* spelling: constraint

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: cryptographic

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: dependency

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: doesnot

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: don't

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: unexpected

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: dreadnought

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: default

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: envvars

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: evaluates

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: execute

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: extractor

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: frobnitz

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: generated

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: implementation

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: jabba

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: keywords

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: kubernetes

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: override

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: package

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: parsable

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: progress

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: recursively

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: release

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: cache

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: representing

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: serializer

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: subchart

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>

* spelling: utilities

Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
pull/7269/head
Josh Soref 5 years ago committed by Martin Hickey
parent bd8dbcac8b
commit 02ad2b1187

@ -111,9 +111,9 @@ func TestDependencyUpdateCmd(t *testing.T) {
if _, err := os.Stat(expect); err != nil { if _, err := os.Stat(expect); err != nil {
t.Fatalf("Expected %q: %s", expect, err) t.Fatalf("Expected %q: %s", expect, err)
} }
dontExpect := dir(chartname, "charts/compressedchart-0.1.0.tgz") unexpected := dir(chartname, "charts/compressedchart-0.1.0.tgz")
if _, err := os.Stat(dontExpect); err == nil { if _, err := os.Stat(unexpected); err == nil {
t.Fatalf("Unexpected %q", dontExpect) t.Fatalf("Unexpected %q", unexpected)
} }
} }

@ -418,7 +418,7 @@ func newRootCmd(actionConfig *action.Configuration, out io.Writer, args []string
registry.ClientOptWriter(out), registry.ClientOptWriter(out),
) )
if err != nil { if err != nil {
// TODO: dont panic here, refactor newRootCmd to return error // TODO: don't panic here, refactor newRootCmd to return error
panic(err) panic(err)
} }
actionConfig.RegistryClient = registryClient actionConfig.RegistryClient = registryClient

@ -31,7 +31,7 @@ func TestRootCmd(t *testing.T) {
tests := []struct { tests := []struct {
name, args, cachePath, configPath, dataPath string name, args, cachePath, configPath, dataPath string
envars map[string]string envvars map[string]string
}{ }{
{ {
name: "defaults", name: "defaults",
@ -40,19 +40,19 @@ func TestRootCmd(t *testing.T) {
{ {
name: "with $XDG_CACHE_HOME set", name: "with $XDG_CACHE_HOME set",
args: "home", args: "home",
envars: map[string]string{xdg.CacheHomeEnvVar: "/bar"}, envvars: map[string]string{xdg.CacheHomeEnvVar: "/bar"},
cachePath: "/bar/helm", cachePath: "/bar/helm",
}, },
{ {
name: "with $XDG_CONFIG_HOME set", name: "with $XDG_CONFIG_HOME set",
args: "home", args: "home",
envars: map[string]string{xdg.ConfigHomeEnvVar: "/bar"}, envvars: map[string]string{xdg.ConfigHomeEnvVar: "/bar"},
configPath: "/bar/helm", configPath: "/bar/helm",
}, },
{ {
name: "with $XDG_DATA_HOME set", name: "with $XDG_DATA_HOME set",
args: "home", args: "home",
envars: map[string]string{xdg.DataHomeEnvVar: "/bar"}, envvars: map[string]string{xdg.DataHomeEnvVar: "/bar"},
dataPath: "/bar/helm", dataPath: "/bar/helm",
}, },
} }
@ -61,7 +61,7 @@ func TestRootCmd(t *testing.T) {
t.Run(tt.name, func(t *testing.T) { t.Run(tt.name, func(t *testing.T) {
defer ensure.HelmHome(t)() defer ensure.HelmHome(t)()
for k, v := range tt.envars { for k, v := range tt.envvars {
os.Setenv(k, v) os.Setenv(k, v)
} }

@ -27,7 +27,7 @@ import (
const verifyDesc = ` const verifyDesc = `
Verify that the given chart has a valid provenance file. Verify that the given chart has a valid provenance file.
Provenance files provide crytographic verification that a chart has not been Provenance files provide cryptographic verification that a chart has not been
tampered with, and was packaged by a trusted provider. tampered with, and was packaged by a trusted provider.
This command can be used to verify a local chart. Several other commands provide This command can be used to verify a local chart. Several other commands provide

