aboutsummaryrefslogtreecommitdiff
path: root/security/keyring.go
diff options
context:
space:
mode:
authorJoseph Richey <joerichey94@gmail.com>2017-09-29 03:06:17 -0700
committerJoseph Richey <joerichey94@gmail.com>2017-09-29 03:08:03 -0700
commit6f6c91993294d9bc753d22f58884dcc8e0a2f108 (patch)
treea04076b22ee22298667e0386716d76a87239e364 /security/keyring.go
parent4d9372795e7b53d105f69790c1d9deadbff85458 (diff)
Fix lint
Diffstat (limited to 'security/keyring.go')
-rw-r--r--security/keyring.go6
1 files changed, 3 insertions, 3 deletions
diff --git a/security/keyring.go b/security/keyring.go
index e0e9094..ab65631 100644
--- a/security/keyring.go
+++ b/security/keyring.go
@@ -105,9 +105,9 @@ var (
// UserKeyringID returns the key id of the target user's user keyring. We also
// ensure that the keyring will be accessible by linking it into the process
// keyring and linking it into the root user keyring (permissions allowing). If
-// check_session is true, an error is returned if a normal user requests their
+// checkSession is true, an error is returned if a normal user requests their
// user keyring, but it is not in the current session keyring.
-func UserKeyringID(target *user.User, check_session bool) (int, error) {
+func UserKeyringID(target *user.User, checkSession bool) (int, error) {
uid := util.AtoiOrPanic(target.Uid)
targetKeyring, err := userKeyringIDLookup(uid)
if err != nil {
@@ -117,7 +117,7 @@ func UserKeyringID(target *user.User, check_session bool) (int, error) {
if !util.IsUserRoot() {
// Make sure the returned keyring will be accessible by checking
// that it is in the session keyring.
- if check_session && !isUserKeyringInSession(uid) {
+ if checkSession && !isUserKeyringInSession(uid) {
return 0, ErrSessionUserKeying
}
return targetKeyring, nil