mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-12-18 11:00:25 +00:00
cleanup: various source code comment corrections
Signed-off-by: Humble Chirammal <hchiramm@redhat.com>
This commit is contained in:
parent
b0c9b3e752
commit
0fae0e53b6
@ -7,7 +7,7 @@
|
|||||||
|
|
||||||
CSI deploys a sidecar container that is responsible for collecting metrics.
|
CSI deploys a sidecar container that is responsible for collecting metrics.
|
||||||
|
|
||||||
Liveness metrics are intended to be collected by prometheus but can be accesesed
|
Liveness metrics are intended to be collected by prometheus but can be accessed
|
||||||
through a GET request to a specific pod ip.
|
through a GET request to a specific pod ip.
|
||||||
|
|
||||||
for example
|
for example
|
||||||
|
@ -525,7 +525,7 @@ func newSnapshotOptionsFromID(ctx context.Context, snapID string, cr *util.Crede
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return &volOptions, nil, &sid, err
|
return &volOptions, nil, &sid, err
|
||||||
}
|
}
|
||||||
// storing request name in snapshotshot Identifier
|
// storing request name in snapshot Identifier
|
||||||
sid.RequestName = imageAttributes.RequestName
|
sid.RequestName = imageAttributes.RequestName
|
||||||
sid.FsSnapshotName = imageAttributes.ImageName
|
sid.FsSnapshotName = imageAttributes.ImageName
|
||||||
sid.FsSubvolName = imageAttributes.SourceName
|
sid.FsSubvolName = imageAttributes.SourceName
|
||||||
|
@ -204,7 +204,7 @@ func (r ReconcilePersistentVolume) reconcilePV(obj runtime.Object) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Reconcile reconciles the PersitentVolume object and creates a new omap entries
|
// Reconcile reconciles the PersistentVolume object and creates a new omap entries
|
||||||
// for the volume.
|
// for the volume.
|
||||||
func (r *ReconcilePersistentVolume) Reconcile(request reconcile.Request) (reconcile.Result, error) {
|
func (r *ReconcilePersistentVolume) Reconcile(request reconcile.Request) (reconcile.Result, error) {
|
||||||
pv := &corev1.PersistentVolume{}
|
pv := &corev1.PersistentVolume{}
|
||||||
|
@ -59,7 +59,7 @@ func NewDefaultNodeServer(d *CSIDriver, t string, topology map[string]string) *D
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewDefaultIdentityServer initializes default identity servier.
|
// NewDefaultIdentityServer initializes default identity server.
|
||||||
func NewDefaultIdentityServer(d *CSIDriver) *DefaultIdentityServer {
|
func NewDefaultIdentityServer(d *CSIDriver) *DefaultIdentityServer {
|
||||||
return &DefaultIdentityServer{
|
return &DefaultIdentityServer{
|
||||||
Driver: d,
|
Driver: d,
|
||||||
|
@ -236,7 +236,7 @@ func RegisterKMSProvider(provider KMSProvider) bool {
|
|||||||
}
|
}
|
||||||
_, ok := kmsManager.providers[provider.UniqueID]
|
_, ok := kmsManager.providers[provider.UniqueID]
|
||||||
if ok {
|
if ok {
|
||||||
panic("duplicate tegistration of KMSProvider.UniqueID: " + provider.UniqueID)
|
panic("duplicate registration of KMSProvider.UniqueID: " + provider.UniqueID)
|
||||||
}
|
}
|
||||||
|
|
||||||
// validate the Initializer
|
// validate the Initializer
|
||||||
|
@ -163,8 +163,8 @@ func (kms SecretsMetadataKMS) EncryptDEK(volumeID, plainDEK string) (string, err
|
|||||||
return string(emdData), nil
|
return string(emdData), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// DecryptDEK takes the JSON formatted `encryptedMetedataDEK` contents, and it
|
// DecryptDEK takes the JSON formatted `encryptedMetadataDEK` contents, and it
|
||||||
// fetches SecretsKMS passphase to decrypt the DEK.
|
// fetches SecretsKMS passphrase to decrypt the DEK.
|
||||||
func (kms SecretsMetadataKMS) DecryptDEK(volumeID, encryptedDEK string) (string, error) {
|
func (kms SecretsMetadataKMS) DecryptDEK(volumeID, encryptedDEK string) (string, error) {
|
||||||
// use the passphrase from the SecretsKMS
|
// use the passphrase from the SecretsKMS
|
||||||
passphrase, err := kms.SecretsKMS.FetchDEK(volumeID)
|
passphrase, err := kms.SecretsKMS.FetchDEK(volumeID)
|
||||||
|
@ -99,7 +99,7 @@ func (v *vaultTokenConf) convertStdVaultToCSIConfig(s *standardVault) {
|
|||||||
// convertConfig takes the keys/values in standard Vault environment variable
|
// convertConfig takes the keys/values in standard Vault environment variable
|
||||||
// format, and converts them to the format that is used in the configuration
|
// format, and converts them to the format that is used in the configuration
|
||||||
// file.
|
// file.
|
||||||
// This uses JSON marshaling and unmarshaling to map the Vault environment
|
// This uses JSON marshaling and unmarshalling to map the Vault environment
|
||||||
// configuration into bytes, then in the standardVault struct, which is passed
|
// configuration into bytes, then in the standardVault struct, which is passed
|
||||||
// through convertStdVaultToCSIConfig before converting back to a
|
// through convertStdVaultToCSIConfig before converting back to a
|
||||||
// map[string]interface{} configuration.
|
// map[string]interface{} configuration.
|
||||||
|
Loading…
Reference in New Issue
Block a user