diff --git a/.codespell/requirements.txt b/.codespell/requirements.txt index 407f17489..ddff45468 100644 --- a/.codespell/requirements.txt +++ b/.codespell/requirements.txt @@ -1 +1 @@ -codespell==2.2.4 +codespell==2.2.5 diff --git a/src/acl.c b/src/acl.c index 900746ece..607512beb 100644 --- a/src/acl.c +++ b/src/acl.c @@ -309,7 +309,7 @@ void *ACLListDupSds(void *item) { /* Structure used for handling key patterns with different key * based permissions. */ typedef struct { - int flags; /* The CMD_KEYS_* flags for this key pattern */ + int flags; /* The ACL key permission types for this key pattern */ sds pattern; /* The pattern to match keys against */ } keyPattern; @@ -963,7 +963,7 @@ void ACLResetFirstArgs(aclSelector *selector) { selector->allowed_firstargs = NULL; } -/* Add a first-arh to the list of subcommands for the user 'u' and +/* Add a first-arg to the list of subcommands for the user 'u' and * the command id specified. */ void ACLAddAllowedFirstArg(aclSelector *selector, unsigned long id, const char *sub) { /* If this is the first first-arg to be configured for @@ -1458,7 +1458,7 @@ void ACLInit(void) { * otherwise C_ERR is returned and errno is set to: * * EINVAL: if the username-password do not match. - * ENONENT: if the specified user does not exist at all. + * ENOENT: if the specified user does not exist at all. */ int ACLCheckUserCredentials(robj *username, robj *password) { user *u = ACLGetUserByName(username->ptr,sdslen(username->ptr)); diff --git a/src/db.c b/src/db.c index a7cb4dbd3..a913044ab 100644 --- a/src/db.c +++ b/src/db.c @@ -188,8 +188,8 @@ robj *lookupKeyWriteOrReply(client *c, robj *key, robj *reply) { /* Add the key to the DB. It's up to the caller to increment the reference * counter of the value if needed. * - * If the update_if_existing argument is false, the the program is aborted - * if the key already exists, otherwise, it can fall back to dbOverwite. */ + * If the update_if_existing argument is false, the program is aborted + * if the key already exists, otherwise, it can fall back to dbOverwrite. */ static void dbAddInternal(redisDb *db, robj *key, robj *val, int update_if_existing) { dictEntry *existing; dictEntry *de = dictAddRaw(db->dict, key->ptr, &existing); diff --git a/src/debug.c b/src/debug.c index 809822f96..1e915a1e1 100644 --- a/src/debug.c +++ b/src/debug.c @@ -2260,7 +2260,7 @@ void bugReportEnd(int killViaSignal, int sig) { if (server.daemonize && server.supervised == 0 && server.pidfile) unlink(server.pidfile); if (!killViaSignal) { - /* To avoid issues with valgrind, we may wanna exit rahter than generate a signal */ + /* To avoid issues with valgrind, we may wanna exit rather than generate a signal */ if (server.use_exit_on_panic) { /* Using _exit to bypass false leak reports by gcc ASAN */ fflush(stdout); diff --git a/src/sentinel.c b/src/sentinel.c index 238be905f..cce5cc3b9 100644 --- a/src/sentinel.c +++ b/src/sentinel.c @@ -4129,7 +4129,7 @@ NULL else if (!strcasecmp(c->argv[2]->ptr,"get") && c->argc >= 4) sentinelConfigGetCommand(c); else - addReplyError(c, "Only SENTINEL CONFIG GET [ ...]/ SET [ ...] are supported."); + addReplyError(c, "Only SENTINEL CONFIG GET [ ...] / SET [ ...] are supported."); } else if (!strcasecmp(c->argv[1]->ptr,"info-cache")) { /* SENTINEL INFO-CACHE */ if (c->argc < 2) goto numargserr; diff --git a/src/server.h b/src/server.h index 52a2f8584..4634cbdf5 100644 --- a/src/server.h +++ b/src/server.h @@ -2003,7 +2003,7 @@ struct redisServer { /* Scripting */ mstime_t busy_reply_threshold; /* Script / module timeout in milliseconds */ int pre_command_oom_state; /* OOM before command (script?) was started */ - int script_disable_deny_script; /* Allow running commands marked "no-script" inside a script. */ + int script_disable_deny_script; /* Allow running commands marked "noscript" inside a script. */ /* Lazy free */ int lazyfree_lazy_eviction; int lazyfree_lazy_expire; diff --git a/tests/unit/expire.tcl b/tests/unit/expire.tcl index fc0ef61e2..15dae20e4 100644 --- a/tests/unit/expire.tcl +++ b/tests/unit/expire.tcl @@ -350,7 +350,7 @@ start_server {tags {"expire"}} { r restore foo17 100000 $encoded r restore foo18 [expr [clock milliseconds]+100000] $encoded absttl - # Assert that each TTL-relatd command are persisted with absolute timestamps in AOF + # Assert that each TTL-related command are persisted with absolute timestamps in AOF assert_aof_content $aof { {select *} {set foo1 bar PXAT *} diff --git a/tests/unit/memefficiency.tcl b/tests/unit/memefficiency.tcl index d821c7adc..564f1e4b2 100644 --- a/tests/unit/memefficiency.tcl +++ b/tests/unit/memefficiency.tcl @@ -493,7 +493,7 @@ start_server {tags {"defrag external:skip"} overrides {appendonly yes auto-aof-r set expected_frag 1.3 r debug mallctl-str thread.tcache.flush VOID - # fill the first slab containin 32 regs of 640 bytes. + # fill the first slab containing 32 regs of 640 bytes. for {set j 0} {$j < 32} {incr j} { r setrange "_$j" 600 x r debug mallctl-str thread.tcache.flush VOID diff --git a/tests/unit/tracking.tcl b/tests/unit/tracking.tcl index bea8508b1..666b5930e 100644 --- a/tests/unit/tracking.tcl +++ b/tests/unit/tracking.tcl @@ -876,7 +876,7 @@ start_server {tags {"tracking network logreqres:skip"}} { $rd close } -# Just some extra covergae for --log-req-res, because we do not +# Just some extra coverage for --log-req-res, because we do not # run the full tracking unit in that mode start_server {tags {"tracking network"}} { test {Coverage: Basic CLIENT CACHING} { diff --git a/tests/unit/type/list.tcl b/tests/unit/type/list.tcl index 993b6d135..586d3d308 100644 --- a/tests/unit/type/list.tcl +++ b/tests/unit/type/list.tcl @@ -1120,7 +1120,7 @@ foreach {pop} {BLPOP BLMPOP_LEFT} { assert_equal {} [$rd read] $rd deferred 0 # We want to force key deletion to be propagated to the replica - # in order to verify it was expiered on the replication stream. + # in order to verify it was expired on the replication stream. $rd set somekey1 someval1 $rd exists k r set somekey2 someval2 @@ -1168,7 +1168,7 @@ foreach {pop} {BLPOP BLMPOP_LEFT} { r client unblock $id assert_equal {} [$rd read] # We want to force key deletion to be propagated to the replica - # in order to verify it was expiered on the replication stream. + # in order to verify it was expired on the replication stream. $rd exists k assert_equal {0} [$rd read] assert_replication_stream $repl {