Skip to content

Commit

Permalink
remove the repeat word in documents
Browse files Browse the repository at this point in the history
  • Loading branch information
tanjunchen committed Oct 6, 2019
1 parent 3c0bc3c commit de3cf23
Show file tree
Hide file tree
Showing 19 changed files with 20 additions and 20 deletions.
4 changes: 2 additions & 2 deletions CHANGELOG-1.13.md
Original file line number Diff line number Diff line change
Expand Up @@ -1181,7 +1181,7 @@ SIG Storage also moves support for Block Volumes to beta (introduced as alpha in

### SIG UI

The migration to the newest version of Angular is still under active development as it is most important thing on the roadmap at the moment. We are getting closer to to the new release. We continue fixing bugs and adding other improvements.
The migration to the newest version of Angular is still under active development as it is most important thing on the roadmap at the moment. We are getting closer to the new release. We continue fixing bugs and adding other improvements.

### SIG VMWare

Expand Down Expand Up @@ -1639,7 +1639,7 @@ filename | sha512 hash
* kubeadm: always pass spec.nodeName as --hostname-override for kube-proxy ([#71283](https://github.com/kubernetes/kubernetes/pull/71283), [@Klaven](https://github.com/Klaven))
* kubeadm join correctly uses --node-name and --cri-socket when --config option is also used ([#71270](https://github.com/kubernetes/kubernetes/pull/71270), [@bart0sh](https://github.com/bart0sh))
* apiserver can be configured to reject requests that cannot be audit-logged. ([#65763](https://github.com/kubernetes/kubernetes/pull/65763), [@x13n](https://github.com/x13n))
* Kubelet Device Plugin Registration directory changed from from `{kubelet_root_dir}/plugins/` to `{kubelet_root_dir}/plugins_registry/`. Any drivers (CSI or device plugin) that were using the old path must be updated to work with this version. ([#70494](https://github.com/kubernetes/kubernetes/pull/70494), [@RenaudWasTaken](https://github.com/RenaudWasTaken))
* Kubelet Device Plugin Registration directory changed from `{kubelet_root_dir}/plugins/` to `{kubelet_root_dir}/plugins_registry/`. Any drivers (CSI or device plugin) that were using the old path must be updated to work with this version. ([#70494](https://github.com/kubernetes/kubernetes/pull/70494), [@RenaudWasTaken](https://github.com/RenaudWasTaken))
* When the BoundServiceAccountTokenVolumes Alpha feature is enabled, ServiceAccount volumes now use a projected volume source and their names have the prefix "kube-api-access". ([#69848](https://github.com/kubernetes/kubernetes/pull/69848), [@mikedanese](https://github.com/mikedanese))


Expand Down
2 changes: 1 addition & 1 deletion cmd/kubeadm/app/cmd/alpha/certs.go
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ var (
Renewal by default tries to use the certificate authority in the local PKI managed by kubeadm; as alternative
it is possible to use K8s certificate API for certificate renewal, or as a last option, to generate a CSR request.
After renewal, in order to make changes effective, is is required to restart control-plane components and
After renewal, in order to make changes effective, is required to restart control-plane components and
eventually re-distribute the renewed certificate in case the file is used elsewhere.
`)

Expand Down
2 changes: 1 addition & 1 deletion pkg/controller/endpointslice/reconciler.go
Original file line number Diff line number Diff line change
Expand Up @@ -253,7 +253,7 @@ func (r *reconciler) reconcileByPortMapping(

// 3. If there are still desired endpoints left at this point, we try to fit
// the endpoints in a single existing slice. If there are no slices with
// that capacity, we create new slices for the the endpoints.
// that capacity, we create new slices for the endpoints.
slicesToCreate := []*discovery.EndpointSlice{}

for desiredSet.Len() > 0 {
Expand Down
2 changes: 1 addition & 1 deletion pkg/controller/podautoscaler/horizontal.go
Original file line number Diff line number Diff line change
Expand Up @@ -284,7 +284,7 @@ func (a *HorizontalController) computeReplicasForMetrics(hpa *autoscalingv2.Hori
return replicas, metric, statuses, timestamp, nil
}

