diff --git a/docs/resources/s3_bucket_replication.md b/docs/resources/s3_bucket_replication.md
index 8c766277..5bf5c95b 100644
--- a/docs/resources/s3_bucket_replication.md
+++ b/docs/resources/s3_bucket_replication.md
@@ -3,13 +3,10 @@
page_title: "minio_s3_bucket_replication Resource - terraform-provider-minio"
subcategory: ""
description: |-
-
---
# minio_s3_bucket_replication (Resource)
-
-
## Example Usage
```terraform
@@ -100,7 +97,7 @@ resource "minio_iam_user" "replication_in_b" {
provider = minio.deployment_b
name = "my-user"
force_destroy = true
-}
+}
resource "minio_iam_user_policy_attachment" "replication_in_b" {
provider = minio.deployment_b
@@ -130,7 +127,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" {
bucket = minio_s3_bucket.my_bucket_in_b.bucket
secure = false
host = var.minio_server_b
- bandwidth_limt = "100M"
+ bandwidth_limit = "100M"
access_key = minio_iam_service_account.replication_in_b.access_key
secret_key = minio_iam_service_account.replication_in_b.secret_key
}
@@ -151,7 +148,7 @@ resource "minio_iam_policy" "replication_in_a" {
resource "minio_iam_user" "replication_in_a" {
name = "my-user"
force_destroy = true
-}
+}
resource "minio_iam_user_policy_attachment" "replication_in_a" {
user_name = minio_iam_user.replication_in_a.name
@@ -180,7 +177,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" {
bucket = minio_s3_bucket.my_bucket_in_a.bucket
host = var.minio_server_a
secure = false
- bandwidth_limt = "100M"
+ bandwidth_limit = "100M"
access_key = minio_iam_service_account.replication_in_a.access_key
secret_key = minio_iam_service_account.replication_in_a.secret_key
}
@@ -194,6 +191,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" {
```
+
## Schema
### Required
@@ -209,6 +207,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" {
- `id` (String) The ID of this resource.
+
### Nested Schema for `rule`
Required:
@@ -221,17 +220,18 @@ Optional:
- `delete_replication` (Boolean) Whether or not to propagate deletion
- `enabled` (Boolean) Whether or not this rule is enabled
- `existing_object_replication` (Boolean) Whether or not to synchronise object created prior the replication configuration
-- `metadata_sync` (Boolean) Whether or not to synchonise buckets and objects metadata (such as locks). This must be enabled to achieve a two-way replication
-- `prefix` (String) Bucket prefix object must be in to be syncronised
+- `metadata_sync` (Boolean) Whether or not to synchronise buckets and objects metadata (such as locks). This must be enabled to achieve a two-way replication
+- `prefix` (String) Bucket prefix object must be in to be synchronised
- `priority` (Number) Rule priority. If omitted, the inverted index will be used as priority. This means that the first rule definition will have the higher priority
-- `tags` (Map of String) Tags which objects must have to be syncronised
+- `tags` (Map of String) Tags which objects must have to be synchronised
Read-Only:
-- `arn` (String) Rule ARN genrated by MinIO
+- `arn` (String) Rule ARN generated by MinIO
- `id` (String) Rule ID generated by MinIO
+
### Nested Schema for `rule.target`
Required:
@@ -242,13 +242,13 @@ Required:
Optional:
-- `bandwidth_limt` (String) Maximum bandwidth in byte per second that MinIO can used when syncronysing this target. Minimum is 100MB
+- `bandwidth_limit` (String) Maximum bandwidth in byte per second that MinIO can used when synchronising this target. Minimum is 100MB
- `disable_proxy` (Boolean) Disable proxy for this target
- `health_check_period` (String) Period where the health of this target will be checked. This must be a valid duration, such as `5s` or `2m`
-- `path` (String) Path of the Minio endpoint. This is usefull if MinIO API isn't served on at the root, e.g for `example.com/minio/`, the path would be `/minio/`
-- `path_style` (String) Whether to use path-style or virtual-hosted-syle request to this target (https://docs.aws.amazon.com/AmazonS3/latest/userguide/VirtualHosting.html#path-style-access). `auto` allows MinIO to chose automatically the appropriate option (Recommened)`
+- `path` (String) Path of the Minio endpoint. This is useful if MinIO API isn't served on at the root, e.g for `example.com/minio/`, the path would be `/minio/`
+- `path_style` (String) Whether to use path-style or virtual-hosted-style request to this target (https://docs.aws.amazon.com/AmazonS3/latest/userguide/VirtualHosting.html#path-style-access). `auto` allows MinIO to chose automatically the appropriate option (Recommend)`
- `region` (String) Region of the target MinIO. This will be used to generate the target ARN
- `secret_key` (String, Sensitive) Secret key for the replication service account in the target MinIO. This is optional so it can be imported but prevent secret update
- `secure` (Boolean) Whether to use HTTPS with this target (Recommended). Note that disabling HTTPS will yield Terraform warning for security reason`
- `storage_class` (String) The storage class to use for the object on this target
-- `syncronous` (Boolean) Use synchronous replication.
