diff --git a/CHANGELOG-1.13.md b/CHANGELOG-1.13.md index 80c3d30b7e8db..2e0af331f1389 100644 --- a/CHANGELOG-1.13.md +++ b/CHANGELOG-1.13.md @@ -1181,7 +1181,7 @@ SIG Storage also moves support for Block Volumes to beta (introduced as alpha in ### SIG UI -The migration to the newest version of Angular is still under active development as it is most important thing on the roadmap at the moment. We are getting closer to to the new release. We continue fixing bugs and adding other improvements. +The migration to the newest version of Angular is still under active development as it is most important thing on the roadmap at the moment. We are getting closer to the new release. We continue fixing bugs and adding other improvements. ### SIG VMWare @@ -1639,7 +1639,7 @@ filename | sha512 hash * kubeadm: always pass spec.nodeName as --hostname-override for kube-proxy ([#71283](https://github.com/kubernetes/kubernetes/pull/71283), [@Klaven](https://github.com/Klaven)) * kubeadm join correctly uses --node-name and --cri-socket when --config option is also used ([#71270](https://github.com/kubernetes/kubernetes/pull/71270), [@bart0sh](https://github.com/bart0sh)) * apiserver can be configured to reject requests that cannot be audit-logged. ([#65763](https://github.com/kubernetes/kubernetes/pull/65763), [@x13n](https://github.com/x13n)) -* Kubelet Device Plugin Registration directory changed from from `{kubelet_root_dir}/plugins/` to `{kubelet_root_dir}/plugins_registry/`. Any drivers (CSI or device plugin) that were using the old path must be updated to work with this version. ([#70494](https://github.com/kubernetes/kubernetes/pull/70494), [@RenaudWasTaken](https://github.com/RenaudWasTaken)) +* Kubelet Device Plugin Registration directory changed from `{kubelet_root_dir}/plugins/` to `{kubelet_root_dir}/plugins_registry/`. Any drivers (CSI or device plugin) that were using the old path must be updated to work with this version. ([#70494](https://github.com/kubernetes/kubernetes/pull/70494), [@RenaudWasTaken](https://github.com/RenaudWasTaken)) * When the BoundServiceAccountTokenVolumes Alpha feature is enabled, ServiceAccount volumes now use a projected volume source and their names have the prefix "kube-api-access". ([#69848](https://github.com/kubernetes/kubernetes/pull/69848), [@mikedanese](https://github.com/mikedanese)) diff --git a/cmd/kubeadm/app/cmd/alpha/certs.go b/cmd/kubeadm/app/cmd/alpha/certs.go index 7861f91c882ce..f282b7efac887 100644 --- a/cmd/kubeadm/app/cmd/alpha/certs.go +++ b/cmd/kubeadm/app/cmd/alpha/certs.go @@ -49,7 +49,7 @@ var ( Renewal by default tries to use the certificate authority in the local PKI managed by kubeadm; as alternative it is possible to use K8s certificate API for certificate renewal, or as a last option, to generate a CSR request. - After renewal, in order to make changes effective, is is required to restart control-plane components and + After renewal, in order to make changes effective, is required to restart control-plane components and eventually re-distribute the renewed certificate in case the file is used elsewhere. `) diff --git a/pkg/controller/endpointslice/reconciler.go b/pkg/controller/endpointslice/reconciler.go index 9abb1c9e7ebcd..a275896713eec 100644 --- a/pkg/controller/endpointslice/reconciler.go +++ b/pkg/controller/endpointslice/reconciler.go @@ -253,7 +253,7 @@ func (r *reconciler) reconcileByPortMapping( // 3. If there are still desired endpoints left at this point, we try to fit // the endpoints in a single existing slice. If there are no slices with - // that capacity, we create new slices for the the endpoints. + // that capacity, we create new slices for the endpoints. slicesToCreate := []*discovery.EndpointSlice{} for desiredSet.Len() > 0 { diff --git a/pkg/controller/podautoscaler/horizontal.go