diff --git a/hgctl/pkg/installer/installer_k8s.go b/hgctl/pkg/installer/installer_k8s.go index c401548b0..edfedf622 100644 --- a/hgctl/pkg/installer/installer_k8s.go +++ b/hgctl/pkg/installer/installer_k8s.go @@ -65,7 +65,7 @@ func (o *K8sInstaller) Install() error { return err1 } fmt.Fprintf(o.writer, "\n✔️ Wrote Profile in kubernetes configmap: \"%s\" \n", profileName) - fmt.Fprintf(o.writer, "\n Use bellow kubectl command to edit profile for upgrade. \n") + fmt.Fprintf(o.writer, "\n Use below kubectl command to edit profile for upgrade. \n") fmt.Fprintf(o.writer, " ================================================================================== \n") names := strings.Split(profileName, "/") fmt.Fprintf(o.writer, " kubectl edit configmap %s -n %s \n", names[1], names[0]) diff --git a/pkg/ingress/config/ingress_config.go b/pkg/ingress/config/ingress_config.go index eac18c745..7f1105818 100644 --- a/pkg/ingress/config/ingress_config.go +++ b/pkg/ingress/config/ingress_config.go @@ -1113,7 +1113,7 @@ func (m *IngressConfig) AddOrUpdateWasmPlugin(clusterNamespacedName util.Cluster Labels: map[string]string{constants.AlwaysPushLabel: "true"}, } for _, f := range m.wasmPluginHandlers { - IngressLog.Debug("WasmPlugin triggerd update") + IngressLog.Debug("WasmPlugin triggered update") f(config.Config{Meta: metadata}, config.Config{Meta: metadata}, istiomodel.EventUpdate) } istioWasmPlugin, err := m.convertIstioWasmPlugin(&wasmPlugin.Spec) @@ -1155,7 +1155,7 @@ func (m *IngressConfig) DeleteWasmPlugin(clusterNamespacedName util.ClusterNames Labels: map[string]string{constants.AlwaysPushLabel: "true"}, } for _, f := range m.wasmPluginHandlers { - IngressLog.Debug("WasmPlugin triggerd update") + IngressLog.Debug("WasmPlugin triggered update") f(config.Config{Meta: metadata}, config.Config{Meta: metadata}, istiomodel.EventDelete) } } @@ -1211,23 +1211,23 @@ func (m *IngressConfig) AddOrUpdateMcpBridge(clusterNamespacedName util.ClusterN } for _, f := range m.serviceEntryHandlers { - IngressLog.Debug("McpBridge triggerd serviceEntry update") + IngressLog.Debug("McpBridge triggered serviceEntry update") f(config.Config{Meta: seMetadata}, config.Config{Meta: seMetadata}, istiomodel.EventUpdate) } for _, f := range m.destinationRuleHandlers { - IngressLog.Debug("McpBridge triggerd destinationRule update") + IngressLog.Debug("McpBridge triggered destinationRule update") f(config.Config{Meta: drMetadata}, config.Config{Meta: drMetadata}, istiomodel.EventUpdate) } for _, f := range m.virtualServiceHandlers { - IngressLog.Debug("McpBridge triggerd virtualservice update") + IngressLog.Debug("McpBridge triggered virtualservice update") f(config.Config{Meta: vsMetadata}, config.Config{Meta: vsMetadata}, istiomodel.EventUpdate) } for _, f := range m.wasmPluginHandlers { - IngressLog.Debug("McpBridge triggerd wasmplugin update") + IngressLog.Debug("McpBridge triggered wasmplugin update") f(config.Config{Meta: wasmMetadata}, config.Config{Meta: wasmMetadata}, istiomodel.EventUpdate) } for _, f := range m.envoyFilterHandlers { - IngressLog.Debug("McpBridge triggerd envoyfilter update") + IngressLog.Debug("McpBridge triggered envoyfilter update") f(config.Config{Meta: efMetadata}, config.Config{Meta: efMetadata}, istiomodel.EventUpdate) } }, m.localKubeClient, m.namespace, m.clusterId.String()) @@ -1295,7 +1295,7 @@ func (m *IngressConfig) DeleteHttp2Rpc(clusterNamespacedName util.ClusterNamespa } m.mutex.Unlock() if hit { - IngressLog.Infof("Http2Rpc triggerd deleted event executed %s", clusterNamespacedName.Name) + IngressLog.Infof("Http2Rpc triggered deleted event executed %s", clusterNamespacedName.Name) push := func(gvk config.GroupVersionKind) { m.XDSUpdater.ConfigUpdate(&istiomodel.PushRequest{ Full: true, diff --git a/pkg/ingress/kube/configmap/controller.go b/pkg/ingress/kube/configmap/controller.go index 04b03add3..3d6c83e2d 100644 --- a/pkg/ingress/kube/configmap/controller.go +++ b/pkg/ingress/kube/configmap/controller.go @@ -158,7 +158,7 @@ func (c *ConfigmapMgr) AddOrUpdateHigressConfig(name util.ClusterNamespacedName) IngressLog.Infof("configmapMgr oldHigressConfig: %s", GetHigressConfigString(oldHigressConfig)) IngressLog.Infof("configmapMgr newHigressConfig: %s", GetHigressConfigString(newHigressConfig)) result, _ := c.CompareHigressConfig(oldHigressConfig, newHigressConfig) - IngressLog.Infof("configmapMgr CompareHigressConfig reuslt is %d", result) + IngressLog.Infof("configmapMgr CompareHigressConfig result is %d", result) if result == ResultNothing { return @@ -177,7 +177,7 @@ func (c *ConfigmapMgr) AddOrUpdateHigressConfig(name util.ClusterNamespacedName) } } c.SetHigressConfig(newHigressConfig) - IngressLog.Infof("configmapMgr higress config AddOrUpdate success, reuslt is %d", result) + IngressLog.Infof("configmapMgr higress config AddOrUpdate success, result is %d", result) // Call updateConfig } diff --git a/pkg/ingress/kube/kingress/controller_test.go b/pkg/ingress/kube/kingress/controller_test.go index c1392fa89..c6720510b 100644 --- a/pkg/ingress/kube/kingress/controller_test.go +++ b/pkg/ingress/kube/kingress/controller_test.go @@ -286,7 +286,7 @@ func testConvertHTTPRoute(t *testing.T, c common.KIngressController) { expectNoError: true, }, { - description: "valid httpRoute convention, vaild ingress", + description: "valid httpRoute convention, valid ingress", input: struct { options *common.ConvertOptions wrapperConfig *common.WrapperConfig diff --git a/plugins/golang-filter/mcp-server/registry/nacos/nacos.go b/plugins/golang-filter/mcp-server/registry/nacos/nacos.go index 035dc1c3a..95b781498 100644 --- a/plugins/golang-filter/mcp-server/registry/nacos/nacos.go +++ b/plugins/golang-filter/mcp-server/registry/nacos/nacos.go @@ -77,7 +77,7 @@ func (n *NacosMcpRegistry) refreshToolsListForGroup(group string, serviceMatcher serviceList := services.Doms pattern, err := regexp.Compile(serviceMatcher) if err != nil { - api.LogErrorf("Match service error for patter %s", serviceMatcher) + api.LogErrorf("Match service error for pattern %s", serviceMatcher) return false } diff --git a/plugins/wasm-go/pkg/wrapper/plugin_wrapper.go b/plugins/wasm-go/pkg/wrapper/plugin_wrapper.go index 8499dc1ad..b1a2da922 100644 --- a/plugins/wasm-go/pkg/wrapper/plugin_wrapper.go +++ b/plugins/wasm-go/pkg/wrapper/plugin_wrapper.go @@ -116,7 +116,7 @@ type TickFuncEntry struct { var globalOnTickFuncs []TickFuncEntry = []TickFuncEntry{} -// Registe multiple onTick functions. Parameters include: +// Register multiple onTick functions. Parameters include: // 1) tickPeriod: the execution period of tickFunc, this value should be a multiple of 100 // 2) tickFunc: the function to be executed // diff --git a/plugins/wasm-go/pkg/wrapper/redis_wrapper.go b/plugins/wasm-go/pkg/wrapper/redis_wrapper.go index a134d2486..91422cf41 100644 --- a/plugins/wasm-go/pkg/wrapper/redis_wrapper.go +++ b/plugins/wasm-go/pkg/wrapper/redis_wrapper.go @@ -143,7 +143,7 @@ func RedisCall(cluster Cluster, respQuery []byte, callback RedisResponseCallback response, err := proxywasm.GetRedisCallResponse(0, responseSize) var responseValue resp.Value if status != 0 { - proxywasm.LogCriticalf("Error occured while calling redis, it seems cannot connect to the redis cluster. request-id: %s", requestID) + proxywasm.LogCriticalf("Error occurred while calling redis, it seems cannot connect to the redis cluster. request-id: %s", requestID) responseValue = resp.ErrorValue(fmt.Errorf("cannot connect to redis cluster")) } else { if err != nil { diff --git a/test/e2e/conformance/tests/go-wasm-key-auth.go b/test/e2e/conformance/tests/go-wasm-key-auth.go index 3adb7ecab..44413d8cc 100644 --- a/test/e2e/conformance/tests/go-wasm-key-auth.go +++ b/test/e2e/conformance/tests/go-wasm-key-auth.go @@ -116,7 +116,7 @@ var WasmPluginsKeyAuth = suite.ConformanceTest{ }, { Meta: http.AssertionMeta{ - TestCaseName: "case 5: Muti Key Authentication information found", + TestCaseName: "case 5: Multi Key Authentication information found", TargetBackend: "infra-backend-v1", TargetNamespace: "higress-conformance-infra", }, diff --git a/test/e2e/conformance/tests/go-wasm-transformer.go b/test/e2e/conformance/tests/go-wasm-transformer.go index ec0e677b6..33b121656 100644 --- a/test/e2e/conformance/tests/go-wasm-transformer.go +++ b/test/e2e/conformance/tests/go-wasm-transformer.go @@ -167,7 +167,7 @@ var WasmPluginsTransformer = suite.ConformanceTest{ }, { Meta: http.AssertionMeta{ - TestCaseName: "case 4: request transformer with arbitary order", + TestCaseName: "case 4: request transformer with arbitrary order", TargetBackend: "infra-backend-v1", TargetNamespace: "higress-conformance-infra", }, @@ -204,7 +204,7 @@ var WasmPluginsTransformer = suite.ConformanceTest{ { Meta: http.AssertionMeta{ - TestCaseName: "case 5: response transformer with arbitary order", + TestCaseName: "case 5: response transformer with arbitrary order", TargetBackend: "infra-backend-v1", TargetNamespace: "higress-conformance-infra", },