Skip to content

Commit dc63ec0

Browse files
authored
Merge pull request #7236 from oscr/the-the
🌱 grammar: replace all occurrences of "the the" with "the"
2 parents d82df1b + 4600a49 commit dc63ec0

File tree

18 files changed

+28
-28
lines changed

18 files changed

+28
-28
lines changed

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ RUN --mount=type=cache,target=/go/pkg/mod \
4545
# Copy the sources
4646
COPY ./ ./
4747

48-
# Cache the go build into the the Go’s compiler cache folder so we take benefits of compiler caching across docker build calls
48+
# Cache the go build into the Go’s compiler cache folder so we take benefits of compiler caching across docker build calls
4949
RUN --mount=type=cache,target=/root/.cache/go-build \
5050
--mount=type=cache,target=/go/pkg/mod \
5151
go build .

Makefile

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -921,7 +921,7 @@ docker-push-manifest-core: ## Push the multiarch manifest for the core docker im
921921
$(MAKE) set-manifest-pull-policy TARGET_RESOURCE="./config/default/manager_pull_policy.yaml"
922922

923923
.PHONY: docker-push-manifest-kubeadm-bootstrap
924-
docker-push-manifest-kubeadm-bootstrap: ## Push the multiarch manifest for the the kubeadm bootstrap docker images
924+
docker-push-manifest-kubeadm-bootstrap: ## Push the multiarch manifest for the kubeadm bootstrap docker images
925925
## Minimum docker version 18.06.0 is required for creating and pushing manifest images.
926926
docker manifest create --amend $(KUBEADM_BOOTSTRAP_CONTROLLER_IMG):$(TAG) $(shell echo $(ALL_ARCH) | sed -e "s~[^ ]*~$(KUBEADM_BOOTSTRAP_CONTROLLER_IMG)\-&:$(TAG)~g")
927927
@for arch in $(ALL_ARCH); do docker manifest annotate --arch $${arch} ${KUBEADM_BOOTSTRAP_CONTROLLER_IMG}:${TAG} ${KUBEADM_BOOTSTRAP_CONTROLLER_IMG}-$${arch}:${TAG}; done
@@ -930,7 +930,7 @@ docker-push-manifest-kubeadm-bootstrap: ## Push the multiarch manifest for the t
930930
$(MAKE) set-manifest-pull-policy TARGET_RESOURCE="./bootstrap/kubeadm/config/default/manager_pull_policy.yaml"
931931

932932
.PHONY: docker-push-manifest-kubeadm-control-plane
933-
docker-push-manifest-kubeadm-control-plane: ## Push the multiarch manifest for the the kubeadm control plane docker images
933+
docker-push-manifest-kubeadm-control-plane: ## Push the multiarch manifest for the kubeadm control plane docker images
934934
## Minimum docker version 18.06.0 is required for creating and pushing manifest images.
935935
docker manifest create --amend $(KUBEADM_CONTROL_PLANE_CONTROLLER_IMG):$(TAG) $(shell echo $(ALL_ARCH) | sed -e "s~[^ ]*~$(KUBEADM_CONTROL_PLANE_CONTROLLER_IMG)\-&:$(TAG)~g")
936936
@for arch in $(ALL_ARCH); do docker manifest annotate --arch $${arch} ${KUBEADM_CONTROL_PLANE_CONTROLLER_IMG}:${TAG} ${KUBEADM_CONTROL_PLANE_CONTROLLER_IMG}-$${arch}:${TAG}; done
@@ -939,7 +939,7 @@ docker-push-manifest-kubeadm-control-plane: ## Push the multiarch manifest for t
939939
$(MAKE) set-manifest-pull-policy TARGET_RESOURCE="./controlplane/kubeadm/config/default/manager_pull_policy.yaml"
940940

