mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-01 11:08:10 +00:00
remove repetitive words (#25860)
Signed-off-by: suchsoon <silverjadebeauty@gmail.com>
This commit is contained in:
@@ -395,7 +395,7 @@ func (b *backend) initialize(ctx context.Context, req *logical.InitializationReq
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// awsVersion stores info about the the latest aws version that we have
|
// awsVersion stores info about the latest aws version that we have
|
||||||
// upgraded to.
|
// upgraded to.
|
||||||
type awsVersion struct {
|
type awsVersion struct {
|
||||||
Version int `json:"version"`
|
Version int `json:"version"`
|
||||||
|
|||||||
@@ -117,7 +117,7 @@ func ParseUserLockouts(result *SharedConfig, list *ast.ObjectList) error {
|
|||||||
// we set values for these fields with defaults
|
// we set values for these fields with defaults
|
||||||
// The issue with not being able to use non-raw entries is because of fields lockout threshold
|
// The issue with not being able to use non-raw entries is because of fields lockout threshold
|
||||||
// and disable lockout. We cannot differentiate using non-raw entries if the user configured these fields
|
// and disable lockout. We cannot differentiate using non-raw entries if the user configured these fields
|
||||||
// with values (0 and false) or if the the user did not configure these values in config file at all.
|
// with values (0 and false) or if the user did not configure these values in config file at all.
|
||||||
// The raw fields are set to nil after setting missing values in setNilValuesForRawUserLockoutFields function
|
// The raw fields are set to nil after setting missing values in setNilValuesForRawUserLockoutFields function
|
||||||
userLockoutsMap = setMissingUserLockoutValuesInMap(userLockoutsMap)
|
userLockoutsMap = setMissingUserLockoutValuesInMap(userLockoutsMap)
|
||||||
for _, userLockoutValues := range userLockoutsMap {
|
for _, userLockoutValues := range userLockoutsMap {
|
||||||
|
|||||||
@@ -856,7 +856,7 @@ func ensureTableExists(client *dynamodb.DynamoDB, table string, readCapacity, wr
|
|||||||
|
|
||||||
// recordPathForVaultKey transforms a vault key into
|
// recordPathForVaultKey transforms a vault key into
|
||||||
// a value suitable for the `DynamoDBRecord`'s `Path`
|
// a value suitable for the `DynamoDBRecord`'s `Path`
|
||||||
// property. This path equals the the vault key without
|
// property. This path equals the vault key without
|
||||||
// its last component.
|
// its last component.
|
||||||
func recordPathForVaultKey(key string) string {
|
func recordPathForVaultKey(key string) string {
|
||||||
if strings.Contains(key, "/") {
|
if strings.Contains(key, "/") {
|
||||||
@@ -867,7 +867,7 @@ func recordPathForVaultKey(key string) string {
|
|||||||
|
|
||||||
// recordKeyForVaultKey transforms a vault key into
|
// recordKeyForVaultKey transforms a vault key into
|
||||||
// a value suitable for the `DynamoDBRecord`'s `Key`
|
// a value suitable for the `DynamoDBRecord`'s `Key`
|
||||||
// property. This path equals the the vault key's
|
// property. This path equals the vault key's
|
||||||
// last component.
|
// last component.
|
||||||
func recordKeyForVaultKey(key string) string {
|
func recordKeyForVaultKey(key string) string {
|
||||||
return pkgPath.Base(key)
|
return pkgPath.Base(key)
|
||||||
|
|||||||
@@ -159,7 +159,7 @@ func TestConnectionURL(t *testing.T) {
|
|||||||
for name, tt := range cases {
|
for name, tt := range cases {
|
||||||
t.Run(name, func(t *testing.T) {
|
t.Run(name, func(t *testing.T) {
|
||||||
// This is necessary to avoid always testing the branch where the env is set.
|
// This is necessary to avoid always testing the branch where the env is set.
|
||||||
// As long the the env is set --- even if the value is "" --- `ok` returns true.
|
// As long the env is set --- even if the value is "" --- `ok` returns true.
|
||||||
if tt.input.envar != "" {
|
if tt.input.envar != "" {
|
||||||
os.Setenv("VAULT_PG_CONNECTION_URL", tt.input.envar)
|
os.Setenv("VAULT_PG_CONNECTION_URL", tt.input.envar)
|
||||||
defer os.Unsetenv("VAULT_PG_CONNECTION_URL")
|
defer os.Unsetenv("VAULT_PG_CONNECTION_URL")
|
||||||
|
|||||||
@@ -273,7 +273,7 @@ type LeaderJoinInfo struct {
|
|||||||
// client authentication during TLS.
|
// client authentication during TLS.
|
||||||
LeaderClientKey string `json:"leader_client_key"`
|
LeaderClientKey string `json:"leader_client_key"`
|
||||||
|
|
||||||
// LeaderCACertFile is the path on disk to the the CA cert file of the
|
// LeaderCACertFile is the path on disk to the CA cert file of the
|
||||||
// leader node. This should only be provided via Vault's configuration file.
