diff --git a/components/clarinet-cli/examples/cbtc/README.md b/components/clarinet-cli/examples/cbtc/README.md index 417597cb3..8def546ae 100644 --- a/components/clarinet-cli/examples/cbtc/README.md +++ b/components/clarinet-cli/examples/cbtc/README.md @@ -68,7 +68,7 @@ the 2nd output of the transaction to a Stacks address, and sending the minted to cost: 5960 ``` -Another chainhook predicate, specified in `chainhooks/unwrap-btc.json` is observing cBTC burn events occuring on the Stacks blockchain, thanks to the following configuration: +Another chainhook predicate, specified in `chainhooks/unwrap-btc.json` is observing cBTC burn events occurring on the Stacks blockchain, thanks to the following configuration: ```json "if_this": { @@ -86,7 +86,7 @@ Another chainhook predicate, specified in `chainhooks/unwrap-btc.json` is observ } ``` -When the authority process this chainhook occurences, it sends BTC from its reserve to `cBTC` burner, by assuming that a p2pkh is being used. +When the authority process this chainhook occurrences, it sends BTC from its reserve to `cBTC` burner, by assuming that a p2pkh is being used. The wrap / unwrap deployment plans can both be respectively performed with the commands: diff --git a/components/clarinet-cli/examples/cbtc/serverless/handler.ts b/components/clarinet-cli/examples/cbtc/serverless/handler.ts index 247ee9472..9bdf6243d 100644 --- a/components/clarinet-cli/examples/cbtc/serverless/handler.ts +++ b/components/clarinet-cli/examples/cbtc/serverless/handler.ts @@ -189,7 +189,7 @@ module.exports.unwrapBtc = async (event: HttpEvent) => { } if (cumulatedAmount < totalRequired) { return { - message: "Funding unsufficient", + message: "Funding insufficient", unspentOutputs: unspentOutputs, statusCode: 404, }; diff --git a/components/clarinet-cli/src/generate/contract.rs b/components/clarinet-cli/src/generate/contract.rs index 055a4e88e..04209f4f2 100644 --- a/components/clarinet-cli/src/generate/contract.rs +++ b/components/clarinet-cli/src/generate/contract.rs @@ -172,7 +172,7 @@ const address1 = accounts.get("wallet_1")!; */ describe("example tests", () => { - it("ensures simnet is well initalised", () => { + it("ensures simnet is well initialised", () => { expect(simnet.blockHeight).toBeDefined(); }); diff --git a/components/clarity-lsp/src/common/backend.rs b/components/clarity-lsp/src/common/backend.rs index 20d5293b6..1da17d043 100644 --- a/components/clarity-lsp/src/common/backend.rs +++ b/components/clarity-lsp/src/common/backend.rs @@ -180,7 +180,7 @@ pub async fn process_notification( })?; } - // Only build the initial protocal state if it does not exist + // Only build the initial protocol state if it does not exist if editor_state.try_read(|es| es.protocols.contains_key(&manifest_location))? { return Ok(LspNotificationResponse::default()); } diff --git a/components/clarity-repl/src/analysis/annotation.rs b/components/clarity-repl/src/analysis/annotation.rs index e4b013a58..055dd517e 100644 --- a/components/clarity-repl/src/analysis/annotation.rs +++ b/components/clarity-repl/src/analysis/annotation.rs @@ -81,7 +81,7 @@ mod tests { fn parse_unchecked_data() { match "unchecked_data".parse::() { Ok(WarningKind::UncheckedData) => (), - _ => panic!("failed to parse warning kind correectly"), + _ => panic!("failed to parse warning kind correctly"), }; } @@ -97,7 +97,7 @@ mod tests { fn parse_allow_unchecked_data() { match "allow(unchecked_data)".parse::() { Ok(AnnotationKind::Allow(WarningKind::UncheckedData)) => (), - _ => panic!("failed to parse annotation kind correectly"), + _ => panic!("failed to parse annotation kind correctly"), }; } diff --git a/components/stacks-codec/src/codec.rs b/components/stacks-codec/src/codec.rs index 86625101e..ceffdce7b 100644 --- a/components/stacks-codec/src/codec.rs +++ b/components/stacks-codec/src/codec.rs @@ -3576,7 +3576,7 @@ impl StacksMessageCodec for SinglesigSpendingCondition { if hash_mode == SinglesigHashMode::P2WPKH && key_encoding != TransactionPublicKeyEncoding::Compressed { - return Err(CodecError::DeserializeError("Failed to parse singlesig spending condition: incomaptible hash mode and key encoding".to_string())); + return Err(CodecError::DeserializeError("Failed to parse singlesig spending condition: incompatible hash mode and key encoding".to_string())); } Ok(SinglesigSpendingCondition {