run misspell in gometalinter

This commit is contained in:
Marten Seemann 2018-02-21 15:48:01 +08:00
parent b6c41464c6
commit 11af98e338
21 changed files with 23 additions and 22 deletions

View file

@ -8,6 +8,7 @@
"Enable": [ "Enable": [
"deadcode", "deadcode",
"ineffassign", "ineffassign",
"misspell",
"varcheck", "varcheck",
"vet" "vet"
], ],

View file

@ -215,7 +215,7 @@ func (c *client) RoundTrip(req *http.Request) (*http.Response, error) {
return nil, err return nil, err
} }
case <-c.headerErrored: case <-c.headerErrored:
// an error occured on the header stream // an error occurred on the header stream
_ = c.CloseWithError(c.headerErr) _ = c.CloseWithError(c.headerErr)
return nil, c.headerErr return nil, c.headerErr
} }

View file

@ -510,7 +510,7 @@ var _ = Describe("SentPacketHandler", func() {
}) })
}) })
Context("determinining, which ACKs we have received an ACK for", func() { Context("determining which ACKs we have received an ACK for", func() {
BeforeEach(func() { BeforeEach(func() {
morePackets := []*Packet{ morePackets := []*Packet{
&Packet{PacketNumber: 13, Frames: []wire.Frame{&wire.AckFrame{LowestAcked: 80, LargestAcked: 100}, &streamFrame}, Length: 1}, &Packet{PacketNumber: 13, Frames: []wire.Frame{&wire.AckFrame{LowestAcked: 80, LargestAcked: 100}, &streamFrame}, Length: 1},

View file

@ -438,7 +438,7 @@ var _ = Describe("Client Crypto Setup", func() {
Expect(cs.forwardSecureAEAD).ToNot(BeNil()) Expect(cs.forwardSecureAEAD).ToNot(BeNil())
}) })
It("reads the connection paramaters", func() { It("reads the connection parameters", func() {
shloMap[TagICSL] = []byte{13, 0, 0, 0} // 13 seconds shloMap[TagICSL] = []byte{13, 0, 0, 0} // 13 seconds
params, err := cs.handleSHLOMessage(shloMap) params, err := cs.handleSHLOMessage(shloMap)
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())

View file

@ -151,7 +151,7 @@ var _ = Describe("TLS Extension Handler, for the server", func() {
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())
}) })
It("errros when a version negotiation was performed, although we already support the inital version", func() { It("erros when a version negotiation was performed, although we already support the initial version", func() {
handler.supportedVersions = []protocol.VersionNumber{11, 12, 13} handler.supportedVersions = []protocol.VersionNumber{11, 12, 13}
handler.version = 13 handler.version = 13
body, err := syntax.Marshal(clientHelloTransportParameters{ body, err := syntax.Marshal(clientHelloTransportParameters{

View file

@ -242,7 +242,7 @@ var _ = Describe("Transport Parameters", func() {
Expect(values).To(HaveKeyWithValue(maxPacketSizeParameterID, []byte{0x5, 0xac})) // 1452 = 0x5ac Expect(values).To(HaveKeyWithValue(maxPacketSizeParameterID, []byte{0x5, 0xac})) // 1452 = 0x5ac
}) })
It("request ommision of the connection ID", func() { It("request ommission of the connection ID", func() {
params.OmitConnectionID = true params.OmitConnectionID = true
values := paramsListToMap(params.getTransportParameters()) values := paramsListToMap(params.getTransportParameters())
Expect(values).To(HaveKeyWithValue(omitConnectionIDParameterID, []byte{})) Expect(values).To(HaveKeyWithValue(omitConnectionIDParameterID, []byte{}))

View file

@ -77,11 +77,11 @@ const DefaultTCPMSS ByteCount = 1460
// MinClientHelloSize is the minimum size the server expects an inchoate CHLO to have (in gQUIC) // MinClientHelloSize is the minimum size the server expects an inchoate CHLO to have (in gQUIC)
const MinClientHelloSize = 1024 const MinClientHelloSize = 1024
// MinInitialPacketSize is the minimum size an Initial packet (in IETF QUIC) is requried to have. // MinInitialPacketSize is the minimum size an Initial packet (in IETF QUIC) is required to have.
const MinInitialPacketSize = 1200 const MinInitialPacketSize = 1200
// MaxClientHellos is the maximum number of times we'll send a client hello // MaxClientHellos is the maximum number of times we'll send a client hello
// The value 3 accounts for: // The value 3 accounts for:
// * one failure due to an incorrect or missing source-address token // * one failure due to an incorrect or missing source-address token
// * one failure due the server's certificate chain being unavailible and the server being unwilling to send it without a valid source-address token // * one failure due the server's certificate chain being unavailable and the server being unwilling to send it without a valid source-address token
const MaxClientHellos = 3 const MaxClientHellos = 3

