Skip to content

Commit 273fe14

Browse files
authored
*: fix typos (#7178)
1 parent c7c8aa8 commit 273fe14

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+70
-70
lines changed

balancer/endpointsharding/endpointsharding.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
*/
1818

1919
// Package endpointsharding implements a load balancing policy that manages
20-
// homogenous child policies each owning a single endpoint.
20+
// homogeneous child policies each owning a single endpoint.
2121
//
2222
// # Experimental
2323
//
@@ -48,7 +48,7 @@ type ChildState struct {
4848
State balancer.State
4949
}
5050

51-
// NewBalancer returns a load balancing policy that manages homogenous child
51+
// NewBalancer returns a load balancing policy that manages homogeneous child
5252
// policies each owning a single endpoint.
5353
func NewBalancer(cc balancer.ClientConn, opts balancer.BuildOptions) balancer.Balancer {
5454
es := &endpointSharding{

balancer/rls/picker_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ import (
4343
// TestNoNonEmptyTargetsReturnsError tests the case where the RLS Server returns
4444
// a response with no non empty targets. This should be treated as an Control
4545
// Plane RPC failure, and thus fail Data Plane RPC's with an error with the
46-
// appropriate information specfying data plane sent a response with no non
46+
// appropriate information specifying data plane sent a response with no non
4747
// empty targets.
4848
func (s) TestNoNonEmptyTargetsReturnsError(t *testing.T) {
4949
// Setup RLS Server to return a response with an empty target string.

balancer/weightedroundrobin/balancer_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -693,7 +693,7 @@ type srvWeight struct {
693693
const rrIterations = 100
694694

695695
// checkWeights does rrIterations RPCs and expects the different backends to be
696-
// routed in a ratio as deterimined by the srvWeights passed in. Allows for
696+
// routed in a ratio as determined by the srvWeights passed in. Allows for
697697
// some variance (+/- 2 RPCs per backend).
698698
func checkWeights(ctx context.Context, t *testing.T, sws ...srvWeight) {
699699
t.Helper()

clientconn.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1751,7 +1751,7 @@ func encodeAuthority(authority string) string {
17511751
return false
17521752
case '!', '$', '&', '\'', '(', ')', '*', '+', ',', ';', '=': // Subdelim characters
17531753
return false
1754-
case ':', '[', ']', '@': // Authority related delimeters
1754+
case ':', '[', ']', '@': // Authority related delimiters
17551755
return false
17561756
}
17571757
// Everything else must be escaped.

credentials/credentials.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -237,7 +237,7 @@ func ClientHandshakeInfoFromContext(ctx context.Context) ClientHandshakeInfo {
237237
}
238238

239239
// CheckSecurityLevel checks if a connection's security level is greater than or equal to the specified one.
240-
// It returns success if 1) the condition is satisified or 2) AuthInfo struct does not implement GetCommonAuthInfo() method
240+
// It returns success if 1) the condition is satisfied or 2) AuthInfo struct does not implement GetCommonAuthInfo() method
241241
// or 3) CommonAuthInfo.SecurityLevel has an invalid zero value. For 2) and 3), it is for the purpose of backward-compatibility.
242242
//
243243
// This API is experimental.

credentials/local/local.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818

1919
// Package local implements local transport credentials.
2020
// Local credentials reports the security level based on the type
21-
// of connetion. If the connection is local TCP, NoSecurity will be
21+
// of connection. If the connection is local TCP, NoSecurity will be
2222
// reported, and if the connection is UDS, PrivacyAndIntegrity will be
2323
// reported. If local credentials is not used in local connections
2424
// (local TCP or UDS), it will fail.

gcp/observability/logging_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1161,7 +1161,7 @@ func (s) TestMetadataTruncationAccountsKey(t *testing.T) {
11611161
ctx, cancel := context.WithTimeout(context.Background(), defaultTestTimeout)
11621162
defer cancel()
11631163

1164-
// the set config MaxMetdataBytes is in between len(mdValue) and len("key")
1164+
// the set config MaxMetadataBytes is in between len(mdValue) and len("key")
11651165
// + len(mdValue), and thus shouldn't log this metadata entry.
11661166
md := metadata.MD{
11671167
"key": []string{mdValue},

gcp/observability/opencensus.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ func newStackdriverExporter(config *config) (tracingMetricsExporter, error) {
8484
mr := monitoredresource.Autodetect()
8585
logger.Infof("Detected MonitoredResource:: %+v", mr)
8686
var err error
87-
// Custom labels completly overwrite any labels generated in the OpenCensus
87+
// Custom labels completely overwrite any labels generated in the OpenCensus
8888
// library, including their label that uniquely identifies the process.
8989
// Thus, generate a unique process identifier here to uniquely identify
9090
// process for metrics exporting to function correctly.

internal/balancer/gracefulswitch/gracefulswitch_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -526,7 +526,7 @@ func (s) TestBalancerClose(t *testing.T) {
526526
BalancerConfig: mockBalancerConfig{},
527527
}
528528
if err := gsb.UpdateClientConnState(ccs); err != errBalancerClosed {
529-
t.Fatalf("gsb.UpdateCLientConnState(%v) returned error %v, want %v", ccs, err, errBalancerClosed)
529+
t.Fatalf("gsb.UpdateClientConnState(%v) returned error %v, want %v", ccs, err, errBalancerClosed)
530530
}
531531

532532
// After the graceful switch load balancer has been closed, any resolver error

internal/balancergroup/balancergroup_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ func (s) TestBalancerGroup_locality_caching(t *testing.T) {
314314
}
315315

316316
// Sub-balancers are put in cache when they are shut down. If balancer group is
317-
// closed within close timeout, all subconns should still be rmeoved
317+
// closed within close timeout, all subconns should still be removed
318318
// immediately.
319319
func (s) TestBalancerGroup_locality_caching_close_group(t *testing.T) {
320320
_, bg, cc, addrToSC := initBalancerGroupForCachingTest(t, defaultTestTimeout)
@@ -388,7 +388,7 @@ func (s) TestBalancerGroup_locality_caching_readd_with_different_builder(t *test
388388
gator, bg, cc, addrToSC := initBalancerGroupForCachingTest(t, defaultTestTimeout)
389389

390390
// Re-add sub-balancer-1, but with a different balancer builder. The
391-
// sub-balancer was still in cache, but cann't be reused. This should cause
391+
// sub-balancer was still in cache, but can't be reused. This should cause
392392
// old sub-balancer's subconns to be shut down immediately, and new
393393
// subconns to be created.
394394
gator.Add(testBalancerIDs[1], 1)

0 commit comments

Comments
 (0)