summaryrefslogtreecommitdiffhomepage
path: root/runsc
diff options
context:
space:
mode:
authorIan Gudger <igudger@google.com>2018-05-04 14:15:24 -0700
committerShentubot <shentubot@google.com>2018-05-04 14:16:11 -0700
commitf47174f06b9904b830268d46a7e817053b6235c8 (patch)
tree15d932f4a27877122d433226346c266d222a96f8 /runsc
parent0ce9c81b416494e3c3da793c278dfc767341fa6d (diff)
Run gofmt -s on everything
PiperOrigin-RevId: 195469901 Change-Id: I66d5c7a334bbb8b47e40d266a2661291c2d91c7f
Diffstat (limited to 'runsc')
-rw-r--r--runsc/fsgofer/fsgofer.go4
-rw-r--r--runsc/fsgofer/fsgofer_test.go8
-rw-r--r--runsc/sandbox/sandbox.go4
3 files changed, 8 insertions, 8 deletions
diff --git a/runsc/fsgofer/fsgofer.go b/runsc/fsgofer/fsgofer.go
index 5ddc75a9d..be2ac5f3c 100644
--- a/runsc/fsgofer/fsgofer.go
+++ b/runsc/fsgofer/fsgofer.go
@@ -614,8 +614,8 @@ func (l *localFile) SetAttr(valid p9.SetAttrMask, attr p9.SetAttr) error {
if valid.ATime || valid.MTime {
utimes := [2]syscall.Timespec{
- syscall.Timespec{Sec: 0, Nsec: linux.UTIME_OMIT},
- syscall.Timespec{Sec: 0, Nsec: linux.UTIME_OMIT},
+ {Sec: 0, Nsec: linux.UTIME_OMIT},
+ {Sec: 0, Nsec: linux.UTIME_OMIT},
}
if valid.ATime {
if valid.ATimeNotSystemTime {
diff --git a/runsc/fsgofer/fsgofer_test.go b/runsc/fsgofer/fsgofer_test.go
index 7d834d596..58d04aefa 100644
--- a/runsc/fsgofer/fsgofer_test.go
+++ b/runsc/fsgofer/fsgofer_test.go
@@ -39,12 +39,12 @@ var (
allConfs []Config
rwConfs = []Config{
- Config{ROMount: false, LazyOpenForWrite: false},
- Config{ROMount: false, LazyOpenForWrite: true},
+ {ROMount: false, LazyOpenForWrite: false},
+ {ROMount: false, LazyOpenForWrite: true},
}
roConfs = []Config{
- Config{ROMount: true, LazyOpenForWrite: false},
- Config{ROMount: true, LazyOpenForWrite: true},
+ {ROMount: true, LazyOpenForWrite: false},
+ {ROMount: true, LazyOpenForWrite: true},
}
)
diff --git a/runsc/sandbox/sandbox.go b/runsc/sandbox/sandbox.go
index 13bf5d800..0354a64b9 100644
--- a/runsc/sandbox/sandbox.go
+++ b/runsc/sandbox/sandbox.go
@@ -493,8 +493,8 @@ func (s *Sandbox) createSandboxProcess(conf *boot.Config, binPath string, common
// namespace for these.
log.Infof("Sandbox will be started in empty IPC and UTS namespaces")
nss := []specs.LinuxNamespace{
- specs.LinuxNamespace{Type: specs.IPCNamespace},
- specs.LinuxNamespace{Type: specs.UTSNamespace},
+ {Type: specs.IPCNamespace},
+ {Type: specs.UTSNamespace},
}
if conf.Platform == boot.PlatformPtrace {