View file

@ -48,7 +48,7 @@ func ParseConnectionCloseFrame(r *bytes.Reader, version protocol.VersionNumber)
reasonPhraseLen = uint64(length) reasonPhraseLen = uint64(length)
} }
// shortcut to prevent the unneccessary allocation of dataLen bytes // shortcut to prevent the unnecessary allocation of dataLen bytes
// if the dataLen is larger than the remaining length of the packet // if the dataLen is larger than the remaining length of the packet
// reading the whole reason phrase would result in EOF when attempting to READ // reading the whole reason phrase would result in EOF when attempting to READ
if int(reasonPhraseLen) > r.Len() { if int(reasonPhraseLen) > r.Len() {

View file

@ -15,7 +15,7 @@ import (
var _ = Describe("Header", func() { var _ = Describe("Header", func() {
const ( const (
versionPublicHeader = protocol.Version39 // a QUIC version that uses the Public Header format versionPublicHeader = protocol.Version39 // a QUIC version that uses the Public Header format
versionIETFHeader = protocol.VersionTLS // a QUIC version taht uses the IETF Header format versionIETFHeader = protocol.VersionTLS // a QUIC version that uses the IETF Header format
) )
Context("parsing", func() { Context("parsing", func() {

View file

@ -40,7 +40,7 @@ var _ = Describe("IETF draft Header", func() {
Expect(err).To(MatchError(qerr.InvalidVersionNegotiationPacket)) Expect(err).To(MatchError(qerr.InvalidVersionNegotiationPacket))
}) })
It("errors if the version list is emtpy", func() { It("errors if the version list is empty", func() {
versions := []protocol.VersionNumber{0x22334455} versions := []protocol.VersionNumber{0x22334455}
data := ComposeVersionNegotiation(0x1234567890, versions) data := ComposeVersionNegotiation(0x1234567890, versions)
// remove 8 bytes (two versions), since ComposeVersionNegotiation also added a reserved version number // remove 8 bytes (two versions), since ComposeVersionNegotiation also added a reserved version number
@ -144,7 +144,7 @@ var _ = Describe("IETF draft Header", func() {
Expect(b.Len()).To(BeZero()) Expect(b.Len()).To(BeZero())
}) })
It("reads a header with ommited connection ID", func() { It("reads a header with omitted connection ID", func() {
data := []byte{ data := []byte{
0x1, 0x1,
0x21, // packet number 0x21, // packet number

View file

@ -148,7 +148,7 @@ func parsePublicHeader(b *bytes.Reader, packetSentBy protocol.Perspective) (*Hea
// Version (optional) // Version (optional)
if !header.ResetFlag && header.VersionFlag { if !header.ResetFlag && header.VersionFlag {
if packetSentBy == protocol.PerspectiveServer { // parse the version negotiaton packet if packetSentBy == protocol.PerspectiveServer { // parse the version negotiation packet
if b.Len() == 0 { if b.Len() == 0 {
return nil, qerr.Error(qerr.InvalidVersionNegotiationPacket, "empty version list") return nil, qerr.Error(qerr.InvalidVersionNegotiationPacket, "empty version list")
} }

View file

@ -56,7 +56,7 @@ func ParseStreamFrame(r *bytes.Reader, version protocol.VersionNumber) (*StreamF
if err != nil { if err != nil {
return nil, err return nil, err
} }
// shortcut to prevent the unneccessary allocation of dataLen bytes // shortcut to prevent the unnecessary allocation of dataLen bytes
// if the dataLen is larger than the remaining length of the packet // if the dataLen is larger than the remaining length of the packet
// reading the packet contents would result in EOF when attempting to READ // reading the packet contents would result in EOF when attempting to READ
if dataLen > uint64(r.Len()) { if dataLen > uint64(r.Len()) {

View file

@ -52,7 +52,7 @@ func parseLegacyStreamFrame(r *bytes.Reader, _ protocol.VersionNumber) (*StreamF
} }
} }
// shortcut to prevent the unneccessary allocation of dataLen bytes // shortcut to prevent the unnecessary allocation of dataLen bytes
// if the dataLen is larger than the remaining length of the packet // if the dataLen is larger than the remaining length of the packet
// reading the packet contents would result in EOF when attempting to READ // reading the packet contents would result in EOF when attempting to READ
if int(dataLen) > r.Len() { if int(dataLen) > r.Len() {

View file

@ -118,7 +118,7 @@ var _ = Describe("Packet packer", func() {
Context("generating a packet header", func() { Context("generating a packet header", func() {
const ( const (
versionPublicHeader = protocol.Version39 // a QUIC version that uses the Public Header format versionPublicHeader = protocol.Version39 // a QUIC version that uses the Public Header format
versionIETFHeader = protocol.VersionTLS // a QUIC version taht uses the IETF Header format versionIETFHeader = protocol.VersionTLS // a QUIC version that uses the IETF Header format
) )
Context("Public Header (for gQUIC)", func() { Context("Public Header (for gQUIC)", func() {

