YARN-5963. Spelling errors in logging and exceptions for node manager, client, web-proxy, common, and app history code (gsohn via rkanter)

(cherry picked from commit 72fe546841)

Conflicts:
	hadoop-yarn-project/hadoop-yarn/hadoop-yarn-common/src/main/java/org/apache/hadoop/yarn/client/api/impl/TimelineClientImpl.java
This commit is contained in:
Robert Kanter 2016-12-07 15:07:25 -08:00
parent 0aaaeea268
commit 9cba7c6d71
12 changed files with 14 additions and 14 deletions

View File

@ -240,7 +240,7 @@ private int runCommand(String[] args) throws Exception {
if (appState == YarnApplicationState.NEW
|| appState == YarnApplicationState.NEW_SAVING
|| appState == YarnApplicationState.SUBMITTED) {
System.err.println("Logs are not avaiable right now.");
System.err.println("Logs are not available right now.");
return -1;
}
} catch (IOException | YarnException e) {

View File

@ -379,7 +379,7 @@ private int refreshNodes(int timeout, String trackingMode)
}
if (nodesDecommissioning) {
System.out.println("Graceful decommissioning not completed in " + timeout
+ " seconds, issueing forceful decommissioning command.");
+ " seconds, issuing forceful decommissioning command.");
RefreshNodesRequest forcefulRequest = RefreshNodesRequest
.newInstance(DecommissionType.FORCEFUL);
adminProtocol.refreshNodes(forcefulRequest);

View File

@ -259,7 +259,7 @@ private Path copy(Path sCopy, Path dstdir) throws IOException {
if (resource.getVisibility() == LocalResourceVisibility.PUBLIC) {
if (!isPublic(sourceFs, sCopy, sStat, statCache)) {
throw new IOException("Resource " + sCopy +
" is not publicly accessable and as such cannot be part of the" +
" is not publicly accessible and as such cannot be part of the" +
" public cache.");
}
}

View File

@ -356,7 +356,7 @@ public boolean isSecureRegistry() {
* @return the system principals
*/
public List<ACL> getSystemACLs() {
Preconditions.checkNotNull(systemACLs, "registry security is unitialized");
Preconditions.checkNotNull(systemACLs, "registry security is uninitialized");
return Collections.unmodifiableList(systemACLs);
}

View File

@ -721,7 +721,7 @@ private void checkAccess(ApplicationReportExt app)
app.appReport.getApplicationId())) {
throw new AuthorizationException("User "
+ UserGroupInformation.getCurrentUser().getShortUserName()
+ " does not have privilage to see this application "
+ " does not have privilege to see this application "
+ app.appReport.getApplicationId());
}
} finally {

View File

@ -509,7 +509,7 @@ public void run() {
output.append(buf, 0, nRead);
}
} catch (Throwable t) {
LOG.error("Error occured reading the process stdout", t);
LOG.error("Error occurred reading the process stdout", t);
}
}
};
@ -722,7 +722,7 @@ public void startLocalizer(LocalizerStartContext ctx) throws IOException,
}
catch(Throwable e) {
LOG.warn(String.format(
"An exception occured during the cleanup of localizer job %s:%n%s",
"An exception occurred during the cleanup of localizer job %s:%n%s",
localizerPid,
org.apache.hadoop.util.StringUtils.stringifyException(e)));
}

View File

@ -146,7 +146,7 @@ public void serviceInit(Configuration conf) throws Exception {
}
// TODO better use s.getName()?
if(!sName.equals(s.getName())) {
LOG.warn("The Auxilurary Service named '"+sName+"' in the "
LOG.warn("The Auxiliary Service named '"+sName+"' in the "
+"configuration is for "+s.getClass()+" which has "
+"a name of '"+s.getName()+"'. Because these are "
+"not the same tools trying to send ServiceData and read "
@ -283,4 +283,4 @@ private void logWarningWhenAuxServiceThrowExceptions(AuxiliaryService service,
: "The auxService name is " + service.getName())
+ " and it got an error at event: " + eventType, th);
}
}
}

View File

@ -1576,7 +1576,7 @@ private Container preReInitializeOrLocalizeCheck(ContainerId containerId,
authorizeUser(remoteUgi, nmTokenIdentifier);
if (!nmTokenIdentifier.getApplicationAttemptId().getApplicationId()
.equals(containerId.getApplicationAttemptId().getApplicationId())) {
throw new YarnException("ApplicationMaster not autorized to perform " +
throw new YarnException("ApplicationMaster not authorized to perform " +
"["+ op + "] on Container [" + containerId + "]!!");
}
Container container = context.getContainers().get(containerId);

View File

@ -1128,7 +1128,7 @@ LocalizerHeartbeatResponse processHeartbeat(
LOG.error("local path for PRIVATE localization could not be " +
"found. Disks might have failed.", e);
} catch (IllegalArgumentException e) {
LOG.error("Inorrect path for PRIVATE localization."
LOG.error("Incorrect path for PRIVATE localization."
+ next.getResource().getFile(), e);
} catch (URISyntaxException e) {
LOG.error(

View File

@ -494,7 +494,7 @@ public void run() {
doAppLogAggregation();
} catch (Exception e) {
// do post clean up of log directories on any exception
LOG.error("Error occured while aggregating the log for the application "
LOG.error("Error occurred while aggregating the log for the application "
+ appId, e);
doAppLogAggregationPostCleanUp();
} finally {

View File

@ -49,7 +49,7 @@ public class ProxyUriUtils {
private static String uriEncode(Object o) {
try {
assert (o != null) : "o canot be null";
assert (o != null) : "o cannot be null";
return URLEncoder.encode(o.toString(), "UTF-8");
} catch (UnsupportedEncodingException e) {
//This should never happen

View File

@ -62,7 +62,7 @@ protected void serviceInit(Configuration conf) throws Exception {
} else if ("kerberos".equals(auth)) {
isSecurityEnabled = true;
} else {
LOG.warn("Unrecongized attribute value for " +
LOG.warn("Unrecognized attribute value for " +
CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION +
" of " + auth);
}