Skip to content

Commit 5e108bb

Browse files
committed
A: typos
1 parent 72a72fe commit 5e108bb

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

WordPress/Sniffs/DB/PreparedSQLPlaceholdersSniff.php

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -232,7 +232,7 @@ public function process_token( $stackPtr ) {
232232
if ( ! empty( $sprintf_parameters ) ) {
233233
/*
234234
* Check for named params. sprintf() does not support this due to its variadic nature,
235-
* and we cannot analyse the code correctly if it is used, so skip the whole sprintf()
235+
* and we cannot analyze the code correctly if it is used, so skip the whole sprintf()
236236
* in that case.
237237
*/
238238
$valid_sprintf = true;
@@ -347,7 +347,7 @@ static function ( $symbol ) {
347347
}
348348

349349
/*
350-
* Analyse the query for incorrect LIKE queries.
350+
* Analyze the query for incorrect LIKE queries.
351351
*
352352
* - `LIKE %s` is the only correct one.
353353
* - `LIKE '%s'` or `LIKE "%s"` will not be reported here, but in the quote check.
@@ -419,7 +419,7 @@ static function ( $symbol ) {
419419
}
420420

421421
/*
422-
* Analyse the query for unsupported placeholders.
422+
* Analyze the query for unsupported placeholders.
423423
*/
424424
if ( preg_match_all( self::UNSUPPORTED_PLACEHOLDER_REGEX, $content, $matches ) > 0 ) {
425425
if ( ! empty( $matches[0] ) ) {
@@ -463,7 +463,7 @@ static function ( $symbol ) {
463463
}
464464

465465
/*
466-
* Analyse the query for single/double quoted simple value placeholders
466+
* Analyze the query for single/double quoted simple value placeholders
467467
* Identifiers are checked separately.
468468
*/
469469
$regex = '`(' . $regex_quote . ')%[dfFs]\1`';
@@ -482,7 +482,7 @@ static function ( $symbol ) {
482482
}
483483

484484
/*
485-
* Analyse the query for quoted identifier placeholders.
485+
* Analyze the query for quoted identifier placeholders.
486486
*/
487487
$regex = '/(' . $regex_quote . '|`)(?<placeholder>' . self::PREPARE_PLACEHOLDER_REGEX . ')\1/x';
488488
if ( preg_match_all( $regex, $content, $matches ) > 0 ) {
@@ -502,7 +502,7 @@ static function ( $symbol ) {
502502
}
503503

504504
/*
505-
* Analyse the query for unquoted complex placeholders.
505+
* Analyze the query for unquoted complex placeholders.
506506
*/
507507
$regex = '`(?<!' . $regex_quote . ')' . self::PREPARE_PLACEHOLDER_REGEX . '(?!' . $regex_quote . ')`x';
508508
if ( preg_match_all( $regex, $content, $matches ) > 0 ) {
@@ -650,7 +650,7 @@ protected function get_regex_quote_snippet( $stripped_content, $original_content
650650
}
651651

652652
/**
653-
* Analyse a sprintf() query wrapper to see if it contains a specific code pattern
653+
* Analyze a sprintf() query wrapper to see if it contains a specific code pattern
654654
* to deal correctly with `IN` queries.
655655
*
656656
* The pattern we are searching for is:
@@ -687,7 +687,7 @@ protected function analyse_sprintf( $sprintf_params ) {
687687
}
688688

689689
/**
690-
* Analyse an implode() function call to see if it contains a specific code pattern
690+
* Analyze an implode() function call to see if it contains a specific code pattern
691691
* to dynamically create placeholders.
692692
*
693693
* The pattern we are searching for is:

WordPress/Sniffs/PHP/NoSilencedErrorsSniff.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ final class NoSilencedErrorsSniff extends Sniff {
6969
*
7070
* Errors caused by calls to any of these native PHP functions
7171
* are allowed to be silenced as file system permissions and such
72-
* can cause E_WARNINGs to be thrown which cannot be prevented via
72+
* can cause `E_WARNING`s to be thrown which cannot be prevented via
7373
* error checking.
7474
*
7575
* Note: only calls to global functions - in contrast to class methods -

0 commit comments

Comments
 (0)