fix-up some spelling mistakes

This commit is contained in:
tanjunchen 2019-09-29 21:45:47 +08:00
parent 27c035b56c
commit 7f64de4c34
9 changed files with 9 additions and 9 deletions

View File

@ -178,7 +178,7 @@ Now run a cluster update to create the new launch configuration, using [lifecycl
kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides IAMRole=ExistsAndWarnIfChanges,IAMRolePolicy=ExistsAndWarnIfChanges,IAMInstanceProfileRole=ExistsAndWarnIfChanges kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides IAMRole=ExistsAndWarnIfChanges,IAMRolePolicy=ExistsAndWarnIfChanges,IAMInstanceProfileRole=ExistsAndWarnIfChanges
``` ```
*Everytime `kops update cluster` is run, it must include the above `--lifecycle-overrides` unless a non-`security` phase is specified.* *Every time `kops update cluster` is run, it must include the above `--lifecycle-overrides` unless a non-`security` phase is specified.*
Finally, perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration: Finally, perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration:

View File

@ -46,7 +46,7 @@ Now run a cluster update to create the new launch configuration, using [lifecycl
kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides SecurityGroup=ExistsAndWarnIfChanges,SecurityGroupRule=ExistsAndWarnIfChanges kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides SecurityGroup=ExistsAndWarnIfChanges,SecurityGroupRule=ExistsAndWarnIfChanges
``` ```
*Everytime `kops update cluster` is ran, it must include the above `--lifecycle-overrides`.* *Every time `kops update cluster` is ran, it must include the above `--lifecycle-overrides`.*
Then perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration: Then perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration:

View File

@ -18,7 +18,7 @@ set -x
CACHE_DIR=/nvidia-device-plugin CACHE_DIR=/nvidia-device-plugin
# Load Passthrough enviroment variables from the original kops hook # Load Passthrough environment variables from the original kops hook
source $CACHE_DIR/environment source $CACHE_DIR/environment
# Support both deviceplugin and legacy (accelerator) GPU modes. # Support both deviceplugin and legacy (accelerator) GPU modes.

View File

@ -525,7 +525,7 @@ spec:
volumePluginDirectory: volumePluginDirectory:
description: The full path of the directory in which to search for description: The full path of the directory in which to search for
additional third party volume plugins (this path must be writeable, additional third party volume plugins (this path must be writeable,
dependant on your choice of OS) dependent on your choice of OS)
type: string type: string
volumeStatsAggPeriod: volumeStatsAggPeriod:
description: VolumeStatsAggPeriod is the interval for kubelet to description: VolumeStatsAggPeriod is the interval for kubelet to

View File

@ -28,7 +28,7 @@ type alwaysAllowAuth struct{}
// NewAuthorizer creates and returns a alwaysAllow node authorizer // NewAuthorizer creates and returns a alwaysAllow node authorizer
func NewAuthorizer() (server.Authorizer, error) { func NewAuthorizer() (server.Authorizer, error) {
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritive checks and should only be used in test environments") utils.Logger.Warn("note the alwaysallow authorizer performs no authoritative checks and should only be used in test environments")
return &alwaysAllowAuth{}, nil return &alwaysAllowAuth{}, nil
} }

View File

@ -28,7 +28,7 @@ type alwaysallowVerifier struct{}
// NewVerifier creates and returns a new Verifier // NewVerifier creates and returns a new Verifier
func NewVerifier() (server.Verifier, error) { func NewVerifier() (server.Verifier, error) {
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritive checks and should only be used in test environments") utils.Logger.Warn("note the alwaysallow authorizer performs no authoritative checks and should only be used in test environments")
return &alwaysallowVerifier{}, nil return &alwaysallowVerifier{}, nil
} }

View File

@ -109,7 +109,7 @@ func (c *Config) UseFeature(name string) bool {
return false return false
} }
// NodeRegistration is an incomming request // NodeRegistration is an incoming request
type NodeRegistration struct { type NodeRegistration struct {
// Spec is the request specification // Spec is the request specification
Spec NodeRegistrationSpec Spec NodeRegistrationSpec

View File

@ -96,7 +96,7 @@ func (t *LaunchTemplate) RenderAWS(c *awsup.AWSAPITarget, a, ep, changes *Launch
Name: t.IAMInstanceProfile.Name, Name: t.IAMInstanceProfile.Name,
} }
} }
// @step: are the node publically facing // @step: are the node publicly facing
if fi.BoolValue(t.AssociatePublicIP) { if fi.BoolValue(t.AssociatePublicIP) {
lc.NetworkInterfaces = append(lc.NetworkInterfaces, lc.NetworkInterfaces = append(lc.NetworkInterfaces,
&ec2.LaunchTemplateInstanceNetworkInterfaceSpecificationRequest{ &ec2.LaunchTemplateInstanceNetworkInterfaceSpecificationRequest{

View File

@ -130,7 +130,7 @@ func (e *FloatingIP) GetDependencies(tasks map[string]fi.Task) []fi.Task {
if _, ok := task.(*LB); ok { if _, ok := task.(*LB); ok {
deps = append(deps, task) deps = append(deps, task)
} }
// We cant create a floating IP until the router with access to the external network // We can't create a floating IP until the router with access to the external network
// Has created an interface to our subnet // Has created an interface to our subnet
if _, ok := task.(*RouterInterface); ok { if _, ok := task.(*RouterInterface); ok {
deps = append(deps, task) deps = append(deps, task)