From fe74d237adb926e8042e45a720d4d4f8babd1498 Mon Sep 17 00:00:00 2001
From: Yoginth <me@yoginth.com>
Date: Wed, 5 Jun 2019 11:11:17 +0000
Subject: [PATCH] Fix Typos

---
 Makefile                            | 2 +-
 internal/api/api.go                 | 4 ++--
 internal/objectstore/object.go      | 2 +-
 internal/objectstore/test/consts.go | 2 +-
 internal/sendurl/sendurl.go         | 2 +-
 5 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/Makefile b/Makefile
index 6e1c7b706ca36..35e77ecf594eb 100644
--- a/Makefile
+++ b/Makefile
@@ -135,7 +135,7 @@ check-formatting: $(TARGET_SETUP) install-goimports
 	@_support/validate-formatting.sh $(LOCAL_GO_FILES)
 
 # Megacheck will tailor some responses given a minimum Go version, so pass that through the CLI
-# Additionally, megacheck will not return failure exit codes unless explicitely told to via the
+# Additionally, megacheck will not return failure exit codes unless explicitly told to via the
 # `-simple.exit-non-zero` `-unused.exit-non-zero` and `-staticcheck.exit-non-zero` flags
 .PHONY: staticcheck
 staticcheck: $(TARGET_SETUP) govendor-sync
diff --git a/internal/api/api.go b/internal/api/api.go
index 670f94032c464..e10d81f9c2e89 100644
--- a/internal/api/api.go
+++ b/internal/api/api.go
@@ -187,7 +187,7 @@ func (api *API) newRequest(r *http.Request, suffix string) (*http.Request, error
 	authReq.Header.Del("Trailers")
 	authReq.Header.Del("Upgrade")
 
-	// Also forward the Host header, which is excluded from the Header map by the http libary.
+	// Also forward the Host header, which is excluded from the Header map by the http library.
 	// This allows the Host header received by the backend to be consistent with other
 	// requests not going through gitlab-workhorse.
 	authReq.Host = r.Host
@@ -296,7 +296,7 @@ func passResponseBack(httpResponse *http.Response, w http.ResponseWriter, r *htt
 	bytesTotal.Add(float64(responseBody.Len()))
 
 	for k, v := range httpResponse.Header {
-		// Accomodate broken clients that do case-sensitive header lookup
+		// Accommodate broken clients that do case-sensitive header lookup
 		if k == "Www-Authenticate" {
 			w.Header()["WWW-Authenticate"] = v
 		} else {
diff --git a/internal/objectstore/object.go b/internal/objectstore/object.go
index cfda297282356..84b5ecb3823bf 100644
--- a/internal/objectstore/object.go
+++ b/internal/objectstore/object.go
@@ -17,7 +17,7 @@ import (
 
 // httpTransport defines a http.Transport with values
 // that are more restrictive than for http.DefaultTransport,
-// they define shorter TLS Handshake, and more agressive connection closing
+// they define shorter TLS Handshake, and more aggressive connection closing
 // to prevent the connection hanging and reduce FD usage
 var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{
 	Proxy: http.ProxyFromEnvironment,
diff --git a/internal/objectstore/test/consts.go b/internal/objectstore/test/consts.go
index abdba4d8fc8dc..7a1bcc28d4531 100644
--- a/internal/objectstore/test/consts.go
+++ b/internal/objectstore/test/consts.go
@@ -1,6 +1,6 @@
 package test
 
-// Some usefull const for testing purpose
+// Some useful const for testing purpose
 const (
 	// ObjectContent an example textual content
 	ObjectContent = "TEST OBJECT CONTENT"
diff --git a/internal/sendurl/sendurl.go b/internal/sendurl/sendurl.go
index 91956354f4101..388cdcc9a2b0f 100644
--- a/internal/sendurl/sendurl.go
+++ b/internal/sendurl/sendurl.go
@@ -37,7 +37,7 @@ var rangeHeaderKeys = []string{
 
 // httpTransport defines a http.Transport with values
 // that are more restrictive than for http.DefaultTransport,
-// they define shorter TLS Handshake, and more agressive connection closing
+// they define shorter TLS Handshake, and more aggressive connection closing
 // to prevent the connection hanging and reduce FD usage
 var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{
 	Proxy: http.ProxyFromEnvironment,
-- 
GitLab