Skip to content

Commit d7ac687

Browse files
authored
Merge pull request #301 from rex4539/fix-typos
Fix typos
2 parents e79b98d + ab10b05 commit d7ac687

13 files changed

+81
-81
lines changed

.editorconfig

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# see https://editorconfig.org for more options, and setup instructions for yours editor
1+
# see https://editorconfig.org for more options, and setup instructions for your editor
22

33
[*]
44
indent_style = tab

src/chain/chaininterface.rs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
//! blockchain.
33
//!
44
//! Includes traits for monitoring and receiving notifications of new blocks and block
5-
//! disconnections, transactio broadcasting, and feerate information requests.
5+
//! disconnections, transaction broadcasting, and feerate information requests.
66
77
use bitcoin::blockdata::block::{Block, BlockHeader};
88
use bitcoin::blockdata::transaction::Transaction;
@@ -143,7 +143,7 @@ impl ChainWatchedUtil {
143143
}
144144
#[cfg(not(test))]
145145
{
146-
let _tx_unused = txid; // Its used in cfg(test), though
146+
let _tx_unused = txid; // It's used in cfg(test), though
147147
self.watched_txn.insert(script_pub_key.clone())
148148
}
149149
}
@@ -155,7 +155,7 @@ impl ChainWatchedUtil {
155155
self.watched_outpoints.insert(outpoint)
156156
}
157157

158-
/// Sets us to match all transactions, returning true if this is a new setting anf false if
158+
/// Sets us to match all transactions, returning true if this is a new setting and false if
159159
/// we'd already been set to match everything.
160160
pub fn watch_all(&mut self) -> bool {
161161
if self.watch_all { return false; }

src/lib.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
//!
55
//! A full-featured but also flexible lightning implementation, in library form. This allows the
66
//! user (you) to decide how they wish to use it instead of being a fully self-contained daemon.
7-
//! This means there is no built-in threading/execution environment and its up to the user to
7+
//! This means there is no built-in threading/execution environment and it's up to the user to
88
//! figure out how best to make networking happen/timers fire/things get written to disk/keys get
99
//! generated/etc. This makes it a good candidate for tight integration into an existing wallet
1010
//! instead of having a rather-separate lightning appendage to a wallet.

src/ln/channel.rs

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -93,14 +93,14 @@ enum OutboundHTLCState {
9393
/// Added by us and included in a commitment_signed (if we were AwaitingRemoteRevoke when we
9494
/// created it we would have put it in the holding cell instead). When they next revoke_and_ack
9595
/// we will promote to Committed (note that they may not accept it until the next time we
96-
/// revoke, but we dont really care about that:
96+
/// revoke, but we don't really care about that:
9797
/// * they've revoked, so worst case we can announce an old state and get our (option on)
98-
/// money back (though we wont), and,
98+
/// money back (though we won't), and,
9999
/// * we'll send them a revoke when they send a commitment_signed, and since only they're
100100
/// allowed to remove it, the "can only be removed once committed on both sides" requirement
101-
/// doesn't matter to us and its up to them to enforce it, worst-case they jump ahead but
101+
/// doesn't matter to us and it's up to them to enforce it, worst-case they jump ahead but
102102
/// we'll never get out of sync).
103-
/// Note that we Box the OnionPacket as its rather large and we don't want to blow up
103+
/// Note that we Box the OnionPacket as it's rather large and we don't want to blow up
104104
/// OutboundHTLCOutput's size just for a temporary bit
105105
LocalAnnounced(Box<msgs::OnionPacket>),
106106
Committed,
@@ -292,7 +292,7 @@ pub(super) struct Channel {
292292
last_sent_closing_fee: Option<(u64, u64)>, // (feerate, fee)
293293