941941
.PHONY: docker-push-manifest-capd
942-
docker-capd-push-manifest: ## Push the multiarch manifest for the the capd docker images
942+
docker-capd-push-manifest: ## Push the multiarch manifest for the capd docker images
943943
## Minimum docker version 18.06.0 is required for creating and pushing manifest images.
944944
docker manifest create --amend $(CAPD_CONTROLLER_IMG):$(TAG) $(shell echo $(ALL_ARCH) | sed -e "s~[^ ]*~$(CAPD_CONTROLLER_IMG)\-&:$(TAG)~g")
945945
@for arch in $(ALL_ARCH); do docker manifest annotate --arch $${arch} ${CAPD_CONTROLLER_IMG}:${TAG} ${CAPD_CONTROLLER_IMG}-$${arch}:${TAG}; done

cmd/clusterctl/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ RUN --mount=type=cache,target=/go/pkg/mod \
4545
# Copy the sources
4646
COPY ./ ./
4747

48-
# Cache the go build into the the Go’s compiler cache folder so we take benefits of compiler caching across docker build calls
48+
# Cache the go build into the Go’s compiler cache folder so we take benefits of compiler caching across docker build calls
4949
RUN --mount=type=cache,target=/root/.cache/go-build \
5050
--mount=type=cache,target=/go/pkg/mod \
5151
go build ./cmd/clusterctl

cmd/clusterctl/client/client.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,8 @@ type Client interface {
6161
Restore(options RestoreOptions) error
6262

6363
// PlanUpgrade returns a set of suggested Upgrade plans for the cluster, and more specifically:
64-
// - Upgrade to the latest version in the the v1alpha3 series: ....
65-
// - Upgrade to the latest version in the the v1alpha4 series: ....
64+
// - Upgrade to the latest version in the v1alpha3 series: ....
65+
// - Upgrade to the latest version in the v1alpha4 series: ....
6666
PlanUpgrade(options PlanUpgradeOptions) ([]UpgradePlan, error)
6767

6868
// PlanCertManagerUpgrade returns a CertManagerUpgradePlan.

cmd/clusterctl/client/cluster/components.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ func (p *providerComponents) Delete(options DeleteOptions) error {
181181
// If the resource is a cluster resource, skip it if the resource name does not start with the instance prefix.
182182
// This is required because there are cluster resources like e.g. ClusterRoles and ClusterRoleBinding, which are instance specific;
183183
// During the installation, clusterctl adds the instance namespace prefix to such resources (see fixRBAC), and so we can rely
184-
// on that for deleting only the global resources belonging the the instance we are processing.
184+
// on that for deleting only the global resources belonging the instance we are processing.
185185
// NOTE: namespace and CRD are special case managed above; webhook instead goes hand by hand with the controller they
186186
// should always be deleted.
187187
isWebhook := obj.GroupVersionKind().Kind == validatingWebhookConfigurationKind || obj.GroupVersionKind().Kind == mutatingWebhookConfigurationKind

cmd/clusterctl/client/cluster/mover.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ func (o *objectMover) checkProvisioningCompleted(graph *objectGraph) error {
269269
return kerrors.NewAggregate(errList)
270270
}
271271

272-
// getClusterObj retrieves the the clusterObj corresponding to a node with type Cluster.
272+
// getClusterObj retrieves the clusterObj corresponding to a node with type Cluster.
273273
func getClusterObj(proxy Proxy, cluster *node, clusterObj *clusterv1.Cluster) error {
274274
c, err := proxy.NewClient()
275275
if err != nil {
@@ -287,7 +287,7 @@ func getClusterObj(proxy Proxy, cluster *node, clusterObj *clusterv1.Cluster) er
287287
return nil
288288
}
289289

290-
// getMachineObj retrieves the the machineObj corresponding to a node with type Machine.
290+
// getMachineObj retrieves the machineObj corresponding to a node with type Machine.
291291
func getMachineObj(proxy Proxy, machine *node, machineObj *clusterv1.Machine) error {
292292
c, err := proxy.NewClient()
293293
if err != nil {

cmd/clusterctl/client/cluster/objectgraph.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -309,7 +309,7 @@ func (o *objectGraph) objMetaToNode(obj *unstructured.Unstructured, n *node) {
309309
}
310310
}
311311

