Skip to content

Commit

Permalink
Fix some comments (#4816)
Browse files Browse the repository at this point in the history
Signed-off-by: yudrywet <yudeyao@yeah.net>
  • Loading branch information
yudrywet committed Apr 15, 2024
1 parent 32c87e9 commit 26932a9
Show file tree
Hide file tree
Showing 5 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion core/committer/txvalidator/v20/validator_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -976,7 +976,7 @@ func TestDynamicCapabilitiesAndMSP(t *testing.T) {
require.Equal(t, 2*mspManagerInvokeCount, v.ChannelResources.(*mocktxvalidator.Support).MSPManagerInvokeCount())
}

// TestLedgerIsNoAvailable simulates and provides a test for following scenario,
// TestLedgerIsNotAvailable simulates and provides a test for following scenario,
// which is based on FAB-535. Test checks the validation path which expects that
// DB won't available while trying to lookup for VSCC from LCCC and therefore
// transaction validation will have to fail. In such case the outcome should be
Expand Down
2 changes: 1 addition & 1 deletion core/common/ccprovider/ccprovider.go
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ type CCInfoFSImpl struct {
GetHasher GetHasher
}

// GetChaincodeFromFS this is a wrapper for hiding package implementation.
// GetChaincode this is a wrapper for hiding package implementation.
// It calls GetChaincodeFromPath with the chaincodeInstallPath
func (cifs *CCInfoFSImpl) GetChaincode(ccNameVersion string) (CCPackage, error) {
return cifs.GetChaincodeFromPath(ccNameVersion, chaincodeInstallPath)
Expand Down
2 changes: 1 addition & 1 deletion msp/mspimpl.go
Original file line number Diff line number Diff line change
Expand Up @@ -748,7 +748,7 @@ var (
// verifyLegacyNameConstraints exercises the name constraint validation rules
// that were part of the certificate verification process in Go 1.14.
//
// If a signing certificate contains a name constratint, the leaf certificate
// If a signing certificate contains a name constraint, the leaf certificate
// does not include SAN extensions, and the leaf's common name looks like a
// host name, the validation would fail with an x509.CertificateInvalidError
// and a rason of x509.NameConstraintsWithoutSANs.
Expand Down
4 changes: 2 additions & 2 deletions protoutil/proputils_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -370,7 +370,7 @@ func TestEnvelope(t *testing.T) {
}

if act2.Response.Status != response.Status {
t.Fatalf("response staus don't match")
t.Fatalf("response status don't match")
return
}
if !bytes.Equal(act2.Response.Payload, response.Payload) {
Expand Down Expand Up @@ -426,7 +426,7 @@ func TestEnvelope(t *testing.T) {
}

if ca.Response.Status != response.Status {
t.Fatalf("response staus don't match")
t.Fatalf("response status don't match")
return
}
if !bytes.Equal(ca.Response.Payload, response.Payload) {
Expand Down
4 changes: 2 additions & 2 deletions protoutil/signeddata.go
Original file line number Diff line number Diff line change
Expand Up @@ -85,9 +85,9 @@ func EnvelopeAsSignedData(env *common.Envelope) ([]*SignedData, error) {
}}, nil
}

// LogMessageForSerializedIdentity returns a string with seriealized identity information,
// LogMessageForSerializedIdentity returns a string with serialized identity information,
// or a string indicating why the serialized identity information cannot be returned.
// Any errors are intentially returned in the return strings so that the function can be used in single-line log messages with minimal clutter.
// Any errors are intentionally returned in the return strings so that the function can be used in single-line log messages with minimal clutter.
func LogMessageForSerializedIdentity(serializedIdentity []byte) string {
id := &msp.SerializedIdentity{}
err := proto.Unmarshal(serializedIdentity, id)
Expand Down

0 comments on commit 26932a9

Please sign in to comment.