docs: fix typos (backport #21514) (#21551)

Co-authored-by: omahs <73983677+omahs@users.noreply.github.com>
This commit is contained in:
mergify[bot] 2024-09-04 22:09:30 +02:00 committed by GitHub
parent c4c0142ef4
commit de345f16d7
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
6 changed files with 7 additions and 7 deletions

View File

@ -76,7 +76,7 @@ When creating a testnet the important part is migrate the validator set from man
}
iterator.Close()
// Remove all valdiators from last validators store
// Remove all validators from last validators store
iterator = app.StakingKeeper.LastValidatorsIterator(ctx)
for ; iterator.Valid(); iterator.Next() {
app.StakingKeeper.LastValidatorPower.Delete(iterator.Key())

View File

@ -61,7 +61,7 @@ It is recommended to implement all validation checks in a separate function that
```go
ValidateMsgA(msg MsgA, now Time, gm GasMeter) error {
if now.Before(msg.Expire) {
return sdkerrrors.ErrInvalidRequest.Wrap("msg expired")
return sdkerrors.ErrInvalidRequest.Wrap("msg expired")
}
gm.ConsumeGas(1000, "signature verification")
return signatureVerificaton(msg.Prover, msg.Data)

View File

@ -906,7 +906,7 @@ func testnetify[T types.Application](ctx *Context, testnetAppCreator types.AppCr
return nil, err
}
// Create ValidatorSet struct containing just our valdiator.
// Create ValidatorSet struct containing just our validator.
newVal := &cmttypes.Validator{
Address: validatorAddress,
PubKey: userPubKey,

View File

@ -48,7 +48,7 @@ func Compose(typ string, subAddresses []Addressable) ([]byte, error) {
a := subAddresses[i].Address()
as[i], err = LengthPrefix(a)
if err != nil {
return nil, fmt.Errorf("not compatible sub-adddress=%v at index=%d [%w]", a, i, err)
return nil, fmt.Errorf("not compatible sub-address=%v at index=%d [%w]", a, i, err)
}
totalLen += len(as[i])
}
@ -67,7 +67,7 @@ func Compose(typ string, subAddresses []Addressable) ([]byte, error) {
// is constructed from a module name and a sequence of derivation keys (at least one
// derivation key must be provided). The derivation keys must be unique
// in the module scope, and is usually constructed from some object id. Example, let's
// a x/dao module, and a new DAO object, it's address would be:
// a x/dao module, and a new DAO object, its address would be:
//
// address.Module(dao.ModuleName, newDAO.ID)
func Module(moduleName string, derivationKeys ...[]byte) []byte {

View File

@ -84,7 +84,7 @@ func (k Keeper) GetAuthority() string {
return k.authority
}
// GetPubkey returns the pubkey from the adddress-pubkey relation
// GetPubkey returns the pubkey from the address-pubkey relation
func (k Keeper) GetPubkey(ctx context.Context, a cryptotypes.Address) (cryptotypes.PubKey, error) {
return k.AddrPubkeyRelation.Get(ctx, a)
}

View File

@ -436,7 +436,7 @@ func (s *KeeperTestSuite) TestMsgEditValidator() {
expErrMsg: "validator does not exist",
},
{
name: "change commmission rate in <24hrs",
name: "change commission rate in <24hrs",
ctx: ctx,
input: &types.MsgEditValidator{
Description: types.Description{