aboutsummaryrefslogtreecommitdiff
path: root/pkg/spec
diff options
context:
space:
mode:
authorDaniel J Walsh <dwalsh@redhat.com>2020-03-07 10:30:44 -0500
committerDaniel J Walsh <dwalsh@redhat.com>2020-03-07 10:30:44 -0500
commitac354ac94ac863e35cb670a5e81bbdc7b70f8559 (patch)
tree8a49d1415119045a90d1bfbe922735a11711c5d9 /pkg/spec
parentc8de26fb0835bb3572af250088d4f66a3162ccd0 (diff)
downloadpodman-ac354ac94ac863e35cb670a5e81bbdc7b70f8559.tar.gz
podman-ac354ac94ac863e35cb670a5e81bbdc7b70f8559.tar.bz2
podman-ac354ac94ac863e35cb670a5e81bbdc7b70f8559.zip
Fix spelling mistakes in code found by codespell
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
Diffstat (limited to 'pkg/spec')
-rw-r--r--pkg/spec/security.go6
1 files changed, 3 insertions, 3 deletions
diff --git a/pkg/spec/security.go b/pkg/spec/security.go
index ca025eb3e..0f8d36f00 100644
--- a/pkg/spec/security.go
+++ b/pkg/spec/security.go
@@ -128,10 +128,10 @@ func (c *SecurityConfig) ConfigureGenerator(g *generate.Generator, user *UserCon
privCapRequired := []string{}
if !c.Privileged && len(c.CapRequired) > 0 {
- // Pass CapRequired in CapAdd field to normalize capabilties names
+ // Pass CapRequired in CapAdd field to normalize capabilities names
capRequired, err := capabilities.MergeCapabilities(nil, c.CapRequired, nil)
if err != nil {
- logrus.Errorf("capabilties requested by user or image are not valid: %q", strings.Join(c.CapRequired, ","))
+ logrus.Errorf("capabilities requested by user or image are not valid: %q", strings.Join(c.CapRequired, ","))
} else {
// Verify all capRequiered are in the defaultCapList
for _, cap := range capRequired {
@@ -143,7 +143,7 @@ func (c *SecurityConfig) ConfigureGenerator(g *generate.Generator, user *UserCon
if len(privCapRequired) == 0 {
defaultCaplist = capRequired
} else {
- logrus.Errorf("capabilties requested by user or image are not allowed by default: %q", strings.Join(privCapRequired, ","))
+ logrus.Errorf("capabilities requested by user or image are not allowed by default: %q", strings.Join(privCapRequired, ","))
}
}
configSpec.Process.Capabilities.Bounding = defaultCaplist