Skip to content

Commit

Permalink
pkg/agent/cniserver: fix typos in comments (#5958)
Browse files Browse the repository at this point in the history
Signed-off-by: Daman Arora <[email protected]>
  • Loading branch information
aroradaman authored Feb 5, 2024
1 parent cb8b783 commit 4beb773
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 5 deletions.
3 changes: 1 addition & 2 deletions pkg/agent/cniserver/interface_configuration_linux.go
Original file line number Diff line number Diff line change
Expand Up @@ -250,8 +250,7 @@ func (ic *ifConfigurator) configureContainerLinkVeth(
result *current.Result,
) error {
// Include the container veth interface name in the name generation, as one Pod can have more
// than one interfaces inc. secondary interfaces, while the host interface name must be
// be unique.
// than one interfaces inc. secondary interfaces, while the host interface name must be unique.
hostIfaceName := util.GenerateContainerHostVethName(podName, podNamespace, containerID, containerIfaceName)

hostIface := &current.Interface{Name: hostIfaceName}
Expand Down
2 changes: 1 addition & 1 deletion pkg/agent/cniserver/pod_configuration.go
Original file line number Diff line number Diff line change
Expand Up @@ -155,7 +155,7 @@ func getContainerIPsString(ips []net.IP) string {

// ParseOVSPortInterfaceConfig reads the Pod properties saved in the OVS port
// external_ids, initializes and returns an InterfaceConfig struct.
// nill will be returned, if the OVS port does not have external IDs or it is
// nil will be returned, if the OVS port does not have external IDs or it is
// not created for a Pod interface.
func ParseOVSPortInterfaceConfig(portData *ovsconfig.OVSPortData, portConfig *interfacestore.OVSPortConfig) *interfacestore.InterfaceConfig {
if portData.ExternalIDs == nil {
Expand Down
4 changes: 2 additions & 2 deletions pkg/agent/cniserver/server.go
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ const (
networkReadyTimeout = 30 * time.Second
)

// containerAccessArbitrator is used to ensure that concurrent goroutines cannot perfom operations
// containerAccessArbitrator is used to ensure that concurrent goroutines cannot perform operations
// on the same containerID. Other parts of the code make this assumption (in particular the
// InstallPodFlows / UninstallPodFlows methods of the OpenFlow client, which are invoked
// respectively by CmdAdd and CmdDel). The idea is to simply the locking requirements for the rest
Expand Down Expand Up @@ -112,7 +112,7 @@ type CNIServer struct {
routeClient route.Interface
isChaining bool
enableBridgingMode bool
// Enable AntreaIPAM for secondary networks implementd by other CNIs.
// Enable AntreaIPAM for secondary networks implemented by other CNIs.
enableSecondaryNetworkIPAM bool
disableTXChecksumOffload bool
networkConfig *config.NetworkConfig
Expand Down

0 comments on commit 4beb773

Please sign in to comment.