mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-17 20:00:23 +00:00
cleanup: various source code comment corrections
Signed-off-by: Humble Chirammal <hchiramm@redhat.com>
This commit is contained in:
parent
b0c9b3e752
commit
0fae0e53b6
@ -7,7 +7,7 @@
|
||||
|
||||
CSI deploys a sidecar container that is responsible for collecting metrics.
|
||||
|
||||
Liveness metrics are intended to be collected by prometheus but can be accesesed
|
||||
Liveness metrics are intended to be collected by prometheus but can be accessed
|
||||
through a GET request to a specific pod ip.
|
||||
|
||||
for example
|
||||
|
@ -525,7 +525,7 @@ func newSnapshotOptionsFromID(ctx context.Context, snapID string, cr *util.Crede
|
||||
if err != nil {
|
||||
return &volOptions, nil, &sid, err
|
||||
}
|
||||
// storing request name in snapshotshot Identifier
|
||||
// storing request name in snapshot Identifier
|
||||
sid.RequestName = imageAttributes.RequestName
|
||||
sid.FsSnapshotName = imageAttributes.ImageName
|
||||
sid.FsSubvolName = imageAttributes.SourceName
|
||||
|
@ -204,7 +204,7 @@ func (r ReconcilePersistentVolume) reconcilePV(obj runtime.Object) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// Reconcile reconciles the PersitentVolume object and creates a new omap entries
|
||||
// Reconcile reconciles the PersistentVolume object and creates a new omap entries
|
||||
// for the volume.
|
||||
func (r *ReconcilePersistentVolume) Reconcile(request reconcile.Request) (reconcile.Result, error) {
|
||||
pv := &corev1.PersistentVolume{}
|
||||
|
@ -59,7 +59,7 @@ func NewDefaultNodeServer(d *CSIDriver, t string, topology map[string]string) *D
|
||||
}
|
||||
}
|
||||
|
||||
// NewDefaultIdentityServer initializes default identity servier.
|
||||
// NewDefaultIdentityServer initializes default identity server.
|
||||
func NewDefaultIdentityServer(d *CSIDriver) *DefaultIdentityServer {
|
||||
return &DefaultIdentityServer{
|
||||
Driver: d,
|
||||
|
@ -236,7 +236,7 @@ func RegisterKMSProvider(provider KMSProvider) bool {
|
||||
}
|
||||
_, ok := kmsManager.providers[provider.UniqueID]
|
||||
if ok {
|
||||
panic("duplicate tegistration of KMSProvider.UniqueID: " + provider.UniqueID)
|
||||
panic("duplicate registration of KMSProvider.UniqueID: " + provider.UniqueID)
|
||||
}
|
||||
|
||||
// validate the Initializer
|
||||
|
@ -163,8 +163,8 @@ func (kms SecretsMetadataKMS) EncryptDEK(volumeID, plainDEK string) (string, err
|
||||
return string(emdData), nil
|
||||
}
|
||||
|
||||
// DecryptDEK takes the JSON formatted `encryptedMetedataDEK` contents, and it
|
||||
// fetches SecretsKMS passphase to decrypt the DEK.
|
||||
// DecryptDEK takes the JSON formatted `encryptedMetadataDEK` contents, and it
|
||||
// fetches SecretsKMS passphrase to decrypt the DEK.
|
||||
func (kms SecretsMetadataKMS) DecryptDEK(volumeID, encryptedDEK string) (string, error) {
|
||||
// use the passphrase from the SecretsKMS
|
||||
passphrase, err := kms.SecretsKMS.FetchDEK(volumeID)
|
||||
|
@ -99,7 +99,7 @@ func (v *vaultTokenConf) convertStdVaultToCSIConfig(s *standardVault) {
|
||||
// convertConfig takes the keys/values in standard Vault environment variable
|
||||
// format, and converts them to the format that is used in the configuration
|
||||
// file.
|
||||
// This uses JSON marshaling and unmarshaling to map the Vault environment
|
||||
// This uses JSON marshaling and unmarshalling to map the Vault environment
|
||||
// configuration into bytes, then in the standardVault struct, which is passed
|
||||
// through convertStdVaultToCSIConfig before converting back to a
|
||||
// map[string]interface{} configuration.
|
||||
|
Loading…
Reference in New Issue
Block a user