chore: fix spelling errors (#18734)

Co-authored-by: github-merge-queue <github-merge-queue@users.noreply.github.com>
Co-authored-by: Julien Robert <julien@rbrt.fr>
This commit is contained in:
Cosmos SDK 2023-12-13 15:05:58 +01:00 committed by GitHub
parent fe95384e37
commit 14e261eb73
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
13 changed files with 16 additions and 14 deletions

View File

@ -1,4 +1,6 @@
cips
pullrequest
keypair
pastTime
pastTime
hasTables
Nam

View File

@ -14,7 +14,7 @@ jobs:
continue-on-error: true
run: |
sudo apt-get install codespell -y
codespell -w --skip="*.pulsar.go,*.pb.go,*.pb.gw.go,*.cosmos_orm.go,*.json,*.git,*.js,crypto/keys,fuzz,*.h" --ignore-words=".github/.codespellignore"
codespell -w --skip="*.pulsar.go,*.pb.go,*.pb.gw.go,*.cosmos_orm.go,*.json,*.git,*.js,crypto/keys,fuzz,*.h,proto/tendermint" --ignore-words=.github/.codespellignore
- uses: peter-evans/create-pull-request@v5
with:
token: ${{ secrets.PRBOT_PAT }}

View File

@ -29,7 +29,7 @@
<img alt="Imported by" src="https://sourcegraph.com/github.com/cosmos/cosmos-sdk/-/badge.svg" />
</a>
<img alt="Sims" src="https://github.com/cosmos/cosmos-sdk/workflows/Sims/badge.svg" />
<img alt="Lint Satus" src="https://github.com/cosmos/cosmos-sdk/workflows/Lint/badge.svg" />
<img alt="Lint Status" src="https://github.com/cosmos/cosmos-sdk/workflows/Lint/badge.svg" />
</div>
The Cosmos SDK is a framework for building blockchain applications. [CometBFT (BFT Consensus)](https://github.com/cometbft/cometbft) and the Cosmos SDK are written in the Go programming language. Cosmos SDK is used to build [Gaia](https://github.com/cosmos/gaia), the implementation of the Cosmos Hub.

View File

@ -32,7 +32,7 @@ func newTestTxConfig() (client.TxConfig, codec.Codec) {
return authtx.NewTxConfig(codec.NewProtoCodec(encodingConfig.InterfaceRegistry), authtx.DefaultSignModes), encodingConfig.Codec
}
// mockContext is a mock client.Context to return abitrary simulation response, used to
// mockContext is a mock client.Context to return arbitrary simulation response, used to
// unit test CalculateGas.
type mockContext struct {
gasUsed uint64

View File

@ -17,7 +17,7 @@
# - A constraint describing the requirements of the law, called "require"
# * Implementations are transliterated into functions that operate as well on
# algebraic input points, and are called once per combination of branches
# exectured. Each execution returns:
# executed. Each execution returns:
# - A constraint describing the assumptions this implementation requires
# (such as Z1=1), called "assumeFormula"
# - A constraint describing the assumptions this specific branch requires,

View File

@ -33,5 +33,5 @@ type ABCI interface {
ListSnapshots(*abci.RequestListSnapshots) (*abci.ResponseListSnapshots, error) // List available snapshots
OfferSnapshot(*abci.RequestOfferSnapshot) (*abci.ResponseOfferSnapshot, error) // Offer a snapshot to the application
LoadSnapshotChunk(*abci.RequestLoadSnapshotChunk) (*abci.ResponseLoadSnapshotChunk, error) // Load a snapshot chunk
ApplySnapshotChunk(*abci.RequestApplySnapshotChunk) (*abci.ResponseApplySnapshotChunk, error) // Apply a shapshot chunk
ApplySnapshotChunk(*abci.RequestApplySnapshotChunk) (*abci.ResponseApplySnapshotChunk, error) // Apply a snapshot chunk
}

View File

@ -45,7 +45,7 @@ The chain configuration is stored in `~/.hubl/config.toml`.
:::tip
When using an unsecure gRPC endpoint, change the `insecure` field to `true` in the config file.
When using an insecure gRPC endpoint, change the `insecure` field to `true` in the config file.
```toml
[chains]

View File

@ -427,7 +427,7 @@ func (s *addressTestSuite) TestCustomAddressVerifier() {
return fmt.Errorf("incorrect address length %d", n)
})
// Verifiy that the custom logic rejects this 10 byte address
// Verify that the custom logic rejects this 10 byte address
err = types.VerifyAddressFormat(addr)
s.Require().NotNil(err)
_, err = types.AccAddressFromBech32(accBech)

View File

@ -34,7 +34,7 @@ timestamp.`,
Use: "create-permanent-locked-account [to_address] [amount]",
Short: "Create a new permanently locked account funded with an allocation of tokens.",
Long: `Create a new account funded with an allocation of permanently locked tokens.
These tokens may be used for staking but are non-transferable. Staking rewards will acrue as liquid and transferable tokens.`,
These tokens may be used for staking but are non-transferable. Staking rewards will accrue as liquid and transferable tokens.`,
PositionalArgs: []*autocliv1.PositionalArgDescriptor{
{ProtoField: "to_address"},
{ProtoField: "amount", Varargs: true},

View File

@ -102,7 +102,7 @@ func (suite *TestSuite) TestGrant() {
{
name: "invalid grant, past time",
malleate: func() *authz.MsgGrant {
pastTime := curBlockTime.Add(-time.Hour)
pTime := curBlockTime.Add(-time.Hour)
grant, err := authz.NewGrant(curBlockTime, banktypes.NewSendAuthorization(coins, nil), &oneHour) // we only need the authorization
suite.Require().NoError(err)
return &authz.MsgGrant{
@ -110,7 +110,7 @@ func (suite *TestSuite) TestGrant() {
Grantee: grantee.String(),
Grant: authz.Grant{
Authorization: grant.Authorization,
Expiration: &pastTime,
Expiration: &pTime,
},
}
},

View File

@ -104,7 +104,7 @@ func TestFundsMigration(t *testing.T) {
_, err = v4.MigrateFunds(ctx, bankKeeper, feepool, distrAcc, poolAcc)
require.NoError(t, err)
// set distrbution feepool as empty (since migration)
// set distribution feepool as empty (since migration)
err = distrKeeper.FeePool.Set(ctx, disttypes.FeePool{})
require.NoError(t, err)

View File

@ -260,7 +260,7 @@ Since this is more of a social feature than a technical feature, we'll now get i
* In the event of an economic emergency, what should validators do?
* Terra crash of May, 2022, saw validators choose to run a new binary with code that had not been approved by governance, because the governance token had been inflated to nothing.
* What is the purpose of the chain, specifically?
* best example of this is the Cosmos hub, where different founding groups, have different interpertations of the purpose of the network.
* best example of this is the Cosmos hub, where different founding groups, have different interpretations of the purpose of the network.
This genesis entry, "constitution" hasn't been designed for existing chains, who should likely just ratify a constitution using their governance system. Instead, this is for new chains. It will allow for validators to have a much clearer idea of purpose and the expecations placed on them while operating their nodes. Likewise, for community members, the constitution will give them some idea of what to expect from both the "chain team" and the validators, respectively.

View File

@ -140,6 +140,6 @@ func TestDecodeTxBodyPanic(t *testing.T) {
t.Fatal("expected a non-nil error")
}
if g, w := err.Error(), "could not consume length prefix"; !strings.Contains(g, w) {
t.Fatalf("error mismatch\n%s\ndoes not contain\n\t%q", g, w)
t.Fatalf("error mismatch\n%s\nodes not contain\n\t%q", g, w)
}
}