diff --git a/go.sum b/go.sum index f0edf1105d43..47b689e60e3b 100644 --- a/go.sum +++ b/go.sum @@ -989,6 +989,7 @@ github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB8 github.com/prometheus/common v0.14.0/go.mod h1:U+gB1OBLb1lF3O42bTCL+FK18tX9Oar16Clt/msog/s= github.com/prometheus/common v0.15.0/go.mod h1:U+gB1OBLb1lF3O42bTCL+FK18tX9Oar16Clt/msog/s= github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc= +github.com/prometheus/common v0.30.0/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls= github.com/prometheus/common v0.31.1 h1:d18hG4PkHnNAKNMOmFuXFaiY8Us0nird/2m60uS1AMs= github.com/prometheus/common v0.31.1/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls= github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk= diff --git a/x/auth/middleware/basic.go b/x/auth/middleware/basic.go index 04ea10bf416e..e0430030d192 100644 --- a/x/auth/middleware/basic.go +++ b/x/auth/middleware/basic.go @@ -295,6 +295,7 @@ func (cgts consumeTxSizeGasTxHandler) simulateSigGasCost(ctx context.Context, tx return nil } +// nolint:unparam func (cgts consumeTxSizeGasTxHandler) consumeTxSizeGas(ctx context.Context, tx sdk.Tx, txBytes []byte, simulate bool) error { sdkCtx := sdk.UnwrapSDKContext(ctx) params := cgts.ak.GetParams(sdkCtx) diff --git a/x/auth/middleware/sigverify.go b/x/auth/middleware/sigverify.go index 9ae464932684..65044d7a119b 100644 --- a/x/auth/middleware/sigverify.go +++ b/x/auth/middleware/sigverify.go @@ -508,30 +508,30 @@ func (svm sigVerificationTxHandler) sigVerify(ctx context.Context, tx sdk.Tx, is } // CheckTx implements tx.Handler.CheckTx. -func (svd sigVerificationTxHandler) CheckTx(ctx context.Context, tx sdk.Tx, req abci.RequestCheckTx) (abci.ResponseCheckTx, error) { - if err := svd.sigVerify(ctx, tx, req.Type == abci.CheckTxType_Recheck, false); err != nil { +func (svm sigVerificationTxHandler) CheckTx(ctx context.Context, tx sdk.Tx, req abci.RequestCheckTx) (abci.ResponseCheckTx, error) { + if err := svm.sigVerify(ctx, tx, req.Type == abci.CheckTxType_Recheck, false); err != nil { return abci.ResponseCheckTx{}, err } - return svd.next.CheckTx(ctx, tx, req) + return svm.next.CheckTx(ctx, tx, req) } // DeliverTx implements tx.Handler.DeliverTx. -func (svd sigVerificationTxHandler) DeliverTx(ctx context.Context, tx sdk.Tx, req abci.RequestDeliverTx) (abci.ResponseDeliverTx, error) { - if err := svd.sigVerify(ctx, tx, false, false); err != nil { +func (svm sigVerificationTxHandler) DeliverTx(ctx context.Context, tx sdk.Tx, req abci.RequestDeliverTx) (abci.ResponseDeliverTx, error) { + if err := svm.sigVerify(ctx, tx, false, false); err != nil { return abci.ResponseDeliverTx{}, err } - return svd.next.DeliverTx(ctx, tx, req) + return svm.next.DeliverTx(ctx, tx, req) } // SimulateTx implements tx.Handler.SimulateTx. -func (svd sigVerificationTxHandler) SimulateTx(ctx context.Context, sdkTx sdk.Tx, req tx.RequestSimulateTx) (tx.ResponseSimulateTx, error) { - if err := svd.sigVerify(ctx, sdkTx, false, true); err != nil { +func (svm sigVerificationTxHandler) SimulateTx(ctx context.Context, sdkTx sdk.Tx, req tx.RequestSimulateTx) (tx.ResponseSimulateTx, error) { + if err := svm.sigVerify(ctx, sdkTx, false, true); err != nil { return tx.ResponseSimulateTx{}, err } - return svd.next.SimulateTx(ctx, sdkTx, req) + return svm.next.SimulateTx(ctx, sdkTx, req) } var _ tx.Handler = incrementSequenceTxHandler{} diff --git a/x/genutil/utils.go b/x/genutil/utils.go index 6806959c6ba9..251b0f398f0b 100644 --- a/x/genutil/utils.go +++ b/x/genutil/utils.go @@ -12,7 +12,6 @@ import ( tmed25519 "github.com/tendermint/tendermint/crypto/ed25519" tmos "github.com/tendermint/tendermint/libs/os" "github.com/tendermint/tendermint/privval" - "github.com/tendermint/tendermint/types" tmtypes "github.com/tendermint/tendermint/types" cryptocodec "github.com/cosmos/cosmos-sdk/crypto/codec" @@ -61,7 +60,7 @@ func InitializeNodeValidatorFilesFromMnemonic(config *cfg.Config, mnemonic strin if len(mnemonic) > 0 && !bip39.IsMnemonicValid(mnemonic) { return "", nil, fmt.Errorf("invalid mnemonic") } - nodeKey, err := types.LoadOrGenNodeKey(config.NodeKeyFile()) + nodeKey, err := tmtypes.LoadOrGenNodeKey(config.NodeKeyFile()) if err != nil { return "", nil, err }