From a69d8eb1ca47c8c3c5f8ddafe6ba802e2a0e260d Mon Sep 17 00:00:00 2001 From: Yohei Yamamoto Date: Sat, 17 Jan 2026 17:50:41 +0900 Subject: [PATCH] fix: typos in comments --- builtin/credential/approle/path_role.go | 2 +- builtin/credential/cert/path_login.go | 2 +- builtin/logical/pki/backend_test.go | 2 +- builtin/logical/transit/path_datakey.go | 2 +- tools/pipeline/internal/pkg/git/reset.go | 2 +- vault/init.go | 2 +- vault/logical_system_activity.go | 2 +- vault/logical_system_quotas.go | 2 +- 8 files changed, 8 insertions(+), 8 deletions(-) diff --git a/builtin/credential/approle/path_role.go b/builtin/credential/approle/path_role.go index 00e8edd8780..e8b174e9480 100644 --- a/builtin/credential/approle/path_role.go +++ b/builtin/credential/approle/path_role.go @@ -160,7 +160,7 @@ IP addresses which can perform the login operation.`, "secret_id_num_uses": { Type: framework.TypeInt, Description: `Number of times a SecretID can access the role, after which the SecretID -will expire. Defaults to 0 meaning that the the secret_id is of unlimited use.`, +will expire. Defaults to 0 meaning that the secret_id is of unlimited use.`, }, "secret_id_ttl": { diff --git a/builtin/credential/cert/path_login.go b/builtin/credential/cert/path_login.go index 849f1fba381..db5ca403b61 100644 --- a/builtin/credential/cert/path_login.go +++ b/builtin/credential/cert/path_login.go @@ -817,7 +817,7 @@ func (b *backend) loadTrustedCerts(ctx context.Context, storage logical.Storage, } // Limits are arbitrary. Max of 2^55 backoff just so that delay - // and the the jitter fits into a double. Is that silly? Yes. + // and the jitter fits into a double. Is that silly? Yes. // 2^55 seconds is more years than the computer will keep // running. if cache.retry.attempt < 55 { diff --git a/builtin/logical/pki/backend_test.go b/builtin/logical/pki/backend_test.go index bf0e9cb70ee..49346487675 100644 --- a/builtin/logical/pki/backend_test.go +++ b/builtin/logical/pki/backend_test.go @@ -4255,7 +4255,7 @@ func TestBackend_RevokePlusTidy_Intermediate(t *testing.T) { t.Fatal("expected certificate information from read operation") } - // Issue a revoke on on /pki + // Issue a revoke on /pki _, err = client.Logical().Write("pki/revoke", map[string]interface{}{ "serial_number": intermediateCertSerial, }) diff --git a/builtin/logical/transit/path_datakey.go b/builtin/logical/transit/path_datakey.go index 72e6849edb9..41c54c3eb22 100644 --- a/builtin/logical/transit/path_datakey.go +++ b/builtin/logical/transit/path_datakey.go @@ -255,7 +255,7 @@ This path can be used to generate a data key: a random key of a certain length that can be used for encryption and decryption, protected by the named backend key. 128, 256, or 512 bits can be specified; if not specified, the default -is 256 bits. Call with the the "wrapped" path to prevent the +is 256 bits. Call with the "wrapped" path to prevent the (base64-encoded) plaintext key from being returned along with the encrypted key, the "plaintext" path returns both. ` diff --git a/tools/pipeline/internal/pkg/git/reset.go b/tools/pipeline/internal/pkg/git/reset.go index 1c54996543b..da8d3335a04 100644 --- a/tools/pipeline/internal/pkg/git/reset.go +++ b/tools/pipeline/internal/pkg/git/reset.go @@ -8,7 +8,7 @@ import ( "strings" ) -// ResetMode is is mode to use when resetting the repository +// ResetMode is the mode to use when resetting the repository type ResetMode string const ( diff --git a/vault/init.go b/vault/init.go index f1cde33e4f7..e78281aaa7e 100644 --- a/vault/init.go +++ b/vault/init.go @@ -476,7 +476,7 @@ func (c *Core) UnsealWithStoredKeys(ctx context.Context) error { return NewNonFatalError(fmt.Errorf("fetching stored unseal keys failed: %w", err)) } - // Check whether Vault initialization is still in progress. If it is is, then + // Check whether Vault initialization is still in progress. If it is, then // bail out to give it a chance to complete. isInitializing, err := c.seal.IsInitializationFlagSet(ctx) if err != nil { diff --git a/vault/logical_system_activity.go b/vault/logical_system_activity.go index 1227f173cfa..4f5f9a40100 100644 --- a/vault/logical_system_activity.go +++ b/vault/logical_system_activity.go @@ -37,7 +37,7 @@ const ( // ErrWaitingForClientIDsToLoadToMemory is an error string that is used to indicate that the clientIDs are currently being loaded to memory which is needed to compute the actual values for new clients in the current month. ErrWaitingForClientIDsToLoadToMemory = "We are gathering the most up-to-date client usage information. Please try again later." - // WarningCurrentMonthDataNotIncluded is a warning string that is used to indicate the the current month's data will be included in the next billing period, and not the current + // WarningCurrentMonthDataNotIncluded is a warning string that is used to indicate the current month's data will be included in the next billing period, and not the current WarningCurrentMonthDataNotIncluded = "The current month's data will not be included in the current billing period client count as this month is outside of the 12 month billing period. This data will be included in the next billing period" ) diff --git a/vault/logical_system_quotas.go b/vault/logical_system_quotas.go index 366d0008677..5bfd7ff6d82 100644 --- a/vault/logical_system_quotas.go +++ b/vault/logical_system_quotas.go @@ -19,7 +19,7 @@ import ( ) var ( - ErrExemptRateLimitsOnChildNs = errors.New("exempt paths can only be be configured in the root namespace") + ErrExemptRateLimitsOnChildNs = errors.New("exempt paths can only be configured in the root namespace") ErrInvalidExemptPathsFromChildNs = errors.New("exempt paths cannot be added for parent namespaces") ErrInvalidQuotaDeletion = "cannot delete quota configured for a parent namespace" ErrInvalidQuotaUpdate = "quotas in parent namespaces cannot be updated"