This is an automated email from the ASF dual-hosted git repository.

bmahler pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/mesos.git


The following commit(s) were added to refs/heads/master by this push:
     new e79f6cb6f remove repetitive words
e79f6cb6f is described below

commit e79f6cb6ff82add9dfd7484d3f8f8253b76c0e91
Author: suchsoon <[email protected]>
AuthorDate: Sat Mar 9 18:53:36 2024 +0800

    remove repetitive words
    
    Signed-off-by: suchsoon <[email protected]>
---
 docs/isolators/linux-devices.md                           | 2 +-
 src/linux/ldd.cpp                                         | 2 +-
 src/master/authorization.cpp                              | 2 +-
 src/slave/containerizer/mesos/io/switchboard.cpp          | 2 +-
 src/slave/containerizer/mesos/isolators/network/ports.cpp | 2 +-
 src/tests/containerizer/xfs_quota_tests.cpp               | 2 +-
 src/tests/slave_tests.cpp                                 | 4 ++--
 src/tests/storage_local_resource_provider_tests.cpp       | 2 +-
 8 files changed, 9 insertions(+), 9 deletions(-)

diff --git a/docs/isolators/linux-devices.md b/docs/isolators/linux-devices.md
index 64727722e..f122a5e95 100644
--- a/docs/isolators/linux-devices.md
+++ b/docs/isolators/linux-devices.md
@@ -9,7 +9,7 @@ While the `cgroups/devices` isolator allows operators to control
 container access to host devices, the container might still need
 additional privileges to create a device node to actually use the
 device. The `linux/devices` isolator ensures that containers that
-are granted access to host devices are populated with the the correct
+are granted access to host devices are populated with the correct
 set of device nodes. Access to host devices is granted by using the
 [`--allowed_devices`](../configuration/agent.md#allowed_devices) flag
 on the agent.
diff --git a/src/linux/ldd.cpp b/src/linux/ldd.cpp
index fead938b7..d02de5be4 100644
--- a/src/linux/ldd.cpp
+++ b/src/linux/ldd.cpp
@@ -86,7 +86,7 @@ Try<hashset<string>> ldd(
       // inspect that too. We need both to be able to run an executable 
program.
       // NOTE: The same object may be specified as a dependency too but on some
       // systems (e.g. Ubuntu), the exact path of the two can differ even 
though
-      // they link to the the same file (see MESOS-7060). We however need the
+      // they link to the same file (see MESOS-7060). We however need the
       // exact path specified in the interpreter section to run the executable.
       Result<string> interpreter = elf->get_interpreter();
       if (interpreter.isSome()) {
diff --git a/src/master/authorization.cpp b/src/master/authorization.cpp
index 3ba1478eb..887d53803 100644
--- a/src/master/authorization.cpp
+++ b/src/master/authorization.cpp
@@ -102,7 +102,7 @@ vector<ActionObject> ActionObject::agentRegistration(
 
 
 // Returns effective reservation role of resource for the purpose
-// of authorizing an operation; that is, the the role of the most
+// of authorizing an operation; that is, the role of the most
 // refined reservation if the resource is reserved.
 //
 // NOTE: If the resource is not reserved, the default role '*' is
diff --git a/src/slave/containerizer/mesos/io/switchboard.cpp 
b/src/slave/containerizer/mesos/io/switchboard.cpp
index 8d78f7c93..2c039982d 100644
--- a/src/slave/containerizer/mesos/io/switchboard.cpp
+++ b/src/slave/containerizer/mesos/io/switchboard.cpp
@@ -868,7 +868,7 @@ Future<Nothing> IOSwitchboard::cleanup(
         // NOTE: As the I/O switchboard creates a unix domain socket using
         // a provisional address before initialiazing and renaming it, we 
assume
         // that the absence of the unix socket at the original address means
-        // that the the I/O switchboard has been terminated before renaming.
+        // that the I/O switchboard has been terminated before renaming.
         Result<unix::Address> address = getContainerIOSwitchboardAddress(
             flags.runtime_dir, containerId);
 
