diff --git a/api/api.go b/api/api.go index a49e84f85336..b30740767c83 100644 --- a/api/api.go +++ b/api/api.go @@ -435,7 +435,7 @@ func cloneWithTimeout(httpClient *http.Client, t time.Duration) (*http.Client, e return &nc, nil } -// ConfigureTLS applies a set of TLS configurations to the the HTTP client. +// ConfigureTLS applies a set of TLS configurations to the HTTP client. func ConfigureTLS(httpClient *http.Client, tlsConfig *TLSConfig) error { if tlsConfig == nil { return nil diff --git a/api/csi.go b/api/csi.go index 8a7a63dca283..65e1ca569f30 100644 --- a/api/csi.go +++ b/api/csi.go @@ -507,7 +507,7 @@ type CSISnapshotCreateResponse struct { } // CSISnapshotListRequest is a request to a controller plugin to list all the -// snapshot known to the the storage provider. This request is paginated by +// snapshot known to the storage provider. This request is paginated by // the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken // fields type CSISnapshotListRequest struct { diff --git a/client/allocrunner/network_manager_linux.go b/client/allocrunner/network_manager_linux.go index e5ddaca8232a..50f509b14166 100644 --- a/client/allocrunner/network_manager_linux.go +++ b/client/allocrunner/network_manager_linux.go @@ -47,7 +47,7 @@ func newNetworkManager(alloc *structs.Allocation, driverManager drivermanager.Ma // to do extra work driverCaps := make(map[string]struct{}) for _, task := range tg.Tasks { - // the task's netmode defaults to the the task group but can be overridden + // the task's netmode defaults to the task group but can be overridden taskNetMode := tgNetMode if len(task.Resources.Networks) > 0 && task.Resources.Networks[0].Mode != "" { taskNetMode = task.Resources.Networks[0].Mode diff --git a/client/allocrunner/tasklifecycle/coordinator_test.go b/client/allocrunner/tasklifecycle/coordinator_test.go index 6e86b18e99f2..10afa2d20cbd 100644 --- a/client/allocrunner/tasklifecycle/coordinator_test.go +++ b/client/allocrunner/tasklifecycle/coordinator_test.go @@ -374,7 +374,7 @@ func TestCoordinator_PoststartStartsAfterMain(t *testing.T) { // Only use the tasks that we care about. tasks = []*structs.Task{mainTask, sideTask, postTask} - // Make the the third task is a poststart hook + // Make the third task is a poststart hook postTask.Lifecycle.Hook = structs.TaskLifecycleHookPoststart shutdownCh := make(chan struct{}) diff --git a/command/alloc_stop.go b/command/alloc_stop.go index 37bbfccb1ed5..98c3d9a0c27d 100644 --- a/command/alloc_stop.go +++ b/command/alloc_stop.go @@ -42,7 +42,7 @@ Stop Specific Options: eval-status command. -no-shutdown-delay - Ignore the the group and task shutdown_delay configuration so there is no + Ignore the group and task shutdown_delay configuration so there is no delay between service deregistration and task shutdown. Note that using this flag will result in failed network connections to the allocation being stopped. diff --git a/drivers/shared/capabilities/defaults.go b/drivers/shared/capabilities/defaults.go index 2b1b817830cf..31fd3869d944 100644 --- a/drivers/shared/capabilities/defaults.go +++ b/drivers/shared/capabilities/defaults.go @@ -135,7 +135,7 @@ func LegacySupported() *Set { // // The task will drop any capabilities specified in cap_drop, and add back // capabilities specified in cap_add. The task will not be allowed to add capabilities -// not set in the the allow_caps setting (which by default is the same as the basis). +// not set in the allow_caps setting (which by default is the same as the basis). // // cap_add takes precedence over cap_drop, enabling the common pattern of dropping // all capabilities, then adding back the desired smaller set. e.g. diff --git a/drivers/shared/executor/executor.go b/drivers/shared/executor/executor.go index afd7ba8090e6..e4450fc77b0f 100644 --- a/drivers/shared/executor/executor.go +++ b/drivers/shared/executor/executor.go @@ -142,7 +142,7 @@ type ExecCommand struct { // Mounts are the host paths to be be made available inside rootfs Mounts []*drivers.MountConfig - // Devices are the the device nodes to be created in isolation environment + // Devices are the device nodes to be created in isolation environment Devices []*drivers.DeviceConfig // NetworkIsolation is the network isolation configuration. diff --git a/nomad/csi_endpoint.go b/nomad/csi_endpoint.go index ba14fe51042b..26cfa9432a2e 100644 --- a/nomad/csi_endpoint.go +++ b/nomad/csi_endpoint.go @@ -992,7 +992,7 @@ func (v *CSIVolume) lookupExternalNodeID(vol *structs.CSIVolume, claim *structs. return "", fmt.Errorf("%s: %s", structs.ErrUnknownNodePrefix, claim.NodeID) } - // get the the storage provider's ID for the client node (not + // get the storage provider's ID for the client node (not // Nomad's ID for the node) targetCSIInfo, ok := targetNode.CSINodePlugins[vol.PluginID] if !ok || targetCSIInfo.NodeInfo == nil { diff --git a/nomad/structs/csi.go b/nomad/structs/csi.go index 51acd84a9b6d..a0eac38a6c59 100644 --- a/nomad/structs/csi.go +++ b/nomad/structs/csi.go @@ -967,7 +967,7 @@ type CSIVolumeListResponse struct { } // CSIVolumeExternalListRequest is a request to a controller plugin to list -// all the volumes known to the the storage provider. This request is +// all the volumes known to the storage provider. This request is // paginated by the plugin and accepts the QueryOptions.PerPage and // QueryOptions.NextToken fields type CSIVolumeExternalListRequest struct { @@ -1055,7 +1055,7 @@ type CSISnapshotDeleteResponse struct { } // CSISnapshotListRequest is a request to a controller plugin to list all the -// snapshot known to the the storage provider. This request is paginated by +// snapshot known to the storage provider. This request is paginated by // the plugin and accepts the QueryOptions.PerPage and QueryOptions.NextToken // fields type CSISnapshotListRequest struct { diff --git a/nomad/vault.go b/nomad/vault.go index 8d5ba610a3a0..e2827a12284e 100644 --- a/nomad/vault.go +++ b/nomad/vault.go @@ -76,7 +76,7 @@ const ( var ( // vaultCapabilitiesCapability is the expected capability of Nomad's Vault - // token on the the path. The token must have at least one of the + // token on the path. The token must have at least one of the // capabilities. vaultCapabilitiesCapability = []string{"update", "root"} @@ -95,12 +95,12 @@ var ( // the capabilities. vaultTokenRevokeCapability = []string{"update", "root"} - // vaultRoleLookupCapability is the the expected capability Nomad's Vault + // vaultRoleLookupCapability is the expected capability Nomad's Vault // token should have on the path. The token must have at least one of the // capabilities. vaultRoleLookupCapability = []string{"read", "root"} - // vaultTokenRoleCreateCapability is the the expected capability Nomad's Vault + // vaultTokenRoleCreateCapability is the expected capability Nomad's Vault // token should have on the path. The token must have at least one of the // capabilities. vaultTokenRoleCreateCapability = []string{"update", "root"} diff --git a/plugins/device/proto/device.pb.go b/plugins/device/proto/device.pb.go index 8d2069dacd01..815268efc444 100644 --- a/plugins/device/proto/device.pb.go +++ b/plugins/device/proto/device.pb.go @@ -337,7 +337,7 @@ func (m *ReserveRequest) GetDeviceIds() []string { } // ReserveResponse informs Nomad how to expose the requested devices -// to the the task. +// to the task. type ReserveResponse struct { // container_res contains information on how to mount the device // into a task isolated using container technologies (where the diff --git a/plugins/device/proto/device.proto b/plugins/device/proto/device.proto index 6ffa9bc4aa82..d627c3ce405d 100644 --- a/plugins/device/proto/device.proto +++ b/plugins/device/proto/device.proto @@ -92,7 +92,7 @@ message ReserveRequest { } // ReserveResponse informs Nomad how to expose the requested devices -// to the the task. +// to the task. message ReserveResponse { // container_res contains information on how to mount the device // into a task isolated using container technologies (where the diff --git a/plugins/drivers/plugin.go b/plugins/drivers/plugin.go index d1522688e228..6f1ee95a5062 100644 --- a/plugins/drivers/plugin.go +++ b/plugins/drivers/plugin.go @@ -17,7 +17,7 @@ import ( var _ plugin.GRPCPlugin = &PluginDriver{} // PluginDriver wraps a DriverPlugin and implements go-plugins GRPCPlugin -// interface to expose the the interface over gRPC +// interface to expose the interface over gRPC type PluginDriver struct { plugin.NetRPCUnsupportedPlugin impl DriverPlugin diff --git a/scheduler/benchmarks/helpers_test.go b/scheduler/benchmarks/helpers_test.go index b04a0b2bf9a6..e41c4186d047 100644 --- a/scheduler/benchmarks/helpers_test.go +++ b/scheduler/benchmarks/helpers_test.go @@ -5,7 +5,7 @@ package benchmarks // Test helper functions for running scheduling tests and benchmarks // against real world state snapshots or data directories. These live -// here and not in the the parent scheduler package because it would +// here and not in the parent scheduler package because it would // create circular imports between the scheduler and raftutils package // (via the nomad package)