diff --git a/api/deploy/ocp/scc.go b/api/deploy/ocp/scc.go index 9bd6aa3ec..b0f277da4 100644 --- a/api/deploy/ocp/scc.go +++ b/api/deploy/ocp/scc.go @@ -41,7 +41,7 @@ type SecurityContextConstraintsValues struct { } // SecurityContextConstraintsDefaults can be used for generating deployment -// artifacts with defails values. +// artifacts with details values. var SecurityContextConstraintsDefaults = SecurityContextConstraintsValues{ Namespace: "ceph-csi", Deployer: "", diff --git a/e2e/utils.go b/e2e/utils.go index 67e413f5e..ff1618bf0 100644 --- a/e2e/utils.go +++ b/e2e/utils.go @@ -1226,7 +1226,7 @@ func validatePVCSnapshot( checkSumClone, chErrs[n] = calculateSHA512sum(f, &a, filePath, &opt) framework.Logf("checksum value for the clone is %s with pod name %s", checkSumClone, name) if chErrs[n] != nil { - framework.Logf("failed to calculte checksum for clone: %s", chErrs[n]) + framework.Logf("failed to calculate checksum for clone: %s", chErrs[n]) } if checkSumClone != checkSum { framework.Logf( diff --git a/internal/cephfs/driver.go b/internal/cephfs/driver.go index 60e0dec65..951b71456 100644 --- a/internal/cephfs/driver.go +++ b/internal/cephfs/driver.go @@ -155,7 +155,7 @@ func (fs *Driver) Run(conf *util.Config) { fs.cs = NewControllerServer(fs.cd) } - // configre CSI-Addons server and components + // configure CSI-Addons server and components err = fs.setupCSIAddonsServer(conf) if err != nil { log.FatalLogMsg(err.Error()) diff --git a/internal/cephfs/fuserecovery.go b/internal/cephfs/fuserecovery.go index 0b249b017..279b0f79b 100644 --- a/internal/cephfs/fuserecovery.go +++ b/internal/cephfs/fuserecovery.go @@ -68,9 +68,9 @@ func (ns *NodeServer) getMountState(path string) (mountState, error) { return msNotMounted, nil } -func findMountinfo(mountpoint string, mis []mountutil.MountInfo) int { - for i := range mis { - if mis[i].MountPoint == mountpoint { +func findMountinfo(mountpoint string, minfo []mountutil.MountInfo) int { + for i := range minfo { + if minfo[i].MountPoint == mountpoint { return i } } @@ -80,9 +80,9 @@ func findMountinfo(mountpoint string, mis []mountutil.MountInfo) int { // Ensures that given mountpoint is of specified fstype. // Returns true if fstype matches, or if no such mountpoint exists. -func validateFsType(mountpoint, fsType string, mis []mountutil.MountInfo) bool { - if idx := findMountinfo(mountpoint, mis); idx > 0 { - mi := mis[idx] +func validateFsType(mountpoint, fsType string, minfo []mountutil.MountInfo) bool { + if idx := findMountinfo(mountpoint, minfo); idx > 0 { + mi := minfo[idx] if mi.FsType != fsType { return false diff --git a/internal/rbd/driver/driver.go b/internal/rbd/driver/driver.go index f70a76a80..728249f84 100644 --- a/internal/rbd/driver/driver.go +++ b/internal/rbd/driver/driver.go @@ -165,7 +165,7 @@ func (r *Driver) Run(conf *util.Config) { r.cs.SetMetadata = conf.SetMetadata } - // configre CSI-Addons server and components + // configure CSI-Addons server and components err = r.setupCSIAddonsServer(conf) if err != nil { log.FatalLogMsg(err.Error()) diff --git a/internal/util/fscrypt/fscrypt.go b/internal/util/fscrypt/fscrypt.go index 6f87b69d6..3b1d46b97 100644 --- a/internal/util/fscrypt/fscrypt.go +++ b/internal/util/fscrypt/fscrypt.go @@ -337,7 +337,7 @@ func InitializeNode(ctx context.Context) error { return nil } -// FscryptUnlock unlocks possilby creating fresh fscrypt metadata +// FscryptUnlock unlocks possibly creating fresh fscrypt metadata // iff a volume is encrypted. Otherwise return immediately Calling // this function requires that InitializeFscrypt ran once on this node. func Unlock(