Skip to content

Commit 6cbc0f8

Browse files
wording
1 parent 658f556 commit 6cbc0f8

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

.github/workflows/R-CMD-check.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ jobs:
3838
_R_CHECK_SUGGESTS_ONLY_: true
3939
_R_CHECK_THINGS_IN_TEMP_DIR_: true
4040
_R_CHECK_TESTS_NLINES_: 300
41-
RCMDCHECK_ERROR_ON: warning
41+
RCMDCHECK_ERROR_ON: error
4242
## Specific to futures
4343
R_FUTURE_CONNECTIONS_ONMISUSE: "error[details=TRUE]"
4444
R_FUTURE_GLOBALENV_ONMISUSE: "error"

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ environments. For instance, by running P2P workers in a sandboxed
5050
virtual machine (VM), in a sandboxed Linux container
5151
(e.g. [Apptainer], [Docker] and [Podman]), or via dedicated sandboxing
5252
tools (e.g. [Bubblewrap], [Firejail], and macOS `sandbox-exec`), you
53-
can mitigate some of the risk that malicious code can access the host
53+
can mitigate some of the risk of malicious code accessing the host
5454
machine where your personal data lives.
5555

5656

vignettes/future.p2p-10-getting-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ environments. For instance, by running P2P workers in a sandboxed
6868
virtual machine (VM), in a sandboxed Linux container
6969
(e.g. [Apptainer], [Docker] and [Podman]), or via dedicated sandboxing
7070
tools (e.g. [Bubblewrap], [Firejail], and macOS `sandbox-exec`), you
71-
can mitigate some of the risk that malicious code can access the host
71+
can mitigate some of the risk of malicious code accessing the host
7272
machine where your personal data lives.
7373

7474

0 commit comments

Comments
 (0)