mirror of
https://github.com/kemko/nomad.git
synced 2026-01-01 16:05:42 +03:00
remove repetitive words (#20110)
Signed-off-by: carrychair <linghuchong404@gmail.com>
This commit is contained in:
@@ -435,7 +435,7 @@ func cloneWithTimeout(httpClient *http.Client, t time.Duration) (*http.Client, e
|
|||||||
return &nc, nil
|
return &nc, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// ConfigureTLS applies a set of TLS configurations to the the HTTP client.
|
// ConfigureTLS applies a set of TLS configurations to the HTTP client.
|
||||||
func ConfigureTLS(httpClient *http.Client, tlsConfig *TLSConfig) error {
|
func ConfigureTLS(httpClient *http.Client, tlsConfig *TLSConfig) error {
|
||||||
if tlsConfig == nil {
|
if tlsConfig == nil {
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -507,7 +507,7 @@ type CSISnapshotCreateResponse struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// CSISnapshotListRequest is a request to a controller plugin to list all the
|
// CSISnapshotListRequest is a request to a controller plugin to list all the
|
||||||
// snapshot known to the the storage provider. This request is paginated by
|
// snapshot known to the storage provider. This request is paginated by
|
||||||
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
|
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
|
||||||
// fields
|
// fields
|
||||||
type CSISnapshotListRequest struct {
|
type CSISnapshotListRequest struct {
|
||||||
|
|||||||
@@ -47,7 +47,7 @@ func newNetworkManager(alloc *structs.Allocation, driverManager drivermanager.Ma
|
|||||||
// to do extra work
|
// to do extra work
|
||||||
driverCaps := make(map[string]struct{})
|
driverCaps := make(map[string]struct{})
|
||||||
for _, task := range tg.Tasks {
|
for _, task := range tg.Tasks {
|
||||||
// the task's netmode defaults to the the task group but can be overridden
|
// the task's netmode defaults to the task group but can be overridden
|
||||||
taskNetMode := tgNetMode
|
taskNetMode := tgNetMode
|
||||||
if len(task.Resources.Networks) > 0 && task.Resources.Networks[0].Mode != "" {
|
if len(task.Resources.Networks) > 0 && task.Resources.Networks[0].Mode != "" {
|
||||||
taskNetMode = task.Resources.Networks[0].Mode
|
taskNetMode = task.Resources.Networks[0].Mode
|
||||||
|
|||||||
@@ -374,7 +374,7 @@ func TestCoordinator_PoststartStartsAfterMain(t *testing.T) {
|
|||||||
// Only use the tasks that we care about.
|
// Only use the tasks that we care about.
|
||||||
tasks = []*structs.Task{mainTask, sideTask, postTask}
|
tasks = []*structs.Task{mainTask, sideTask, postTask}
|
||||||
|
|
||||||
// Make the the third task is a poststart hook
|
// Make the third task is a poststart hook
|
||||||
postTask.Lifecycle.Hook = structs.TaskLifecycleHookPoststart
|
postTask.Lifecycle.Hook = structs.TaskLifecycleHookPoststart
|
||||||
|
|
||||||
shutdownCh := make(chan struct{})
|
shutdownCh := make(chan struct{})
|
||||||
|
|||||||
@@ -42,7 +42,7 @@ Stop Specific Options:
|
|||||||
eval-status command.
|
eval-status command.
|
||||||
|
|
||||||
-no-shutdown-delay
|
-no-shutdown-delay
|
||||||
Ignore the the group and task shutdown_delay configuration so there is no
|
Ignore the group and task shutdown_delay configuration so there is no
|
||||||
delay between service deregistration and task shutdown. Note that using
|
delay between service deregistration and task shutdown. Note that using
|
||||||
this flag will result in failed network connections to the allocation
|
this flag will result in failed network connections to the allocation
|
||||||
being stopped.
|
being stopped.