@ -49,7 +49,7 @@ func shortDigest(digest string) string {
return digest return digest
} }
// timeAgo returns a human-readable timestamp respresenting time that has passed // timeAgo returns a human-readable timestamp representing time that has passed
func timeAgo(t time.Time) string { func timeAgo(t time.Time) string {
return units.HumanDuration(time.Now().UTC().Sub(t)) return units.HumanDuration(time.Now().UTC().Sub(t))
} }

@ -73,7 +73,7 @@ func Parse(file io.Reader) (*Rules, error) {
return r, s.Err() return r, s.Err()
} }
// Ignore evalutes the file at the given path, and returns true if it should be ignored. // Ignore evaluates the file at the given path, and returns true if it should be ignored.
// //
// Ignore evaluates path against the rules in order. Evaluation stops when a match // Ignore evaluates path against the rules in order. Evaluation stops when a match
// is found. Matching a negative rule will stop evaluation. // is found. Matching a negative rule will stop evaluation.

@ -66,7 +66,7 @@ var ValidName = regexp.MustCompile("^(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])+
// Configuration injects the dependencies that all actions share. // Configuration injects the dependencies that all actions share.
type Configuration struct { type Configuration struct {
// RESTClientGetter is an interface that loads Kuberbetes clients. // RESTClientGetter is an interface that loads Kubernetes clients.
RESTClientGetter RESTClientGetter RESTClientGetter RESTClientGetter
// Releases stores records of releases. // Releases stores records of releases.

@ -87,7 +87,7 @@ type Install struct {
// APIVersions allows a manual set of supported API Versions to be passed // APIVersions allows a manual set of supported API Versions to be passed
// (for things like templating). These are ignored if ClientOnly is false // (for things like templating). These are ignored if ClientOnly is false
APIVersions chartutil.VersionSet APIVersions chartutil.VersionSet
// Used by helm template to render charts with .Relase.IsUpgrade. Ignored if Dry-Run is false // Used by helm template to render charts with .Release.IsUpgrade. Ignored if Dry-Run is false
IsUpgrade bool IsUpgrade bool
} }

@ -41,7 +41,7 @@ const (
ListPendingInstall ListPendingInstall
// ListPendingUpgrade filters on status "pending_upgrade" (upgrade in progress) // ListPendingUpgrade filters on status "pending_upgrade" (upgrade in progress)
ListPendingUpgrade ListPendingUpgrade
// ListPendingRollback filters on status "pending_rollback" (rollback in progres) // ListPendingRollback filters on status "pending_rollback" (rollback in progress)
ListPendingRollback ListPendingRollback
// ListSuperseded filters on status "superseded" (historical release version that is no longer deployed) // ListSuperseded filters on status "superseded" (historical release version that is no longer deployed)
ListSuperseded ListSuperseded

@ -53,7 +53,7 @@ type Dependency struct {
// //
// It represents the state that the dependencies should be in. // It represents the state that the dependencies should be in.
type Lock struct { type Lock struct {
// Genderated is the date the lock file was last generated. // Generated is the date the lock file was last generated.
Generated time.Time `json:"generated"` Generated time.Time `json:"generated"`
// Digest is a hash of the dependencies in Chart.yaml. // Digest is a hash of the dependencies in Chart.yaml.
Digest string `json:"digest"` Digest string `json:"digest"`

@ -461,7 +461,7 @@ func verifyChartFileAndTemplate(t *testing.T, c *chart.Chart, name string) {
t.Fatalf("Expected 2 Dependency, got %d", len(dep.Dependencies())) t.Fatalf("Expected 2 Dependency, got %d", len(dep.Dependencies()))
} }
default: default:
t.Errorf("Unexpected dependeny %s", dep.Name()) t.Errorf("Unexpected dependency %s", dep.Name())
} }
} }
} }

