Bump codespell from 2.2.4 to 2.2.5 (#12557)

and adjustments.
This commit is contained in:
Binbin 2023-09-08 21:10:17 +08:00 committed by GitHub
parent 90e9fc387c
commit 96e9dec419
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
10 changed files with 14 additions and 14 deletions

View File

@ -1 +1 @@
codespell==2.2.4
codespell==2.2.5

View File

@ -309,7 +309,7 @@ void *ACLListDupSds(void *item) {
/* Structure used for handling key patterns with different key
* based permissions. */
typedef struct {
int flags; /* The CMD_KEYS_* flags for this key pattern */
int flags; /* The ACL key permission types for this key pattern */
sds pattern; /* The pattern to match keys against */
} keyPattern;
@ -963,7 +963,7 @@ void ACLResetFirstArgs(aclSelector *selector) {
selector->allowed_firstargs = NULL;
}
/* Add a first-arh to the list of subcommands for the user 'u' and
/* Add a first-arg to the list of subcommands for the user 'u' and
* the command id specified. */
void ACLAddAllowedFirstArg(aclSelector *selector, unsigned long id, const char *sub) {
/* If this is the first first-arg to be configured for
@ -1458,7 +1458,7 @@ void ACLInit(void) {
* otherwise C_ERR is returned and errno is set to:
*
* EINVAL: if the username-password do not match.
* ENONENT: if the specified user does not exist at all.
* ENOENT: if the specified user does not exist at all.
*/
int ACLCheckUserCredentials(robj *username, robj *password) {
user *u = ACLGetUserByName(username->ptr,sdslen(username->ptr));

View File

@ -188,8 +188,8 @@ robj *lookupKeyWriteOrReply(client *c, robj *key, robj *reply) {
/* Add the key to the DB. It's up to the caller to increment the reference
* counter of the value if needed.
*
* If the update_if_existing argument is false, the the program is aborted
* if the key already exists, otherwise, it can fall back to dbOverwite. */
* If the update_if_existing argument is false, the program is aborted
* if the key already exists, otherwise, it can fall back to dbOverwrite. */
static void dbAddInternal(redisDb *db, robj *key, robj *val, int update_if_existing) {
dictEntry *existing;
dictEntry *de = dictAddRaw(db->dict, key->ptr, &existing);

View File

@ -2260,7 +2260,7 @@ void bugReportEnd(int killViaSignal, int sig) {
if (server.daemonize && server.supervised == 0 && server.pidfile) unlink(server.pidfile);
if (!killViaSignal) {
/* To avoid issues with valgrind, we may wanna exit rahter than generate a signal */
/* To avoid issues with valgrind, we may wanna exit rather than generate a signal */
if (server.use_exit_on_panic) {
/* Using _exit to bypass false leak reports by gcc ASAN */
fflush(stdout);

View File

@ -4129,7 +4129,7 @@ NULL
else if (!strcasecmp(c->argv[2]->ptr,"get") && c->argc >= 4)
sentinelConfigGetCommand(c);
else
addReplyError(c, "Only SENTINEL CONFIG GET <param> [<param> <param> ...]/ SET <param> <value> [<param> <value> ...] are supported.");
addReplyError(c, "Only SENTINEL CONFIG GET <param> [<param> <param> ...] / SET <param> <value> [<param> <value> ...] are supported.");
} else if (!strcasecmp(c->argv[1]->ptr,"info-cache")) {
/* SENTINEL INFO-CACHE <name> */
if (c->argc < 2) goto numargserr;

View File

@ -2003,7 +2003,7 @@ struct redisServer {
/* Scripting */
mstime_t busy_reply_threshold; /* Script / module timeout in milliseconds */
int pre_command_oom_state; /* OOM before command (script?) was started */
int script_disable_deny_script; /* Allow running commands marked "no-script" inside a script. */
int script_disable_deny_script; /* Allow running commands marked "noscript" inside a script. */
/* Lazy free */
int lazyfree_lazy_eviction;
int lazyfree_lazy_expire;

View File

@ -350,7 +350,7 @@ start_server {tags {"expire"}} {
r restore foo17 100000 $encoded
r restore foo18 [expr [clock milliseconds]+100000] $encoded absttl
# Assert that each TTL-relatd command are persisted with absolute timestamps in AOF
# Assert that each TTL-related command are persisted with absolute timestamps in AOF
assert_aof_content $aof {
{select *}
{set foo1 bar PXAT *}

View File

@ -493,7 +493,7 @@ start_server {tags {"defrag external:skip"} overrides {appendonly yes auto-aof-r
set expected_frag 1.3
r debug mallctl-str thread.tcache.flush VOID
# fill the first slab containin 32 regs of 640 bytes.
# fill the first slab containing 32 regs of 640 bytes.
for {set j 0} {$j < 32} {incr j} {
r setrange "_$j" 600 x
r debug mallctl-str thread.tcache.flush VOID

View File

@ -876,7 +876,7 @@ start_server {tags {"tracking network logreqres:skip"}} {
$rd close
}
# Just some extra covergae for --log-req-res, because we do not
# Just some extra coverage for --log-req-res, because we do not
# run the full tracking unit in that mode
start_server {tags {"tracking network"}} {
test {Coverage: Basic CLIENT CACHING} {

View File

@ -1120,7 +1120,7 @@ foreach {pop} {BLPOP BLMPOP_LEFT} {
assert_equal {} [$rd read]
$rd deferred 0
# We want to force key deletion to be propagated to the replica
# in order to verify it was expiered on the replication stream.
# in order to verify it was expired on the replication stream.
$rd set somekey1 someval1
$rd exists k
r set somekey2 someval2
@ -1168,7 +1168,7 @@ foreach {pop} {BLPOP BLMPOP_LEFT} {
r client unblock $id
assert_equal {} [$rd read]
# We want to force key deletion to be propagated to the replica
# in order to verify it was expiered on the replication stream.
# in order to verify it was expired on the replication stream.
$rd exists k
assert_equal {0} [$rd read]
assert_replication_stream $repl {