diff options
author | Fabricio Voznika <fvoznika@google.com> | 2018-06-25 10:40:24 -0700 |
---|---|---|
committer | Shentubot <shentubot@google.com> | 2018-06-25 10:41:27 -0700 |
commit | cecc1e472cc893738a070be00d303dd888b9f325 (patch) | |
tree | 952d66785acfcc63505821e22e10320748ebdfac /runsc | |
parent | 9c0c4fd8d05cca4905a0f8e4f391045566e4d401 (diff) |
Fix lint errors
PiperOrigin-RevId: 201978212
Change-Id: Ie3df1fd41d5293fff66b546a0c68c3bf98126067
Diffstat (limited to 'runsc')
-rw-r--r-- | runsc/boot/config.go | 4 | ||||
-rw-r--r-- | runsc/boot/fs.go | 2 | ||||
-rw-r--r-- | runsc/cmd/capability.go | 2 |
3 files changed, 4 insertions, 4 deletions
diff --git a/runsc/boot/config.go b/runsc/boot/config.go index c13ac150d..3fca16cce 100644 --- a/runsc/boot/config.go +++ b/runsc/boot/config.go @@ -24,10 +24,10 @@ import ( type PlatformType int const ( - // Ptrace runs the sandbox with the ptrace platform. + // PlatformPtrace runs the sandbox with the ptrace platform. PlatformPtrace PlatformType = iota - // KVM runs the sandbox with the KVM platform. + // PlatformKVM runs the sandbox with the KVM platform. PlatformKVM ) diff --git a/runsc/boot/fs.go b/runsc/boot/fs.go index 7731763de..e0d7fc769 100644 --- a/runsc/boot/fs.go +++ b/runsc/boot/fs.go @@ -428,7 +428,7 @@ func addRestoreMount(conf *Config, renv *fs.RestoreEnvironment, m specs.Mount, f return nil } -// createRestoreEnviroment builds a fs.RestoreEnvironment called renv by adding the mounts +// createRestoreEnvironment builds a fs.RestoreEnvironment called renv by adding the mounts // to the environment. func createRestoreEnvironment(spec *specs.Spec, conf *Config, fds *fdDispenser) (*fs.RestoreEnvironment, error) { if conf.FileAccess == FileAccessDirect { diff --git a/runsc/cmd/capability.go b/runsc/cmd/capability.go index 0209feb1b..e2410d4ad 100644 --- a/runsc/cmd/capability.go +++ b/runsc/cmd/capability.go @@ -78,7 +78,7 @@ func trimCaps(names []string, setter capability.Capabilities) ([]capability.Cap, var caps []capability.Cap for _, c := range wantedCaps { // Capability rules are more complicated than this, but this catches most - // problems with tests running with non-priviledged user. + // problems with tests running with non-privileged user. if setter.Get(capability.PERMITTED, c) { caps = append(caps, c) } else { |