diff --git a/design/20190708.certificate-request-crd.md b/design/20190708.certificate-request-crd.md index 9b990c830e5..1d960946b24 100644 --- a/design/20190708.certificate-request-crd.md +++ b/design/20190708.certificate-request-crd.md @@ -111,7 +111,7 @@ same code base and repository. - This proposal does not document or explore possible or planned integrations using this new functionality. - This proposal will not investigate possible alignment or merging with the - Kubernetes internal `CertificateSigningRequest` resource. Although is is of + Kubernetes internal `CertificateSigningRequest` resource. Although it is of interest, the motivation is mostly in order to get a built-in approval workflow for CertificateRequests. The feasibility of being able to implement a solution using the built-in type in the near future however is small, so we'd rather diff --git a/internal/controller/feature/features.go b/internal/controller/feature/features.go index dcaa66de577..011ef373aa6 100644 --- a/internal/controller/feature/features.go +++ b/internal/controller/feature/features.go @@ -107,7 +107,7 @@ const ( // `controller.cert-manager.io/fao` label. By default all Certificate // Secrets are labelled with controller.cert-manager.io/fao label. Users // can also label other Secrets, such as issuer credentials Secrets that - // they know cert-manager will need access to to speed up issuance. + // they know cert-manager will need to access, to speed up issuance. // See https://github.com/cert-manager/cert-manager/blob/master/design/20221205-memory-management.md SecretsFilteredCaching featuregate.Feature = "SecretsFilteredCaching" diff --git a/test/integration/certificates/issuing_controller_test.go b/test/integration/certificates/issuing_controller_test.go index 9ce8130ddb7..1a51377e53e 100644 --- a/test/integration/certificates/issuing_controller_test.go +++ b/test/integration/certificates/issuing_controller_test.go @@ -943,7 +943,7 @@ func Test_IssuingController_AdditionalOutputFormats(t *testing.T) { pkDER := block.Bytes combinedPEM := append(append(pkBytes, '\n'), certPEM...) - // Wait for the additional output format values to to be observed on the Secret. + // Wait for the additional output format values to be observed on the Secret. err = wait.PollUntilContextCancel(ctx, time.Millisecond*100, true, func(ctx context.Context) (done bool, err error) { secret, err := kubeClient.CoreV1().Secrets(namespace).Get(ctx, secretName, metav1.GetOptions{}) if err != nil {