Skip to content

Commit

Permalink
minor: fix all spelling in x folder (quicksilver-zone#1534)
Browse files Browse the repository at this point in the history
  • Loading branch information
pysel authored May 1, 2024
1 parent edb7463 commit 7e3507f
Show file tree
Hide file tree
Showing 10 changed files with 17 additions and 17 deletions.
2 changes: 1 addition & 1 deletion x/airdrop/keeper/proposal_handler.go
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ func HandleRegisterZoneDropProposal(ctx sdk.Context, k *Keeper, p *types.Registe
}

if cr.ChainId != p.ZoneDrop.ChainId {
return fmt.Errorf("invalid zonedrop proposal claim record [%d]: chainID missmatch, expected %q got %q", i, p.ZoneDrop.ChainId, cr.ChainId)
return fmt.Errorf("invalid zonedrop proposal claim record [%d]: chainID mismatch, expected %q got %q", i, p.ZoneDrop.ChainId, cr.ChainId)
}

sumMax += cr.MaxAllocation
Expand Down
2 changes: 1 addition & 1 deletion x/interchainstaking/keeper/callbacks.go
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,7 @@ func ValsetCallback(k *Keeper, ctx sdk.Context, args []byte, query icqtypes.Quer
}

func ValidatorCallback(k *Keeper, ctx sdk.Context, args []byte, query icqtypes.Query) error {
zone, found := k.GetZone(ctx, query.GetChainId()) // cant we get rid of this check?
zone, found := k.GetZone(ctx, query.GetChainId()) // can't we get rid of this check?
if !found {
return fmt.Errorf("no registered zone for chain id: %s", query.GetChainId())
}
Expand Down
2 changes: 1 addition & 1 deletion x/interchainstaking/keeper/proposal_handler.go
Original file line number Diff line number Diff line change
Expand Up @@ -224,7 +224,7 @@ func (k *Keeper) HandleUpdateZoneProposal(ctx sdk.Context, p *types.UpdateZonePr
return errors.New("unexpected connection format")
}
if zone.DepositAddress != nil || zone.DelegationAddress != nil || zone.PerformanceAddress != nil || zone.WithdrawalAddress != nil {
return errors.New("zone already intialised, cannot update connection_id")
return errors.New("zone already initialised, cannot update connection_id")
}
if k.BankKeeper.GetSupply(ctx, zone.LocalDenom).Amount.IsPositive() {
return errors.New("zone has assets minted, cannot update connection_id without potentially losing assets")
Expand Down
4 changes: 2 additions & 2 deletions x/interchainstaking/keeper/proposal_handler_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -351,7 +351,7 @@ func (suite *KeeperTestSuite) TestHandleUpdateZoneProposal() {
},
},
{
name: "invalid - zone intialised",
name: "invalid - zone initialised",
setup: func(ctx sdk.Context, quicksilver *app.Quicksilver) {
proposal := &icstypes.RegisterZoneProposal{
Title: "register zone A",
Expand Down Expand Up @@ -379,7 +379,7 @@ func (suite *KeeperTestSuite) TestHandleUpdateZoneProposal() {
quicksilver.IBCKeeper.ConnectionKeeper.SetConnection(ctx, suite.path.EndpointA.ConnectionID, connectiontypes.ConnectionEnd{ClientId: "07-tendermint-0"})
suite.NoError(suite.setupChannelForICA(ctx, suite.chainB.ChainID, suite.path.EndpointA.ConnectionID, "deposit", zone.AccountPrefix))
},
expectErr: "zone already intialised, cannot update connection_id",
expectErr: "zone already initialised, cannot update connection_id",
proposals: func(zone icstypes.Zone) []icstypes.UpdateZoneProposal {
return []icstypes.UpdateZoneProposal{
{
Expand Down
2 changes: 1 addition & 1 deletion x/interchainstaking/keeper/redemptions.go
Original file line number Diff line number Diff line change
Expand Up @@ -325,7 +325,7 @@ func AllocateWithdrawalsFromValidators(
WITHDRAWAL:
for _, hash := range utils.Keys(amountToWithdrawPerWithdrawal) {
for {
// if amountToWithdrawPerWithdrawal has been satisified, then continue.
// if amountToWithdrawPerWithdrawal has been satisfied, then continue.
if amountToWithdrawPerWithdrawal[hash].IsZero() {
continue WITHDRAWAL
}
Expand Down
2 changes: 1 addition & 1 deletion x/interchainstaking/keeper/withdrawal_record.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ func (k *Keeper) InitWithdrawalRecordSequence(ctx sdk.Context) {
store.Set(types.KeyPrefixRequeuedWithdrawalRecordSeq, bz)
}

