diff --git a/docs/resources/s3_bucket_replication.md b/docs/resources/s3_bucket_replication.md index 8c766277..5bf5c95b 100644 --- a/docs/resources/s3_bucket_replication.md +++ b/docs/resources/s3_bucket_replication.md @@ -3,13 +3,10 @@ page_title: "minio_s3_bucket_replication Resource - terraform-provider-minio" subcategory: "" description: |- - --- # minio_s3_bucket_replication (Resource) - - ## Example Usage ```terraform @@ -100,7 +97,7 @@ resource "minio_iam_user" "replication_in_b" { provider = minio.deployment_b name = "my-user" force_destroy = true -} +} resource "minio_iam_user_policy_attachment" "replication_in_b" { provider = minio.deployment_b @@ -130,7 +127,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" { bucket = minio_s3_bucket.my_bucket_in_b.bucket secure = false host = var.minio_server_b - bandwidth_limt = "100M" + bandwidth_limit = "100M" access_key = minio_iam_service_account.replication_in_b.access_key secret_key = minio_iam_service_account.replication_in_b.secret_key } @@ -151,7 +148,7 @@ resource "minio_iam_policy" "replication_in_a" { resource "minio_iam_user" "replication_in_a" { name = "my-user" force_destroy = true -} +} resource "minio_iam_user_policy_attachment" "replication_in_a" { user_name = minio_iam_user.replication_in_a.name @@ -180,7 +177,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" { bucket = minio_s3_bucket.my_bucket_in_a.bucket host = var.minio_server_a secure = false - bandwidth_limt = "100M" + bandwidth_limit = "100M" access_key = minio_iam_service_account.replication_in_a.access_key secret_key = minio_iam_service_account.replication_in_a.secret_key } @@ -194,6 +191,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" { ``` + ## Schema ### Required @@ -209,6 +207,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" { - `id` (String) The ID of this resource. + ### Nested Schema for `rule` Required: @@ -221,17 +220,18 @@ Optional: - `delete_replication` (Boolean) Whether or not to propagate deletion - `enabled` (Boolean) Whether or not this rule is enabled - `existing_object_replication` (Boolean) Whether or not to synchronise object created prior the replication configuration -- `metadata_sync` (Boolean) Whether or not to synchonise buckets and objects metadata (such as locks). This must be enabled to achieve a two-way replication -- `prefix` (String) Bucket prefix object must be in to be syncronised +- `metadata_sync` (Boolean) Whether or not to synchronise buckets and objects metadata (such as locks). This must be enabled to achieve a two-way replication +- `prefix` (String) Bucket prefix object must be in to be synchronised - `priority` (Number) Rule priority. If omitted, the inverted index will be used as priority. This means that the first rule definition will have the higher priority -- `tags` (Map of String) Tags which objects must have to be syncronised +- `tags` (Map of String) Tags which objects must have to be synchronised Read-Only: -- `arn` (String) Rule ARN genrated by MinIO +- `arn` (String) Rule ARN generated by MinIO - `id` (String) Rule ID generated by MinIO + ### Nested Schema for `rule.target` Required: @@ -242,13 +242,13 @@ Required: Optional: -- `bandwidth_limt` (String) Maximum bandwidth in byte per second that MinIO can used when syncronysing this target. Minimum is 100MB +- `bandwidth_limit` (String) Maximum bandwidth in byte per second that MinIO can used when synchronising this target. Minimum is 100MB - `disable_proxy` (Boolean) Disable proxy for this target - `health_check_period` (String) Period where the health of this target will be checked. This must be a valid duration, such as `5s` or `2m` -- `path` (String) Path of the Minio endpoint. This is usefull if MinIO API isn't served on at the root, e.g for `example.com/minio/`, the path would be `/minio/` -- `path_style` (String) Whether to use path-style or virtual-hosted-syle request to this target (https://docs.aws.amazon.com/AmazonS3/latest/userguide/VirtualHosting.html#path-style-access). `auto` allows MinIO to chose automatically the appropriate option (Recommened)` +- `path` (String) Path of the Minio endpoint. This is useful if MinIO