chore: fix spelling errors (#18734)
Co-authored-by: github-merge-queue <github-merge-queue@users.noreply.github.com> Co-authored-by: Julien Robert <julien@rbrt.fr>
This commit is contained in:
parent
fe95384e37
commit
14e261eb73
4
.github/.codespellignore
vendored
4
.github/.codespellignore
vendored
@ -1,4 +1,6 @@
|
||||
cips
|
||||
pullrequest
|
||||
keypair
|
||||
pastTime
|
||||
pastTime
|
||||
hasTables
|
||||
Nam
|
||||
2
.github/workflows/misspell.yml
vendored
2
.github/workflows/misspell.yml
vendored
@ -14,7 +14,7 @@ jobs:
|
||||
continue-on-error: true
|
||||
run: |
|
||||
sudo apt-get install codespell -y
|
||||
codespell -w --skip="*.pulsar.go,*.pb.go,*.pb.gw.go,*.cosmos_orm.go,*.json,*.git,*.js,crypto/keys,fuzz,*.h" --ignore-words=".github/.codespellignore"
|
||||
codespell -w --skip="*.pulsar.go,*.pb.go,*.pb.gw.go,*.cosmos_orm.go,*.json,*.git,*.js,crypto/keys,fuzz,*.h,proto/tendermint" --ignore-words=.github/.codespellignore
|
||||
- uses: peter-evans/create-pull-request@v5
|
||||
with:
|
||||
token: ${{ secrets.PRBOT_PAT }}
|
||||
|
||||
@ -29,7 +29,7 @@
|
||||
<img alt="Imported by" src="https://sourcegraph.com/github.com/cosmos/cosmos-sdk/-/badge.svg" />
|
||||
</a>
|
||||
<img alt="Sims" src="https://github.com/cosmos/cosmos-sdk/workflows/Sims/badge.svg" />
|
||||
<img alt="Lint Satus" src="https://github.com/cosmos/cosmos-sdk/workflows/Lint/badge.svg" />
|
||||
<img alt="Lint Status" src="https://github.com/cosmos/cosmos-sdk/workflows/Lint/badge.svg" />
|
||||
</div>
|
||||
|
||||
The Cosmos SDK is a framework for building blockchain applications. [CometBFT (BFT Consensus)](https://github.com/cometbft/cometbft) and the Cosmos SDK are written in the Go programming language. Cosmos SDK is used to build [Gaia](https://github.com/cosmos/gaia), the implementation of the Cosmos Hub.
|
||||
|
||||
@ -32,7 +32,7 @@ func newTestTxConfig() (client.TxConfig, codec.Codec) {
|
||||
return authtx.NewTxConfig(codec.NewProtoCodec(encodingConfig.InterfaceRegistry), authtx.DefaultSignModes), encodingConfig.Codec
|
||||
}
|
||||
|
||||
// mockContext is a mock client.Context to return abitrary simulation response, used to
|
||||
// mockContext is a mock client.Context to return arbitrary simulation response, used to
|
||||
// unit test CalculateGas.
|
||||
type mockContext struct {
|
||||
gasUsed uint64
|
||||
|
||||
@ -17,7 +17,7 @@
|
||||
# - A constraint describing the requirements of the law, called "require"
|
||||
# * Implementations are transliterated into functions that operate as well on
|
||||
# algebraic input points, and are called once per combination of branches
|
||||
# exectured. Each execution returns:
|
||||
# executed. Each execution returns:
|
||||
# - A constraint describing the assumptions this implementation requires
|
||||
# (such as Z1=1), called "assumeFormula"
|
||||
# - A constraint describing the assumptions this specific branch requires,
|
||||
|
||||
@ -33,5 +33,5 @@ type ABCI interface {
|
||||
ListSnapshots(*abci.RequestListSnapshots) (*abci.ResponseListSnapshots, error) // List available snapshots
|
||||
OfferSnapshot(*abci.RequestOfferSnapshot) (*abci.ResponseOfferSnapshot, error) // Offer a snapshot to the application
|
||||
LoadSnapshotChunk(*abci.RequestLoadSnapshotChunk) (*abci.ResponseLoadSnapshotChunk, error) // Load a snapshot chunk
|
||||
ApplySnapshotChunk(*abci.RequestApplySnapshotChunk) (*abci.ResponseApplySnapshotChunk, error) // Apply a shapshot chunk
|
||||
ApplySnapshotChunk(*abci.RequestApplySnapshotChunk) (*abci.ResponseApplySnapshotChunk, error) // Apply a snapshot chunk
|
||||
}
|
||||
|
||||
@ -45,7 +45,7 @@ The chain configuration is stored in `~/.hubl/config.toml`.
