Signed-off-by: David Mackey <tdmackey@booleanhaiku.com>
| ... | ... |
@@ -483,7 +483,7 @@ func (b *Builder) processImageFrom(img *imagepkg.Image) error {
|
| 483 | 483 |
fmt.Fprintf(b.ErrStream, "# Executing %d build triggers\n", nTriggers) |
| 484 | 484 |
} |
| 485 | 485 |
|
| 486 |
- // Copy the ONBUILD triggers, and remove them from the config, since the config will be commited. |
|
| 486 |
+ // Copy the ONBUILD triggers, and remove them from the config, since the config will be committed. |
|
| 487 | 487 |
onBuildTriggers := b.Config.OnBuild |
| 488 | 488 |
b.Config.OnBuild = []string{}
|
| 489 | 489 |
|
| ... | ... |
@@ -823,7 +823,7 @@ func NewDaemonFromDirectory(config *Config, eng *engine.Engine, registryService |
| 823 | 823 |
// Load storage driver |
| 824 | 824 |
driver, err := graphdriver.New(config.Root, config.GraphOptions) |
| 825 | 825 |
if err != nil {
|
| 826 |
- return nil, fmt.Errorf("error intializing graphdriver: %v", err)
|
|
| 826 |
+ return nil, fmt.Errorf("error initializing graphdriver: %v", err)
|
|
| 827 | 827 |
} |
| 828 | 828 |
logrus.Debugf("Using graph driver %s", driver)
|
| 829 | 829 |
// register cleanup for graph driver |
| ... | ... |
@@ -601,7 +601,7 @@ func TestRegisterBadTwice(t *testing.T) {
|
| 601 | 601 |
Mask: []byte{255, 255, 255, 248},
|
| 602 | 602 |
} |
| 603 | 603 |
if err := a.RegisterSubnet(network, subnet); err != ErrNetworkAlreadyRegistered {
|
| 604 |
- t.Fatalf("Expecteded ErrNetworkAlreadyRegistered error, got %v", err)
|
|
| 604 |
+ t.Fatalf("Expected ErrNetworkAlreadyRegistered error, got %v", err)
|
|
| 605 | 605 |
} |
| 606 | 606 |
} |
| 607 | 607 |
|
| ... | ... |
@@ -643,7 +643,7 @@ func (s *DockerSuite) TestContainerApiCommit(c *check.C) {
|
| 643 | 643 |
// sanity check, make sure the image is what we think it is |
| 644 | 644 |
out, err = exec.Command(dockerBinary, "run", img.Id, "ls", "/test").CombinedOutput() |
| 645 | 645 |
if err != nil {
|
| 646 |
- c.Fatalf("error checking commited image: %v - %q", err, string(out))
|
|
| 646 |
+ c.Fatalf("error checking committed image: %v - %q", err, string(out))
|
|
| 647 | 647 |
} |
| 648 | 648 |
} |
| 649 | 649 |
|
| ... | ... |
@@ -161,7 +161,7 @@ func (s *DockerSuite) TestAttachDisconnect(c *check.C) {
|
| 161 | 161 |
c.Fatal(err) |
| 162 | 162 |
} |
| 163 | 163 |
if strings.TrimSpace(out) != "hello" {
|
| 164 |
- c.Fatalf("exepected 'hello', got %q", out)
|
|
| 164 |
+ c.Fatalf("expected 'hello', got %q", out)
|
|
| 165 | 165 |
} |
| 166 | 166 |
|
| 167 | 167 |
if err := stdin.Close(); err != nil {
|
| ... | ... |
@@ -174,7 +174,7 @@ func (s *DockerSuite) TestAttachDisconnect(c *check.C) {
|
| 174 | 174 |
c.Fatal(err) |
| 175 | 175 |
} |
| 176 | 176 |
if running != "true" {
|
| 177 |
- c.Fatal("exepected container to still be running")
|
|
| 177 |
+ c.Fatal("expected container to still be running")
|
|
| 178 | 178 |
} |
| 179 | 179 |
|
| 180 | 180 |
} |
| ... | ... |
@@ -172,7 +172,7 @@ func (s *DockerSuite) TestAttachDetach(c *check.C) {
|
| 172 | 172 |
c.Fatal(err) |
| 173 | 173 |
} |
| 174 | 174 |
if strings.TrimSpace(out) != "hello" {
|
| 175 |
- c.Fatalf("exepected 'hello', got %q", out)
