diff options
| author | Deepesh Pathak <deepshpathak@gmail.com> | 2018-09-02 01:17:27 +0530 |
|---|---|---|
| committer | Deepesh Pathak <deepshpathak@gmail.com> | 2018-09-02 01:17:27 +0530 |
| commit | f270dfadb9af9e81ae4c884a3ea45ca4618a7a05 (patch) | |
| tree | f54c9498224727db334d2e9b2b5bc0707838da67 /security | |
| parent | 0f451a722918f39fa07bd9337e4a14ca154b13ae (diff) | |
feat(spell-check): add make command for spell check.
* Remove spelling mistakes in the repository
* Add travis script to check for typos.
* Add command to Makefile to check for typos.
* Fixes #71
Diffstat (limited to 'security')
| -rw-r--r-- | security/cache.go | 2 | ||||
| -rw-r--r-- | security/keyring.go | 2 | ||||
| -rw-r--r-- | security/privileges.go | 4 |
3 files changed, 4 insertions, 4 deletions
diff --git a/security/cache.go b/security/cache.go index d0c60b1..fd22e15 100644 --- a/security/cache.go +++ b/security/cache.go @@ -43,7 +43,7 @@ func DropFilesystemCache() error { defer file.Close() // "2" just frees the reclaimable inodes and dentries, the associated // pages to these inodes will be freed. We do not need to free the - // entire pagecache (as this will severly impact performance). + // entire pagecache (as this will severely impact performance). _, err = file.WriteString("2") return err } diff --git a/security/keyring.go b/security/keyring.go index c4603bc..69ed38b 100644 --- a/security/keyring.go +++ b/security/keyring.go @@ -148,7 +148,7 @@ func userKeyringIDLookup(uid int) (keyringID int, err error) { // Our goals here are to: // - Find the user keyring (for the provided uid) // - Link it into the current process keyring (so we can use it) - // - Make no permenant changes to the process privileges + // - Make no permanent changes to the process privileges // Complicating this are the facts that: // - The value of KEY_SPEC_USER_KEYRING is determined by the ruid // - Keyring linking permissions use the euid diff --git a/security/privileges.go b/security/privileges.go index c9bfde7..649bc30 100644 --- a/security/privileges.go +++ b/security/privileges.go @@ -93,7 +93,7 @@ func ProcessPrivileges() (*Privileges, error) { return &Privileges{euid, egid, groups}, nil } -// UserPrivileges returns the defualt privileges for the specified user. +// UserPrivileges returns the default privileges for the specified user. func UserPrivileges(user *user.User) (*Privileges, error) { privs := &Privileges{ euid: C.uid_t(util.AtoiOrPanic(user.Uid)), @@ -122,7 +122,7 @@ func SetProcessPrivileges(privs *Privileges) error { // the groups/egid/euid, regardless of our original euid. C.seteuid(0) - // Seperately handle the case where the user is in no groups. + // Separately handle the case where the user is in no groups. numGroups := C.size_t(len(privs.groups)) groupsPtr := (*C.gid_t)(nil) if numGroups > 0 { |