|
||||||
|
|||||||
@@ -135,7 +135,7 @@ func LegacySupported() *Set {
|
|||||||
//
|
//
|
||||||
// The task will drop any capabilities specified in cap_drop, and add back
|
// The task will drop any capabilities specified in cap_drop, and add back
|
||||||
// capabilities specified in cap_add. The task will not be allowed to add capabilities
|
// capabilities specified in cap_add. The task will not be allowed to add capabilities
|
||||||
// not set in the the allow_caps setting (which by default is the same as the basis).
|
// not set in the allow_caps setting (which by default is the same as the basis).
|
||||||
//
|
//
|
||||||
// cap_add takes precedence over cap_drop, enabling the common pattern of dropping
|
// cap_add takes precedence over cap_drop, enabling the common pattern of dropping
|
||||||
// all capabilities, then adding back the desired smaller set. e.g.
|
// all capabilities, then adding back the desired smaller set. e.g.
|
||||||
|
|||||||
@@ -137,7 +137,7 @@ type ExecCommand struct {
|
|||||||
// Mounts are the host paths to be be made available inside rootfs
|
// Mounts are the host paths to be be made available inside rootfs
|
||||||
Mounts []*drivers.MountConfig
|
Mounts []*drivers.MountConfig
|
||||||
|
|
||||||
// Devices are the the device nodes to be created in isolation environment
|
// Devices are the device nodes to be created in isolation environment
|
||||||
Devices []*drivers.DeviceConfig
|
Devices []*drivers.DeviceConfig
|
||||||
|
|
||||||
// NetworkIsolation is the network isolation configuration.
|
// NetworkIsolation is the network isolation configuration.
|
||||||
|
|||||||
@@ -992,7 +992,7 @@ func (v *CSIVolume) lookupExternalNodeID(vol *structs.CSIVolume, claim *structs.
|
|||||||
return "", fmt.Errorf("%s: %s", structs.ErrUnknownNodePrefix, claim.NodeID)
|
return "", fmt.Errorf("%s: %s", structs.ErrUnknownNodePrefix, claim.NodeID)
|
||||||
}
|
}
|
||||||
|
|
||||||
// get the the storage provider's ID for the client node (not
|
// get the storage provider's ID for the client node (not
|
||||||
// Nomad's ID for the node)
|
// Nomad's ID for the node)
|
||||||
targetCSIInfo, ok := targetNode.CSINodePlugins[vol.PluginID]
|
targetCSIInfo, ok := targetNode.CSINodePlugins[vol.PluginID]
|
||||||
if !ok || targetCSIInfo.NodeInfo == nil {
|
if !ok || targetCSIInfo.NodeInfo == nil {
|
||||||
|
|||||||
@@ -967,7 +967,7 @@ type CSIVolumeListResponse struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// CSIVolumeExternalListRequest is a request to a controller plugin to list
|
// CSIVolumeExternalListRequest is a request to a controller plugin to list
|
||||||
// all the volumes known to the the storage provider. This request is
|
// all the volumes known to the storage provider. This request is
|
||||||
// paginated by the plugin and accepts the QueryOptions.PerPage and
|
// paginated by the plugin and accepts the QueryOptions.PerPage and
|
||||||
// QueryOptions.NextToken fields
|
// QueryOptions.NextToken fields
|
||||||
type CSIVolumeExternalListRequest struct {
|
type CSIVolumeExternalListRequest struct {
|
||||||
@@ -1055,7 +1055,7 @@ type CSISnapshotDeleteResponse struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// CSISnapshotListRequest is a request to a controller plugin to list all the
|
// CSISnapshotListRequest is a request to a controller plugin to list all the
|
||||||
// snapshot known to the the storage provider. This request is paginated by
|
// snapshot known to the storage provider. This request is paginated by
|
||||||
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
|
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
|
||||||
// fields
|
// fields
|
||||||
type CSISnapshotListRequest struct {
|
type CSISnapshotListRequest struct {
|
||||||
|
|||||||
@@ -76,7 +76,7 @@ const (
|
|||||||
|
|
||||||
var (
|
var (
|
||||||
// vaultCapabilitiesCapability is the expected capability of Nomad's Vault
|
// vaultCapabilitiesCapability is the expected capability of Nomad's Vault
|
||||||
// token on the the path. The token must have at least one of the
|
// token on the path. The token must have at least one of the
|
||||||
// capabilities.
