diff --git a/accounts/abi/bind/v2/dep_tree_test.go b/accounts/abi/bind/v2/dep_tree_test.go index e686e3fec4..ec4759183a 100644 --- a/accounts/abi/bind/v2/dep_tree_test.go +++ b/accounts/abi/bind/v2/dep_tree_test.go @@ -329,7 +329,7 @@ func TestContractLinking(t *testing.T) { map[rune]struct{}{}, }, // two contracts ('a' and 'f') share some dependencies. contract 'a' is marked as an override. expect that any of - // its depdencies that aren't shared with 'f' are not deployed. + // its dependencies that aren't shared with 'f' are not deployed. linkTestCaseInput{map[rune][]rune{ 'a': {'b', 'c', 'd', 'e'}, 'f': {'g', 'c', 'd', 'h'}}, diff --git a/accounts/abi/bind/v2/internal/contracts/db/contract.sol b/accounts/abi/bind/v2/internal/contracts/db/contract.sol index f24aa8d381..640436182a 100644 --- a/accounts/abi/bind/v2/internal/contracts/db/contract.sol +++ b/accounts/abi/bind/v2/internal/contracts/db/contract.sol @@ -25,7 +25,7 @@ contract DB { if (v == 0) { return _keys.length; } - // Check if a key is being overriden + // Check if a key is being overridden if (_store[k] == 0) { _keys.push(k); _stats.inserts++; diff --git a/cmd/devp2p/internal/ethtest/suite.go b/cmd/devp2p/internal/ethtest/suite.go index 6df899f244..e1bf5daff8 100644 --- a/cmd/devp2p/internal/ethtest/suite.go +++ b/cmd/devp2p/internal/ethtest/suite.go @@ -174,7 +174,7 @@ to check if the node disconnects after receiving multiple invalid requests.`) }, } - // Send request 10 times. Some clients are lient on the first few invalids. + // Send request 10 times. Some clients are client on the first few invalids. for i := 0; i < 10; i++ { badReq.RequestId = uint64(i) if err := conn.Write(ethProto, eth.GetBlockHeadersMsg, badReq); err != nil { @@ -541,7 +541,7 @@ func (s *Suite) TestBlockRangeUpdateInvalid(t *utesting.T) { func (s *Suite) TestBlockRangeUpdateFuture(t *utesting.T) { t.Log(`This test sends a BlockRangeUpdate that is beyond the chain head. -The node should accept the update and should not disonnect.`) +The node should accept the update and should not disconnect.`) conn, err := s.dialAndPeer(nil) if err != nil { t.Fatal(err) @@ -577,7 +577,7 @@ The node should accept the update and should not disonnect.`) func (s *Suite) TestBlockRangeUpdateHistoryExp(t *utesting.T) { t.Log(`This test sends a BlockRangeUpdate announcing incomplete (expired) history. -The node should accept the update and should not disonnect.`) +The node should accept the update and should not disconnect.`) conn, err := s.dialAndPeer(nil) if err != nil { t.Fatal(err) diff --git a/core/rawdb/accessors_indexes.go b/core/rawdb/accessors_indexes.go index f71bbb500b..9f8030d4eb 100644 --- a/core/rawdb/accessors_indexes.go +++ b/core/rawdb/accessors_indexes.go @@ -559,7 +559,7 @@ func DeleteBlockLvPointers(db ethdb.KeyValueStore, blocks common.Range[uint64], } // FilterMapsRange is a storage representation of the block range covered by the -// filter maps structure and the corresponting log value index range. +// filter maps structure and the corresponding log value index range. type FilterMapsRange struct { Version uint32 HeadIndexed bool diff --git a/core/rawdb/database.go b/core/rawdb/database.go index f38c1dfc1a..c8508cc5e4 100644 --- a/core/rawdb/database.go +++ b/core/rawdb/database.go @@ -448,7 +448,7 @@ func Open(db ethdb.KeyValueStore, opts OpenOptions) (ethdb.Database, error) { // If the genesis hash is empty, we have a new key-value store, so nothing to // validate in this method. If, however, the genesis hash is not nil, compare // it to the freezer content. - // Only to check the followings when offset/ancientTail equal to 0, otherwise the block number + // Only to check the following when offset/ancientTail equal to 0, otherwise the block number // in ancientdb did not start with 0, no genesis block in ancientdb as well. ancientTail, err := frdb.Tail() if err != nil { @@ -1056,7 +1056,7 @@ func ReadChainMetadata(db ethdb.Reader) [][]string { // is periodically called and if it returns an error then SafeDeleteRange // stops and also returns that error. The callback is not called if native // range delete is used or there are a small number of keys only. The bool -// argument passed to the callback is true if enrties have actually been +// argument passed to the callback is true if entries have actually been // deleted already. func SafeDeleteRange(db ethdb.KeyValueStore, start, end []byte, hashScheme bool, stopCallback func(bool) bool) error { if !hashScheme { diff --git a/core/txpool/blobpool/lookup.go b/core/txpool/blobpool/lookup.go index 7607cd487a..2911d696d2 100644 --- a/core/txpool/blobpool/lookup.go +++ b/core/txpool/blobpool/lookup.go @@ -21,7 +21,7 @@ import ( ) type txMetadata struct { - id uint64 // the billy id of transction + id uint64 // the billy id of transaction size uint64 // the RLP encoded size of transaction (blobs are included) } diff --git a/core/txpool/legacypool/legacypool_test.go b/core/txpool/legacypool/legacypool_test.go index 702fefe18b..22193df477 100644 --- a/core/txpool/legacypool/legacypool_test.go +++ b/core/txpool/legacypool/legacypool_test.go @@ -2520,7 +2520,7 @@ func TestSetCodeTransactions(t *testing.T) { if err := pool.addRemoteSync(pricedSetCodeTx(0, 250000, uint256.NewInt(3000), uint256.NewInt(300), keyA, []unsignedAuth{{0, keyC}})); err != nil { t.Fatalf("%s: failed to add with remote setcode transaction: %v", name, err) } - // B should not be considred as having an in-flight delegation, so + // B should not be considered as having an in-flight delegation, so // should allow more than one pooled transaction. if err := pool.addRemoteSync(pricedTransaction(0, 100000, big.NewInt(10), keyB)); err != nil { t.Fatalf("%s: failed to replace with remote transaction: %v", name, err) diff --git a/tests/fuzzers/bn256/bn256_fuzz.go b/tests/fuzzers/bn256/bn256_fuzz.go index d53bdbb4b9..542eea46b1 100644 --- a/tests/fuzzers/bn256/bn256_fuzz.go +++ b/tests/fuzzers/bn256/bn256_fuzz.go @@ -184,7 +184,7 @@ func fuzzUnmarshalG1(input []byte) int { } return 1 } else { - panic(fmt.Sprintf("error missmatch: cf: %v g: %v gn: %v", errC, errG, errS)) + panic(fmt.Sprintf("error mismatch: cf: %v g: %v gn: %v", errC, errG, errS)) } } @@ -211,7 +211,7 @@ func fuzzUnmarshalG2(input []byte) int { } return 1 } else { - panic(fmt.Sprintf("error missmatch: cf: %v g: %v gn: %v", errC, errG, errS)) + panic(fmt.Sprintf("error mismatch: cf: %v g: %v gn: %v", errC, errG, errS)) } }