Match case for variables in sysinfo pkg
I noticied an inconsistency when reviewing docker/pull/20692. Changing Ip to IP and Nf to NF. More info: The golang folks recommend that you keep the initials consistent: https://github.com/golang/go/wiki/CodeReviewComments#initialisms. Signed-off-by: Christy Perez <christy@linux.vnet.ibm.com>
This commit is contained in:
parent
29ce086e38
commit
5b3fc7aab2
4 changed files with 8 additions and 8 deletions
|
@ -75,8 +75,8 @@ func (daemon *Daemon) SystemInfo() (*types.Info, error) {
|
|||
DriverStatus: daemon.layerStore.DriverStatus(),
|
||||
Plugins: daemon.showPluginsInfo(),
|
||||
IPv4Forwarding: !sysInfo.IPv4ForwardingDisabled,
|
||||
BridgeNfIptables: !sysInfo.BridgeNfCallIptablesDisabled,
|
||||
BridgeNfIP6tables: !sysInfo.BridgeNfCallIP6tablesDisabled,
|
||||
BridgeNfIptables: !sysInfo.BridgeNFCallIPTablesDisabled,
|
||||
BridgeNfIP6tables: !sysInfo.BridgeNFCallIP6TablesDisabled,
|
||||
Debug: utils.IsDebugEnabled(),
|
||||
NFd: fileutils.GetTotalUsedFds(),
|
||||
NGoroutines: runtime.NumGoroutine(),
|
||||
|
|
|
@ -83,13 +83,13 @@ var (
|
|||
}
|
||||
bridgeNfIptables = testRequirement{
|
||||
func() bool {
|
||||
return !SysInfo.BridgeNfCallIptablesDisabled
|
||||
return !SysInfo.BridgeNFCallIPTablesDisabled
|
||||
},
|
||||
"Test requires that bridge-nf-call-iptables support be enabled in the daemon.",
|
||||
}
|
||||
bridgeNfIP6tables = testRequirement{
|
||||
func() bool {
|
||||
return !SysInfo.BridgeNfCallIP6tablesDisabled
|
||||
return !SysInfo.BridgeNFCallIP6TablesDisabled
|
||||
},
|
||||
"Test requires that bridge-nf-call-ip6tables support be enabled in the daemon.",
|
||||
}
|
||||
|
|
|
@ -19,10 +19,10 @@ type SysInfo struct {
|
|||
IPv4ForwardingDisabled bool
|
||||
|
||||
// Whether bridge-nf-call-iptables is supported or not
|
||||
BridgeNfCallIptablesDisabled bool
|
||||
BridgeNFCallIPTablesDisabled bool
|
||||
|
||||
// Whether bridge-nf-call-ip6tables is supported or not
|
||||
BridgeNfCallIP6tablesDisabled bool
|
||||
BridgeNFCallIP6TablesDisabled bool
|
||||
|
||||
// Whether the cgroup has the mountpoint of "devices" or not
|
||||
CgroupDevicesEnabled bool
|
||||
|
|
|
@ -50,8 +50,8 @@ func New(quiet bool) *SysInfo {
|
|||
sysInfo.CgroupDevicesEnabled = ok
|
||||
|
||||
sysInfo.IPv4ForwardingDisabled = !readProcBool("/proc/sys/net/ipv4/ip_forward")
|
||||
sysInfo.BridgeNfCallIptablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-iptables")
|
||||
sysInfo.BridgeNfCallIP6tablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-ip6tables")
|
||||
sysInfo.BridgeNFCallIPTablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-iptables")
|
||||
sysInfo.BridgeNFCallIP6TablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-ip6tables")
|
||||
|
||||
// Check if AppArmor is supported.
|
||||
if _, err := os.Stat("/sys/kernel/security/apparmor"); !os.IsNotExist(err) {
|
||||
|
|
Loading…
Reference in a new issue