fix: correct typos across codebase (#25335)

This commit is contained in:
sashaodessa 2025-09-10 21:36:08 +02:00 committed by GitHub
parent b848f4c6cb
commit 6c5882bc40
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
9 changed files with 13 additions and 13 deletions

View File

@ -915,7 +915,7 @@ func (app *BaseApp) FinalizeBlock(req *abci.RequestFinalizeBlock) (res *abci.Res
return res, err
}
// checkHalt checkes if height or time exceeds halt-height or halt-time respectively.
// checkHalt checks if height or time exceeds halt-height or halt-time respectively.
func (app *BaseApp) checkHalt(height int64, time time.Time) error {
var halt bool
switch {

View File

@ -7,7 +7,7 @@
* 10/14/2022:
* Add `ListenCommit`, flatten the state writes in a block to a single batch.
* Remove listeners from cache stores, should only listen to `rootmulti.Store`.
* Remove `HaltAppOnDeliveryError()`, the errors are propagated by default, the implementations should return nil if don't want to propogate errors.
* Remove `HaltAppOnDeliveryError()`, the errors are propagated by default, the implementations should return nil if don't want to propagate errors.
* 26/05/2023: Update with ABCI 2.0
## Status
@ -354,7 +354,7 @@ var Handshake = plugin.HandshakeConfig{
MagicCookieValue: "ef78114d-7bdf-411c-868f-347c99a78345",
}
// ListenerPlugin is the base struc for all kinds of go-plugin implementations
// ListenerPlugin is the base struct for all kinds of go-plugin implementations
// It will be included in interfaces of different Plugins
type ABCIListenerPlugin struct {
// GRPCPlugin must still implement the Plugin interface

View File

@ -131,7 +131,7 @@ message Validator {
// strictly positive if this validator's unbonding has been stopped by external modules
int64 unbonding_on_hold_ref_count = 12;
// list of unbonding ids, each uniquely identifing an unbonding of this validator
// list of unbonding ids, each uniquely identifying an unbonding of this validator
repeated uint64 unbonding_ids = 13;
}
@ -376,7 +376,7 @@ message Pool {
];
}
// Infraction indicates the infraction a validator commited.
// Infraction indicates the infraction a validator committed.
enum Infraction {
// UNSPECIFIED defines an empty infraction.
INFRACTION_UNSPECIFIED = 0;

View File

@ -346,10 +346,10 @@ message ResponseVerifyVoteExtension {
}
message ResponseFinalizeBlock {
// set of block events emmitted as part of executing the block
// set of block events emitted as part of executing the block
repeated Event events = 1 [(gogoproto.nullable) = false, (gogoproto.jsontag) = "events,omitempty"];
// the result of executing each transaction including the events
// the particular transction emitted. This should match the order
// the particular transaction emitted. This should match the order
// of the transactions delivered in the block itself
repeated ExecTxResult tx_results = 2;
// a list of updates to the validator set. These will reflect the validator set at current height + 2.

View File

@ -27,7 +27,7 @@ message DominoOp {
}
// ProofOp defines an operation used for calculating Merkle root
// The data could be arbitrary format, providing nessecary data
// The data could be arbitrary format, providing necessary data
// for example neighbouring node hash
message ProofOp {
string type = 1;

View File

@ -33,5 +33,5 @@ type ABCI interface {
ListSnapshots(*abci.RequestListSnapshots) (*abci.ResponseListSnapshots, error) // List available snapshots
OfferSnapshot(*abci.RequestOfferSnapshot) (*abci.ResponseOfferSnapshot, error) // Offer a snapshot to the application
LoadSnapshotChunk(*abci.RequestLoadSnapshotChunk) (*abci.ResponseLoadSnapshotChunk, error) // Load a snapshot chunk
ApplySnapshotChunk(*abci.RequestApplySnapshotChunk) (*abci.ResponseApplySnapshotChunk, error) // Apply a shapshot chunk
ApplySnapshotChunk(*abci.RequestApplySnapshotChunk) (*abci.ResponseApplySnapshotChunk, error) // Apply a snapshot chunk
}

View File

@ -92,7 +92,7 @@ func (s *KeeperTestSuite) TestUpdateParams() {
},
},
expectErr: true,
expErrMsg: "invalid SECK256k1 signature verification cost",
expErrMsg: "invalid SECP256k1 signature verification cost",
},
}

View File

@ -80,7 +80,7 @@ func validateSigVerifyCostSecp256k1(i any) error {
}
if v == 0 {
return fmt.Errorf("invalid SECK256k1 signature verification cost: %d", v)
return fmt.Errorf("invalid SECP256k1 signature verification cost: %d", v)
}
return nil

View File

@ -29,8 +29,8 @@ func TestParams_Validate(t *testing.T) {
types.DefaultSigVerifyCostED25519, types.DefaultSigVerifyCostSecp256k1), fmt.Errorf("invalid tx signature limit: 0")},
{"invalid ED25519 signature verification cost", types.NewParams(types.DefaultMaxMemoCharacters, types.DefaultTxSigLimit, types.DefaultTxSizeCostPerByte,
0, types.DefaultSigVerifyCostSecp256k1), fmt.Errorf("invalid ED25519 signature verification cost: 0")},
{"invalid SECK256k1 signature verification cost", types.NewParams(types.DefaultMaxMemoCharacters, types.DefaultTxSigLimit, types.DefaultTxSizeCostPerByte,
types.DefaultSigVerifyCostED25519, 0), fmt.Errorf("invalid SECK256k1 signature verification cost: 0")},
{"invalid SECP256k1 signature verification cost", types.NewParams(types.DefaultMaxMemoCharacters, types.DefaultTxSigLimit, types.DefaultTxSizeCostPerByte,
types.DefaultSigVerifyCostED25519, 0), fmt.Errorf("invalid SECP256k1 signature verification cost: 0")},
{"invalid max memo characters", types.NewParams(0, types.DefaultTxSigLimit, types.DefaultTxSizeCostPerByte,
types.DefaultSigVerifyCostED25519, types.DefaultSigVerifyCostSecp256k1), fmt.Errorf("invalid max memo characters: 0")},
{"invalid tx size cost per byte", types.NewParams(types.DefaultMaxMemoCharacters, types.DefaultTxSigLimit, 0,