mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-20 18:31:15 +00:00
remove the repeat word in documents
This commit is contained in:
parent
3c0bc3c5ad
commit
de3cf23414
@ -1181,7 +1181,7 @@ SIG Storage also moves support for Block Volumes to beta (introduced as alpha in
|
||||
|
||||
### SIG UI
|
||||
|
||||
The migration to the newest version of Angular is still under active development as it is most important thing on the roadmap at the moment. We are getting closer to to the new release. We continue fixing bugs and adding other improvements.
|
||||
The migration to the newest version of Angular is still under active development as it is most important thing on the roadmap at the moment. We are getting closer to the new release. We continue fixing bugs and adding other improvements.
|
||||
|
||||
### SIG VMWare
|
||||
|
||||
@ -1639,7 +1639,7 @@ filename | sha512 hash
|
||||
* kubeadm: always pass spec.nodeName as --hostname-override for kube-proxy ([#71283](https://github.com/kubernetes/kubernetes/pull/71283), [@Klaven](https://github.com/Klaven))
|
||||
* kubeadm join correctly uses --node-name and --cri-socket when --config option is also used ([#71270](https://github.com/kubernetes/kubernetes/pull/71270), [@bart0sh](https://github.com/bart0sh))
|
||||
* apiserver can be configured to reject requests that cannot be audit-logged. ([#65763](https://github.com/kubernetes/kubernetes/pull/65763), [@x13n](https://github.com/x13n))
|
||||
* Kubelet Device Plugin Registration directory changed from from `{kubelet_root_dir}/plugins/` to `{kubelet_root_dir}/plugins_registry/`. Any drivers (CSI or device plugin) that were using the old path must be updated to work with this version. ([#70494](https://github.com/kubernetes/kubernetes/pull/70494), [@RenaudWasTaken](https://github.com/RenaudWasTaken))
|
||||
* Kubelet Device Plugin Registration directory changed from `{kubelet_root_dir}/plugins/` to `{kubelet_root_dir}/plugins_registry/`. Any drivers (CSI or device plugin) that were using the old path must be updated to work with this version. ([#70494](https://github.com/kubernetes/kubernetes/pull/70494), [@RenaudWasTaken](https://github.com/RenaudWasTaken))
|
||||
* When the BoundServiceAccountTokenVolumes Alpha feature is enabled, ServiceAccount volumes now use a projected volume source and their names have the prefix "kube-api-access". ([#69848](https://github.com/kubernetes/kubernetes/pull/69848), [@mikedanese](https://github.com/mikedanese))
|
||||
|
||||
|
||||
|
@ -49,7 +49,7 @@ var (
|
||||
Renewal by default tries to use the certificate authority in the local PKI managed by kubeadm; as alternative
|
||||
it is possible to use K8s certificate API for certificate renewal, or as a last option, to generate a CSR request.
|
||||
|
||||
After renewal, in order to make changes effective, is is required to restart control-plane components and
|
||||
After renewal, in order to make changes effective, is required to restart control-plane components and
|
||||
eventually re-distribute the renewed certificate in case the file is used elsewhere.
|
||||
`)
|
||||
|
||||
|
@ -253,7 +253,7 @@ func (r *reconciler) reconcileByPortMapping(
|
||||
|
||||
// 3. If there are still desired endpoints left at this point, we try to fit
|
||||
// the endpoints in a single existing slice. If there are no slices with
|
||||
// that capacity, we create new slices for the the endpoints.
|
||||
// that capacity, we create new slices for the endpoints.
|
||||
slicesToCreate := []*discovery.EndpointSlice{}
|
||||
|
||||
for desiredSet.Len() > 0 {
|
||||
|
@ -284,7 +284,7 @@ func (a *HorizontalController) computeReplicasForMetrics(hpa *autoscalingv2.Hori
|
||||
return replicas, metric, statuses, timestamp, nil
|
||||
}
|
||||
|
||||
// Computes the desired number of replicas for for a specific hpa and metric specification,
|
||||
// Computes the desired number of replicas for a specific hpa and metric specification,
|
||||
// returning the metric status and a proposed condition to be set on the HPA object.
