fix some typos in source code comments
Signed-off-by: bin liu <liubin0329@gmail.com>
This commit is contained in:
parent
9dc17dc9b4
commit
4a2ae107c8
|
@ -385,7 +385,7 @@ func getUnitName(c *configs.Cgroup) string {
|
||||||
// * Support for wildcards to allow /dev/pts support
|
// * Support for wildcards to allow /dev/pts support
|
||||||
//
|
//
|
||||||
// The second is available in more recent systemd as "char-pts", but not in e.g. v208 which is
|
// The second is available in more recent systemd as "char-pts", but not in e.g. v208 which is
|
||||||
// in wide use. When both these are availalable we will be able to switch, but need to keep the old
|
// in wide use. When both these are available we will be able to switch, but need to keep the old
|
||||||
// implementation for backwards compat.
|
// implementation for backwards compat.
|
||||||
//
|
//
|
||||||
// Note: we can't use systemd to set up the initial limits, and then change the cgroup
|
// Note: we can't use systemd to set up the initial limits, and then change the cgroup
|
||||||
|
|
|
@ -2,7 +2,7 @@ package configs
|
||||||
|
|
||||||
// Network defines configuration for a container's networking stack
|
// Network defines configuration for a container's networking stack
|
||||||
//
|
//
|
||||||
// The network configuration can be omited from a container causing the
|
// The network configuration can be omitted from a container causing the
|
||||||
// container to be setup with the host's networking stack
|
// container to be setup with the host's networking stack
|
||||||
type Network struct {
|
type Network struct {
|
||||||
// Type sets the networks type, commonly veth and loopback
|
// Type sets the networks type, commonly veth and loopback
|
||||||
|
@ -53,7 +53,7 @@ type Network struct {
|
||||||
// Routes can be specified to create entries in the route table as the container is started
|
// Routes can be specified to create entries in the route table as the container is started
|
||||||
//
|
//
|
||||||
// All of destination, source, and gateway should be either IPv4 or IPv6.
|
// All of destination, source, and gateway should be either IPv4 or IPv6.
|
||||||
// One of the three options must be present, and ommitted entries will use their
|
// One of the three options must be present, and omitted entries will use their
|
||||||
// IP family default for the route table. For IPv4 for example, setting the
|
// IP family default for the route table. For IPv4 for example, setting the
|
||||||
// gateway to 1.2.3.4 and the interface to eth0 will set up a standard
|
// gateway to 1.2.3.4 and the interface to eth0 will set up a standard
|
||||||
// destination of 0.0.0.0(or *) when viewed in the route table.
|
// destination of 0.0.0.0(or *) when viewed in the route table.
|
||||||
|
|
|
@ -38,7 +38,7 @@ func newConsole(uid, gid int) (Console, error) {
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// newConsoleFromPath is an internal fucntion returning an initialzied console for use inside
|
// newConsoleFromPath is an internal function returning an initialized console for use inside
|
||||||
// a container's MNT namespace.
|
// a container's MNT namespace.
|
||||||
func newConsoleFromPath(slavePath string) *linuxConsole {
|
func newConsoleFromPath(slavePath string) *linuxConsole {
|
||||||
return &linuxConsole{
|
return &linuxConsole{
|
||||||
|
|
|
@ -67,7 +67,7 @@ type Container interface {
|
||||||
// State returns the current container's state information.
|
// State returns the current container's state information.
|
||||||
//
|
//
|
||||||
// errors:
|
// errors:
|
||||||
// Systemerror - System erroor.
|
// Systemerror - System error.
|
||||||
State() (*State, error)
|
State() (*State, error)
|
||||||
|
|
||||||
// Returns the current config of the container.
|
// Returns the current config of the container.
|
||||||
|
|
|
@ -21,7 +21,7 @@ var (
|
||||||
ioutilReadDir = ioutil.ReadDir
|
ioutilReadDir = ioutil.ReadDir
|
||||||
)
|
)
|
||||||
|
|
||||||
// Given the path to a device and it's cgroup_permissions(which cannot be easilly queried) look up the information about a linux device and return that information as a Device struct.
|
// Given the path to a device and it's cgroup_permissions(which cannot be easily queried) look up the information about a linux device and return that information as a Device struct.
|
||||||
func DeviceFromPath(path, permissions string) (*configs.Device, error) {
|
func DeviceFromPath(path, permissions string) (*configs.Device, error) {
|
||||||
fileInfo, err := osLstat(path)
|
fileInfo, err := osLstat(path)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -23,7 +23,7 @@ type Process struct {
|
||||||
Env []string
|
Env []string
|
||||||
|
|
||||||
// User will set the uid and gid of the executing process running inside the container
|
// User will set the uid and gid of the executing process running inside the container
|
||||||
// local to the contaienr's user and group configuration.
|
// local to the container's user and group configuration.
|
||||||
User string
|
User string
|
||||||
|
|
||||||
// Cwd will change the processes current working directory inside the container's rootfs.
|
// Cwd will change the processes current working directory inside the container's rootfs.
|
||||||
|
@ -45,7 +45,7 @@ type Process struct {
|
||||||
consolePath string
|
consolePath string
|
||||||
|
|
||||||
// Capabilities specify the capabilities to keep when executing the process inside the container
|
// Capabilities specify the capabilities to keep when executing the process inside the container
|
||||||
// All capbilities not specified will be dropped from the processes capability mask
|
// All capabilities not specified will be dropped from the processes capability mask
|
||||||
Capabilities []string
|
Capabilities []string
|
||||||
|
|
||||||
ops processOperations
|
ops processOperations
|
||||||
|
|
Loading…
Reference in New Issue