@ -43,7 +43,7 @@ func LoadChartfile(filename string) (*chart.Metadata, error) {
// 'filename' should be the complete path and filename ('foo/Chart.yaml') // 'filename' should be the complete path and filename ('foo/Chart.yaml')
func SaveChartfile(filename string, cf *chart.Metadata) error { func SaveChartfile(filename string, cf *chart.Metadata) error {
// Pull out the dependencies of a v1 Chart, since there's no way // Pull out the dependencies of a v1 Chart, since there's no way
// to tell the serialiser to skip a field for just this use case // to tell the serializer to skip a field for just this use case
savedDependencies := cf.Dependencies savedDependencies := cf.Dependencies
if cf.APIVersion == chart.APIVersionV1 { if cf.APIVersion == chart.APIVersionV1 {
cf.Dependencies = nil cf.Dependencies = nil

@ -17,7 +17,7 @@ limitations under the License.
/*Package chartutil contains tools for working with charts. /*Package chartutil contains tools for working with charts.
Charts are described in the protocol buffer definition (pkg/proto/charts). Charts are described in the protocol buffer definition (pkg/proto/charts).
This packe provides utilities for serializing and deserializing charts. This package provides utilities for serializing and deserializing charts.
A chart can be represented on the file system in one of two ways: A chart can be represented on the file system in one of two ways:
@ -25,7 +25,7 @@ A chart can be represented on the file system in one of two ways:
- As a tarred gzipped file containing a directory that then contains a - As a tarred gzipped file containing a directory that then contains a
Chart.yaml file. Chart.yaml file.
This package provides utilitites for working with those file formats. This package provides utilities for working with those file formats.
The preferred way of loading a chart is using 'loader.Load`: The preferred way of loading a chart is using 'loader.Load`:

@ -20,7 +20,7 @@ import (
"testing" "testing"
) )
func TestErrorNoTableDoesntPanic(t *testing.T) { func TestErrorNoTableDoesNotPanic(t *testing.T) {
x := "empty" x := "empty"
y := ErrNoTable{x} y := ErrNoTable{x}
@ -28,7 +28,7 @@ func TestErrorNoTableDoesntPanic(t *testing.T) {
t.Logf("error is: %s", y) t.Logf("error is: %s", y)
} }
func TestErrorNoValueDoesntPanic(t *testing.T) { func TestErrorNoValueDoesNotPanic(t *testing.T) {
x := "empty" x := "empty"
y := ErrNoValue{x} y := ErrNoValue{x}

@ -39,10 +39,10 @@ func ValidateAgainstSchema(chrt *chart.Chart, values map[string]interface{}) err
} }
} }
// For each dependency, recurively call this function with the coalesced values // For each dependency, recursively call this function with the coalesced values
for _, subchrt := range chrt.Dependencies() { for _, subchart := range chrt.Dependencies() {
subchrtValues := values[subchrt.Name()].(map[string]interface{}) subchartValues := values[subchart.Name()].(map[string]interface{})
if err := ValidateAgainstSchema(subchrt, subchrtValues); err != nil { if err := ValidateAgainstSchema(subchart, subchartValues); err != nil {
sb.WriteString(err.Error()) sb.WriteString(err.Error())
} }
} }

