Skip to content

Commit

Permalink
all: remove repetitive words
Browse files Browse the repository at this point in the history
Signed-off-by: deterclosed <[email protected]>
  • Loading branch information
deterclosed authored and tklauser committed Mar 28, 2024
1 parent 5daf681 commit dbf327d
Show file tree
Hide file tree
Showing 16 changed files with 17 additions and 17 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ mutual authentication requires a framework secure identity verification for dist

.. Note::

To learn more about the the Mutual Authentication architecture for the Cilium Service Mesh, read the `CFP <https://github.com/cilium/design-cfps/blob/main/cilium/CFP-22215-mutual-auth-for-service-mesh.md>`_.
To learn more about the Mutual Authentication architecture for the Cilium Service Mesh, read the `CFP <https://github.com/cilium/design-cfps/blob/main/cilium/CFP-22215-mutual-auth-for-service-mesh.md>`_.

.. _identity_management:

Expand Down
2 changes: 1 addition & 1 deletion operator/api/server.go
Original file line number Diff line number Diff line change
Expand Up @@ -100,7 +100,7 @@ func (s *server) Start(ctx cell.HookContext) error {

mux := http.NewServeMux()

// Index handler is the the handler for Open-API router.
// Index handler is the handler for Open-API router.
mux.Handle("/", s.Server.GetHandler())
// Create a custom handler for /healthz as an alias to /v1/healthz. A http mux
// is required for this because open-api spec does not allow multiple base paths
Expand Down
2 changes: 1 addition & 1 deletion pkg/auth/authmap_gc_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -376,7 +376,7 @@ func Test_authMapGarbageCollector_cleanupEndpointsNoopCase(t *testing.T) {

err := gc.cleanupEndpoints(ctx)
assert.NoError(t, err)
assert.Len(t, authMap.entries, 3, "GC runs should not have deleted entries when all secrity IDs were stil in the the endpoint map")
assert.Len(t, authMap.entries, 3, "GC runs should not have deleted entries when all secrity IDs were stil in the endpoint map")
}

func Test_authMapGarbageCollector_HandleNodeEventError(t *testing.T) {
Expand Down
2 changes: 1 addition & 1 deletion pkg/counter/prefixes.go
Original file line number Diff line number Diff line change
Expand Up @@ -135,7 +135,7 @@ func (p *PrefixLengthCounter) Add(prefixes []netip.Prefix) (bool, error) {
return newV4Prefixes || newV6Prefixes, nil
}

// Delete reduces references to prefix lengths in the the specified IPNets from
// Delete reduces references to prefix lengths in the specified IPNets from
// the counter. Returns true if removing references to these prefix lengths
// would result in a decrese in the total number of unique prefix lengths in
// the counter.
Expand Down
4 changes: 2 additions & 2 deletions pkg/defaults/defaults.go
Original file line number Diff line number Diff line change
Expand Up @@ -441,11 +441,11 @@ const (
// policy updates are invoked.
PolicyTriggerInterval = 1 * time.Second

// K8sClientQPSLimit is the default qps for the k8s client. It is set to 0 because the the k8s client
// K8sClientQPSLimit is the default qps for the k8s client. It is set to 0 because the k8s client
// has its own default.
K8sClientQPSLimit float32 = 0.0

// K8sClientBurst is the default burst for the k8s client. It is set to 0 because the the k8s client
// K8sClientBurst is the default burst for the k8s client. It is set to 0 because the k8s client
// has its own default.
K8sClientBurst = 0

Expand Down
2 changes: 1 addition & 1 deletion pkg/fqdn/cache.go
Original file line number Diff line number Diff line change
Expand Up @@ -217,7 +217,7 @@ func (c *DNSCache) updateWithEntry(entry *cacheEntry) bool {
return changed
}

// AddNameToCleanup adds the IP with the given TTL to the the cleanup map to
// AddNameToCleanup adds the IP with the given TTL to the cleanup map to
// delete the entry from the policy when it expires.
// Need to be called with a write lock
func (c *DNSCache) addNameToCleanup(entry *cacheEntry) {
Expand Down
2 changes: 1 addition & 1 deletion pkg/identity/cache/allocator.go
Original file line number Diff line number Diff line change
Expand Up @@ -211,7 +211,7 @@ func (m *CachingIdentityAllocator) InitIdentityAllocator(client clientset.Interf

const eventsQueueSize = 1024

// InitIdentityAllocator creates the the identity allocator. Only the first
// InitIdentityAllocator creates the identity allocator. Only the first
// invocation of this function will have an effect. The Caller must have
// initialized well known identities before calling this (by calling
// identity.InitWellKnownIdentities()).
Expand Down
2 changes: 1 addition & 1 deletion pkg/ipam/types.go
Original file line number Diff line number Diff line change
Expand Up @@ -121,7 +121,7 @@ func (ipam *IPAM) DebugStatus() string {
return str
}