b/pkg/controller/podautoscaler/horizontal.go index 31aea7afb4411..e2502ab4fa0bd 100644 --- a/pkg/controller/podautoscaler/horizontal.go +++ b/pkg/controller/podautoscaler/horizontal.go @@ -284,7 +284,7 @@ func (a *HorizontalController) computeReplicasForMetrics(hpa *autoscalingv2.Hori return replicas, metric, statuses, timestamp, nil } -// Computes the desired number of replicas for for a specific hpa and metric specification, +// Computes the desired number of replicas for a specific hpa and metric specification, // returning the metric status and a proposed condition to be set on the HPA object. func (a *HorizontalController) computeReplicasForMetric(hpa *autoscalingv2.HorizontalPodAutoscaler, spec autoscalingv2.MetricSpec, specReplicas, statusReplicas int32, selector labels.Selector, status *autoscalingv2.MetricStatus) (replicaCountProposal int32, metricNameProposal string, diff --git a/pkg/kubelet/cm/devicemanager/manager.go b/pkg/kubelet/cm/devicemanager/manager.go index 12a5c6da90065..759b71ea0a1fd 100644 --- a/pkg/kubelet/cm/devicemanager/manager.go +++ b/pkg/kubelet/cm/devicemanager/manager.go @@ -675,7 +675,7 @@ func (m *ManagerImpl) devicesToAllocate(podUID, contName, resource string, requi } func (m *ManagerImpl) takeByTopology(resource string, available sets.String, affinity bitmask.BitMask, request int) []string { - // Build a map of of NUMA Nodes to the devices associated with them. A + // Build a map of NUMA Nodes to the devices associated with them. A // device may be associated to multiple NUMA nodes at the same time. If an // available device does not have any NUMA Nodes associated with it, add it // to a list of NUMA Nodes for the fake NUMANode -1. diff --git a/pkg/registry/core/pod/storage/storage_test.go b/pkg/registry/core/pod/storage/storage_test.go index 545e6362cb9bc..b511720ebe1a1 100644 --- a/pkg/registry/core/pod/storage/storage_test.go +++ b/pkg/registry/core/pod/storage/storage_test.go @@ -105,7 +105,7 @@ func TestCreate(t *testing.T) { test := genericregistrytest.New(t, storage.Store) pod := validNewPod() pod.ObjectMeta = metav1.ObjectMeta{} - // Make an invalid pod with an an incorrect label. + // Make an invalid pod with an incorrect label. invalidPod := validNewPod() invalidPod.Namespace = test.TestNamespace() invalidPod.Labels = map[string]string{ diff --git a/staging/src/k8s.io/apimachinery/pkg/util/strategicpatch/patch.go b/staging/src/k8s.io/apimachinery/pkg/util/strategicpatch/patch.go index ddf998172c016..c55894e5023f2 100644 --- a/staging/src/k8s.io/apimachinery/pkg/util/strategicpatch/patch.go +++ b/staging/src/k8s.io/apimachinery/pkg/util/strategicpatch/patch.go @@ -1014,7 +1014,7 @@ func validatePatchWithSetOrderList(patchList, setOrderList interface{}, mergeKey setOrderIndex++ } // If patchIndex is inbound but setOrderIndex if out of bound mean there are items mismatching between the patch list and setElementOrder list. - // the second check is is a sanity check, and should always be true if the first is true. + // the second check is a sanity check, and should always be true if the first is true. if patchIndex < len(nonDeleteList) && setOrderIndex >= len(typedSetOrderList) { return fmt.Errorf("The order in patch list:\n%v\n doesn't match %s list:\n%v\n", typedPatchList, setElementOrderDirectivePrefix, setOrderList) } diff --git a/staging/src/k8s.io/kubectl/pkg/cmd/create/create_cronjob.go b/staging/src/k8s.io/kubectl/pkg/cmd/create/create_cronjob.go index c916ed1269dab..79988c7ac9b11 100644 --- a/staging/src/k8s.io/kubectl/pkg/cmd/create/create_cronjob.go +++ b/staging/src/k8s.io/kubectl/pkg/cmd/create/create_cronjob.go @@ -76,7 +76,7 @@ func NewCreateCronJobOptions(ioStreams genericclioptions.IOStreams) *CreateCronJ } } -// NewCmdCreateCronJob is a command to to create CronJobs. +// NewCmdCreateCronJob is a command to