From de3cf23414efb2eb4d94e821996cd4c93e6534e4 Mon Sep 17 00:00:00 2001 From: tanjunchen <2799194073@qq.com> Date: Fri, 4 Oct 2019 15:32:48 +0800 Subject: [PATCH] remove the repeat word in documents --- CHANGELOG-1.13.md | 4 ++-- cmd/kubeadm/app/cmd/alpha/certs.go | 2 +- pkg/controller/endpointslice/reconciler.go | 2 +- pkg/controller/podautoscaler/horizontal.go | 2 +- pkg/kubelet/cm/devicemanager/manager.go | 2 +- pkg/registry/core/pod/storage/storage_test.go | 2 +- .../src/k8s.io/apimachinery/pkg/util/strategicpatch/patch.go | 2 +- staging/src/k8s.io/kubectl/pkg/cmd/create/create_cronjob.go | 2 +- .../azure/azure_controller_common_test.go | 2 +- .../src/k8s.io/legacy-cloud-providers/vsphere/vsphere_test.go | 2 +- test/cmd/kubeadm.sh | 2 +- test/e2e/apimachinery/webhook.go | 2 +- test/e2e_kubeadm/kubeadm_config_test.go | 2 +- test/images/agnhost/README.md | 2 +- test/images/agnhost/porter/porter.go | 2 +- test/images/node-perf/npb-ep/README.md | 2 +- test/images/node-perf/npb-is/README.md | 2 +- test/images/node-perf/tf-wide-deep/README.md | 2 +- test/images/regression-issue-74839/README.md | 2 +- 19 files changed, 20 insertions(+), 20 deletions(-) diff --git a/CHANGELOG-1.13.md b/CHANGELOG-1.13.md index 80c3d30b7e8..2e0af331f13 100644 --- a/CHANGELOG-1.13.md +++ b/CHANGELOG-1.13.md @@ -1181,7 +1181,7 @@ SIG Storage also moves support for Block Volumes to beta (introduced as alpha in ### SIG UI -The migration to the newest version of Angular is still under active development as it is most important thing on the roadmap at the moment. We are getting closer to to the new release. We continue fixing bugs and adding other improvements. +The migration to the newest version of Angular is still under active development as it is most important thing on the roadmap at the moment. We are getting closer to the new release. We continue fixing bugs and adding other improvements. ### SIG VMWare @@ -1639,7 +1639,7 @@ filename | sha512 hash * kubeadm: always pass spec.nodeName as --hostname-override for kube-proxy ([#71283](https://github.com/kubernetes/kubernetes/pull/71283), [@Klaven](https://github.com/Klaven)) * kubeadm join correctly uses --node-name and --cri-socket when --config option is also used ([#71270](https://github.com/kubernetes/kubernetes/pull/71270), [@bart0sh](https://github.com/bart0sh)) * apiserver can be configured to reject requests that cannot be audit-logged. ([#65763](https://github.com/kubernetes/kubernetes/pull/65763), [@x13n](https://github.com/x13n)) -* Kubelet Device Plugin Registration directory changed from from `{kubelet_root_dir}/plugins/` to `{kubelet_root_dir}/plugins_registry/`. Any drivers (CSI or device plugin) that were using the old path must be updated to work with this version. ([#70494](https://github.com/kubernetes/kubernetes/pull/70494), [@RenaudWasTaken](https://github.com/RenaudWasTaken)) +* Kubelet Device Plugin Registration directory changed from `{kubelet_root_dir}/plugins/` to `{kubelet_root_dir}/plugins_registry/`. Any drivers (CSI or device plugin) that were using the old path must be updated to work with this version. ([#70494](https://github.com/kubernetes/kubernetes/pull/70494), [@RenaudWasTaken](https://github.com/RenaudWasTaken)) * When the BoundServiceAccountTokenVolumes Alpha feature is enabled, ServiceAccount volumes now use a projected volume source and their names have the prefix "kube-api-access". ([#69848](https://github.com/kubernetes/kubernetes/pull/69848), [@mikedanese](https://github.com/mikedanese)) diff --git a/cmd/kubeadm/app/cmd/alpha/certs.go b/cmd/kubeadm/app/cmd/alpha/certs.go index 7861f91c882..f282b7efac8 100644 --- a/cmd/kubeadm/app/cmd/alpha/certs.go +++ b/cmd/kubeadm/app/cmd/alpha/certs.go @@ -49,7 +49,7 @@ var ( Renewal by default tries to use the certificate authority in the local PKI managed by kubeadm; as alternative it is possible to use K8s certificate API for certificate renewal, or as a last option, to generate a CSR request. - After renewal, in order to make changes effective, is is required to restart control-plane components and + After renewal, in