// Pool is the the IP pool from which to allocate.
// Pool is the IP pool from which to allocate.
type Pool string

func (p Pool) String() string {
Expand Down
2 changes: 1 addition & 1 deletion pkg/kvstore/etcd.go
Original file line number Diff line number Diff line change
Expand Up @@ -463,7 +463,7 @@ func (e *etcdClient) isConnectedAndHasQuorum(ctx context.Context) error {
defer cancel()

select {
// Wait for the the initial connection to be established
// Wait for the initial connection to be established
case <-e.firstSession:
if err := e.sessionError(); err != nil {
return err
Expand Down
2 changes: 1 addition & 1 deletion pkg/labels/oplabels.go
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ func (k keepMarks) set(key string) {
k[key] = struct{}{} // marked for keeping
}

// OpLabels represents the the possible types.
// OpLabels represents the possible types.
type OpLabels struct {
// Active labels that are enabled and disabled but not deleted
Custom Labels
Expand Down
2 changes: 1 addition & 1 deletion pkg/policy/repository.go
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ type PolicyContext interface {

// GetEnvoyHTTPRules translates the given 'api.L7Rules' into
// the protobuf representation the Envoy can consume. The bool
// return parameter tells whether the the rule enforcement can
// return parameter tells whether the rule enforcement can
// be short-circuited upon the first allowing rule. This is
// false if any of the rules has side-effects, requiring all
// such rules being evaluated.
Expand Down
2 changes: 1 addition & 1 deletion pkg/policy/selectorcache_selector.go
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,7 @@ type CachedSelectionUser interface {
// identitySelector. Users of the SelectorCache take care of creating
// identitySelectors as needed by identity policies. The set of
// identitySelectors is read locked during an IdentityPolicy update so
// that the the policy is always updated using a coherent set of
// that the policy is always updated using a coherent set of
// cached selections.
//
// identitySelector is used as a map key, so it must not be implemented by a
Expand Down
2 changes: 1 addition & 1 deletion pkg/service/service_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -822,7 +822,7 @@ func (m *ManagerTestSuite) TestHealthCheckNodePort(c *C) {
_, _, _ = m.svc.UpsertService(p1)
c.Assert(m.svcHealth.ServiceByPort(32001).LocalEndpoints, Equals, len(localActiveBackends))

// Insert the the ClusterIP frontend of svc1
// Insert the ClusterIP frontend of svc1
p2 := &lb.SVC{
Frontend: clusterIP,
Backends: allBackends,
Expand Down
2 changes: 1 addition & 1 deletion pkg/statedb/reflector/k8s.go
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ func Kubernetes[Obj any](p KubernetesParams[Obj]) Reflector[Obj] {
}

// KubernetesCell constructs a cell that constructs a Kubernetes source and
// adds it to the the application lifecycle. If you need dynamic control
// adds it to the application lifecycle. If you need dynamic control
// over if and when to start or stop the reflection, use [Kubernetes] and
// call Reflector.Start and Reflector.Stop manually.
//
Expand Down
2 changes: 1 addition & 1 deletion test/helpers/cmd.go
Original file line number Diff line number Diff line change
Expand Up @@ -144,7 +144,7 @@ type CmdRes struct {
stderr *Buffer // Stderr from running cmd
success bool // Whether command successfully executed
exitcode int // The exit code of cmd
duration time.Duration // Is the representation of the the time that command took to execute.
duration time.Duration // Is the representation of the time that command took to execute.
wg *sync.WaitGroup // Used to wait until the command has finished running when used in conjunction with a Context
err error // If the command had any error being executed, the error will be written here.
}
Expand Down
2 changes: 1 addition & 1 deletion test/helpers/kubectl.go
Original file line number Diff line number Diff line change
Expand Up @@ -3392,7 +3392,7 @@ func (kub *Kubectl) CiliumCheckReport(ctx context.Context) {
total++
status := strings.SplitN(data, "::", 2)
if len(status) != 2 {
// Just make sure that the the len of the output is 2 to not
// Just make sure that the len of the output is 2 to not
// fail on index error in the following lines.
continue
}
Expand Down

0 comments on commit dbf327d

Please sign in to comment.