remove repetitive words (#20110)

Signed-off-by: carrychair <linghuchong404@gmail.com>
This commit is contained in:
carrychair
2024-03-11 16:52:08 +08:00
committed by GitHub
parent 286dce7a2a
commit 5f5b34db0e
14 changed files with 17 additions and 17 deletions

View File

@@ -435,7 +435,7 @@ func cloneWithTimeout(httpClient *http.Client, t time.Duration) (*http.Client, e
return &nc, nil return &nc, nil
} }
// ConfigureTLS applies a set of TLS configurations to the the HTTP client. // ConfigureTLS applies a set of TLS configurations to the HTTP client.
func ConfigureTLS(httpClient *http.Client, tlsConfig *TLSConfig) error { func ConfigureTLS(httpClient *http.Client, tlsConfig *TLSConfig) error {
if tlsConfig == nil { if tlsConfig == nil {
return nil return nil

View File

@@ -507,7 +507,7 @@ type CSISnapshotCreateResponse struct {
} }
// CSISnapshotListRequest is a request to a controller plugin to list all the // CSISnapshotListRequest is a request to a controller plugin to list all the
// snapshot known to the the storage provider. This request is paginated by // snapshot known to the storage provider. This request is paginated by
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken // the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
// fields // fields
type CSISnapshotListRequest struct { type CSISnapshotListRequest struct {

View File

@@ -47,7 +47,7 @@ func newNetworkManager(alloc *structs.Allocation, driverManager drivermanager.Ma
// to do extra work // to do extra work
driverCaps := make(map[string]struct{}) driverCaps := make(map[string]struct{})
for _, task := range tg.Tasks { for _, task := range tg.Tasks {
// the task's netmode defaults to the the task group but can be overridden // the task's netmode defaults to the task group but can be overridden
taskNetMode := tgNetMode taskNetMode := tgNetMode
if len(task.Resources.Networks) > 0 && task.Resources.Networks[0].Mode != "" { if len(task.Resources.Networks) > 0 && task.Resources.Networks[0].Mode != "" {
taskNetMode = task.Resources.Networks[0].Mode taskNetMode = task.Resources.Networks[0].Mode

View File

@@ -374,7 +374,7 @@ func TestCoordinator_PoststartStartsAfterMain(t *testing.T) {
// Only use the tasks that we care about. // Only use the tasks that we care about.
tasks = []*structs.Task{mainTask, sideTask, postTask} tasks = []*structs.Task{mainTask, sideTask, postTask}
// Make the the third task is a poststart hook // Make the third task is a poststart hook
postTask.Lifecycle.Hook = structs.TaskLifecycleHookPoststart postTask.Lifecycle.Hook = structs.TaskLifecycleHookPoststart
shutdownCh := make(chan struct{}) shutdownCh := make(chan struct{})

View File

@@ -42,7 +42,7 @@ Stop Specific Options:
eval-status command. eval-status command.
-no-shutdown-delay -no-shutdown-delay
Ignore the the group and task shutdown_delay configuration so there is no Ignore the group and task shutdown_delay configuration so there is no
delay between service deregistration and task shutdown. Note that using delay between service deregistration and task shutdown. Note that using
this flag will result in failed network connections to the allocation this flag will result in failed network connections to the allocation
being stopped. being stopped.

View File

@@ -135,7 +135,7 @@ func LegacySupported() *Set {
// //
// The task will drop any capabilities specified in cap_drop, and add back // The task will drop any capabilities specified in cap_drop, and add back
// capabilities specified in cap_add. The task will not be allowed to add capabilities // capabilities specified in cap_add. The task will not be allowed to add capabilities
// not set in the the allow_caps setting (which by default is the same as the basis). // not set in the allow_caps setting (which by default is the same as the basis).
// //
// cap_add takes precedence over cap_drop, enabling the common pattern of dropping // cap_add takes precedence over cap_drop, enabling the common pattern of dropping
// all capabilities, then adding back the desired smaller set. e.g. // all capabilities, then adding back the desired smaller set. e.g.

View File

@@ -137,7 +137,7 @@ type ExecCommand struct {
// Mounts are the host paths to be be made available inside rootfs // Mounts are the host paths to be be made available inside rootfs
Mounts []*drivers.MountConfig Mounts []*drivers.MountConfig
// Devices are the the device nodes to be created in isolation environment // Devices are the device nodes to be created in isolation environment
Devices []*drivers.DeviceConfig Devices []*drivers.DeviceConfig
// NetworkIsolation is the network isolation configuration. // NetworkIsolation is the network isolation configuration.