294294
/// The hash of the block in which the funding transaction reached our CONF_TARGET. We use this
295-
/// to detect unconfirmation after a serialize-unserialize roudtrip where we may not see a full
295+
/// to detect unconfirmation after a serialize-unserialize roundtrip where we may not see a full
296296
/// series of block_connected/block_disconnected calls. Obviously this is not a guarantee as we
297297
/// could miss the funding_tx_confirmed_in block as well, but it serves as a useful fallback.
298298
funding_tx_confirmed_in: Option<Sha256dHash>,
@@ -551,7 +551,7 @@ impl Channel {
551551
return Err(ChannelError::Close("Bogus; channel reserve is less than dust limit"));
552552
}
553553
if msg.htlc_minimum_msat >= (msg.funding_satoshis - msg.channel_reserve_satoshis) * 1000 {
554-
return Err(ChannelError::Close("Miminum htlc value is full channel value"));
554+
return Err(ChannelError::Close("Minimum htlc value is full channel value"));
555555
}
556556
Channel::check_remote_fee(fee_estimator, msg.feerate_per_kw)?;
557557

@@ -1113,7 +1113,7 @@ impl Channel {
11131113
}
11141114

11151115
/// Signs a transaction created by build_htlc_transaction. If the transaction is an
1116-
/// HTLC-Success transaction (ie htlc.offered is false), preimate must be set!
1116+
/// HTLC-Success transaction (ie htlc.offered is false), preimage must be set!
11171117
fn sign_htlc_transaction(&self, tx: &mut Transaction, their_sig: &Signature, preimage: &Option<PaymentPreimage>, htlc: &HTLCOutputInCommitment, keys: &TxCreationKeys) -> Result<Signature, ChannelError> {
11181118
if tx.input.len() != 1 {
11191119
panic!("Tried to sign HTLC transaction that had input count != 1!");
@@ -1151,7 +1151,7 @@ impl Channel {
11511151
/// In such cases we debug_assert!(false) and return an IgnoreError. Thus, will always return
11521152
/// Ok(_) if debug assertions are turned on and preconditions are met.
11531153
fn get_update_fulfill_htlc(&mut self, htlc_id_arg: u64, payment_preimage_arg: PaymentPreimage) -> Result<(Option<msgs::UpdateFulfillHTLC>, Option<ChannelMonitor>), ChannelError> {
1154-
// Either ChannelFunded got set (which means it wont bet unset) or there is no way any
1154+
// Either ChannelFunded got set (which means it won't be unset) or there is no way any
11551155
// caller thought we could have something claimed (cause we wouldn't have accepted in an
11561156
// incoming HTLC anyway). If we got to ShutdownComplete, callers aren't allowed to call us,
11571157
// either.
@@ -1274,7 +1274,7 @@ impl Channel {
12741274
},
12751275
_ => {
12761276
debug_assert!(false, "Have an inbound HTLC we tried to claim before it was fully committed to");
1277-
return Err(ChannelError::Ignore("Unable to find a pending HTLC which matchd the given HTLC ID"));
1277+
return Err(ChannelError::Ignore("Unable to find a pending HTLC which matched the given HTLC ID"));
12781278
}
12791279
}
12801280
pending_idx = idx;
@@ -1352,10 +1352,10 @@ impl Channel {
13521352
return Err(ChannelError::Close("They wanted our payments to be delayed by a needlessly long period"));
13531353
}
13541354
if msg.max_accepted_htlcs < 1 {
1355-
return Err(ChannelError::Close("0 max_accpted_htlcs makes for a useless channel"));
1355+
return Err(ChannelError::Close("0 max_accepted_htlcs makes for a useless channel"));
13561356
}
13571357
if msg.max_accepted_htlcs > 483 {
1358-
return Err(ChannelError::Close("max_accpted_htlcs > 483"));
1358+
return Err(ChannelError::Close("max_accepted_htlcs > 483"));
13591359
}
13601360

