remove repetitive words (#25860)

Signed-off-by: suchsoon <silverjadebeauty@gmail.com>
This commit is contained in:
suchsoon
2024-03-14 02:44:54 +08:00
committed by GitHub
parent b44d9fc19f
commit f86e3d4a68
10 changed files with 12 additions and 12 deletions

View File

@@ -395,7 +395,7 @@ func (b *backend) initialize(ctx context.Context, req *logical.InitializationReq
return nil
}
// awsVersion stores info about the the latest aws version that we have
// awsVersion stores info about the latest aws version that we have
// upgraded to.
type awsVersion struct {
Version int `json:"version"`

View File

@@ -117,7 +117,7 @@ func ParseUserLockouts(result *SharedConfig, list *ast.ObjectList) error {
// we set values for these fields with defaults
// The issue with not being able to use non-raw entries is because of fields lockout threshold
// and disable lockout. We cannot differentiate using non-raw entries if the user configured these fields
// with values (0 and false) or if the the user did not configure these values in config file at all.
// with values (0 and false) or if the user did not configure these values in config file at all.
// The raw fields are set to nil after setting missing values in setNilValuesForRawUserLockoutFields function
userLockoutsMap = setMissingUserLockoutValuesInMap(userLockoutsMap)
for _, userLockoutValues := range userLockoutsMap {

View File

@@ -856,7 +856,7 @@ func ensureTableExists(client *dynamodb.DynamoDB, table string, readCapacity, wr
// recordPathForVaultKey transforms a vault key into
// a value suitable for the `DynamoDBRecord`'s `Path`
// property. This path equals the the vault key without
// property. This path equals the vault key without
// its last component.
func recordPathForVaultKey(key string) string {
if strings.Contains(key, "/") {
@@ -867,7 +867,7 @@ func recordPathForVaultKey(key string) string {
// recordKeyForVaultKey transforms a vault key into
// a value suitable for the `DynamoDBRecord`'s `Key`
// property. This path equals the the vault key's
// property. This path equals the vault key's
// last component.
func recordKeyForVaultKey(key string) string {
return pkgPath.Base(key)

View File

@@ -159,7 +159,7 @@ func TestConnectionURL(t *testing.T) {
for name, tt := range cases {
t.Run(name, func(t *testing.T) {
// This is necessary to avoid always testing the branch where the env is set.
// As long the the env is set --- even if the value is "" --- `ok` returns true.
// As long the env is set --- even if the value is "" --- `ok` returns true.
if tt.input.envar != "" {
os.Setenv("VAULT_PG_CONNECTION_URL", tt.input.envar)
defer os.Unsetenv("VAULT_PG_CONNECTION_URL")

View File

@@ -273,7 +273,7 @@ type LeaderJoinInfo struct {
// client authentication during TLS.
LeaderClientKey string `json:"leader_client_key"`
// LeaderCACertFile is the path on disk to the the CA cert file of the
// LeaderCACertFile is the path on disk to the CA cert file of the
// leader node. This should only be provided via Vault's configuration file.
LeaderCACertFile string `json:"leader_ca_cert_file"`

View File

@@ -282,7 +282,7 @@ type RequestExample struct {
// Response describes and optional demonstrations an operation response.
type Response struct {
Description string // summary of the the response and should always be provided
Description string // summary of the response and should always be provided
MediaType string // media type of the response, defaulting to "application/json" if empty
Fields map[string]*FieldSchema // the fields present in this response, used to generate openapi response
Example *logical.Response // example response data

View File

@@ -28,7 +28,7 @@ var (
// The status code returned does not change because of this error
ErrInvalidCredentials = errors.New("invalid credentials")
// ErrMultiAuthzPending is returned if the the request needs more
// ErrMultiAuthzPending is returned if the request needs more
// authorizations
ErrMultiAuthzPending = errors.New("request needs further approval")

View File

@@ -54,7 +54,7 @@ in the `.yarn/releases` folder. To update to a different version of `yarn`, use
## Running a Vault Server
Before running Vault UI locally, a Vault server must be running. First, ensure
Vault dev is built according the the instructions in `../README.md`.
Vault dev is built according the instructions in `../README.md`.
- To start a single local Vault server: `yarn vault`
- To start a local Vault cluster: `yarn vault:cluster`

View File

@@ -257,7 +257,7 @@ type Core struct {
// HABackend may be available depending on the physical backend
ha physical.HABackend
// storageType is the the storage type set in the storage configuration
// storageType is the storage type set in the storage configuration
storageType string
// redirectAddr is the address we advertise as leader if held

View File

@@ -1953,7 +1953,7 @@ func (ts *TokenStore) revokeInternal(ctx context.Context, saltedID string, skipO
}
lock.Unlock()
// Delete the the child storage entry after we update the token entry Since
// Delete the child storage entry after we update the token entry Since
// paths are not deeply nested (i.e. they are simply
// parenPrefix/<parentID>/<childID>), we can simply call view.Delete instead
// of logical.ClearView
@@ -4116,7 +4116,7 @@ func (ts *TokenStore) gaugeCollectorByMethod(ctx context.Context) ([]metricsutil
// mountEntry.Path lacks the "auth/" prefix; perhaps we should
// refactor router to provide a method that returns both the matching
// path *and* the the mount entry?
// path *and* the mount entry?
// Or we could just always add "auth/"?
matchingMount := ts.core.router.MatchingMount(ctx, path)
if matchingMount == "" {