g.Keywords) != 3 {
|
||||
t.Error("Expected 3 keyrwords.")
|
||||
t.Error("Expected 3 keywords.")
|
||||
}
|
||||
if len(g.Maintainers) != 2 {
|
||||
t.Error("Expected 2 maintainers.")
|
||||
|
|
|
|||
|
|
@ -27,7 +27,7 @@ The first is the 'index.yaml' format, which is expressed like this:
|
|||
entries:
|
||||
frobnitz:
|
||||
- created: 2016-09-29T12:14:34.830161306-06:00
|
||||
description: This is a frobniz.
|
||||
description: This is a frobnitz.
|
||||
digest: 587bd19a9bd9d2bc4a6d25ab91c8c8e7042c47b4ac246e37bf8e1e74386190f4
|
||||
home: http://example.com
|
||||
keywords:
|
||||
|
|
|
|||
|
|
@ -131,7 +131,7 @@ func TestMerge(t *testing.T) {
|
|||
|
||||
if len(ind1.Entries) != 2 {
|
||||
t.Errorf("Expected 2 entries, got %d", len(ind1.Entries))
|
||||
vs := ind1.Entries["dreadnaught"]
|
||||
vs := ind1.Entries["dreadnought"]
|
||||
if len(vs) != 2 {
|
||||
t.Errorf("Expected 2 versions, got %d", len(vs))
|
||||
}
|
||||
|
|
|
|||
|
|
@ -44,7 +44,7 @@ type Secrets struct {
|
|||
Log func(string, ...interface{})
|
||||
}
|
||||
|
||||
// NewSecrets initializes a new Secrets wrapping an implmenetation of
|
||||
// NewSecrets initializes a new Secrets wrapping an implementation of
|
||||
// the kubernetes SecretsInterface.
|
||||
func NewSecrets(impl corev1.SecretInterface) *Secrets {
|
||||
return &Secrets{
|
||||
|
|
|
|||
Loading…
Reference in a new issue