// Computes the desired number of replicas for for a specific hpa and metric specification,
// Computes the desired number of replicas for a specific hpa and metric specification,
// returning the metric status and a proposed condition to be set on the HPA object.
func (a *HorizontalController) computeReplicasForMetric(hpa *autoscalingv2.HorizontalPodAutoscaler, spec autoscalingv2.MetricSpec,
specReplicas, statusReplicas int32, selector labels.Selector, status *autoscalingv2.MetricStatus) (replicaCountProposal int32, metricNameProposal string,
Expand Down
2 changes: 1 addition & 1 deletion pkg/kubelet/cm/devicemanager/manager.go
Original file line number Diff line number Diff line change
Expand Up @@ -675,7 +675,7 @@ func (m *ManagerImpl) devicesToAllocate(podUID, contName, resource string, requi
}

func (m *ManagerImpl) takeByTopology(resource string, available sets.String, affinity bitmask.BitMask, request int) []string {
// Build a map of of NUMA Nodes to the devices associated with them. A
// Build a map of NUMA Nodes to the devices associated with them. A
// device may be associated to multiple NUMA nodes at the same time. If an
// available device does not have any NUMA Nodes associated with it, add it
// to a list of NUMA Nodes for the fake NUMANode -1.
Expand Down
2 changes: 1 addition & 1 deletion pkg/registry/core/pod/storage/storage_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ func TestCreate(t *testing.T) {
test := genericregistrytest.New(t, storage.Store)
pod := validNewPod()
pod.ObjectMeta = metav1.ObjectMeta{}
// Make an invalid pod with an an incorrect label.
// Make an invalid pod with an incorrect label.
invalidPod := validNewPod()
invalidPod.Namespace = test.TestNamespace()
invalidPod.Labels = map[string]string{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1014,7 +1014,7 @@ func validatePatchWithSetOrderList(patchList, setOrderList interface{}, mergeKey
setOrderIndex++
}
// If patchIndex is inbound but setOrderIndex if out of bound mean there are items mismatching between the patch list and setElementOrder list.
// the second check is is a sanity check, and should always be true if the first is true.
// the second check is a sanity check, and should always be true if the first is true.
if patchIndex < len(nonDeleteList) && setOrderIndex >= len(typedSetOrderList) {
return fmt.Errorf("The order in patch list:\n%v\n doesn't match %s list:\n%v\n", typedPatchList, setElementOrderDirectivePrefix, setOrderList)
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@ func NewCreateCronJobOptions(ioStreams genericclioptions.IOStreams) *CreateCronJ
}
}

// NewCmdCreateCronJob is a command to to create CronJobs.
// NewCmdCreateCronJob is a command to create CronJobs.
func NewCmdCreateCronJob(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command {
o := NewCreateCronJobOptions(ioStreams)
cmd := &cobra.Command{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -179,7 +179,7 @@ func TestGetNextDiskLun(t *testing.T) {
expectedErr: false,
},
{
desc: "LUN -1 and and error shall be returned if there's no available LUN",
desc: "LUN -1 and error shall be returned if there's no available LUN",
isDataDisksFull: true,
expectedLun: -1,
expectedErr: true,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1109,7 +1109,7 @@ func TestSecretVSphereConfig(t *testing.T) {
)
}
}
// Check, if all all connections are configured with the global CA certificate
// Check, if all connections are configured with the global CA certificate
if expectedCaPath := cfg.Global.CAFile; expectedCaPath != "" {
for name, instance := range vs.vsphereInstanceMap {
if actualCaPath := instance.conn.CACert; actualCaPath != expectedCaPath {
Expand Down
2 changes: 1 addition & 1 deletion test/cmd/kubeadm.sh
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ run_kubeadm_tests() {
# comment this out to save yourself from needlessly building here.
make -C "${KUBE_ROOT}" WHAT=cmd/kubeadm