|
||||
|
||||
:::tip
|
||||
|
||||
When using an unsecure gRPC endpoint, change the `insecure` field to `true` in the config file.
|
||||
When using an insecure gRPC endpoint, change the `insecure` field to `true` in the config file.
|
||||
|
||||
```toml
|
||||
[chains]
|
||||
|
||||
@ -427,7 +427,7 @@ func (s *addressTestSuite) TestCustomAddressVerifier() {
|
||||
return fmt.Errorf("incorrect address length %d", n)
|
||||
})
|
||||
|
||||
// Verifiy that the custom logic rejects this 10 byte address
|
||||
// Verify that the custom logic rejects this 10 byte address
|
||||
err = types.VerifyAddressFormat(addr)
|
||||
s.Require().NotNil(err)
|
||||
_, err = types.AccAddressFromBech32(accBech)
|
||||
|
||||
@ -34,7 +34,7 @@ timestamp.`,
|
||||
Use: "create-permanent-locked-account [to_address] [amount]",
|
||||
Short: "Create a new permanently locked account funded with an allocation of tokens.",
|
||||
Long: `Create a new account funded with an allocation of permanently locked tokens.
|
||||
These tokens may be used for staking but are non-transferable. Staking rewards will acrue as liquid and transferable tokens.`,
|
||||
These tokens may be used for staking but are non-transferable. Staking rewards will accrue as liquid and transferable tokens.`,
|
||||
PositionalArgs: []*autocliv1.PositionalArgDescriptor{
|
||||
{ProtoField: "to_address"},
|
||||
{ProtoField: "amount", Varargs: true},
|
||||
|
||||
@ -102,7 +102,7 @@ func (suite *TestSuite) TestGrant() {
|
||||
{
|
||||
name: "invalid grant, past time",
|
||||
malleate: func() *authz.MsgGrant {
|
||||
pastTime := curBlockTime.Add(-time.Hour)
|
||||
pTime := curBlockTime.Add(-time.Hour)
|
||||
grant, err := authz.NewGrant(curBlockTime, banktypes.NewSendAuthorization(coins, nil), &oneHour) // we only need the authorization
|
||||
suite.Require().NoError(err)
|
||||
return &authz.MsgGrant{
|
||||
@ -110,7 +110,7 @@ func (suite *TestSuite) TestGrant() {
|
||||
Grantee: grantee.String(),
|
||||
Grant: authz.Grant{
|
||||
Authorization: grant.Authorization,
|
||||
Expiration: &pastTime,
|
||||
Expiration: &pTime,
|
||||
},
|
||||
}
|
||||
},
|
||||
|
||||
@ -104,7 +104,7 @@ func TestFundsMigration(t *testing.T) {
|
||||
_, err = v4.MigrateFunds(ctx, bankKeeper, feepool, distrAcc, poolAcc)
|
||||
require.NoError(t, err)
|
||||
|
||||
// set distrbution feepool as empty (since migration)
|
||||
// set distribution feepool as empty (since migration)
|
||||
err = distrKeeper.FeePool.Set(ctx, disttypes.FeePool{})
|
||||
require.NoError(t, err)
|
||||
|
||||
|
||||
@ -260,7 +260,7 @@ Since this is more of a social feature than a technical feature, we'll now get i
|
||||
* In the event of an economic emergency, what should validators do?
|
||||
* Terra crash of May, 2022, saw validators choose to run a new binary with code that had not been approved by governance, because the governance token had been inflated to nothing.
|
||||
* What is the purpose of the chain, specifically?
|
||||
* best example of this is the Cosmos hub, where different founding groups, have different interpertations of the purpose of the network.
|
||||
* best example of this is the Cosmos hub, where different founding groups, have different interpretations of the purpose of the network.
|
||||
|
||||
This genesis entry, "constitution" hasn't been designed for existing chains, who should likely just ratify a constitution using their governance system. Instead, this is for new chains. It will allow for validators to have a much clearer idea of purpose and the expecations placed on them while operating their nodes. Likewise, for community members, the constitution will give them some idea of what to expect from both the "chain team" and the validators, respectively.
|
||||
|
||||
|
||||
@ -140,6 +140,6 @@ func TestDecodeTxBodyPanic(t *testing.T) {
|
||||
t.Fatal("expected a non-nil error")
|
||||
}
|
||||
if g, w := err.Error(), "could not consume length prefix"; !strings.Contains(g, w) {
|
||||
t.Fatalf("error mismatch\n%s\ndoes not contain\n\t%q", g, w)
|
||||
t.Fatalf("error mismatch\n%s\nodes not contain\n\t%q", g, w)
|
||||
}
|
||||
}
|
||||
|
||||
Loading…
Reference in New Issue
Block a user