From d547b943df3b9abcc9482a86ebfef395b23786c1 Mon Sep 17 00:00:00 2001 From: Josh Soref <2119212+jsoref@users.noreply.github.com> Date: Fri, 13 Sep 2024 05:40:04 -0400 Subject: [PATCH] Spelling --- .github/workflows/validate.yaml | 6 +++--- CODE_OF_CONDUCT.md | 2 +- cmd/traefik/traefik.go | 2 +- docs/content/https/acme.md | 2 +- docs/content/middlewares/http/inflightreq.md | 2 +- docs/content/migration/v2.md | 2 +- docs/content/operations/cli.md | 2 +- .../reference/dynamic-configuration/consul-catalog.md | 2 +- docs/content/reference/dynamic-configuration/docker.md | 2 +- docs/content/reference/dynamic-configuration/ecs.md | 2 +- docs/content/reference/dynamic-configuration/nomad.md | 2 +- docs/content/reference/dynamic-configuration/rancher.md | 2 +- docs/content/routing/providers/consul-catalog.md | 2 +- docs/content/routing/providers/docker.md | 2 +- docs/content/routing/providers/ecs.md | 2 +- docs/content/routing/providers/kv.md | 2 +- docs/content/routing/providers/marathon.md | 2 +- docs/content/routing/providers/nomad.md | 2 +- docs/content/routing/providers/rancher.md | 2 +- docs/content/routing/routers/index.md | 4 ++-- docs/content/user-guides/docker-compose/acme-dns/index.md | 2 +- integration/fixtures/https/clientca/README.md | 4 ++-- integration/log_rotation_test.go | 2 +- integration/simple_test.go | 2 +- integration/try/try.go | 2 +- pkg/config/kv/kv_node_test.go | 6 +++--- pkg/ip/strategy_test.go | 2 +- pkg/middlewares/accesslog/logger_test.go | 2 +- pkg/middlewares/customerrors/custom_errors.go | 2 +- pkg/middlewares/ratelimiter/rate_limiter.go | 2 +- pkg/provider/acme/provider.go | 2 +- pkg/provider/docker/builder_test.go | 2 +- pkg/provider/docker/config_test.go | 4 ++-- pkg/provider/docker/swarm_test.go | 6 +++--- pkg/redactor/redactor_config_test.go | 2 +- pkg/server/router/router_test.go | 2 +- pkg/tls/certificate_store_test.go | 2 +- pkg/types/domain_test.go | 2 +- webui/src/components/_commons/NavBar.vue | 2 +- 39 files changed, 48 insertions(+), 48 deletions(-) diff --git a/.github/workflows/validate.yaml b/.github/workflows/validate.yaml index 708b88e24..b7195defa 100644 --- a/.github/workflows/validate.yaml +++ b/.github/workflows/validate.yaml @@ -8,7 +8,7 @@ on: env: GO_VERSION: '1.23' GOLANGCI_LINT_VERSION: v1.60.3 - MISSSPELL_VERSION: v0.6.0 + MISSPELL_VERSION: v0.6.0 jobs: @@ -29,8 +29,8 @@ jobs: - name: Install golangci-lint ${{ env.GOLANGCI_LINT_VERSION }} run: curl -sSfL https://raw.githubusercontent.com/golangci/golangci-lint/master/install.sh | sh -s -- -b $(go env GOPATH)/bin ${GOLANGCI_LINT_VERSION} - - name: Install missspell ${{ env.MISSSPELL_VERSION }} - run: curl -sfL https://raw.githubusercontent.com/golangci/misspell/master/install-misspell.sh | sh -s -- -b $(go env GOPATH)/bin ${MISSSPELL_VERSION} + - name: Install misspell ${{ env.MISSPELL_VERSION }} + run: curl -sfL https://raw.githubusercontent.com/golangci/misspell/master/install-misspell.sh | sh -s -- -b $(go env GOPATH)/bin ${MISSPELL_VERSION} - name: Avoid generating webui run: touch webui/static/index.html diff --git a/CODE_OF_CONDUCT.md b/CODE_OF_CONDUCT.md index e917aa340..588d2aa61 100644 --- a/CODE_OF_CONDUCT.md +++ b/CODE_OF_CONDUCT.md @@ -47,7 +47,7 @@ Further details of specific enforcement policies may be posted separately. Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership. -When an inapropriate behavior is reported, maintainers will discuss on the Maintainer's Discord before marking the message as "abuse". +When an inappropriate behavior is reported, maintainers will discuss on the Maintainer's Discord before marking the message as "abuse". This conversation beforehand avoids one-sided decisions. The first message will be edited and marked as abuse. diff --git a/cmd/traefik/traefik.go b/cmd/traefik/traefik.go index 1010ce80a..140242d3d 100644 --- a/cmd/traefik/traefik.go +++ b/cmd/traefik/traefik.go @@ -316,7 +316,7 @@ func setupServer(staticConfiguration *static.Configuration) (*server.Server, err } if _, ok := resolverNames[rt.TLS.CertResolver]; !ok { - log.WithoutContext().Errorf("the router %s uses a non-existent resolver: %s", rtName, rt.TLS.CertResolver) + log.WithoutContext().Errorf("Router %s uses a nonexistent resolver: %s", rtName, rt.TLS.CertResolver) } } }) diff --git a/docs/content/https/acme.md b/docs/content/https/acme.md index 1dad1cca4..07f65b5c3 100644 --- a/docs/content/https/acme.md +++ b/docs/content/https/acme.md @@ -11,7 +11,7 @@ Automatic HTTPS You can configure Traefik to use an ACME provider (like Let's Encrypt) for automatic certificate generation. !!! warning "Let's Encrypt and Rate Limiting" - Note that Let's Encrypt API has [rate limiting](https://letsencrypt.org/docs/rate-limits). These last up to **one week**, and can not be overridden. + Note that Let's Encrypt API has [rate limiting](https://letsencrypt.org/docs/rate-limits). These last up to **one week**, and cannot be overridden. When running Traefik in a container this file should be persisted across restarts. If Traefik requests new certificates each time it starts up, a crash-looping container can quickly reach Let's Encrypt's ratelimits. diff --git a/docs/content/middlewares/http/inflightreq.md b/docs/content/middlewares/http/inflightreq.md index 273b6b25f..6354d5a14 100644 --- a/docs/content/middlewares/http/inflightreq.md +++ b/docs/content/middlewares/http/inflightreq.md @@ -335,7 +335,7 @@ spec: requestHost: true ``` -```yaml tab="Cosul Catalog" +```yaml tab="Consul Catalog" - "traefik.http.middlewares.test-inflightreq.inflightreq.sourcecriterion.requesthost=true" ``` diff --git a/docs/content/migration/v2.md b/docs/content/migration/v2.md index 979fc75e7..e0c000cad 100644 --- a/docs/content/migration/v2.md +++ b/docs/content/migration/v2.md @@ -429,7 +429,7 @@ For more advanced use cases, you can use either the [RedirectScheme middleware]( Following up on the deprecation started [previously](#x509-commonname-deprecation), as the `x509ignoreCN=0` value for the `GODEBUG` is [deprecated in Go 1.17](https://tip.golang.org/doc/go1.17#crypto/x509), -the legacy behavior related to the CommonName field can not be enabled at all anymore. +the legacy behavior related to the CommonName field cannot be enabled at all anymore. ## v2.5.3 to v2.5.4 diff --git a/docs/content/operations/cli.md b/docs/content/operations/cli.md index cf4257ae5..a7c9a7fbf 100644 --- a/docs/content/operations/cli.md +++ b/docs/content/operations/cli.md @@ -33,7 +33,7 @@ traefik [--flag[=true|false| ]] [-f [true|false| ]] All flags are documented in the [(static configuration) CLI reference](../reference/static-configuration/cli.md). -!!! info "Flags are case insensitive." +!!! info "Flags are case-insensitive." ### `healthcheck` diff --git a/docs/content/reference/dynamic-configuration/consul-catalog.md b/docs/content/reference/dynamic-configuration/consul-catalog.md index 534fd953a..2669b8153 100644 --- a/docs/content/reference/dynamic-configuration/consul-catalog.md +++ b/docs/content/reference/dynamic-configuration/consul-catalog.md @@ -8,7 +8,7 @@ description: "View the reference for performing dynamic configurations with Trae Dynamic configuration with Consul Catalog {: .subtitle } -The labels are case