@@ -126,7 +126,7 @@ audible only to dogs, just for his Shetland sheepdog."}
126
126
127
127
> Without the ` allowed_http_hosts ` field populated properly in ` spin.toml ` ,
128
128
> the component would not be allowed to send HTTP requests, and sending the
129
- > request would generate in a "Destination not allowed" error.
129
+ > request would result in a "Destination not allowed" error.
130
130
131
131
We just built a WebAssembly component that sends an HTTP request to another
132
132
service, manipulates that result, then responds to the original request.
@@ -140,7 +140,7 @@ Besides the HTTP trigger, Spin has built-in support for a Redis trigger —
140
140
which will connect to a Redis instance and will execute Spin components for
141
141
new messages on the configured channels.
142
142
143
- > See the [ Redis trigger] ( /redis-rigger ) for details about the Redis trigger.
143
+ > See the [ Redis trigger] ( /redis-trigger ) for details about the Redis trigger.
144
144
145
145
Writing a Redis component in Rust also takes advantage of the SDK:
146
146
@@ -186,7 +186,7 @@ This application will connect to `redis://localhost:6379`, and for every new
186
186
message on the ` messages ` channel, the ` echo-message ` component will be executed.
187
187
188
188
``` bash
189
- # first, start redis-server on the default prot 6379
189
+ # first, start redis-server on the default port 6379
190
190
$ redis-server --port 6379
191
191
# then, start the Spin application
192
192
$ spin up --file spin.toml
0 commit comments