cleanup: various source code comment corrections

Signed-off-by: Humble Chirammal <hchiramm@redhat.com>
This commit is contained in:
Humble Chirammal 2021-04-15 16:19:37 +05:30 committed by mergify[bot]
parent b0c9b3e752
commit 0fae0e53b6
7 changed files with 8 additions and 8 deletions

View File

@ -7,7 +7,7 @@
CSI deploys a sidecar container that is responsible for collecting metrics. CSI deploys a sidecar container that is responsible for collecting metrics.
Liveness metrics are intended to be collected by prometheus but can be accesesed Liveness metrics are intended to be collected by prometheus but can be accessed
through a GET request to a specific pod ip. through a GET request to a specific pod ip.
for example for example

View File

@ -525,7 +525,7 @@ func newSnapshotOptionsFromID(ctx context.Context, snapID string, cr *util.Crede
if err != nil { if err != nil {
return &volOptions, nil, &sid, err return &volOptions, nil, &sid, err
} }
// storing request name in snapshotshot Identifier // storing request name in snapshot Identifier
sid.RequestName = imageAttributes.RequestName sid.RequestName = imageAttributes.RequestName
sid.FsSnapshotName = imageAttributes.ImageName sid.FsSnapshotName = imageAttributes.ImageName
sid.FsSubvolName = imageAttributes.SourceName sid.FsSubvolName = imageAttributes.SourceName

View File

@ -204,7 +204,7 @@ func (r ReconcilePersistentVolume) reconcilePV(obj runtime.Object) error {
return nil return nil
} }
// Reconcile reconciles the PersitentVolume object and creates a new omap entries // Reconcile reconciles the PersistentVolume object and creates a new omap entries
// for the volume. // for the volume.
func (r *ReconcilePersistentVolume) Reconcile(request reconcile.Request) (reconcile.Result, error) { func (r *ReconcilePersistentVolume) Reconcile(request reconcile.Request) (reconcile.Result, error) {
pv := &corev1.PersistentVolume{} pv := &corev1.PersistentVolume{}

View File

@ -59,7 +59,7 @@ func NewDefaultNodeServer(d *CSIDriver, t string, topology map[string]string) *D
} }
} }
// NewDefaultIdentityServer initializes default identity servier. // NewDefaultIdentityServer initializes default identity server.
func NewDefaultIdentityServer(d *CSIDriver) *DefaultIdentityServer { func NewDefaultIdentityServer(d *CSIDriver) *DefaultIdentityServer {
return &DefaultIdentityServer{ return &DefaultIdentityServer{
Driver: d, Driver: d,

View File

@ -236,7 +236,7 @@ func RegisterKMSProvider(provider KMSProvider) bool {
} }
_, ok := kmsManager.providers[provider.UniqueID] _, ok := kmsManager.providers[provider.UniqueID]
if ok { if ok {
panic("duplicate tegistration of KMSProvider.UniqueID: " + provider.UniqueID) panic("duplicate registration of KMSProvider.UniqueID: " + provider.UniqueID)
} }
// validate the Initializer // validate the Initializer

View File

@ -163,8 +163,8 @@ func (kms SecretsMetadataKMS) EncryptDEK(volumeID, plainDEK string) (string, err
return string(emdData), nil return string(emdData), nil
} }
// DecryptDEK takes the JSON formatted `encryptedMetedataDEK` contents, and it // DecryptDEK takes the JSON formatted `encryptedMetadataDEK` contents, and it
// fetches SecretsKMS passphase to decrypt the DEK. // fetches SecretsKMS passphrase to decrypt the DEK.
func (kms SecretsMetadataKMS) DecryptDEK(volumeID, encryptedDEK string) (string, error) { func (kms SecretsMetadataKMS) DecryptDEK(volumeID, encryptedDEK string) (string, error) {
// use the passphrase from the SecretsKMS // use the passphrase from the SecretsKMS
passphrase, err := kms.SecretsKMS.FetchDEK(volumeID) passphrase, err := kms.SecretsKMS.FetchDEK(volumeID)

View File

@ -99,7 +99,7 @@ func (v *vaultTokenConf) convertStdVaultToCSIConfig(s *standardVault) {
// convertConfig takes the keys/values in standard Vault environment variable // convertConfig takes the keys/values in standard Vault environment variable
// format, and converts them to the format that is used in the configuration // format, and converts them to the format that is used in the configuration
// file. // file.
// This uses JSON marshaling and unmarshaling to map the Vault environment // This uses JSON marshaling and unmarshalling to map the Vault environment
// configuration into bytes, then in the standardVault struct, which is passed // configuration into bytes, then in the standardVault struct, which is passed
// through convertStdVaultToCSIConfig before converting back to a // through convertStdVaultToCSIConfig before converting back to a
// map[string]interface{} configuration. // map[string]interface{} configuration.