API isn't served on at the root, e.g for `example.com/minio/`, the path would be `/minio/` +- `path_style` (String) Whether to use path-style or virtual-hosted-style request to this target (https://docs.aws.amazon.com/AmazonS3/latest/userguide/VirtualHosting.html#path-style-access). `auto` allows MinIO to chose automatically the appropriate option (Recommend)` - `region` (String) Region of the target MinIO. This will be used to generate the target ARN - `secret_key` (String, Sensitive) Secret key for the replication service account in the target MinIO. This is optional so it can be imported but prevent secret update - `secure` (Boolean) Whether to use HTTPS with this target (Recommended). Note that disabling HTTPS will yield Terraform warning for security reason` - `storage_class` (String) The storage class to use for the object on this target -- `syncronous` (Boolean) Use synchronous replication. +- `synchronous` (Boolean) Use synchronous replication. diff --git a/examples/resources/minio_s3_bucket_replication/resource.tf b/examples/resources/minio_s3_bucket_replication/resource.tf index 966c4206..04e4ea4c 100644 --- a/examples/resources/minio_s3_bucket_replication/resource.tf +++ b/examples/resources/minio_s3_bucket_replication/resource.tf @@ -115,7 +115,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" { bucket = minio_s3_bucket.my_bucket_in_b.bucket secure = false host = var.minio_server_b - bandwidth_limt = "100M" + bandwidth_limit = "100M" access_key = minio_iam_service_account.replication_in_b.access_key secret_key = minio_iam_service_account.replication_in_b.secret_key } @@ -165,7 +165,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" { bucket = minio_s3_bucket.my_bucket_in_a.bucket host = var.minio_server_a secure = false - bandwidth_limt = "100M" + bandwidth_limit = "100M" access_key = minio_iam_service_account.replication_in_a.access_key secret_key = minio_iam_service_account.replication_in_a.secret_key } diff --git a/minio/resource_minio_s3_bucket_replication.go b/minio/resource_minio_s3_bucket_replication.go index c7e0457a..786dcc86 100644 --- a/minio/resource_minio_s3_bucket_replication.go +++ b/minio/resource_minio_s3_bucket_replication.go @@ -152,7 +152,7 @@ func resourceMinioBucketReplication() *schema.Resource { Description: "Path of the Minio endpoint. This is usefull if MinIO API isn't served on at the root, e.g for `example.com/minio/`, the path would be `/minio/`", Optional: true, }, - "syncronous": { + "synchronous": { Type: schema.TypeBool, Description: "Use synchronous replication.", Optional: true, @@ -175,7 +175,7 @@ func resourceMinioBucketReplication() *schema.Resource { }, ValidateFunc: validation.StringMatch(regexp.MustCompile(`^[0-9]+\s?[s|m|h]$`), "must be a valid golang duration"), }, - "bandwidth_limt": { + "bandwidth_limit": { Type: schema.TypeString, Description: "Maximum bandwidth in byte per second that MinIO can used when syncronysing this target. Minimum is 100MB", Optional: true, @@ -189,7 +189,7 @@ func resourceMinioBucketReplication() *schema.Resource { if !ok { diags = append(diags, diag.Diagnostic{ Severity: diag.Error, - Summary: "expected type of bandwidth_limt to be string", + Summary: "expected type of bandwidth_limit to be string", }) return } @@ -202,14 +202,14 @@ func resourceMinioBucketReplication() *schema.Resource { if err != nil { diags = append(diags, diag.Diagnostic{ Severity: diag.Error, - Summary: "bandwidth_limt must be a positive value. It may use suffixes (k, m, g, ..) ", + Summary: "bandwidth_limit must be a positive value. It may use suffixes (k, m, g, ..) ", }) return } if val < uint64(100*humanize.BigMByte.Int64()) { diags = append(diags, diag.Diagnostic{ Severity: diag.Error, - Summary: "When set, bandwidth_limt must be at least 100MBps", + Summary: "When set, bandwidth_limit must be at least 100MBps", }) } @@ -405,10 +405,10 @@ func minioReadBucketReplication(ctx context.Context, d *schema.ResourceData, met target["secure"] = remoteTarget.Secure target["path_style"] = remoteTarget.Path target["path"] = strings.Join(pathComponent[:len(pathComponent)-1], "/") - target["syncronous"] = remoteTarget.ReplicationSync + target["synchronous"] = remoteTarget.ReplicationSync target["disable_proxy"] = remoteTarget.DisableProxy target["health_check_period"] = shortDur(remoteTarget.HealthCheckDuration) - target["bandwidth_limt"] = humanize.Bytes(uint64(remoteTarget.BandwidthLimit)) + target["bandwidth_limit"] = humanize.Bytes(uint64(remoteTarget.BandwidthLimit)) target["region"] = remoteTarget.Region target["access_key"] = remoteTarget.Credentials.AccessKey @@ -516,7 +516,7 @@ func convertBucketReplicationConfig(bucketReplicationConfig *S3MinioBucketReplic Type: madmin.ReplicationService, Region: rule.Target.Region, BandwidthLimit: rule.Target.BandwidthLimit, - ReplicationSync: rule.Target.Syncronous, + ReplicationSync: rule.Target.Synchronous, DisableProxy: rule.Target.DisableProxy, HealthCheckDuration: rule.Target.HealthCheckPeriod, } @@ -730,19 +730,19 @@ func getBucketReplicationConfig(v []interface{}) (result []S3MinioBucketReplicat }) } - result[i].Target.Syncronous, ok = target["syncronous"].(bool) - result[i].Target.Syncronous = result[i].Target.Syncronous && ok + result[i].Target.Synchronous, ok = target["synchronous"].(bool) + result[i].Target.Synchronous = result[i].Target.Synchronous && ok result[i].Target.DisableProxy, ok = target["disable_proxy"].(bool) result[i].Target.DisableProxy = result[i].Target.DisableProxy && ok var bandwidthStr string var bandwidth uint64 var err error - if bandwidthStr, ok = target["bandwidth_limt"].(string); ok { + if bandwidthStr, ok = target["bandwidth_limit"].(string); ok { bandwidth, err = humanize.ParseBytes(bandwidthStr) if err != nil { log.Printf("[WARN] invalid bandwidth value %q: %v", result[i].Target.BandwidthLimit, err) - errs = append(errs, diag.Errorf("rule[%d].target.bandwidth_limt is invalid. Make sure to use k, m, g as preffix only", i)...) + errs = append(errs, diag.Errorf("rule[%d].target.bandwidth_limit is invalid. Make sure to use k, m, g as preffix only", i)...) } else { result[i].Target.BandwidthLimit = int64(bandwidth) } @@ -761,9 +761,9 @@ func getBucketReplicationConfig(v []interface{}) (result []S3MinioBucketReplicat pathstyle, _ = target["path_style"].(string) switch strings.TrimSpace(strings.ToLower(pathstyle)) { case "on": - result[i].Target.PathStyle = S3PathSyleOn + result[i].Target.PathStyle = S3PathStyleOn case "off": - result[i].Target.PathStyle = S3PathSyleOff + result[i].Target.PathStyle = S3PathStyleOff default: if pathstyle != "auto" && pathstyle != "" { errs = append(errs, diag.Diagnostic{ @@ -771,7 +771,7 @@ func getBucketReplicationConfig(v []interface{}) (result []S3MinioBucketReplicat Summary: fmt.Sprintf("rule[%d].target.path_style must be \"on\", \"off\" or \"auto\". Defaulting to \"auto\"", i), }) } - result[i].Target.PathStyle = S3PathSyleAuto + result[i].Target.PathStyle = S3PathStyleAuto } } diff --git a/minio/resource_minio_s3_bucket_replication_test.go b/minio/resource_minio_s3_bucket_replication_test.go index 7de618d5..e233d7f6 100644 --- a/minio/resource_minio_s3_bucket_replication_test.go +++ b/minio/resource_minio_s3_bucket_replication_test.go @@ -77,7 +77,7 @@ resource "minio_s3_bucket_replication" "replication_in_all" { host = local.fourth_minio_host region = "us-west-2" secure = false - bandwidth_limt = "1G" + bandwidth_limit = "1G" access_key = minio_iam_service_account.replication_in_d.access_key secret_key = minio_iam_service_account.replication_in_d.secret_key } @@ -94,23 +94,23 @@ resource "minio_s3_bucket_replication" "replication_in_all" { // ( // // resourceName, -// minioIdentidier, +// minioIdentifier, // minioProvider, -// ruleOneMinioIdentidier, +// ruleOneMinioIdentifier, // ruleOneMinioHost, // ruleOneMinioRegion, -// ruleOneMinioIdentidier, -// ruleOneMinioIdentidier, -// ruleTwoMinioIdentidier, +// ruleOneMinioIdentifier, +// ruleOneMinioIdentifier, +// ruleTwoMinioIdentifier, // ruleTwoMinioHost, // ruleTwoMinioRegion, -// ruleTwoMinioIdentidier, -// ruleTwoMinioIdentidier, -// ruleThreeMinioIdentidier, +// ruleTwoMinioIdentifier, +// ruleTwoMinioIdentifier, +// ruleThreeMinioIdentifier, // ruleThreeMinioHost, // ruleThreeMinioRegion, -// ruleThreeMinioIdentidier, -// ruleThreeMinioIdentidier, +// ruleThreeMinioIdentifier, +// ruleThreeMinioIdentifier, // // ) const