|
|
| 175 |
+ c.Fatalf("expected 'hello', got %q", out)
|
|
| 176 | 176 |
} |
| 177 | 177 |
|
| 178 | 178 |
// escape sequence |
| ... | ... |
@@ -195,7 +195,7 @@ func (s *DockerSuite) TestAttachDetach(c *check.C) {
|
| 195 | 195 |
c.Fatal(err) |
| 196 | 196 |
} |
| 197 | 197 |
if running != "true" {
|
| 198 |
- c.Fatal("exepected container to still be running")
|
|
| 198 |
+ c.Fatal("expected container to still be running")
|
|
| 199 | 199 |
} |
| 200 | 200 |
|
| 201 | 201 |
go func() {
|
| ... | ... |
@@ -243,7 +243,7 @@ func (s *DockerSuite) TestAttachDetachTruncatedID(c *check.C) {
|
| 243 | 243 |
c.Fatal(err) |
| 244 | 244 |
} |
| 245 | 245 |
if strings.TrimSpace(out) != "hello" {
|
| 246 |
- c.Fatalf("exepected 'hello', got %q", out)
|
|
| 246 |
+ c.Fatalf("expected 'hello', got %q", out)
|
|
| 247 | 247 |
} |
| 248 | 248 |
|
| 249 | 249 |
// escape sequence |
| ... | ... |
@@ -266,7 +266,7 @@ func (s *DockerSuite) TestAttachDetachTruncatedID(c *check.C) {
|
| 266 | 266 |
c.Fatal(err) |
| 267 | 267 |
} |
| 268 | 268 |
if running != "true" {
|
| 269 |
- c.Fatal("exepected container to still be running")
|
|
| 269 |
+ c.Fatal("expected container to still be running")
|
|
| 270 | 270 |
} |
| 271 | 271 |
|
| 272 | 272 |
go func() {
|
| ... | ... |
@@ -3408,7 +3408,7 @@ func (s *DockerSuite) TestBuildVerifyIntString(c *check.C) {
|
| 3408 | 3408 |
|
| 3409 | 3409 |
out, rc, err := runCommandWithOutput(exec.Command(dockerBinary, "inspect", name)) |
| 3410 | 3410 |
if rc != 0 || err != nil {
|
| 3411 |
- c.Fatalf("Unexcepted error from inspect: rc: %v err: %v", rc, err)
|
|
| 3411 |
+ c.Fatalf("Unexpected error from inspect: rc: %v err: %v", rc, err)
|
|
| 3412 | 3412 |
} |
| 3413 | 3413 |
|
| 3414 | 3414 |
if !strings.Contains(out, "\"123\"") {
|
| ... | ... |
@@ -5033,7 +5033,7 @@ RUN echo " \ |
| 5033 | 5033 |
|
| 5034 | 5034 |
expecting := "\n foo \n" |
| 5035 | 5035 |
if !strings.Contains(out, expecting) {
|
| 5036 |
- c.Fatalf("Bad output: %q expecting to contian %q", out, expecting)
|
|
| 5036 |
+ c.Fatalf("Bad output: %q expecting to contain %q", out, expecting)
|
|
| 5037 | 5037 |
} |
| 5038 | 5038 |
|
| 5039 | 5039 |
} |
| ... | ... |
@@ -262,7 +262,7 @@ func (s *DockerSuite) TestCommitMergeConfigRun(c *check.C) {
|
| 262 | 262 |
|
| 263 | 263 |
out, _ = dockerCmd(c, "run", "--name", name, "commit-test") |
| 264 | 264 |
if strings.TrimSpace(out) != "testing" {
|
| 265 |
- c.Fatal("run config in commited container was not merged")
|
|
| 265 |
+ c.Fatal("run config in committed container was not merged")
|
|
| 266 | 266 |
} |
| 267 | 267 |
|
| 268 | 268 |
type cfg struct {
|
| ... | ... |
@@ -860,7 +860,7 @@ func (s *DockerSuite) TestDaemonwithwrongkey(c *check.C) {
|
| 860 | 860 |
|
| 861 | 861 |
if err := d1.Start(); err == nil {
|
| 862 | 862 |
d1.Stop() |
| 863 |
- c.Fatalf("It should not be succssful to start daemon with wrong key: %v", err)
|
|
| 863 |
+ c.Fatalf("It should not be successful to start daemon with wrong key: %v", err)
|
|
| 864 | 864 |
} |
| 865 | 865 |
|
| 866 | 866 |
content, _ := ioutil.ReadFile(d1.logFile.Name()) |
| ... | ... |
@@ -547,7 +547,7 @@ func (s *DockerSuite) TestPsListContainersFilterExited(c *check.C) {
