remove repetitive words (#20110)

Signed-off-by: carrychair <linghuchong404@gmail.com>
This commit is contained in:
carrychair
2024-03-11 16:52:08 +08:00
committed by GitHub
parent 286dce7a2a
commit 5f5b34db0e
14 changed files with 17 additions and 17 deletions

View File

@@ -435,7 +435,7 @@ func cloneWithTimeout(httpClient *http.Client, t time.Duration) (*http.Client, e
return &nc, nil
}
// ConfigureTLS applies a set of TLS configurations to the the HTTP client.
// ConfigureTLS applies a set of TLS configurations to the HTTP client.
func ConfigureTLS(httpClient *http.Client, tlsConfig *TLSConfig) error {
if tlsConfig == nil {
return nil

View File

@@ -507,7 +507,7 @@ type CSISnapshotCreateResponse struct {
}
// CSISnapshotListRequest is a request to a controller plugin to list all the
// snapshot known to the the storage provider. This request is paginated by
// snapshot known to the storage provider. This request is paginated by
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
// fields
type CSISnapshotListRequest struct {

View File

@@ -47,7 +47,7 @@ func newNetworkManager(alloc *structs.Allocation, driverManager drivermanager.Ma
// to do extra work
driverCaps := make(map[string]struct{})
for _, task := range tg.Tasks {
// the task's netmode defaults to the the task group but can be overridden
// the task's netmode defaults to the task group but can be overridden
taskNetMode := tgNetMode
if len(task.Resources.Networks) > 0 && task.Resources.Networks[0].Mode != "" {
taskNetMode = task.Resources.Networks[0].Mode

View File

@@ -374,7 +374,7 @@ func TestCoordinator_PoststartStartsAfterMain(t *testing.T) {
// Only use the tasks that we care about.
tasks = []*structs.Task{mainTask, sideTask, postTask}
// Make the the third task is a poststart hook
// Make the third task is a poststart hook
postTask.Lifecycle.Hook = structs.TaskLifecycleHookPoststart
shutdownCh := make(chan struct{})

View File

@@ -42,7 +42,7 @@ Stop Specific Options:
eval-status command.
-no-shutdown-delay
Ignore the the group and task shutdown_delay configuration so there is no
Ignore the group and task shutdown_delay configuration so there is no
delay between service deregistration and task shutdown. Note that using
this flag will result in failed network connections to the allocation
being stopped.

View File

@@ -135,7 +135,7 @@ func LegacySupported() *Set {
//
// The task will drop any capabilities specified in cap_drop, and add back
// capabilities specified in cap_add. The task will not be allowed to add capabilities
// not set in the the allow_caps setting (which by default is the same as the basis).
// not set in the allow_caps setting (which by default is the same as the basis).
//
// cap_add takes precedence over cap_drop, enabling the common pattern of dropping
// all capabilities, then adding back the desired smaller set. e.g.

View File

@@ -137,7 +137,7 @@ type ExecCommand struct {
// Mounts are the host paths to be be made available inside rootfs
Mounts []*drivers.MountConfig
// Devices are the the device nodes to be created in isolation environment
// Devices are the device nodes to be created in isolation environment
Devices []*drivers.DeviceConfig
// NetworkIsolation is the network isolation configuration.

View File

@@ -992,7 +992,7 @@ func (v *CSIVolume) lookupExternalNodeID(vol *structs.CSIVolume, claim *structs.
return "", fmt.Errorf("%s: %s", structs.ErrUnknownNodePrefix, claim.NodeID)
}
// get the the storage provider's ID for the client node (not
// get the storage provider's ID for the client node (not
// Nomad's ID for the node)
targetCSIInfo, ok := targetNode.CSINodePlugins[vol.PluginID]
if !ok || targetCSIInfo.NodeInfo == nil {

View File

@@ -967,7 +967,7 @@ type CSIVolumeListResponse struct {
}
// CSIVolumeExternalListRequest is a request to a controller plugin to list
// all the volumes known to the the storage provider. This request is
// all the volumes known to the storage provider. This request is
// paginated by the plugin and accepts the QueryOptions.PerPage and
// QueryOptions.NextToken fields
type CSIVolumeExternalListRequest struct {
@@ -1055,7 +1055,7 @@ type CSISnapshotDeleteResponse struct {
}
// CSISnapshotListRequest is a request to a controller plugin to list all the
// snapshot known to the the storage provider. This request is paginated by
// snapshot known to the storage provider. This request is paginated by
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
// fields
type CSISnapshotListRequest struct {

View File

@@ -76,7 +76,7 @@ const (
var (
// vaultCapabilitiesCapability is the expected capability of Nomad's Vault
// token on the the path. The token must have at least one of the
// token on the path. The token must have at least one of the
// capabilities.
vaultCapabilitiesCapability = []string{"update", "root"}
@@ -95,12 +95,12 @@ var (
// the capabilities.
vaultTokenRevokeCapability = []string{"update", "root"}
// vaultRoleLookupCapability is the the expected capability Nomad's Vault
// vaultRoleLookupCapability is the expected capability Nomad's Vault
// token should have on the path. The token must have at least one of the
// capabilities.
vaultRoleLookupCapability = []string{"read", "root"}
// vaultTokenRoleCreateCapability is the the expected capability Nomad's Vault
// vaultTokenRoleCreateCapability is the expected capability Nomad's Vault
// token should have on the path. The token must have at least one of the
// capabilities.
vaultTokenRoleCreateCapability = []string{"update", "root"}

View File

@@ -337,7 +337,7 @@ func (m *ReserveRequest) GetDeviceIds() []string {
}
// ReserveResponse informs Nomad how to expose the requested devices
// to the the task.
// to the task.
type ReserveResponse struct {
// container_res contains information on how to mount the device
// into a task isolated using container technologies (where the

View File

@@ -92,7 +92,7 @@ message ReserveRequest {
}
// ReserveResponse informs Nomad how to expose the requested devices
// to the the task.
// to the task.
message ReserveResponse {
// container_res contains information on how to mount the device
// into a task isolated using container technologies (where the

View File

@@ -17,7 +17,7 @@ import (
var _ plugin.GRPCPlugin = &PluginDriver{}
// PluginDriver wraps a DriverPlugin and implements go-plugins GRPCPlugin
// interface to expose the the interface over gRPC
// interface to expose the interface over gRPC
type PluginDriver struct {
plugin.NetRPCUnsupportedPlugin
impl DriverPlugin

View File

@@ -5,7 +5,7 @@ package benchmarks
// Test helper functions for running scheduling tests and benchmarks
// against real world state snapshots or data directories. These live
// here and not in the the parent scheduler package because it would
// here and not in the parent scheduler package because it would
// create circular imports between the scheduler and raftutils package
// (via the nomad package)