Skip to content

Commit 40c5d35

Browse files
authored
Fix spelling in docs, logs, exception messages etc (apache#9076)
1 parent e159a59 commit 40c5d35

13 files changed

+39
-39
lines changed

server/src/main/java/com/cloud/network/NetworkServiceImpl.java

+25-25
Original file line numberDiff line numberDiff line change
@@ -540,7 +540,7 @@ protected Map<PublicIp, Set<Service>> getIpToServices(List<PublicIp> publicIps,
540540
}
541541

542542
protected boolean canIpUsedForNonConserveService(PublicIp ip, Service service) {
543-
// If it's non-conserve mode, then the new ip should not be used by any other services
543+
// If it's non-conserve mode, then the new IP should not be used by any other services
544544
List<PublicIp> ipList = new ArrayList<PublicIp>();
545545
ipList.add(ip);
546546
Map<PublicIp, Set<Service>> ipToServices = getIpToServices(ipList, false, false);
@@ -549,7 +549,7 @@ protected boolean canIpUsedForNonConserveService(PublicIp ip, Service service) {
549549
if (services == null || services.isEmpty()) {
550550
return true;
551551
}
552-
// Since it's non-conserve mode, only one service should used for IP
552+
// Since it's non-conserve mode, only one service should be used for IP
553553
if (services.size() != 1) {
554554
throw new InvalidParameterException("There are multiple services used ip " + ip.getAddress() + ".");
555555
}
@@ -920,7 +920,7 @@ public NicSecondaryIp allocateSecondaryGuestIP(final long nicId, IpAddresses req
920920
ip6addr = ipv6AddrMgr.allocateGuestIpv6(network, ipv6Address);
921921
}
922922
} else if (network.getGuestType() == Network.GuestType.Shared) {
923-
//for basic zone, need to provide the podId to ensure proper ip alloation
923+
//for basic zone, need to provide the podId to ensure proper IP allocation
924924
Long podId = null;
925925
DataCenter dc = _dcDao.findById(network.getDataCenterId());
926926

@@ -951,7 +951,7 @@ public NicSecondaryIp allocateSecondaryGuestIP(final long nicId, IpAddresses req
951951
}
952952

953953
if (!StringUtils.isAllBlank(ipaddr, ip6addr)) {
954-
// we got the ip addr so up the nics table and secodary ip
954+
// we got the IP addr so up the nics table and secondary IP
955955
final String ip4AddrFinal = ipaddr;
956956
final String ip6AddrFinal = ip6addr;
957957
long id = Transaction.execute(new TransactionCallback<Long>() {
@@ -1016,7 +1016,7 @@ public boolean releaseSecondaryIpFromNic(long ipAddressId) {
10161016
List<NicSecondaryIpVO> ipList = _nicSecondaryIpDao.listByNicId(nicId);
10171017
boolean lastIp = false;
10181018
if (ipList.size() == 1) {
1019-
// this is the last secondary ip to nic
1019+
// this is the last secondary IP to NIC
10201020
lastIp = true;
10211021
}
10221022

@@ -1027,7 +1027,7 @@ public boolean releaseSecondaryIpFromNic(long ipAddressId) {
10271027

10281028
logger.debug("Calling secondary ip " + secIpVO.getIp4Address() + " release ");
10291029
if (dc.getNetworkType() == NetworkType.Advanced && network.getGuestType() == Network.GuestType.Isolated) {
1030-
//check PF or static NAT is configured on this ip address
1030+
//check PF or static NAT is configured on this IP address
10311031
String secondaryIp = secIpVO.getIp4Address();
10321032
List<FirewallRuleVO> fwRulesList = _firewallDao.listByNetworkAndPurpose(network.getId(), Purpose.PortForwarding);
10331033

@@ -1039,7 +1039,7 @@ public boolean releaseSecondaryIpFromNic(long ipAddressId) {
10391039
}
10401040
}
10411041
}
1042-
//check if the secondary ip associated with any static nat rule
1042+
//check if the secondary IP associated with any static nat rule
10431043
IPAddressVO publicIpVO = _ipAddressDao.findByIpAndNetworkId(secIpVO.getNetworkId(), secondaryIp);
10441044
if (publicIpVO != null) {
10451045
logger.debug("VM nic IP " + secondaryIp + " is associated with the static NAT rule public IP address id " + publicIpVO.getId());
@@ -1290,7 +1290,7 @@ private boolean releaseIpAddressInternal(long ipAddressId) throws InsufficientAd
12901290
throw new IllegalArgumentException("only ip addresses that belong to a virtual network may be disassociated.");
12911291
}
12921292