|
// capabilities.
|
||||||
vaultCapabilitiesCapability = []string{"update", "root"}
|
vaultCapabilitiesCapability = []string{"update", "root"}
|
||||||
|
|
||||||
@@ -95,12 +95,12 @@ var (
|
|||||||
// the capabilities.
|
// the capabilities.
|
||||||
vaultTokenRevokeCapability = []string{"update", "root"}
|
vaultTokenRevokeCapability = []string{"update", "root"}
|
||||||
|
|
||||||
// vaultRoleLookupCapability is the the expected capability Nomad's Vault
|
// vaultRoleLookupCapability is the expected capability Nomad's Vault
|
||||||
// token should have on the path. The token must have at least one of the
|
// token should have on the path. The token must have at least one of the
|
||||||
// capabilities.
|
// capabilities.
|
||||||
vaultRoleLookupCapability = []string{"read", "root"}
|
vaultRoleLookupCapability = []string{"read", "root"}
|
||||||
|
|
||||||
// vaultTokenRoleCreateCapability is the the expected capability Nomad's Vault
|
// vaultTokenRoleCreateCapability is the expected capability Nomad's Vault
|
||||||
// token should have on the path. The token must have at least one of the
|
// token should have on the path. The token must have at least one of the
|
||||||
// capabilities.
|
// capabilities.
|
||||||
vaultTokenRoleCreateCapability = []string{"update", "root"}
|
vaultTokenRoleCreateCapability = []string{"update", "root"}
|
||||||
|
|||||||
@@ -337,7 +337,7 @@ func (m *ReserveRequest) GetDeviceIds() []string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// ReserveResponse informs Nomad how to expose the requested devices
|
// ReserveResponse informs Nomad how to expose the requested devices
|
||||||
// to the the task.
|
// to the task.
|
||||||
type ReserveResponse struct {
|
type ReserveResponse struct {
|
||||||
// container_res contains information on how to mount the device
|
// container_res contains information on how to mount the device
|
||||||
// into a task isolated using container technologies (where the
|
// into a task isolated using container technologies (where the
|
||||||
|
|||||||
@@ -92,7 +92,7 @@ message ReserveRequest {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// ReserveResponse informs Nomad how to expose the requested devices
|
// ReserveResponse informs Nomad how to expose the requested devices
|
||||||
// to the the task.
|
// to the task.
|
||||||
message ReserveResponse {
|
message ReserveResponse {
|
||||||
// container_res contains information on how to mount the device
|
// container_res contains information on how to mount the device
|
||||||
// into a task isolated using container technologies (where the
|
// into a task isolated using container technologies (where the
|
||||||
|
|||||||
@@ -17,7 +17,7 @@ import (
|
|||||||
var _ plugin.GRPCPlugin = &PluginDriver{}
|
var _ plugin.GRPCPlugin = &PluginDriver{}
|
||||||
|
|
||||||
// PluginDriver wraps a DriverPlugin and implements go-plugins GRPCPlugin
|
// PluginDriver wraps a DriverPlugin and implements go-plugins GRPCPlugin
|
||||||
// interface to expose the the interface over gRPC
|
// interface to expose the interface over gRPC
|
||||||
type PluginDriver struct {
|
type PluginDriver struct {
|
||||||
plugin.NetRPCUnsupportedPlugin
|
plugin.NetRPCUnsupportedPlugin
|
||||||
impl DriverPlugin
|
impl DriverPlugin
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ package benchmarks
|
|||||||
|
|
||||||
// Test helper functions for running scheduling tests and benchmarks
|
// Test helper functions for running scheduling tests and benchmarks
|
||||||
// against real world state snapshots or data directories. These live
|
// against real world state snapshots or data directories. These live
|
||||||
// here and not in the the parent scheduler package because it would
|
// here and not in the parent scheduler package because it would
|
||||||
// create circular imports between the scheduler and raftutils package
|
// create circular imports between the scheduler and raftutils package
|
||||||
// (via the nomad package)
|
// (via the nomad package)
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user