mirror of
https://github.com/tailscale/tailscale.git
synced 2025-08-11 13:18:53 +00:00
all: fix spelling mistakes
Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
This commit is contained in:

committed by
Brad Fitzpatrick

parent
e73657d7aa
commit
d4811f11a0
@@ -570,7 +570,7 @@ func unicastIPNets(ifc *winipcfg.IPAdapterAddresses) []netip.Prefix {
|
||||
//
|
||||
// Any IPv6 link-local addresses are not deleted out of caution as some
|
||||
// configurations may repeatedly re-add them. Link-local addresses are adjusted
|
||||
// to set SkipAsSource. SkipAsSource prevents the addresses from being addded to
|
||||
// to set SkipAsSource. SkipAsSource prevents the addresses from being added to
|
||||
// DNS locally or remotely and from being picked as a source address for
|
||||
// outgoing packets with unspecified sources. See #4647 and
|
||||
// https://web.archive.org/web/20200912120956/https://devblogs.microsoft.com/scripting/use-powershell-to-change-ip-behavior-with-skipassource/
|
||||
|
@@ -214,7 +214,7 @@ func newUserspaceRouterAdvanced(logf logger.Logf, tunname string, linkMon *monit
|
||||
//
|
||||
// As such, if we are running on openWRT, detect a mwan3 config, AND detect a rule
|
||||
// with a preference 2001 (corresponding to the first interface wman3 manages), we
|
||||
// shift the priority of our policies to 13xx. This effectively puts us betwen mwan3's
|
||||
// shift the priority of our policies to 13xx. This effectively puts us between mwan3's
|
||||
// permit-by-src-ip rules and mwan3 lookup of its own routing table which would drop
|
||||
// the packet.
|
||||
isMWAN3, err := checkOpenWRTUsingMWAN3()
|
||||
|
@@ -148,7 +148,7 @@ func (r *userspaceBSDRouter) Set(cfg *Config) (reterr error) {
|
||||
}
|
||||
newRoutes[route] = struct{}{}
|
||||
}
|
||||
// Delete any pre-existing routes.
|
||||
// Delete any preexisting routes.
|
||||
for route := range r.routes {
|
||||
if _, keep := newRoutes[route]; !keep {
|
||||
net := netipx.PrefixIPNet(route)
|
||||
|
@@ -120,7 +120,7 @@ func cleanup(logf logger.Logf, interfaceName string) {
|
||||
// but it can be REALLY SLOW to change the Windows firewall for reasons not understood.
|
||||
// Like 4 minutes slow. But usually it's tens of milliseconds.
|
||||
// See https://github.com/tailscale/tailscale/issues/785.
|
||||
// So this tracks the desired state and runs the actual adjusting code asynchrounsly.
|
||||
// So this tracks the desired state and runs the actual adjusting code asynchronously.
|
||||
type firewallTweaker struct {
|
||||
logf logger.Logf
|
||||
tunGUID windows.GUID
|
||||
|
Reference in New Issue
Block a user