cleanup: various source code comment corrections

Signed-off-by: Humble Chirammal <hchiramm@redhat.com>
This commit is contained in:
Humble Chirammal
2021-04-15 16:19:37 +05:30
committed by mergify[bot]
parent b0c9b3e752
commit 0fae0e53b6
7 changed files with 8 additions and 8 deletions

View File

@ -525,7 +525,7 @@ func newSnapshotOptionsFromID(ctx context.Context, snapID string, cr *util.Crede
if err != nil {
return &volOptions, nil, &sid, err
}
// storing request name in snapshotshot Identifier
// storing request name in snapshot Identifier
sid.RequestName = imageAttributes.RequestName
sid.FsSnapshotName = imageAttributes.ImageName
sid.FsSubvolName = imageAttributes.SourceName

View File

@ -204,7 +204,7 @@ func (r ReconcilePersistentVolume) reconcilePV(obj runtime.Object) error {
return nil
}
// Reconcile reconciles the PersitentVolume object and creates a new omap entries
// Reconcile reconciles the PersistentVolume object and creates a new omap entries
// for the volume.
func (r *ReconcilePersistentVolume) Reconcile(request reconcile.Request) (reconcile.Result, error) {
pv := &corev1.PersistentVolume{}

View File

@ -59,7 +59,7 @@ func NewDefaultNodeServer(d *CSIDriver, t string, topology map[string]string) *D
}
}
// NewDefaultIdentityServer initializes default identity servier.
// NewDefaultIdentityServer initializes default identity server.
func NewDefaultIdentityServer(d *CSIDriver) *DefaultIdentityServer {
return &DefaultIdentityServer{
Driver: d,

View File

@ -236,7 +236,7 @@ func RegisterKMSProvider(provider KMSProvider) bool {
}
_, ok := kmsManager.providers[provider.UniqueID]
if ok {
panic("duplicate tegistration of KMSProvider.UniqueID: " + provider.UniqueID)
panic("duplicate registration of KMSProvider.UniqueID: " + provider.UniqueID)
}
// validate the Initializer

View File

@ -163,8 +163,8 @@ func (kms SecretsMetadataKMS) EncryptDEK(volumeID, plainDEK string) (string, err
return string(emdData), nil
}
// DecryptDEK takes the JSON formatted `encryptedMetedataDEK` contents, and it
// fetches SecretsKMS passphase to decrypt the DEK.
// DecryptDEK takes the JSON formatted `encryptedMetadataDEK` contents, and it
// fetches SecretsKMS passphrase to decrypt the DEK.
func (kms SecretsMetadataKMS) DecryptDEK(volumeID, encryptedDEK string) (string, error) {
// use the passphrase from the SecretsKMS
passphrase, err := kms.SecretsKMS.FetchDEK(volumeID)

View File

@ -99,7 +99,7 @@ func (v *vaultTokenConf) convertStdVaultToCSIConfig(s *standardVault) {
// convertConfig takes the keys/values in standard Vault environment variable
// format, and converts them to the format that is used in the configuration
// file.
// This uses JSON marshaling and unmarshaling to map the Vault environment
// This uses JSON marshaling and unmarshalling to map the Vault environment
// configuration into bytes, then in the standardVault struct, which is passed
// through convertStdVaultToCSIConfig before converting back to a
// map[string]interface{} configuration.