From b8babe1fff90284e074bebca00a461387d46525a Mon Sep 17 00:00:00 2001 From: snoppy Date: Mon, 18 Mar 2024 19:01:10 +0800 Subject: [PATCH] fix typos --- bootloader/test_infra/src/hook.rs | 2 +- contracts/SystemContext.sol | 2 +- test/KnownCodesStorage.spec.ts | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/bootloader/test_infra/src/hook.rs b/bootloader/test_infra/src/hook.rs index 1cb23ddf..2acd993e 100644 --- a/bootloader/test_infra/src/hook.rs +++ b/bootloader/test_infra/src/hook.rs @@ -56,7 +56,7 @@ fn test_hook_as_string(hook_param: U256) -> String { } fn test_hook_as_int_or_hex(hook_param: U256) -> String { - // For long data, it is better to use hex-encoding for greater readibility + // For long data, it is better to use hex-encoding for greater readability if hook_param > U256::from(u64::max_value()) { let mut bytes = [0u8; 32]; hook_param.to_big_endian(&mut bytes); diff --git a/contracts/SystemContext.sol b/contracts/SystemContext.sol index 67f9248e..47738fc9 100644 --- a/contracts/SystemContext.sol +++ b/contracts/SystemContext.sol @@ -105,7 +105,7 @@ contract SystemContext is ISystemContext, ISystemContextDeprecated, ISystemContr VirtualBlockUpgradeInfo memory currentVirtualBlockUpgradeInfo = virtualBlockUpgradeInfo; - // Due to virtual blocks upgrade, we'll have to use the following logic for retreiving the blockhash: + // Due to virtual blocks upgrade, we'll have to use the following logic for retrieving the blockhash: // 1. If the block number is out of the 256-block supported range, return 0. // 2. If the block was created before the upgrade for the virtual blocks (i.e. there we used to use hashes of the batches), // we return the hash of the batch. diff --git a/test/KnownCodesStorage.spec.ts b/test/KnownCodesStorage.spec.ts index a9769463..d08b8eba 100644 --- a/test/KnownCodesStorage.spec.ts +++ b/test/KnownCodesStorage.spec.ts @@ -66,7 +66,7 @@ describe("KnownCodesStorage tests", function () { ); }); - it("incorrectly fomatted bytecode hash failed to call", async () => { + it("incorrectly formatted bytecode hash failed to call", async () => { await expect( knownCodesStorage.connect(compressorAccount).markBytecodeAsPublished(INCORRECTLY_FORMATTED_HASH) ).to.be.revertedWith("Incorrectly formatted bytecodeHash"); @@ -78,7 +78,7 @@ describe("KnownCodesStorage tests", function () { ).to.be.revertedWith("Code length in words must be odd"); }); - it("successfuly marked", async () => { + it("successfully marked", async () => { await expect(knownCodesStorage.connect(compressorAccount).markBytecodeAsPublished(BYTECODE_HASH_1)) .to.emit(knownCodesStorage, "MarkedAsKnown") .withArgs(BYTECODE_HASH_1.toLowerCase(), false)