|
// leader node. This should only be provided via Vault's configuration file.
|
||||||
LeaderCACertFile string `json:"leader_ca_cert_file"`
|
LeaderCACertFile string `json:"leader_ca_cert_file"`
|
||||||
|
|
||||||
|
|||||||
@@ -282,7 +282,7 @@ type RequestExample struct {
|
|||||||
|
|
||||||
// Response describes and optional demonstrations an operation response.
|
// Response describes and optional demonstrations an operation response.
|
||||||
type Response struct {
|
type Response struct {
|
||||||
Description string // summary of the the response and should always be provided
|
Description string // summary of the response and should always be provided
|
||||||
MediaType string // media type of the response, defaulting to "application/json" if empty
|
MediaType string // media type of the response, defaulting to "application/json" if empty
|
||||||
Fields map[string]*FieldSchema // the fields present in this response, used to generate openapi response
|
Fields map[string]*FieldSchema // the fields present in this response, used to generate openapi response
|
||||||
Example *logical.Response // example response data
|
Example *logical.Response // example response data
|
||||||
|
|||||||
@@ -28,7 +28,7 @@ var (
|
|||||||
// The status code returned does not change because of this error
|
// The status code returned does not change because of this error
|
||||||
ErrInvalidCredentials = errors.New("invalid credentials")
|
ErrInvalidCredentials = errors.New("invalid credentials")
|
||||||
|
|
||||||
// ErrMultiAuthzPending is returned if the the request needs more
|
// ErrMultiAuthzPending is returned if the request needs more
|
||||||
// authorizations
|
// authorizations
|
||||||
ErrMultiAuthzPending = errors.New("request needs further approval")
|
ErrMultiAuthzPending = errors.New("request needs further approval")
|
||||||
|
|
||||||
|
|||||||
@@ -54,7 +54,7 @@ in the `.yarn/releases` folder. To update to a different version of `yarn`, use
|
|||||||
## Running a Vault Server
|
## Running a Vault Server
|
||||||
|
|
||||||
Before running Vault UI locally, a Vault server must be running. First, ensure
|
Before running Vault UI locally, a Vault server must be running. First, ensure
|
||||||
Vault dev is built according the the instructions in `../README.md`.
|
Vault dev is built according the instructions in `../README.md`.
|
||||||
|
|
||||||
- To start a single local Vault server: `yarn vault`
|
- To start a single local Vault server: `yarn vault`
|
||||||
- To start a local Vault cluster: `yarn vault:cluster`
|
- To start a local Vault cluster: `yarn vault:cluster`
|
||||||
|
|||||||
@@ -257,7 +257,7 @@ type Core struct {
|
|||||||
// HABackend may be available depending on the physical backend
|
// HABackend may be available depending on the physical backend
|
||||||
ha physical.HABackend
|
ha physical.HABackend
|
||||||
|
|
||||||
// storageType is the the storage type set in the storage configuration
|
// storageType is the storage type set in the storage configuration
|
||||||
storageType string
|
storageType string
|
||||||
|
|
||||||
// redirectAddr is the address we advertise as leader if held
|
// redirectAddr is the address we advertise as leader if held
|
||||||
|
|||||||
@@ -1953,7 +1953,7 @@ func (ts *TokenStore) revokeInternal(ctx context.Context, saltedID string, skipO
|
|||||||
}
|
}
|
||||||
lock.Unlock()
|
lock.Unlock()
|
||||||
|
|
||||||
// Delete the the child storage entry after we update the token entry Since
|
// Delete the child storage entry after we update the token entry Since
|
||||||
// paths are not deeply nested (i.e. they are simply
|
// paths are not deeply nested (i.e. they are simply
|
||||||
// parenPrefix/<parentID>/<childID>), we can simply call view.Delete instead
|
// parenPrefix/<parentID>/<childID>), we can simply call view.Delete instead
|
||||||
// of logical.ClearView
|
// of logical.ClearView
|
||||||
@@ -4116,7 +4116,7 @@ func (ts *TokenStore) gaugeCollectorByMethod(ctx context.Context) ([]metricsutil
|
|||||||
|
|
||||||
// mountEntry.Path lacks the "auth/" prefix; perhaps we should
|
// mountEntry.Path lacks the "auth/" prefix; perhaps we should
|
||||||
// refactor router to provide a method that returns both the matching
|
// refactor router to provide a method that returns both the matching
|
||||||
// path *and* the the mount entry?
|
// path *and* the mount entry?
|
||||||
// Or we could just always add "auth/"?
|
// Or we could just always add "auth/"?
|
||||||
matchingMount := ts.core.router.MatchingMount(ctx, path)
|
matchingMount := ts.core.router.MatchingMount(ctx, path)
|
||||||
if matchingMount == "" {
|
if matchingMount == "" {
|
||||||
|
|||||||
Reference in New Issue
Block a user