This commit is contained in:
Josh Soref
2018-03-20 14:54:10 -04:00
committed by Jeff Mitchell
parent f105461df5
commit e43b76ef97
157 changed files with 246 additions and 246 deletions

View File

@@ -246,7 +246,7 @@ func TestCassandra_RevokeUser(t *testing.T) {
t.Fatalf("Could not connect with new credentials: %s", err)
}
// Test default revoke statememts
// Test default revoke statements
err = db.RevokeUser(context.Background(), statements, username)
if err != nil {
t.Fatalf("err: %s", err)

View File

@@ -250,7 +250,7 @@ commit_failure_policy: stop
#
# Valid values are either "auto" (omitting the value) or a value greater 0.
#
# Note that specifying a too large value will result in long running GCs and possbily
# Note that specifying a too large value will result in long running GCs and possibly
# out-of-memory errors. Keep the value at a small fraction of the heap.
#
# If you constantly see "prepared statements discarded in the last minute because
@@ -259,7 +259,7 @@ commit_failure_policy: stop
# i.e. use bind markers for variable parts.
#
# Do only change the default value, if you really have more prepared statements than
# fit in the cache. In most cases it is not neccessary to change this value.
# fit in the cache. In most cases it is not necessary to change this value.
# Constantly re-preparing statements is a performance penalty.
#
# Default value ("auto") is 1/256th of the heap or 10MB, whichever is greater
@@ -1021,7 +1021,7 @@ client_encryption_options:
keystore: conf/.keystore
keystore_password: cassandra
# require_client_auth: false
# Set trustore and truststore_password if require_client_auth is true
# Set truststore and truststore_password if require_client_auth is true
# truststore: conf/.truststore
# truststore_password: cassandra
# More advanced defaults below:
@@ -1080,7 +1080,7 @@ windows_timer_interval: 1
# Enables encrypting data at-rest (on disk). Different key providers can be plugged in, but the default reads from
# a JCE-style keystore. A single keystore can hold multiple keys, but the one referenced by
# the "key_alias" is the only key that will be used for encrypt opertaions; previously used keys
# the "key_alias" is the only key that will be used for encrypt operations; previously used keys
# can still (and should!) be in the keystore and will be used on decrypt operations
# (to handle the case of key rotation).
#
@@ -1114,7 +1114,7 @@ transparent_data_encryption_options:
# tombstones seen in memory so we can return them to the coordinator, which
# will use them to make sure other replicas also know about the deleted rows.
# With workloads that generate a lot of tombstones, this can cause performance
# problems and even exaust the server heap.
# problems and even exhaust the server heap.
# (http://www.datastax.com/dev/blog/cassandra-anti-patterns-queues-and-queue-like-datasets)
# Adjust the thresholds here if you understand the dangers and want to
# scan more tombstones anyway. These thresholds may also be adjusted at runtime

View File

@@ -66,7 +66,7 @@ func TestHANA_CreateUser(t *testing.T) {
RoleName: "test-test",
}
// Test with no configured Creation Statememt
// Test with no configured Creation Statement
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Hour))
if err == nil {
t.Fatal("Expected error when no creation statement is provided")
@@ -113,7 +113,7 @@ func TestHANA_RevokeUser(t *testing.T) {
RoleName: "test-test",
}
// Test default revoke statememts
// Test default revoke statements
username, password, err := db.CreateUser(context.Background(), statements, usernameConfig, time.Now().Add(time.Hour))
if err != nil {
t.Fatalf("err: %s", err)
@@ -130,7 +130,7 @@ func TestHANA_RevokeUser(t *testing.T) {
t.Fatal("Credentials were not revoked")
}
// Test custom revoke statememt
// Test custom revoke statement
username, password, err = db.CreateUser(context.Background(), statements, usernameConfig, time.Now().Add(time.Hour))
if err != nil {
t.Fatalf("err: %s", err)

View File

@@ -88,7 +88,7 @@ func (c *mongoDBConnectionProducer) Initialize(ctx context.Context, conf map[str
return nil
}
// Connection creates or returns an exisitng a database connection. If the session fails
// Connection creates or returns an existing a database connection. If the session fails
// on a ping check, the session will be closed and then re-created.
func (c *mongoDBConnectionProducer) Connection(_ context.Context) (interface{}, error) {
if !c.Initialized {

