diff options
author | David Rowley | 2023-04-18 01:23:23 +0000 |
---|---|---|
committer | David Rowley | 2023-04-18 01:23:23 +0000 |
commit | b4dbf3e924b2556acbe103dc61ac71f9985ff24f (patch) | |
tree | 179232a4dbf525790273dfbdd3a4f58e30225d56 /src/backend/utils | |
parent | e39d512f3e9b1e34ffba77c8fe120c2675f6873b (diff) |
Fix various typos
This fixes many spelling mistakes in comments, but a few references to
invalid parameter names, function names and option names too in comments
and also some in string constants
Also, fix an #undef that was undefining the incorrect definition
Author: Alexander Lakhin
Reviewed-by: Justin Pryzby
Discussion: https://postgr.es/m/[email protected]
Diffstat (limited to 'src/backend/utils')
-rw-r--r-- | src/backend/utils/adt/acl.c | 4 | ||||
-rw-r--r-- | src/backend/utils/adt/array_userfuncs.c | 2 | ||||
-rw-r--r-- | src/backend/utils/misc/guc.c | 8 | ||||
-rw-r--r-- | src/backend/utils/misc/ps_status.c | 2 | ||||
-rw-r--r-- | src/backend/utils/mmgr/mcxt.c | 2 | ||||
-rw-r--r-- | src/backend/utils/resowner/resowner.c | 2 |
6 files changed, 10 insertions, 10 deletions
diff --git a/src/backend/utils/adt/acl.c b/src/backend/utils/adt/acl.c index 8f7522d1033..c5a6babccc2 100644 --- a/src/backend/utils/adt/acl.c +++ b/src/backend/utils/adt/acl.c @@ -4825,7 +4825,7 @@ RoleMembershipCacheCallback(Datum arg, int cacheid, uint32 hashvalue) * Get a list of roles that the specified roleid is a member of * * Type ROLERECURSE_MEMBERS recurses through all grants; ROLERECURSE_PRIVS - * recurses only through inheritable grants; and ROLERECURSE_SETROLe recurses + * recurses only through inheritable grants; and ROLERECURSE_SETROLE recurses * only through grants with set_option. * * Since indirect membership testing is relatively expensive, we cache @@ -5020,7 +5020,7 @@ member_can_set_role(Oid member, Oid role) } /* - * Permission violation eror unless able to SET ROLE to target role. + * Permission violation error unless able to SET ROLE to target role. */ void check_can_set_role(Oid member, Oid role) diff --git a/src/backend/utils/adt/array_userfuncs.c b/src/backend/utils/adt/array_userfuncs.c index 33e2b98307d..171fdc67bb2 100644 --- a/src/backend/utils/adt/array_userfuncs.c +++ b/src/backend/utils/adt/array_userfuncs.c @@ -1043,7 +1043,7 @@ array_agg_array_combine(PG_FUNCTION_ARGS) state1->nitems += state2->nitems; state1->dims[0] += state2->dims[0]; - /* remaing dims already match, per test above */ + /* remaining dims already match, per test above */ Assert(state1->array_type == state2->array_type); Assert(state1->element_type == state2->element_type); diff --git a/src/backend/utils/misc/guc.c b/src/backend/utils/misc/guc.c index 7d3b20168a0..9dd624b3ae0 100644 --- a/src/backend/utils/misc/guc.c +++ b/src/backend/utils/misc/guc.c @@ -1387,7 +1387,7 @@ check_GUC_name_for_parameter_acl(const char *name) * * This performs two sanity checks. First, it checks that the initial * value of a GUC is the same when declared and when loaded to prevent - * anybody looking at the C declarations of these GUCS from being fooled by + * anybody looking at the C declarations of these GUCs from being fooled by * mismatched values. Second, it checks for incorrect flag combinations. * * The following validation rules apply for the values: @@ -6272,7 +6272,7 @@ ProcessGUCArray(ArrayType *array, ArrayType *usersetArray, userSetDatum = BoolGetDatum(false); /* - * USER SET values are appliciable only for PGC_USERSET parameters. We + * USER SET values are applicable only for PGC_USERSET parameters. We * use InvalidOid as role in order to evade possible privileges of the * current user. */ @@ -6365,8 +6365,8 @@ GUCArrayAdd(ArrayType *array, ArrayType **usersetArray, } /* - * Recheck permissons if we found an option without USER SET - * flag while we're setting an optionn with USER SET flag. + * Recheck permissions if we found an option without USER SET + * flag while we're setting an option with USER SET flag. */ if (!currentUserSet && user_set) (void) validate_option_array_item(name, value, diff --git a/src/backend/utils/misc/ps_status.c b/src/backend/utils/misc/ps_status.c index 3894a017f3d..104c01d9666 100644 --- a/src/backend/utils/misc/ps_status.c +++ b/src/backend/utils/misc/ps_status.c @@ -87,7 +87,7 @@ static size_t ps_buffer_cur_len; /* nominal strlen(ps_buffer) */ static size_t ps_buffer_fixed_size; /* size of the constant prefix */ /* - * Length of ps_buffer before the suffix was appeneded to the end, or 0 if we + * Length of ps_buffer before the suffix was appended to the end, or 0 if we * didn't set a suffix. */ static size_t ps_buffer_nosuffix_len; diff --git a/src/backend/utils/mmgr/mcxt.c b/src/backend/utils/mmgr/mcxt.c index 88f97ea2464..42b90e4d4fa 100644 --- a/src/backend/utils/mmgr/mcxt.c +++ b/src/backend/utils/mmgr/mcxt.c @@ -1382,7 +1382,7 @@ MemoryContextAllocAligned(MemoryContext context, alloc_size = size + PallocAlignedExtraBytes(alignto); #ifdef MEMORY_CONTEXT_CHECKING - /* ensure there's space for a sentinal byte */ + /* ensure there's space for a sentinel byte */ alloc_size += 1; #endif diff --git a/src/backend/utils/resowner/resowner.c b/src/backend/utils/resowner/resowner.c index 4357dd08704..7dec652106f 100644 --- a/src/backend/utils/resowner/resowner.c +++ b/src/backend/utils/resowner/resowner.c @@ -521,7 +521,7 @@ ResourceOwnerReleaseInternal(ResourceOwner owner, { /* * Abort failed buffer IO. AbortBufferIO()->TerminateBufferIO() calls - * ResourceOwnerForgetBufferIOs(), so we just have to iterate till + * ResourceOwnerForgetBufferIO(), so we just have to iterate till * there are none. * * Needs to be before we release buffer pins. |