summaryrefslogtreecommitdiffhomepage
path: root/runsc
diff options
context:
space:
mode:
authorFabricio Voznika <fvoznika@google.com>2018-06-25 10:40:24 -0700
committerShentubot <shentubot@google.com>2018-06-25 10:41:27 -0700
commitcecc1e472cc893738a070be00d303dd888b9f325 (patch)
tree952d66785acfcc63505821e22e10320748ebdfac /runsc
parent9c0c4fd8d05cca4905a0f8e4f391045566e4d401 (diff)
Fix lint errors
PiperOrigin-RevId: 201978212 Change-Id: Ie3df1fd41d5293fff66b546a0c68c3bf98126067
Diffstat (limited to 'runsc')
-rw-r--r--runsc/boot/config.go4
-rw-r--r--runsc/boot/fs.go2
-rw-r--r--runsc/cmd/capability.go2
3 files changed, 4 insertions, 4 deletions
diff --git a/runsc/boot/config.go b/runsc/boot/config.go
index c13ac150d..3fca16cce 100644
--- a/runsc/boot/config.go
+++ b/runsc/boot/config.go
@@ -24,10 +24,10 @@ import (
type PlatformType int
const (
- // Ptrace runs the sandbox with the ptrace platform.
+ // PlatformPtrace runs the sandbox with the ptrace platform.
PlatformPtrace PlatformType = iota
- // KVM runs the sandbox with the KVM platform.
+ // PlatformKVM runs the sandbox with the KVM platform.
PlatformKVM
)
diff --git a/runsc/boot/fs.go b/runsc/boot/fs.go
index 7731763de..e0d7fc769 100644
--- a/runsc/boot/fs.go
+++ b/runsc/boot/fs.go
@@ -428,7 +428,7 @@ func addRestoreMount(conf *Config, renv *fs.RestoreEnvironment, m specs.Mount, f
return nil
}
-// createRestoreEnviroment builds a fs.RestoreEnvironment called renv by adding the mounts
+// createRestoreEnvironment builds a fs.RestoreEnvironment called renv by adding the mounts
// to the environment.
func createRestoreEnvironment(spec *specs.Spec, conf *Config, fds *fdDispenser) (*fs.RestoreEnvironment, error) {
if conf.FileAccess == FileAccessDirect {
diff --git a/runsc/cmd/capability.go b/runsc/cmd/capability.go
index 0209feb1b..e2410d4ad 100644
--- a/runsc/cmd/capability.go
+++ b/runsc/cmd/capability.go
@@ -78,7 +78,7 @@ func trimCaps(names []string, setter capability.Capabilities) ([]capability.Cap,
var caps []capability.Cap
for _, c := range wantedCaps {
// Capability rules are more complicated than this, but this catches most
- // problems with tests running with non-priviledged user.
+ // problems with tests running with non-privileged user.
if setter.Get(capability.PERMITTED, c) {
caps = append(caps, c)
} else {