@ -63,7 +63,7 @@ func TestValidateAgainstSingleSchemaNegative(t *testing.T) {
} }
} }
const subchrtSchema = `{ const subchartSchema = `{
"$schema": "http://json-schema.org/draft-07/schema#", "$schema": "http://json-schema.org/draft-07/schema#",
"title": "Values", "title": "Values",
"type": "object", "type": "object",
@ -81,23 +81,23 @@ const subchrtSchema = `{
` `
func TestValidateAgainstSchema(t *testing.T) { func TestValidateAgainstSchema(t *testing.T) {
subchrtJSON := []byte(subchrtSchema) subchartJSON := []byte(subchartSchema)
subchrt := &chart.Chart{ subchart := &chart.Chart{
Metadata: &chart.Metadata{ Metadata: &chart.Metadata{
Name: "subchrt", Name: "subchart",
}, },
Schema: subchrtJSON, Schema: subchartJSON,
} }
chrt := &chart.Chart{ chrt := &chart.Chart{
Metadata: &chart.Metadata{ Metadata: &chart.Metadata{
Name: "chrt", Name: "chrt",
}, },
} }
chrt.AddDependency(subchrt) chrt.AddDependency(subchart)
vals := map[string]interface{}{ vals := map[string]interface{}{
"name": "John", "name": "John",
"subchrt": map[string]interface{}{ "subchart": map[string]interface{}{
"age": 25, "age": 25,
}, },
} }
@ -108,23 +108,23 @@ func TestValidateAgainstSchema(t *testing.T) {
} }
func TestValidateAgainstSchemaNegative(t *testing.T) { func TestValidateAgainstSchemaNegative(t *testing.T) {
subchrtJSON := []byte(subchrtSchema) subchartJSON := []byte(subchartSchema)
subchrt := &chart.Chart{ subchart := &chart.Chart{
Metadata: &chart.Metadata{ Metadata: &chart.Metadata{
Name: "subchrt", Name: "subchart",
}, },
Schema: subchrtJSON, Schema: subchartJSON,
} }
chrt := &chart.Chart{ chrt := &chart.Chart{
Metadata: &chart.Metadata{ Metadata: &chart.Metadata{
Name: "chrt", Name: "chrt",
}, },
} }
chrt.AddDependency(subchrt) chrt.AddDependency(subchart)
vals := map[string]interface{}{ vals := map[string]interface{}{
"name": "John", "name": "John",
"subchrt": map[string]interface{}{}, "subchart": map[string]interface{}{},
} }
var errString string var errString string
@ -134,7 +134,7 @@ func TestValidateAgainstSchemaNegative(t *testing.T) {
errString = err.Error() errString = err.Error()
} }
expectedErrString := `subchrt: expectedErrString := `subchart:
- (root): age is required - (root): age is required
` `
if errString != expectedErrString { if errString != expectedErrString {

@ -142,7 +142,7 @@ func writeTarContents(out *tar.Writer, c *chart.Chart, prefix string) error {
base := filepath.Join(prefix, c.Name()) base := filepath.Join(prefix, c.Name())
// Pull out the dependencies of a v1 Chart, since there's no way // Pull out the dependencies of a v1 Chart, since there's no way
// to tell the serialiser to skip a field for just this use case // to tell the serializer to skip a field for just this use case
savedDependencies := c.Metadata.Dependencies savedDependencies := c.Metadata.Dependencies
if c.Metadata.APIVersion == chart.APIVersionV1 { if c.Metadata.APIVersion == chart.APIVersionV1 {
c.Metadata.Dependencies = nil c.Metadata.Dependencies = nil

@ -23,7 +23,7 @@ overridden-chartA:
SCAbool: true SCAbool: true
SCAfloat: 3.14 SCAfloat: 3.14
SCAint: 100 SCAint: 100
SCAstring: "jabathehut" SCAstring: "jabbathehut"
SC1extra3: true SC1extra3: true
imported-chartA-B: imported-chartA-B:

@ -76,7 +76,7 @@ func TestToRenderValues(t *testing.T) {
}, },
} }
overideValues := map[string]interface{}{ overrideValues := map[string]interface{}{
"name": "Haroun", "name": "Haroun",
"where": map[string]interface{}{ "where": map[string]interface{}{
"city": "Baghdad", "city": "Baghdad",
@ -103,7 +103,7 @@ func TestToRenderValues(t *testing.T) {
IsInstall: true, IsInstall: true,
} }
res, err := ToRenderValues(c, overideValues, o, nil) res, err := ToRenderValues(c, overrideValues, o, nil)
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)
} }
@ -275,10 +275,10 @@ chapter:
} else if v != "Loomings" { } else if v != "Loomings" {
t.Errorf("No error but got wrong value for title: %s\n%v", err, d) t.Errorf("No error but got wrong value for title: %s\n%v", err, d)
} }
if _, err := d.PathValue("chapter.one.doesntexist"); err == nil { if _, err := d.PathValue("chapter.one.doesnotexist"); err == nil {
t.Errorf("Non-existent key should return error: %s\n%v", err, d) t.Errorf("Non-existent key should return error: %s\n%v", err, d)
} }
if _, err := d.PathValue("chapter.doesntexist.one"); err == nil { if _, err := d.PathValue("chapter.doesnotexist.one"); err == nil {
t.Errorf("Non-existent key in middle of path should return error: %s\n%v", err, d) t.Errorf("Non-existent key in middle of path should return error: %s\n%v", err, d)
} }
if _, err := d.PathValue(""); err == nil { if _, err := d.PathValue(""); err == nil {

