all: fix typos in comments

Fix its/it's, who's/whose, wether/whether, missing apostrophes
in contractions, and other misspellings across the codebase.

Updates #cleanup

Change-Id: I20453b81a7aceaa14ea2a551abba08a2e7f0a1d8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
main
Brad Fitzpatrick 1 month ago committed by Brad Fitzpatrick
parent 9657a93217
commit 2810f0c6f1
  1. 2
      cmd/tailscale/cli/serve_v2.go
  2. 2
      drive/driveimpl/remote_impl.go
  3. 2
      ipn/ipnlocal/network-lock.go
  4. 2
      ipn/ipnserver/server.go
  5. 2
      net/socks5/socks5_test.go
  6. 4
      safesocket/safesocket_darwin.go
  7. 4
      tka/chaintest_test.go
  8. 2
      tka/tailchonk.go
  9. 2
      tka/tailchonk_test.go
  10. 2
      tstest/natlab/vnet/conf.go
  11. 2
      tstest/natlab/vnet/vnet.go
  12. 2
      tstest/tailmac/README.md
  13. 2
      types/key/nl.go
  14. 2
      wgengine/magicsock/endpoint.go

@ -1096,7 +1096,7 @@ func isRemote(target string) bool {
target = "tmp://" + target target = "tmp://" + target
} }
// make sure we can parse the target, wether it's a full URL or just a host:port // make sure we can parse the target, whether it's a full URL or just a host:port
u, err := url.ParseRequestURI(target) u, err := url.ParseRequestURI(target)
if err != nil { if err != nil {
// If we can't parse the target, it doesn't matter if it's remote or not // If we can't parse the target, it doesn't matter if it's remote or not

@ -415,7 +415,7 @@ var writeMethods = map[string]bool{
"DELETE": true, "DELETE": true,
} }
// canSudo checks wether we can sudo -u the configured executable as the // canSudo checks whether we can sudo -u the configured executable as the
// configured user by attempting to call the executable with the '-h' flag to // configured user by attempting to call the executable with the '-h' flag to
// print help. // print help.
func (s *userServer) canSudo() bool { func (s *userServer) canSudo() bool {

@ -407,7 +407,7 @@ func (b *LocalBackend) tkaSyncLocked(ourNodeKey key.NodePublic) error {
// has updates for us, or we have updates for the control plane. // has updates for us, or we have updates for the control plane.
// //
// TODO(tom): Do we want to keep processing even if the Inform fails? Need // TODO(tom): Do we want to keep processing even if the Inform fails? Need
// to think through if theres holdback concerns here or not. // to think through if there's holdback concerns here or not.
if len(offerResp.MissingAUMs) > 0 { if len(offerResp.MissingAUMs) > 0 {
aums := make([]tka.AUM, len(offerResp.MissingAUMs)) aums := make([]tka.AUM, len(offerResp.MissingAUMs))
for i, a := range offerResp.MissingAUMs { for i, a := range offerResp.MissingAUMs {

@ -429,7 +429,7 @@ func (s *Server) addActiveHTTPRequest(req *http.Request, actor ipnauth.Actor) (o
if len(s.activeReqs) == 1 { if len(s.activeReqs) == 1 {
if envknob.GOOS() == "windows" && !actor.IsLocalSystem() { if envknob.GOOS() == "windows" && !actor.IsLocalSystem() {
// Tell the LocalBackend about the identity we're now running as, // Tell the LocalBackend about the identity we're now running as,
// unless its the SYSTEM user. That user is not a real account and // unless it's the SYSTEM user. That user is not a real account and
// doesn't have a home directory. // doesn't have a home directory.
lb.SetCurrentUser(actor) lb.SetCurrentUser(actor)
} }

@ -222,7 +222,7 @@ func TestUDP(t *testing.T) {
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)
} }
_, err = conn.Write(append([]byte{socks5Version, byte(udpAssociate), 0x00}, targetAddrPkt...)) // client reqeust _, err = conn.Write(append([]byte{socks5Version, byte(udpAssociate), 0x00}, targetAddrPkt...)) // client request
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)
} }

@ -102,8 +102,8 @@ func SetCredentials(token string, port int) {
// InitListenerDarwin initializes the listener for the CLI commands // InitListenerDarwin initializes the listener for the CLI commands
// and localapi HTTP server and sets the port/token. This will override // and localapi HTTP server and sets the port/token. This will override
// any credentials set explicitly via SetCredentials(). Calling this mulitple times // any credentials set explicitly via SetCredentials(). Calling this multiple times
// has no effect. The listener and it's corresponding token/port is initialized only once. // has no effect. The listener and its corresponding token/port is initialized only once.
func InitListenerDarwin(sharedDir string) (*net.Listener, error) { func InitListenerDarwin(sharedDir string) (*net.Listener, error) {
ssd.mu.Lock() ssd.mu.Lock()
defer ssd.mu.Unlock() defer ssd.mu.Unlock()

@ -203,9 +203,9 @@ func (c *testChain) buildChain() {
} }
// AUMs with a parent need to know their hash, so we // AUMs with a parent need to know their hash, so we
// only compute AUMs who's parents have been computed // only compute AUMs whose parents have been computed
// each iteration. Since at least the genesis AUM // each iteration. Since at least the genesis AUM
// had no parent, theres always a path to completion // had no parent, there's always a path to completion
// in O(n+1) where n is the number of AUMs. // in O(n+1) where n is the number of AUMs.
c.AUMs = make(map[string]AUM, len(c.Nodes)) c.AUMs = make(map[string]AUM, len(c.Nodes))
c.AUMHashes = make(map[string]AUMHash, len(c.Nodes)) c.AUMHashes = make(map[string]AUMHash, len(c.Nodes))

