aboutsummaryrefslogtreecommitdiff
path: root/libpod/runtime_ctr.go
diff options
context:
space:
mode:
authorDaniel J Walsh <dwalsh@redhat.com>2022-01-13 14:51:06 -0500
committerDaniel J Walsh <dwalsh@redhat.com>2022-01-14 12:30:20 -0500
commita15dfb3648b903fa61c299347b315ad8302d8e15 (patch)
tree50ae881b2550d946153a0e4b137cc1738b4da44a /libpod/runtime_ctr.go
parentec2b213ab611cb197e86c45d03fb10af667ad95c (diff)
downloadpodman-a15dfb3648b903fa61c299347b315ad8302d8e15.tar.gz
podman-a15dfb3648b903fa61c299347b315ad8302d8e15.tar.bz2
podman-a15dfb3648b903fa61c299347b315ad8302d8e15.zip
Standardize on capatalized Cgroups
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
Diffstat (limited to 'libpod/runtime_ctr.go')
-rw-r--r--libpod/runtime_ctr.go8
1 files changed, 4 insertions, 4 deletions
diff --git a/libpod/runtime_ctr.go b/libpod/runtime_ctr.go
index 252279485..15bca6133 100644
--- a/libpod/runtime_ctr.go
+++ b/libpod/runtime_ctr.go
@@ -344,8 +344,8 @@ func (r *Runtime) setupContainer(ctx context.Context, ctr *Container) (_ *Contai
}
}
- // Check CGroup parent sanity, and set it if it was not set.
- // Only if we're actually configuring CGroups.
+ // Check Cgroup parent sanity, and set it if it was not set.
+ // Only if we're actually configuring Cgroups.
if !ctr.config.NoCgroups {
ctr.config.CgroupManager = r.config.Engine.CgroupManager
switch r.config.Engine.CgroupManager {
@@ -391,7 +391,7 @@ func (r *Runtime) setupContainer(ctx context.Context, ctr *Container) (_ *Contai
return nil, errors.Wrapf(define.ErrInvalidArg, "did not receive systemd slice as cgroup parent when using systemd to manage cgroups")
}
default:
- return nil, errors.Wrapf(define.ErrInvalidArg, "unsupported CGroup manager: %s - cannot validate cgroup parent", r.config.Engine.CgroupManager)
+ return nil, errors.Wrapf(define.ErrInvalidArg, "unsupported Cgroup manager: %s - cannot validate cgroup parent", r.config.Engine.CgroupManager)
}
}
@@ -411,7 +411,7 @@ func (r *Runtime) setupContainer(ctx context.Context, ctr *Container) (_ *Contai
g.RemoveMount("/run/.containerenv")
g.RemoveMount("/run/secrets")
- // Regenerate CGroup paths so they don't point to the old
+ // Regenerate Cgroup paths so they don't point to the old
// container ID.
cgroupPath, err := ctr.getOCICgroupPath()
if err != nil {