diff --git a/Makefile b/Makefile index 6e1c7b706ca363a5e19743774b5ac3b9b73284c2..35e77ecf594eb0dc9b3ab7d5bf6620195c3fa66b 100644 --- a/Makefile +++ b/Makefile @@ -135,7 +135,7 @@ check-formatting: $(TARGET_SETUP) install-goimports @_support/validate-formatting.sh $(LOCAL_GO_FILES) # Megacheck will tailor some responses given a minimum Go version, so pass that through the CLI -# Additionally, megacheck will not return failure exit codes unless explicitely told to via the +# Additionally, megacheck will not return failure exit codes unless explicitly told to via the # `-simple.exit-non-zero` `-unused.exit-non-zero` and `-staticcheck.exit-non-zero` flags .PHONY: staticcheck staticcheck: $(TARGET_SETUP) govendor-sync diff --git a/internal/api/api.go b/internal/api/api.go index 670f94032c4646c8bdf925559fcbdaca0a215a4a..e10d81f9c2e890aa130d56a7221b1b3b2b30077c 100644 --- a/internal/api/api.go +++ b/internal/api/api.go @@ -187,7 +187,7 @@ func (api *API) newRequest(r *http.Request, suffix string) (*http.Request, error authReq.Header.Del("Trailers") authReq.Header.Del("Upgrade") - // Also forward the Host header, which is excluded from the Header map by the http libary. + // Also forward the Host header, which is excluded from the Header map by the http library. // This allows the Host header received by the backend to be consistent with other // requests not going through gitlab-workhorse. authReq.Host = r.Host @@ -296,7 +296,7 @@ func passResponseBack(httpResponse *http.Response, w http.ResponseWriter, r *htt bytesTotal.Add(float64(responseBody.Len())) for k, v := range httpResponse.Header { - // Accomodate broken clients that do case-sensitive header lookup + // Accommodate broken clients that do case-sensitive header lookup if k == "Www-Authenticate" { w.Header()["WWW-Authenticate"] = v } else { diff --git a/internal/objectstore/object.go b/internal/objectstore/object.go index cfda297282356730281dc8a3180515247b6f1ab5..84b5ecb3823bfa37f96f872150c0f25fc2cfae10 100644 --- a/internal/objectstore/object.go +++ b/internal/objectstore/object.go @@ -17,7 +17,7 @@ import ( // httpTransport defines a http.Transport with values // that are more restrictive than for http.DefaultTransport, -// they define shorter TLS Handshake, and more agressive connection closing +// they define shorter TLS Handshake, and more aggressive connection closing // to prevent the connection hanging and reduce FD usage var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{ Proxy: http.ProxyFromEnvironment, diff --git a/internal/objectstore/test/consts.go b/internal/objectstore/test/consts.go index abdba4d8fc8dc72957bb34571dfe0857b1057ca6..7a1bcc28d45317f6ac6573a70e96bfce329e33e2 100644 --- a/internal/objectstore/test/consts.go +++ b/internal/objectstore/test/consts.go @@ -1,6 +1,6 @@ package test -// Some usefull const for testing purpose +// Some useful const for testing purpose const ( // ObjectContent an example textual content ObjectContent = "TEST OBJECT CONTENT" diff --git a/internal/sendurl/sendurl.go b/internal/sendurl/sendurl.go index 91956354f410168e81163c7dcd7ae157897847a2..388cdcc9a2b0f0751f8491bf944c6ad28c15485d 100644 --- a/internal/sendurl/sendurl.go +++ b/internal/sendurl/sendurl.go @@ -37,7 +37,7 @@ var rangeHeaderKeys = []string{ // httpTransport defines a http.Transport with values // that are more restrictive than for http.DefaultTransport, -// they define shorter TLS Handshake, and more agressive connection closing +// they define shorter TLS Handshake, and more aggressive connection closing // to prevent the connection hanging and reduce FD usage var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{ Proxy: http.ProxyFromEnvironment,