Spell check

This commit is contained in:
Nbelles 2025-02-05 16:10:18 +01:00 committed by nblock
parent 9ae3570154
commit 22277d1fc7
20 changed files with 29 additions and 29 deletions

View file

@ -124,7 +124,7 @@ func TestACLHostsInNetMapTable(t *testing.T) {
},
},
// Test that when we have two users, which cannot see
// eachother, each node has only the number of pairs from
// each other, each node has only the number of pairs from
// their own user.
"two-isolated-users": {
users: map[string]int{

View file

@ -218,7 +218,7 @@ func TestOIDCExpireNodesBasedOnTokenExpiry(t *testing.T) {
// This is not great, but this sadly is a time dependent test, so the
// safe thing to do is wait out the whole TTL time before checking if
// the clients have logged out. The Wait function cant do it itself
// the clients have logged out. The Wait function can't do it itself
// as it has an upper bound of 1 min.
time.Sleep(shortAccessTTL)

View file

@ -1827,7 +1827,7 @@ func TestPolicyBrokenConfigCommand(t *testing.T) {
{
// This is an unknown action, so it will return an error
// and the config will not be applied.
Action: "acccept",
Action: "unknown-action",
Sources: []string{"*"},
Destinations: []string{"*:*"},
},

View file

@ -348,7 +348,7 @@ func TestValidateResolvConf(t *testing.T) {
"HEADSCALE_DNS_BASE_DOMAIN": "all-of.it",
"HEADSCALE_DNS_NAMESERVERS_GLOBAL": `8.8.8.8`,
"HEADSCALE_DNS_SEARCH_DOMAINS": "test1.no test2.no",
// TODO(kradalby): this currently isnt working, need to fix it
// TODO(kradalby): this currently isn't working, need to fix it
// "HEADSCALE_DNS_NAMESERVERS_SPLIT": `{foo.bar.com: ["1.1.1.1"]}`,
// "HEADSCALE_DNS_EXTRA_RECORDS": `[{ name: "prometheus.myvpn.example.com", type: "A", value: "100.64.0.4" }]`,
},

View file

@ -56,7 +56,7 @@ func AddContainerToNetwork(
return err
}
// TODO(kradalby): This doesnt work reliably, but calling the exact same functions
// TODO(kradalby): This doesn't work reliably, but calling the exact same functions
// seem to work fine...
// if container, ok := pool.ContainerByName("/" + testContainer); ok {
// err := container.ConnectToNetwork(network)

View file

@ -163,8 +163,8 @@ func New(
runOptions.WorkingDir = dsic.workdir
}
// dockertest isnt very good at handling containers that has already
// been created, this is an attempt to make sure this container isnt
// dockertest isn't very good at handling containers that has already
// been created, this is an attempt to make sure this container isn't
// present.
err = pool.RemoveContainerByName(hostname)
if err != nil {

View file

@ -31,7 +31,7 @@ func DefaultConfigEnv() map[string]string {
"HEADSCALE_DERP_AUTO_UPDATE_ENABLED": "false",
"HEADSCALE_DERP_UPDATE_FREQUENCY": "1m",
// a bunch of tests (ACL/Policy) rely on predicable IP alloc,
// a bunch of tests (ACL/Policy) rely on predictable IP alloc,
// so ensure the sequential alloc is used by default.
"HEADSCALE_PREFIXES_ALLOCATION": string(types.IPAllocationStrategySequential),
}

View file

@ -366,8 +366,8 @@ func New(
}
}
// dockertest isnt very good at handling containers that has already
// been created, this is an attempt to make sure this container isnt
// dockertest isn't very good at handling containers that has already
// been created, this is an attempt to make sure this container isn't
// present.
err = pool.RemoveContainerByName(hsic.hostname)
if err != nil {

View file

@ -37,7 +37,7 @@ var retry = func(times int, sleepInterval time.Duration,
}
// If we get a permission denied error, we can fail immediately
// since that is something we wont recover from by retrying.
// since that is something we won-t recover from by retrying.
if err != nil && isSSHNoAccessStdError(stderr) {
return result, stderr, err
}

View file

@ -263,8 +263,8 @@ func New(
tailscaleOptions.WorkingDir = tsic.workdir
}
// dockertest isnt very good at handling containers that has already
// been created, this is an attempt to make sure this container isnt
// dockertest isn't very good at handling containers that has already
// been created, this is an attempt to make sure this container isn't
// present.
err = pool.RemoveContainerByName(hostname)
if err != nil {

View file

@ -261,7 +261,7 @@ func assertValidStatus(t *testing.T, client TailscaleClient) {
assert.Truef(t, status.Self.InNetworkMap, "%q is not in network map", client.Hostname())
// This isnt really relevant for Self as it wont be in its own socket/wireguard.
// This isn't really relevant for Self as it won't be in its own socket/wireguard.
// assert.Truef(t, status.Self.InMagicSock, "%q is not tracked by magicsock", client.Hostname())
// assert.Truef(t, status.Self.InEngine, "%q is not in in wireguard engine", client.Hostname())