|
| 547 | 547 |
} |
| 548 | 548 |
ids = strings.Split(strings.TrimSpace(out), "\n") |
| 549 | 549 |
if len(ids) != 2 {
|
| 550 |
- c.Fatalf("Should be 2 zero exited containerst got %d", len(ids))
|
|
| 550 |
+ c.Fatalf("Should be 2 zero exited containers got %d", len(ids))
|
|
| 551 | 551 |
} |
| 552 | 552 |
if ids[0] != secondNonZero {
|
| 553 | 553 |
c.Fatalf("First in list should be %q, got %q", secondNonZero, ids[0])
|
| ... | ... |
@@ -41,7 +41,7 @@ func (s *DockerRegistrySuite) TestPushUntagged(c *check.C) {
|
| 41 | 41 |
expected := "Repository does not exist" |
| 42 | 42 |
pushCmd := exec.Command(dockerBinary, "push", repoName) |
| 43 | 43 |
if out, _, err := runCommandWithOutput(pushCmd); err == nil {
|
| 44 |
- c.Fatalf("pushing the image to the private registry should have failed: outuput %q", out)
|
|
| 44 |
+ c.Fatalf("pushing the image to the private registry should have failed: output %q", out)
|
|
| 45 | 45 |
} else if !strings.Contains(out, expected) {
|
| 46 | 46 |
c.Fatalf("pushing the image failed with an unexpected message: expected %q, got %q", expected, out)
|
| 47 | 47 |
} |
| ... | ... |
@@ -53,7 +53,7 @@ func (s *DockerRegistrySuite) TestPushBadTag(c *check.C) {
|
| 53 | 53 |
expected := "does not exist" |
| 54 | 54 |
pushCmd := exec.Command(dockerBinary, "push", repoName) |
| 55 | 55 |
if out, _, err := runCommandWithOutput(pushCmd); err == nil {
|
| 56 |
- c.Fatalf("pushing the image to the private registry should have failed: outuput %q", out)
|
|
| 56 |
+ c.Fatalf("pushing the image to the private registry should have failed: output %q", out)
|
|
| 57 | 57 |
} else if !strings.Contains(out, expected) {
|
| 58 | 58 |
c.Fatalf("pushing the image failed with an unexpected message: expected %q, got %q", expected, out)
|
| 59 | 59 |
} |
| ... | ... |
@@ -108,7 +108,7 @@ func (s *DockerSuite) TestRmiImgIDForce(c *check.C) {
|
| 108 | 108 |
runCmd = exec.Command(dockerBinary, "rmi", imgID) |
| 109 | 109 |
out, _, err = runCommandWithOutput(runCmd) |
| 110 | 110 |
if err == nil || !strings.Contains(out, fmt.Sprintf("Conflict, cannot delete image %s because it is tagged in multiple repositories, use -f to force", imgID)) {
|
| 111 |
- c.Fatalf("rmi tagged in mutiple repos should have failed without force:%s, %v", out, err)
|
|
| 111 |
+ c.Fatalf("rmi tagged in multiple repos should have failed without force:%s, %v", out, err)
|
|
| 112 | 112 |
} |
| 113 | 113 |
|
| 114 | 114 |
dockerCmd(c, "rmi", "-f", imgID) |
| ... | ... |
@@ -329,7 +329,7 @@ func (s *DockerSuite) TestRunLinksContainerWithContainerId(c *check.C) {
|
| 329 | 329 |
cmd = exec.Command(dockerBinary, "inspect", "-f", "{{.NetworkSettings.IPAddress}}", cID)
|
| 330 | 330 |
ip, _, _, err := runCommandWithStdoutStderr(cmd) |
| 331 | 331 |
if err != nil {
|
| 332 |
- c.Fatalf("faild to inspect container: %v, output: %q", err, ip)
|
|
| 332 |
+ c.Fatalf("failed to inspect container: %v, output: %q", err, ip)
|
|
| 333 | 333 |
} |
| 334 | 334 |
ip = strings.TrimSpace(ip) |
| 335 | 335 |
cmd = exec.Command(dockerBinary, "run", "--link", cID+":test", "busybox", "/bin/cat", "/etc/hosts") |
