Skip to content

Commit b90c1f6

Browse files
authored
Fix spelling for log and help (#50860)
1 parent 26a0ac8 commit b90c1f6

File tree

7 files changed

+9
-9
lines changed

7 files changed

+9
-9
lines changed

lib/auth/auth_with_roles.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2962,14 +2962,14 @@ func (a *ServerWithRoles) GetCurrentUserRoles(ctx context.Context) ([]types.Role
29622962
func (a *ServerWithRoles) desiredAccessInfo(ctx context.Context, req *proto.UserCertsRequest, user types.User) (*services.AccessInfo, error) {
29632963
if req.Username != a.context.User.GetName() {
29642964
if isRoleImpersonation(*req) {
2965-
a.authServer.logger.WarnContext(ctx, "User tried to issue a cert for another user wjile adding role requests",
2965+
a.authServer.logger.WarnContext(ctx, "User tried to issue a cert for another user while adding role requests",
29662966
"user", a.context.User.GetName(),
29672967
"requested_user", req.Username,
29682968
)
29692969
return nil, trace.AccessDenied("User %v tried to issue a cert for %v and added role requests. This is not supported.", a.context.User.GetName(), req.Username)
29702970
}
29712971
if len(req.AccessRequests) > 0 {
2972-
a.authServer.logger.WarnContext(ctx, "User tried to issue a cert for another user wihile adding access requests",
2972+
a.authServer.logger.WarnContext(ctx, "User tried to issue a cert for another user while adding access requests",
29732973
"user", a.context.User.GetName(),
29742974
"requested_user", req.Username,
29752975
)

lib/config/configuration.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1920,7 +1920,7 @@ func readCACert(database *Database) ([]byte, error) {
19201920
if database.CACertFile != "" {
19211921
if database.TLS.CACertFile != "" {
19221922
// New and old fields are set. Ignore the old field.
1923-
slog.WarnContext(context.Background(), "Ignoring deprecated ca_cert_file database in configuration; using tls.ca_cert_file", "dababase", database.Name)
1923+
slog.WarnContext(context.Background(), "Ignoring deprecated ca_cert_file database in configuration; using tls.ca_cert_file", "database", database.Name)
19241924
} else {
19251925
// Only old field is set, inform about deprecation.
19261926
slog.WarnContext(context.Background(), "ca_cert_file is deprecated, please use tls.ca_cert_file instead for databases", "database", database.Name)

lib/events/athena/athena.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -617,7 +617,7 @@ func newAthenaMetrics(cfg athenaMetricsConfig) (*athenaMetrics, error) {
617617
prometheus.HistogramOpts{
618618
Namespace: teleport.MetricNamespace,
619619
Name: teleport.MetricParquetlogConsumerDeleteEventsDuration,
620-
Help: "Duration of delation of events on SQS in parquetlog",
620+
Help: "Duration of deletion of events on SQS in parquetlog",
621621
// lowest bucket start of upper bound 0.001 sec (1 ms) with factor 2
622622
// highest bucket start of 0.001 sec * 2^15 == 32.768 sec
623623
Buckets: prometheus.ExponentialBuckets(0.001, 2, 16),

lib/reversetunnel/transport.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ func (p *transport) start() {
160160

161161
p.logger.DebugContext(p.closeContext, "Received out-of-band proxy transport request",
162162
"target_address", dreq.Address,
163-
"taget_server_id", dreq.ServerID,
163+
"target_server_id", dreq.ServerID,
164164
"client_addr", dreq.ClientSrcAddr,
165165
)
166166

@@ -414,7 +414,7 @@ func (p *transport) getConn(addr string, r *sshutils.DialReq) (net.Conn, bool, e
414414
}
415415

416416
errTun := err
417-
p.logger.DebugContext(p.closeContext, "Attempting to dial server directly", "taget_addr", addr)
417+
p.logger.DebugContext(p.closeContext, "Attempting to dial server directly", "target_addr", addr)
418418
conn, err = p.directDial(addr)
419419
if err != nil {
420420
return nil, false, trace.ConnectionProblem(err, "failed dialing through tunnel (%v) or directly (%v)", errTun, err)

lib/srv/db/cloud/meta.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ func (m *Metadata) updateAWS(ctx context.Context, database types.Database, fetch
137137
return trace.Wrap(err)
138138
}
139139

140-
m.logger.DebugContext(ctx, "Fetched metadata for dabase", "database", database, "metadata", logutils.StringerAttr(fetchedMeta))
140+
m.logger.DebugContext(ctx, "Fetched metadata for database", "database", database, "metadata", logutils.StringerAttr(fetchedMeta))
141141
fetchedMeta.AssumeRoleARN = meta.AssumeRoleARN
142142
fetchedMeta.ExternalID = meta.ExternalID
143143
database.SetStatusAWS(*fetchedMeta)

lib/utils/host/hostusers.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ func UserDel(username string) (exitCode int, err error) {
180180
// userdel --remove (remove home) username
181181
cmd := exec.Command(userdelBin, args...)
182182
output, err := cmd.CombinedOutput()
183-
slog.DebugContext(context.Background(), "usedel command completed",
183+
slog.DebugContext(context.Background(), "userdel command completed",
184184
"command_path", cmd.Path,
185185
"output", string(output),
186186
)

lib/utils/unpack.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ func extractFile(tarball *tar.Reader, header *tar.Header, dir string, dirMode os
141141
case tar.TypeSymlink:
142142
return writeSymbolicLink(filepath.Join(dir, header.Name), header.Linkname, dirMode)
143143
default:
144-
slog.WarnContext(context.Background(), "Unsupported type flag for taball",
144+
slog.WarnContext(context.Background(), "Unsupported type flag for tarball",
145145
"type_flag", header.Typeflag,
146146
"header", header.Name,
147147
)

0 commit comments

Comments
 (0)