Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion pkg/apis/policy/v1alpha1/clusterimagepolicy_lifecycle.go
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ func (cs *ClusterImagePolicyStatus) MarkInlinePoliciesFailed(msg string) {
cipCondSet.Manage(cs).MarkFalse(ClusterImagePolicyConditionPoliciesInlined, inlinePoliciesFailedReason, msg)
}

// MarkInlinePoliciesdOk marks the status saying that the inlining of the
// MarkInlinePoliciesOk marks the status saying that the inlining of the
// policies had no errors.
func (cs *ClusterImagePolicyStatus) MarkInlinePoliciesOk() {
cipCondSet.Manage(cs).MarkTrue(ClusterImagePolicyConditionPoliciesInlined)
Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/policy/v1beta1/clusterimagepolicy_lifecycle.go
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ func (cs *ClusterImagePolicyStatus) MarkInlinePoliciesFailed(msg string) {
cipCondSet.Manage(cs).MarkFalse(ClusterImagePolicyConditionPoliciesInlined, inlinePoliciesFailedReason, msg)
}

// MarkInlinePoliciesdOk marks the status saying that the inlining of the
// MarkInlinePoliciesOk marks the status saying that the inlining of the
// policies had no errors.
func (cs *ClusterImagePolicyStatus) MarkInlinePoliciesOk() {
cipCondSet.Manage(cs).MarkTrue(ClusterImagePolicyConditionPoliciesInlined)
Expand Down
4 changes: 2 additions & 2 deletions pkg/reconciler/trustroot/trustroot.go
Original file line number Diff line number Diff line change
Expand Up @@ -200,7 +200,7 @@ func (r *Reconciler) getSigstoreKeysFromRemote(ctx context.Context, remote *v1al
return GetSigstoreKeysFromTuf(ctx, tufClient, trustedRootTarget)
}

// remoteTrustRootEntry removes a TrustRoot entry from a CM. If no entry exists, it's a nop.
// removeTrustRootEntry removes a TrustRoot entry from a CM. If no entry exists, it's a nop.
func (r *Reconciler) removeTrustRootEntry(ctx context.Context, cm *corev1.ConfigMap, trustrootName string) error {
patchBytes, err := resources.CreateRemovePatch(system.Namespace(), config.SigstoreKeysConfigName, cm.DeepCopy(), trustrootName)
if err != nil {
Expand Down Expand Up @@ -240,7 +240,7 @@ type sigstoreCustomMetadata struct {
Sigstore customMetadata `json:"sigstore"`
}

// getSigstoreKeysFromTuf returns the sigstore keys from the TUF client. Note
// GetSigstoreKeysFromTuf returns the sigstore keys from the TUF client. Note
// that this should really be exposed from the sigstore/sigstore TUF pkg, but
// is currently not.
func GetSigstoreKeysFromTuf(ctx context.Context, tufClient *client.Client, trustedRootTarget string) (*config.SigstoreKeys, error) {
Expand Down
Loading