fix(typos): correct spelling and wording in Go code and Markdown (#25232)

Co-authored-by: Alex | Interchain Labs <alex@interchainlabs.io>
This commit is contained in:
viktorking7 2025-08-21 21:54:43 +02:00 committed by GitHub
parent f68f131285
commit 6f6bc329d5
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
10 changed files with 13 additions and 13 deletions

View File

@ -22,7 +22,7 @@ func init() {
Fee: 99,
Nested: &testdata.Nested3B{
Id: 3,
Name: "3A this one that one there those oens",
Name: "3A this one that one there those ones",
Age: 4588,
B4: []*testdata.Nested4B{
{

View File

@ -1,5 +1,5 @@
# Deprecated Modules
We maintain depcrecated modules that are no longer supported for backwards compatibility. If users want to
We maintain deprecated modules that are no longer supported for backwards compatibility. If users want to
continue using these modules, we recommend they fork themselves and maintain as ICL will no longer be
updating these modules or supporting them in our Bug Bounty Program.
updating these modules or supporting them in our Bug Bounty Program.

View File

@ -163,7 +163,7 @@ func TestPublicKeyHDPath(t *testing.T) {
require.NoError(t, tmp.ValidateKey())
(&tmp).AssertIsPrivKeyInner()
// in this test we are chekcking if the generated keys are correct and stored in a right path.
// in this test we are checking if the generated keys are correct and stored in a right path.
require.Equal(t,
expectedPubKeys[i], priv.PubKey().String(),
"Is your device using test mnemonic: %s ?", testdata.TestMnemonic)

View File

@ -297,7 +297,7 @@ func (c *container) addNode(provider *providerDescriptor, key *moduleKey) (inter
}
if hasOwnModuleKeyParam {
return nil, fmt.Errorf("%T and %T must not be declared as dependencies on the same provided",
return nil, fmt.Errorf("%T and %T must not be declared as dependencies on the same provider",
ModuleKey{}, OwnModuleKey{})
}

View File

@ -17,7 +17,7 @@ type uintTestSuite struct {
suite.Suite
}
func TestUnitTestSuite(t *testing.T) {
func TestUintTestSuite(t *testing.T) {
suite.Run(t, new(uintTestSuite))
}

View File

@ -130,7 +130,7 @@ type StartCmdOptions struct {
PostSetupStandalone func(svrCtx *Context, clientCtx client.Context, ctx context.Context, g *errgroup.Group) error
// AddFlags add custom flags to start cmd
AddFlags func(cmd *cobra.Command)
// StartCommandHanlder can be used to customize the start command handler
// StartCommandHandler can be used to customize the start command handler
StartCommandHandler func(svrCtx *Context, clientCtx client.Context, appCreator types.AppCreator, inProcessConsensus bool, opts StartCmdOptions) error
}

View File

@ -165,7 +165,7 @@ func InterceptConfigsAndCreateContext(cmd *cobra.Command, customAppConfigTemplat
return serverCtx, nil
}
// CreateSDKLogger creates a the default SDK logger.
// CreateSDKLogger creates the default SDK logger.
// It reads the log level and format from the server context.
func CreateSDKLogger(ctx *Context, out io.Writer) (log.Logger, error) {
var opts []log.Option

View File

@ -123,7 +123,7 @@ func NewSimApp(
//
// authtypes.RandomGenesisAccountsFn(simulation.RandomGenesisAccounts),
//
// For providing a custom a base account type add it below.
// For providing a custom base account type add it below.
// By default the auth module uses authtypes.ProtoBaseAccount().
//
// func() sdk.AccountI { return authtypes.ProtoBaseAccount() },

View File

@ -57,8 +57,8 @@ func (s *configTestSuite) TestConfig_SetFullFundraiserPath() {
config.SetFullFundraiserPath("test/path")
s.Require().Equal("test/path", config.GetFullFundraiserPath())
config.SetFullFundraiserPath("test/poth")
s.Require().Equal("test/poth", config.GetFullFundraiserPath())
config.SetFullFundraiserPath("test/path")
s.Require().Equal("test/path", config.GetFullFundraiserPath())
config.Seal()
s.Require().Panics(func() { config.SetFullFundraiserPath("x/test/path") })

View File

@ -35,7 +35,7 @@ var (
)
func init() {
// This decodes a valid hex string into a sepc256k1Pubkey for use in transaction simulation
// This decodes a valid hex string into a secp256k1Pubkey for use in transaction simulation
bz, _ := hex.DecodeString("035AD6810A47F073553FF30D2FCC7E0D3B1C0B74B61A1AAA2582344037151E143A")
copy(key, bz)
simSecp256k1Pubkey.Key = key
@ -100,7 +100,7 @@ func (spkd SetPubKeyDecorator) AnteHandle(ctx sdk.Context, tx sdk.Tx, simulate b
if err != nil {
return ctx, err
}
// account already has pubkey set,no need to reset
// account already has pubkey set, no need to reset
if acc.GetPubKey() != nil {
continue
}