create CronJobs. func NewCmdCreateCronJob(f cmdutil.Factory, ioStreams genericclioptions.IOStreams) *cobra.Command { o := NewCreateCronJobOptions(ioStreams) cmd := &cobra.Command{ diff --git a/staging/src/k8s.io/legacy-cloud-providers/azure/azure_controller_common_test.go b/staging/src/k8s.io/legacy-cloud-providers/azure/azure_controller_common_test.go index 477c35b1cf5b0..905b95753c5a4 100644 --- a/staging/src/k8s.io/legacy-cloud-providers/azure/azure_controller_common_test.go +++ b/staging/src/k8s.io/legacy-cloud-providers/azure/azure_controller_common_test.go @@ -179,7 +179,7 @@ func TestGetNextDiskLun(t *testing.T) { expectedErr: false, }, { - desc: "LUN -1 and and error shall be returned if there's no available LUN", + desc: "LUN -1 and error shall be returned if there's no available LUN", isDataDisksFull: true, expectedLun: -1, expectedErr: true, diff --git a/staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_test.go b/staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_test.go index 5c95c9e43d09d..96e4b80198825 100644 --- a/staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_test.go +++ b/staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_test.go @@ -1109,7 +1109,7 @@ func TestSecretVSphereConfig(t *testing.T) { ) } } - // Check, if all all connections are configured with the global CA certificate + // Check, if all connections are configured with the global CA certificate if expectedCaPath := cfg.Global.CAFile; expectedCaPath != "" { for name, instance := range vs.vsphereInstanceMap { if actualCaPath := instance.conn.CACert; actualCaPath != expectedCaPath { diff --git a/test/cmd/kubeadm.sh b/test/cmd/kubeadm.sh index 94bddf062fc50..563106feabc7d 100755 --- a/test/cmd/kubeadm.sh +++ b/test/cmd/kubeadm.sh @@ -28,7 +28,7 @@ run_kubeadm_tests() { # comment this out to save yourself from needlessly building here. make -C "${KUBE_ROOT}" WHAT=cmd/kubeadm - #TODO(runyontr): Remove the the KUBE_TIMEOUT override when + #TODO(runyontr): Remove the KUBE_TIMEOUT override when # kubernetes/kubeadm/issues/1430 is fixed make -C "${KUBE_ROOT}" test \ WHAT=k8s.io/kubernetes/cmd/kubeadm/test/cmd \ diff --git a/test/e2e/apimachinery/webhook.go b/test/e2e/apimachinery/webhook.go index 3b3c094fb8d20..0ff2aab6e629f 100644 --- a/test/e2e/apimachinery/webhook.go +++ b/test/e2e/apimachinery/webhook.go @@ -269,7 +269,7 @@ var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() { Testname: Admission webhook, admission control not allowed on webhook configuration objects Description: Register webhooks that mutate and deny deletion of webhook configuration objects. Attempt to create and delete a webhook configuration object; both operations MUST be allowed and the webhook configuration object - MUST NOT be mutated the the webhooks. + MUST NOT be mutated the webhooks. */ framework.ConformanceIt("should not be able to mutate or prevent deletion of webhook configuration objects", func() { validatingWebhookCleanup := registerValidatingWebhookForWebhookConfigurations(f, f.UniqueName+"blocking", context, servicePort) diff --git a/test/e2e_kubeadm/kubeadm_config_test.go b/test/e2e_kubeadm/kubeadm_config_test.go index a4d12c714d754..bd652bf9ba058 100644 --- a/test/e2e_kubeadm/kubeadm_config_test.go +++ b/test/e2e_kubeadm/kubeadm_config_test.go @@ -91,7 +91,7 @@ var _ = KubeadmDescribe("kubeadm-config ConfigMap", func() { ) }) - ginkgo.It("should be accessible for for nodes", func() { + ginkgo.It("should be accessible for nodes", func() { ExpectSubjectHasAccessToResource(f.ClientSet, rbacv1.GroupKind, nodesGroup, kubeadmConfigConfigMapResource, diff --git a/test/images/agnhost/README.md b/test/images/agnhost/README.md index 8d59aa51c53b0..bf1578d411e97 100644 --- a/test/images/agnhost/README.md +++ b/test/images/agnhost/README.md @@ -461,7 +461,7 @@ Usage: ### porter -Serves requested data on ports specified in ENV variables. For example, if the the environment +Serves requested data on ports specified in ENV variables. For example, if the environment variable `SERVE_PORT_9001` is set, then the subcommand will start serving on the port 9001. Additionally, if the environment variable `SERVE_TLS_PORT_9002` is set, then the subcommand will start a TLS server on that port. diff --git a/test/images/agnhost/porter/porter.go b/test/images/agnhost/porter/porter.go index 643715d7d528f..72994cc79dc78 100644 --- a/test/images/agnhost/porter/porter.go +++ b/test/images/agnhost/porter/porter.go @@ -39,7 +39,7 @@ const tlsPrefix = "SERVE_TLS_PORT_" var CmdPorter = &cobra.Command{ Use: "porter", Short: "Serves requested data on ports specified in ENV variables", - Long: `Serves requested data on ports specified in ENV variables. For example, if the the environment variable "SERVE_PORT_9001" is set, then the subcommand will start serving on the port 9001. + Long: `Serves requested data on ports specified in ENV variables. For example, if the environment variable "SERVE_PORT_9001" is set, then the subcommand will start serving on the port 9001. Additionally, if the environment variable "SERVE_TLS_PORT_9002" is set, then the subcommand will start a TLS server on that port. diff --git a/test/images/node-perf/npb-ep/README.md b/test/images/node-perf/npb-ep/README.md index 517339adbf4e8..748b757a39380 100644 --- a/test/images/node-perf/npb-ep/README.md +++ b/test/images/node-perf/npb-ep/README.md @@ -2,7 +2,7 @@ The container image described here runs the EP benchmark from the [NAS parallel benchmark suite.](https://www.nas.nasa.gov/publications/npb.html) -This image is used as a workload in in node performance testing. +This image is used as a workload in node performance testing. ## How to release: ``` diff --git a/test/images/node-perf/npb-is/README.md b/test/images/node-perf/npb-is/README.md index 86df86d702a61..4cb88fdef00d3 100644 --- a/test/images/node-perf/npb-is/README.md +++ b/test/images/node-perf/npb-is/README.md @@ -2,7 +2,7 @@ The container image described here runs the IS benchmark from the [NAS parallel benchmark suite.](https://www.nas.nasa.gov/publications/npb.html) -This image is used as a workload in in node performance testing. +This image is used as a workload in node performance testing. ## How to release: ``` diff --git a/test/images/node-perf/tf-wide-deep/README.md b/test/images/node-perf/tf-wide-deep/README.md index 37e394487e76f..285e525527a66 100644 --- a/test/images/node-perf/tf-wide-deep/README.md +++ b/test/images/node-perf/tf-wide-deep/README.md @@ -3,7 +3,7 @@ The container image described here predicts the income using the census income dataset in Tensorflow. For more information, see [https://github.com/tensorflow/models/tree/master/official/wide_deep](https://github.com/tensorflow/models/tree/master/official/wide_deep). -This image is used as a workload in in node performance testing. +This image is used as a workload in node performance testing. ## How to release: ``` diff --git a/test/images/regression-issue-74839/README.md b/test/images/regression-issue-74839/README.md index b897264f77ef8..555de1064032f 100644 --- a/test/images/regression-issue-74839/README.md +++ b/test/images/regression-issue-74839/README.md @@ -3,7 +3,7 @@ Network services with heavy load will cause "connection reset" from time to time. Especially those with big payloads. When packets with sequence number out-of-window arrived k8s node, conntrack marked them as INVALID. kube-proxy -will ignore them, without rewriting DNAT. The packet goes back the the original +will ignore them, without rewriting DNAT. The packet goes back the original pod, who doesn't recognize the packet because of the wrong source ip, end up RSTing the connection.