diff --git a/docs/metrics.md b/docs/metrics.md index e0a2e4e7f..530a20b4e 100644 --- a/docs/metrics.md +++ b/docs/metrics.md @@ -7,7 +7,7 @@ CSI deploys a sidecar container that is responsible for collecting metrics. -Liveness metrics are intended to be collected by prometheus but can be accesesed +Liveness metrics are intended to be collected by prometheus but can be accessed through a GET request to a specific pod ip. for example diff --git a/internal/cephfs/volumeoptions.go b/internal/cephfs/volumeoptions.go index f2258e643..f0eea2284 100644 --- a/internal/cephfs/volumeoptions.go +++ b/internal/cephfs/volumeoptions.go @@ -525,7 +525,7 @@ func newSnapshotOptionsFromID(ctx context.Context, snapID string, cr *util.Crede if err != nil { return &volOptions, nil, &sid, err } - // storing request name in snapshotshot Identifier + // storing request name in snapshot Identifier sid.RequestName = imageAttributes.RequestName sid.FsSnapshotName = imageAttributes.ImageName sid.FsSubvolName = imageAttributes.SourceName diff --git a/internal/controller/persistentvolume/persistentvolume.go b/internal/controller/persistentvolume/persistentvolume.go index bc92088a5..c419c2038 100644 --- a/internal/controller/persistentvolume/persistentvolume.go +++ b/internal/controller/persistentvolume/persistentvolume.go @@ -204,7 +204,7 @@ func (r ReconcilePersistentVolume) reconcilePV(obj runtime.Object) error { return nil } -// Reconcile reconciles the PersitentVolume object and creates a new omap entries +// Reconcile reconciles the PersistentVolume object and creates a new omap entries // for the volume. func (r *ReconcilePersistentVolume) Reconcile(request reconcile.Request) (reconcile.Result, error) { pv := &corev1.PersistentVolume{} diff --git a/internal/csi-common/utils.go b/internal/csi-common/utils.go index 31717109f..b5cbdc415 100644 --- a/internal/csi-common/utils.go +++ b/internal/csi-common/utils.go @@ -59,7 +59,7 @@ func NewDefaultNodeServer(d *CSIDriver, t string, topology map[string]string) *D } } -// NewDefaultIdentityServer initializes default identity servier. +// NewDefaultIdentityServer initializes default identity server. func NewDefaultIdentityServer(d *CSIDriver) *DefaultIdentityServer { return &DefaultIdentityServer{ Driver: d, diff --git a/internal/util/kms.go b/internal/util/kms.go index cd767e55c..1b5913d57 100644 --- a/internal/util/kms.go +++ b/internal/util/kms.go @@ -236,7 +236,7 @@ func RegisterKMSProvider(provider KMSProvider) bool { } _, ok := kmsManager.providers[provider.UniqueID] if ok { - panic("duplicate tegistration of KMSProvider.UniqueID: " + provider.UniqueID) + panic("duplicate registration of KMSProvider.UniqueID: " + provider.UniqueID) } // validate the Initializer diff --git a/internal/util/secretskms.go b/internal/util/secretskms.go index bfb8c981c..15dda80c6 100644 --- a/internal/util/secretskms.go +++ b/internal/util/secretskms.go @@ -163,8 +163,8 @@ func (kms SecretsMetadataKMS) EncryptDEK(volumeID, plainDEK string) (string, err return string(emdData), nil } -// DecryptDEK takes the JSON formatted `encryptedMetedataDEK` contents, and it -// fetches SecretsKMS passphase to decrypt the DEK. +// DecryptDEK takes the JSON formatted `encryptedMetadataDEK` contents, and it +// fetches SecretsKMS passphrase to decrypt the DEK. func (kms SecretsMetadataKMS) DecryptDEK(volumeID, encryptedDEK string) (string, error) { // use the passphrase from the SecretsKMS passphrase, err := kms.SecretsKMS.FetchDEK(volumeID) diff --git a/internal/util/vault_tokens.go b/internal/util/vault_tokens.go index 96dc48412..31c62e7de 100644 --- a/internal/util/vault_tokens.go +++ b/internal/util/vault_tokens.go @@ -99,7 +99,7 @@ func (v *vaultTokenConf) convertStdVaultToCSIConfig(s *standardVault) { // convertConfig takes the keys/values in standard Vault environment variable // format, and converts them to the format that is used in the configuration // file. -// This uses JSON marshaling and unmarshaling to map the Vault environment +// This uses JSON marshaling and unmarshalling to map the Vault environment // configuration into bytes, then in the standardVault struct, which is passed // through convertStdVaultToCSIConfig before converting back to a // map[string]interface{} configuration.