From 7f64de4c34a9972df6104e22182b5184bc3d34ed Mon Sep 17 00:00:00 2001 From: tanjunchen <2799194073@qq.com> Date: Sun, 29 Sep 2019 21:45:47 +0800 Subject: [PATCH] fix-up some spelling mistakes --- docs/iam_roles.md | 2 +- docs/security_groups.md | 2 +- hooks/nvidia-device-plugin/image/files/nvidia-device-plugin.sh | 2 +- k8s/crds/kops_v1alpha2_instancegroup.yaml | 2 +- node-authorizer/pkg/authorizers/alwaysallow/authorizer.go | 2 +- node-authorizer/pkg/authorizers/alwaysallow/verifier.go | 2 +- node-authorizer/pkg/server/types.go | 2 +- upup/pkg/fi/cloudup/awstasks/launchtemplate_target_api.go | 2 +- upup/pkg/fi/cloudup/openstacktasks/floatingip.go | 2 +- 9 files changed, 9 insertions(+), 9 deletions(-) diff --git a/docs/iam_roles.md b/docs/iam_roles.md index be016dddf6..e4f89750c3 100644 --- a/docs/iam_roles.md +++ b/docs/iam_roles.md @@ -178,7 +178,7 @@ Now run a cluster update to create the new launch configuration, using [lifecycl kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides IAMRole=ExistsAndWarnIfChanges,IAMRolePolicy=ExistsAndWarnIfChanges,IAMInstanceProfileRole=ExistsAndWarnIfChanges ``` -*Everytime `kops update cluster` is run, it must include the above `--lifecycle-overrides` unless a non-`security` phase is specified.* +*Every time `kops update cluster` is run, it must include the above `--lifecycle-overrides` unless a non-`security` phase is specified.* Finally, perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration: diff --git a/docs/security_groups.md b/docs/security_groups.md index 6476b98928..e7fdf71cf3 100644 --- a/docs/security_groups.md +++ b/docs/security_groups.md @@ -46,7 +46,7 @@ Now run a cluster update to create the new launch configuration, using [lifecycl kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides SecurityGroup=ExistsAndWarnIfChanges,SecurityGroupRule=ExistsAndWarnIfChanges ``` -*Everytime `kops update cluster` is ran, it must include the above `--lifecycle-overrides`.* +*Every time `kops update cluster` is ran, it must include the above `--lifecycle-overrides`.* Then perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration: diff --git a/hooks/nvidia-device-plugin/image/files/nvidia-device-plugin.sh b/hooks/nvidia-device-plugin/image/files/nvidia-device-plugin.sh index 7590502dac..d6c5d171d2 100755 --- a/hooks/nvidia-device-plugin/image/files/nvidia-device-plugin.sh +++ b/hooks/nvidia-device-plugin/image/files/nvidia-device-plugin.sh @@ -18,7 +18,7 @@ set -x CACHE_DIR=/nvidia-device-plugin -# Load Passthrough enviroment variables from the original kops hook +# Load Passthrough environment variables from the original kops hook source $CACHE_DIR/environment # Support both deviceplugin and legacy (accelerator) GPU modes. diff --git a/k8s/crds/kops_v1alpha2_instancegroup.yaml b/k8s/crds/kops_v1alpha2_instancegroup.yaml index 85959eb885..19ce3a264d 100644 --- a/k8s/crds/kops_v1alpha2_instancegroup.yaml +++ b/k8s/crds/kops_v1alpha2_instancegroup.yaml @@ -525,7 +525,7 @@ spec: volumePluginDirectory: description: The full path of the directory in which to search for additional third party volume plugins (this path must be writeable, - dependant on your choice of OS) + dependent on your choice of OS) type: string volumeStatsAggPeriod: description: VolumeStatsAggPeriod is the interval for kubelet to diff --git a/node-authorizer/pkg/authorizers/alwaysallow/authorizer.go b/node-authorizer/pkg/authorizers/alwaysallow/authorizer.go index fb119c29b5..b596297fca 100644 --- a/node-authorizer/pkg/authorizers/alwaysallow/authorizer.go +++ b/node-authorizer/pkg/authorizers/alwaysallow/authorizer.go @@ -28,7 +28,7 @@ type alwaysAllowAuth struct{} // NewAuthorizer creates and returns a alwaysAllow node authorizer func NewAuthorizer() (server.Authorizer, error) { - utils.Logger.Warn("note the alwaysallow authorizer performs no authoritive checks and should only be used in test environments") + utils.Logger.Warn("note the alwaysallow authorizer performs no authoritative checks and should only be used in test environments") return &alwaysAllowAuth{}, nil } diff --git a/node-authorizer/pkg/authorizers/alwaysallow/verifier.go b/node-authorizer/pkg/authorizers/alwaysallow/verifier.go index 732b435274..4bb68b12ae 100644 --- a/node-authorizer/pkg/authorizers/alwaysallow/verifier.go +++ b/node-authorizer/pkg/authorizers/alwaysallow/verifier.go @@ -28,7 +28,7 @@ type alwaysallowVerifier struct{} // NewVerifier creates and returns a new Verifier func NewVerifier() (server.Verifier, error) { - utils.Logger.Warn("note the alwaysallow authorizer performs no authoritive checks and should only be used in test environments") + utils.Logger.Warn("note the alwaysallow authorizer performs no authoritative checks and should only be used in test environments") return &alwaysallowVerifier{}, nil } diff --git a/node-authorizer/pkg/server/types.go b/node-authorizer/pkg/server/types.go index 160dc293a1..d1a8d71a14 100644 --- a/node-authorizer/pkg/server/types.go +++ b/node-authorizer/pkg/server/types.go @@ -109,7 +109,7 @@ func (c *Config) UseFeature(name string) bool { return false } -// NodeRegistration is an incomming request +// NodeRegistration is an incoming request type NodeRegistration struct { // Spec is the request specification Spec NodeRegistrationSpec diff --git a/upup/pkg/fi/cloudup/awstasks/launchtemplate_target_api.go b/upup/pkg/fi/cloudup/awstasks/launchtemplate_target_api.go index 1d11a50b14..5e586bf0d5 100644 --- a/upup/pkg/fi/cloudup/awstasks/launchtemplate_target_api.go +++ b/upup/pkg/fi/cloudup/awstasks/launchtemplate_target_api.go @@ -96,7 +96,7 @@ func (t *LaunchTemplate) RenderAWS(c *awsup.AWSAPITarget, a, ep, changes *Launch Name: t.IAMInstanceProfile.Name, } } - // @step: are the node publically facing + // @step: are the node publicly facing if fi.BoolValue(t.AssociatePublicIP) { lc.NetworkInterfaces = append(lc.NetworkInterfaces, &ec2.LaunchTemplateInstanceNetworkInterfaceSpecificationRequest{ diff --git a/upup/pkg/fi/cloudup/openstacktasks/floatingip.go b/upup/pkg/fi/cloudup/openstacktasks/floatingip.go index b73873c391..a69c1502d7 100644 --- a/upup/pkg/fi/cloudup/openstacktasks/floatingip.go +++ b/upup/pkg/fi/cloudup/openstacktasks/floatingip.go @@ -130,7 +130,7 @@ func (e *FloatingIP) GetDependencies(tasks map[string]fi.Task) []fi.Task { if _, ok := task.(*LB); ok { deps = append(deps, task) } - // We cant create a floating IP until the router with access to the external network + // We can't create a floating IP until the router with access to the external network // Has created an interface to our subnet if _, ok := task.(*RouterInterface); ok { deps = append(deps, task)