@ -52,7 +52,7 @@ type EnvSettings struct {
RegistryConfig string RegistryConfig string
// RepositoryConfig is the path to the repositories file. // RepositoryConfig is the path to the repositories file.
RepositoryConfig string RepositoryConfig string
// Repositoryache is the path to the repository cache directory. // RepositoryCache is the path to the repository cache directory.
RepositoryCache string RepositoryCache string
// PluginsDirectory is the path to the plugins directory. // PluginsDirectory is the path to the plugins directory.
PluginsDirectory string PluginsDirectory string

@ -30,7 +30,7 @@ func TestEnvSettings(t *testing.T) {
// input // input
args string args string
envars map[string]string envvars map[string]string
// expected values // expected values
ns, kcontext string ns, kcontext string
@ -48,14 +48,14 @@ func TestEnvSettings(t *testing.T) {
}, },
{ {
name: "with envvars set", name: "with envvars set",
envars: map[string]string{"HELM_DEBUG": "1", "HELM_NAMESPACE": "yourns"}, envvars: map[string]string{"HELM_DEBUG": "1", "HELM_NAMESPACE": "yourns"},
ns: "yourns", ns: "yourns",
debug: true, debug: true,
}, },
{ {
name: "with flags and envvars set", name: "with flags and envvars set",
args: "--debug --namespace=myns", args: "--debug --namespace=myns",
envars: map[string]string{"HELM_DEBUG": "1", "HELM_NAMESPACE": "yourns"}, envvars: map[string]string{"HELM_DEBUG": "1", "HELM_NAMESPACE": "yourns"},
ns: "myns", ns: "myns",
debug: true, debug: true,
}, },
@ -65,7 +65,7 @@ func TestEnvSettings(t *testing.T) {
t.Run(tt.name, func(t *testing.T) { t.Run(tt.name, func(t *testing.T) {
defer resetEnv()() defer resetEnv()()
for k, v := range tt.envars { for k, v := range tt.envvars {
os.Setenv(k, v) os.Setenv(k, v)
} }

@ -100,7 +100,7 @@ func (e Engine) initFunMap(t *template.Template, referenceTpls map[string]render
var buf strings.Builder var buf strings.Builder
for _, n := range includedNames { for _, n := range includedNames {
if n == name { if n == name {
return "", errors.Wrapf(fmt.Errorf("unable to excute template"), "rendering template has a nested reference name: %s", name) return "", errors.Wrapf(fmt.Errorf("unable to execute template"), "rendering template has a nested reference name: %s", name)
} }
} }
includedNames = append(includedNames, name) includedNames = append(includedNames, name)

@ -27,7 +27,7 @@ import (
"helm.sh/helm/v3/internal/version" "helm.sh/helm/v3/internal/version"
) )
// HTTPGetter is the efault HTTP(/S) backend handler // HTTPGetter is the default HTTP(/S) backend handler
type HTTPGetter struct { type HTTPGetter struct {
opts options opts options
} }

@ -40,7 +40,7 @@ func Chartfile(linter *support.Linter) {
chartFile, err := chartutil.LoadChartfile(chartPath) chartFile, err := chartutil.LoadChartfile(chartPath)
validChartFile := linter.RunLinterRule(support.ErrorSev, chartFileName, validateChartYamlFormat(err)) validChartFile := linter.RunLinterRule(support.ErrorSev, chartFileName, validateChartYamlFormat(err))
// Guard clause. Following linter rules require a parseable ChartFile // Guard clause. Following linter rules require a parsable ChartFile
if !validChartFile { if !validChartFile {
return return
} }

