mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-30 02:02:43 +00:00
remove repetitive words (#25860)
Signed-off-by: suchsoon <silverjadebeauty@gmail.com>
This commit is contained in:
@@ -395,7 +395,7 @@ func (b *backend) initialize(ctx context.Context, req *logical.InitializationReq
|
||||
return nil
|
||||
}
|
||||
|
||||
// awsVersion stores info about the the latest aws version that we have
|
||||
// awsVersion stores info about the latest aws version that we have
|
||||
// upgraded to.
|
||||
type awsVersion struct {
|
||||
Version int `json:"version"`
|
||||
|
||||
@@ -117,7 +117,7 @@ func ParseUserLockouts(result *SharedConfig, list *ast.ObjectList) error {
|
||||
// we set values for these fields with defaults
|
||||
// The issue with not being able to use non-raw entries is because of fields lockout threshold
|
||||
// and disable lockout. We cannot differentiate using non-raw entries if the user configured these fields
|
||||
// with values (0 and false) or if the the user did not configure these values in config file at all.
|
||||
// with values (0 and false) or if the user did not configure these values in config file at all.
|
||||
// The raw fields are set to nil after setting missing values in setNilValuesForRawUserLockoutFields function
|
||||
userLockoutsMap = setMissingUserLockoutValuesInMap(userLockoutsMap)
|
||||
for _, userLockoutValues := range userLockoutsMap {
|
||||
|
||||
@@ -856,7 +856,7 @@ func ensureTableExists(client *dynamodb.DynamoDB, table string, readCapacity, wr
|
||||
|
||||
// recordPathForVaultKey transforms a vault key into
|
||||
// a value suitable for the `DynamoDBRecord`'s `Path`
|
||||
// property. This path equals the the vault key without
|
||||
// property. This path equals the vault key without
|
||||
// its last component.
|
||||
func recordPathForVaultKey(key string) string {
|
||||
if strings.Contains(key, "/") {
|
||||
@@ -867,7 +867,7 @@ func recordPathForVaultKey(key string) string {
|
||||
|
||||
// recordKeyForVaultKey transforms a vault key into
|
||||
// a value suitable for the `DynamoDBRecord`'s `Key`
|
||||
// property. This path equals the the vault key's
|
||||
// property. This path equals the vault key's
|
||||
// last component.
|
||||
func recordKeyForVaultKey(key string) string {
|
||||
return pkgPath.Base(key)
|
||||
|
||||
@@ -159,7 +159,7 @@ func TestConnectionURL(t *testing.T) {
|
||||
for name, tt := range cases {
|
||||
t.Run(name, func(t *testing.T) {
|
||||
// This is necessary to avoid always testing the branch where the env is set.
|
||||
// As long the the env is set --- even if the value is "" --- `ok` returns true.
|
||||
// As long the env is set --- even if the value is "" --- `ok` returns true.
|
||||
if tt.input.envar != "" {
|
||||
os.Setenv("VAULT_PG_CONNECTION_URL", tt.input.envar)
|
||||
defer os.Unsetenv("VAULT_PG_CONNECTION_URL")
|
||||
|
||||
@@ -273,7 +273,7 @@ type LeaderJoinInfo struct {
|
||||
// client authentication during TLS.
|
||||
LeaderClientKey string `json:"leader_client_key"`
|
||||
|
||||
// LeaderCACertFile is the path on disk to the the CA cert file of the
|
||||
// LeaderCACertFile is the path on disk to the CA cert file of the
|
||||
// leader node. This should only be provided via Vault's configuration file.
|
||||
LeaderCACertFile string `json:"leader_ca_cert_file"`
|
||||
|
||||
|
||||
@@ -282,7 +282,7 @@ type RequestExample struct {
|
||||
|
||||
// Response describes and optional demonstrations an operation response.
|
||||
type Response struct {
|
||||
Description string // summary of the the response and should always be provided
|
||||
Description string // summary of the response and should always be provided
|
||||
MediaType string // media type of the response, defaulting to "application/json" if empty
|
||||
Fields map[string]*FieldSchema // the fields present in this response, used to generate openapi response
|
||||
Example *logical.Response // example response data
|
||||
|
||||
@@ -28,7 +28,7 @@ var (
|
||||
// The status code returned does not change because of this error
|
||||
ErrInvalidCredentials = errors.New("invalid credentials")
|
||||
|
||||
// ErrMultiAuthzPending is returned if the the request needs more
|
||||
// ErrMultiAuthzPending is returned if the request needs more
|
||||
// authorizations
|
||||
ErrMultiAuthzPending = errors.New("request needs further approval")
|
||||
|
||||
|
||||
@@ -54,7 +54,7 @@ in the `.yarn/releases` folder. To update to a different version of `yarn`, use
|
||||
## Running a Vault Server
|
||||
|
||||
Before running Vault UI locally, a Vault server must be running. First, ensure
|
||||
Vault dev is built according the the instructions in `../README.md`.
|
||||
Vault dev is built according the instructions in `../README.md`.
|
||||
|
||||
- To start a single local Vault server: `yarn vault`
|
||||
- To start a local Vault cluster: `yarn vault:cluster`
|
||||
|
||||
@@ -257,7 +257,7 @@ type Core struct {
|
||||
// HABackend may be available depending on the physical backend
|
||||
ha physical.HABackend
|
||||
|
||||
// storageType is the the storage type set in the storage configuration
|
||||
// storageType is the storage type set in the storage configuration
|
||||
storageType string
|
||||
|
||||
// redirectAddr is the address we advertise as leader if held
|
||||
|
||||
@@ -1953,7 +1953,7 @@ func (ts *TokenStore) revokeInternal(ctx context.Context, saltedID string, skipO
|
||||
}
|
||||
lock.Unlock()
|
||||
|
||||
// Delete the the child storage entry after we update the token entry Since
|
||||
// Delete the child storage entry after we update the token entry Since
|
||||
// paths are not deeply nested (i.e. they are simply
|
||||
// parenPrefix/<parentID>/<childID>), we can simply call view.Delete instead
|
||||
// of logical.ClearView
|
||||
@@ -4116,7 +4116,7 @@ func (ts *TokenStore) gaugeCollectorByMethod(ctx context.Context) ([]metricsutil
|
||||
|
||||
// mountEntry.Path lacks the "auth/" prefix; perhaps we should
|
||||
// refactor router to provide a method that returns both the matching
|
||||
// path *and* the the mount entry?
|
||||
// path *and* the mount entry?
|
||||
// Or we could just always add "auth/"?
|
||||
matchingMount := ts.core.router.MatchingMount(ctx, path)
|
||||
if matchingMount == "" {
|
||||
|
||||
Reference in New Issue
Block a user