mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-30 17:58:14 +00:00 
			
		
		
		
	Merge pull request #112603 from humblec/var-3
fix typos in pkg/validation and test/cmd
This commit is contained in:
		| @@ -550,7 +550,7 @@ func TestNodeSelectorRequirementKeyExistsInNodeSelectorTerms(t *testing.T) { | ||||
| 			exists: true, | ||||
| 		}, | ||||
| 		{ | ||||
| 			name: "key existence in terms with one of the keys specfied", | ||||
| 			name: "key existence in terms with one of the keys specified", | ||||
| 			reqs: []v1.NodeSelectorRequirement{ | ||||
| 				{ | ||||
| 					Key:      "key1", | ||||
|   | ||||
| @@ -6417,7 +6417,7 @@ func validateWindowsHostProcessPod(podSpec *core.PodSpec, fieldPath *field.Path, | ||||
|  | ||||
| 		switch { | ||||
| 		case containerHostProcess != nil && *containerHostProcess: | ||||
| 			// Container explitly sets hostProcess=true | ||||
| 			// Container explicitly sets hostProcess=true | ||||
| 			hostProcessContainerCount++ | ||||
| 		case containerHostProcess == nil && podHostProcess != nil && *podHostProcess: | ||||
| 			// Container inherits hostProcess=true from pod settings | ||||
|   | ||||
| @@ -13384,7 +13384,7 @@ func TestValidateServiceCreate(t *testing.T) { | ||||
| 			numErrs: 0, | ||||
| 		}, | ||||
| 		{ | ||||
| 			name: "nagative healthCheckNodePort field", | ||||
| 			name: "negative healthCheckNodePort field", | ||||
| 			tweakSvc: func(s *core.Service) { | ||||
| 				s.Spec.Type = core.ServiceTypeLoadBalancer | ||||
| 				s.Spec.AllocateLoadBalancerNodePorts = utilpointer.BoolPtr(true) | ||||
| @@ -13394,7 +13394,7 @@ func TestValidateServiceCreate(t *testing.T) { | ||||
| 			numErrs: 1, | ||||
| 		}, | ||||
| 		{ | ||||
| 			name: "nagative healthCheckNodePort field", | ||||
| 			name: "negative healthCheckNodePort field", | ||||
| 			tweakSvc: func(s *core.Service) { | ||||
| 				s.Spec.Type = core.ServiceTypeLoadBalancer | ||||
| 				s.Spec.AllocateLoadBalancerNodePorts = utilpointer.BoolPtr(true) | ||||
| @@ -13528,7 +13528,7 @@ func TestValidateServiceCreate(t *testing.T) { | ||||
| 			}, | ||||
| 			numErrs: 0, | ||||
| 		}, | ||||
| 		/* cluster IPs. some tests are reduntant */ | ||||
| 		/* cluster IPs. some tests are redundant */ | ||||
| 		{ | ||||
| 			name: "invalid, garbage single ip", | ||||
| 			tweakSvc: func(s *core.Service) { | ||||
|   | ||||
| @@ -306,7 +306,7 @@ __EOF__ | ||||
|   kubectl delete --kustomize hack/testdata/kustomize | ||||
|  | ||||
|   ## kubectl apply multiple resources with one failure during apply phase. | ||||
|   # Pre-Condition: namepace does not exist and no POD exists | ||||
|   # Pre-Condition: namespace does not exist and no POD exists | ||||
|   output_message=$(! kubectl get namespace multi-resource-ns 2>&1 "${kube_flags[@]:?}") | ||||
|   kube::test::if_has_string "${output_message}" 'namespaces "multi-resource-ns" not found' | ||||
|   kube::test::wait_object_assert pods "{{range.items}}{{${id_field:?}}}:{{end}}" '' | ||||
|   | ||||
| @@ -27,7 +27,7 @@ run_RESTMapper_evaluation_tests() { | ||||
|  | ||||
|   RESTMAPPER_ERROR_FILE="${KUBE_TEMP}/restmapper-error" | ||||
|  | ||||
|   ### Non-existent resource type should give a recognizeable error | ||||
|   ### Non-existent resource type should give a recognizable error | ||||
|   # Pre-condition: None | ||||
|   # Command | ||||
|   kubectl get "${kube_flags[@]:?}" unknownresourcetype 2>"${RESTMAPPER_ERROR_FILE}" || true | ||||
|   | ||||
| @@ -201,7 +201,7 @@ EOF | ||||
|   output_message=$(kubectl "${kube_flags[@]:?}" create service nodeport foo --dry-run=client --tcp=8080 --template="{{ .metadata.name }}:") | ||||
|   kube::test::if_has_string "${output_message}" 'foo:' | ||||
|  | ||||
|   # check that "config view" ouputs "yaml" as its default output format | ||||
|   # check that "config view" outputs "yaml" as its default output format | ||||
|   output_message=$(kubectl "${kube_flags[@]:?}" config view) | ||||
|   kube::test::if_has_string "${output_message}" 'kind: Config' | ||||
|  | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Kubernetes Prow Robot
					Kubernetes Prow Robot