1
0
mirror of https://github.com/juanfont/headscale.git synced 2025-07-27 13:48:02 +02:00

Fix typos

Found via `codespell -L shs,hastable,userr`
This commit is contained in:
Kian-Meng Ang 2025-07-21 03:51:57 +08:00 committed by nblock
parent 7fce5065c4
commit 3123d5286b
6 changed files with 13 additions and 13 deletions

View File

@ -76,7 +76,7 @@ new "world map" is created for every node in the network.
This means that under certain conditions, Headscale can likely handle 100s
of devices (maybe more), if there is _little to no change_ happening in the
network. For example, in Scenario 1, the process of computing the world map is
extremly demanding due to the size of the network, but when the map has been
extremely demanding due to the size of the network, but when the map has been
created and the nodes are not changing, the Headscale instance will likely
return to a very low resource usage until the next time there is an event
requiring the new map.

View File

@ -496,7 +496,7 @@ func NewHeadscaleDatabase(
ID: "202407191627",
Migrate: func(tx *gorm.DB) error {
// Fix an issue where the automigration in GORM expected a constraint to
// exists that didnt, and add the one it wanted.
// exists that didn't, and add the one it wanted.
// Fixes https://github.com/juanfont/headscale/issues/2351
if cfg.Type == types.DatabasePostgres {
err := tx.Exec(`
@ -934,7 +934,7 @@ AND auth_key_id NOT IN (
},
// From this point, the following rules must be followed:
// - NEVER use gorm.AutoMigrate, write the exact migration steps needed
// - AutoMigrate depends on the struct staying exactly the same, which it wont over time.
// - AutoMigrate depends on the struct staying exactly the same, which it won't over time.
// - Never write migrations that requires foreign keys to be disabled.
},
)

View File

@ -412,7 +412,7 @@ func TestUnmarshalPolicy(t *testing.T) {
`,
wantErr: `Hostname "derp" contains an invalid IP address: "10.0/42"`,
},
// TODO(kradalby): Figure out why this doesnt work.
// TODO(kradalby): Figure out why this doesn't work.
// {
// name: "invalid-hostname",
// input: `
@ -1074,7 +1074,7 @@ func TestResolvePolicy(t *testing.T) {
ForcedTags: []string{"tag:anything"},
IPv4: ap("100.100.101.2"),
},
// not matchin pak tag
// not matching pak tag
{
User: users["testuser"],
AuthKey: &types.PreAuthKey{
@ -1108,7 +1108,7 @@ func TestResolvePolicy(t *testing.T) {
ForcedTags: []string{"tag:anything"},
IPv4: ap("100.100.101.5"),
},
// not matchin pak tag
// not matching pak tag
{
User: users["groupuser"],
AuthKey: &types.PreAuthKey{
@ -1147,7 +1147,7 @@ func TestResolvePolicy(t *testing.T) {
ForcedTags: []string{"tag:anything"},
IPv4: ap("100.100.101.10"),
},
// not matchin pak tag
// not matching pak tag
{
AuthKey: &types.PreAuthKey{
Tags: []string{"tag:alsotagged"},
@ -1159,7 +1159,7 @@ func TestResolvePolicy(t *testing.T) {
ForcedTags: []string{"tag:test"},
IPv4: ap("100.100.101.234"),
},
// not matchin pak tag
// not matching pak tag
{
AuthKey: &types.PreAuthKey{
Tags: []string{"tag:test"},

View File

@ -38,7 +38,7 @@ func New() *PrimaryRoutes {
// updatePrimaryLocked recalculates the primary routes and updates the internal state.
// It returns true if the primary routes have changed.
// It is assumed that the caller holds the lock.
// The algorthm is as follows:
// The algorithm is as follows:
// 1. Reset the primaries map.
// 2. Iterate over the routes and count the number of times a prefix is advertised.
// 3. If a prefix is advertised by at least two nodes, it is a primary route.

View File

@ -1334,10 +1334,10 @@ func TestSubnetRouterMultiNetworkExitNode(t *testing.T) {
web := services[0]
webip := netip.MustParseAddr(web.GetIPInNetwork(usernet1))
// We cant mess to much with ip forwarding in containers so
// We can't mess to much with ip forwarding in containers so
// we settle for a simple ping here.
// Direct is false since we use internal DERP which means we
// cant discover a direct path between docker networks.
// can't discover a direct path between docker networks.
err = user2c.Ping(webip.String(),
tsic.WithPingUntilDirect(false),
tsic.WithPingCount(1),
@ -1693,7 +1693,7 @@ func TestAutoApproveMultiNetwork(t *testing.T) {
// with an additional tsOpt which advertises the route as part
// of the `tailscale up` command. If we do this as part of the
// scenario creation, it will be added to all nodes and turn
// into a HA node, which isnt something we are testing here.
// into a HA node, which isn't something we are testing here.
routerUsernet1, err := scenario.CreateTailscaleNode("head", tsOpts...)
require.NoError(t, err)
defer routerUsernet1.Shutdown()

View File

@ -202,7 +202,7 @@ func WithExtraLoginArgs(args []string) Option {
}
}
// WithAcceptRoutes tells the node to accept incomming routes.
// WithAcceptRoutes tells the node to accept incoming routes.
func WithAcceptRoutes() Option {
return func(tsic *TailscaleInContainer) {
tsic.withAcceptRoutes = true