+- `synchronous` (Boolean) Use synchronous replication.
diff --git a/examples/resources/minio_s3_bucket_replication/resource.tf b/examples/resources/minio_s3_bucket_replication/resource.tf
index 966c4206..04e4ea4c 100644
--- a/examples/resources/minio_s3_bucket_replication/resource.tf
+++ b/examples/resources/minio_s3_bucket_replication/resource.tf
@@ -115,7 +115,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" {
bucket = minio_s3_bucket.my_bucket_in_b.bucket
secure = false
host = var.minio_server_b
- bandwidth_limt = "100M"
+ bandwidth_limit = "100M"
access_key = minio_iam_service_account.replication_in_b.access_key
secret_key = minio_iam_service_account.replication_in_b.secret_key
}
@@ -165,7 +165,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" {
bucket = minio_s3_bucket.my_bucket_in_a.bucket
host = var.minio_server_a
secure = false
- bandwidth_limt = "100M"
+ bandwidth_limit = "100M"
access_key = minio_iam_service_account.replication_in_a.access_key
secret_key = minio_iam_service_account.replication_in_a.secret_key
}
diff --git a/minio/resource_minio_s3_bucket_replication.go b/minio/resource_minio_s3_bucket_replication.go
index c7e0457a..786dcc86 100644
--- a/minio/resource_minio_s3_bucket_replication.go
+++ b/minio/resource_minio_s3_bucket_replication.go
@@ -152,7 +152,7 @@ func resourceMinioBucketReplication() *schema.Resource {
Description: "Path of the Minio endpoint. This is usefull if MinIO API isn't served on at the root, e.g for `example.com/minio/`, the path would be `/minio/`",
Optional: true,
},
- "syncronous": {
+ "synchronous": {
Type: schema.TypeBool,
Description: "Use synchronous replication.",
Optional: true,
@@ -175,7 +175,7 @@ func resourceMinioBucketReplication() *schema.Resource {
},
ValidateFunc: validation.StringMatch(regexp.MustCompile(`^[0-9]+\s?[s|m|h]$`), "must be a valid golang duration"),
},
- "bandwidth_limt": {
+ "bandwidth_limit": {
Type: schema.TypeString,
Description: "Maximum bandwidth in byte per second that MinIO can used when syncronysing this target. Minimum is 100MB",
Optional: true,
@@ -189,7 +189,7 @@ func resourceMinioBucketReplication() *schema.Resource {
if !ok {
diags = append(diags, diag.Diagnostic{
Severity: diag.Error,
- Summary: "expected type of bandwidth_limt to be string",
+ Summary: "expected type of bandwidth_limit to be string",
})
return
}
@@ -202,14 +202,14 @@ func resourceMinioBucketReplication() *schema.Resource {
if err != nil {
diags = append(diags, diag.Diagnostic{
Severity: diag.Error,
- Summary: "bandwidth_limt must be a positive value. It may use suffixes (k, m, g, ..) ",
+ Summary: "bandwidth_limit must be a positive value. It may use suffixes (k, m, g, ..) ",
})
return
}
if val < uint64(100*humanize.BigMByte.Int64()) {
diags = append(diags, diag.Diagnostic{
Severity: diag.Error,
- Summary: "When set, bandwidth_limt must be at least 100MBps",
+ Summary: "When set, bandwidth_limit must be at least 100MBps",
})
}
@@ -405,10 +405,10 @@ func minioReadBucketReplication(ctx context.Context, d *schema.ResourceData, met
target["secure"] = remoteTarget.Secure
target["path_style"] = remoteTarget.Path
target["path"] = strings.Join(pathComponent[:len(pathComponent)-1], "/")
- target["syncronous"] = remoteTarget.ReplicationSync
+ target["synchronous"] = remoteTarget.ReplicationSync
target["disable_proxy"] = remoteTarget.DisableProxy
target["health_check_period"] = shortDur(remoteTarget.HealthCheckDuration)
- target["bandwidth_limt"] = humanize.Bytes(uint64(remoteTarget.BandwidthLimit))
+ target["bandwidth_limit"] = humanize.Bytes(uint64(remoteTarget.BandwidthLimit))
target["region"] = remoteTarget.Region
target["access_key"] = remoteTarget.Credentials.AccessKey
@@ -516,7 +516,7 @@ func convertBucketReplicationConfig(bucketReplicationConfig *S3MinioBucketReplic
Type: madmin.ReplicationService,
Region: rule.Target.Region,
BandwidthLimit: rule.Target.BandwidthLimit,
