Skip to content

Commit c0ae632

Browse files
committed
Fix typo
1 parent 670ec96 commit c0ae632

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

beacon_node/lighthouse_network/src/rpc/handler.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ where
140140
/// Logger for handling RPC streams
141141
log: slog::Logger,
142142

143-
/// Timeout that will me used for inbound and outbound responses.
143+
/// Timeout that will be used for inbound and outbound responses.
144144
resp_timeout: Duration,
145145

146146
/// Rate limiter for our responses and the PeerId that this handler interacts with.

beacon_node/lighthouse_network/src/rpc/self_limiter.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ struct QueuedRequest<Id: ReqId, E: EthSpec> {
2525
}
2626

2727
pub(crate) struct SelfRateLimiter<Id: ReqId, E: EthSpec> {
28-
/// Requests queued for sending per peer. This requests are stored when the self rate
28+
/// Requests queued for sending per peer. These requests are stored when the self rate
2929
/// limiter rejects them. Rate limiting is based on a Peer and Protocol basis, therefore
3030
/// are stored in the same way.
3131
delayed_requests: HashMap<(PeerId, Protocol), VecDeque<QueuedRequest<Id, E>>>,
@@ -49,7 +49,7 @@ pub enum Error {
4949
}
5050

5151
impl<Id: ReqId, E: EthSpec> SelfRateLimiter<Id, E> {
52-
/// Creates a new [`SelfRateLimiter`] based on configration values.
52+
/// Creates a new [`SelfRateLimiter`] based on configuration values.
5353
pub fn new(config: OutboundRateLimiterConfig, log: Logger) -> Result<Self, &'static str> {
5454
debug!(log, "Using self rate limiting params"; "config" => ?config);
5555
let limiter = RateLimiter::new_with_config(config.0)?;
@@ -162,7 +162,7 @@ impl<Id: ReqId, E: EthSpec> SelfRateLimiter<Id, E> {
162162

163163
pub fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll<BehaviourAction<Id, E>> {
164164
// First check the requests that were self rate limited, since those might add events to
165-
// the queue. Also do this this before rate limiter prunning to avoid removing and
165+
// the queue. Also do this before rate limiter pruning to avoid removing and
166166
// immediately adding rate limiting keys.
167167
if let Poll::Ready(Some(Ok(expired))) = self.next_peer_request.poll_expired(cx) {
168168
let (peer_id, protocol) = expired.into_inner();

0 commit comments

Comments
 (0)