13611361
// Now check against optional parameters as set by config...
@@ -1433,7 +1433,7 @@ impl Channel {
14331433
}
14341434
if self.channel_state != (ChannelState::OurInitSent as u32 | ChannelState::TheirInitSent as u32) {
14351435
// BOLT 2 says that if we disconnect before we send funding_signed we SHOULD NOT
1436-
// remember the channel, so its safe to just send an error_message here and drop the
1436+
// remember the channel, so it's safe to just send an error_message here and drop the
14371437
// channel.
14381438
return Err(ChannelError::Close("Received funding_created after we got the channel!"));
14391439
}
@@ -1826,8 +1826,8 @@ impl Channel {
18261826
for htlc_update in htlc_updates.drain(..) {
18271827
// Note that this *can* fail, though it should be due to rather-rare conditions on
18281828
// fee races with adding too many outputs which push our total payments just over
1829-
// the limit. In case its less rare than I anticipate, we may want to revisit
1830-
// handling this case better and maybe fufilling some of the HTLCs while attempting
1829+
// the limit. In case it's less rare than I anticipate, we may want to revisit
1830+
// handling this case better and maybe fulfilling some of the HTLCs while attempting
18311831
// to rebalance channels.
18321832
if err.is_some() { // We're back to AwaitingRemoteRevoke (or are about to fail the channel)
18331833
self.holding_cell_htlc_updates.push(htlc_update);
@@ -1869,8 +1869,8 @@ impl Channel {
18691869
}
18701870
}
18711871
}
1872-
//TODO: Need to examine the type of err - if its a fee issue or similar we may want to
1873-
//fail it back the route, if its a temporary issue we can ignore it...
1872+
//TODO: Need to examine the type of err - if it's a fee issue or similar we may want to
1873+
//fail it back the route, if it's a temporary issue we can ignore it...
18741874
match err {
18751875
None => {
18761876
if update_add_htlcs.is_empty() && update_fulfill_htlcs.is_empty() && update_fail_htlcs.is_empty() && self.holding_cell_update_fee.is_none() {
@@ -2022,7 +2022,7 @@ impl Channel {
20222022
}
20232023
} else {
20242024
if let Some(feerate) = self.pending_update_fee {
2025-
// Because a node cannot send two commitment_signed's in a row without getting a
2025+
// Because a node cannot send two commitment_signeds in a row without getting a
20262026
// revoke_and_ack from us (as it would otherwise not know the per_commitment_point
20272027
// it should use to create keys with) and because a node can't send a
20282028
// commitment_signed without changes, checking if the feerate is equal to the
@@ -2479,7 +2479,7 @@ impl Channel {
24792479
assert_eq!(self.channel_state & ChannelState::ShutdownComplete as u32, 0);
24802480

24812481
// BOLT 2 says we must only send a scriptpubkey of certain standard forms, which are up to
2482-
// 34 bytes in length, so dont let the remote peer feed us some super fee-heavy script.
2482+
// 34 bytes in length, so don't let the remote peer feed us some super fee-heavy script.
24832483
if self.channel_outbound && msg.scriptpubkey.len() > 34 {
24842484
return Err(ChannelError::Close("Got shutdown_scriptpubkey of absurd length from remote peer"));
24852485
}
@@ -3119,7 +3119,7 @@ impl Channel {
31193119
/// waiting on the remote peer to send us a revoke_and_ack during which time we cannot add new
31203120
/// HTLCs on the wire or we wouldn't be able to determine what they actually ACK'ed.
31213121
/// You MUST call send_commitment prior to any other calls on this Channel
3122-
/// If an Err is returned, its a ChannelError::Ignore!
3122+
/// If an Err is returned, it's a ChannelError::Ignore!
31233123
pub fn send_htlc(&mut self, amount_msat: u64, payment_hash: PaymentHash, cltv_expiry: u32, source: HTLCSource, onion_routing_packet: msgs::OnionPacket) -> Result<Option<msgs::UpdateAddHTLC>, ChannelError> {
31243124
if (self.channel_state & (ChannelState::ChannelFunded as u32 | BOTH_SIDES_SHUTDOWN_MASK)) != (ChannelState::ChannelFunded as u32) {
31253125
return Err(ChannelError::Ignore("Cannot send HTLC until channel is fully established and we haven't started shutting down"));
@@ -3376,7 +3376,7 @@ impl Channel {
33763376
}, dropped_outbound_htlcs))
33773377
}
33783378

