Skip to content

Commit 3123d52

Browse files
kianmengnblock
authored andcommitted
Fix typos
Found via `codespell -L shs,hastable,userr`
1 parent 7fce506 commit 3123d52

File tree

6 files changed

+13
-13
lines changed

6 files changed

+13
-13
lines changed

docs/about/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ new "world map" is created for every node in the network.
7676
This means that under certain conditions, Headscale can likely handle 100s
7777
of devices (maybe more), if there is _little to no change_ happening in the
7878
network. For example, in Scenario 1, the process of computing the world map is
79-
extremly demanding due to the size of the network, but when the map has been
79+
extremely demanding due to the size of the network, but when the map has been
8080
created and the nodes are not changing, the Headscale instance will likely
8181
return to a very low resource usage until the next time there is an event
8282
requiring the new map.

hscontrol/db/db.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -496,7 +496,7 @@ func NewHeadscaleDatabase(
496496
ID: "202407191627",
497497
Migrate: func(tx *gorm.DB) error {
498498
// Fix an issue where the automigration in GORM expected a constraint to
499-
// exists that didnt, and add the one it wanted.
499+
// exists that didn't, and add the one it wanted.
500500
// Fixes https://github.com/juanfont/headscale/issues/2351
501501
if cfg.Type == types.DatabasePostgres {
502502
err := tx.Exec(`
@@ -934,7 +934,7 @@ AND auth_key_id NOT IN (
934934
},
935935
// From this point, the following rules must be followed:
936936
// - NEVER use gorm.AutoMigrate, write the exact migration steps needed
937-
// - AutoMigrate depends on the struct staying exactly the same, which it wont over time.
937+
// - AutoMigrate depends on the struct staying exactly the same, which it won't over time.
938938
// - Never write migrations that requires foreign keys to be disabled.
939939
},
940940
)

hscontrol/policy/v2/types_test.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -412,7 +412,7 @@ func TestUnmarshalPolicy(t *testing.T) {
412412
`,
413413
wantErr: `Hostname "derp" contains an invalid IP address: "10.0/42"`,
414414
},
415-
// TODO(kradalby): Figure out why this doesnt work.
415+
// TODO(kradalby): Figure out why this doesn't work.
416416
// {
417417
// name: "invalid-hostname",
418418
// input: `
@@ -1074,7 +1074,7 @@ func TestResolvePolicy(t *testing.T) {
10741074
ForcedTags: []string{"tag:anything"},
10751075
IPv4: ap("100.100.101.2"),
10761076
},
1077-
// not matchin pak tag
1077+
// not matching pak tag
10781078
{
10791079
User: users["testuser"],
10801080
AuthKey: &types.PreAuthKey{
@@ -1108,7 +1108,7 @@ func TestResolvePolicy(t *testing.T) {
11081108
ForcedTags: []string{"tag:anything"},
11091109
IPv4: ap("100.100.101.5"),
11101110
},
1111-
// not matchin pak tag
1111+
// not matching pak tag
11121112
{
11131113
User: users["groupuser"],
11141114
AuthKey: &types.PreAuthKey{
@@ -1147,7 +1147,7 @@ func TestResolvePolicy(t *testing.T) {
11471147
ForcedTags: []string{"tag:anything"},
11481148
IPv4: ap("100.100.101.10"),
11491149
},
1150-
// not matchin pak tag
1150+
// not matching pak tag
11511151
{
11521152
AuthKey: &types.PreAuthKey{
11531153
Tags: []string{"tag:alsotagged"},
@@ -1159,7 +1159,7 @@ func TestResolvePolicy(t *testing.T) {
11591159
ForcedTags: []string{"tag:test"},
11601160
IPv4: ap("100.100.101.234"),
11611161
},
1162-
// not matchin pak tag
1162+
// not matching pak tag
11631163
{
11641164
AuthKey: &types.PreAuthKey{
11651165
Tags: []string{"tag:test"},

hscontrol/routes/primary.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func New() *PrimaryRoutes {
3838
// updatePrimaryLocked recalculates the primary routes and updates the internal state.
3939
// It returns true if the primary routes have changed.
4040
// It is assumed that the caller holds the lock.
41-
// The algorthm is as follows:
41+
// The algorithm is as follows:
4242
// 1. Reset the primaries map.
4343
// 2. Iterate over the routes and count the number of times a prefix is advertised.
4444
// 3. If a prefix is advertised by at least two nodes, it is a primary route.

integration/route_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1334,10 +1334,10 @@ func TestSubnetRouterMultiNetworkExitNode(t *testing.T) {
13341334
web := services[0]
13351335
webip := netip.MustParseAddr(web.GetIPInNetwork(usernet1))
13361336

1337-
// We cant mess to much with ip forwarding in containers so
1337+
// We can't mess to much with ip forwarding in containers so
13381338
// we settle for a simple ping here.
13391339
// Direct is false since we use internal DERP which means we
1340-
// cant discover a direct path between docker networks.
1340+
// can't discover a direct path between docker networks.
13411341
err = user2c.Ping(webip.String(),
13421342
tsic.WithPingUntilDirect(false),
13431343
tsic.WithPingCount(1),
@@ -1693,7 +1693,7 @@ func TestAutoApproveMultiNetwork(t *testing.T) {
16931693
// with an additional tsOpt which advertises the route as part
16941694
// of the `tailscale up` command. If we do this as part of the
16951695
// scenario creation, it will be added to all nodes and turn
1696-
// into a HA node, which isnt something we are testing here.
1696+
// into a HA node, which isn't something we are testing here.
16971697
routerUsernet1, err := scenario.CreateTailscaleNode("head", tsOpts...)
16981698
require.NoError(t, err)
16991699
defer routerUsernet1.Shutdown()

integration/tsic/tsic.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ func WithExtraLoginArgs(args []string) Option {
202202
}
203203
}
204204

205-
// WithAcceptRoutes tells the node to accept incomming routes.
205+
// WithAcceptRoutes tells the node to accept incoming routes.
206206
func WithAcceptRoutes() Option {
207207
return func(tsic *TailscaleInContainer) {
208208
tsic.withAcceptRoutes = true

0 commit comments

Comments
 (0)