From 2007eab12e3bdb7176cbee247b2e22b776a09696 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Sun, 11 Mar 2018 18:26:25 +0000 Subject: [PATCH] spelling: malicious --- client/task_runner.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/client/task_runner.go b/client/task_runner.go index 9d45d91f7..c855abfd1 100644 --- a/client/task_runner.go +++ b/client/task_runner.go @@ -648,7 +648,7 @@ func (r *TaskRunner) validateTask() error { // Verify the artifact doesn't escape the task directory. if err := artifact.Validate(); err != nil { // If this error occurs there is potentially a server bug or - // mallicious, server spoofing. + // malicious, server spoofing. r.logger.Printf("[ERR] client: allocation %q, task %v, artifact %#v (%v) fails validation: %v", r.alloc.ID, r.task.Name, artifact, i, err) mErr.Errors = append(mErr.Errors, fmt.Errorf("artifact (%d) failed validation: %v", i, err))