diff --git a/cluster/images/etcd/migrate/data_dir.go b/cluster/images/etcd/migrate/data_dir.go index 1be899fe4c8..fcfb23c83c0 100644 --- a/cluster/images/etcd/migrate/data_dir.go +++ b/cluster/images/etcd/migrate/data_dir.go @@ -116,7 +116,7 @@ func (d *DataDirectory) String() string { } // VersionFile provides utilities for reading and writing version.txt files -// to etcd "data-dir" for tracking the etcd server and storage verions +// to etcd "data-dir" for tracking the etcd server and storage versions // of the data in the directory. type VersionFile struct { path string diff --git a/cluster/log-dump/log-dump.sh b/cluster/log-dump/log-dump.sh index 650295d6c21..1e799da5772 100755 --- a/cluster/log-dump/log-dump.sh +++ b/cluster/log-dump/log-dump.sh @@ -494,7 +494,7 @@ function dump_nodes_with_logexporter() { if find_non_logexported_nodes; then break else - echo "Attempt ${retry} failed to list marker files for succeessful nodes" + echo "Attempt ${retry} failed to list marker files for successful nodes" if [[ "${retry}" == 10 ]]; then echo "Final attempt to list marker files failed.. falling back to logdump through SSH" "${KUBECTL}" delete namespace "${logexporter_namespace}" || true diff --git a/cmd/kubeadm/app/apis/kubeadm/validation/validation.go b/cmd/kubeadm/app/apis/kubeadm/validation/validation.go index 56efee812d8..d500164e920 100644 --- a/cmd/kubeadm/app/apis/kubeadm/validation/validation.go +++ b/cmd/kubeadm/app/apis/kubeadm/validation/validation.go @@ -320,7 +320,7 @@ func ValidateCertSANs(altnames []string, fldPath *field.Path) field.ErrorList { return allErrs } -// ValidateURLs validates the URLs given in the string slice, makes sure they are parseable. Optionally, it can enforcs HTTPS usage. +// ValidateURLs validates the URLs given in the string slice, makes sure they are parsable. Optionally, it can enforces HTTPS usage. func ValidateURLs(urls []string, requireHTTPS bool, fldPath *field.Path) field.ErrorList { allErrs := field.ErrorList{} for _, urlstr := range urls { diff --git a/cmd/kubeadm/app/cmd/init_test.go b/cmd/kubeadm/app/cmd/init_test.go index 2daed1f77c1..3f0100096d0 100644 --- a/cmd/kubeadm/app/cmd/init_test.go +++ b/cmd/kubeadm/app/cmd/init_test.go @@ -87,7 +87,7 @@ func TestNewInitData(t *testing.T) { expectError: true, }, { - name: "fail if deprecetes feature gates are set", + name: "fail if deprecated feature gates are set", flags: map[string]string{ options.FeatureGatesString: fmt.Sprintf("%s=true", features.CoreDNS), }, diff --git a/cmd/kubeadm/app/phases/certs/renewal/expiration_test.go b/cmd/kubeadm/app/phases/certs/renewal/expiration_test.go index d8ed3b70c90..afa13c53fe2 100644 --- a/cmd/kubeadm/app/phases/certs/renewal/expiration_test.go +++ b/cmd/kubeadm/app/phases/certs/renewal/expiration_test.go @@ -31,7 +31,7 @@ func TestExpirationInfo(t *testing.T) { e := newExpirationInfo("x", cert, false) - if math.Abs(float64(validity-e.ResidualTime())) > float64(5*time.Second) { // using 5s of tolerance becase the function is not determinstic (it uses time.Now()) and we want to avoid flakes + if math.Abs(float64(validity-e.ResidualTime())) > float64(5*time.Second) { // using 5s of tolerance because the function is not deterministic (it uses time.Now()) and we want to avoid flakes t.Errorf("expected IsInRenewalWindow equal to %v, saw %v", validity, e.ResidualTime()) } } diff --git a/cmd/kubeadm/app/preflight/checks.go b/cmd/kubeadm/app/preflight/checks.go index 5b6448e63f9..063f147999a 100644 --- a/cmd/kubeadm/app/preflight/checks.go +++ b/cmd/kubeadm/app/preflight/checks.go @@ -1016,7 +1016,7 @@ func RunOptionalJoinNodeChecks(execer utilsexec.Interface, cfg *kubeadmapi.Clust return RunChecks(checks, os.Stderr, ignorePreflightErrors) } -// addCommonChecks is a helper function to deplicate checks that are common between both the +// addCommonChecks is a helper function to duplicate checks that are common