mirror of
https://github.com/kemko/nomad.git
synced 2026-01-01 16:05:42 +03:00
remove repetitive words (#20110)
Signed-off-by: carrychair <linghuchong404@gmail.com>
This commit is contained in:
@@ -435,7 +435,7 @@ func cloneWithTimeout(httpClient *http.Client, t time.Duration) (*http.Client, e
|
||||
return &nc, nil
|
||||
}
|
||||
|
||||
// ConfigureTLS applies a set of TLS configurations to the the HTTP client.
|
||||
// ConfigureTLS applies a set of TLS configurations to the HTTP client.
|
||||
func ConfigureTLS(httpClient *http.Client, tlsConfig *TLSConfig) error {
|
||||
if tlsConfig == nil {
|
||||
return nil
|
||||
|
||||
@@ -507,7 +507,7 @@ type CSISnapshotCreateResponse struct {
|
||||
}
|
||||
|
||||
// CSISnapshotListRequest is a request to a controller plugin to list all the
|
||||
// snapshot known to the the storage provider. This request is paginated by
|
||||
// snapshot known to the storage provider. This request is paginated by
|
||||
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
|
||||
// fields
|
||||
type CSISnapshotListRequest struct {
|
||||
|
||||
@@ -47,7 +47,7 @@ func newNetworkManager(alloc *structs.Allocation, driverManager drivermanager.Ma
|
||||
// to do extra work
|
||||
driverCaps := make(map[string]struct{})
|
||||
for _, task := range tg.Tasks {
|
||||
// the task's netmode defaults to the the task group but can be overridden
|
||||
// the task's netmode defaults to the task group but can be overridden
|
||||
taskNetMode := tgNetMode
|
||||
if len(task.Resources.Networks) > 0 && task.Resources.Networks[0].Mode != "" {
|
||||
taskNetMode = task.Resources.Networks[0].Mode
|
||||
|
||||
@@ -374,7 +374,7 @@ func TestCoordinator_PoststartStartsAfterMain(t *testing.T) {
|
||||
// Only use the tasks that we care about.
|
||||
tasks = []*structs.Task{mainTask, sideTask, postTask}
|
||||
|
||||
// Make the the third task is a poststart hook
|
||||
// Make the third task is a poststart hook
|
||||
postTask.Lifecycle.Hook = structs.TaskLifecycleHookPoststart
|
||||
|
||||
shutdownCh := make(chan struct{})
|
||||
|
||||
@@ -42,7 +42,7 @@ Stop Specific Options:
|
||||
eval-status command.
|
||||
|
||||
-no-shutdown-delay
|
||||
Ignore the the group and task shutdown_delay configuration so there is no
|
||||
Ignore the group and task shutdown_delay configuration so there is no
|
||||
delay between service deregistration and task shutdown. Note that using
|
||||
this flag will result in failed network connections to the allocation
|
||||
being stopped.
|
||||
|
||||
@@ -135,7 +135,7 @@ func LegacySupported() *Set {
|
||||
//
|
||||
// The task will drop any capabilities specified in cap_drop, and add back
|
||||
// capabilities specified in cap_add. The task will not be allowed to add capabilities
|
||||
// not set in the the allow_caps setting (which by default is the same as the basis).
|
||||
// not set in the allow_caps setting (which by default is the same as the basis).
|
||||
//
|
||||
// cap_add takes precedence over cap_drop, enabling the common pattern of dropping
|
||||
// all capabilities, then adding back the desired smaller set. e.g.
|
||||
|
||||
@@ -137,7 +137,7 @@ type ExecCommand struct {
|
||||
// Mounts are the host paths to be be made available inside rootfs
|
||||
Mounts []*drivers.MountConfig
|
||||
|
||||
// Devices are the the device nodes to be created in isolation environment
|
||||
// Devices are the device nodes to be created in isolation environment
|
||||
Devices []*drivers.DeviceConfig
|
||||
|
||||
// NetworkIsolation is the network isolation configuration.
|
||||
|
||||
@@ -992,7 +992,7 @@ func (v *CSIVolume) lookupExternalNodeID(vol *structs.CSIVolume, claim *structs.
