Skip to content

Commit 28c0f6a

Browse files
fakefraudsukunrt
andauthored
chore(p2p/host): fix typos (#2683)
* readme * scope * natmgr * svc --------- Co-authored-by: Sukun <[email protected]>
1 parent d76a43f commit 28c0f6a

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

p2p/host/resource-manager/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ belong to some service in the system. Hence, this suggests that apart
161161
from global limits, we can constrain stream usage at finer
162162
granularity, at the protocol and service level.
163163

164-
Once again, we disinguish between inbound and outbound streams.
164+
Once again, we distinguish between inbound and outbound streams.
165165
Inbound streams are initiated by remote peers and consume resources in
166166
response to network events; controlling inbound stream usage is again
167167
paramount for protecting the system from overload or attack.

p2p/host/resource-manager/scope_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ func TestCheckMemory(t *testing.T) {
7474
limit = 1024
7575
}
7676
currentMem = (currentMem % limit) // We can't have reserved more than our limit
77-
res = (res >> 14) // We won't resonably ever have a reservation > 2^50
77+
res = (res >> 14) // We won't reasonably ever have a reservation > 2^50
7878
rc := resources{limit: &BaseLimit{
7979
Memory: int64(limit),
8080
StreamsInbound: 1,
@@ -88,7 +88,7 @@ func TestCheckMemory(t *testing.T) {
8888
rc.memory = int64(currentMem)
8989

9090
priShift = (priShift % 9)
91-
// Check different priorties at 2^0, 2^1,...2^8. This lets our math be correct in the check below (and avoid overflows).
91+
// Check different priorities at 2^0, 2^1,...2^8. This lets our math be correct in the check below (and avoid overflows).
9292
pri := uint8((1 << priShift) - 1)
9393

9494
err := rc.checkMemory(int64(res), pri)

0 commit comments

Comments
 (0)