kTemplateComplexResource = ` @@ -174,7 +174,7 @@ resource "minio_s3_bucket_replication" "%s" { secure = false access_key = minio_iam_service_account.replication_in_%s.access_key secret_key = minio_iam_service_account.replication_in_%s.secret_key - bandwidth_limt = "1G" + bandwidth_limit = "1G" } } @@ -301,7 +301,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" { bucket = minio_s3_bucket.my_bucket_in_b.bucket host = local.second_minio_host secure = false - bandwidth_limt = "100M" + bandwidth_limit = "100M" access_key = minio_iam_service_account.replication_in_b.access_key secret_key = minio_iam_service_account.replication_in_b.secret_key } @@ -330,8 +330,8 @@ resource "minio_s3_bucket_replication" "replication_in_b" { host = local.second_minio_host secure = false region = "eu-west-1" - syncronous = true - bandwidth_limt = "100M" + synchronous = true + bandwidth_limit = "100M" access_key = minio_iam_service_account.replication_in_b.access_key secret_key = minio_iam_service_account.replication_in_b.secret_key } @@ -360,7 +360,7 @@ resource "minio_s3_bucket_replication" "replication_in_a" { host = local.primary_minio_host region = "eu-north-1" secure = false - bandwidth_limt = "800M" + bandwidth_limit = "800M" health_check_period = "2m" access_key = minio_iam_service_account.replication_in_a.access_key secret_key = minio_iam_service_account.replication_in_a.secret_key @@ -416,9 +416,9 @@ func TestAccS3BucketReplication_oneway_simple(t *testing.T) { Host: secondaryMinioEndpoint, Path: "/", Region: "", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 100000000, }, @@ -433,7 +433,7 @@ func TestAccS3BucketReplication_oneway_simple(t *testing.T) { ImportStateVerify: true, ImportStateVerifyIgnore: []string{ "rule.0.target.0.secret_key", - "rule.0.priority", // This is ommited in our test case, so it gets automatically generated and thus mismatch + "rule.0.priority", // This is omitted in our test case, so it gets automatically generated and thus mismatch }, Config: kOneWaySimpleResource, }, @@ -484,9 +484,9 @@ func TestAccS3BucketReplication_oneway_simple_update(t *testing.T) { Host: secondaryMinioEndpoint, Path: "/", Region: "", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 100000000, }, @@ -515,7 +515,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" { bucket = minio_s3_bucket.my_bucket_in_b.bucket host = local.second_minio_host secure = false - bandwidth_limt = "150M" + bandwidth_limit = "150M" health_check_period = "5m" access_key = minio_iam_service_account.replication_in_b.access_key secret_key = minio_iam_service_account.replication_in_b.secret_key @@ -549,9 +549,9 @@ resource "minio_s3_bucket_replication" "replication_in_b" { Host: secondaryMinioEndpoint, Path: "/", Region: "", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Minute * 5, BandwidthLimit: 150000000, }, @@ -582,7 +582,7 @@ resource "minio_s3_bucket_replication" "replication_in_b" { bucket = minio_s3_bucket.my_bucket_in_b.bucket host = local.second_minio_host secure = false - bandwidth_limt = "150M" + bandwidth_limit = "150M" health_check_period = "5m" access_key = minio_iam_service_account.replication_in_b.access_key secret_key = minio_iam_service_account.replication_in_b.secret_key @@ -616,9 +616,9 @@ resource "minio_s3_bucket_replication" "replication_in_b" { Host: secondaryMinioEndpoint, Path: "/", Region: "", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Minute * 5, BandwidthLimit: 150000000, }, @@ -656,9 +656,9 @@ resource "minio_s3_bucket_replication" "replication_in_b" { Host: secondaryMinioEndpoint, Path: "/", Region: "", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 100000000, }, @@ -729,9 +729,9 @@ func TestAccS3BucketReplication_oneway_complex(t *testing.T) { Host: secondaryMinioEndpoint, Path: "/", Region: "eu-west-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 0, }, @@ -754,9 +754,9 @@ func TestAccS3BucketReplication_oneway_complex(t *testing.T) { Host: thirdMinioEndpoint, Path: "/", Region: "ap-south-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 