| ... | ... |
@@ -2067,7 +2067,7 @@ func (s *DockerSuite) TestRunCidFileCleanupIfEmpty(c *check.C) {
|
| 2067 | 2067 |
if err == nil {
|
| 2068 | 2068 |
c.Fatalf("Run without command must fail. out=%s", out)
|
| 2069 | 2069 |
} else if !strings.Contains(out, "No command specified") {
|
| 2070 |
- c.Fatalf("Run without command failed with wrong outpuc. out=%s\nerr=%v", out, err)
|
|
| 2070 |
+ c.Fatalf("Run without command failed with wrong output. out=%s\nerr=%v", out, err)
|
|
| 2071 | 2071 |
} |
| 2072 | 2072 |
|
| 2073 | 2073 |
if _, err := os.Stat(tmpCidFile); err == nil {
|
| ... | ... |
@@ -213,7 +213,7 @@ func (s *DockerSuite) TestRunAttachDetach(c *check.C) {
|
| 213 | 213 |
c.Fatal(err) |
| 214 | 214 |
} |
| 215 | 215 |
if strings.TrimSpace(out) != "hello" {
|
| 216 |
- c.Fatalf("exepected 'hello', got %q", out)
|
|
| 216 |
+ c.Fatalf("expected 'hello', got %q", out)
|
|
| 217 | 217 |
} |
| 218 | 218 |
|
| 219 | 219 |
// escape sequence |
| ... | ... |
@@ -236,7 +236,7 @@ func (s *DockerSuite) TestRunAttachDetach(c *check.C) {
|
| 236 | 236 |
c.Fatal(err) |
| 237 | 237 |
} |
| 238 | 238 |
if running != "true" {
|
| 239 |
- c.Fatal("exepected container to still be running")
|
|
| 239 |
+ c.Fatal("expected container to still be running")
|
|
| 240 | 240 |
} |
| 241 | 241 |
|
| 242 | 242 |
go func() {
|
| ... | ... |
@@ -333,7 +333,7 @@ func (s *DockerSuite) TestSaveRepoWithMultipleImages(c *check.C) {
|
| 333 | 333 |
sort.Strings(actual) |
| 334 | 334 |
sort.Strings(expected) |
| 335 | 335 |
if !reflect.DeepEqual(expected, actual) {
|
| 336 |
- c.Fatalf("achive does not contains the right layers: got %v, expected %v", actual, expected)
|
|
| 336 |
+ c.Fatalf("archive does not contains the right layers: got %v, expected %v", actual, expected)
|
|
| 337 | 337 |
} |
| 338 | 338 |
|
| 339 | 339 |
} |
| ... | ... |
@@ -205,7 +205,7 @@ func (s *DockerSuite) TestStartMultipleContainers(c *check.C) {
|
| 205 | 205 |
c.Fatal("Container should be stopped")
|
| 206 | 206 |
} |
| 207 | 207 |
|
| 208 |
- // start all the three containers, container `child_first` start first which should be faild |
|
| 208 |
+ // start all the three containers, container `child_first` start first which should be failed |
|
| 209 | 209 |
// container 'parent' start second and then start container 'child_second' |
| 210 | 210 |
cmd = exec.Command(dockerBinary, "start", "child_first", "parent", "child_second") |
| 211 | 211 |
out, _, err = runCommandWithOutput(cmd) |
| ... | ... |
@@ -434,7 +434,7 @@ func TestGetEnabledCors(t *testing.T) {
|
| 434 | 434 |
t.Errorf("Expected header Access-Control-Allow-Headers to be \"Origin, X-Requested-With, Content-Type, Accept, X-Registry-Auth\", %s found.", allowHeaders)
|
| 435 | 435 |
} |
| 436 | 436 |
if allowMethods != "GET, POST, DELETE, PUT, OPTIONS" {
|
| 437 |
- t.Errorf("Expected hearder Access-Control-Allow-Methods to be \"GET, POST, DELETE, PUT, OPTIONS\", %s found.", allowMethods)
|
|
| 437 |
+ t.Errorf("Expected header Access-Control-Allow-Methods to be \"GET, POST, DELETE, PUT, OPTIONS\", %s found.", allowMethods)
|
|
| 438 | 438 |
} |
| 439 | 439 |
} |
| 440 | 440 |
|
| ... | ... |
@@ -648,7 +648,7 @@ func TestConstainersStartChunkedEncodingHostConfig(t *testing.T) {
|
| 648 | 648 |
} |
| 649 | 649 |
|
| 650 | 650 |
if c.HostConfig.Binds[0] != "/tmp:/foo" {
|
| 651 |
- t.Fatal("Chunked encoding not properly handled, execpted binds to be /tmp:/foo, got:", c.HostConfig.Binds[0])
|
|
| 651 |
+ t.Fatal("Chunked encoding not properly handled, expected binds to be /tmp:/foo, got:", c.HostConfig.Binds[0])
|
|
| 652 | 652 |
} |
| 653 | 653 |
} |
| 654 | 654 |
|
| ... | ... |
@@ -213,7 +213,7 @@ func BenchmarkRunParallel(b *testing.B) {
|
| 213 | 213 |
return |
| 214 | 214 |
} |
| 215 | 215 |
// if string(output) != "foo" {
|
| 216 |
- // complete <- fmt.Errorf("Unexecpted output: %v", string(output))
|
|
| 216 |
+ // complete <- fmt.Errorf("Unexpected output: %v", string(output))
|
|
| 217 | 217 |
// } |
| 218 | 218 |
if err := daemon.Rm(container); err != nil {
|
| 219 | 219 |
complete <- err |
| ... | ... |
@@ -837,7 +837,7 @@ func TestDestroyWithInitLayer(t *testing.T) {
|
| 837 | 837 |
|
| 838 | 838 |
// Make sure that the container does not exist in the driver |
| 839 | 839 |
if _, err := driver.Get(container.ID, ""); err == nil {
|
| 840 |
- t.Fatal("Conttainer should not exist in the driver")
|
|
| 840 |
+ t.Fatal("Container should not exist in the driver")
|
|
| 841 | 841 |
} |
| 842 | 842 |
|
| 843 | 843 |
// Make sure that the init layer is removed from the driver |
| ... | ... |
@@ -41,7 +41,7 @@ func waitContainerStart(t *testing.T, timeout time.Duration) *daemon.Container {
|
| 41 | 41 |
}) |
| 42 | 42 |
|
| 43 | 43 |
if container == nil {
|
| 44 |
- t.Fatal("An error occured while waiting for the container to start")
|
|
| 44 |
+ t.Fatal("An error occurred while waiting for the container to start")
|
|
| 45 | 45 |
} |
| 46 | 46 |
|
| 47 | 47 |
return container |
| ... | ... |
@@ -20,7 +20,7 @@ func TestCanonicalTarNameForPath(t *testing.T) {
|
| 20 | 20 |
if out, err := CanonicalTarNameForPath(v.in); err != nil && !v.shouldFail {
|
| 21 | 21 |
t.Fatalf("cannot get canonical name for path: %s: %v", v.in, err)
|
| 22 | 22 |
} else if v.shouldFail && err == nil {
|
| 23 |
- t.Fatalf("canonical path call should have pailed with error. in=%s out=%s", v.in, out)
|
|
| 23 |
+ t.Fatalf("canonical path call should have failed with error. in=%s out=%s", v.in, out)
|
|
| 24 | 24 |
} else if !v.shouldFail && out != v.expected {
|
| 25 | 25 |
t.Fatalf("wrong canonical tar name. expected:%s got:%s", v.expected, out)
|
| 26 | 26 |
} |
| ... | ... |
@@ -52,7 +52,7 @@ func TestGetRootEntity(t *testing.T) {
|
| 52 | 52 |
t.Fatal("Entity should not be nil")
|
| 53 | 53 |
} |
| 54 | 54 |
if e.ID() != "0" {
|
| 55 |
- t.Fatalf("Enity id should be 0, got %s", e.ID())
|
|
| 55 |
+ t.Fatalf("Entity id should be 0, got %s", e.ID())
|
|
| 56 | 56 |
} |
| 57 | 57 |
} |
| 58 | 58 |
|
| ... | ... |
@@ -74,7 +74,7 @@ func TestSetDuplicateEntity(t *testing.T) {
|
| 74 | 74 |
t.Fatal(err) |
| 75 | 75 |
} |
| 76 | 76 |
if _, err := db.Set("/foo", "43"); err == nil {
|
| 77 |
- t.Fatalf("Creating an entry with a duplciate path did not cause an error")
|
|
| 77 |
+ t.Fatalf("Creating an entry with a duplicate path did not cause an error")
