aptos: fix typos (#3386)

* fix typos

* fix typos

* fix typos
This commit is contained in:
omahs 2023-09-25 22:54:50 +02:00 committed by GitHub
parent c78711e5b5
commit 99d01324b8
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 7 additions and 7 deletions

View File

@ -87,13 +87,13 @@ module token_bridge::register_chain_test {
use token_bridge::token_bridge;
use token_bridge::state;
/// Registration VAA for the etheruem token bridge 0xdeadbeef
/// Registration VAA for the ethereum token bridge 0xdeadbeef
const ETHEREUM_TOKEN_REG: vector<u8> = x"0100000000010015d405c74be6d93c3c33ed6b48d8db70dfb31e0981f8098b2a6c7583083e0c3343d4a1abeb3fc1559674fa067b0c0e2e9de2fafeaecdfeae132de2c33c9d27cc0100000001000000010001000000000000000000000000000000000000000000000000000000000000000400000000016911ae00000000000000000000000000000000000000000000546f6b656e427269646765010000000200000000000000000000000000000000000000000000000000000000deadbeef";
/// Another registration VAA for the ethereum token bridge, 0xbeefface
const ETHEREUM_TOKEN_REG_2:vector<u8> = x"01000000000100c2157fa1c14957dff26d891e4ad0d993ad527f1d94f603e3d2bb1e37541e2fbe45855ffda1efc7eb2eb24009a1585fa25a267815db97e4a9d4a5eb31987b5fb40100000001000000010001000000000000000000000000000000000000000000000000000000000000000400000000017ca43300000000000000000000000000000000000000000000546f6b656e427269646765010000000200000000000000000000000000000000000000000000000000000000beefface";
/// Registration VAA for the etheruem NFT bridge 0xdeadbeef
/// Registration VAA for the ethereum NFT bridge 0xdeadbeef
const ETHEREUM_NFT_REG: vector<u8> = x"0100000000010066cce2cb12d88c97d4975cba858bb3c35d6430003e97fced46a158216f3ca01710fd16cc394441a08fef978108ed80c653437f43bb2ca039226974d9512298b10000000001000000010001000000000000000000000000000000000000000000000000000000000000000400000000018483540000000000000000000000000000000000000000000000004e4654427269646765010000000200000000000000000000000000000000000000000000000000000000deadbeef";
const ETH_ID: u64 = 2;

View File

@ -150,7 +150,7 @@ module token_bridge::transfer_tokens {
transfer_tokens_internal(coins, relayer_fee)
}
// transfer a native or wraped token from sender to token_bridge
// transfer a native or wrapped token from sender to token_bridge
fun transfer_tokens_internal<CoinType>(
coins: Coin<CoinType>,
relayer_fee: u64,
@ -219,7 +219,7 @@ module token_bridge::transfer_tokens_test {
use wrapped_coin::coin::T;
/// Registration VAA for the etheruem token bridge 0xdeadbeef
/// Registration VAA for the ethereum token bridge 0xdeadbeef
/// +------------------------------------------------------------------------------+
/// | Wormhole VAA v1 | nonce: 1 | time: 1 |
/// | guardian set #0 | #23663022 | consistency: 0 |
@ -274,7 +274,7 @@ module token_bridge::transfer_tokens_test {
deployer: &signer,
) {
// we initialise the bridge with zero fees to avoid having to mint fee
// tokens in these tests. The wormolhe fee handling is already tested
// tokens in these tests. The wormhole fee handling is already tested
// in wormhole.move, so it's unnecessary here.
let (burn_cap, mint_cap) = aptos_coin::initialize_for_test(aptos_framework);
wormhole::wormhole_test::setup(0);

View File

@ -165,7 +165,7 @@ module token_bridge::wrapped_test {
use wrapped_coin::coin::T;
use wormhole::external_address::{Self};
/// Registration VAA for the etheruem token bridge 0xdeadbeef
/// Registration VAA for the ethereum token bridge 0xdeadbeef
const ETHEREUM_TOKEN_REG: vector<u8> = x"0100000000010015d405c74be6d93c3c33ed6b48d8db70dfb31e0981f8098b2a6c7583083e0c3343d4a1abeb3fc1559674fa067b0c0e2e9de2fafeaecdfeae132de2c33c9d27cc0100000001000000010001000000000000000000000000000000000000000000000000000000000000000400000000016911ae00000000000000000000000000000000000000000000546f6b656e427269646765010000000200000000000000000000000000000000000000000000000000000000deadbeef";
/// Attestation VAA sent from the ethereum token bridge 0xdeadbeef
@ -211,7 +211,7 @@ module token_bridge::wrapped_test {
// This test ensures that I can't take a valid attestation VAA and trick the
// token bridge to register my own type. I think what that could lead to is
// a denial of service in case the 3rd party type is belongs to a module
// a denial of service in case the 3rd party type belongs to a module
// with an 'arbitrary' upgrade policy which can be deleted in the future.
// This upgrade policy is not enabled in the VM as of writing, but that
// might well change in the future, so we future proof ourselves here.