fix: typo spelling grammar

Signed-off-by: slowy07 <slowy.arfy@gmail.com>
pull/2709/head
slowy07 3 years ago committed by Brad Fitzpatrick
parent 780e65a613
commit ac0353e982

@ -474,7 +474,7 @@ Determines what rules match for a user on an ACL without saving the ACL to the s
###### Query Parameters ###### Query Parameters
`type` - can be 'user' or 'ipport' `type` - can be 'user' or 'ipport'
`previewFor` - if type=user, a user's email. If type=ipport, a IP address + port like "10.0.0.1:80". `previewFor` - if type=user, a user's email. If type=ipport, a IP address + port like "10.0.0.1:80".
The provided ACL is queried with this paramater to determine which rules match. The provided ACL is queried with this parameter to determine which rules match.
###### POST Body ###### POST Body
ACL JSON or HuJSON (see https://tailscale.com/kb/1018/acls) ACL JSON or HuJSON (see https://tailscale.com/kb/1018/acls)

@ -823,7 +823,7 @@ func (c *Direct) sendMapRequest(ctx context.Context, maxPolls int, cb func(*netm
} }
// Get latest localPort. This might've changed if // Get latest localPort. This might've changed if
// a lite map update occured meanwhile. This only affects // a lite map update occurred meanwhile. This only affects
// the end-to-end test. // the end-to-end test.
// TODO(bradfitz): remove the NetworkMap.LocalPort field entirely. // TODO(bradfitz): remove the NetworkMap.LocalPort field entirely.
c.mu.Lock() c.mu.Lock()

@ -150,7 +150,7 @@ type Server struct {
// PacketForwarder is something that can forward packets. // PacketForwarder is something that can forward packets.
// //
// It's mostly an inteface for circular dependency reasons; the // It's mostly an interface for circular dependency reasons; the
// typical implementation is derphttp.Client. The other implementation // typical implementation is derphttp.Client. The other implementation
// is a multiForwarder, which this package creates as needed if a // is a multiForwarder, which this package creates as needed if a
// public key gets more than one PacketForwarder registered for it. // public key gets more than one PacketForwarder registered for it.

@ -334,7 +334,7 @@ func (r *Resolver) resolveLocal(domain dnsname.FQDN, typ dns.Type) (netaddr.IP,
case dns.TypeNS, dns.TypeSOA, dns.TypeAXFR, dns.TypeHINFO: case dns.TypeNS, dns.TypeSOA, dns.TypeAXFR, dns.TypeHINFO:
return netaddr.IP{}, dns.RCodeNotImplemented return netaddr.IP{}, dns.RCodeNotImplemented
// For everything except for the few types above that are explictly not implemented, return no records. // For everything except for the few types above that are explicitly not implemented, return no records.
// This is what other DNS systems do: always return NOERROR // This is what other DNS systems do: always return NOERROR
// without any records whenever the requested record type is unknown. // without any records whenever the requested record type is unknown.
// You can try this with: // You can try this with:

@ -49,7 +49,7 @@ type entry struct {
value interface{} value interface{}
} }
// Add adds a value to the cache, set or updating its assoicated // Add adds a value to the cache, set or updating its associated
// value. // value.
// //
// If MaxEntries is non-zero and the length of the cache is greater // If MaxEntries is non-zero and the length of the cache is greater

@ -362,7 +362,7 @@ func makeProbePlan(dm *tailcfg.DERPMap, ifState *interfaces.State, last *Report)
tries = 2 tries = 2
} else if hadBoth { } else if hadBoth {
// For dual stack machines, make the 3rd & slower nodes alternate // For dual stack machines, make the 3rd & slower nodes alternate
// beetween. // between.
if ri%2 == 0 { if ri%2 == 0 {
do4, do6 = true, false do4, do6 = true, false
} else { } else {

@ -113,7 +113,7 @@ func socketPermissionsForOS() os.FileMode {
// connectMacOSAppSandbox connects to the Tailscale Network Extension, // connectMacOSAppSandbox connects to the Tailscale Network Extension,
// which is necessarily running within the macOS App Sandbox. Our // which is necessarily running within the macOS App Sandbox. Our
// little dance to connect a regular user binary to the sandboxed // little dance to connect a regular user binary to the sandboxed
// nework extension is: // network extension is:
// //
// * the sandboxed IPNExtension picks a random localhost:0 TCP port // * the sandboxed IPNExtension picks a random localhost:0 TCP port
// to listen on // to listen on

