mirror of https://github.com/linkerd/linkerd2.git
chore: Remove repetitive words (#12330)
Signed-off-by: occupyhabit <wangmengjiao@outlook.com>
This commit is contained in:
parent
9fe13b9341
commit
6eeaea4d94
|
|
@ -694,7 +694,7 @@ spec:
|
|||
t.Fatalf("can't create cluster store: %s", err)
|
||||
}
|
||||
|
||||
// Sync after creating watchers so that the the indexers added get updated
|
||||
// Sync after creating watchers so that the indexers added get updated
|
||||
// properly
|
||||
k8sAPI.Sync(nil)
|
||||
metadataAPI.Sync(nil)
|
||||
|
|
|
|||
|
|
@ -119,7 +119,7 @@ Kubernetes: `>=1.22.0-0`
|
|||
| webhook.UID | string | `nil` | UID for the webhook resource |
|
||||
| webhook.caBundle | string | `""` | Bundle of CA certificates for webhook. If not provided nor injected with cert-manager, then Helm will use the certificate generated for `webhook.crtPEM`. If `webhook.externalSecret` is set to true, this value, injectCaFrom, or injectCaFromSecret must be set, as no certificate will be generated. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector) for more information. |
|
||||
| webhook.collectorSvcAccount | string | `"collector"` | service account associated with the collector instance |
|
||||
| webhook.collectorSvcAddr | string | `"collector.linkerd-jaeger:55678"` | collector service address for the proxies to send trace data. Points by default to the the linkerd-jaeger collector |
|
||||
| webhook.collectorSvcAddr | string | `"collector.linkerd-jaeger:55678"` | collector service address for the proxies to send trace data. Points by default to the linkerd-jaeger collector |
|
||||
| webhook.crtPEM | string | `""` | Certificate for the webhook. If not provided and not using an external secret then Helm will generate one. |
|
||||
| webhook.externalSecret | bool | `false` | Do not create a secret resource for the webhook. If this is set to `true`, the value `webhook.caBundle` must be set or the ca bundle must injected with cert-manager ca injector using `webhook.injectCaFrom` or `webhook.injectCaFromSecret` (see below). |
|
||||
| webhook.failurePolicy | string | `"Ignore"` | |
|
||||
|
|
|
|||
|
|
@ -276,7 +276,7 @@ webhook:
|
|||
injectCaFromSecret: ""
|
||||
|
||||
# -- collector service address for the proxies to send trace data.
|
||||
# Points by default to the the linkerd-jaeger collector
|
||||
# Points by default to the linkerd-jaeger collector
|
||||
collectorSvcAddr: collector.linkerd-jaeger:55678
|
||||
# -- service account associated with the collector instance
|
||||
collectorSvcAccount: collector
|
||||
|
|
|
|||
|
|
@ -353,7 +353,7 @@ func (conf *ResourceConfig) GetPodPatch(injectProxy bool) ([]byte, error) {
|
|||
return res, nil
|
||||
}
|
||||
|
||||
// GetConfigAnnotation returns two values. The first value is the the annotation
|
||||
// GetConfigAnnotation returns two values. The first value is the annotation
|
||||
// value for a given key. The second is used to decide whether or not the caller
|
||||
// should add the annotation. The caller should not add the annotation if the
|
||||
// resource already has its own.
|
||||
|
|
|
|||
|
|
@ -14,7 +14,7 @@
|
|||
//! [ Pod ] -> [ Port ] <- [ Server ] <- [ ServerAuthorization ]
|
||||
//! ```
|
||||
//!
|
||||
//! Lookups against this index are are initiated for a single pod & port.
|
||||
//! Lookups against this index are initiated for a single pod & port.
|
||||
//!
|
||||
//! The Pod, Server, and ServerAuthorization indices are all scoped within a namespace index, as
|
||||
//! these resources cannot reference resources in other namespaces. This scoping helps to narrow the
|
||||
|
|
|
|||
Loading…
Reference in New Issue