insensitive. +The labels are case-insensitive. ```yaml --8<-- "content/reference/dynamic-configuration/consul-catalog.yml" diff --git a/docs/content/reference/dynamic-configuration/docker.md b/docs/content/reference/dynamic-configuration/docker.md index 1d56559bb..3b9163a53 100644 --- a/docs/content/reference/dynamic-configuration/docker.md +++ b/docs/content/reference/dynamic-configuration/docker.md @@ -8,7 +8,7 @@ description: "Reference dynamic configuration with Docker labels in Traefik Prox Dynamic configuration with Docker Labels {: .subtitle } -The labels are case insensitive. +The labels are case-insensitive. ```yaml labels: diff --git a/docs/content/reference/dynamic-configuration/ecs.md b/docs/content/reference/dynamic-configuration/ecs.md index e32038f5a..cf721befd 100644 --- a/docs/content/reference/dynamic-configuration/ecs.md +++ b/docs/content/reference/dynamic-configuration/ecs.md @@ -8,7 +8,7 @@ description: "Learn how to do dynamic configuration in Traefik Proxy with AWS EC Dynamic configuration with ECS provider {: .subtitle } -The labels are case insensitive. +The labels are case-insensitive. ```yaml --8<-- "content/reference/dynamic-configuration/ecs.yml" diff --git a/docs/content/reference/dynamic-configuration/nomad.md b/docs/content/reference/dynamic-configuration/nomad.md index 0a8b334ad..680e621b4 100644 --- a/docs/content/reference/dynamic-configuration/nomad.md +++ b/docs/content/reference/dynamic-configuration/nomad.md @@ -8,7 +8,7 @@ description: "View the reference for performing dynamic configurations with Trae Dynamic configuration with Nomad Service Discovery {: .subtitle } -The labels are case insensitive. +The labels are case-insensitive. ```yaml --8<-- "content/reference/dynamic-configuration/nomad.yml" diff --git a/docs/content/reference/dynamic-configuration/rancher.md b/docs/content/reference/dynamic-configuration/rancher.md index c2762999d..bd658d59f 100644 --- a/docs/content/reference/dynamic-configuration/rancher.md +++ b/docs/content/reference/dynamic-configuration/rancher.md @@ -8,7 +8,7 @@ description: "Read the official Traefik documentation to learn more on dynamic c Dynamic configuration with Rancher Labels {: .subtitle } -The labels are case insensitive. +The labels are case-insensitive. ```yaml labels: diff --git a/docs/content/routing/providers/consul-catalog.md b/docs/content/routing/providers/consul-catalog.md index 786cea2ae..e8b0dc2a2 100644 --- a/docs/content/routing/providers/consul-catalog.md +++ b/docs/content/routing/providers/consul-catalog.md @@ -24,7 +24,7 @@ With Consul Catalog, Traefik can leverage tags attached to a service to generate !!! info "tags" - - tags are case insensitive. + - tags are case-insensitive. - The complete list of tags can be found [the reference page](../../reference/dynamic-configuration/consul-catalog.md) ### General diff --git a/docs/content/routing/providers/docker.md b/docs/content/routing/providers/docker.md index e03e93dce..9e3bd38ae 100644 --- a/docs/content/routing/providers/docker.md +++ b/docs/content/routing/providers/docker.md @@ -147,7 +147,7 @@ With Docker, Traefik can leverage labels attached to a container to generate rou !!! info "Labels" - - Labels are case insensitive. + - Labels are case-insensitive. - The complete list of labels can be found in [the reference page](../../reference/dynamic-configuration/docker.md). ### General diff --git a/docs/content/routing/providers/ecs.md b/docs/content/routing/providers/ecs.md index 1d2e523ba..8f694025a 100644 --- a/docs/content/routing/providers/ecs.md +++ b/docs/content/routing/providers/ecs.md @@ -22,7 +22,7 @@ With ECS, Traefik can leverage labels attached to a container to generate routin !!! info "labels" - - labels are case insensitive. + - labels are case-insensitive. - The complete list of labels can be found in [the reference page](../../reference/dynamic-configuration/ecs.md). ### General diff --git a/docs/content/routing/providers/kv.md b/docs/content/routing/providers/kv.md index be4339b4c..79d16c04f 100644 --- a/docs/content/routing/providers/kv.md +++ b/docs/content/routing/providers/kv.md @@ -12,7 +12,7 @@ A Story of key & values !!! info "Keys" - - Keys are case insensitive. + - Keys are case-insensitive. - The complete list of keys can be found in [the reference page](../../reference/dynamic-configuration/kv.md). ### Routers diff --git a/docs/content/routing/providers/marathon.md b/docs/content/routing/providers/marathon.md index 7c215f1b6..f8659582b 100644 --- a/docs/content/routing/providers/marathon.md +++ b/docs/content/routing/providers/marathon.md @@ -14,7 +14,7 @@ See also [Marathon user guide](../../user-guides/marathon.md). !!! info "Labels" - - Labels are case insensitive. + - Labels are case-insensitive. - The complete list of labels can be found in [the reference page](../../reference/dynamic-configuration/marathon.md). ### General diff --git a/docs/content/routing/providers/nomad.md b/docs/content/routing/providers/nomad.md index 35a2c5a5f..fd3b9fbac 100644 --- a/docs/content/routing/providers/nomad.md +++ b/docs/content/routing/providers/nomad.md @@ -24,7 +24,7 @@ With Nomad, Traefik can leverage tags attached to a service to generate routing !!! info "tags" - - tags are case insensitive. + - tags are case-insensitive. - The complete list of tags can be found [the reference page](../../reference/dynamic-configuration/nomad.md) ### General diff --git a/docs/content/routing/providers/rancher.md b/docs/content/routing/providers/rancher.md index 49215542f..99094331b 100644 --- a/docs/content/routing/providers/rancher.md +++ b/docs/content/routing/providers/rancher.md @@ -29,7 +29,7 @@ With Rancher, Traefik can leverage labels attached to a service to generate rout !!! info "Labels" - - Labels are case insensitive. + - Labels are case-insensitive. - The complete list of labels can be found in [the reference page](../../reference/dynamic-configuration/rancher.md). ### General diff --git a/docs/content/routing/routers/index.md b/docs/content/routing/routers/index.md index e7714af38..bec2ac632 100644 --- a/docs/content/routing/routers/index.md +++ b/docs/content/routing/routers/index.md @@ -259,7 +259,7 @@ The table below lists all the available matchers: The regexp name (`name` in the above example) is an arbitrary value, that exists only for historical reasons. Any `regexp` supported by [Go's regexp package](https://golang.org/pkg/regexp/) may be used. - For example, here is a case insensitive path matcher syntax: ```Path(`/{path:(?i:Products)}`)```. + For example, here is a case-insensitive path matcher syntax: ```Path(`/{path:(?i:Products)}`)```. !!! info "Combining Matchers Using Operators and Parenthesis" @@ -946,7 +946,7 @@ A value of `0` for the priority is ignored: `priority = 0` means that the defaul | Router-2 | ```ClientIP(`192.168.0.0/24`)``` | 26 | Which means that requests from `192.168.0.12` would go to Router-2 even though Router-1 is intended to specifically handle them. - To achieve this intention, a priority (higher than 26) should be set on Router-1. + To achieve this intention, a priority (greater than 26) should be set on Router-1. ??? example "Setting priorities -- using the [File