From d99996c9b3e63188c1ccdc2e28ad6069ac1c4ef1 Mon Sep 17 00:00:00 2001 From: "data-plane-api(CircleCI)" Date: Thu, 27 Sep 2018 15:02:22 +0000 Subject: [PATCH] ci: Add spell checker to ci (#4439) Correct commonly misspelled English words Signed-off-by: zyfjeff Mirrored from https://github.com/envoyproxy/envoy @ 31d0611d0ffb982414974adaf6940afd1863fa95 --- envoy/api/v2/listener/listener.proto | 2 +- envoy/config/filter/http/jwt_authn/v2alpha/README.md | 2 +- .../http_connection_manager/v2/http_connection_manager.proto | 2 +- envoy/config/rbac/v2alpha/rbac.proto | 4 ++-- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/envoy/api/v2/listener/listener.proto b/envoy/api/v2/listener/listener.proto index 1e8015db..d72de02c 100644 --- a/envoy/api/v2/listener/listener.proto +++ b/envoy/api/v2/listener/listener.proto @@ -61,7 +61,7 @@ message Filter { // 4. Transport protocol. // 5. Application protocols (e.g. ALPN for TLS protocol). // -// For criterias that allow ranges or wildcards, the most specific value in any +// For criteria that allow ranges or wildcards, the most specific value in any // of the configured filter chains that matches the incoming connection is going // to be used (e.g. for SNI ``www.example.com`` the most specific match would be // ``www.example.com``, then ``*.example.com``, then ``*.com``, then any filter diff --git a/envoy/config/filter/http/jwt_authn/v2alpha/README.md b/envoy/config/filter/http/jwt_authn/v2alpha/README.md index d7aac1ad..9d083389 100644 --- a/envoy/config/filter/http/jwt_authn/v2alpha/README.md +++ b/envoy/config/filter/http/jwt_authn/v2alpha/README.md @@ -26,6 +26,6 @@ The next default location is in the query parameter as: If a custom location is desired, `from_headers` or `from_params` can be used to specify custom locations to extract JWT. -## HTTP header to pass sucessfully verified JWT +## HTTP header to pass successfully verified JWT If a JWT is valid, its payload will be passed to the backend in a new HTTP header specified in `forward_payload_header` field. Its value is base64 encoded JWT payload in JSON. diff --git a/envoy/config/filter/network/http_connection_manager/v2/http_connection_manager.proto b/envoy/config/filter/network/http_connection_manager/v2/http_connection_manager.proto index 7e089d8e..4c8c93ac 100644 --- a/envoy/config/filter/network/http_connection_manager/v2/http_connection_manager.proto +++ b/envoy/config/filter/network/http_connection_manager/v2/http_connection_manager.proto @@ -219,7 +219,7 @@ message HttpConnectionManager { bool unix_sockets = 1; } - // Configures what network addresses are considered internal for stats and header sanitazion + // Configures what network addresses are considered internal for stats and header sanitation // purposes. If unspecified, only RFC1918 IP addresses will be considered internal. // See the documentation for :ref:`config_http_conn_man_headers_x-envoy-internal` for more // information about internal/external addresses. diff --git a/envoy/config/rbac/v2alpha/rbac.proto b/envoy/config/rbac/v2alpha/rbac.proto index c5d8f1d8..d7431eb0 100644 --- a/envoy/config/rbac/v2alpha/rbac.proto +++ b/envoy/config/rbac/v2alpha/rbac.proto @@ -108,7 +108,7 @@ message Permission { // When any is set, it matches any action. bool any = 3 [(validate.rules).bool.const = true]; - // A header (or psuedo-header such as :path or :method) on the incoming HTTP request. Only + // A header (or pseudo-header such as :path or :method) on the incoming HTTP request. Only // available for HTTP request. envoy.api.v2.route.HeaderMatcher header = 4; @@ -166,7 +166,7 @@ message Principal { // A CIDR block that describes the downstream IP. envoy.api.v2.core.CidrRange source_ip = 5; - // A header (or psuedo-header such as :path or :method) on the incoming HTTP request. Only + // A header (or pseudo-header such as :path or :method) on the incoming HTTP request. Only // available for HTTP request. envoy.api.v2.route.HeaderMatcher header = 6;