order to make changes effective, is required to restart control-plane components and eventually re-distribute the renewed certificate in case the file is used elsewhere. `) diff --git a/pkg/controller/endpointslice/reconciler.go b/pkg/controller/endpointslice/reconciler.go index 9abb1c9e7eb..a275896713e 100644 --- a/pkg/controller/endpointslice/reconciler.go +++ b/pkg/controller/endpointslice/reconciler.go @@ -253,7 +253,7 @@ func (r *reconciler) reconcileByPortMapping( // 3. If there are still desired endpoints left at this point, we try to fit // the endpoints in a single existing slice. If there are no slices with - // that capacity, we create new slices for the the endpoints. + // that capacity, we create new slices for the endpoints. slicesToCreate := []*discovery.EndpointSlice{} for desiredSet.Len() > 0 { diff --git a/pkg/controller/podautoscaler/horizontal.go b/pkg/controller/podautoscaler/horizontal.go index 31aea7afb44..e2502ab4fa0 100644 --- a/pkg/controller/podautoscaler/horizontal.go +++ b/pkg/controller/podautoscaler/horizontal.go @@ -284,7 +284,7 @@ func (a *HorizontalController) computeReplicasForMetrics(hpa *autoscalingv2.Hori return replicas, metric, statuses, timestamp, nil } -// Computes the desired number of replicas for for a specific hpa and metric specification, +// Computes the desired number of replicas for a specific hpa and metric specification, // returning the metric status and a proposed condition to be set on the HPA object. func (a *HorizontalController) computeReplicasForMetric(hpa *autoscalingv2.HorizontalPodAutoscaler, spec autoscalingv2.MetricSpec, specReplicas, statusReplicas int32, selector labels.Selector, status *autoscalingv2.MetricStatus) (replicaCountProposal int32, metricNameProposal string, diff --git a/pkg/kubelet/cm/devicemanager/manager.go b/pkg/kubelet/cm/devicemanager/manager.go index 12a5c6da900..759b71ea0a1 100644 --- a/pkg/kubelet/cm/devicemanager/manager.go +++ b/pkg/kubelet/cm/devicemanager/manager.go @@ -675,7 +675,7 @@ func (m *ManagerImpl) devicesToAllocate(podUID, contName, resource string, requi } func (m *ManagerImpl) takeByTopology(resource string, available sets.String, affinity bitmask.BitMask, request int) []string { - // Build a map of of NUMA Nodes to the devices associated with them. A + // Build a map of NUMA Nodes to the devices associated with them. A // device may be associated to multiple NUMA nodes at the same time. If an // available device does not have any NUMA Nodes associated with it, add it // to a list of NUMA Nodes for the fake NUMANode -1. diff --git a/pkg/registry/core/pod/storage/storage_test.go b/pkg/registry/core/pod/storage/storage_test.go index 545e6362cb9..b511720ebe1 100644 --- a/pkg/registry/core/pod/storage/storage_test.go +++ b/pkg/registry/core/pod/storage/storage_test.go @@ -105,7 +105,7 @@ func TestCreate(t *testing.T) { test := genericregistrytest.New(t, storage.Store) pod := validNewPod() pod.ObjectMeta = metav1.ObjectMeta{} - // Make an invalid pod with an an incorrect label. + // Make an invalid pod with an incorrect label. invalidPod := validNewPod() invalidPod.Namespace = test.TestNamespace() invalidPod.Labels = map[string]string{ diff --git a/staging/src/k8s.io/apimachinery/pkg/util/strategicpatch/patch.go b/staging/src/k8s.io/apimachinery/pkg/util/strategicpatch/patch.go index ddf998172c0..c55894e5023 100644 --- a/staging/src/k8s.io/apimachinery/pkg/util/strategicpatch/patch.go +++ b/staging/src/k8s.io/apimachinery/pkg/util/strategicpatch/patch.go @@ -1014,7 +1014,7 @@ func validatePatchWithSetOrderList(patchList, setOrderList interface{}, mergeKey setOrderIndex++ } // If patchIndex is inbound but setOrderIndex if out of bound mean there are items mismatching between the patch list and setElementOrder list. - // the second check is is a sanity check, and should always be true if the first is true. + // the second check is a sanity check, and should always be true if the first is true. if patchIndex < len(nonDeleteList) && setOrderIndex >= len(typedSetOrderList) { return fmt.Errorf("The order in patch list:\n%v\n doesn't