// GetNextWithdrawalRecordSequence returns and increments the global withdrawal record seqeuence.
// GetNextWithdrawalRecordSequence returns and increments the global withdrawal record sequence.
func (k *Keeper) GetNextWithdrawalRecordSequence(ctx sdk.Context) uint64 {
var sequence uint64
store := ctx.KVStore(k.storeKey)
Expand Down
8 changes: 4 additions & 4 deletions x/interchainstaking/spec/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -305,7 +305,7 @@ type Delegation struct {
- **DelegationAddress** - the delegator address on the remote zone;
- **ValidatorAddress** - the validator address on the remote zone;
- **Amount** - the amount delegated;
- **Height** - the block height at which the delegation occured;
- **Height** - the block height at which the delegation occurred;
- **RedelegationEnd** - ;

### PortConnectionTuple
Expand Down Expand Up @@ -400,7 +400,7 @@ type MsgSignalIntent struct {

### signal-intent

Signal validator delegation intent by providing a comma seperated string
Signal validator delegation intent by providing a comma separated string
containing a decimal weight and the bech32 validator address.

`quicksilverd signal-intent [chain_id] [delegation_intent]`
Expand Down Expand Up @@ -830,7 +830,7 @@ See [WithdrawalAddress Balances](#withdrawaladdress-balances).

### Queries, Requests & Callbacks

This module registeres the following queries, requests and callbacks.
This module registers the following queries, requests and callbacks.

#### DepositAddress Balances

Expand Down Expand Up @@ -890,7 +890,7 @@ See [x/participationrewards/spec](../../participationrewards/spec/README.md).

#### Validator Set Query

An essential query to ensure that the registred zone state accurately reflects
An essential query to ensure that the registered zone state accurately reflects
the validator set of the remote zone for bonded, unbonded and unbonding
validators.

Expand Down
6 changes: 3 additions & 3 deletions x/participationrewards/keeper/keeper_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -175,7 +175,7 @@ func (suite *KeeperTestSuite) setupTestZones() {
Is_118: true,
WithdrawalAddress: &icstypes.ICAAccount{
Address: withdrawalAddress1,
PortName: suite.chainB.ChainID + ".withrawal",
PortName: suite.chainB.ChainID + ".withdrawal",
WithdrawalAddress: withdrawalAddress1,
},
DustThreshold: math.NewInt(1000000),
Expand All @@ -193,7 +193,7 @@ func (suite *KeeperTestSuite) setupTestZones() {
Is_118: true,
WithdrawalAddress: &icstypes.ICAAccount{
Address: withdrawalAddress2,
PortName: suite.chainA.ChainID + ".withrawal",
PortName: suite.chainA.ChainID + ".withdrawal",
WithdrawalAddress: withdrawalAddress2,
},
DustThreshold: math.NewInt(1000000),
Expand Down Expand Up @@ -334,7 +334,7 @@ func (suite *KeeperTestSuite) setupTestZones() {
},
WithdrawalAddress: &icstypes.ICAAccount{
Address: withdrawalAddress,
PortName: "osmosis-1.withrawal",
PortName: "osmosis-1.withdrawal",
WithdrawalAddress: withdrawalAddress,
},
Is_118: true,
Expand Down
2 changes: 1 addition & 1 deletion x/participationrewards/keeper/protocol_data.go
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ func (k *Keeper) IterateAllProtocolDatas(ctx sdk.Context, fn func(index int64, k
}
}

// AllKeyedProtocolDatas returns a slice containing all protocol datas and their keys from the store.
// AllKeyedProtocolDatas returns a slice containing all protocol data and their keys from the store.
func (k *Keeper) AllKeyedProtocolDatas(ctx sdk.Context) []*types.KeyedProtocolData {
out := make([]*types.KeyedProtocolData, 0)
k.IterateAllProtocolDatas(ctx, func(_ int64, key string, data types.ProtocolData) (stop bool) {
Expand Down
4 changes: 2 additions & 2 deletions x/participationrewards/spec/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -383,7 +383,7 @@ The following is performed at the end of every epoch:
5. Distribute validator selection rewards;
* Calculate qAsset holdings:
1. Obtain qAssets held by account (locally and off-chain via claims / Poof of
Posession);
Possession);
2. Calculate user proportion (cap at 2%);
3. Normalize and distribute allocation;
* Allocate lockup rewards by sending portion to `feeCollector` for distribution
Expand All @@ -397,7 +397,7 @@ The following is performed at the end of every epoch:

### Queries, Requests & Callbacks

This module registeres the following queries, requests and callbacks.
This module registers the following queries, requests and callbacks.

#### Performance Delegation Rewards

Expand Down

0 comments on commit 7e3507f

Please sign in to comment.