diff --git a/api/types/volume/cluster_volume.go b/api/types/volume/cluster_volume.go index 55fc5d3899..8801784664 100644 --- a/api/types/volume/cluster_volume.go +++ b/api/types/volume/cluster_volume.go @@ -254,7 +254,7 @@ type TopologyRequirement struct { // {"region": "R1", "zone": "Z3"} // preferred = // {"region": "R1", "zone": "Z3"} - // then the the SP SHOULD first attempt to make the provisioned volume + // then the SP SHOULD first attempt to make the provisioned volume // available from "zone" "Z3" in the "region" "R1" and fall back to // "zone" "Z2" in the "region" "R1" if that is not possible. // @@ -268,7 +268,7 @@ type TopologyRequirement struct { // preferred = // {"region": "R1", "zone": "Z4"}, // {"region": "R1", "zone": "Z2"} - // then the the SP SHOULD first attempt to make the provisioned volume + // then the SP SHOULD first attempt to make the provisioned volume // accessible from "zone" "Z4" in the "region" "R1" and fall back to // "zone" "Z2" in the "region" "R1" if that is not possible. If that // is not possible, the SP may choose between either the "zone" @@ -287,7 +287,7 @@ type TopologyRequirement struct { // preferred = // {"region": "R1", "zone": "Z5"}, // {"region": "R1", "zone": "Z3"} - // then the the SP SHOULD first attempt to make the provisioned volume + // then the SP SHOULD first attempt to make the provisioned volume // accessible from the combination of the two "zones" "Z5" and "Z3" in // the "region" "R1". If that's not possible, it should fall back to // a combination of "Z5" and other possibilities from the list of diff --git a/internal/safepath/join_linux.go b/internal/safepath/join_linux.go index c93f7db8fa..68cb0d7abe 100644 --- a/internal/safepath/join_linux.go +++ b/internal/safepath/join_linux.go @@ -15,7 +15,7 @@ import ( // Join makes sure that the concatenation of path and subpath doesn't // resolve to a path outside of path and returns a path to a temporary file that is -// a bind mount to the the exact same file/directory that was validated. +// a bind mount to the exact same file/directory that was validated. // // After use, it is the caller's responsibility to call Close on the returned // SafePath object, which will unmount the temporary file/directory