From f270dfadb9af9e81ae4c884a3ea45ca4618a7a05 Mon Sep 17 00:00:00 2001 From: Deepesh Pathak Date: Sun, 2 Sep 2018 01:17:27 +0530 Subject: feat(spell-check): add make command for spell check. * Remove spelling mistakes in the repository * Add travis script to check for typos. * Add command to Makefile to check for typos. * Fixes #71 --- security/cache.go | 2 +- security/keyring.go | 2 +- security/privileges.go | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) (limited to 'security') diff --git a/security/cache.go b/security/cache.go index d0c60b1..fd22e15 100644 --- a/security/cache.go +++ b/security/cache.go @@ -43,7 +43,7 @@ func DropFilesystemCache() error { defer file.Close() // "2" just frees the reclaimable inodes and dentries, the associated // pages to these inodes will be freed. We do not need to free the - // entire pagecache (as this will severly impact performance). + // entire pagecache (as this will severely impact performance). _, err = file.WriteString("2") return err } diff --git a/security/keyring.go b/security/keyring.go index c4603bc..69ed38b 100644 --- a/security/keyring.go +++ b/security/keyring.go @@ -148,7 +148,7 @@ func userKeyringIDLookup(uid int) (keyringID int, err error) { // Our goals here are to: // - Find the user keyring (for the provided uid) // - Link it into the current process keyring (so we can use it) - // - Make no permenant changes to the process privileges + // - Make no permanent changes to the process privileges // Complicating this are the facts that: // - The value of KEY_SPEC_USER_KEYRING is determined by the ruid // - Keyring linking permissions use the euid diff --git a/security/privileges.go b/security/privileges.go index c9bfde7..649bc30 100644 --- a/security/privileges.go +++ b/security/privileges.go @@ -93,7 +93,7 @@ func ProcessPrivileges() (*Privileges, error) { return &Privileges{euid, egid, groups}, nil } -// UserPrivileges returns the defualt privileges for the specified user. +// UserPrivileges returns the default privileges for the specified user. func UserPrivileges(user *user.User) (*Privileges, error) { privs := &Privileges{ euid: C.uid_t(util.AtoiOrPanic(user.Uid)), @@ -122,7 +122,7 @@ func SetProcessPrivileges(privs *Privileges) error { // the groups/egid/euid, regardless of our original euid. C.seteuid(0) - // Seperately handle the case where the user is in no groups. + // Separately handle the case where the user is in no groups. numGroups := C.size_t(len(privs.groups)) groupsPtr := (*C.gid_t)(nil) if numGroups > 0 { -- cgit v1.2.3