3379-
/// Gets the latest commitment transaction and any dependant transactions for relay (forcing
3379+
/// Gets the latest commitment transaction and any dependent transactions for relay (forcing
33803380
/// shutdown of this channel - no more calls into this Channel may be made afterwards except
33813381
/// those explicitly stated to be allowed after shutdown completes, eg some simple getters).
33823382
/// Also returns the list of payment_hashes for channels which we can safely fail backwards
@@ -3930,7 +3930,7 @@ mod tests {
39303930
#[test]
39313931
fn test_max_funding_satoshis() {
39323932
assert!(MAX_FUNDING_SATOSHIS <= 21_000_000 * 100_000_000,
3933-
"MAX_FUNDING_SATOSHIS is greater than all satoshis on existence");
3933+
"MAX_FUNDING_SATOSHIS is greater than all satoshis in existence");
39343934
}
39353935

39363936
struct Keys {

src/ln/channelmanager.rs

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -249,7 +249,7 @@ pub(super) struct ChannelHolder {
249249
pub(super) next_forward: Instant,
250250
/// short channel id -> forward infos. Key of 0 means payments received
251251
/// Note that while this is held in the same mutex as the channels themselves, no consistency
252-
/// guarantees are made about there existing a channel with the short id here, nor the short
252+
/// guarantees are made about the existence of a channel with the short id here, nor the short
253253
/// ids in the PendingForwardHTLCInfo!
254254
pub(super) forward_htlcs: HashMap<u64, Vec<HTLCForwardInfo>>,
255255
/// Note that while this is held in the same mutex as the channels themselves, no consistency
@@ -344,7 +344,7 @@ pub struct ChannelManager {
344344
/// HTLC's CLTV. This should always be a few blocks greater than channelmonitor::CLTV_CLAIM_BUFFER,
345345
/// ie the node we forwarded the payment on to should always have enough room to reliably time out
346346
/// the HTLC via a full update_fail_htlc/commitment_signed dance before we hit the
347-
/// CLTV_CLAIM_BUFFER point (we static assert that its at least 3 blocks more).
347+
/// CLTV_CLAIM_BUFFER point (we static assert that it's at least 3 blocks more).
348348
const CLTV_EXPIRY_DELTA: u16 = 6 * 12; //TODO?
349349
pub(super) const CLTV_FAR_FAR_AWAY: u32 = 6 * 24 * 7; //TODO?
350350

@@ -744,7 +744,7 @@ impl ChannelManager {
744744
if msg.onion_routing_packet.version != 0 {
745745
//TODO: Spec doesn't indicate if we should only hash hop_data here (and in other
746746
//sha256_of_onion error data packets), or the entire onion_routing_packet. Either way,
747-
//the hash doesn't really serve any purpuse - in the case of hashing all data, the
747+
//the hash doesn't really serve any purpose - in the case of hashing all data, the
748748
//receiving node would have to brute force to figure out which version was put in the
749749
//packet by the node that send us the message, in the case of hashing the hop_data, the
750750
//node knows the HMAC matched, so they already know what is there...
@@ -1146,7 +1146,7 @@ impl ChannelManager {
11461146