312-
// getDiscoveryTypes returns the list of TypeMeta to be considered for the the move discovery phase.
312+
// getDiscoveryTypes returns the list of TypeMeta to be considered for the move discovery phase.
313313
// This list includes all the types defines by the CRDs installed by clusterctl and the ConfigMap/Secret core types.
314314
func (o *objectGraph) getDiscoveryTypes() error {
315315
crdList := &apiextensionsv1.CustomResourceDefinitionList{}

cmd/clusterctl/client/cluster/upgrader.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ import (
3939
// ProviderUpgrader defines methods for supporting provider upgrade.
4040
type ProviderUpgrader interface {
4141
// Plan returns a set of suggested Upgrade plans for the management cluster, and more specifically:
42-
// - Upgrade to the latest version in the the v1alpha3 series: ....
43-
// - Upgrade to the latest version in the the v1alpha4 series: ....
42+
// - Upgrade to the latest version in the v1alpha3 series: ....
43+
// - Upgrade to the latest version in the v1alpha4 series: ....
4444
Plan() ([]UpgradePlan, error)
4545

4646
// ApplyPlan executes an upgrade following an UpgradePlan generated by clusterctl.

cmd/clusterctl/internal/test/fake_proxy.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ func (f *FakeProxy) WithNamespace(n string) *FakeProxy {
162162

163163
// WithProviderInventory can be used as a fast track for setting up test scenarios requiring an already initialized management cluster.
164164
// NB. this method adds an items to the Provider inventory, but it doesn't install the corresponding provider; if the
165-
// test case requires the actual provider to be installed, use the the fake client to install both the provider
165+
// test case requires the actual provider to be installed, use the fake client to install both the provider
166166
// components and the corresponding inventory item.
167167
func (f *FakeProxy) WithProviderInventory(name string, providerType clusterctlv1.ProviderType, version, targetNamespace string) *FakeProxy {
168168
f.objs = append(f.objs, &clusterctlv1.Provider{

docs/proposals/20200804-windows-support.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ the [image-builder project](https://github.com/kubernetes-sigs/image-builder) th
115115
built need to adhere to [Windows licensing requirements](https://www.microsoft.com/en-us/licensing/product-licensing/windows-server).
116116

117117
There is prior art for building Windows base images. For example, AKS-Engine has an example implementation for using packer and scripts to do image configuration: https://github.com/Azure/aks-engine/blob/master/vhd/packer/windows-vhd-builder.json.
118-
Another example is the the [sig-windows-tools](https://github.com/kubernetes-sigs/sig-windows-tools) which provide scripts for image configuration when using Kubeadm.
118+
Another example is the [sig-windows-tools](https://github.com/kubernetes-sigs/sig-windows-tools) which provide scripts for image configuration when using Kubeadm.
119119

120120
Although the Linux implementation in image-builder uses Ansible for configuration, Windows isn't going to share
121121
the same configuration because [Ansible](https://docs.ansible.com/ansible/latest/user_guide/windows.html) requires [Windows specific modules](https://docs.ansible.com/ansible/2.9/modules/list_of_windows_modules.html) to do the configuration.
@@ -131,7 +131,7 @@ and use privileged containers in place of wins.exe enabled containers.
131131

132132
Each infrastructure providers must provide their own `PreKubeadmCommands`/`PostKubeadmCommands` scripts that
133133
are required for additional configuration for the node. During planning for Beta we will be able to identify
134-
common overlapping features that can be added into the the base images in image-builder and for re-use
134+
common overlapping features that can be added into the base images in image-builder and for re-use
135135

136136
#### netbios names
137137

0 commit comments

Comments
 (0)