@ -34,7 +34,7 @@ type Packet struct {
Payload []byte Payload []byte
// Prefix set by various internal methods of natlab, to locate // Prefix set by various internal methods of natlab, to locate
// where in the network a trace occured. // where in the network a trace occurred.
locator string locator string
} }

@ -87,7 +87,7 @@ func AllowDebugAccess(r *http.Request) bool {
} }
// Protected wraps a provided debug handler, h, returning a Handler // Protected wraps a provided debug handler, h, returning a Handler
// that enforces AllowDebugAccess and returns forbiden replies for // that enforces AllowDebugAccess and returns forbidden replies for
// unauthorized requests. // unauthorized requests.
func Protected(h http.Handler) http.Handler { func Protected(h http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {

@ -34,7 +34,7 @@ import (
) )
// There is much overlap between the theory of serialization and hashing. // There is much overlap between the theory of serialization and hashing.
// A hash (useful for determing equality) can be produced by printing a value // A hash (useful for determining equality) can be produced by printing a value
// and hashing the output. The format must: // and hashing the output. The format must:
// * be deterministic such that the same value hashes to the same output, and // * be deterministic such that the same value hashes to the same output, and
// * be parsable such that the same value can be reproduced by the output. // * be parsable such that the same value can be reproduced by the output.

@ -15,7 +15,7 @@ var ErrNotImplemented = errors.New("not implemented for GOOS=" + runtime.GOOS)
// IsMemberOfGroup verifies if the provided user is member of the provided // IsMemberOfGroup verifies if the provided user is member of the provided
// system group. // system group.
// If verfication fails, an error is returned. // If verification fails, an error is returned.
func IsMemberOfGroup(group, userName string) (bool, error) { func IsMemberOfGroup(group, userName string) (bool, error) {
return isMemberOfGroup(group, userName) return isMemberOfGroup(group, userName)
} }

@ -2777,7 +2777,7 @@ func (c *Conn) ParseEndpoint(endpointStr string) (conn.Endpoint, error) {
de := &discoEndpoint{ de := &discoEndpoint{
c: c, c: c,
publicKey: tailcfg.NodeKey(pk), // peer public key (for WireGuard + DERP) publicKey: tailcfg.NodeKey(pk), // peer public key (for WireGuard + DERP)
discoKey: tailcfg.DiscoKey(discoKey), // for discovery mesages discoKey: tailcfg.DiscoKey(discoKey), // for discovery messages
discoShort: tailcfg.DiscoKey(discoKey).ShortString(), discoShort: tailcfg.DiscoKey(discoKey).ShortString(),
wgEndpoint: endpointStr, wgEndpoint: endpointStr,
sentPing: map[stun.TxID]sentPing{}, sentPing: map[stun.TxID]sentPing{},
@ -3128,7 +3128,7 @@ type discoEndpoint struct {
// These fields are initialized once and never modified. // These fields are initialized once and never modified.
c *Conn c *Conn
publicKey tailcfg.NodeKey // peer public key (for WireGuard + DERP) publicKey tailcfg.NodeKey // peer public key (for WireGuard + DERP)
discoKey tailcfg.DiscoKey // for discovery mesages discoKey tailcfg.DiscoKey // for discovery messages
discoShort string // ShortString of discoKey discoShort string // ShortString of discoKey
fakeWGAddr netaddr.IPPort // the UDP address we tell wireguard-go we're using fakeWGAddr netaddr.IPPort // the UDP address we tell wireguard-go we're using
wgEndpoint string // string from ParseEndpoint, holds a JSON-serialized wgcfg.Endpoints wgEndpoint string // string from ParseEndpoint, holds a JSON-serialized wgcfg.Endpoints
@ -3285,7 +3285,7 @@ func (de *discoEndpoint) initFakeUDPAddr() {
de.fakeWGAddr = netaddr.IPPortFrom(netaddr.IPFrom16(addr), 12345) de.fakeWGAddr = netaddr.IPPortFrom(netaddr.IPFrom16(addr), 12345)
} }
// isFirstRecvActivityInAwhile notes that receive activity has occured for this // isFirstRecvActivityInAwhile notes that receive activity has occurred for this
// endpoint and reports whether it's been at least 10 seconds since the last // endpoint and reports whether it's been at least 10 seconds since the last
// receive activity (including having never received from this peer before). // receive activity (including having never received from this peer before).
func (de *discoEndpoint) isFirstRecvActivityInAwhile() bool { func (de *discoEndpoint) isFirstRecvActivityInAwhile() bool {

Loading…
Cancel
Save