11471147
/// Processes HTLCs which are pending waiting on random forward delay.
11481148
///
1149-
/// Should only really ever be called in response to an PendingHTLCsForwardable event.
1149+
/// Should only really ever be called in response to a PendingHTLCsForwardable event.
11501150
/// Will likely generate further events.
11511151
pub fn process_pending_htlc_forwards(&self) {
11521152
let _ = self.total_consistency_lock.read().unwrap();
@@ -1251,7 +1251,7 @@ impl ChannelManager {
12511251
// messages when we can.
12521252
// We don't need any kind of timer here as they should fail
12531253
// the channel onto the chain if they can't get our
1254-
// update_fail_htlc in time, its not our problem.
1254+
// update_fail_htlc in time, it's not our problem.
12551255
}
12561256
}
12571257
},
@@ -1480,7 +1480,7 @@ impl ChannelManager {
14801480
None => {
14811481
// TODO: There is probably a channel manager somewhere that needs to
14821482
// learn the preimage as the channel already hit the chain and that's
1483-
// why its missing.
1483+
// why it's missing.
14841484
return
14851485
}
14861486
};
@@ -1490,7 +1490,7 @@ impl ChannelManager {
14901490
Ok((msgs, monitor_option)) => {
14911491
if let Some(chan_monitor) = monitor_option {
14921492
if let Err(_e) = self.monitor.add_update_monitor(chan_monitor.get_funding_txo().unwrap(), chan_monitor) {
1493-
unimplemented!();// but def dont push the event...
1493+
unimplemented!();// but def don't push the event...
14941494
}
14951495
}
14961496
if let Some((msg, commitment_signed)) = msgs {
@@ -1548,7 +1548,7 @@ impl ChannelManager {
15481548
// knowledge of those gets moved into the appropriate in-memory
15491549
// ChannelMonitor and they get failed backwards once we get
15501550
// on-chain confirmations.
1551-
// Note I think #198 addresses this, so once its merged a test
1551+
// Note I think #198 addresses this, so once it's merged a test
15521552
// should be written.
15531553
if let Some(short_id) = channel.get_short_channel_id() {
15541554
short_to_id.remove(&short_id);
@@ -1848,7 +1848,7 @@ impl ChannelManager {
18481848
//
18491849
//TODO: There exists a further attack where a node may garble the onion data, forward it to
18501850
//us repeatedly garbled in different ways, and compare our error messages, which are
1851-
//encrypted with the same key. Its not immediately obvious how to usefully exploit that,
1851+
//encrypted with the same key. It's not immediately obvious how to usefully exploit that,
18521852
//but we should prevent it anyway.
18531853

18541854
let (mut pending_forward_info, mut channel_state_lock) = self.decode_update_add_htlc_onion(msg);
@@ -2272,7 +2272,7 @@ impl ChannelManager {
22722272

22732273
impl events::MessageSendEventsProvider for ChannelManager {
22742274
fn get_and_clear_pending_msg_events(&self) -> Vec<events::MessageSendEvent> {
2275-
// TODO: Event release to users and serialization is currently race-y: its very easy for a
2275+
// TODO: Event release to users and serialization is currently race-y: it's very easy for a
22762276
// user to serialize a ChannelManager with pending events in it and lose those events on
22772277
// restart. This is doubly true for the fail/fulfill-backs from monitor events!
22782278
{
@@ -2297,7 +2297,7 @@ impl events::MessageSendEventsProvider for ChannelManager {
22972297

22982298
impl events::EventsProvider for ChannelManager {
22992299
fn get_and_clear_pending_events(&self) -> Vec<events::Event> {
2300-
// TODO: Event release to users and serialization is currently race-y: its very easy for a
2300+
// TODO: Event release to users and serialization is currently race-y: it's very easy for a
23012301
// user to serialize a ChannelManager with pending events in it and lose those events on
23022302
// restart. This is doubly true for the fail/fulfill-backs from monitor events!
23032303
{
@@ -2897,7 +2897,7 @@ pub struct ChannelManagerReadArgs<'a> {
28972897
/// value.get_funding_txo() should be the key).
28982898
///
28992899
/// If a monitor is inconsistent with the channel state during deserialization the channel will
2900-
/// be force-closed using the data in the channelmonitor and the Channel will be dropped. This
2900+
/// be force-closed using the data in the ChannelMonitor and the channel will be dropped. This
29012901
/// is true for missing channels as well. If there is a monitor missing for which we find
29022902
/// channel data Err(DecodeError::InvalidValue) will be returned.
29032903
///

0 commit comments

Comments
 (0)