cleanup: resolve godot linter

This commit resolves godot linter issue
which says "Comment should end in a period (godot)".

Updates: #1586

Signed-off-by: Yati Padia <ypadia@redhat.com>
This commit is contained in:
Yati Padia
2021-07-08 20:29:34 +05:30
committed by mergify[bot]
parent 855f9080d1
commit 4a649fe17f
21 changed files with 44 additions and 44 deletions

View File

@ -51,9 +51,9 @@ const (
//
// #nosec:G101, no hardcoded secrets, only configuration keys.
awsAccessKey = "AWS_ACCESS_KEY_ID"
// #nosec:G101
// #nosec:G101.
awsSecretAccessKey = "AWS_SECRET_ACCESS_KEY"
// #nosec:G101
// #nosec:G101.
awsSessionToken = "AWS_SESSION_TOKEN"
awsCMK = "AWS_CMK_ARN"
)

View File

@ -37,7 +37,7 @@ fuse_big_writes = true
const (
cephConfigRoot = "/etc/ceph"
// CephConfigPath ceph configuration file
// CephConfigPath ceph configuration file.
CephConfigPath = "/etc/ceph/ceph.conf"
keyRing = "/etc/ceph/keyring"

View File

@ -40,7 +40,7 @@ type ClusterConnection struct {
var (
// large interval and timeout, it should be longer than the maximum
// time an operation can take (until refcounting of the connections is
// available)
// available).
cpInterval = 15 * time.Minute
cpExpiry = 10 * time.Minute
connPool = NewConnPool(cpInterval, cpExpiry)

View File

@ -31,7 +31,7 @@ const (
mapperFilePrefix = "luks-rbd-"
mapperFilePathPrefix = "/dev/mapper"
// kmsConfigPath is the location of the vault config file
// kmsConfigPath is the location of the vault config file.
kmsConfigPath = "/etc/ceph-csi-encryption-kms-config/config.json"
// Passphrase size - 20 bytes is 160 bits to satisfy:

View File

@ -29,7 +29,7 @@ const (
// This was hardcoded once and defaults to the old value to keep backward compatibility.
defaultCsiSubvolumeGroup = "csi"
// CsiConfigFile is the location of the CSI config file
// CsiConfigFile is the location of the CSI config file.
CsiConfigFile = "/etc/ceph-csi-config/config.json"
)

View File

@ -21,10 +21,10 @@ import (
)
const (
// VolumeOperationAlreadyExistsFmt string format to return for concurrent operation
// VolumeOperationAlreadyExistsFmt string format to return for concurrent operation.
VolumeOperationAlreadyExistsFmt = "an operation with the given Volume ID %s already exists"
// SnapshotOperationAlreadyExistsFmt string format to return for concurrent operation
// SnapshotOperationAlreadyExistsFmt string format to return for concurrent operation.
SnapshotOperationAlreadyExistsFmt = "an operation with the given Snapshot ID %s already exists"
)

View File

@ -35,14 +35,14 @@ const (
// options.
kmsTypeKey = "encryptionKMSType"
// podNamespaceEnv ENV should be set in the cephcsi container
// podNamespaceEnv ENV should be set in the cephcsi container.
podNamespaceEnv = "POD_NAMESPACE"
// kmsConfigMapEnv env to read a ConfigMap by name
// kmsConfigMapEnv env to read a ConfigMap by name.
kmsConfigMapEnv = "KMS_CONFIGMAP_NAME"
// defaultKMSConfigMapName default ConfigMap name to fetch kms
// connection details
// connection details.
defaultKMSConfigMapName = "csi-kms-connection-details"
)

View File

@ -31,10 +31,10 @@ import (
)
const (
// Encryption passphrase location in K8s secrets
// Encryption passphrase location in K8s secrets.
encryptionPassphraseKey = "encryptionPassphrase"
// Default KMS type
// Default KMS type.
defaultKMSType = "default"
// kmsTypeSecretsMetadata is the SecretsKMS with per-volume encryption,

View File

@ -57,9 +57,9 @@ func RoundOffBytes(bytes int64) int64 {
// variables which will be set during the build time.
var (
// GitCommit tell the latest git commit image is built from
// GitCommit tell the latest git commit image is built from.
GitCommit string
// DriverVersion which will be driver version
// DriverVersion which will be driver version.
DriverVersion string
)

View File

@ -37,7 +37,7 @@ const (
// #nosec
serviceAccountTokenPath = "/var/run/secrets/kubernetes.io/serviceaccount/token"
// vault configuration defaults
// vault configuration defaults.
vaultDefaultAuthPath = "/v1/auth/kubernetes/login"
vaultDefaultRole = "csi-kubernetes"
vaultDefaultNamespace = ""