diff --git a/api/api.go b/api/api.go index a49e84f85..b30740767 100644 --- a/api/api.go +++ b/api/api.go @@ -435,7 +435,7 @@ func cloneWithTimeout(httpClient *http.Client, t time.Duration) (*http.Client, e return &nc, nil } -// ConfigureTLS applies a set of TLS configurations to the the HTTP client. +// ConfigureTLS applies a set of TLS configurations to the HTTP client. func ConfigureTLS(httpClient *http.Client, tlsConfig *TLSConfig) error { if tlsConfig == nil { return nil diff --git a/api/csi.go b/api/csi.go index 8a7a63dca..65e1ca569 100644 --- a/api/csi.go +++ b/api/csi.go @@ -507,7 +507,7 @@ type CSISnapshotCreateResponse struct { } // CSISnapshotListRequest is a request to a controller plugin to list all the -// snapshot known to the the storage provider. This request is paginated by +// snapshot known to the storage provider. This request is paginated by // the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken // fields type CSISnapshotListRequest struct { diff --git a/client/allocrunner/network_manager_linux.go b/client/allocrunner/network_manager_linux.go index e5ddaca82..50f509b14 100644 --- a/client/allocrunner/network_manager_linux.go +++ b/client/allocrunner/network_manager_linux.go @@ -47,7 +47,7 @@ func newNetworkManager(alloc *structs.Allocation, driverManager drivermanager.Ma // to do extra work driverCaps := make(map[string]struct{}) for _, task := range tg.Tasks { - // the task's netmode defaults to the the task group but can be overridden + // the task's netmode defaults to the task group but can be overridden taskNetMode := tgNetMode if len(task.Resources.Networks) > 0 && task.Resources.Networks[0].Mode != "" { taskNetMode = task.Resources.Networks[0].Mode diff --git a/client/allocrunner/tasklifecycle/coordinator_test.go b/client/allocrunner/tasklifecycle/coordinator_test.go index 6e86b18e9..10afa2d20 100644 --- a/client/allocrunner/tasklifecycle/coordinator_test.go +++ b/client/allocrunner/tasklifecycle/coordinator_test.go @@ -374,7 +374,7 @@ func TestCoordinator_PoststartStartsAfterMain(t *testing.T) { // Only use the tasks that we care about. tasks = []*structs.Task{mainTask, sideTask, postTask} - // Make the the third task is a poststart hook + // Make the third task is a poststart hook postTask.Lifecycle.Hook = structs.TaskLifecycleHookPoststart shutdownCh := make(chan struct{}) diff --git a/command/alloc_stop.go b/command/alloc_stop.go index 37bbfccb1..98c3d9a0c 100644 --- a/command/alloc_stop.go +++ b/command/alloc_stop.go @@ -42,7 +42,7 @@ Stop Specific Options: eval-status command. -no-shutdown-delay - Ignore the the group and task shutdown_delay configuration so there is no + Ignore the group and task shutdown_delay configuration so there is no delay between service deregistration and task shutdown. Note that using this flag will result in failed network connections to the allocation being stopped. diff --git a/drivers/shared/capabilities/defaults.go b/drivers/shared/capabilities/defaults.go index 2b1b81783..31fd3869d 100644 --- a/drivers/shared/capabilities/defaults.go +++ b/drivers/shared/capabilities/defaults.go @@ -135,7 +135,7 @@ func LegacySupported() *Set { // // The task will drop any capabilities specified in cap_drop, and add back // capabilities specified in cap_add. The task will not be allowed to add capabilities -// not set in the the allow_caps setting (which by default is the same as the basis). +// not set in the allow_caps setting (which by default is the same as the basis). // // cap_add takes precedence over cap_drop, enabling the common pattern of dropping // all capabilities, then adding back the desired smaller set. e.g. diff --git a/drivers/shared/executor/executor.go b/drivers/shared/executor/executor.go index a733a357b..bbb005717 100644 --- a/drivers/shared/executor/executor.go +++ b/drivers/shared/executor/executor.go @@ -137,7 +137,7 @@ type ExecCommand struct { // Mounts are the host paths to be be made available inside rootfs Mounts []*drivers.MountConfig - // Devices are the the device nodes to be created in isolation environment + // Devices are the device nodes to be created in isolation environment Devices []*drivers.DeviceConfig // NetworkIsolation is the network isolation configuration. diff --git a/nomad/csi_endpoint.go b/nomad/csi_endpoint.go index ba14fe510..26cfa9432 100644 --- a/nomad/csi_endpoint.go +++ b/nomad/csi_endpoint.go @@ -992,7 +992,7 @@ func (v *CSIVolume) lookupExternalNodeID(vol *structs.CSIVolume, claim *structs. return "", fmt.Errorf("%s: %s", structs.ErrUnknownNodePrefix, claim.NodeID) } - // get the the storage provider's ID for the client node (not + // get the storage provider's ID for the client node (not // Nomad's ID for the node) targetCSIInfo, ok := targetNode.CSINodePlugins[vol.PluginID] if !ok || targetCSIInfo.NodeInfo == nil { diff --git a/nomad/structs/csi.go b/nomad/structs/csi.go index 51acd84a9..a0eac38a6 100644 --- a/nomad/structs/csi.go +++ b/nomad/structs/csi.go @@ -967,7 +967,7 @@ type CSIVolumeListResponse struct { } // CSIVolumeExternalListRequest is a request to a controller plugin to list -// all the volumes known to the the storage provider. This request is +// all the volumes known to the storage provider. This request is // paginated by the plugin and accepts the QueryOptions.PerPage and // QueryOptions.NextToken fields type CSIVolumeExternalListRequest struct { @@ -1055,7 +1055,7 @@ type CSISnapshotDeleteResponse struct { } // CSISnapshotListRequest is a request to a controller plugin to list all the -// snapshot known to the the storage provider. This request is paginated by +// snapshot known to the storage provider. This request is paginated by // the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken // fields type CSISnapshotListRequest struct { diff --git a/nomad/vault.go b/nomad/vault.go index 8d5ba610a..e2827a122 100644 --- a/nomad/vault.go +++ b/nomad/vault.go @@ -76,7 +76,7 @@ const ( var ( // vaultCapabilitiesCapability is the expected capability of Nomad's Vault - // token on the the path. The token must have at least one of the + // token on the path. The token must have at least one of the // capabilities. vaultCapabilitiesCapability = []string{"update", "root"} @@ -95,12 +95,12 @@ var ( // the capabilities. vaultTokenRevokeCapability = []string{"update", "root"} - // vaultRoleLookupCapability is the the expected capability Nomad's Vault + // vaultRoleLookupCapability is the expected capability Nomad's Vault // token should have on the path. The token must have at least one of the // capabilities. vaultRoleLookupCapability = []string{"read", "root"} - // vaultTokenRoleCreateCapability is the the expected capability Nomad's Vault + // vaultTokenRoleCreateCapability is the expected capability Nomad's Vault // token should have on the path. The token must have at least one of the // capabilities. vaultTokenRoleCreateCapability = []string{"update", "root"} diff --git a/plugins/device/proto/device.pb.go b/plugins/device/proto/device.pb.go index 8d2069dac..815268efc 100644 --- a/plugins/device/proto/device.pb.go +++ b/plugins/device/proto/device.pb.go @@ -337,7 +337,7 @@ func (m *ReserveRequest) GetDeviceIds() []string { } // ReserveResponse informs Nomad how to expose the requested devices -// to the the task. +// to the task. type ReserveResponse struct { // container_res contains information on how to mount the device // into a task isolated using container technologies (where the diff --git a/plugins/device/proto/device.proto b/plugins/device/proto/device.proto index 6ffa9bc4a..d627c3ce4 100644 --- a/plugins/device/proto/device.proto +++ b/plugins/device/proto/device.proto @@ -92,7 +92,7 @@ message ReserveRequest { } // ReserveResponse informs Nomad how to expose the requested devices -// to the the task. +// to the task. message ReserveResponse { // container_res contains information on how to mount the device // into a task isolated using container technologies (where the diff --git a/plugins/drivers/plugin.go b/plugins/drivers/plugin.go index d1522688e..6f1ee95a5 100644 --- a/plugins/drivers/plugin.go +++ b/plugins/drivers/plugin.go @@ -17,7 +17,7 @@ import ( var _ plugin.GRPCPlugin = &PluginDriver{} // PluginDriver wraps a DriverPlugin and implements go-plugins GRPCPlugin -// interface to expose the the interface over gRPC +// interface to expose the interface over gRPC type PluginDriver struct { plugin.NetRPCUnsupportedPlugin impl DriverPlugin diff --git a/scheduler/benchmarks/helpers_test.go b/scheduler/benchmarks/helpers_test.go index b04a0b2bf..e41c4186d 100644 --- a/scheduler/benchmarks/helpers_test.go +++ b/scheduler/benchmarks/helpers_test.go @@ -5,7 +5,7 @@ package benchmarks // Test helper functions for running scheduling tests and benchmarks // against real world state snapshots or data directories. These live -// here and not in the the parent scheduler package because it would +// here and not in the parent scheduler package because it would // create circular imports between the scheduler and raftutils package // (via the nomad package)