@ -234,12 +234,12 @@ func TestExtract(t *testing.T) {
gz.Close() gz.Close()
// END tarball creation // END tarball creation
extr, err := NewExtractor(source) extractor, err := NewExtractor(source)
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)
} }
if err = extr.Extract(&buf, tempDir); err != nil { if err = extractor.Extract(&buf, tempDir); err != nil {
t.Errorf("Did not expect error but got error: %v", err) t.Errorf("Did not expect error but got error: %v", err)
} }

@ -135,7 +135,7 @@ func (i *VCSInstaller) solveVersion(repo vcs.Repo) (string, error) {
sort.Sort(sort.Reverse(semver.Collection(semvers))) sort.Sort(sort.Reverse(semver.Collection(semvers)))
for _, v := range semvers { for _, v := range semvers {
if constraint.Check(v) { if constraint.Check(v) {
// If the constrint passes get the original reference // If the constraint passes get the original reference
ver := v.Original() ver := v.Original()
debug("setting to %s", ver) debug("setting to %s", ver)
return ver, nil return ver, nil

@ -25,7 +25,7 @@ const (
StatusUnknown Status = "unknown" StatusUnknown Status = "unknown"
// StatusDeployed indicates that the release has been pushed to Kubernetes. // StatusDeployed indicates that the release has been pushed to Kubernetes.
StatusDeployed Status = "deployed" StatusDeployed Status = "deployed"
// StatusUninstalled indicates that a release has been uninstalled from Kubermetes. // StatusUninstalled indicates that a release has been uninstalled from Kubernetes.
StatusUninstalled Status = "uninstalled" StatusUninstalled Status = "uninstalled"
// StatusSuperseded indicates that this release object is outdated and a newer one exists. // StatusSuperseded indicates that this release object is outdated and a newer one exists.
StatusSuperseded Status = "superseded" StatusSuperseded Status = "superseded"

@ -237,7 +237,7 @@ func verifyIndex(t *testing.T, actual *IndexFile) {
t.Errorf("Expected %q, got %q", e.Version, g.Version) t.Errorf("Expected %q, got %q", e.Version, g.Version)
} }
if len(g.Keywords) != 3 { if len(g.Keywords) != 3 {
t.Error("Expected 3 keyrwords.") t.Error("Expected 3 keywords.")
} }
if len(g.Maintainers) != 2 { if len(g.Maintainers) != 2 {
t.Error("Expected 2 maintainers.") t.Error("Expected 2 maintainers.")

@ -27,7 +27,7 @@ The first is the 'index.yaml' format, which is expressed like this:
entries: entries:
frobnitz: frobnitz:
- created: 2016-09-29T12:14:34.830161306-06:00 - created: 2016-09-29T12:14:34.830161306-06:00
description: This is a frobniz. description: This is a frobnitz.
digest: 587bd19a9bd9d2bc4a6d25ab91c8c8e7042c47b4ac246e37bf8e1e74386190f4 digest: 587bd19a9bd9d2bc4a6d25ab91c8c8e7042c47b4ac246e37bf8e1e74386190f4
home: http://example.com home: http://example.com
keywords: keywords:

@ -131,7 +131,7 @@ func TestMerge(t *testing.T) {
if len(ind1.Entries) != 2 { if len(ind1.Entries) != 2 {
t.Errorf("Expected 2 entries, got %d", len(ind1.Entries)) t.Errorf("Expected 2 entries, got %d", len(ind1.Entries))
vs := ind1.Entries["dreadnaught"] vs := ind1.Entries["dreadnought"]
if len(vs) != 2 { if len(vs) != 2 {
t.Errorf("Expected 2 versions, got %d", len(vs)) t.Errorf("Expected 2 versions, got %d", len(vs))
} }

@ -44,7 +44,7 @@ type Secrets struct {
Log func(string, ...interface{}) Log func(string, ...interface{})
} }
// NewSecrets initializes a new Secrets wrapping an implmenetation of // NewSecrets initializes a new Secrets wrapping an implementation of
// the kubernetes SecretsInterface. // the kubernetes SecretsInterface.
func NewSecrets(impl corev1.SecretInterface) *Secrets { func NewSecrets(impl corev1.SecretInterface) *Secrets {
return &Secrets{ return &Secrets{

Loading…
Cancel
Save