View File

@@ -992,7 +992,7 @@ func (v *CSIVolume) lookupExternalNodeID(vol *structs.CSIVolume, claim *structs.
return "", fmt.Errorf("%s: %s", structs.ErrUnknownNodePrefix, claim.NodeID) return "", fmt.Errorf("%s: %s", structs.ErrUnknownNodePrefix, claim.NodeID)
} }
// get the the storage provider's ID for the client node (not // get the storage provider's ID for the client node (not
// Nomad's ID for the node) // Nomad's ID for the node)
targetCSIInfo, ok := targetNode.CSINodePlugins[vol.PluginID] targetCSIInfo, ok := targetNode.CSINodePlugins[vol.PluginID]
if !ok || targetCSIInfo.NodeInfo == nil { if !ok || targetCSIInfo.NodeInfo == nil {

View File

@@ -967,7 +967,7 @@ type CSIVolumeListResponse struct {
} }
// CSIVolumeExternalListRequest is a request to a controller plugin to list // CSIVolumeExternalListRequest is a request to a controller plugin to list
// all the volumes known to the the storage provider. This request is // all the volumes known to the storage provider. This request is
// paginated by the plugin and accepts the QueryOptions.PerPage and // paginated by the plugin and accepts the QueryOptions.PerPage and
// QueryOptions.NextToken fields // QueryOptions.NextToken fields
type CSIVolumeExternalListRequest struct { type CSIVolumeExternalListRequest struct {
@@ -1055,7 +1055,7 @@ type CSISnapshotDeleteResponse struct {
} }
// CSISnapshotListRequest is a request to a controller plugin to list all the // CSISnapshotListRequest is a request to a controller plugin to list all the
// snapshot known to the the storage provider. This request is paginated by // snapshot known to the storage provider. This request is paginated by
// the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken // the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken
// fields // fields
type CSISnapshotListRequest struct { type CSISnapshotListRequest struct {

View File

@@ -76,7 +76,7 @@ const (
var ( var (
// vaultCapabilitiesCapability is the expected capability of Nomad's Vault // vaultCapabilitiesCapability is the expected capability of Nomad's Vault
// token on the the path. The token must have at least one of the // token on the path. The token must have at least one of the
// capabilities. // capabilities.
vaultCapabilitiesCapability = []string{"update", "root"} vaultCapabilitiesCapability = []string{"update", "root"}
@@ -95,12 +95,12 @@ var (
// the capabilities. // the capabilities.
vaultTokenRevokeCapability = []string{"update", "root"} vaultTokenRevokeCapability = []string{"update", "root"}
// vaultRoleLookupCapability is the the expected capability Nomad's Vault // vaultRoleLookupCapability is the expected capability Nomad's Vault
// token should have on the path. The token must have at least one of the // token should have on the path. The token must have at least one of the
// capabilities. // capabilities.
vaultRoleLookupCapability = []string{"read", "root"} vaultRoleLookupCapability = []string{"read", "root"}
// vaultTokenRoleCreateCapability is the the expected capability Nomad's Vault // vaultTokenRoleCreateCapability is the expected capability Nomad's Vault
// token should have on the path. The token must have at least one of the // token should have on the path. The token must have at least one of the
// capabilities. // capabilities.
vaultTokenRoleCreateCapability = []string{"update", "root"} vaultTokenRoleCreateCapability = []string{"update", "root"}

View File

@@ -337,7 +337,7 @@ func (m *ReserveRequest) GetDeviceIds() []string {
} }
// ReserveResponse informs Nomad how to expose the requested devices // ReserveResponse informs Nomad how to expose the requested devices
// to the the task. // to the task.
type ReserveResponse struct { type ReserveResponse struct {
// container_res contains information on how to mount the device // container_res contains information on how to mount the device
// into a task isolated using container technologies (where the // into a task isolated using container technologies (where the

View File

@@ -92,7 +92,7 @@ message ReserveRequest {
} }
// ReserveResponse informs Nomad how to expose the requested devices // ReserveResponse informs Nomad how to expose the requested devices
// to the the task. // to the task.
message ReserveResponse { message ReserveResponse {
// container_res contains information on how to mount the device // container_res contains information on how to mount the device
// into a task isolated using container technologies (where the // into a task isolated using container technologies (where the

View File

@@ -17,7 +17,7 @@ import (
var _ plugin.GRPCPlugin = &PluginDriver{} var _ plugin.GRPCPlugin = &PluginDriver{}
// PluginDriver wraps a DriverPlugin and implements go-plugins GRPCPlugin // PluginDriver wraps a DriverPlugin and implements go-plugins GRPCPlugin
// interface to expose the the interface over gRPC // interface to expose the interface over gRPC
type PluginDriver struct { type PluginDriver struct {
plugin.NetRPCUnsupportedPlugin plugin.NetRPCUnsupportedPlugin
impl DriverPlugin impl DriverPlugin

View File

@@ -5,7 +5,7 @@ package benchmarks
// Test helper functions for running scheduling tests and benchmarks // Test helper functions for running scheduling tests and benchmarks
// against real world state snapshots or data directories. These live // against real world state snapshots or data directories. These live
// here and not in the the parent scheduler package because it would // here and not in the parent scheduler package because it would
// create circular imports between the scheduler and raftutils package // create circular imports between the scheduler and raftutils package
// (via the nomad package) // (via the nomad package)