static inline const char* get_v4_exp_payload_hash(const req_info& info)
{
- /* In AWSv4 the hash of real, transfered payload IS NOT necessary to form
+ /* In AWSv4 the hash of real, transferred payload IS NOT necessary to form
* a Canonical Request, and thus verify a Signature. x-amz-content-sha256
* header lets get the information very early -- before seeing first byte
* of HTTP body. As a consequence, we can decouple Signature verification
if (iter.end()) {
// allow successful reads with empty buffers. ReadSyncStatus coroutines
// depend on this to be able to read without locking, because the
- // cls lock from InitSyncStatus will create an empty object if it didnt
+ // cls lock from InitSyncStatus will create an empty object if it didn't
// exist
*result = T();
} else {
RGWQuotaInfo bucket_quota;
RGWQuotaInfo user_quota;
- /* constract the map */
+ /* construct the map */
int read(CephContext *cct, RGWRados *store);
void encode(bufferlist& bl) const;
url_encode(string(buf) + get_zone_params().get_name(), trans_id_suffix);
}
- /* In order to preserve compability with Swift API, transaction ID
+ /* In order to preserve compatibility with Swift API, transaction ID
* should contain at least 32 characters satisfying following spec:
* - first 21 chars must be in range [0-9a-f]. Swift uses this
* space for storing fragment of UUID obtained through a call to
* is required to ensure that they stop issuing requests on the old
* RGWRados instance, and restart with the updated configuration.
*
- * This abstraction avoids a depency on class RGWFrontend.
+ * This abstraction avoids a dependency on class RGWFrontend.
*/
class Pauser {
public: