Skip to content

Commit

Permalink
chore: fix spelling errors (cosmos#18734)
Browse files Browse the repository at this point in the history
Co-authored-by: github-merge-queue <[email protected]>
Co-authored-by: Julien Robert <[email protected]>
  • Loading branch information
3 people authored Dec 13, 2023
1 parent fe95384 commit 14e261e
Show file tree
Hide file tree
Showing 13 changed files with 16 additions and 14 deletions.
4 changes: 3 additions & 1 deletion .github/.codespellignore
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
cips
pullrequest
keypair
pastTime
pastTime
hasTables
Nam
2 changes: 1 addition & 1 deletion .github/workflows/misspell.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ jobs:
continue-on-error: true
run: |
sudo apt-get install codespell -y
codespell -w --skip="*.pulsar.go,*.pb.go,*.pb.gw.go,*.cosmos_orm.go,*.json,*.git,*.js,crypto/keys,fuzz,*.h" --ignore-words=".github/.codespellignore"
codespell -w --skip="*.pulsar.go,*.pb.go,*.pb.gw.go,*.cosmos_orm.go,*.json,*.git,*.js,crypto/keys,fuzz,*.h,proto/tendermint" --ignore-words=.github/.codespellignore
- uses: peter-evans/create-pull-request@v5
with:
token: ${{ secrets.PRBOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@
<img alt="Imported by" src="https://sourcegraph.com/github.com/cosmos/cosmos-sdk/-/badge.svg" />
</a>
<img alt="Sims" src="https://github.com/cosmos/cosmos-sdk/workflows/Sims/badge.svg" />
<img alt="Lint Satus" src="https://github.com/cosmos/cosmos-sdk/workflows/Lint/badge.svg" />
<img alt="Lint Status" src="https://github.com/cosmos/cosmos-sdk/workflows/Lint/badge.svg" />
</div>

The Cosmos SDK is a framework for building blockchain applications. [CometBFT (BFT Consensus)](https://github.com/cometbft/cometbft) and the Cosmos SDK are written in the Go programming language. Cosmos SDK is used to build [Gaia](https://github.com/cosmos/gaia), the implementation of the Cosmos Hub.
Expand Down
2 changes: 1 addition & 1 deletion client/tx/tx_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ func newTestTxConfig() (client.TxConfig, codec.Codec) {
return authtx.NewTxConfig(codec.NewProtoCodec(encodingConfig.InterfaceRegistry), authtx.DefaultSignModes), encodingConfig.Codec
}

// mockContext is a mock client.Context to return abitrary simulation response, used to
// mockContext is a mock client.Context to return arbitrary simulation response, used to
// unit test CalculateGas.
type mockContext struct {
gasUsed uint64
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
# - A constraint describing the requirements of the law, called "require"
# * Implementations are transliterated into functions that operate as well on
# algebraic input points, and are called once per combination of branches
# exectured. Each execution returns:
# executed. Each execution returns:
# - A constraint describing the assumptions this implementation requires
# (such as Z1=1), called "assumeFormula"
# - A constraint describing the assumptions this specific branch requires,
Expand Down
2 changes: 1 addition & 1 deletion server/types/abci.go
Original file line number Diff line number Diff line change
Expand Up @@ -33,5 +33,5 @@ type ABCI interface {
ListSnapshots(*abci.RequestListSnapshots) (*abci.ResponseListSnapshots, error) // List available snapshots
OfferSnapshot(*abci.RequestOfferSnapshot) (*abci.ResponseOfferSnapshot, error) // Offer a snapshot to the application
LoadSnapshotChunk(*abci.RequestLoadSnapshotChunk) (*abci.ResponseLoadSnapshotChunk, error) // Load a snapshot chunk
ApplySnapshotChunk(*abci.RequestApplySnapshotChunk) (*abci.ResponseApplySnapshotChunk, error) // Apply a shapshot chunk
ApplySnapshotChunk(*abci.RequestApplySnapshotChunk) (*abci.ResponseApplySnapshotChunk, error) // Apply a snapshot chunk
}
2 changes: 1 addition & 1 deletion tools/hubl/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ The chain configuration is stored in `~/.hubl/config.toml`.