1293-
// don't allow releasing system ip address
1293+
// don't allow releasing system IP address
12941294
if (ipVO.getSystem()) {
12951295
throwInvalidIdException("Can't release system IP address with specified id", ipVO.getUuid(), "systemIpAddrId");
12961296
}
@@ -1729,7 +1729,7 @@ public Network createGuestNetwork(CreateNetworkCmd cmd) throws InsufficientCapac
17291729
domainId, isDomainSpecific, subdomainAccess, vpcId, startIPv6, endIPv6, ip6Gateway, ip6Cidr, displayNetwork, aclId, secondaryVlanId, privateVlanType, ntwkOff, pNtwk, aclType, owner, cidr, createVlan,
17301730
externalId, routerIPv4, routerIPv6, associatedNetwork, ip4Dns1, ip4Dns2, ip6Dns1, ip6Dns2, interfaceMTUs);
17311731

1732-
// retrieve, acquire and associate the correct ip adresses
1732+
// retrieve, acquire and associate the correct IP addresses
17331733
checkAndSetRouterSourceNatIp(owner, cmd, network);
17341734

17351735
if (hideIpAddressUsage) {
@@ -1787,7 +1787,7 @@ private boolean checkAndUpdateRouterSourceNatIp(UpdateNetworkCmd cmd, Network ne
17871787
if (! userIps.isEmpty()) {
17881788
try {
17891789
_ipAddrMgr.updateSourceNatIpAddress(requestedIp, userIps);
1790-
} catch (Exception e) { // pokemon execption from transaction
1790+
} catch (Exception e) { // pokemon exception from transaction
17911791
String msg = String.format("Update of source NAT ip to %s for network \"%s\"/%s failed due to %s",
17921792
requestedIp.getAddress().addr(), network.getName(), network.getUuid(), e.getLocalizedMessage());
17931793
logger.error(msg);
@@ -1806,7 +1806,7 @@ private IPAddressVO checkSourceNatIpAddressForUpdate(UpdateNetworkCmd cmd, Netwo
18061806
} else {
18071807
logger.info(String.format("updating network %s to have source NAT ip %s", cmd.getNetworkName(), sourceNatIp));
18081808
}
1809-
// check if the address is already aqcuired for this network
1809+
// check if the address is already acquired for this network
18101810
IPAddressVO requestedIp = _ipAddressDao.findByIp(sourceNatIp);
18111811
if (requestedIp == null || requestedIp.getAssociatedWithNetworkId() == null || ! requestedIp.getAssociatedWithNetworkId().equals(network.getId())) {
18121812
logger.warn(String.format("Source NAT IP %s is not associated with network %s/%s. It cannot be used as source NAT IP.",
@@ -1815,7 +1815,7 @@ private IPAddressVO checkSourceNatIpAddressForUpdate(UpdateNetworkCmd cmd, Netwo
18151815
}
18161816
// check if it is the current source NAT address
18171817
if (requestedIp.isSourceNat()) {
1818-
logger.info(String.format("IP address %s is allready the source Nat address. Not updating!", sourceNatIp));
1818+
logger.info(String.format("IP address %s is already the source Nat address. Not updating!", sourceNatIp));
18191819
return null;
18201820
}
18211821
return requestedIp;
@@ -3051,7 +3051,7 @@ public Network updateGuestNetwork(final UpdateNetworkCmd cmd) {
30513051

30523052
// network offering and domain suffix can be updated for Isolated networks only in 3.0
30533053
if ((networkOfferingId != null || domainSuffix != null) && network.getGuestType() != GuestType.Isolated) {
3054-
throw new InvalidParameterValueException("NetworkOffering and domain suffix upgrade can be perfomed for Isolated networks only");
3054+
throw new InvalidParameterValueException("NetworkOffering and domain suffix upgrade can be performed for Isolated networks only");
30553055
}
30563056

30573057
boolean networkOfferingChanged = false;
@@ -3953,7 +3953,7 @@ private boolean canMoveToPhysicalNetwork(Network network, long oldNetworkOfferin
39533953
return false;
39543954
}
39553955

