Skip to content

Commit 2b499d9

Browse files
authoredDec 6, 2021
Fix spelling in documentation and top-level files (kubernetes#8009)
* fix typos in docs * fix typos in top-level files
1 parent bc4c86a commit 2b499d9

File tree

7 files changed

+8
-8
lines changed

7 files changed

+8
-8
lines changed
 

‎CONTRIBUTING.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ All changes must be code reviewed. Coding conventions and standards are explaine
3636

3737
Ingress Nginx collaborators may add "/lgtm" (Looks Good To Me) to indicate that a PR is acceptable. Any change requires at least one LGTM. No pull requests can be merged until at least one Ingress Nginx collaborator signs off with an LGTM. Adding the "/lgtm" comment result in the prow bot adding the `lgtm` label. Note that a pull request still needs an `approve` label from one of the owners.
3838

39-
Reviewers or members who want to become reviewers according to the [k8s membership ladder](https://github.com/kubernetes/community/blob/master/community-membership.md), coud actively search for [pull requests that need a review](https://github.com/kubernetes/ingress-nginx/pulls?q=is%3Aopen+is%3Apr+label%3Atriage%2Faccepted).
39+
Reviewers or members who want to become reviewers according to the [k8s membership ladder](https://github.com/kubernetes/community/blob/master/community-membership.md), could actively search for [pull requests that need a review](https://github.com/kubernetes/ingress-nginx/pulls?q=is%3Aopen+is%3Apr+label%3Atriage%2Faccepted).
4040

4141
## Support Channels
4242

‎RELEASE.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@
2222

2323
### d. Merge
2424

25-
- Merging will fire cloudbuild, which will result in images beeing promoted to the [staging container registry](https://console.cloud.google.com/gcr/images/k8s-staging-ingress-nginx).
25+
- Merging will fire cloudbuild, which will result in images being promoted to the [staging container registry](https://console.cloud.google.com/gcr/images/k8s-staging-ingress-nginx).
2626

2727
### e. Make sure cloudbuild is a success
2828

@@ -68,7 +68,7 @@
6868

6969
### d. Merge
7070

71-
- Merging will fire cloudbuild, which will result in images beeing promoted to the [staging container registry](https://console.cloud.google.com/gcr/images/k8s-staging-ingress-nginx).
71+
- Merging will fire cloudbuild, which will result in images being promoted to the [staging container registry](https://console.cloud.google.com/gcr/images/k8s-staging-ingress-nginx).
7272

7373
### e. Make sure cloudbuild is a success
7474

‎docs/developer-guide/code-overview.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Describe here `kubectl plugin`, `dbg`, `waitshutdown` and cover the hack scripts
103103

104104
## Deploy files
105105

106-
This directory contains the `yaml` deploy files used as examples or references in the docs to deploy Ingress NGINX and other componentes.
106+
This directory contains the `yaml` deploy files used as examples or references in the docs to deploy Ingress NGINX and other components.
107107

108108
Those files are in [deploy](https://github.com/kubernetes/ingress-nginx/tree/main/deploy) directory.
109109

‎docs/developer-guide/getting-started.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Start a local Kubernetes cluster using [kind](https://kind.sigs.k8s.io/), build
2929
```console
3030
make dev-env
3131
```
32-
- If you are working on the v1.x.x version of this controler, and you want to create a cluster with kubernetes version 1.22, then please visit the [documentation for kind](https://kind.sigs.k8s.io/docs/user/configuration/#a-note-on-cli-parameters-and-configuration-files), and look for how to set a custom image for the kind node (image: kindest/node...), in the kind config file.
32+
- If you are working on the v1.x.x version of this controller, and you want to create a cluster with kubernetes version 1.22, then please visit the [documentation for kind](https://kind.sigs.k8s.io/docs/user/configuration/#a-note-on-cli-parameters-and-configuration-files), and look for how to set a custom image for the kind node (image: kindest/node...), in the kind config file.
3333

3434
### Testing
3535

‎docs/user-guide/monitoring.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -166,5 +166,5 @@ According to the above example, this URL will be http://10.192.0.3:31086
166166
- This will open the currently deployed service grafana in the default editor configured in your shell (vi/nvim/nano/other)
167167
- scroll down to line 34 that looks like "type: NodePort"
168168
- change it to look like "type: ClusterIP". Save and exit.
169-
- create a ingress reource with backend as "grafana" and port as "3000"
169+
- create a ingress resource with backend as "grafana" and port as "3000"
170170
- Similarly, you can edit the service "prometheus-server" and add a ingress resource.

‎docs/user-guide/nginx-configuration/annotations.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -775,7 +775,7 @@ nginx.ingress.kubernetes.io/enable-opentracing: "true"
775775
### Opentracing Trust Incoming Span
776776

777777
The option to trust incoming trace spans can be enabled or disabled globally through the ConfigMap but this will
778-
sometimes need to be overriden to enable it or disable it for a specific ingress (e.g. only enable on a private endpoint)
778+
sometimes need to be overridden to enable it or disable it for a specific ingress (e.g. only enable on a private endpoint)
779779

780780
```yaml
781781
nginx.ingress.kubernetes.io/opentracing-trust-incoming-span: "true"

‎docs/user-guide/nginx-configuration/configmap.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1267,7 +1267,7 @@ _**default:**_ "false"
12671267

12681268
## ssl-reject-handshake
12691269

1270-
Set to reject SSL handshake to an unknown virtualhost. This paramter helps to mitigate the fingerprinting using default certificate of ingress.
1270+
Set to reject SSL handshake to an unknown virtualhost. This parameter helps to mitigate the fingerprinting using default certificate of ingress.
12711271
_**default:**_ "false"
12721272

12731273
_References:_

0 commit comments

Comments
 (0)
Please sign in to comment.