match %s list:\n%v\n", typedPatchList, setElementOrderDirectivePrefix, setOrderList) } diff --git a/staging/src/k8s.io/kubectl/pkg/cmd/create/create_cronjob.go b/staging/src/k8s.io/kubectl/pkg/cmd/create/create_cronjob.go index c916ed1269d..79988c7ac9b 100644 --- a/staging/src/k8s.io/kubectl/pkg/cmd/create/create_cronjob.go +++ b/staging/src/k8s.io/kubectl/pkg/cmd/create/create_cronjob.go @@ -76,7 +76,7 @@ func NewCreateCronJobOptions(ioStreams genericclioptions.IOStreams) *CreateCronJ } } -// NewCmdCreateCronJob is a command to to create CronJobs. +// NewCmdCreateCronJob is a command to create CronJobs. func NewCmdCreateCronJob(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command { o := NewCreateCronJobOptions(ioStreams) cmd := &cobra.Command{ diff --git a/staging/src/k8s.io/legacy-cloud-providers/azure/azure_controller_common_test.go b/staging/src/k8s.io/legacy-cloud-providers/azure/azure_controller_common_test.go index 477c35b1cf5..905b95753c5 100644 --- a/staging/src/k8s.io/legacy-cloud-providers/azure/azure_controller_common_test.go +++ b/staging/src/k8s.io/legacy-cloud-providers/azure/azure_controller_common_test.go @@ -179,7 +179,7 @@ func TestGetNextDiskLun(t *testing.T) { expectedErr: false, }, { - desc: "LUN -1 and and error shall be returned if there's no available LUN", + desc: "LUN -1 and error shall be returned if there's no available LUN", isDataDisksFull: true, expectedLun: -1, expectedErr: true, diff --git a/staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_test.go b/staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_test.go index 5c95c9e43d0..96e4b801988 100644 --- a/staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_test.go +++ b/staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_test.go @@ -1109,7 +1109,7 @@ func TestSecretVSphereConfig(t *testing.T) { ) } } - // Check, if all all connections are configured with the global CA certificate + // Check, if all connections are configured with the global CA certificate if expectedCaPath := cfg.Global.CAFile; expectedCaPath != "" { for name, instance := range vs.vsphereInstanceMap { if actualCaPath := instance.conn.CACert; actualCaPath != expectedCaPath { diff --git a/test/cmd/kubeadm.sh b/test/cmd/kubeadm.sh index 94bddf062fc..563106feabc 100755 --- a/test/cmd/kubeadm.sh +++ b/test/cmd/kubeadm.sh @@ -28,7 +28,7 @@ run_kubeadm_tests() { # comment this out to save yourself from needlessly building here. make -C "${KUBE_ROOT}" WHAT=cmd/kubeadm - #TODO(runyontr): Remove the the KUBE_TIMEOUT override when + #TODO(runyontr): Remove the KUBE_TIMEOUT override when # kubernetes/kubeadm/issues/1430 is fixed make -C "${KUBE_ROOT}" test \ WHAT=k8s.io/kubernetes/cmd/kubeadm/test/cmd \ diff --git a/test/e2e/apimachinery/webhook.go b/test/e2e/apimachinery/webhook.go index 3b3c094fb8d..0ff2aab6e62 100644 --- a/test/e2e/apimachinery/webhook.go +++ b/test/e2e/apimachinery/webhook.go @@ -269,7 +269,7 @@ var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() { Testname: Admission webhook, admission control not allowed on webhook configuration objects Description: Register webhooks that mutate and deny deletion of webhook configuration objects. Attempt to create and delete a webhook configuration object; both operations MUST be allowed and the webhook configuration object - MUST NOT be mutated the the webhooks. + MUST NOT be mutated the webhooks. */ framework.ConformanceIt("should not be able to mutate or prevent deletion of webhook configuration objects", func() { validatingWebhookCleanup := registerValidatingWebhookForWebhookConfigurations(f, f.UniqueName+"blocking", context, servicePort) diff --git a/test/e2e_kubeadm/kubeadm_config_test.go b/test/e2e_kubeadm/kubeadm_config_test.go index a4d12c714d7..bd652bf9ba0 100644 --- a/test/e2e_kubeadm/kubeadm_config_test.go +++ b/test/e2e_kubeadm/kubeadm_config_test.go @@ -91,7 +91,7 @@ var _ = KubeadmDescribe("kubeadm-config ConfigMap", func() { ) }) - ginkgo.It("should be accessible for for nodes", func() { + ginkgo.It("should be accessible for