3956-
// Check all ips
3956+
// Check all IPs
39573957
List<IPAddressVO> userIps = _ipAddressDao.listByAssociatedNetwork(network.getId(), null);
39583958
List<PublicIp> publicIps = new ArrayList<PublicIp>();
39593959
if (userIps != null && !userIps.isEmpty()) {
@@ -4103,10 +4103,10 @@ public PhysicalNetworkVO doInTransaction(TransactionStatus status) {
41034103
// add security group provider to the physical network
41044104
addDefaultSecurityGroupProviderToPhysicalNetwork(pNetwork.getId());
41054105

4106-
// add VPCVirtualRouter as the defualt network service provider
4106+
// add VPCVirtualRouter as the default network service provider
41074107
addDefaultVpcVirtualRouterToPhysicalNetwork(pNetwork.getId());
41084108

4109-
// add baremetal as the defualt network service provider
4109+
// add baremetal as the default network service provider
41104110
addDefaultBaremetalProvidersToPhysicalNetwork(pNetwork.getId());
41114111

41124112
//Add Internal Load Balancer element as a default network service provider
@@ -4187,7 +4187,7 @@ public PhysicalNetwork updatePhysicalNetwork(Long id, String networkSpeed, List<
41874187
}
41884188

41894189
// If tags are null, then check if there are any other networks with null tags
4190-
// of the same traffic type. If so then dont update the tags
4190+
// of the same traffic type. If so then don't update the tags
41914191
if (tags != null && tags.size() == 0) {
41924192
checkForPhysicalNetworksWithoutTag(network);
41934193
}
@@ -4272,7 +4272,7 @@ public void addOrRemoveVnets(String[] listOfRanges, final PhysicalNetworkVO netw
42724272
vnetsInDb.addAll(tempVnets);
42734273
}
42744274

4275-
//sorting the vnets in Db to generate a comma separated list of the vnet string.
4275+
//sorting the vnets in Db to generate a comma separated list of the vnet string.
42764276
if (vnetsInDb.size() != 0) {
42774277
commaSeparatedStringOfVnetRanges = generateVnetString(new ArrayList<String>(vnetsInDb));
42784278
}
@@ -4316,7 +4316,7 @@ private List<Pair<Integer, Integer>> validateVlanRange(PhysicalNetworkVO network
43164316

43174317
// for GRE phynets allow up to 32bits
43184318
// TODO: Not happy about this test.
4319-
// What about guru-like objects for physical networs?
4319+
// What about guru-like objects for physical networks?
43204320
logger.debug("ISOLATION METHODS:" + network.getIsolationMethods());
43214321
// Java does not have unsigned types...
43224322
if (network.getIsolationMethods().contains("GRE")) {
@@ -5070,7 +5070,7 @@ public PhysicalNetworkServiceProvider updateNetworkServiceProvider(Long id, Stri
50705070
}
50715071

50725072
if (enabledServices != null) {
5073-
// check if services can be turned of
5073+
// check if services can be turned off
50745074
if (!element.canEnableIndividualServices()) {
50755075
throw new InvalidParameterValueException("Cannot update set of Services for this Service Provider '" + provider.getProviderName() + "'");
50765076
}
@@ -5228,7 +5228,7 @@ public PhysicalNetworkTrafficType addTrafficTypeToPhysicalNetwork(Long physicalN
52285228
}
52295229

52305230
// Check if there are more than 1 physical network with null tags in same traffic type.
5231-
// If so then dont allow to add traffic type.
5231+
// If so then don't allow to add traffic type.
52325232
List<String> tags = network.getTags();
52335233
if (CollectionUtils.isEmpty(tags)) {
52345234
checkForPhysicalNetworksWithoutTag(network, trafficType);
@@ -5578,14 +5578,14 @@ public IpAddress associateIPToNetwork(long ipId, long networkId)
55785578

55795579
Network network = _networksDao.findById(networkId);
55805580
if (network == null) {
5581-
// release the acquired IP addrress before throwing the exception
5581+
// release the acquired IP address before throwing the exception
55825582
// else it will always be in allocating state
55835583
releaseIpAddress(ipId);
55845584
throw new InvalidParameterValueException("Invalid network id is given");
55855585
}
55865586