@ -715,7 +715,7 @@ func markActiveChain(storage Chonk, verdict map[AUMHash]retainState, minChain in
parent, hasParent := next.Parent() parent, hasParent := next.Parent()
if !hasParent { if !hasParent {
// Genesis AUM (beginning of time). The chain isnt long enough to need truncating. // Genesis AUM (beginning of time). The chain isn't long enough to need truncating.
return h, nil return h, nil
} }

@ -309,7 +309,7 @@ func TestMarkDescendantAUMs(t *testing.T) {
} }
for _, h := range []AUMHash{hs["genesis"], hs["B"], hs["D"]} { for _, h := range []AUMHash{hs["genesis"], hs["B"], hs["D"]} {
if (verdict[h] & retainStateLeaf) != 0 { if (verdict[h] & retainStateLeaf) != 0 {
t.Errorf("%v was marked as a descendant and shouldnt be", h) t.Errorf("%v was marked as a descendant and shouldn't be", h)
} }
} }
} }

@ -349,7 +349,7 @@ func (n *Network) SetBlackholedIPv4(v bool) {
n.breakWAN4 = v n.breakWAN4 = v
} }
// SetPostConnectControlBlackhole sets wether the network should blackhole all // SetPostConnectControlBlackhole sets whether the network should blackhole all
// traffic to the control server after the clients have connected. // traffic to the control server after the clients have connected.
func (n *Network) SetPostConnectControlBlackhole(v bool) { func (n *Network) SetPostConnectControlBlackhole(v bool) {
n.postConnectBlackholeControl = v n.postConnectBlackholeControl = v

@ -579,7 +579,7 @@ func (n *network) MACOfIP(ip netip.Addr) (_ MAC, ok bool) {
return MAC{}, false return MAC{}, false
} }
// SetControlBlackholed sets wether traffic to control should be blackholed for the // SetControlBlackholed sets whether traffic to control should be blackholed for the
// network. // network.
func (n *network) SetControlBlackholed(v bool) { func (n *network) SetControlBlackholed(v bool) {
n.blackholeControl = v n.blackholeControl = v

@ -53,7 +53,7 @@ All vm images, restore images, block device files, save states, and other suppor
Each vm gets its own directory. These can be archived for posterity to preserve a particular image and/or state. Each vm gets its own directory. These can be archived for posterity to preserve a particular image and/or state.
The mere existence of a directory containing all of the required files in ~/VM.bundle is sufficient for tailmac to The mere existence of a directory containing all of the required files in ~/VM.bundle is sufficient for tailmac to
be able to see and run it. ~/VM.bundle and it's contents *is* tailmac's state. No other state is maintained elsewhere. be able to see and run it. ~/VM.bundle and its contents *is* tailmac's state. No other state is maintained elsewhere.
Each vm has its own custom configuration which can be modified while the vm is idle. It's simple JSON - you may Each vm has its own custom configuration which can be modified while the vm is idle. It's simple JSON - you may
modify this directly, or using 'tailmac configure'. modify this directly, or using 'tailmac configure'.

@ -119,7 +119,7 @@ type NLPublic struct {
// NLPublicFromEd25519Unsafe converts an ed25519 public key into // NLPublicFromEd25519Unsafe converts an ed25519 public key into
// a type of NLPublic. // a type of NLPublic.
// //
// New uses of this function should be avoided, as its possible to // New uses of this function should be avoided, as it's possible to
// accidentally construct an NLPublic from a non network-lock key. // accidentally construct an NLPublic from a non network-lock key.
func NLPublicFromEd25519Unsafe(public ed25519.PublicKey) NLPublic { func NLPublicFromEd25519Unsafe(public ed25519.PublicKey) NLPublic {
var out NLPublic var out NLPublic

@ -80,7 +80,7 @@ type endpoint struct {
lastSendAny mono.Time // last time there were outgoing packets sent this peer from any trigger, internal or external to magicsock lastSendAny mono.Time // last time there were outgoing packets sent this peer from any trigger, internal or external to magicsock
lastFullPing mono.Time // last time we pinged all disco or wireguard only endpoints lastFullPing mono.Time // last time we pinged all disco or wireguard only endpoints
lastUDPRelayPathDiscovery mono.Time // last time we ran UDP relay path discovery lastUDPRelayPathDiscovery mono.Time // last time we ran UDP relay path discovery
sentDiscoKeyAdvertisement bool // wether we sent a TSMPDiscoAdvertisement or not to this endpoint sentDiscoKeyAdvertisement bool // whether we sent a TSMPDiscoAdvertisement or not to this endpoint
derpAddr netip.AddrPort // fallback/bootstrap path, if non-zero (non-zero for well-behaved clients) derpAddr netip.AddrPort // fallback/bootstrap path, if non-zero (non-zero for well-behaved clients)
bestAddr addrQuality // best non-DERP path; zero if none; mutate via setBestAddrLocked() bestAddr addrQuality // best non-DERP path; zero if none; mutate via setBestAddrLocked()

Loading…
Cancel
Save