nodes", func() { ExpectSubjectHasAccessToResource(f.ClientSet, rbacv1.GroupKind, nodesGroup, kubeadmConfigConfigMapResource, diff --git a/test/images/agnhost/README.md b/test/images/agnhost/README.md index 8d59aa51c53..bf1578d411e 100644 --- a/test/images/agnhost/README.md +++ b/test/images/agnhost/README.md @@ -461,7 +461,7 @@ Usage: ### porter -Serves requested data on ports specified in ENV variables. For example, if the the environment +Serves requested data on ports specified in ENV variables. For example, if the environment variable `SERVE_PORT_9001` is set, then the subcommand will start serving on the port 9001. Additionally, if the environment variable `SERVE_TLS_PORT_9002` is set, then the subcommand will start a TLS server on that port. diff --git a/test/images/agnhost/porter/porter.go b/test/images/agnhost/porter/porter.go index 643715d7d52..72994cc79dc 100644 --- a/test/images/agnhost/porter/porter.go +++ b/test/images/agnhost/porter/porter.go @@ -39,7 +39,7 @@ const tlsPrefix = "SERVE_TLS_PORT_" var CmdPorter = &cobra.Command{ Use: "porter", Short: "Serves requested data on ports specified in ENV variables", - Long: `Serves requested data on ports specified in ENV variables. For example, if the the environment variable "SERVE_PORT_9001" is set, then the subcommand will start serving on the port 9001. + Long: `Serves requested data on ports specified in ENV variables. For example, if the environment variable "SERVE_PORT_9001" is set, then the subcommand will start serving on the port 9001. Additionally, if the environment variable "SERVE_TLS_PORT_9002" is set, then the subcommand will start a TLS server on that port. diff --git a/test/images/node-perf/npb-ep/README.md b/test/images/node-perf/npb-ep/README.md index 517339adbf4..748b757a393 100644 --- a/test/images/node-perf/npb-ep/README.md +++ b/test/images/node-perf/npb-ep/README.md @@ -2,7 +2,7 @@ The container image described here runs the EP benchmark from the [NAS parallel benchmark suite.](https://www.nas.nasa.gov/publications/npb.html) -This image is used as a workload in in node performance testing. +This image is used as a workload in node performance testing. ## How to release: ``` diff --git a/test/images/node-perf/npb-is/README.md b/test/images/node-perf/npb-is/README.md index 86df86d702a..4cb88fdef00 100644 --- a/test/images/node-perf/npb-is/README.md +++ b/test/images/node-perf/npb-is/README.md @@ -2,7 +2,7 @@ The container image described here runs the IS benchmark from the [NAS parallel benchmark suite.](https://www.nas.nasa.gov/publications/npb.html) -This image is used as a workload in in node performance testing. +This image is used as a workload in node performance testing. ## How to release: ``` diff --git a/test/images/node-perf/tf-wide-deep/README.md b/test/images/node-perf/tf-wide-deep/README.md index 37e394487e7..285e525527a 100644 --- a/test/images/node-perf/tf-wide-deep/README.md +++ b/test/images/node-perf/tf-wide-deep/README.md @@ -3,7 +3,7 @@ The container image described here predicts the income using the census income dataset in Tensorflow. For more information, see [https://github.com/tensorflow/models/tree/master/official/wide_deep](https://github.com/tensorflow/models/tree/master/official/wide_deep). -This image is used as a workload in in node performance testing. +This image is used as a workload in node performance testing. ## How to release: ``` diff --git a/test/images/regression-issue-74839/README.md b/test/images/regression-issue-74839/README.md index b897264f77e..555de106403 100644 --- a/test/images/regression-issue-74839/README.md +++ b/test/images/regression-issue-74839/README.md @@ -3,7 +3,7 @@ Network services with heavy load will cause "connection reset" from time to time. Especially those with big payloads. When packets with sequence number out-of-window arrived k8s node, conntrack marked them as INVALID. kube-proxy -will ignore them, without rewriting DNAT. The packet goes back the the original +will ignore them, without rewriting DNAT. The packet goes back the original pod, who doesn't recognize the packet because of the wrong source ip, end up RSTing the connection.