55875587
if (network.getVpcId() != null) {
5588-
// release the acquired IP addrress before throwing the exception
5588+
// release the acquired IP address before throwing the exception
55895589
// else it will always be in allocating state
55905590
releaseIpAddress(ipId);
55915591
throw new InvalidParameterValueException("Can't assign ip to the network directly when network belongs" + " to VPC.Specify vpcId to associate ip address to VPC");
@@ -5622,7 +5622,7 @@ public Network createPrivateNetwork(final String networkName, final String displ
56225622
}
56235623

56245624
// VALIDATE IP INFO
5625-
// if end ip is not specified, default it to startIp
5625+
// if end IP is not specified, default it to startIp
56265626
if (!NetUtils.isValidIp4(startIp)) {
56275627
throw new InvalidParameterValueException("Invalid format for the ip address parameter");
56285628
}
@@ -5646,7 +5646,7 @@ public Network createPrivateNetwork(final String networkName, final String displ
56465646
URI uri = BroadcastDomainType.fromString(broadcastUriString);
56475647
uriString = uri.toString();
56485648
BroadcastDomainType tiep = BroadcastDomainType.getSchemeValue(uri);
5649-
// numeric vlan or vlan uri are ok for now
5649+
// numeric vlan or vlan URI are ok for now
56505650
// TODO make a test for any supported scheme
56515651
if (!(tiep == BroadcastDomainType.Vlan || tiep == BroadcastDomainType.Lswitch)) {
56525652
throw new InvalidParameterValueException("unsupported type of broadcastUri specified: " + broadcastUriString);

server/src/main/java/com/cloud/user/AccountManagerImpl.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -863,7 +863,7 @@ protected boolean cleanupAccount(AccountVO account, long callerUserId, Account c
863863
_messageBus.publish(_name, MESSAGE_REMOVE_ACCOUNT_EVENT, PublishScope.LOCAL, accountId);
864864
}
865865

866-
// delete all vm groups belonging to accont
866+
// delete all vm groups belonging to account
867867
List<InstanceGroupVO> groups = _vmGroupDao.listByAccountId(accountId);
868868
for (InstanceGroupVO group : groups) {
869869
if (!_vmMgr.deleteVmGroup(group.getId())) {

systemvm/debian/opt/cloud/templates/conntrackd.conf.templ

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Sync {
2222
#
2323
# Size of the resend queue (in objects). This is the maximum
2424
# number of objects that can be stored waiting to be confirmed
25-
# via acknoledgment. If you keep this value low, the daemon
25+
# via acknowledgment. If you keep this value low, the daemon
2626
# will have less chances to recover state-changes under message
2727
# omission. On the other hand, if you keep this value high,
2828
# the daemon will consume more memory to store dead objects.

test/integration/component/maint/testpath_disable_enable_zone.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -1273,7 +1273,7 @@ def test_01_disable_enable_cluster(self):
12731273

12741274
self.assertEqual(len(exception_list),
12751275
0,
1276-
"Check if vm's are accesible"
1276+
"Check if vm's are accessible"
12771277
)
12781278

12791279
# non-admin user should fail to create vm, snap, temp etc

test/integration/component/test_acl_sharednetwork.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -949,7 +949,7 @@ def test_deployVM_in_sharedNetwork_scope_account_domainuser(self):
949949
Validate that any other user in same domain is NOT allowed to deploy VM in a shared network created with scope="account" for an account
950950
"""
951951

952-
# deploy VM as user under the same domain but belonging to a different account from the acount that has a shared network with scope=account
952+
# deploy VM as user under the same domain but belonging to a different account from the account that has a shared network with scope=account
953953

954954
self.apiclient.connection.apiKey = self.user_d111b_apikey
955955
self.apiclient.connection.securityKey = self.user_d111b_secretkey

test/integration/component/test_acl_sharednetwork_deployVM-impersonation.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -1613,7 +1613,7 @@ def test_deployVM_in_sharedNetwork_as_domainadmin_scope_account_domainuser(self)
16131613
Valiate that Domain admin is NOT able to deploy a VM for user in the same domain but belonging to a different account in a shared network with scope=account
16141614
"""
16151615

