Commit fe74d237 authored by Yoginth's avatar Yoginth

Fix Typos

parent b572ab40
...@@ -135,7 +135,7 @@ check-formatting: $(TARGET_SETUP) install-goimports ...@@ -135,7 +135,7 @@ check-formatting: $(TARGET_SETUP) install-goimports
@_support/validate-formatting.sh $(LOCAL_GO_FILES) @_support/validate-formatting.sh $(LOCAL_GO_FILES)
# Megacheck will tailor some responses given a minimum Go version, so pass that through the CLI # Megacheck will tailor some responses given a minimum Go version, so pass that through the CLI
# Additionally, megacheck will not return failure exit codes unless explicitely told to via the # Additionally, megacheck will not return failure exit codes unless explicitly told to via the
# `-simple.exit-non-zero` `-unused.exit-non-zero` and `-staticcheck.exit-non-zero` flags # `-simple.exit-non-zero` `-unused.exit-non-zero` and `-staticcheck.exit-non-zero` flags
.PHONY: staticcheck .PHONY: staticcheck
staticcheck: $(TARGET_SETUP) govendor-sync staticcheck: $(TARGET_SETUP) govendor-sync
......
...@@ -187,7 +187,7 @@ func (api *API) newRequest(r *http.Request, suffix string) (*http.Request, error ...@@ -187,7 +187,7 @@ func (api *API) newRequest(r *http.Request, suffix string) (*http.Request, error
authReq.Header.Del("Trailers") authReq.Header.Del("Trailers")
authReq.Header.Del("Upgrade") authReq.Header.Del("Upgrade")
// Also forward the Host header, which is excluded from the Header map by the http libary. // Also forward the Host header, which is excluded from the Header map by the http library.
// This allows the Host header received by the backend to be consistent with other // This allows the Host header received by the backend to be consistent with other
// requests not going through gitlab-workhorse. // requests not going through gitlab-workhorse.
authReq.Host = r.Host authReq.Host = r.Host
...@@ -296,7 +296,7 @@ func passResponseBack(httpResponse *http.Response, w http.ResponseWriter, r *htt ...@@ -296,7 +296,7 @@ func passResponseBack(httpResponse *http.Response, w http.ResponseWriter, r *htt
bytesTotal.Add(float64(responseBody.Len())) bytesTotal.Add(float64(responseBody.Len()))
for k, v := range httpResponse.Header { for k, v := range httpResponse.Header {
// Accomodate broken clients that do case-sensitive header lookup // Accommodate broken clients that do case-sensitive header lookup
if k == "Www-Authenticate" { if k == "Www-Authenticate" {
w.Header()["WWW-Authenticate"] = v w.Header()["WWW-Authenticate"] = v
} else { } else {
......
...@@ -17,7 +17,7 @@ import ( ...@@ -17,7 +17,7 @@ import (
// httpTransport defines a http.Transport with values // httpTransport defines a http.Transport with values
// that are more restrictive than for http.DefaultTransport, // that are more restrictive than for http.DefaultTransport,
// they define shorter TLS Handshake, and more agressive connection closing // they define shorter TLS Handshake, and more aggressive connection closing
// to prevent the connection hanging and reduce FD usage // to prevent the connection hanging and reduce FD usage
var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{ var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{
Proxy: http.ProxyFromEnvironment, Proxy: http.ProxyFromEnvironment,
......
package test package test
// Some usefull const for testing purpose // Some useful const for testing purpose
const ( const (
// ObjectContent an example textual content // ObjectContent an example textual content
ObjectContent = "TEST OBJECT CONTENT" ObjectContent = "TEST OBJECT CONTENT"
......
...@@ -37,7 +37,7 @@ var rangeHeaderKeys = []string{ ...@@ -37,7 +37,7 @@ var rangeHeaderKeys = []string{
// httpTransport defines a http.Transport with values // httpTransport defines a http.Transport with values
// that are more restrictive than for http.DefaultTransport, // that are more restrictive than for http.DefaultTransport,
// they define shorter TLS Handshake, and more agressive connection closing // they define shorter TLS Handshake, and more aggressive connection closing
// to prevent the connection hanging and reduce FD usage // to prevent the connection hanging and reduce FD usage
var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{ var httpTransport = tracing.NewRoundTripper(correlation.NewInstrumentedRoundTripper(&http.Transport{
Proxy: http.ProxyFromEnvironment, Proxy: http.ProxyFromEnvironment,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment