Run gofmt -s on everything
PiperOrigin-RevId: 195469901 Change-Id: I66d5c7a334bbb8b47e40d266a2661291c2d91c7f
This commit is contained in:
parent
0ce9c81b41
commit
f47174f06b
|
@ -38,7 +38,7 @@ func TestProcessListTable(t *testing.T) {
|
|||
},
|
||||
{
|
||||
pl: []*Process{
|
||||
&Process{
|
||||
{
|
||||
UID: 0,
|
||||
PID: 0,
|
||||
PPID: 0,
|
||||
|
@ -47,7 +47,7 @@ func TestProcessListTable(t *testing.T) {
|
|||
Time: "0",
|
||||
Cmd: "zero",
|
||||
},
|
||||
&Process{
|
||||
{
|
||||
UID: 1,
|
||||
PID: 1,
|
||||
PPID: 1,
|
||||
|
@ -83,7 +83,7 @@ func TestProcessListJSON(t *testing.T) {
|
|||
},
|
||||
{
|
||||
pl: []*Process{
|
||||
&Process{
|
||||
{
|
||||
UID: 0,
|
||||
PID: 0,
|
||||
PPID: 0,
|
||||
|
@ -92,7 +92,7 @@ func TestProcessListJSON(t *testing.T) {
|
|||
Time: "0",
|
||||
Cmd: "zero",
|
||||
},
|
||||
&Process{
|
||||
{
|
||||
UID: 1,
|
||||
PID: 1,
|
||||
PPID: 1,
|
||||
|
|
|
@ -57,7 +57,7 @@ func TestBasic(t *testing.T) {
|
|||
ctx := contexttest.Context(t)
|
||||
set := &Set{ID: 123, sems: make([]sem, 1)}
|
||||
ops := []linux.Sembuf{
|
||||
linux.Sembuf{SemOp: 1},
|
||||
{SemOp: 1},
|
||||
}
|
||||
executeOps(ctx, t, set, ops, false)
|
||||
|
||||
|
@ -78,7 +78,7 @@ func TestWaitForZero(t *testing.T) {
|
|||
ctx := contexttest.Context(t)
|
||||
set := &Set{ID: 123, sems: make([]sem, 1)}
|
||||
ops := []linux.Sembuf{
|
||||
linux.Sembuf{SemOp: 0},
|
||||
{SemOp: 0},
|
||||
}
|
||||
executeOps(ctx, t, set, ops, false)
|
||||
|
||||
|
@ -117,7 +117,7 @@ func TestNoWait(t *testing.T) {
|
|||
ctx := contexttest.Context(t)
|
||||
set := &Set{ID: 123, sems: make([]sem, 1)}
|
||||
ops := []linux.Sembuf{
|
||||
linux.Sembuf{SemOp: 1},
|
||||
{SemOp: 1},
|
||||
}
|
||||
executeOps(ctx, t, set, ops, false)
|
||||
|
||||
|
@ -146,7 +146,7 @@ func TestUnregister(t *testing.T) {
|
|||
}
|
||||
|
||||
ops := []linux.Sembuf{
|
||||
linux.Sembuf{SemOp: -1},
|
||||
{SemOp: -1},
|
||||
}
|
||||
chs := make([]chan struct{}, 0, 5)
|
||||
for i := 0; i < 5; i++ {
|
||||
|
|
|
@ -614,8 +614,8 @@ func (l *localFile) SetAttr(valid p9.SetAttrMask, attr p9.SetAttr) error {
|
|||
|
||||
if valid.ATime || valid.MTime {
|
||||
utimes := [2]syscall.Timespec{
|
||||
syscall.Timespec{Sec: 0, Nsec: linux.UTIME_OMIT},
|
||||
syscall.Timespec{Sec: 0, Nsec: linux.UTIME_OMIT},
|
||||
{Sec: 0, Nsec: linux.UTIME_OMIT},
|
||||
{Sec: 0, Nsec: linux.UTIME_OMIT},
|
||||
}
|
||||
if valid.ATime {
|
||||
if valid.ATimeNotSystemTime {
|
||||
|
|
|
@ -39,12 +39,12 @@ var (
|
|||
allConfs []Config
|
||||
|
||||
rwConfs = []Config{
|
||||
Config{ROMount: false, LazyOpenForWrite: false},
|
||||
Config{ROMount: false, LazyOpenForWrite: true},
|
||||
{ROMount: false, LazyOpenForWrite: false},
|
||||
{ROMount: false, LazyOpenForWrite: true},
|
||||
}
|
||||
roConfs = []Config{
|
||||
Config{ROMount: true, LazyOpenForWrite: false},
|
||||
Config{ROMount: true, LazyOpenForWrite: true},
|
||||
{ROMount: true, LazyOpenForWrite: false},
|
||||
{ROMount: true, LazyOpenForWrite: true},
|
||||
}
|
||||
)
|
||||
|
||||
|
|
|
@ -493,8 +493,8 @@ func (s *Sandbox) createSandboxProcess(conf *boot.Config, binPath string, common
|
|||
// namespace for these.
|
||||
log.Infof("Sandbox will be started in empty IPC and UTS namespaces")
|
||||
nss := []specs.LinuxNamespace{
|
||||
specs.LinuxNamespace{Type: specs.IPCNamespace},
|
||||
specs.LinuxNamespace{Type: specs.UTSNamespace},
|
||||
{Type: specs.IPCNamespace},
|
||||
{Type: specs.UTSNamespace},
|
||||
}
|
||||
|
||||
if conf.Platform == boot.PlatformPtrace {
|
||||
|
|
Loading…
Reference in New Issue