View file

@ -373,7 +373,7 @@ var _ = Describe("Server", func() {
data = append(append(data, b.Bytes()...), 0x01) data = append(append(data, b.Bytes()...), 0x01)
err = serv.handlePacket(nil, nil, data) err = serv.handlePacket(nil, nil, data)
Expect(err).ToNot(HaveOccurred()) Expect(err).ToNot(HaveOccurred())
// if we didn't ignore the packet, the server would try to send a version negotation packet, which would make the test panic because it doesn't have a udpConn // if we didn't ignore the packet, the server would try to send a version negotiation packet, which would make the test panic because it doesn't have a udpConn
Expect(conn.dataWritten.Bytes()).To(BeEmpty()) Expect(conn.dataWritten.Bytes()).To(BeEmpty())
// make sure the packet was *not* passed to session.handlePacket() // make sure the packet was *not* passed to session.handlePacket()
Expect(serv.sessions[connID].(*mockSession).packetCount).To(Equal(1)) Expect(serv.sessions[connID].(*mockSession).packetCount).To(Equal(1))

View file

@ -84,7 +84,7 @@ func (s *serverTLS) HandleInitial(remoteAddr net.Addr, hdr *wire.Header, data []
utils.Debugf("Received a Packet. Handling it statelessly.") utils.Debugf("Received a Packet. Handling it statelessly.")
sess, err := s.handleInitialImpl(remoteAddr, hdr, data) sess, err := s.handleInitialImpl(remoteAddr, hdr, data)
if err != nil { if err != nil {
utils.Errorf("Error occured handling initial packet: %s", err) utils.Errorf("Error occurred handling initial packet: %s", err)
return return
} }
if sess == nil { // a stateless reset was done if sess == nil { // a stateless reset was done

View file

@ -189,7 +189,7 @@ var newClientSession = func(
tlsConf *tls.Config, tlsConf *tls.Config,
config *Config, config *Config,
initialVersion protocol.VersionNumber, initialVersion protocol.VersionNumber,
negotiatedVersions []protocol.VersionNumber, // needed for validation of the GQUIC version negotiaton negotiatedVersions []protocol.VersionNumber, // needed for validation of the GQUIC version negotiation
) (packetHandler, error) { ) (packetHandler, error) {
paramsChan := make(chan handshake.TransportParameters) paramsChan := make(chan handshake.TransportParameters)
handshakeEvent := make(chan struct{}, 1) handshakeEvent := make(chan struct{}, 1)

View file

@ -1268,7 +1268,7 @@ var _ = Describe("Session", func() {
Eventually(sess.Context().Done()).Should(BeClosed()) Eventually(sess.Context().Done()).Should(BeClosed())
}) })
It("doesn't send a Public Reset if decrypting them suceeded during the timeout", func() { It("doesn't send a Public Reset if decrypting them succeeded during the timeout", func() {
go func() { go func() {
defer GinkgoRecover() defer GinkgoRecover()
sess.run() sess.run()

View file

@ -249,7 +249,7 @@ var _ = Describe("Stream Framer", func() {
framer.PopStreamFrames(protocol.MinStreamFrameSize) framer.PopStreamFrames(protocol.MinStreamFrameSize)
}) })
It("does not pop frames smaller than the mimimum size", func() { It("does not pop frames smaller than the minimum size", func() {
// don't expect a call to PopStreamFrame() // don't expect a call to PopStreamFrame()
framer.PopStreamFrames(protocol.MinStreamFrameSize - 1) framer.PopStreamFrames(protocol.MinStreamFrameSize - 1)
}) })

View file

@ -48,7 +48,7 @@ func newStreamsMap(
var firstOutgoingBidiStream, firstOutgoingUniStream, firstIncomingBidiStream, firstIncomingUniStream protocol.StreamID var firstOutgoingBidiStream, firstOutgoingUniStream, firstIncomingBidiStream, firstIncomingUniStream protocol.StreamID
if perspective == protocol.PerspectiveServer { if perspective == protocol.PerspectiveServer {
firstOutgoingBidiStream = 1 firstOutgoingBidiStream = 1
firstIncomingBidiStream = 4 // the crypto stream is handled separatedly firstIncomingBidiStream = 4 // the crypto stream is handled separately
firstOutgoingUniStream = 3 firstOutgoingUniStream = 3
firstIncomingUniStream = 2 firstIncomingUniStream = 2
} else { } else {

View file

@ -116,7 +116,7 @@ var _ = Describe("Streams Map (for gQUIC)", func() {
Expect(err).To(MatchError(qerr.TooManyOpenStreams)) Expect(err).To(MatchError(qerr.TooManyOpenStreams))
}) })
It("errors when too many streams are opened implicitely", func() { It("errors when too many streams are opened implicitly", func() {
_, err := m.getOrOpenStream(protocol.StreamID(m.maxIncomingStreams*2 + 3)) _, err := m.getOrOpenStream(protocol.StreamID(m.maxIncomingStreams*2 + 3))
Expect(err).To(MatchError(qerr.TooManyOpenStreams)) Expect(err).To(MatchError(qerr.TooManyOpenStreams))
}) })