Skip to content

Commit

Permalink
Merge pull request #3392 from tomasandroil/fix/fix
Browse files Browse the repository at this point in the history
Improve Code Readability by Correcting Minor Text Issues
  • Loading branch information
teor2345 authored Feb 19, 2025
2 parents a339bf2 + f301807 commit 1fb4f41
Show file tree
Hide file tree
Showing 3 changed files with 7 additions and 7 deletions.
4 changes: 2 additions & 2 deletions crates/pallet-domains/src/benchmarking.rs
Original file line number Diff line number Diff line change
Expand Up @@ -234,7 +234,7 @@ mod benchmarks {

assert_eq!(
PendingSlashes::<T>::get(domain_id)
.expect("pedning slash must exist")
.expect("pending slash must exist")
.len(),
n as usize
);
Expand Down Expand Up @@ -304,7 +304,7 @@ mod benchmarks {
if s != 0 {
assert_eq!(
PendingSlashes::<T>::get(domain_id)
.expect("pedning slash must exist")
.expect("pending slash must exist")
.len(),
s as usize
);
Expand Down
6 changes: 3 additions & 3 deletions crates/sp-domains-fraud-proof/src/verification.rs
Original file line number Diff line number Diff line change
Expand Up @@ -161,7 +161,7 @@ where
// - block_fees transaction_byte_fee_extrinsic
// - domain_sudo extrinsic
// Since we use `push_front`, the extrinsics should be pushed in reverse order.
// TODO: this will not be valid once we have a different runtime. To achive consistency across
// TODO: this will not be valid once we have a different runtime. To achieve consistency across
// domains, we should define a runtime api for each domain, which orders the extrinsics the
// same way the inherents are derived while the domain block is being built.

Expand Down Expand Up @@ -610,7 +610,7 @@ where
)?;
let bundle_extrinsic_root = targeted_invalid_bundle_entry.extrinsics_root;

// Verify the bundle proof so in following we can use the bundle dirctly
// Verify the bundle proof so in following we can use the bundle directly
match proof_data {
InvalidBundlesProofData::Bundle(bundle_with_proof)
| InvalidBundlesProofData::BundleAndExecution {
Expand All @@ -625,7 +625,7 @@ where
InvalidBundlesProofData::InvalidXDMProofData { .. } => {}
}

// Fast path to check if the fraud proof is targetting a bad receipt that claim a non-exist extrinsic
// Fast path to check if the fraud proof is targeting a bad receipt that claim a non-exist extrinsic
// is invalid
if let Some(invalid_extrinsic_index) = targeted_invalid_bundle_entry.invalid_extrinsic_index() {
if let InvalidBundlesProofData::Bundle(bundle_with_proof) = proof_data {
Expand Down
4 changes: 2 additions & 2 deletions crates/subspace-networking/src/node.rs
Original file line number Diff line number Diff line change
Expand Up @@ -326,7 +326,7 @@ impl Node {
Ok(result_receiver)
}

/// Subcribe to some topic on the DSN.
/// Subscribe to some topic on the DSN.
pub async fn subscribe(&self, topic: Sha256Topic) -> Result<TopicSubscription, SubscribeError> {
let permit = self.shared.rate_limiter.acquire_permit().await;
let (result_sender, result_receiver) = oneshot::channel();
Expand Down Expand Up @@ -354,7 +354,7 @@ impl Node {
})
}

/// Subcribe a messgo to some topic on the DSN.
/// Subscribe a messgo to some topic on the DSN.
pub async fn publish(&self, topic: Sha256Topic, message: Vec<u8>) -> Result<(), PublishError> {
let _permit = self.shared.rate_limiter.acquire_permit().await;
let (result_sender, result_receiver) = oneshot::channel();
Expand Down

0 comments on commit 1fb4f41

Please sign in to comment.