Skip to content
This repository was archived by the owner on Dec 13, 2018. It is now read-only.

Commit 4a2ae10

Browse files
committed
fix some typos in source code comments
Signed-off-by: bin liu <[email protected]>
1 parent 9dc17dc commit 4a2ae10

File tree

6 files changed

+8
-8
lines changed

6 files changed

+8
-8
lines changed

cgroups/systemd/apply_systemd.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -385,7 +385,7 @@ func getUnitName(c *configs.Cgroup) string {
385385
// * Support for wildcards to allow /dev/pts support
386386
//
387387
// The second is available in more recent systemd as "char-pts", but not in e.g. v208 which is
388-
// in wide use. When both these are availalable we will be able to switch, but need to keep the old
388+
// in wide use. When both these are available we will be able to switch, but need to keep the old
389389
// implementation for backwards compat.
390390
//
391391
// Note: we can't use systemd to set up the initial limits, and then change the cgroup

configs/network.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ package configs
22

33
// Network defines configuration for a container's networking stack
44
//
5-
// The network configuration can be omited from a container causing the
5+
// The network configuration can be omitted from a container causing the
66
// container to be setup with the host's networking stack
77
type Network struct {
88
// Type sets the networks type, commonly veth and loopback
@@ -53,7 +53,7 @@ type Network struct {
5353
// Routes can be specified to create entries in the route table as the container is started
5454
//
5555
// All of destination, source, and gateway should be either IPv4 or IPv6.
56-
// One of the three options must be present, and ommitted entries will use their
56+
// One of the three options must be present, and omitted entries will use their
5757
// IP family default for the route table. For IPv4 for example, setting the
5858
// gateway to 1.2.3.4 and the interface to eth0 will set up a standard
5959
// destination of 0.0.0.0(or *) when viewed in the route table.

console_linux.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func newConsole(uid, gid int) (Console, error) {
3838
}, nil
3939
}
4040

41-
// newConsoleFromPath is an internal fucntion returning an initialzied console for use inside
41+
// newConsoleFromPath is an internal function returning an initialized console for use inside
4242
// a container's MNT namespace.
4343
func newConsoleFromPath(slavePath string) *linuxConsole {
4444
return &linuxConsole{

container.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ type Container interface {
6767
// State returns the current container's state information.
6868
//
6969
// errors:
70-
// Systemerror - System erroor.
70+
// Systemerror - System error.
7171
State() (*State, error)
7272

7373
// Returns the current config of the container.

devices/devices.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ var (
2121
ioutilReadDir = ioutil.ReadDir
2222
)
2323

24-
// Given the path to a device and it's cgroup_permissions(which cannot be easilly queried) look up the information about a linux device and return that information as a Device struct.
24+
// Given the path to a device and it's cgroup_permissions(which cannot be easily queried) look up the information about a linux device and return that information as a Device struct.
2525
func DeviceFromPath(path, permissions string) (*configs.Device, error) {
2626
fileInfo, err := osLstat(path)
2727
if err != nil {

process.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ type Process struct {
2323
Env []string
2424

2525
// User will set the uid and gid of the executing process running inside the container
26-
// local to the contaienr's user and group configuration.
26+
// local to the container's user and group configuration.
2727
User string
2828

2929
// Cwd will change the processes current working directory inside the container's rootfs.
@@ -45,7 +45,7 @@ type Process struct {
4545
consolePath string
4646

4747
// Capabilities specify the capabilities to keep when executing the process inside the container
48-
// All capbilities not specified will be dropped from the processes capability mask
48+
// All capabilities not specified will be dropped from the processes capability mask
4949
Capabilities []string
5050

5151
ops processOperations

0 commit comments

Comments
 (0)