From fe74d237adb926e8042e45a720d4d4f8babd1498 Mon Sep 17 00:00:00 2001 From: Yoginth <me@yoginth.com> Date: Wed, 5 Jun 2019 11:11:17 +0000 Subject: [PATCH] Fix Typos --- Makefile | 2 +- internal/api/api.go | 4 ++-- internal/objectstore/object.go | 2 +- internal/objectstore/test/consts.go | 2 +- internal/sendurl/sendurl.go | 2 +- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/Makefile b/Makefile index 6e1c7b706ca36..35e77ecf594eb 100644 --- a/Makefile +++ b/Makefile @@ -135,7 +135,7 @@ check-formatting: $(TARGET_SETUP) install-goimports @_support/validate-formatting.sh $(LOCAL_GO_FILES) # Megacheck will tailor some responses given a minimum Go version, so pass that through the CLI -# Additionally, megacheck will not return failure exit codes unless explicitely told to via the +# Additionally, megacheck will not return failure exit codes unless explicitly told to via the # `-simple.exit-non-zero` `-unused.exit-non-zero` and `-staticcheck.exit-non-zero` flags .PHONY: staticcheck staticcheck: $(TARGET_SETUP) govendor-sync diff --git a/internal/api/api.go b/internal/api/api.go index 670f94032c464..e10d81f9c2e89 100644 --- a/internal/api/api.go +++ b/internal/api/api.go @@ -187,7 +187,7 @@ func (api *API) newRequest(r *http.Request, suffix string) (*http.Request, error authReq.Header.Del("Trailers") authReq.Header.Del("Upgrade") - // Also forward the Host header, which is excluded from the Header map by the http libary. + // Also forward the Host header, which is excluded from the Header map by the http library. // This allows the Host header received by the backend to be consistent with other // requests not going through gitlab-workhorse. authReq.Host = r.Host @@ -296,7 +296,7 @@ func passResponseBack(httpResponse *http.Response, w http.ResponseWriter, r *htt bytesTotal.Add(float64(responseBody.Len())) for k, v := range httpResponse.Header { - // Accomodate broken clients that do case-sensitive header lookup + // Accommodate broken clients that do case-sensitive header lookup if k == "Www-Authenticate" { w.Header()["WWW-Authenticate"] = v } else { diff --git a/internal/objectstore/object.go b/internal/objectstore/object.go index cfda297282356..84b5ecb3823bf 100644 --- a/internal/objectstore/object.go +++ b/internal/objectstore/object.go @@ -17,7 +17,7 @@ import ( // httpTransport defines a http.Transport with values // that are more restrictive than for http.DefaultTransport, -// they define shorter TLS Handshake, and more agressive connection closing +// they define shorter TLS Handshake, and more aggressive connection closing // to prevent the connection hanging and reduce FD usage var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{ Proxy: http.ProxyFromEnvironment, diff --git a/internal/objectstore/test/consts.go b/internal/objectstore/test/consts.go index abdba4d8fc8dc..7a1bcc28d4531 100644 --- a/internal/objectstore/test/consts.go +++ b/internal/objectstore/test/consts.go @@ -1,6 +1,6 @@ package test -// Some usefull const for testing purpose +// Some useful const for testing purpose const ( // ObjectContent an example textual content ObjectContent = "TEST OBJECT CONTENT" diff --git a/internal/sendurl/sendurl.go b/internal/sendurl/sendurl.go index 91956354f4101..388cdcc9a2b0f 100644 --- a/internal/sendurl/sendurl.go +++ b/internal/sendurl/sendurl.go @@ -37,7 +37,7 @@ var rangeHeaderKeys = []string{ // httpTransport defines a http.Transport with values // that are more restrictive than for http.DefaultTransport, -// they define shorter TLS Handshake, and more agressive connection closing +// they define shorter TLS Handshake, and more aggressive connection closing // to prevent the connection hanging and reduce FD usage var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{ Proxy: http.ProxyFromEnvironment, -- GitLab