between both the // kubeadm init and join commands func addCommonChecks(execer utilsexec.Interface, k8sVersion string, nodeReg *kubeadmapi.NodeRegistrationOptions, checks []Checker) []Checker { containerRuntime, err := utilruntime.NewContainerRuntime(execer, nodeReg.CRISocket) diff --git a/cmd/kubeadm/app/util/runtime/runtime_test.go b/cmd/kubeadm/app/util/runtime/runtime_test.go index dc01c41aa50..d5143e85f93 100644 --- a/cmd/kubeadm/app/util/runtime/runtime_test.go +++ b/cmd/kubeadm/app/util/runtime/runtime_test.go @@ -248,7 +248,7 @@ func TestPullImage(t *testing.T) { {"valid: pull image using CRI", "unix:///var/run/crio/crio.sock", "image1", false}, {"invalid: CRI pull error", "unix:///var/run/crio/crio.sock", "image2", true}, {"valid: pull image using docker", constants.DefaultDockerCRISocket, "image1", false}, - {"invalide: docer pull error", constants.DefaultDockerCRISocket, "image2", true}, + {"invalid: docker pull error", constants.DefaultDockerCRISocket, "image2", true}, } for _, tc := range cases { diff --git a/cmd/kubeadm/app/util/system/types.go b/cmd/kubeadm/app/util/system/types.go index 91ad4695952..928263d2238 100644 --- a/cmd/kubeadm/app/util/system/types.go +++ b/cmd/kubeadm/app/util/system/types.go @@ -16,7 +16,7 @@ limitations under the License. package system -// KernelConfig defines one kernel configration item. +// KernelConfig defines one kernel configuration item. type KernelConfig struct { // Name is the general name of the kernel configuration. It is used to // match kernel configuration. diff --git a/pkg/proxy/config/config.go b/pkg/proxy/config/config.go index 039eabacbd2..a2da9d4ef4c 100644 --- a/pkg/proxy/config/config.go +++ b/pkg/proxy/config/config.go @@ -54,7 +54,7 @@ type EndpointsHandler interface { // OnEndpointsUpdate is called whenever modification of an existing // endpoints object is observed. OnEndpointsUpdate(oldEndpoints, endpoints *v1.Endpoints) - // OnEndpointsDelete is called whever deletion of an existing endpoints + // OnEndpointsDelete is called whenever deletion of an existing endpoints // object is observed. OnEndpointsDelete(endpoints *v1.Endpoints) // OnEndpointsSynced is called once all the initial event handlers were diff --git a/pkg/proxy/iptables/proxier.go b/pkg/proxy/iptables/proxier.go index 9be271b11c8..95b15b7a2a5 100644 --- a/pkg/proxy/iptables/proxier.go +++ b/pkg/proxy/iptables/proxier.go @@ -556,7 +556,7 @@ func (proxier *Proxier) OnEndpointsUpdate(oldEndpoints, endpoints *v1.Endpoints) } } -// OnEndpointsDelete is called whever deletion of an existing endpoints +// OnEndpointsDelete is called whenever deletion of an existing endpoints // object is observed. func (proxier *Proxier) OnEndpointsDelete(endpoints *v1.Endpoints) { proxier.OnEndpointsUpdate(endpoints, nil) diff --git a/staging/src/k8s.io/client-go/tools/cache/fake_custom_store.go b/staging/src/k8s.io/client-go/tools/cache/fake_custom_store.go index b59e2eb2724..62694b61fa5 100644 --- a/staging/src/k8s.io/client-go/tools/cache/fake_custom_store.go +++ b/staging/src/k8s.io/client-go/tools/cache/fake_custom_store.go @@ -25,7 +25,7 @@ type FakeCustomStore struct { ListKeysFunc func() []string GetFunc func(obj interface{}) (item interface{}, exists bool, err error) GetByKeyFunc func(key string) (item interface{}, exists bool, err error) - ReplaceFunc func(list []interface{}, resourceVerion string) error + ReplaceFunc func(list []interface{}, resourceVersion string) error ResyncFunc func() error } diff --git a/test/e2e/framework/test_context.go b/test/e2e/framework/test_context.go index d48cb7ef273..fdc2524435c 100644 --- a/test/e2e/framework/test_context.go +++ b/test/e2e/framework/test_context.go @@ -161,7 +161,7 @@ type TestContextType struct { // The DNS Domain of the cluster. ClusterDNSDomain string - // The configration of NodeKiller. + // The configuration of NodeKiller. NodeKiller NodeKillerConfig }