|
||||
func (a *HorizontalController) computeReplicasForMetric(hpa *autoscalingv2.HorizontalPodAutoscaler, spec autoscalingv2.MetricSpec,
|
||||
specReplicas, statusReplicas int32, selector labels.Selector, status *autoscalingv2.MetricStatus) (replicaCountProposal int32, metricNameProposal string,
|
||||
|
@ -675,7 +675,7 @@ func (m *ManagerImpl) devicesToAllocate(podUID, contName, resource string, requi
|
||||
}
|
||||
|
||||
func (m *ManagerImpl) takeByTopology(resource string, available sets.String, affinity bitmask.BitMask, request int) []string {
|
||||
// Build a map of of NUMA Nodes to the devices associated with them. A
|
||||
// Build a map of NUMA Nodes to the devices associated with them. A
|
||||
// device may be associated to multiple NUMA nodes at the same time. If an
|
||||
// available device does not have any NUMA Nodes associated with it, add it
|
||||
// to a list of NUMA Nodes for the fake NUMANode -1.
|
||||
|
@ -105,7 +105,7 @@ func TestCreate(t *testing.T) {
|
||||
test := genericregistrytest.New(t, storage.Store)
|
||||
pod := validNewPod()
|
||||
pod.ObjectMeta = metav1.ObjectMeta{}
|
||||
// Make an invalid pod with an an incorrect label.
|
||||
// Make an invalid pod with an incorrect label.
|
||||
invalidPod := validNewPod()
|
||||
invalidPod.Namespace = test.TestNamespace()
|
||||
invalidPod.Labels = map[string]string{
|
||||
|
@ -1014,7 +1014,7 @@ func validatePatchWithSetOrderList(patchList, setOrderList interface{}, mergeKey
|
||||
setOrderIndex++
|
||||
}
|
||||
// If patchIndex is inbound but setOrderIndex if out of bound mean there are items mismatching between the patch list and setElementOrder list.
|
||||
// the second check is is a sanity check, and should always be true if the first is true.
|
||||
// the second check is a sanity check, and should always be true if the first is true.
|
||||
if patchIndex < len(nonDeleteList) && setOrderIndex >= len(typedSetOrderList) {
|
||||
return fmt.Errorf("The order in patch list:\n%v\n doesn't match %s list:\n%v\n", typedPatchList, setElementOrderDirectivePrefix, setOrderList)
|
||||
}
|
||||
|
@ -76,7 +76,7 @@ func NewCreateCronJobOptions(ioStreams genericclioptions.IOStreams) *CreateCronJ
|
||||
}
|
||||
}
|
||||
|
||||
// NewCmdCreateCronJob is a command to to create CronJobs.
|
||||
// NewCmdCreateCronJob is a command to create CronJobs.
|
||||
func NewCmdCreateCronJob(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command {
|
||||
o := NewCreateCronJobOptions(ioStreams)
|
||||
cmd := &cobra.Command{
|
||||
|
@ -179,7 +179,7 @@ func TestGetNextDiskLun(t *testing.T) {
|
||||
expectedErr: false,
|
||||
},
|
||||
{
|
||||
desc: "LUN -1 and and error shall be returned if there's no available LUN",
|
||||
desc: "LUN -1 and error shall be returned if there's no available LUN",
|
||||
isDataDisksFull: true,
|
||||
expectedLun: -1,
|
||||
expectedErr: true,
|
||||
|
@ -1109,7 +1109,7 @@ func TestSecretVSphereConfig(t *testing.T) {
|
||||
)
|
||||
}
|
||||
}
|
||||
// Check, if all all connections are configured with the global CA certificate
|
||||
// Check, if all connections are configured with the global CA certificate
|
||||
if expectedCaPath := cfg.Global.CAFile; expectedCaPath != "" {
|
||||
for name, instance := range vs.vsphereInstanceMap {
|
||||
if actualCaPath := instance.conn.CACert; actualCaPath != expectedCaPath {
|
||||
|
@ -28,7 +28,7 @@ run_kubeadm_tests() {
|
||||
# comment this out to save yourself from needlessly building here.
|
||||
make -C "${KUBE_ROOT}" WHAT=cmd/kubeadm
|
||||
|
||||
#TODO(runyontr): Remove the the KUBE_TIMEOUT override when
|
||||
#TODO(runyontr): Remove the KUBE_TIMEOUT override when
|
||||
# kubernetes/kubeadm/issues/1430 is fixed
|
||||
make -C "${KUBE_ROOT}" test \
|
||||
WHAT=k8s.io/kubernetes/cmd/kubeadm/test/cmd \
|
||||
|
@ -269,7 +269,7 @@ var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
|
||||
Testname: Admission webhook, admission control not allowed on webhook configuration objects
|
||||
Description: Register webhooks that mutate and deny deletion of webhook configuration objects. Attempt to create
|
||||
and delete a webhook configuration object; both operations MUST be allowed and the webhook configuration object
|
||||
MUST NOT be mutated the the webhooks.
