diff --git a/cardinal/router/router.go b/cardinal/router/router.go index 2418a1d5c..b6600ebcb 100644 --- a/cardinal/router/router.go +++ b/cardinal/router/router.go @@ -89,7 +89,7 @@ func New(namespace, sequencerAddr, routerKey string, world Provider, opts ...Opt grpc.WithPerRPCCredentials(credentials.NewTokenCredential(routerKey)), ) if err != nil { - return nil, eris.Wrapf(err, "error dialing shard seqeuncer address at %q", sequencerAddr) + return nil, eris.Wrapf(err, "error dialing shard sequencer address at %q", sequencerAddr) } rtr.ShardSequencer = shard.NewTransactionHandlerClient(conn) diff --git a/cardinal/world.go b/cardinal/world.go index 09e61de17..dfc37c087 100644 --- a/cardinal/world.go +++ b/cardinal/world.go @@ -354,7 +354,7 @@ func (w *World) StartGame() error { return w.server.Serve(ctx) }) if err := g.Wait(); err != nil { - return eris.Wrap(err, "error occured while running cardinal") + return eris.Wrap(err, "error occurred while running cardinal") } return nil diff --git a/cardinal/world_fixture.go b/cardinal/world_fixture.go index 18deb62e7..e08b49dd0 100644 --- a/cardinal/world_fixture.go +++ b/cardinal/world_fixture.go @@ -245,7 +245,7 @@ func findOpenPort() (string, error) { return "", eris.Wrap(err, "failed to initialize listener") } - // Get the autoamtically assigned port number from the listener + // Get the automatically assigned port number from the listener tcpAddr, err := net.ResolveTCPAddr(l.Addr().Network(), l.Addr().String()) if err != nil { return "", eris.Wrap(err, "failed to resolve address") diff --git a/relay/nakama/auth/custom.go b/relay/nakama/auth/custom.go index fe8e91bc2..199856388 100644 --- a/relay/nakama/auth/custom.go +++ b/relay/nakama/auth/custom.go @@ -40,7 +40,7 @@ func checkJWTSecret(logger runtime.Logger) { // during initialization if the JWT secret isn't set, we'll log a warning message and return a // ErrBadCustomAuthType if a client tries to use Argus ID custom authentication. // -// When Supabase rolls out asymmetric JWTs, the JWT secret can be shared because it is essentialy a +// When Supabase rolls out asymmetric JWTs, the JWT secret can be shared because it is essentially a // public key. If the JWT_SECRET variable isn't set, we can consider fetching a valid public key // and set it as the value of JWT_SECRET. This way, Argus ID authentication will always be enabled // (assuming the fetch didn't fail), and we don't have to return an error. diff --git a/relay/nakama/siwe/siwe.go b/relay/nakama/siwe/siwe.go index 626b7aff4..513e378b4 100644 --- a/relay/nakama/siwe/siwe.go +++ b/relay/nakama/siwe/siwe.go @@ -250,7 +250,7 @@ func getNonceStorageObject( } else if len(objs) == 0 { // No existing storage object was found, so return a storage object with no nonces and no version return &nonceStorageObj{ - // When this is later saved back to the DB, it will only be successful it the stoage object + // When this is later saved back to the DB, it will only be successful it the storage object // doesn't already exist in the DB. Version: "*", }, nil diff --git a/relay/nakama/testutils/testutils.go b/relay/nakama/testutils/testutils.go index 35e6638c6..b2f150327 100644 --- a/relay/nakama/testutils/testutils.go +++ b/relay/nakama/testutils/testutils.go @@ -155,7 +155,7 @@ func MockMatchWriteKey(key string) interface{} { // // This Fake implements the atomic guarantees of StorageRead and StorageWrite. // In addition, Version field is populated during StorageRead which allows for compare-and-swap writes. -type FakeNakamaModule struct { //nolint:decorder +type FakeNakamaModule struct { //nolint:decoder runtime.NakamaModule sync.Mutex versionItr int