mirror of
https://github.com/denoland/deno.git
synced 2025-03-03 09:31:22 -05:00
fix: Fix some typos in comments (#23470)
Signed-off-by: welfuture <wellfuture@qq.com>
This commit is contained in:
parent
db3b3fb665
commit
e55087f57a
4 changed files with 4 additions and 4 deletions
2
cli/tsc/00_typescript.js
vendored
2
cli/tsc/00_typescript.js
vendored
|
@ -150636,7 +150636,7 @@ ${newComment.split("\n").map((c) => ` * ${c}`).join("\n")}
|
|||
break;
|
||||
case 3 /* CommonJS */:
|
||||
case 2 /* Namespace */:
|
||||
Debug.assert(entry.namespaceLikeImport === void 0 || entry.namespaceLikeImport.name === symbolName2, "Namespacelike import shoudl be missing or match symbolName");
|
||||
Debug.assert(entry.namespaceLikeImport === void 0 || entry.namespaceLikeImport.name === symbolName2, "Namespacelike import should be missing or match symbolName");
|
||||
entry.namespaceLikeImport = { importKind, name: symbolName2, addAsTypeOnly };
|
||||
break;
|
||||
}
|
||||
|
|
|
@ -69,7 +69,7 @@ export function parseScheduleToString(
|
|||
|
||||
// Automatically override unspecified values for convenience. For example,
|
||||
// to run every 2 hours, `{ hour: { every: 2 } }` can be specified without
|
||||
// explicitely specifying `minute`.
|
||||
// explicitly specifying `minute`.
|
||||
if (minute !== undefined) {
|
||||
// Nothing to override.
|
||||
} else if (hour !== undefined) {
|
||||
|
|
|
@ -240,7 +240,7 @@ pub fn cpu_info() -> Option<Vec<CpuInfo>> {
|
|||
pub fn cpu_info() -> Option<Vec<CpuInfo>> {
|
||||
use std::io::BufRead;
|
||||
|
||||
let mut cpus = vec![CpuInfo::new(); 8192]; /* Kernel maxmimum */
|
||||
let mut cpus = vec![CpuInfo::new(); 8192]; /* Kernel maximum */
|
||||
|
||||
let fp = std::fs::File::open("/proc/stat").ok()?;
|
||||
let reader = std::io::BufReader::new(fp);
|
||||
|
|
2
tests/testdata/fmt/with_config/subdir/c.md
vendored
2
tests/testdata/fmt/with_config/subdir/c.md
vendored
|
@ -5,7 +5,7 @@ unless you specifically enable it, a
|
|||
program run with Deno has no file,
|
||||
network, or environment access. Access
|
||||
to security sensitive functionality
|
||||
requires that permisisons have been
|
||||
requires that permissions have been
|
||||
granted to an executing script through
|
||||
command line flags, or a runtime
|
||||
permission prompt.
|
||||
|
|
Loading…
Add table
Reference in a new issue