Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: fix some comments #11170

Merged
merged 1 commit into from
Jul 16, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion cl/beacon/beacontest/harness_test_data.yml
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ tests:
hello: worlds
compare:
expr: "actual != expect"
- name: "key order doesnt matter for non literal"
- name: "key order doesn't matter for non literal"
expect:
data:
a: 1
Expand Down
2 changes: 1 addition & 1 deletion cl/beacon/handler/builder.go
Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,7 @@ func (a *ApiHandler) PostEthV1BuilderRegisterValidator(w http.ResponseWriter, r
return nil, beaconhttp.NewEndpointError(http.StatusInternalServerError, err)
}
for _, v := range registerReq {
a.logger.Debug("[Caplin] Registred new validator", "fee_recipient", v.Message.FeeRecipient)
a.logger.Debug("[Caplin] Registered new validator", "fee_recipient", v.Message.FeeRecipient)
}
log.Info("Registered new validator", "count", len(registerReq))
return newBeaconResponse(nil), nil
Expand Down
2 changes: 1 addition & 1 deletion cl/beacon/handler/validator_registration.go
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ func (a *ApiHandler) PostEthV1ValidatorPrepareBeaconProposal(w http.ResponseWrit
return
}
for _, v := range req {
a.logger.Debug("[Caplin] Registred new validator", "index", v.ValidatorIndex, "fee_recipient", v.FeeRecipient.String())
a.logger.Debug("[Caplin] Registered new validator", "index", v.ValidatorIndex, "fee_recipient", v.FeeRecipient.String())
a.validatorParams.SetFeeRecipient(v.ValidatorIndex, v.FeeRecipient)
}
w.WriteHeader(http.StatusOK)
Expand Down
2 changes: 1 addition & 1 deletion cl/beacon/router.go
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ func ListenAndServe(beaconHandler *LayeredBeaconHandler, routerCfg beacon_router
beaconHandler.ArchiveApi.ServeHTTP(w, r)
log.Debug("[Beacon API] Request", "uri", r.URL.String(), "path", r.URL.Path, "time", time.Since(start))
} else {
log.Warn("[Beacon API] Request to unavaiable endpoint, check --beacon.api flag", "uri", r.URL.String(), "path", r.URL.Path)
log.Warn("[Beacon API] Request to unavailable endpoint, check --beacon.api flag", "uri", r.URL.String(), "path", r.URL.Path)
}
})
mux.NotFound(func(w http.ResponseWriter, r *http.Request) {
Expand Down
4 changes: 2 additions & 2 deletions cl/sentinel/httpreqresp/server.go
Original file line number Diff line number Diff line change
Expand Up @@ -77,7 +77,7 @@ func NewRequestHandler(host host.Host) http.HandlerFunc {
if chunks < 1 {
chunks = 1
}
// idk why this would happen, so lets make sure it doesnt. future-proofing from bad input
// idk why this would happen, so lets make sure it doesn't. future-proofing from bad input
if chunks > 512 {
chunks = 512
}
Expand Down Expand Up @@ -116,7 +116,7 @@ func NewRequestHandler(host host.Host) http.HandlerFunc {
http.Error(w, "Read Code: "+err.Error(), http.StatusBadRequest)
return
}
// this is not neccesary, but seems like the right thing to do
// this is not necessary, but seems like the right thing to do
w.Header().Set("CONTENT-TYPE", "application/octet-stream")
w.Header().Set("CONTENT-ENCODING", "snappy/stream")
// add the response code & headers
Expand Down
2 changes: 1 addition & 1 deletion erigon-lib/commitment/hex_patricia_hashed_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -544,7 +544,7 @@ func Test_Cell_EncodeDecode(t *testing.T) {
require.EqualValues(t, first.spk[:], second.spk[:])
require.EqualValues(t, first.h[:], second.h[:])
require.EqualValues(t, first.extension[:first.extLen], second.extension[:second.extLen])
// encode doesnt code Nonce, Balance, CodeHash and Storage
// encode doesn't code Nonce, Balance, CodeHash and Storage
require.EqualValues(t, first.Delete, second.Delete)
}

Expand Down
Loading