chore: Remove repetitive words (#12330)

Signed-off-by: occupyhabit <wangmengjiao@outlook.com>
This commit is contained in:
occupyhabit 2024-03-26 00:33:39 +08:00 committed by GitHub
parent 9fe13b9341
commit 6eeaea4d94
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
5 changed files with 5 additions and 5 deletions

View File

@ -694,7 +694,7 @@ spec:
t.Fatalf("can't create cluster store: %s", err)
}
// Sync after creating watchers so that the the indexers added get updated
// Sync after creating watchers so that the indexers added get updated
// properly
k8sAPI.Sync(nil)
metadataAPI.Sync(nil)

View File

@ -119,7 +119,7 @@ Kubernetes: `>=1.22.0-0`
| webhook.UID | string | `nil` | UID for the webhook resource |
| webhook.caBundle | string | `""` | Bundle of CA certificates for webhook. If not provided nor injected with cert-manager, then Helm will use the certificate generated for `webhook.crtPEM`. If `webhook.externalSecret` is set to true, this value, injectCaFrom, or injectCaFromSecret must be set, as no certificate will be generated. See the cert-manager [CA Injector Docs](https://cert-manager.io/docs/concepts/ca-injector) for more information. |
| webhook.collectorSvcAccount | string | `"collector"` | service account associated with the collector instance |
| webhook.collectorSvcAddr | string | `"collector.linkerd-jaeger:55678"` | collector service address for the proxies to send trace data. Points by default to the the linkerd-jaeger collector |
| webhook.collectorSvcAddr | string | `"collector.linkerd-jaeger:55678"` | collector service address for the proxies to send trace data. Points by default to the linkerd-jaeger collector |
| webhook.crtPEM | string | `""` | Certificate for the webhook. If not provided and not using an external secret then Helm will generate one. |
| webhook.externalSecret | bool | `false` | Do not create a secret resource for the webhook. If this is set to `true`, the value `webhook.caBundle` must be set or the ca bundle must injected with cert-manager ca injector using `webhook.injectCaFrom` or `webhook.injectCaFromSecret` (see below). |
| webhook.failurePolicy | string | `"Ignore"` | |

View File

@ -276,7 +276,7 @@ webhook:
injectCaFromSecret: ""
# -- collector service address for the proxies to send trace data.
# Points by default to the the linkerd-jaeger collector
# Points by default to the linkerd-jaeger collector
collectorSvcAddr: collector.linkerd-jaeger:55678
# -- service account associated with the collector instance
collectorSvcAccount: collector

View File

@ -353,7 +353,7 @@ func (conf *ResourceConfig) GetPodPatch(injectProxy bool) ([]byte, error) {
return res, nil
}
// GetConfigAnnotation returns two values. The first value is the the annotation
// GetConfigAnnotation returns two values. The first value is the annotation
// value for a given key. The second is used to decide whether or not the caller
// should add the annotation. The caller should not add the annotation if the
// resource already has its own.

View File

@ -14,7 +14,7 @@
//! [ Pod ] -> [ Port ] <- [ Server ] <- [ ServerAuthorization ]
//! ```
//!
//! Lookups against this index are are initiated for a single pod & port.
//! Lookups against this index are initiated for a single pod & port.
//!
//! The Pod, Server, and ServerAuthorization indices are all scoped within a namespace index, as
//! these resources cannot reference resources in other namespaces. This scoping helps to narrow the