mirror of
https://github.com/golang/go
synced 2024-11-26 05:57:58 -07:00
all: fix spellings
This follows the spelling choices that the Go project has made for English words.
https://github.com/golang/go/wiki/Spelling
Change-Id: Ie7c586d2cf23020cb492cfff58c0831d2d8d3a78
GitHub-Last-Rev: e16a32cd22
GitHub-Pull-Request: golang/go#45442
Reviewed-on: https://go-review.googlesource.com/c/go/+/308291
Run-TryBot: Ian Lance Taylor <iant@golang.org>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Ian Lance Taylor <iant@golang.org>
Trust: Emmanuel Odeke <emmanuel@orijtech.com>
This commit is contained in:
parent
554d2c4f06
commit
52bf14e0e8
@ -5,7 +5,7 @@
|
||||
// +build !android
|
||||
|
||||
// Test that pthread_cancel works as expected
|
||||
// (NPTL uses SIGRTMIN to implement thread cancelation)
|
||||
// (NPTL uses SIGRTMIN to implement thread cancellation)
|
||||
// See https://golang.org/issue/6997
|
||||
package cgotest
|
||||
|
||||
@ -17,8 +17,10 @@ extern int CancelThread();
|
||||
*/
|
||||
import "C"
|
||||
|
||||
import "testing"
|
||||
import "time"
|
||||
import (
|
||||
"testing"
|
||||
"time"
|
||||
)
|
||||
|
||||
func test6997(t *testing.T) {
|
||||
r := C.StartThread()
|
||||
|
@ -661,7 +661,7 @@ func XTestWithCancelCanceledParent(t testingT) {
|
||||
t.Errorf("child not done immediately upon construction")
|
||||
}
|
||||
if got, want := c.Err(), Canceled; got != want {
|
||||
t.Errorf("child not cancelled; got = %v, want = %v", got, want)
|
||||
t.Errorf("child not canceled; got = %v, want = %v", got, want)
|
||||
}
|
||||
}
|
||||
|
||||
@ -779,7 +779,7 @@ func XTestCustomContextGoroutines(t testingT) {
|
||||
defer cancel6()
|
||||
checkNoGoroutine()
|
||||
|
||||
// Check applied to cancelled context.
|
||||
// Check applied to canceled context.
|
||||
cancel6()
|
||||
cancel1()
|
||||
_, cancel7 := WithCancel(ctx5)
|
||||
|
@ -1989,7 +1989,7 @@ func TestServerHandshakeContextCancellation(t *testing.T) {
|
||||
// TestHandshakeContextHierarchy tests whether the contexts
|
||||
// available to GetClientCertificate and GetCertificate are
|
||||
// derived from the context provided to HandshakeContext, and
|
||||
// that those contexts are cancelled after HandshakeContext has
|
||||
// that those contexts are canceled after HandshakeContext has
|
||||
// returned.
|
||||
func TestHandshakeContextHierarchy(t *testing.T) {
|
||||
c, s := localPipe(t)
|
||||
@ -2024,7 +2024,7 @@ func TestHandshakeContextHierarchy(t *testing.T) {
|
||||
select {
|
||||
case <-innerCtx.Done():
|
||||
default:
|
||||
t.Errorf("GetClientCertificate context was not cancelled after HandshakeContext returned.")
|
||||
t.Errorf("GetClientCertificate context was not canceled after HandshakeContext returned.")
|
||||
}
|
||||
}()
|
||||
var innerCtx context.Context
|
||||
@ -2048,7 +2048,7 @@ func TestHandshakeContextHierarchy(t *testing.T) {
|
||||
select {
|
||||
case <-innerCtx.Done():
|
||||
default:
|
||||
t.Errorf("GetCertificate context was not cancelled after HandshakeContext returned.")
|
||||
t.Errorf("GetCertificate context was not canceled after HandshakeContext returned.")
|
||||
}
|
||||
if err := <-clientErr; err != nil {
|
||||
t.Errorf("Unexpected client error: %v", err)
|
||||
|
@ -1795,7 +1795,7 @@ func (db *DB) beginDC(ctx context.Context, dc *driverConn, release func(error),
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Schedule the transaction to rollback when the context is cancelled.
|
||||
// Schedule the transaction to rollback when the context is canceled.
|
||||
// The cancel function in Tx will be called after done is set to true.
|
||||
ctx, cancel := context.WithCancel(ctx)
|
||||
tx = &Tx{
|
||||
|
@ -656,7 +656,7 @@ func TestPoolExhaustOnCancel(t *testing.T) {
|
||||
db.SetMaxOpenConns(max)
|
||||
|
||||
// First saturate the connection pool.
