Merge pull request #342 from mrueg/gofmt

Run gofmt
pull/345/head
Marek Siarkowicz 2022-10-20 22:12:36 +02:00 committed by GitHub
commit fa9dfc65da
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
6 changed files with 15 additions and 18 deletions

View File

@ -7,7 +7,7 @@ jobs:
- uses: actions/checkout@v2 - uses: actions/checkout@v2
- uses: actions/setup-go@v2 - uses: actions/setup-go@v2
with: with:
go-version: "1.17.8" go-version: "1.17.13"
- run: make fmt - run: make fmt
- run: make race - run: make race
- run: make test - run: make test

View File

@ -1,3 +1,4 @@
//go:build loong64
// +build loong64 // +build loong64
package bbolt package bbolt

8
doc.go
View File

@ -14,8 +14,7 @@ The design of Bolt is based on Howard Chu's LMDB database project.
Bolt currently works on Windows, Mac OS X, and Linux. Bolt currently works on Windows, Mac OS X, and Linux.
# Basics
Basics
There are only a few types in Bolt: DB, Bucket, Tx, and Cursor. The DB is There are only a few types in Bolt: DB, Bucket, Tx, and Cursor. The DB is
a collection of buckets and is represented by a single file on disk. A bucket is a collection of buckets and is represented by a single file on disk. A bucket is
@ -27,8 +26,7 @@ iterate over the dataset sequentially. Read-write transactions can create and
delete buckets and can insert and remove keys. Only one read-write transaction delete buckets and can insert and remove keys. Only one read-write transaction
is allowed at a time. is allowed at a time.
# Caveats
Caveats
The database uses a read-only, memory-mapped data file to ensure that The database uses a read-only, memory-mapped data file to ensure that
applications cannot corrupt the database, however, this means that keys and applications cannot corrupt the database, however, this means that keys and
@ -38,7 +36,5 @@ will cause Go to panic.
Keys and values retrieved from the database are only valid for the life of Keys and values retrieved from the database are only valid for the life of
the transaction. When used outside the transaction, these byte slices can the transaction. When used outside the transaction, these byte slices can
point to different data or can point to invalid memory which will cause a panic. point to different data or can point to invalid memory which will cause a panic.
*/ */
package bbolt package bbolt