From 297cd00321b29b0faea1e8ebee06889f6a316aff Mon Sep 17 00:00:00 2001 From: Marco Munizaga Date: Mon, 13 Jun 2022 16:39:00 -0700 Subject: [PATCH] Fix comment --- rcmgr.go | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/rcmgr.go b/rcmgr.go index c262a8d..2315d8b 100644 --- a/rcmgr.go +++ b/rcmgr.go @@ -571,7 +571,6 @@ func (s *connectionScope) transferAllowedToStandard() (err error) { } func (s *connectionScope) SetPeer(p peer.ID) error { - // TODO check if this connectionscope is part of the allowlist and do the peer checking if so. s.Lock() defer s.Unlock() @@ -588,10 +587,10 @@ func (s *connectionScope) SetPeer(p peer.ID) error { } if s.isAllowlisted && !s.rcmgr.allowlist.AllowedPeerAndMultiaddr(p, s.endpoint) { - // This is not a allowed peer + multiaddr combination. We need to + // This is not an allowed peer + multiaddr combination. We need to // transfer this connection to the general scope. We'll do this first by // transferring the connection to the system and transient scopes, then - // continue on with this function. The idea is that a connection + // continue on with this function. The idea is that a connection // shouldn't get the benefit of evading the transient scope because it // was _almost_ an allowlisted connection. if err := s.transferAllowedToStandard(); err != nil {