diff --git a/Makefile b/Makefile
index 6e1c7b706ca363a5e19743774b5ac3b9b73284c2..35e77ecf594eb0dc9b3ab7d5bf6620195c3fa66b 100644
--- a/Makefile
+++ b/Makefile
@@ -135,7 +135,7 @@ check-formatting: $(TARGET_SETUP) install-goimports
 	@_support/validate-formatting.sh $(LOCAL_GO_FILES)
 
 # Megacheck will tailor some responses given a minimum Go version, so pass that through the CLI
-# Additionally, megacheck will not return failure exit codes unless explicitely told to via the
+# Additionally, megacheck will not return failure exit codes unless explicitly told to via the
 # `-simple.exit-non-zero` `-unused.exit-non-zero` and `-staticcheck.exit-non-zero` flags
 .PHONY: staticcheck
 staticcheck: $(TARGET_SETUP) govendor-sync
diff --git a/internal/api/api.go b/internal/api/api.go
index 670f94032c4646c8bdf925559fcbdaca0a215a4a..e10d81f9c2e890aa130d56a7221b1b3b2b30077c 100644
--- a/internal/api/api.go
+++ b/internal/api/api.go
@@ -187,7 +187,7 @@ func (api *API) newRequest(r *http.Request, suffix string) (*http.Request, error
 	authReq.Header.Del("Trailers")
 	authReq.Header.Del("Upgrade")
 
-	// Also forward the Host header, which is excluded from the Header map by the http libary.
+	// Also forward the Host header, which is excluded from the Header map by the http library.
 	// This allows the Host header received by the backend to be consistent with other
 	// requests not going through gitlab-workhorse.
 	authReq.Host = r.Host
@@ -296,7 +296,7 @@ func passResponseBack(httpResponse *http.Response, w http.ResponseWriter, r *htt
 	bytesTotal.Add(float64(responseBody.Len()))
 
 	for k, v := range httpResponse.Header {
-		// Accomodate broken clients that do case-sensitive header lookup
+		// Accommodate broken clients that do case-sensitive header lookup
 		if k == "Www-Authenticate" {
 			w.Header()["WWW-Authenticate"] = v
 		} else {
diff --git a/internal/objectstore/object.go b/internal/objectstore/object.go
index cfda297282356730281dc8a3180515247b6f1ab5..84b5ecb3823bfa37f96f872150c0f25fc2cfae10 100644
--- a/internal/objectstore/object.go
+++ b/internal/objectstore/object.go
@@ -17,7 +17,7 @@ import (
 
 // httpTransport defines a http.Transport with values
 // that are more restrictive than for http.DefaultTransport,
-// they define shorter TLS Handshake, and more agressive connection closing
+// they define shorter TLS Handshake, and more aggressive connection closing
 // to prevent the connection hanging and reduce FD usage
 var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{
 	Proxy: http.ProxyFromEnvironment,
diff --git a/internal/objectstore/test/consts.go b/internal/objectstore/test/consts.go
index abdba4d8fc8dc72957bb34571dfe0857b1057ca6..7a1bcc28d45317f6ac6573a70e96bfce329e33e2 100644
--- a/internal/objectstore/test/consts.go
+++ b/internal/objectstore/test/consts.go
@@ -1,6 +1,6 @@
 package test
 
-// Some usefull const for testing purpose
+// Some useful const for testing purpose
 const (
 	// ObjectContent an example textual content
 	ObjectContent = "TEST OBJECT CONTENT"
diff --git a/internal/sendurl/sendurl.go b/internal/sendurl/sendurl.go
index 91956354f410168e81163c7dcd7ae157897847a2..388cdcc9a2b0f0751f8491bf944c6ad28c15485d 100644
--- a/internal/sendurl/sendurl.go
+++ b/internal/sendurl/sendurl.go
@@ -37,7 +37,7 @@ var rangeHeaderKeys = []string{
 
 // httpTransport defines a http.Transport with values
 // that are more restrictive than for http.DefaultTransport,
-// they define shorter TLS Handshake, and more agressive connection closing
+// they define shorter TLS Handshake, and more aggressive connection closing
 // to prevent the connection hanging and reduce FD usage
 var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{
 	Proxy: http.ProxyFromEnvironment,