From e0479bc72e6b0882e202d733ef032afe9c302e56 Mon Sep 17 00:00:00 2001 From: Tetsushi Omi Date: Tue, 7 Jan 2020 16:14:04 +0900 Subject: [PATCH] Update queues.md typo fix --- developing-with-nats/receiving/queues.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/developing-with-nats/receiving/queues.md b/developing-with-nats/receiving/queues.md index d94fbad..2f0aa29 100644 --- a/developing-with-nats/receiving/queues.md +++ b/developing-with-nats/receiving/queues.md @@ -22,7 +22,7 @@ wg := sync.WaitGroup{} wg.Add(10) // Create a queue subscription on "updates" with queue name "workers" -if _, err := nc.QueueSubscribe("updates", "worker", func(m *nats.Msg) { +if _, err := nc.QueueSubscribe("updates", "workers", func(m *nats.Msg) { wg.Done() }); err != nil { log.Fatal(err) @@ -139,7 +139,7 @@ The full wildcard can also be used, for example the following would prevent plai allow = ["bar >"] ``` -Permissions for Queue Subscriptions can be combined with plain subscriptions as well though, for example you could allow plain subscriptions on `foo` but constrain the queues to which a client can join, as well a preventing any service from using a queue subscription with the name `*.prod`: +Permissions for Queue Subscriptions can be combined with plain subscriptions as well though, for example you could allow plain subscriptions on `foo` but constrain the queues to which a client can join, as well as preventing any service from using a queue subscription with the name `*.prod`: ```text users = [