60, BandwidthLimit: 0, }, @@ -781,9 +781,9 @@ func TestAccS3BucketReplication_oneway_complex(t *testing.T) { Host: fourthMinioEndpoint, Path: "/", Region: "us-west-2", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 1 * humanize.BigGByte.Int64(), }, @@ -849,9 +849,9 @@ func TestAccS3BucketReplication_twoway_simple(t *testing.T) { StorageClass: "", Host: secondaryMinioEndpoint, Region: "eu-west-1", - Syncronous: true, + Synchronous: true, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 100000000, }, @@ -878,9 +878,9 @@ func TestAccS3BucketReplication_twoway_simple(t *testing.T) { StorageClass: "", Host: primaryMinioEndpoint, Region: "eu-north-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 120, BandwidthLimit: 800000000, }, @@ -959,9 +959,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: secondaryMinioEndpoint, Path: "/", Region: "eu-west-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 0, }, @@ -984,9 +984,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: thirdMinioEndpoint, Path: "/", Region: "ap-south-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 60, BandwidthLimit: 0, }, @@ -1011,9 +1011,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: fourthMinioEndpoint, Path: "/", Region: "us-west-2", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 1 * humanize.BigGByte.Int64(), }, @@ -1041,9 +1041,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: thirdMinioEndpoint, Path: "/", Region: "ap-south-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 0, }, @@ -1066,9 +1066,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: fourthMinioEndpoint, Path: "/", Region: "us-west-2", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 60, BandwidthLimit: 0, }, @@ -1093,9 +1093,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: primaryMinioEndpoint, Path: "/", Region: "eu-central-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 1 * humanize.BigGByte.Int64(), }, @@ -1123,9 +1123,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: fourthMinioEndpoint, Path: "/", Region: "us-west-2", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 0, }, @@ -1148,9 +1148,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: primaryMinioEndpoint, Path: "/", Region: "eu-central-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 60, BandwidthLimit: 0, }, @@ -1175,9 +1175,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: secondaryMinioEndpoint, Path: "/", Region: "eu-west-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 1 * humanize.BigGByte.Int64(), }, @@ -1205,9 +1205,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: primaryMinioEndpoint, Path: "/", Region: "eu-central-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 0, }, @@ -1230,9 +1230,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: secondaryMinioEndpoint, Path: "/", Region: "eu-west-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 60, BandwidthLimit: 0, }, @@ -1257,9 +1257,9 @@ func TestAccS3BucketReplication_twoway_complex(t *testing.T) { Host: thirdMinioEndpoint, Path: "/", Region: "ap-south-1", - Syncronous: false, + Synchronous: false, Secure: false, - PathStyle: S3PathSyleAuto, + PathStyle: S3PathStyleAuto, HealthCheckPeriod: time.Second * 30, BandwidthLimit: 1 * humanize.BigGByte.Int64(), }, @@ -1635,8 +1635,8 @@ func testAccCheckBucketHasReplication(n string, config []S3MinioBucketReplicatio if existingTarget.TargetBucket != bucket { return fmt.Errorf("Mismatch TargetBucket %q, rule#%d:\n\nexpected: %v\n\ngot: %v", n, i, existingTarget.TargetBucket, bucket) } - if existingTarget.ReplicationSync != rule.Target.Syncronous { - return fmt.Errorf("Mismatch synchronous mode %q, rule#%d:\n\nexpected: %v\n\ngot: %v", n, i, existingTarget.ReplicationSync, rule.Target.Syncronous) + if existingTarget.ReplicationSync != rule.Target.Synchronous { + return fmt.Errorf("Mismatch synchronous mode %q, rule#%d:\n\nexpected: %v\n\ngot: %v", n, i, existingTarget.ReplicationSync, rule.Target.Synchronous) } if existingTarget.Region != rule.Target.Region { return fmt.Errorf("Mismatch region %q, rule#%d:\n\nexpected: %v\n\ngot: %v", n, i, existingTarget.Region, rule.Target.Region)