docs: correct spelling errors across multiple packages (#24988)
This commit is contained in:
parent
39bec15523
commit
c047bf741c
@ -221,7 +221,7 @@ func (kv kvStore) Prefix(prefix []byte) storetypes.KVStore {
|
||||
}
|
||||
|
||||
func (kv kvStore) Gas(meter storetypes.GasMeter, config storetypes.GasConfig) storetypes.KVStore {
|
||||
panic("not implmeneted")
|
||||
panic("not implemented")
|
||||
}
|
||||
|
||||
func (kv kvStore) Iterator(start, end []byte) storetypes.Iterator {
|
||||
|
||||
@ -969,7 +969,7 @@ func testnetify(ctx *Context, testnetAppCreator types.AppCreator, db dbm.DB, tra
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Modfiy Validators stateDB entry.
|
||||
// Modify Validators stateDB entry.
|
||||
err = stateDB.Set(fmt.Appendf(nil, "validatorsKey:%v", blockStore.Height()), buf)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
|
||||
@ -33,5 +33,5 @@ type ABCI interface {
|
||||
ListSnapshots(*abci.ListSnapshotsRequest) (*abci.ListSnapshotsResponse, error) // List available snapshots
|
||||
OfferSnapshot(*abci.OfferSnapshotRequest) (*abci.OfferSnapshotResponse, error) // Offer a snapshot to the application
|
||||
LoadSnapshotChunk(*abci.LoadSnapshotChunkRequest) (*abci.LoadSnapshotChunkResponse, error) // Load a snapshot chunk
|
||||
ApplySnapshotChunk(*abci.ApplySnapshotChunkRequest) (*abci.ApplySnapshotChunkResponse, error) // Apply a shapshot chunk
|
||||
ApplySnapshotChunk(*abci.ApplySnapshotChunkRequest) (*abci.ApplySnapshotChunkResponse, error) // Apply a snapshot chunk
|
||||
}
|
||||
|
||||
@ -45,7 +45,7 @@ func (s *GRPCQueryTestSuite) SetupSuite() {
|
||||
s.Require().NoError(s.network.WaitForNextBlock())
|
||||
}
|
||||
|
||||
// TearDownSuite cleans up the curret test network after _each_ test.
|
||||
// TearDownSuite cleans up the current test network after _each_ test.
|
||||
func (s *GRPCQueryTestSuite) TearDownSuite() {
|
||||
s.T().Log("tearing down grpc e2e test suite")
|
||||
s.network.Cleanup()
|
||||
|
||||
@ -123,7 +123,7 @@ func (s *E2ETestSuite) SetupSuite() {
|
||||
s.Require().NoError(s.network.WaitForNextBlock())
|
||||
}
|
||||
|
||||
// TearDownSuite cleans up the curret test network after _each_ test.
|
||||
// TearDownSuite cleans up the current test network after _each_ test.
|
||||
func (s *E2ETestSuite) TearDownSuite() {
|
||||
s.T().Log("tearing down e2e test suite1")
|
||||
s.network.Cleanup()
|
||||
|
||||
@ -46,7 +46,7 @@ func (s *WithdrawAllTestSuite) SetupSuite() {
|
||||
s.Require().NoError(s.network.WaitForNextBlock())
|
||||
}
|
||||
|
||||
// TearDownSuite cleans up the curret test network after _each_ test.
|
||||
// TearDownSuite cleans up the current test network after _each_ test.
|
||||
func (s *WithdrawAllTestSuite) TearDownSuite() {
|
||||
s.T().Log("tearing down withdraw all e2e test suite")
|
||||
s.network.Cleanup()
|
||||
|
||||
@ -645,7 +645,7 @@ func TestApplyAndReturnValidatorSetUpdatesInserted(t *testing.T) {
|
||||
validators[1] = keeper.TestingUpdateValidator(f.stakingKeeper, f.sdkCtx, validators[1], false)
|
||||
applyValidatorSetUpdates(t, f.sdkCtx, f.stakingKeeper, 2)
|
||||
|
||||
// test validtor added at the beginning
|
||||
// test validator added at the beginning
|
||||
// tendermintUpdate set: {} -> {c0}
|
||||
assert.NilError(t, f.stakingKeeper.SetValidator(f.sdkCtx, validators[2]))
|
||||
assert.NilError(t, f.stakingKeeper.SetValidatorByPowerIndex(f.sdkCtx, validators[2]))
|
||||
@ -655,7 +655,7 @@ func TestApplyAndReturnValidatorSetUpdatesInserted(t *testing.T) {
|
||||
validators[2], _ = f.stakingKeeper.GetValidator(f.sdkCtx, val2bz)
|
||||
assert.DeepEqual(t, validators[2].ABCIValidatorUpdate(f.stakingKeeper.PowerReduction(f.sdkCtx)), updates[0])
|
||||
|
||||
// test validtor added at the beginning
|
||||
// test validator added at the beginning
|
||||
// tendermintUpdate set: {} -> {c0}
|
||||
assert.NilError(t, f.stakingKeeper.SetValidator(f.sdkCtx, validators[3]))
|
||||
assert.NilError(t, f.stakingKeeper.SetValidatorByPowerIndex(f.sdkCtx, validators[3]))
|
||||
@ -665,7 +665,7 @@ func TestApplyAndReturnValidatorSetUpdatesInserted(t *testing.T) {
|
||||
validators[3], _ = f.stakingKeeper.GetValidator(f.sdkCtx, val3bz)
|
||||
assert.DeepEqual(t, validators[3].ABCIValidatorUpdate(f.stakingKeeper.PowerReduction(f.sdkCtx)), updates[0])
|
||||
|
||||
// test validtor added at the end
|
||||
// test validator added at the end
|
||||
// tendermintUpdate set: {} -> {c0}
|
||||
assert.NilError(t, f.stakingKeeper.SetValidator(f.sdkCtx, validators[4]))
|
||||
assert.NilError(t, f.stakingKeeper.SetValidatorByPowerIndex(f.sdkCtx, validators[4]))
|
||||
|
||||
@ -641,7 +641,7 @@ func (ca ConsAddress) String() string {
|
||||
}
|
||||
|
||||
// Bech32ifyAddressBytes returns a bech32 representation of address bytes.
|
||||
// Returns an empty sting if the byte slice is 0-length. Returns an error if the bech32 conversion
|
||||
// Returns an empty string if the byte slice is 0-length. Returns an error if the bech32 conversion
|
||||
// fails or the prefix is empty.
|
||||
func Bech32ifyAddressBytes(prefix string, bs []byte) (string, error) {
|
||||
if len(bs) == 0 {
|
||||
@ -654,7 +654,7 @@ func Bech32ifyAddressBytes(prefix string, bs []byte) (string, error) {
|
||||
}
|
||||
|
||||
// MustBech32ifyAddressBytes returns a bech32 representation of address bytes.
|
||||
// Returns an empty sting if the byte slice is 0-length. It panics if the bech32 conversion
|
||||
// Returns an empty string if the byte slice is 0-length. It panics if the bech32 conversion
|
||||
// fails or the prefix is empty.
|
||||
func MustBech32ifyAddressBytes(prefix string, bs []byte) string {
|
||||
s, err := Bech32ifyAddressBytes(prefix, bs)
|
||||
|
||||
Loading…
Reference in New Issue
Block a user