diff --git a/src/slave/containerizer/mesos/isolators/network/ports.cpp 
b/src/slave/containerizer/mesos/isolators/network/ports.cpp
index a3f36d68d..4dc024d7e 100644
--- a/src/slave/containerizer/mesos/isolators/network/ports.cpp
+++ b/src/slave/containerizer/mesos/isolators/network/ports.cpp
@@ -204,7 +204,7 @@ static uint32_t extractSocketInode(const string& sock)
 }
 
 
-// Return the inodes of all the sockets open in the the given process.
+// Return the inodes of all the sockets open in the given process.
 Try<vector<uint32_t>> NetworkPortsIsolatorProcess::getProcessSockets(pid_t pid)
 {
   const string fdPath = path::join("/proc", stringify(pid), "fd");
diff --git a/src/tests/containerizer/xfs_quota_tests.cpp 
b/src/tests/containerizer/xfs_quota_tests.cpp
index 6625d3f9f..6d092f564 100644
--- a/src/tests/containerizer/xfs_quota_tests.cpp
+++ b/src/tests/containerizer/xfs_quota_tests.cpp
@@ -1193,7 +1193,7 @@ TEST_P(ROOT_XFS_QuotaEnforcement, 
DiskUsageExceedsQuotaWithKill)
 
   // Expect that we were limited on a single disk resource that represents
   // the amount of disk that the task consumed. The task used up to 2MB
-  // and the the executor logs might use more, but as long we report that
+  // and the executor logs might use more, but as long we report that
   // the task used more than the 1MB in its resources, we are happy.
   EXPECT_EQ(1u, limit.size());
   ASSERT_SOME(limit.disk());
diff --git a/src/tests/slave_tests.cpp b/src/tests/slave_tests.cpp
index b60b260ee..a5e01ef42 100644
--- a/src/tests/slave_tests.cpp
+++ b/src/tests/slave_tests.cpp
@@ -6208,7 +6208,7 @@ TEST_F(SlaveTest, 
AgentFailoverTerminatesExecutorWithNoTask)
 
   TaskInfo task = createTask(offers->front(), "sleep 1000");
 
-  // Before sending the the task to the executor, restart the agent.
+  // Before sending the task to the executor, restart the agent.
   Future<Nothing> ___run;
   EXPECT_CALL(*slave.get()->mock(), ___run(_, _, _, _, _, _))
     .WillOnce(FutureSatisfy(&___run));
@@ -6517,7 +6517,7 @@ TEST_F(SlaveTest, 
AgentFailoverTerminatesHTTPExecutorWithNoTask)
   mesos.send(
       v1::createCallAccept(frameworkId, offer, {launchGroup}));
 
-  // Before sending the the task to the executor, restart the agent.
+  // Before sending the task to the executor, restart the agent.
   AWAIT_READY(___run);
 
   slave.get()->terminate();
diff --git a/src/tests/storage_local_resource_provider_tests.cpp 
b/src/tests/storage_local_resource_provider_tests.cpp
index 75959aa4f..56452f421 100644
--- a/src/tests/storage_local_resource_provider_tests.cpp
+++ b/src/tests/storage_local_resource_provider_tests.cpp
@@ -4713,7 +4713,7 @@ TEST_P(StorageLocalResourceProviderTest, 
ContainerTerminationMetric)
   Clock::advance(slaveFlags.registration_backoff_factor);
   Clock::advance(slaveFlags.authentication_backoff_factor);
 
-  // Wait for the the resource provider to subscribe before killing it
+  // Wait for the resource provider to subscribe before killing it
   // by observing the agent report the resource provider to the
   // master. This prevents the plugin from entering a failed, non-
   // restartable state, see MESOS-9130.

Reply via email to