1616-
# Deploy VM as user in a domain under the same domain but different account from the acount that has a shared network with scope=account
1616+
# Deploy VM as user in a domain under the same domain but different account from the account that has a shared network with scope=account
16171617
self.apiclient.connection.apiKey = self.user_d1_apikey
16181618
self.apiclient.connection.securityKey = self.user_d1_secretkey
16191619
self.vmdata["name"] = self.acldata["vmD111B"]["name"] + "-shared-scope-domain-withsubdomainaccess-domain-admin"

test/integration/component/test_advancedsg_networks.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -611,7 +611,7 @@ def test_08_SharedNwSGAccountSpecific_samevlan_samesubnet(self):
611611
with same subnet and vlan"""
612612

613613
# Steps,
614-
# 1. create two different accouts
614+
# 1. create two different accounts
615615
# 2. create account specific shared networks in both accounts with same subnet and vlan id
616616

617617
# Validations,

test/integration/component/test_project_limits.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -1066,7 +1066,7 @@ def test_maxAccountNetworks(self):
10661066

10671067
# Steps for validation
10681068
# 1. Fetch max.account.networks from configurations
1069-
# 2. Create an account. Create account more that max.accout.network
1069+
# 2. Create an account. Create account more that max.account.network
10701070
# 3. Create network should fail
10711071

10721072
self.debug("Creating project with '%s' as admin" %

test/integration/component/test_resource_limits.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -1435,7 +1435,7 @@ def test_maxAccountNetworks(self):
14351435

14361436
# Steps for validation
14371437
# 1. Fetch max.account.networks from configurations
1438-
# 2. Create an account. Create account more that max.accout.network
1438+
# 2. Create an account. Create account more that max.account.network
14391439
# 3. Create network should fail
14401440

14411441
config = Configurations.list(

test/integration/component/test_snapshots_improvement.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -542,7 +542,7 @@ def get_Snapshots_For_Account(self, account, domainid):
542542

543543
def verify_Snapshots(self):
544544
try:
545-
self.debug("Listing snapshots for accout : %s" % self.account.name)
545+
self.debug("Listing snapshots for account : %s" % self.account.name)
546546
snapshots = self.get_Snapshots_For_Account(
547547
self.account.name,
548548
self.account.domainid)

test/integration/smoke/test_attach_multiple_volumes.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -211,7 +211,7 @@ def check_storage_pools(self, virtualmachineid):
211211
clusterid = host.clusterid
212212
storage_pools = StoragePool.list(self.apiClient, clusterid=clusterid)
213213
if len(storage_pools) < 2:
214-
self.skipTest("at least two accesible primary storage pools needed for the vm to perform this test")
214+
self.skipTest("at least two accessible primary storage pools needed for the vm to perform this test")
215215
return storage_pools
216216

217217

test/integration/smoke/test_enable_account_settings_for_domain.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -391,7 +391,7 @@ def test_03_enable_account_settings_for_domain(self):
391391
# (8) change domain setting (3) to original +30
392392
# (9) list domain settings with name=(3), value should be same as (8)
393393
# (10) list account settings with name=(3), value should be same as (9)=(8)
394-
# (11) change acount setting (3) to original +50
394+
# (11) change account setting (3) to original +50
395395
# (12) list account settings with name=(3), value should be same as (10)
396396
"""
397397

@@ -484,7 +484,7 @@ def test_03_enable_account_settings_for_domain(self):
484484
account_value = int(configs[0].value)
485485
self.assertEqual(new_domain_value, account_value, "Account setting is not equal to new value of global setting")
486486

487-
# (11) change acount setting (3) to original +50
487+
# (11) change account setting (3) to original +50
488488
new_account_value = account_value + 50
489489
Configurations.update(
490490
self.apiclient,

tools/ngui/static/js/lib/angular.js

+2-2
Original file line numberDiff line numberDiff line change
@@ -6428,11 +6428,11 @@ function setter(obj, path, setValue) {
64286428
}
64296429

64306430
/**
6431-
* Return the value accesible from the object by path. Any undefined traversals are ignored
6431+
* Return the value accessible from the object by path. Any undefined traversals are ignored
64326432
* @param {Object} obj starting object
64336433
* @param {string} path path to traverse
64346434
* @param {boolean=true} bindFnToScope
6435-
* @returns value as accesbile by path
6435+
* @returns value as accessible by path
64366436
*/
64376437
//TODO(misko): this function needs to be removed
64386438
function getter(obj, path, bindFnToScope) {

0 commit comments

Comments
 (0)