diff --git a/helper/schema/core_schema.go b/helper/schema/core_schema.go index 875677eb3..6a53db1a7 100644 --- a/helper/schema/core_schema.go +++ b/helper/schema/core_schema.go @@ -87,7 +87,7 @@ func (m schemaMap) CoreConfigSchema() *configschema.Block { // whose elem is a whole resource. func (s *Schema) coreConfigSchemaAttribute() *configschema.Attribute { // The Schema.DefaultFunc capability adds some extra weirdness here since - // it can be combined with "Required: true" to create a sitution where + // it can be combined with "Required: true" to create a situation where // required-ness is conditional. Terraform Core doesn't share this concept, // so we must sniff for this possibility here and conditionally turn // off the "Required" flag if it looks like the DefaultFunc is going diff --git a/states/statemgr/locker.go b/states/statemgr/locker.go index 312eb02dc..71617111e 100644 --- a/states/statemgr/locker.go +++ b/states/statemgr/locker.go @@ -23,7 +23,7 @@ var rngSource = rand.New(rand.NewSource(time.Now().UnixNano())) // mutual-exclusion locks for state. // // Implementing Locker alongside Persistent relaxes some of the usual -// implemention constraints for implementations of Refresher and Persister, +// implementation constraints for implementations of Refresher and Persister, // under the assumption that the locking mechanism effectively prevents // multiple Terraform processes from reading and writing state concurrently. // In particular, a type that implements both Locker and Persistent is only @@ -114,7 +114,7 @@ func LockWithContext(ctx context.Context, s Locker, info *LockInfo) (string, err // of the fields populated with suitable default values. type LockInfo struct { // Unique ID for the lock. NewLockInfo provides a random ID, but this may - // be overridden by the lock implementation. The final value if ID will be + // be overridden by the lock implementation. The final value of ID will be // returned by the call to Lock. ID string