diff --git a/aws/signer/v4/functional_test.go b/aws/signer/v4/functional_test.go index d0643aeb..a7d4f738 100644 --- a/aws/signer/v4/functional_test.go +++ b/aws/signer/v4/functional_test.go @@ -87,13 +87,13 @@ func TestStandaloneSign(t *testing.T) { actual := req.Header.Get("Authorization") if e, a := c.ExpSig, actual; e != a { - t.Errorf("expected %v, but recieved %v", e, a) + t.Errorf("expected %v, but received %v", e, a) } if e, a := c.OrigURI, req.URL.Path; e != a { - t.Errorf("expected %v, but recieved %v", e, a) + t.Errorf("expected %v, but received %v", e, a) } if e, a := c.EscapedURI, req.URL.EscapedPath(); e != a { - t.Errorf("expected %v, but recieved %v", e, a) + t.Errorf("expected %v, but received %v", e, a) } } } @@ -127,13 +127,13 @@ func TestStandaloneSign_RawPath(t *testing.T) { actual := req.Header.Get("Authorization") if e, a := c.ExpSig, actual; e != a { - t.Errorf("expected %v, but recieved %v", e, a) + t.Errorf("expected %v, but received %v", e, a) } if e, a := c.OrigURI, req.URL.Path; e != a { - t.Errorf("expected %v, but recieved %v", e, a) + t.Errorf("expected %v, but received %v", e, a) } if e, a := c.EscapedURI, req.URL.EscapedPath(); e != a { - t.Errorf("expected %v, but recieved %v", e, a) + t.Errorf("expected %v, but received %v", e, a) } } } diff --git a/backend/mkdir.go b/backend/mkdir.go index 418e1118..18afeb07 100644 --- a/backend/mkdir.go +++ b/backend/mkdir.go @@ -30,7 +30,7 @@ var ( // Any newly created directory is set to provided uid/gid ownership. // If path is already a directory, MkdirAll does nothing // and returns nil. -// Any directoy created will be set to provided uid/gid ownership +// Any directory created will be set to provided uid/gid ownership // if doChown is true. func MkdirAll(path string, uid, gid int, doChown bool) error { // Fast path: if we can tell whether path is a directory or file, stop with success or error. diff --git a/backend/posix/posix.go b/backend/posix/posix.go index 42c1dae8..6e1f4f0a 100644 --- a/backend/posix/posix.go +++ b/backend/posix/posix.go @@ -2524,7 +2524,7 @@ func (p *Posix) PutObjectRetention(_ context.Context, bucket, object, versionId } switch lockCfg.Mode { - // Compliance mode can't be overriden + // Compliance mode can't be overridden case types.ObjectLockRetentionModeCompliance: return s3err.GetAPIError(s3err.ErrMethodNotAllowed) // To override governance mode user should have "s3:BypassGovernanceRetention" permission