Provider](../../providers/file.md)" diff --git a/docs/content/user-guides/docker-compose/acme-dns/index.md b/docs/content/user-guides/docker-compose/acme-dns/index.md index 5be0287ba..5affbe009 100644 --- a/docs/content/user-guides/docker-compose/acme-dns/index.md +++ b/docs/content/user-guides/docker-compose/acme-dns/index.md @@ -1,6 +1,6 @@ --- title: "Traefik Docker DNS Challenge Documentation" -description: "Learn how to create a certificate with the Let's Encrypt DNS challenge to use HTTPS on a Service exposed with Traefik Proxy. Read the tehnical documentation." +description: "Learn how to create a certificate with the Let's Encrypt DNS challenge to use HTTPS on a Service exposed with Traefik Proxy. Read the technical documentation." --- # Docker-compose with Let's Encrypt: DNS Challenge diff --git a/integration/fixtures/https/clientca/README.md b/integration/fixtures/https/clientca/README.md index 33a5f5260..f870c622d 100644 --- a/integration/fixtures/https/clientca/README.md +++ b/integration/fixtures/https/clientca/README.md @@ -48,7 +48,7 @@ openssl genrsa -out client3.key 2048 # Locality Name (eg, city) []:. # Organization Name (eg, company) [Internet Widgits Pty Ltd]:. # Organizational Unit Name (eg, section) []:. -# Common Name (e.g. server FQDN or YOUR name) []:clien1.example.com +# Common Name (e.g. server FQDN or YOUR name) []:client1.example.com # Email Address []:. # # Please enter the following 'extra' attributes @@ -58,7 +58,7 @@ openssl genrsa -out client3.key 2048 # Issuer # CN = ca1.example.com # Subject -# CN = clien1.example.com +# CN = client1.example.com openssl req -key client1.key -new -out client1.csr # Country Name (2 letter code) [AU]:. diff --git a/integration/log_rotation_test.go b/integration/log_rotation_test.go index ebabcfd5b..e5979e50d 100644 --- a/integration/log_rotation_test.go +++ b/integration/log_rotation_test.go @@ -27,7 +27,7 @@ const ( // Log rotation integration test suite. type LogRotationSuite struct{ BaseSuite } -func TestLogRorationSuite(t *testing.T) { +func TestLogRotationSuite(t *testing.T) { suite.Run(t, new(LogRotationSuite)) } diff --git a/integration/simple_test.go b/integration/simple_test.go index fc5936069..8ab5e0626 100644 --- a/integration/simple_test.go +++ b/integration/simple_test.go @@ -1288,7 +1288,7 @@ func (s *SimpleSuite) TestDebugLog() { req, err := http.NewRequest(http.MethodGet, "http://localhost:8000/whoami", http.NoBody) require.NoError(s.T(), err) - req.Header.Set("Autorization", "Bearer ThisIsABearerToken") + req.Header.Set("Authorization", "Bearer ThisIsABearerToken") response, err := http.DefaultClient.Do(req) require.NoError(s.T(), err) diff --git a/integration/try/try.go b/integration/try/try.go index af54eb8f0..9f17267e0 100644 --- a/integration/try/try.go +++ b/integration/try/try.go @@ -19,7 +19,7 @@ const ( type timedAction func(timeout time.Duration, operation DoCondition) error // Sleep pauses the current goroutine for at least the duration d. -// Deprecated: Use only when use an other Try[...] functions is not possible. +// Deprecated: Use only when use another Try[...] functions is not possible. func Sleep(d time.Duration) { d = applyCIMultiplier(d) time.Sleep(d) diff --git a/pkg/config/kv/kv_node_test.go b/pkg/config/kv/kv_node_test.go index 86b7d6ea2..7712b839e 100644 --- a/pkg/config/kv/kv_node_test.go +++ b/pkg/config/kv/kv_node_test.go @@ -70,8 +70,8 @@ func TestDecodeToNode(t *testing.T) { { desc: "several entries, level 0", in: map[string]string{ - "traefik": "bar", - "traefic": "bur", + "traefik": "bar", + "traefik_": "bur", }, expected: expected{error: true}, }, @@ -120,7 +120,7 @@ func TestDecodeToNode(t *testing.T) { }}, }, { - desc: "several entries, level 2, case insensitive", + desc: "several entries, level 2, case-insensitive", in: map[string]string{ "traefik/foo/aaa": "bar", "traefik/Foo/bbb": "bur", diff --git a/pkg/ip/strategy_test.go b/pkg/ip/strategy_test.go index 8bc5d285e..b836223eb 100644 --- a/pkg/ip/strategy_test.go +++ b/pkg/ip/strategy_test.go @@ -46,7 +46,7 @@ func TestDepthStrategy_GetIP(t *testing.T) { expected: "10.0.0.3", }, { - desc: "Use non existing depth in XForwardedFor", + desc: "Use nonexistent depth in XForwardedFor", depth: 2, xForwardedFor: "", expected: "", diff --git a/pkg/middlewares/accesslog/logger_test.go b/pkg/middlewares/accesslog/logger_test.go index 46563db61..d205bb9d7 100644 --- a/pkg/middlewares/accesslog/logger_test.go +++ b/pkg/middlewares/accesslog/logger_test.go @@ -162,7 +162,7 @@ func TestLoggerHeaderFields(t *testing.T) { }, }, { - desc: "with case insensitive match on header name", + desc: "with case-insensitive match on header name", header: "User-Agent", expected: types.AccessLogKeep, accessLogFields: types.AccessLogFields{ diff --git a/pkg/middlewares/customerrors/custom_errors.go b/pkg/middlewares/customerrors/custom_errors.go index 39d411622..bd5b78baa 100644 --- a/pkg/middlewares/customerrors/custom_errors.go +++ b/pkg/middlewares/customerrors/custom_errors.go @@ -249,7 +249,7 @@ func (cc *codeCatcher) Flush() { // since we want to serve the ones from the error page, // so we just don't flush. // (e.g., To prevent superfluous WriteHeader on request with a - // `Transfert-Encoding: chunked` header). + // `Transfer-Encoding: chunked` header). if cc.caughtFilteredCode { return } diff --git a/pkg/middlewares/ratelimiter/rate_limiter.go b/pkg/middlewares/ratelimiter/rate_limiter.go index e06679787..390163463 100644 --- a/pkg/middlewares/ratelimiter/rate_limiter.go +++ b/pkg/middlewares/ratelimiter/rate_limiter.go @@ -147,7 +147,7 @@ func (rl *rateLimiter) ServeHTTP(w http.ResponseWriter, r *http.Request) { } // We Set even in the case where the source already exists, - // because we want to update the expiryTime everytime we get the source, + // because we want to update the expiryTime every time we get the source, // as the expiryTime is supposed to reflect the activity (or lack thereof) on that source. if err := rl.buckets.Set(source, bucket, rl.ttl); err != nil { logger.Errorf("could not insert/update bucket: %v", err) diff --git a/pkg/provider/acme/provider.go b/pkg/provider/acme/provider.go index f0a13d0ca..3b4c6d845 100644 --- a/pkg/provider/acme/provider.go +++ b/pkg/provider/acme/provider.go @@ -728,7 +728,7 @@ func deleteUnnecessaryDomains(ctx context.Context, domains []types.Domain) []typ } // Check if CN or SANS to check already exists - // or can not be checked by a wildcard + // or cannot be checked by a wildcard var newDomainsToCheck []string for _, domainProcessed := range domainToCheck.ToStrArray() { if idxDomain < idxDomainToCheck && isDomainAlreadyChecked(domainProcessed, domain.ToStrArray()) { diff --git a/pkg/provider/docker/builder_test.go b/pkg/provider/docker/builder_test.go index f8723c74e..1213b7c01 100644 --- a/pkg/provider/docker/builder_test.go +++ b/pkg/provider/docker/builder_test.go @@ -205,7 +205,7 @@ func withEndpointSpec(ops ...func(*swarm.EndpointSpec)) func(*swarm.Service) { } } -func modeDNSSR(spec *swarm.EndpointSpec) { +func modeDNSRR(spec *swarm.EndpointSpec) { spec.Mode = swarm.ResolutionModeDNSRR } diff --git a/pkg/provider/docker/config_test.go b/pkg/provider/docker/config_test.go index 9d55bd2b9..ed371e7ad 