View File

@@ -155,7 +155,7 @@ func (m *MongoDB) RenewUser(ctx context.Context, statements dbplugin.Statements,
return nil
}
// RevokeUser drops the specified user from the authentication databse. If none is provided
// RevokeUser drops the specified user from the authentication database. If none is provided
// in the revocation statement, the default "admin" authentication database will be assumed.
func (m *MongoDB) RevokeUser(ctx context.Context, statements dbplugin.Statements, username string) error {
session, err := m.getConnection(ctx)

View File

@@ -206,7 +206,7 @@ func TestMongoDB_RevokeUser(t *testing.T) {
t.Fatalf("Could not connect with new credentials: %s", err)
}
// Test default revocation statememt
// Test default revocation statement
err = db.RevokeUser(context.Background(), statements, username)
if err != nil {
t.Fatalf("err: %s", err)

View File

@@ -283,7 +283,7 @@ func (m *MSSQL) revokeUserDefault(ctx context.Context, username string) error {
// can't drop if not all database users are dropped
if rows.Err() != nil {
return fmt.Errorf("cound not generate sql statements for all rows: %s", rows.Err())
return fmt.Errorf("could not generate sql statements for all rows: %s", rows.Err())
}
if lastStmtError != nil {
return fmt.Errorf("could not perform all sql statements: %s", lastStmtError)

View File

@@ -80,7 +80,7 @@ func TestMSSQL_CreateUser(t *testing.T) {
RoleName: "test",
}
// Test with no configured Creation Statememt
// Test with no configured Creation Statement
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Minute))
if err == nil {
t.Fatal("Expected error when no creation statement is provided")
@@ -135,7 +135,7 @@ func TestMSSQL_RevokeUser(t *testing.T) {
t.Fatalf("Could not connect with new credentials: %s", err)
}
// Test default revoke statememts
// Test default revoke statements
err = db.RevokeUser(context.Background(), statements, username)
if err != nil {
t.Fatalf("err: %s", err)
@@ -154,7 +154,7 @@ func TestMSSQL_RevokeUser(t *testing.T) {
t.Fatalf("Could not connect with new credentials: %s", err)
}
// Test custom revoke statememt
// Test custom revoke statement
statements.RevocationStatements = testMSSQLDrop
err = db.RevokeUser(context.Background(), statements, username)
if err != nil {

View File

@@ -157,7 +157,7 @@ func TestMySQL_CreateUser(t *testing.T) {
RoleName: "test-long-rolename",
}
// Test with no configured Creation Statememt
// Test with no configured Creation Statement
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Minute))
if err == nil {
t.Fatal("Expected error when no creation statement is provided")
@@ -186,7 +186,7 @@ func TestMySQL_CreateUser(t *testing.T) {
t.Fatalf("Could not connect with new credentials: %s", err)
}
// Test with a manualy prepare statement
// Test with a manually prepare statement
statements.CreationStatements = testMySQLRolePreparedStmt
username, password, err = db.CreateUser(context.Background(), statements, usernameConfig, time.Now().Add(time.Minute))
@@ -222,7 +222,7 @@ func TestMySQL_CreateUser_Legacy(t *testing.T) {
RoleName: "test-long-rolename",
}
// Test with no configured Creation Statememt
// Test with no configured Creation Statement
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Minute))
if err == nil {
t.Fatal("Expected error when no creation statement is provided")
@@ -287,7 +287,7 @@ func TestMySQL_RevokeUser(t *testing.T) {
t.Fatalf("Could not connect with new credentials: %s", err)
}
// Test default revoke statememts
// Test default revoke statements
err = db.RevokeUser(context.Background(), statements, username)
if err != nil {
t.Fatalf("err: %s", err)

View File

@@ -120,7 +120,7 @@ func TestPostgreSQL_CreateUser(t *testing.T) {
RoleName: "test",
}
// Test with no configured Creation Statememt
// Test with no configured Creation Statement
_, _, err = db.CreateUser(context.Background(), dbplugin.Statements{}, usernameConfig, time.Now().Add(time.Minute))
if err == nil {
t.Fatal("Expected error when no creation statement is provided")
@@ -254,7 +254,7 @@ func TestPostgreSQL_RevokeUser(t *testing.T) {
t.Fatalf("Could not connect with new credentials: %s", err)
}
// Test default revoke statememts
// Test default revoke statements
err = db.RevokeUser(context.Background(), statements, username)
if err != nil {
t.Fatalf("err: %s", err)