Skip to content

Commit 509b1db

Browse files
authored
Merge pull request #1160 from hqhq/fix_typos
Fix all typos found by misspell
2 parents 8b9b444 + b15668b commit 509b1db

File tree

8 files changed

+8
-8
lines changed

8 files changed

+8
-8
lines changed

libcontainer/console_freebsd.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ import (
66
"errors"
77
)
88

9-
// NewConsole returns an initalized console that can be used within a container by copying bytes
9+
// NewConsole returns an initialized console that can be used within a container by copying bytes
1010
// from the master side to the slave that is attached as the tty for the container's init process.
1111
func NewConsole(uid, gid int) (Console, error) {
1212
return nil, errors.New("libcontainer console is not supported on FreeBSD")

libcontainer/console_linux.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ import (
1010
"github.com/opencontainers/runc/libcontainer/label"
1111
)
1212

13-
// NewConsole returns an initalized console that can be used within a container by copying bytes
13+
// NewConsole returns an initialized console that can be used within a container by copying bytes
1414
// from the master side to the slave that is attached as the tty for the container's init process.
1515
func NewConsole(uid, gid int) (Console, error) {
1616
master, err := os.OpenFile("/dev/ptmx", syscall.O_RDWR|syscall.O_NOCTTY|syscall.O_CLOEXEC, 0)

libcontainer/console_solaris.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ import (
44
"errors"
55
)
66

7-
// NewConsole returns an initalized console that can be used within a container by copying bytes
7+
// NewConsole returns an initialized console that can be used within a container by copying bytes
88
// from the master side to the slave that is attached as the tty for the container's init process.
99
func NewConsole(uid, gid int) (Console, error) {
1010
return nil, errors.New("libcontainer console is not supported on Solaris")

libcontainer/console_windows.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
package libcontainer
22

3-
// NewConsole returns an initalized console that can be used within a container
3+
// NewConsole returns an initialized console that can be used within a container
44
func NewConsole(uid, gid int) (Console, error) {
55
return &windowsConsole{}, nil
66
}

libcontainer/container.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ type BaseContainer interface {
123123
// SystemError - System error.
124124
Start(process *Process) (err error)
125125

126-
// Run immediately starts the process inside the conatiner. Returns error if process
126+
// Run immediately starts the process inside the container. Returns error if process
127127
// fails to start. It does not block waiting for the exec fifo after start returns but
128128
// opens the fifo after start returns.
129129
//

libcontainer/integration/exec_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -602,7 +602,7 @@ func testPids(t *testing.T, systemd bool) {
602602
}
603603

604604
// Enforce a restrictive limit. 64 * /bin/true + 1 * shell should cause this
605-
// to fail reliabily.
605+
// to fail reliability.
606606
config.Cgroups.Resources.PidsLimit = 64
607607
out, _, err := runContainer(config, "", "/bin/sh", "-c", `
608608
/bin/true | /bin/true | /bin/true | /bin/true | /bin/true | /bin/true | bin/true | /bin/true |

libcontainer/rootfs_linux.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -631,7 +631,7 @@ func pivotRoot(rootfs string) error {
631631
return err
632632
}
633633

634-
// Make oldroot rprivate to make sure our unmounts don't propogate to the
634+
// Make oldroot rprivate to make sure our unmounts don't propagate to the
635635
// host (and thus bork the machine).
636636
if err := syscall.Mount("", ".", "", syscall.MS_PRIVATE|syscall.MS_REC, ""); err != nil {
637637
return err

tests/integration/start.bats

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ function teardown() {
2323
testcontainer test_busybox2 created
2424

2525

26-
# start conatiner test_busybox1 and test_busybox2
26+
# start container test_busybox1 and test_busybox2
2727
runc start test_busybox1 test_busybox2
2828
[ "$status" -eq 0 ]
2929

0 commit comments

Comments
 (0)