cleanup: various source code comment corrections

Signed-off-by: Humble Chirammal <hchiramm@redhat.com>
This commit is contained in:
Humble Chirammal 2021-04-15 16:19:37 +05:30 committed by mergify[bot]
parent b0c9b3e752
commit 0fae0e53b6
7 changed files with 8 additions and 8 deletions

View File

@ -7,7 +7,7 @@
CSI deploys a sidecar container that is responsible for collecting metrics.
Liveness metrics are intended to be collected by prometheus but can be accesesed
Liveness metrics are intended to be collected by prometheus but can be accessed
through a GET request to a specific pod ip.
for example

View File

@ -525,7 +525,7 @@ func newSnapshotOptionsFromID(ctx context.Context, snapID string, cr *util.Crede
if err != nil {
return &volOptions, nil, &sid, err
}
// storing request name in snapshotshot Identifier
// storing request name in snapshot Identifier
sid.RequestName = imageAttributes.RequestName
sid.FsSnapshotName = imageAttributes.ImageName
sid.FsSubvolName = imageAttributes.SourceName

View File

@ -204,7 +204,7 @@ func (r ReconcilePersistentVolume) reconcilePV(obj runtime.Object) error {
return nil
}
// Reconcile reconciles the PersitentVolume object and creates a new omap entries
// Reconcile reconciles the PersistentVolume object and creates a new omap entries
// for the volume.
func (r *ReconcilePersistentVolume) Reconcile(request reconcile.Request) (reconcile.Result, error) {
pv := &corev1.PersistentVolume{}

View File

@ -59,7 +59,7 @@ func NewDefaultNodeServer(d *CSIDriver, t string, topology map[string]string) *D
}
}
// NewDefaultIdentityServer initializes default identity servier.
// NewDefaultIdentityServer initializes default identity server.
func NewDefaultIdentityServer(d *CSIDriver) *DefaultIdentityServer {
return &DefaultIdentityServer{
Driver: d,

View File

@ -236,7 +236,7 @@ func RegisterKMSProvider(provider KMSProvider) bool {
}
_, ok := kmsManager.providers[provider.UniqueID]
if ok {
panic("duplicate tegistration of KMSProvider.UniqueID: " + provider.UniqueID)
panic("duplicate registration of KMSProvider.UniqueID: " + provider.UniqueID)
}
// validate the Initializer

View File

@ -163,8 +163,8 @@ func (kms SecretsMetadataKMS) EncryptDEK(volumeID, plainDEK string) (string, err
return string(emdData), nil
}
// DecryptDEK takes the JSON formatted `encryptedMetedataDEK` contents, and it
// fetches SecretsKMS passphase to decrypt the DEK.
// DecryptDEK takes the JSON formatted `encryptedMetadataDEK` contents, and it
// fetches SecretsKMS passphrase to decrypt the DEK.
func (kms SecretsMetadataKMS) DecryptDEK(volumeID, encryptedDEK string) (string, error) {
// use the passphrase from the SecretsKMS
passphrase, err := kms.SecretsKMS.FetchDEK(volumeID)

View File

@ -99,7 +99,7 @@ func (v *vaultTokenConf) convertStdVaultToCSIConfig(s *standardVault) {
// convertConfig takes the keys/values in standard Vault environment variable
// format, and converts them to the format that is used in the configuration
// file.
// This uses JSON marshaling and unmarshaling to map the Vault environment
// This uses JSON marshaling and unmarshalling to map the Vault environment
// configuration into bytes, then in the standardVault struct, which is passed
// through convertStdVaultToCSIConfig before converting back to a
// map[string]interface{} configuration.