- ReplicationSync: rule.Target.Syncronous,
+ ReplicationSync: rule.Target.Synchronous,
DisableProxy: rule.Target.DisableProxy,
HealthCheckDuration: rule.Target.HealthCheckPeriod,
}
@@ -730,19 +730,19 @@ func getBucketReplicationConfig(v []interface{}) (result []S3MinioBucketReplicat
})
}
- result[i].Target.Syncronous, ok = target["syncronous"].(bool)
- result[i].Target.Syncronous = result[i].Target.Syncronous && ok
+ result[i].Target.Synchronous, ok = target["synchronous"].(bool)
+ result[i].Target.Synchronous = result[i].Target.Synchronous && ok
result[i].Target.DisableProxy, ok = target["disable_proxy"].(bool)
result[i].Target.DisableProxy = result[i].Target.DisableProxy && ok
var bandwidthStr string
var bandwidth uint64
var err error
- if bandwidthStr, ok = target["bandwidth_limt"].(string); ok {
+ if bandwidthStr, ok = target["bandwidth_limit"].(string); ok {
bandwidth, err = humanize.ParseBytes(bandwidthStr)
if err != nil {
log.Printf("[WARN] invalid bandwidth value %q: %v", result[i].Target.BandwidthLimit, err)
- errs = append(errs, diag.Errorf("rule[%d].target.bandwidth_limt is invalid. Make sure to use k, m, g as preffix only", i)...)
+ errs = append(errs, diag.Errorf("rule[%d].target.bandwidth_limit is invalid. Make sure to use k, m, g as preffix only", i)...)
} else {
result[i].Target.BandwidthLimit = int64(bandwidth)
}
@@ -761,9 +761,9 @@ func getBucketReplicationConfig(v []interface{}) (result []S3MinioBucketReplicat
pathstyle, _ = target["path_style"].(string)
switch strings.TrimSpace(strings.ToLower(pathstyle)) {
case "on":
- result[i].Target.PathStyle = S3PathSyleOn
+ result[i].Target.PathStyle = S3PathStyleOn
case "off":
- result[i].Target.PathStyle = S3PathSyleOff
+ result[i].Target.PathStyle = S3PathStyleOff
default:
if pathstyle != "auto" && pathstyle != "" {
errs = append(errs, diag.Diagnostic{
@@ -771,7 +771,7 @@ func getBucketReplicationConfig(v []interface{}) (result []S3MinioBucketReplicat
Summary: fmt.Sprintf("rule[%d].target.path_style must be \"on\", \"off\" or \"auto\". Defaulting to \"auto\"", i),
})
}
- result[i].Target.PathStyle = S3PathSyleAuto
+ result[i].Target.PathStyle = S3PathStyleAuto
}
}
diff --git a/minio/resource_minio_s3_bucket_replication_test.go b/minio/resource_minio_s3_bucket_replication_test.go
index 7de618d5..e233d7f6 100644
--- a/minio/resource_minio_s3_bucket_replication_test.go
+++ b/minio/resource_minio_s3_bucket_replication_test.go
@@ -77,7 +77,7 @@ resource "minio_s3_bucket_replication" "replication_in_all" {
host = local.fourth_minio_host
region = "us-west-2"
secure = false
- bandwidth_limt = "1G"
+ bandwidth_limit = "1G"
access_key = minio_iam_service_account.replication_in_d.access_key
secret_key = minio_iam_service_account.replication_in_d.secret_key
}
@@ -94,23 +94,23 @@ resource "minio_s3_bucket_replication" "replication_in_all" {
// (
//
// resourceName,
-// minioIdentidier,
+// minioIdentifier,
// minioProvider,
-// ruleOneMinioIdentidier,
+// ruleOneMinioIdentifier,
// ruleOneMinioHost,
// ruleOneMinioRegion,
-// ruleOneMinioIdentidier,
-// ruleOneMinioIdentidier,
-// ruleTwoMinioIdentidier,
+// ruleOneMinioIdentifier,
+// ruleOneMinioIdentifier,
+// ruleTwoMinioIdentifier,
// ruleTwoMinioHost,
// ruleTwoMinioRegion,
-// ruleTwoMinioIdentidier,
-// ruleTwoMinioIdentidier,
-// ruleThreeMinioIdentidier,
+// ruleTwoMinioIdentifier,
+// ruleTwoMinioIdentifier,
+// ruleThreeMinioIdentifier,
// ruleThreeMinioHost,
// ruleThreeMinioRegion,
-// ruleThreeMinioIdentidier,
-// ruleThreeMinioIdentidier,
+// ruleThreeMinioIdentifier,
+// ruleThreeMinioIdentifier,
//
// )
const kTemplateComplexResource = `
@@ -174,7 +174,7 @@ resource "minio_s3_bucket_replication" "%s" {
secure = false
access_key = minio_iam_service_account.replication_in_%s.access_key
secret_key = minio_iam_service_account.replication_in_%s.secret_key
- bandwidth_limt = "1G"
+ bandwidth_limit = "1G"
}
}
@@ -301,7 +301,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" {