|
||||
MUST NOT be mutated the webhooks.
|
||||
*/
|
||||
framework.ConformanceIt("should not be able to mutate or prevent deletion of webhook configuration objects", func() {
|
||||
validatingWebhookCleanup := registerValidatingWebhookForWebhookConfigurations(f, f.UniqueName+"blocking", context, servicePort)
|
||||
|
@ -91,7 +91,7 @@ var _ = KubeadmDescribe("kubeadm-config ConfigMap", func() {
|
||||
)
|
||||
})
|
||||
|
||||
ginkgo.It("should be accessible for for nodes", func() {
|
||||
ginkgo.It("should be accessible for nodes", func() {
|
||||
ExpectSubjectHasAccessToResource(f.ClientSet,
|
||||
rbacv1.GroupKind, nodesGroup,
|
||||
kubeadmConfigConfigMapResource,
|
||||
|
@ -461,7 +461,7 @@ Usage:
|
||||
|
||||
### porter
|
||||
|
||||
Serves requested data on ports specified in ENV variables. For example, if the the environment
|
||||
Serves requested data on ports specified in ENV variables. For example, if the environment
|
||||
variable `SERVE_PORT_9001` is set, then the subcommand will start serving on the port 9001.
|
||||
Additionally, if the environment variable `SERVE_TLS_PORT_9002` is set, then the subcommand
|
||||
will start a TLS server on that port.
|
||||
|
@ -39,7 +39,7 @@ const tlsPrefix = "SERVE_TLS_PORT_"
|
||||
var CmdPorter = &cobra.Command{
|
||||
Use: "porter",
|
||||
Short: "Serves requested data on ports specified in ENV variables",
|
||||
Long: `Serves requested data on ports specified in ENV variables. For example, if the the environment variable "SERVE_PORT_9001" is set, then the subcommand will start serving on the port 9001.
|
||||
Long: `Serves requested data on ports specified in ENV variables. For example, if the environment variable "SERVE_PORT_9001" is set, then the subcommand will start serving on the port 9001.
|
||||
|
||||
Additionally, if the environment variable "SERVE_TLS_PORT_9002" is set, then the subcommand will start a TLS server on that port.
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
|
||||
The container image described here runs the EP benchmark from the
|
||||
[NAS parallel benchmark suite.](https://www.nas.nasa.gov/publications/npb.html)
|
||||
This image is used as a workload in in node performance testing.
|
||||
This image is used as a workload in node performance testing.
|
||||
|
||||
## How to release:
|
||||
```
|
||||
|
@ -2,7 +2,7 @@
|
||||
|
||||
The container image described here runs the IS benchmark from the
|
||||
[NAS parallel benchmark suite.](https://www.nas.nasa.gov/publications/npb.html)
|
||||
This image is used as a workload in in node performance testing.
|
||||
This image is used as a workload in node performance testing.
|
||||
|
||||
## How to release:
|
||||
```
|
||||
|
@ -3,7 +3,7 @@
|
||||
The container image described here predicts the income using the census income dataset in Tensorflow. For more
|
||||
information, see
|
||||
[https://github.com/tensorflow/models/tree/master/official/wide_deep](https://github.com/tensorflow/models/tree/master/official/wide_deep).
|
||||
This image is used as a workload in in node performance testing.
|
||||
This image is used as a workload in node performance testing.
|
||||
|
||||
## How to release:
|
||||
```
|
||||
|
@ -3,7 +3,7 @@
|
||||
Network services with heavy load will cause "connection reset" from time to
|
||||
time. Especially those with big payloads. When packets with sequence number
|
||||
out-of-window arrived k8s node, conntrack marked them as INVALID. kube-proxy
|
||||
will ignore them, without rewriting DNAT. The packet goes back the the original
|
||||
will ignore them, without rewriting DNAT. The packet goes back the original
|
||||
pod, who doesn't recognize the packet because of the wrong source ip, end up
|
||||
RSTing the connection.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user