100644 --- a/pkg/provider/docker/config_test.go +++ b/pkg/provider/docker/config_test.go @@ -3870,7 +3870,7 @@ func TestSwarmGetIPAddress(t *testing.T) { networks map[string]*network.Summary }{ { - service: swarmService(withEndpointSpec(modeDNSSR)), + service: swarmService(withEndpointSpec(modeDNSRR)), expected: "", networks: map[string]*network.Summary{}, }, @@ -3935,7 +3935,7 @@ func TestSwarmGetPort(t *testing.T) { }{ { service: swarmService( - withEndpointSpec(modeDNSSR), + withEndpointSpec(modeDNSRR), ), networks: map[string]*network.Summary{}, serverPort: "8080", diff --git a/pkg/provider/docker/swarm_test.go b/pkg/provider/docker/swarm_test.go index 951983f82..b1e51083d 100644 --- a/pkg/provider/docker/swarm_test.go +++ b/pkg/provider/docker/swarm_test.go @@ -156,7 +156,7 @@ func TestListServices(t *testing.T) { "traefik.docker.network": "barnet", "traefik.docker.LBSwarm": "true", }), - withEndpointSpec(modeDNSSR)), + withEndpointSpec(modeDNSRR)), }, dockerVersion: "1.30", networks: []network.Summary{}, @@ -182,7 +182,7 @@ func TestListServices(t *testing.T) { "traefik.docker.network": "barnet", "traefik.docker.LBSwarm": "true", }), - withEndpointSpec(modeDNSSR)), + withEndpointSpec(modeDNSRR)), }, dockerVersion: "1.30", networks: []network.Summary{ @@ -227,7 +227,7 @@ func TestListServices(t *testing.T) { serviceLabels(map[string]string{ "traefik.docker.network": "barnet", }), - withEndpointSpec(modeDNSSR)), + withEndpointSpec(modeDNSRR)), }, tasks: []swarm.Task{ swarmTask("id1", diff --git a/pkg/redactor/redactor_config_test.go b/pkg/redactor/redactor_config_test.go index 1e7b8449e..468db5d62 100644 --- a/pkg/redactor/redactor_config_test.go +++ b/pkg/redactor/redactor_config_test.go @@ -786,7 +786,7 @@ func TestDo_staticConfiguration(t *testing.T) { } config.Providers.HTTP = &http.Provider{ - Endpoint: "Myenpoint", + Endpoint: "Myendpoint", PollInterval: 42, PollTimeout: 42, TLS: &types.ClientTLS{ diff --git a/pkg/server/router/router_test.go b/pkg/server/router/router_test.go index d5fba5af1..3f6c9bbe9 100644 --- a/pkg/server/router/router_test.go +++ b/pkg/server/router/router_test.go @@ -986,7 +986,7 @@ func BenchmarkService(b *testing.B) { LoadBalancer: &dynamic.ServersLoadBalancer{ Servers: []dynamic.Server{ { - URL: "tchouck", + URL: "tchouk", }, }, }, diff --git a/pkg/tls/certificate_store_test.go b/pkg/tls/certificate_store_test.go index aaf55b647..4cd541d78 100644 --- a/pkg/tls/certificate_store_test.go +++ b/pkg/tls/certificate_store_test.go @@ -47,7 +47,7 @@ func TestGetBestCertificate(t *testing.T) { expectedCert: "*.snitest.com", }, { - desc: "Best Match with dynamic wildcard only, case insensitive", + desc: "Best Match with dynamic wildcard only, case-insensitive", domainToCheck: "bar.www.snitest.com", dynamicCert: "*.www.snitest.com", expectedCert: "*.www.snitest.com", diff --git a/pkg/types/domain_test.go b/pkg/types/domain_test.go index f9f7d42cb..490e1732a 100644 --- a/pkg/types/domain_test.go +++ b/pkg/types/domain_test.go @@ -137,7 +137,7 @@ func TestMatchDomain(t *testing.T) { expected: true, }, { - desc: "dot replaced by a cahr", + desc: "dot replaced by a char", certDomain: "sub.sub.traefik.wtf", domain: "sub.sub.traefikiwtf", expected: false, diff --git a/webui/src/components/_commons/NavBar.vue b/webui/src/components/_commons/NavBar.vue index d57d68dd5..8a618b9d4 100644 --- a/webui/src/components/_commons/NavBar.vue +++ b/webui/src/components/_commons/NavBar.vue @@ -129,7 +129,7 @@ align="left" icon="eva-github-outline" no-caps - label="Github repository" + label="GitHub repository" class="btn-submenu full-width" />