|
|
| 78 | 78 |
} |
| 79 | 79 |
} |
| 80 | 80 |
|
| ... | ... |
@@ -18,7 +18,7 @@ func helpsTestParseInt16OrDefault(t *testing.T, expectedValue int16, shouldFail |
| 18 | 18 |
t.Errorf(format, args) |
| 19 | 19 |
} |
| 20 | 20 |
if expectedValue != value {
|
| 21 |
- t.Errorf("The value returned does not macth expected\n\tExpected:%v\n\t:Actual%v", expectedValue, value)
|
|
| 21 |
+ t.Errorf("The value returned does not match expected\n\tExpected:%v\n\t:Actual%v", expectedValue, value)
|
|
| 22 | 22 |
t.Errorf(format, args) |
| 23 | 23 |
} |
| 24 | 24 |
} |
| ... | ... |
@@ -736,7 +736,7 @@ func TestSearchRepositories(t *testing.T) {
|
| 736 | 736 |
} |
| 737 | 737 |
assertEqual(t, results.NumResults, 1, "Expected 1 search results") |
| 738 | 738 |
assertEqual(t, results.Query, "fakequery", "Expected 'fakequery' as query") |
| 739 |
- assertEqual(t, results.Results[0].StarCount, 42, "Expected 'fakeimage' a ot hae 42 stars") |
|
| 739 |
+ assertEqual(t, results.Results[0].StarCount, 42, "Expected 'fakeimage' to have 42 stars") |
|
| 740 | 740 |
} |
| 741 | 741 |
|
| 742 | 742 |
func TestValidRemoteName(t *testing.T) {
|
| ... | ... |
@@ -104,7 +104,7 @@ func TestParseRunVolumes(t *testing.T) {
|
| 104 | 104 |
if config, hostConfig := mustParse(t, "-v /tmp -v /var"); hostConfig.Binds != nil {
|
| 105 | 105 |
t.Fatalf("Error parsing volume flags, `-v /tmp -v /var` should not mount-bind anything. Received %v", hostConfig.Binds)
|
| 106 | 106 |
} else if _, exists := config.Volumes["/tmp"]; !exists {
|
| 107 |
- t.Fatalf("Error parsing volume flags, `-v /tmp` is missing from volumes. Recevied %v", config.Volumes)
|
|
| 107 |
+ t.Fatalf("Error parsing volume flags, `-v /tmp` is missing from volumes. Received %v", config.Volumes)
|
|
| 108 | 108 |
} else if _, exists := config.Volumes["/var"]; !exists {
|
| 109 | 109 |
t.Fatalf("Error parsing volume flags, `-v /var` is missing from volumes. Received %v", config.Volumes)
|
| 110 | 110 |
} |
| ... | ... |
@@ -41,7 +41,7 @@ func Merge(userConf, imageConf *Config) error {
|
| 41 | 41 |
} |
| 42 | 42 |
if len(imageConf.PortSpecs) > 0 {
|
| 43 | 43 |
// FIXME: I think we can safely remove this. Leaving it for now for the sake of reverse-compat paranoia. |
| 44 |
- logrus.Debugf("Migrating image port specs to containter: %s", strings.Join(imageConf.PortSpecs, ", "))
|
|
| 44 |
+ logrus.Debugf("Migrating image port specs to container: %s", strings.Join(imageConf.PortSpecs, ", "))
|
|
| 45 | 45 |
if userConf.ExposedPorts == nil {
|
| 46 | 46 |
userConf.ExposedPorts = make(nat.PortSet) |
| 47 | 47 |
} |
| ... | ... |
@@ -58,7 +58,7 @@ func (r *Repository) newVolume(path string, writable bool) (*Volume, error) {
|
| 58 | 58 |
path = filepath.Clean(path) |
| 59 | 59 |
|
| 60 | 60 |
// Ignore the error here since the path may not exist |
| 61 |
- // Really just want to make sure the path we are using is real(or non-existant) |
|
| 61 |
+ // Really just want to make sure the path we are using is real(or nonexistent) |
|
| 62 | 62 |
if cleanPath, err := filepath.EvalSymlinks(path); err == nil {
|
| 63 | 63 |
path = cleanPath |
| 64 | 64 |
} |