diff options
| author | Joseph Richey <joerichey94@gmail.com> | 2017-09-29 03:06:17 -0700 |
|---|---|---|
| committer | Joseph Richey <joerichey94@gmail.com> | 2017-09-29 03:08:03 -0700 |
| commit | 6f6c91993294d9bc753d22f58884dcc8e0a2f108 (patch) | |
| tree | a04076b22ee22298667e0386716d76a87239e364 /security/keyring.go | |
| parent | 4d9372795e7b53d105f69790c1d9deadbff85458 (diff) | |
Fix lint
Diffstat (limited to 'security/keyring.go')
| -rw-r--r-- | security/keyring.go | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/security/keyring.go b/security/keyring.go index e0e9094..ab65631 100644 --- a/security/keyring.go +++ b/security/keyring.go @@ -105,9 +105,9 @@ var ( // UserKeyringID returns the key id of the target user's user keyring. We also // ensure that the keyring will be accessible by linking it into the process // keyring and linking it into the root user keyring (permissions allowing). If -// check_session is true, an error is returned if a normal user requests their +// checkSession is true, an error is returned if a normal user requests their // user keyring, but it is not in the current session keyring. -func UserKeyringID(target *user.User, check_session bool) (int, error) { +func UserKeyringID(target *user.User, checkSession bool) (int, error) { uid := util.AtoiOrPanic(target.Uid) targetKeyring, err := userKeyringIDLookup(uid) if err != nil { @@ -117,7 +117,7 @@ func UserKeyringID(target *user.User, check_session bool) (int, error) { if !util.IsUserRoot() { // Make sure the returned keyring will be accessible by checking // that it is in the session keyring. - if check_session && !isUserKeyringInSession(uid) { + if checkSession && !isUserKeyringInSession(uid) { return 0, ErrSessionUserKeying } return targetKeyring, nil |