bucket = minio_s3_bucket.my_bucket_in_b.bucket
host = local.second_minio_host
secure = false
- bandwidth_limt = "100M"
+ bandwidth_limit = "100M"
access_key = minio_iam_service_account.replication_in_b.access_key
secret_key = minio_iam_service_account.replication_in_b.secret_key
}
@@ -330,8 +330,8 @@ resource "minio_s3_bucket_replication" "replication_in_b" {
host = local.second_minio_host
secure = false
region = "eu-west-1"
- syncronous = true
- bandwidth_limt = "100M"
+ synchronous = true
+ bandwidth_limit = "100M"
access_key = minio_iam_service_account.replication_in_b.access_key
secret_key = minio_iam_service_account.replication_in_b.secret_key
}
@@ -360,7 +360,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" {
host = local.primary_minio_host
region = "eu-north-1"
secure = false
- bandwidth_limt = "800M"
+ bandwidth_limit = "800M"
health_check_period = "2m"
access_key = minio_iam_service_account.replication_in_a.access_key
secret_key = minio_iam_service_account.replication_in_a.secret_key
@@ -416,9 +416,9 @@ func TestAccS3BucketReplication_oneway_simple(t *testing.T) {
Host: secondaryMinioEndpoint,
Path: "/",
Region: "",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 100000000,
},
@@ -433,7 +433,7 @@ func TestAccS3BucketReplication_oneway_simple(t *testing.T) {
ImportStateVerify: true,
ImportStateVerifyIgnore: []string{
"rule.0.target.0.secret_key",
- "rule.0.priority", // This is ommited in our test case, so it gets automatically generated and thus mismatch
+ "rule.0.priority", // This is omitted in our test case, so it gets automatically generated and thus mismatch
},
Config: kOneWaySimpleResource,
},
@@ -484,9 +484,9 @@ func TestAccS3BucketReplication_oneway_simple_update(t *testing.T) {
Host: secondaryMinioEndpoint,
Path: "/",
Region: "",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 100000000,
},
@@ -515,7 +515,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" {
bucket = minio_s3_bucket.my_bucket_in_b.bucket
host = local.second_minio_host
secure = false
- bandwidth_limt = "150M"
+ bandwidth_limit = "150M"
health_check_period = "5m"
access_key = minio_iam_service_account.replication_in_b.access_key
secret_key = minio_iam_service_account.replication_in_b.secret_key
@@ -549,9 +549,9 @@ resource "minio_s3_bucket_replication" "replication_in_b" {
Host: secondaryMinioEndpoint,
Path: "/",
Region: "",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Minute * 5,
BandwidthLimit: 150000000,
},
@@ -582,7 +582,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" {
bucket = minio_s3_bucket.my_bucket_in_b.bucket
host = local.second_minio_host
secure = false
- bandwidth_limt = "150M"
+ bandwidth_limit = "150M"
health_check_period = "5m"
access_key = minio_iam_service_account.replication_in_b.access_key
secret_key = minio_iam_service_account.replication_in_b.secret_key
@@ -616,9 +616,9 @@ resource "minio_s3_bucket_replication" "replication_in_b" {
Host: secondaryMinioEndpoint,
Path: "/",
Region: "",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Minute * 5,
BandwidthLimit: 150000000,
},
@@ -656,9 +656,9 @@ resource "minio_s3_bucket_replication" "replication_in_b" {
Host: secondaryMinioEndpoint,
Path: "/",
Region: "",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 100000000,
},
@@ -729,9 +729,9 @@ func TestAccS3BucketReplication_oneway_complex(t *testing.T) {
Host: secondaryMinioEndpoint,
Path: "/",
Region: "eu-west-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 0,
},
@@ -754,9 +754,9 @@ func TestAccS3BucketReplication_oneway_complex(t *testing.T) {
Host: thirdMinioEndpoint,
Path: "/",
Region: "ap-south-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 60,
BandwidthLimit: 0,
},
@@ -781,9 +781,9 @@ func TestAccS3BucketReplication_oneway_complex(t *testing.T) {
Host: fourthMinioEndpoint,
Path: "/",
Region: "us-west-2",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 1 * humanize.BigGByte.Int64(),