|
||||
// Then start new requests for a connection that is cancelled after it is requested.
|
||||
// Then start new requests for a connection that is canceled after it is requested.
|
||||
|
||||
state = 1
|
||||
for i := 0; i < max; i++ {
|
||||
@ -2784,7 +2784,7 @@ func TestTxCannotCommitAfterRollback(t *testing.T) {
|
||||
// 3. Check if 2.A has committed in Tx (pass) or outside of Tx (fail).
|
||||
sendQuery := make(chan struct{})
|
||||
// The Tx status is returned through the row results, ensure
|
||||
// that the rows results are not cancelled.
|
||||
// that the rows results are not canceled.
|
||||
bypassRowsAwaitDone = true
|
||||
hookTxGrabConn = func() {
|
||||
cancel()
|
||||
|
@ -1945,7 +1945,7 @@ func TestClientDoCanceledVsTimeout_h2(t *testing.T) {
|
||||
}
|
||||
|
||||
// Issue 33545: lock-in the behavior promised by Client.Do's
|
||||
// docs about request cancelation vs timing out.
|
||||
// docs about request cancellation vs timing out.
|
||||
func testClientDoCanceledVsTimeout(t *testing.T, h2 bool) {
|
||||
defer afterTest(t)
|
||||
cst := newClientServerTest(t, h2, HandlerFunc(func(w ResponseWriter, r *Request) {
|
||||
|
@ -478,7 +478,7 @@ func TestDumpResponse(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
// Issue 38352: Check for deadlock on cancelled requests.
|
||||
// Issue 38352: Check for deadlock on canceled requests.
|
||||
func TestDumpRequestOutIssue38352(t *testing.T) {
|
||||
if testing.Short() {
|
||||
return
|
||||
|
@ -562,7 +562,7 @@ func (p *ReverseProxy) handleUpgradeResponse(rw http.ResponseWriter, req *http.R
|
||||
|
||||
backConnCloseCh := make(chan bool)
|
||||
go func() {
|
||||
// Ensure that the cancelation of a request closes the backend.
|
||||
// Ensure that the cancellation of a request closes the backend.
|
||||
// See issue https://golang.org/issue/35559.
|
||||
select {
|
||||
case <-req.Context().Done():
|
||||
|
@ -287,7 +287,7 @@ func (name handler) serveDeltaProfile(w http.ResponseWriter, r *http.Request, p
|
||||
err := r.Context().Err()
|
||||
if err == context.DeadlineExceeded {
|
||||
serveError(w, http.StatusRequestTimeout, err.Error())
|
||||
} else { // TODO: what's a good status code for cancelled requests? 400?
|
||||
} else { // TODO: what's a good status code for canceled requests? 400?
|
||||
serveError(w, http.StatusInternalServerError, err.Error())
|
||||
}
|
||||
return
|
||||
|
@ -1187,7 +1187,7 @@ type wantConn struct {
|
||||
|
||||
// hooks for testing to know when dials are done
|
||||
// beforeDial is called in the getConn goroutine when the dial is queued.
|
||||
// afterDial is called when the dial is completed or cancelled.
|
||||
// afterDial is called when the dial is completed or canceled.
|
||||
beforeDial func()
|
||||
afterDial func()
|
||||
|
||||
@ -1375,7 +1375,7 @@ func (t *Transport) getConn(treq *transportRequest, cm connectMethod) (pc *persi
|
||||
trace.GotConn(httptrace.GotConnInfo{Conn: w.pc.conn, Reused: w.pc.isReused()})
|
||||
}
|
||||
if w.err != nil {
|
||||
// If the request has been cancelled, that's probably
|
||||
// If the request has been canceled, that's probably
|
||||
// what caused w.err; if so, prefer to return the
|
||||
// cancellation error (see golang.org/issue/16049).
|
||||
select {
|
||||
@ -1437,7 +1437,7 @@ func (t *Transport) queueForDial(w *wantConn) {
|
||||
|
||||
// dialConnFor dials on behalf of w and delivers the result to w.
|
||||
// dialConnFor has received permission to dial w.cm and is counted in t.connCount[w.cm.key()].
|
||||
// If the dial is cancelled or unsuccessful, dialConnFor decrements t.connCount[w.cm.key()].
|
||||
// If the dial is canceled or unsuccessful, dialConnFor decrements t.connCount[w.cm.key()].
|
||||
func (t *Transport) dialConnFor(w *wantConn) {
|
||||
defer w.afterDial()
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user