mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-10 00:10:20 +00:00
cleanup: fix spellcheck errors
fixed spellcheck errors caught in CI. Signed-off-by: Madhu Rajanna <madhupr007@gmail.com>
This commit is contained in:
parent
ba37ff73ac
commit
304462c7cc
@ -41,7 +41,7 @@ type SecurityContextConstraintsValues struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// SecurityContextConstraintsDefaults can be used for generating deployment
|
// SecurityContextConstraintsDefaults can be used for generating deployment
|
||||||
// artifacts with defails values.
|
// artifacts with details values.
|
||||||
var SecurityContextConstraintsDefaults = SecurityContextConstraintsValues{
|
var SecurityContextConstraintsDefaults = SecurityContextConstraintsValues{
|
||||||
Namespace: "ceph-csi",
|
Namespace: "ceph-csi",
|
||||||
Deployer: "",
|
Deployer: "",
|
||||||
|
@ -1226,7 +1226,7 @@ func validatePVCSnapshot(
|
|||||||
checkSumClone, chErrs[n] = calculateSHA512sum(f, &a, filePath, &opt)
|
checkSumClone, chErrs[n] = calculateSHA512sum(f, &a, filePath, &opt)
|
||||||
framework.Logf("checksum value for the clone is %s with pod name %s", checkSumClone, name)
|
framework.Logf("checksum value for the clone is %s with pod name %s", checkSumClone, name)
|
||||||
if chErrs[n] != nil {
|
if chErrs[n] != nil {
|
||||||
framework.Logf("failed to calculte checksum for clone: %s", chErrs[n])
|
framework.Logf("failed to calculate checksum for clone: %s", chErrs[n])
|
||||||
}
|
}
|
||||||
if checkSumClone != checkSum {
|
if checkSumClone != checkSum {
|
||||||
framework.Logf(
|
framework.Logf(
|
||||||
|
@ -155,7 +155,7 @@ func (fs *Driver) Run(conf *util.Config) {
|
|||||||
fs.cs = NewControllerServer(fs.cd)
|
fs.cs = NewControllerServer(fs.cd)
|
||||||
}
|
}
|
||||||
|
|
||||||
// configre CSI-Addons server and components
|
// configure CSI-Addons server and components
|
||||||
err = fs.setupCSIAddonsServer(conf)
|
err = fs.setupCSIAddonsServer(conf)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.FatalLogMsg(err.Error())
|
log.FatalLogMsg(err.Error())
|
||||||
|
@ -68,9 +68,9 @@ func (ns *NodeServer) getMountState(path string) (mountState, error) {
|
|||||||
return msNotMounted, nil
|
return msNotMounted, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func findMountinfo(mountpoint string, mis []mountutil.MountInfo) int {
|
func findMountinfo(mountpoint string, minfo []mountutil.MountInfo) int {
|
||||||
for i := range mis {
|
for i := range minfo {
|
||||||
if mis[i].MountPoint == mountpoint {
|
if minfo[i].MountPoint == mountpoint {
|
||||||
return i
|
return i
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -80,9 +80,9 @@ func findMountinfo(mountpoint string, mis []mountutil.MountInfo) int {
|
|||||||
|
|
||||||
// Ensures that given mountpoint is of specified fstype.
|
// Ensures that given mountpoint is of specified fstype.
|
||||||
// Returns true if fstype matches, or if no such mountpoint exists.
|
// Returns true if fstype matches, or if no such mountpoint exists.
|
||||||
func validateFsType(mountpoint, fsType string, mis []mountutil.MountInfo) bool {
|
func validateFsType(mountpoint, fsType string, minfo []mountutil.MountInfo) bool {
|
||||||
if idx := findMountinfo(mountpoint, mis); idx > 0 {
|
if idx := findMountinfo(mountpoint, minfo); idx > 0 {
|
||||||
mi := mis[idx]
|
mi := minfo[idx]
|
||||||
|
|
||||||
if mi.FsType != fsType {
|
if mi.FsType != fsType {
|
||||||
return false
|
return false
|
||||||
|
@ -165,7 +165,7 @@ func (r *Driver) Run(conf *util.Config) {
|
|||||||
r.cs.SetMetadata = conf.SetMetadata
|
r.cs.SetMetadata = conf.SetMetadata
|
||||||
}
|
}
|
||||||
|
|
||||||
// configre CSI-Addons server and components
|
// configure CSI-Addons server and components
|
||||||
err = r.setupCSIAddonsServer(conf)
|
err = r.setupCSIAddonsServer(conf)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.FatalLogMsg(err.Error())
|
log.FatalLogMsg(err.Error())
|
||||||
|
@ -337,7 +337,7 @@ func InitializeNode(ctx context.Context) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// FscryptUnlock unlocks possilby creating fresh fscrypt metadata
|
// FscryptUnlock unlocks possibly creating fresh fscrypt metadata
|
||||||
// iff a volume is encrypted. Otherwise return immediately Calling
|
// iff a volume is encrypted. Otherwise return immediately Calling
|
||||||
// this function requires that InitializeFscrypt ran once on this node.
|
// this function requires that InitializeFscrypt ran once on this node.
|
||||||
func Unlock(
|
func Unlock(
|
||||||
|
Loading…
Reference in New Issue
Block a user