|
||||
return "", fmt.Errorf("%s: %s", structs.ErrUnknownNodePrefix, claim.NodeID)
|
||||
}
|
||||
|
||||
// get the the storage provider's ID for the client node (not
|
||||
// get the storage provider's ID for the client node (not
|
||||
// Nomad's ID for the node)
|
||||
targetCSIInfo, ok := targetNode.CSINodePlugins[vol.PluginID]
|
||||
if !ok || targetCSIInfo.NodeInfo == nil {
|
||||
|
||||
@@ -967,7 +967,7 @@ type CSIVolumeListResponse struct {
|
||||
}
|
||||
|
||||
// CSIVolumeExternalListRequest is a request to a controller plugin to list
|
||||
// all the volumes known to the the storage provider. This request is
|
||||
// all the volumes known to the storage provider. This request is
|
||||
// paginated by the plugin and accepts the QueryOptions.PerPage and
|
||||
// QueryOptions.NextToken fields
|
||||
type CSIVolumeExternalListRequest struct {
|
||||
@@ -1055,7 +1055,7 @@ type CSISnapshotDeleteResponse struct {
|
||||
}
|
||||
|
||||
// CSISnapshotListRequest is a request to a controller plugin to list all the
|
||||
// snapshot known to the the storage provider. This request is paginated by
|
||||
// snapshot known to the storage provider. This request is paginated by
|
||||
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
|
||||
// fields
|
||||
type CSISnapshotListRequest struct {
|
||||
|
||||
@@ -76,7 +76,7 @@ const (
|
||||
|
||||
var (
|
||||
// vaultCapabilitiesCapability is the expected capability of Nomad's Vault
|
||||
// token on the the path. The token must have at least one of the
|
||||
// token on the path. The token must have at least one of the
|
||||
// capabilities.
|
||||
vaultCapabilitiesCapability = []string{"update", "root"}
|
||||
|
||||
@@ -95,12 +95,12 @@ var (
|
||||
// the capabilities.
|
||||
vaultTokenRevokeCapability = []string{"update", "root"}
|
||||
|
||||
// vaultRoleLookupCapability is the the expected capability Nomad's Vault
|
||||
// vaultRoleLookupCapability is the expected capability Nomad's Vault
|
||||
// token should have on the path. The token must have at least one of the
|
||||
// capabilities.
|
||||
vaultRoleLookupCapability = []string{"read", "root"}
|
||||
|
||||
// vaultTokenRoleCreateCapability is the the expected capability Nomad's Vault
|
||||
// vaultTokenRoleCreateCapability is the expected capability Nomad's Vault
|
||||
// token should have on the path. The token must have at least one of the
|
||||
// capabilities.
|
||||
vaultTokenRoleCreateCapability = []string{"update", "root"}
|
||||
|
||||
@@ -337,7 +337,7 @@ func (m *ReserveRequest) GetDeviceIds() []string {
|
||||
}
|
||||
|
||||
// ReserveResponse informs Nomad how to expose the requested devices
|
||||
// to the the task.
|
||||
// to the task.
|
||||
type ReserveResponse struct {
|
||||
// container_res contains information on how to mount the device
|
||||
// into a task isolated using container technologies (where the
|
||||
|
||||
@@ -92,7 +92,7 @@ message ReserveRequest {
|
||||
}
|
||||
|
||||
// ReserveResponse informs Nomad how to expose the requested devices
|
||||
// to the the task.
|
||||
// to the task.
|
||||
message ReserveResponse {
|
||||
// container_res contains information on how to mount the device
|
||||
// into a task isolated using container technologies (where the
|
||||
|
||||
@@ -17,7 +17,7 @@ import (
|
||||
var _ plugin.GRPCPlugin = &PluginDriver{}
|
||||
|
||||
// PluginDriver wraps a DriverPlugin and implements go-plugins GRPCPlugin
|
||||
// interface to expose the the interface over gRPC
|
||||
// interface to expose the interface over gRPC
|
||||
type PluginDriver struct {
|
||||
plugin.NetRPCUnsupportedPlugin
|
||||
impl DriverPlugin
|
||||
|
||||
@@ -5,7 +5,7 @@ package benchmarks
|
||||
|
||||
// Test helper functions for running scheduling tests and benchmarks
|
||||
// against real world state snapshots or data directories. These live
|
||||
// here and not in the the parent scheduler package because it would
|
||||
// here and not in the parent scheduler package because it would
|
||||
// create circular imports between the scheduler and raftutils package
|
||||
// (via the nomad package)
|
||||
|
||||
|
||||
Reference in New Issue
Block a user