From 3b039e9fa584d2caad3425de413507e7c60cb7cd Mon Sep 17 00:00:00 2001 From: teor Date: Mon, 9 Dec 2024 17:00:56 +1000 Subject: [PATCH] Fix typos --- crates/pallet-domains/src/block_tree.rs | 2 +- crates/pallet-domains/src/tests.rs | 2 +- crates/sp-domains-fraud-proof/src/fraud_proof.rs | 8 ++++---- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/crates/pallet-domains/src/block_tree.rs b/crates/pallet-domains/src/block_tree.rs index 02dbe764d3..6c0294c21f 100644 --- a/crates/pallet-domains/src/block_tree.rs +++ b/crates/pallet-domains/src/block_tree.rs @@ -598,7 +598,7 @@ pub(crate) fn prune_receipt( // If the pruned ER is the operator's `latest_submitted_er` for this domain, it means either: // // - All the ER the operator submitted for this domain are confirmed and pruned, so the operator - // can't be targetted by fraud proof later unless it submit other new ERs. + // can't be targeted by fraud proof later unless it submit other new ERs. // // - All the bad ER the operator submitted for this domain are pruned and the operator is already // slashed, so wwe don't need `LatestSubmittedER` to determine if the operator is pending slash. diff --git a/crates/pallet-domains/src/tests.rs b/crates/pallet-domains/src/tests.rs index 1a691b70f4..2459685bd7 100644 --- a/crates/pallet-domains/src/tests.rs +++ b/crates/pallet-domains/src/tests.rs @@ -777,7 +777,7 @@ fn test_basic_fraud_proof_processing() { for block_number in bad_receipt_at..=head_domain_number { if block_number == bad_receipt_at { - // The targetted ER should be removed from the block tree + // The targeted ER should be removed from the block tree assert!(BlockTree::::get(domain_id, block_number).is_none()); } else { // All the bad ER's descendants should be marked as pending to prune and the submitter diff --git a/crates/sp-domains-fraud-proof/src/fraud_proof.rs b/crates/sp-domains-fraud-proof/src/fraud_proof.rs index eb7a397e14..646d0e7fe7 100644 --- a/crates/sp-domains-fraud-proof/src/fraud_proof.rs +++ b/crates/sp-domains-fraud-proof/src/fraud_proof.rs @@ -320,13 +320,13 @@ pub struct FraudProof { pub domain_id: DomainId, /// Hash of the bad receipt this fraud proof targeted pub bad_receipt_hash: HeaderHashFor, - /// The MMR proof for the consensus state root that used to verify the storage proof + /// The MMR proof for the consensus state root that is used to verify the storage proof /// - /// It is set `None` if the specific fraud proof variant doesn't contains storage proof + /// It is set `None` if the specific fraud proof variant doesn't contain a storage proof pub maybe_mmr_proof: Option>, /// The domain runtime code storage proof /// - /// It is set `None` if the specific fraud proof variant doesn't required domain runtime code + /// It is set `None` if the specific fraud proof variant doesn't require domain runtime code /// or the required domain runtime code is available from the current runtime state. pub maybe_domain_runtime_code_proof: Option>, /// The specific fraud proof variant @@ -485,7 +485,7 @@ pub struct InvalidStateTransitionProof { /// Fraud proof for the valid bundles in `ExecutionReceipt::inboxed_bundles` #[derive(Clone, Debug, Decode, Encode, Eq, PartialEq, TypeInfo)] pub struct ValidBundleProof { - /// The targetted bundle with proof + /// The targeted bundle with proof pub bundle_with_proof: OpaqueBundleWithProof, }