},
@@ -849,9 +849,9 @@ func TestAccS3BucketReplication_twoway_simple(t *testing.T) {
StorageClass: "",
Host: secondaryMinioEndpoint,
Region: "eu-west-1",
- Syncronous: true,
+ Synchronous: true,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 100000000,
},
@@ -878,9 +878,9 @@ func TestAccS3BucketReplication_twoway_simple(t *testing.T) {
StorageClass: "",
Host: primaryMinioEndpoint,
Region: "eu-north-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 120,
BandwidthLimit: 800000000,
},
@@ -959,9 +959,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: secondaryMinioEndpoint,
Path: "/",
Region: "eu-west-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 0,
},
@@ -984,9 +984,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: thirdMinioEndpoint,
Path: "/",
Region: "ap-south-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 60,
BandwidthLimit: 0,
},
@@ -1011,9 +1011,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: fourthMinioEndpoint,
Path: "/",
Region: "us-west-2",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 1 * humanize.BigGByte.Int64(),
},
@@ -1041,9 +1041,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: thirdMinioEndpoint,
Path: "/",
Region: "ap-south-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 0,
},
@@ -1066,9 +1066,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: fourthMinioEndpoint,
Path: "/",
Region: "us-west-2",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 60,
BandwidthLimit: 0,
},
@@ -1093,9 +1093,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: primaryMinioEndpoint,
Path: "/",
Region: "eu-central-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 1 * humanize.BigGByte.Int64(),
},
@@ -1123,9 +1123,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: fourthMinioEndpoint,
Path: "/",
Region: "us-west-2",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 0,
},
@@ -1148,9 +1148,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: primaryMinioEndpoint,
Path: "/",
Region: "eu-central-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 60,
BandwidthLimit: 0,
},
@@ -1175,9 +1175,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: secondaryMinioEndpoint,
Path: "/",
Region: "eu-west-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 1 * humanize.BigGByte.Int64(),
},
@@ -1205,9 +1205,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: primaryMinioEndpoint,
Path: "/",
Region: "eu-central-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 0,
},
@@ -1230,9 +1230,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: secondaryMinioEndpoint,
Path: "/",
Region: "eu-west-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 60,
BandwidthLimit: 0,
},
@@ -1257,9 +1257,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) {
Host: thirdMinioEndpoint,
Path: "/",
Region: "ap-south-1",
- Syncronous: false,
+ Synchronous: false,
Secure: false,
- PathStyle: S3PathSyleAuto,
+ PathStyle: S3PathStyleAuto,
HealthCheckPeriod: time.Second * 30,
BandwidthLimit: 1 * humanize.BigGByte.Int64(),
},
@@ -1635,8 +1635,8 @@ func testAccCheckBucketHasReplication(n string, config []S3MinioBucketReplicatio
if existingTarget.TargetBucket != bucket {
return fmt.Errorf("Mismatch TargetBucket %q, rule#%d:\n\nexpected: %v\n\ngot: %v", n, i, existingTarget.TargetBucket, bucket)
}
- if existingTarget.ReplicationSync != rule.Target.Syncronous {
- return fmt.Errorf("Mismatch synchronous mode %q, rule#%d:\n\nexpected: %v\n\ngot: %v", n, i, existingTarget.ReplicationSync, rule.Target.Syncronous)
+ if existingTarget.ReplicationSync != rule.Target.Synchronous {
+ return fmt.Errorf("Mismatch synchronous mode %q, rule#%d:\n\nexpected: %v\n\ngot: %v", n, i, existingTarget.ReplicationSync, rule.Target.Synchronous)
}
if existingTarget.Region != rule.Target.Region {
return fmt.Errorf("Mismatch region %q, rule#%d:\n\nexpected: %v\n\ngot: %v", n, i, existingTarget.Region, rule.Target.Region)