Skip to content

Commit 40d4fe9

Browse files
committed
fix typos.
1 parent 5f62c63 commit 40d4fe9

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

api/v1beta1/types.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,8 +104,8 @@ type HetznerSecretRef struct {
104104
// Name defines the name of the secret. The name gets used for reading the credential in the
105105
// mgt-cluster, and it gets used for creating a secret in the wl-cluster. About the secret in
106106
// the wl-cluster: Attention, the upstream hcloud-ccm helm chart expects the name to be
107-
// "hcloud". The Syself ccm defaults to "hetzner". For compatibilty with upstream hcloud-ccm the
108-
// controller creates two secrets, if the name is different from "hcloud" (one with name
107+
// "hcloud". The Syself ccm defaults to "hetzner". For compatibility with upstream hcloud-ccm
108+
// the controller creates two secrets, if the name is different from "hcloud" (one with name
109109
// "hcloud", one with name being the value of this setting). The secret will be created in the
110110
// namespace "mgt-system" of the workload-cluster. Set
111111
// `spec.skipCreatingHetznerSecretInWorkloadCluster`, if you don't want that secret in the

controllers/hetznercluster_controller.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -475,7 +475,7 @@ func hcloudTokenErrorResult(
475475
// reconcileWorkloadClusterSecrets ensures that the workload-cluster has the secret needed by the
476476
// ccm. The name of the secret is read from HetznerCluster.Spec.HetznerSecret.Name. If
477477
// HetznerSecret.Name is "hcloud", then only one secret gets created in the wl-cluster. If not, two
478-
// secrets are created in the wl-cluster. This ensures compatiblity between CCMs. Creating the
478+
// secrets are created in the wl-cluster. This ensures compatibility between CCMs. Creating the
479479
// secret gets skipped, if HetznerCluster.Spec.SkipCreatingHetznerSecretInWorkloadCluster is set.
480480
func reconcileWorkloadClusterSecrets(ctx context.Context, clusterScope *scope.ClusterScope) (res reconcile.Result, reterr error) {
481481
if clusterScope.HetznerCluster.Spec.SkipCreatingHetznerSecretInWorkloadCluster {
@@ -516,7 +516,7 @@ func reconcileWorkloadClusterSecrets(ctx context.Context, clusterScope *scope.Cl
516516
return reconcile.Result{}, fmt.Errorf("failed to get client: %w", err)
517517
}
518518

519-
// To ensure compatibilty with both CCMs, create always a secret with name "hcloud" in the
519+
// To ensure compatibility with both CCMs, create always a secret with name "hcloud" in the
520520
// wl-cluster.
521521
names := []string{clusterScope.HetznerCluster.Spec.HetznerSecret.Name}
522522
if clusterScope.HetznerCluster.Spec.HetznerSecret.Name != "hcloud" {
@@ -569,7 +569,7 @@ func reconcileOneWorkloadClusterSecret(ctx context.Context, clusterScope *scope.
569569
wlSecret.Data[clusterScope.HetznerCluster.Spec.HetznerSecret.Key.HCloudToken] = hcloudToken
570570

571571
// upstream hcloud-ccm uses the secret key "token", while the old Syself ccm used "hcloud".
572-
// For compatibilty, we create always the other key, too.
572+
// For compatibility, we create always the other key, too.
573573
for _, key := range []string{"token", "hcloud"} {
574574
wlSecret.Data[key] = hcloudToken
575575
}

0 commit comments

Comments
 (0)