@@ -475,7 +475,7 @@ func hcloudTokenErrorResult(
475475// reconcileWorkloadClusterSecrets ensures that the workload-cluster has the secret needed by the
476476// ccm. The name of the secret is read from HetznerCluster.Spec.HetznerSecret.Name. If
477477// HetznerSecret.Name is "hcloud", then only one secret gets created in the wl-cluster. If not, two
478- // secrets are created in the wl-cluster. This ensures compatiblity between CCMs. Creating the
478+ // secrets are created in the wl-cluster. This ensures compatibility between CCMs. Creating the
479479// secret gets skipped, if HetznerCluster.Spec.SkipCreatingHetznerSecretInWorkloadCluster is set.
480480func reconcileWorkloadClusterSecrets (ctx context.Context , clusterScope * scope.ClusterScope ) (res reconcile.Result , reterr error ) {
481481 if clusterScope .HetznerCluster .Spec .SkipCreatingHetznerSecretInWorkloadCluster {
@@ -516,7 +516,7 @@ func reconcileWorkloadClusterSecrets(ctx context.Context, clusterScope *scope.Cl
516516 return reconcile.Result {}, fmt .Errorf ("failed to get client: %w" , err )
517517 }
518518
519- // To ensure compatibilty with both CCMs, create always a secret with name "hcloud" in the
519+ // To ensure compatibility with both CCMs, create always a secret with name "hcloud" in the
520520 // wl-cluster.
521521 names := []string {clusterScope .HetznerCluster .Spec .HetznerSecret .Name }
522522 if clusterScope .HetznerCluster .Spec .HetznerSecret .Name != "hcloud" {
@@ -569,7 +569,7 @@ func reconcileOneWorkloadClusterSecret(ctx context.Context, clusterScope *scope.
569569 wlSecret .Data [clusterScope .HetznerCluster .Spec .HetznerSecret .Key .HCloudToken ] = hcloudToken
570570
571571 // upstream hcloud-ccm uses the secret key "token", while the old Syself ccm used "hcloud".
572- // For compatibilty , we create always the other key, too.
572+ // For compatibility , we create always the other key, too.
573573 for _ , key := range []string {"token" , "hcloud" } {
574574 wlSecret .Data [key ] = hcloudToken
575575 }
0 commit comments