Skip to content

Commit

Permalink
Merge pull request #7704 from tanjunchen/perfect-document
Browse files Browse the repository at this point in the history
fix-up some spelling mistakes
  • Loading branch information
k8s-ci-robot committed Sep 30, 2019
2 parents 29823b5 + 7f64de4 commit 43aa68a
Show file tree
Hide file tree
Showing 9 changed files with 9 additions and 9 deletions.
2 changes: 1 addition & 1 deletion docs/iam_roles.md
Original file line number Diff line number Diff line change
Expand Up @@ -178,7 +178,7 @@ Now run a cluster update to create the new launch configuration, using [lifecycl
kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides IAMRole=ExistsAndWarnIfChanges,IAMRolePolicy=ExistsAndWarnIfChanges,IAMInstanceProfileRole=ExistsAndWarnIfChanges
```

*Everytime `kops update cluster` is run, it must include the above `--lifecycle-overrides` unless a non-`security` phase is specified.*
*Every time `kops update cluster` is run, it must include the above `--lifecycle-overrides` unless a non-`security` phase is specified.*

Finally, perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration:

Expand Down
2 changes: 1 addition & 1 deletion docs/security_groups.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ Now run a cluster update to create the new launch configuration, using [lifecycl
kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides SecurityGroup=ExistsAndWarnIfChanges,SecurityGroupRule=ExistsAndWarnIfChanges
```

*Everytime `kops update cluster` is ran, it must include the above `--lifecycle-overrides`.*
*Every time `kops update cluster` is ran, it must include the above `--lifecycle-overrides`.*

Then perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ set -x

CACHE_DIR=/nvidia-device-plugin

# Load Passthrough enviroment variables from the original kops hook
# Load Passthrough environment variables from the original kops hook
source $CACHE_DIR/environment

# Support both deviceplugin and legacy (accelerator) GPU modes.
Expand Down
2 changes: 1 addition & 1 deletion k8s/crds/kops_v1alpha2_instancegroup.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -525,7 +525,7 @@ spec:
volumePluginDirectory:
description: The full path of the directory in which to search for
additional third party volume plugins (this path must be writeable,
dependant on your choice of OS)
dependent on your choice of OS)
type: string
volumeStatsAggPeriod:
description: VolumeStatsAggPeriod is the interval for kubelet to
Expand Down
2 changes: 1 addition & 1 deletion node-authorizer/pkg/authorizers/alwaysallow/authorizer.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ type alwaysAllowAuth struct{}

// NewAuthorizer creates and returns a alwaysAllow node authorizer
func NewAuthorizer() (server.Authorizer, error) {
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritive checks and should only be used in test environments")
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritative checks and should only be used in test environments")

return &alwaysAllowAuth{}, nil
}
Expand Down
2 changes: 1 addition & 1 deletion node-authorizer/pkg/authorizers/alwaysallow/verifier.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ type alwaysallowVerifier struct{}

// NewVerifier creates and returns a new Verifier
func NewVerifier() (server.Verifier, error) {
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritive checks and should only be used in test environments")
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritative checks and should only be used in test environments")

return &alwaysallowVerifier{}, nil
}
Expand Down
2 changes: 1 addition & 1 deletion node-authorizer/pkg/server/types.go
Original file line number Diff line number Diff line change
Expand Up @@ -109,7 +109,7 @@ func (c *Config) UseFeature(name string) bool {
return false
}

// NodeRegistration is an incomming request
// NodeRegistration is an incoming request
type NodeRegistration struct {
// Spec is the request specification
Spec NodeRegistrationSpec
Expand Down
2 changes: 1 addition & 1 deletion upup/pkg/fi/cloudup/awstasks/launchtemplate_target_api.go
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ func (t *LaunchTemplate) RenderAWS(c *awsup.AWSAPITarget, a, ep, changes *Launch
Name: t.IAMInstanceProfile.Name,
}
}
// @step: are the node publically facing
// @step: are the node publicly facing
if fi.BoolValue(t.AssociatePublicIP) {
lc.NetworkInterfaces = append(lc.NetworkInterfaces,
&ec2.LaunchTemplateInstanceNetworkInterfaceSpecificationRequest{
Expand Down
2 changes: 1 addition & 1 deletion upup/pkg/fi/cloudup/openstacktasks/floatingip.go
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ func (e *FloatingIP) GetDependencies(tasks map[string]fi.Task) []fi.Task {
if _, ok := task.(*LB); ok {
deps = append(deps, task)
}
// We cant create a floating IP until the router with access to the external network
// We can't create a floating IP until the router with access to the external network
// Has created an interface to our subnet
if _, ok := task.(*RouterInterface); ok {
deps = append(deps, task)
Expand Down

0 comments on commit 43aa68a

Please sign in to comment.