:::tip

When using an unsecure gRPC endpoint, change the `insecure` field to `true` in the config file.
When using an insecure gRPC endpoint, change the `insecure` field to `true` in the config file.

```toml
[chains]
Expand Down
2 changes: 1 addition & 1 deletion types/address_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -427,7 +427,7 @@ func (s *addressTestSuite) TestCustomAddressVerifier() {
return fmt.Errorf("incorrect address length %d", n)
})

// Verifiy that the custom logic rejects this 10 byte address
// Verify that the custom logic rejects this 10 byte address
err = types.VerifyAddressFormat(addr)
s.Require().NotNil(err)
_, err = types.AccAddressFromBech32(accBech)
Expand Down
2 changes: 1 addition & 1 deletion x/auth/vesting/autocli.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ timestamp.`,
Use: "create-permanent-locked-account [to_address] [amount]",
Short: "Create a new permanently locked account funded with an allocation of tokens.",
Long: `Create a new account funded with an allocation of permanently locked tokens.
These tokens may be used for staking but are non-transferable. Staking rewards will acrue as liquid and transferable tokens.`,
These tokens may be used for staking but are non-transferable. Staking rewards will accrue as liquid and transferable tokens.`,
PositionalArgs: []*autocliv1.PositionalArgDescriptor{
{ProtoField: "to_address"},
{ProtoField: "amount", Varargs: true},
Expand Down
4 changes: 2 additions & 2 deletions x/authz/keeper/msg_server_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -102,15 +102,15 @@ func (suite *TestSuite) TestGrant() {
{
name: "invalid grant, past time",
malleate: func() *authz.MsgGrant {
pastTime := curBlockTime.Add(-time.Hour)
pTime := curBlockTime.Add(-time.Hour)
grant, err := authz.NewGrant(curBlockTime, banktypes.NewSendAuthorization(coins, nil), &oneHour) // we only need the authorization
suite.Require().NoError(err)
return &authz.MsgGrant{
Granter: granter.String(),
Grantee: grantee.String(),
Grant: authz.Grant{
Authorization: grant.Authorization,
Expiration: &pastTime,
Expiration: &pTime,
},
}
},
Expand Down
2 changes: 1 addition & 1 deletion x/distribution/migrations/v4/migrate_funds_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ func TestFundsMigration(t *testing.T) {
_, err = v4.MigrateFunds(ctx, bankKeeper, feepool, distrAcc, poolAcc)
require.NoError(t, err)

// set distrbution feepool as empty (since migration)
// set distribution feepool as empty (since migration)
err = distrKeeper.FeePool.Set(ctx, disttypes.FeePool{})
require.NoError(t, err)

Expand Down
2 changes: 1 addition & 1 deletion x/gov/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -260,7 +260,7 @@ Since this is more of a social feature than a technical feature, we'll now get i
* In the event of an economic emergency, what should validators do?
* Terra crash of May, 2022, saw validators choose to run a new binary with code that had not been approved by governance, because the governance token had been inflated to nothing.
* What is the purpose of the chain, specifically?
* best example of this is the Cosmos hub, where different founding groups, have different interpertations of the purpose of the network.
* best example of this is the Cosmos hub, where different founding groups, have different interpretations of the purpose of the network.

This genesis entry, "constitution" hasn't been designed for existing chains, who should likely just ratify a constitution using their governance system. Instead, this is for new chains. It will allow for validators to have a much clearer idea of purpose and the expecations placed on them while operating their nodes. Likewise, for community members, the constitution will give them some idea of what to expect from both the "chain team" and the validators, respectively.

Expand Down
2 changes: 1 addition & 1 deletion x/tx/decode/decode_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -140,6 +140,6 @@ func TestDecodeTxBodyPanic(t *testing.T) {
t.Fatal("expected a non-nil error")
}
if g, w := err.Error(), "could not consume length prefix"; !strings.Contains(g, w) {
t.Fatalf("error mismatch\n%s\ndoes not contain\n\t%q", g, w)
t.Fatalf("error mismatch\n%s\nodes not contain\n\t%q", g, w)
}
}

0 comments on commit 14e261e

Please sign in to comment.