#TODO(runyontr): Remove the the KUBE_TIMEOUT override when
#TODO(runyontr): Remove the KUBE_TIMEOUT override when
# kubernetes/kubeadm/issues/1430 is fixed
make -C "${KUBE_ROOT}" test \
WHAT=k8s.io/kubernetes/cmd/kubeadm/test/cmd \
Expand Down
2 changes: 1 addition & 1 deletion test/e2e/apimachinery/webhook.go
Original file line number Diff line number Diff line change
Expand Up @@ -269,7 +269,7 @@ var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
Testname: Admission webhook, admission control not allowed on webhook configuration objects
Description: Register webhooks that mutate and deny deletion of webhook configuration objects. Attempt to create
and delete a webhook configuration object; both operations MUST be allowed and the webhook configuration object
MUST NOT be mutated the the webhooks.
MUST NOT be mutated the webhooks.
*/
framework.ConformanceIt("should not be able to mutate or prevent deletion of webhook configuration objects", func() {
validatingWebhookCleanup := registerValidatingWebhookForWebhookConfigurations(f, f.UniqueName+"blocking", context, servicePort)
Expand Down
2 changes: 1 addition & 1 deletion test/e2e_kubeadm/kubeadm_config_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ var _ = KubeadmDescribe("kubeadm-config ConfigMap", func() {
)
})

ginkgo.It("should be accessible for for nodes", func() {
ginkgo.It("should be accessible for nodes", func() {
ExpectSubjectHasAccessToResource(f.ClientSet,
rbacv1.GroupKind, nodesGroup,
kubeadmConfigConfigMapResource,
Expand Down
2 changes: 1 addition & 1 deletion test/images/agnhost/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -461,7 +461,7 @@ Usage:

### porter

Serves requested data on ports specified in ENV variables. For example, if the the environment
Serves requested data on ports specified in ENV variables. For example, if the environment
variable `SERVE_PORT_9001` is set, then the subcommand will start serving on the port 9001.
Additionally, if the environment variable `SERVE_TLS_PORT_9002` is set, then the subcommand
will start a TLS server on that port.
Expand Down
2 changes: 1 addition & 1 deletion test/images/agnhost/porter/porter.go
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ const tlsPrefix = "SERVE_TLS_PORT_"
var CmdPorter = &cobra.Command{
Use: "porter",
Short: "Serves requested data on ports specified in ENV variables",
Long: `Serves requested data on ports specified in ENV variables. For example, if the the environment variable "SERVE_PORT_9001" is set, then the subcommand will start serving on the port 9001.
Long: `Serves requested data on ports specified in ENV variables. For example, if the environment variable "SERVE_PORT_9001" is set, then the subcommand will start serving on the port 9001.
Additionally, if the environment variable "SERVE_TLS_PORT_9002" is set, then the subcommand will start a TLS server on that port.
Expand Down
2 changes: 1 addition & 1 deletion test/images/node-perf/npb-ep/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

The container image described here runs the EP benchmark from the
[NAS parallel benchmark suite.](https://www.nas.nasa.gov/publications/npb.html)
This image is used as a workload in in node performance testing.
This image is used as a workload in node performance testing.

## How to release:
```
Expand Down
2 changes: 1 addition & 1 deletion test/images/node-perf/npb-is/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

The container image described here runs the IS benchmark from the
[NAS parallel benchmark suite.](https://www.nas.nasa.gov/publications/npb.html)
This image is used as a workload in in node performance testing.
This image is used as a workload in node performance testing.

## How to release:
```
Expand Down
2 changes: 1 addition & 1 deletion test/images/node-perf/tf-wide-deep/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
The container image described here predicts the income using the census income dataset in Tensorflow. For more
information, see
[https://github.com/tensorflow/models/tree/master/official/wide_deep](https://github.com/tensorflow/models/tree/master/official/wide_deep).
This image is used as a workload in in node performance testing.
This image is used as a workload in node performance testing.

## How to release:
```
Expand Down
2 changes: 1 addition & 1 deletion test/images/regression-issue-74839/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
Network services with heavy load will cause "connection reset" from time to
time. Especially those with big payloads. When packets with sequence number
out-of-window arrived k8s node, conntrack marked them as INVALID. kube-proxy
will ignore them, without rewriting DNAT. The packet goes back the the original
will ignore them, without rewriting DNAT. The packet goes back the original
pod, who doesn't recognize the packet because of the wrong source ip, end up
RSTing the connection.

Expand Down

0 comments on commit de3cf23

Please sign in to comment.