Skip to content

Commit fd812ee

Browse files
ernestognwfutreallMarcofannmdqstDimitrolito
authored
Group typographical errors (#5443)
Co-authored-by: futreall <[email protected]> Co-authored-by: Marco <[email protected]> Co-authored-by: Dmitry <[email protected]> Co-authored-by: Dmytrol <[email protected]> Co-authored-by: Noisy <[email protected]> Co-authored-by: Danil <[email protected]> Co-authored-by: CrazyFrog <[email protected]> Co-authored-by: Bryer <[email protected]> Co-authored-by: Viktor Pavlik <[email protected]> Co-authored-by: Skylar Ray <[email protected]> Co-authored-by: Brawn <[email protected]> Co-authored-by: fuder.eth <[email protected]> Co-authored-by: FT <[email protected]> Co-authored-by: Ann Wagner <[email protected]> Co-authored-by: Hopium <[email protected]> Co-authored-by: Arr00 <[email protected]> Co-authored-by: Hadrien Croubois <[email protected]>
1 parent 6e752dc commit fd812ee

File tree

18 files changed

+27
-27
lines changed

18 files changed

+27
-27
lines changed

CHANGELOG.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ This version comes with changes to the custom error identifiers. Contracts previ
5656
### Breaking changes
5757

5858
- `ERC1967Utils`: Removed duplicate declaration of the `Upgraded`, `AdminChanged` and `BeaconUpgraded` events. These events are still available through the `IERC1967` interface located under the `contracts/interfaces/` directory. Minimum pragma version is now 0.8.21.
59-
- `Governor`, `GovernorCountingSimple`: The `_countVote` virtual function now returns an `uint256` with the total votes casted. This change allows for more flexibility for partial and fractional voting. Upgrading users may get a compilation error that can be fixed by adding a return statement to the `_countVote` function.
59+
- `Governor`, `GovernorCountingSimple`: The `_countVote` virtual function now returns an `uint256` with the total votes cast. This change allows for more flexibility for partial and fractional voting. Upgrading users may get a compilation error that can be fixed by adding a return statement to the `_countVote` function.
6060

6161
#### Custom error changes
6262

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ The guides in the [documentation site](https://docs.openzeppelin.com/contracts)
7070
* [Tokens](https://docs.openzeppelin.com/contracts/tokens): create tradeable assets or collectives, and distribute them via [Crowdsales](https://docs.openzeppelin.com/contracts/crowdsales).
7171
* [Utilities](https://docs.openzeppelin.com/contracts/utilities): generic useful tools including non-overflowing math, signature verification, and trustless paying systems.
7272

73-
The [full API](https://docs.openzeppelin.com/contracts/api/token/ERC20) is also thoroughly documented, and serves as a great reference when developing your smart contract application. You can also ask for help or follow Contracts's development in the [community forum](https://forum.openzeppelin.com).
73+
The [full API](https://docs.openzeppelin.com/contracts/api/token/ERC20) is also thoroughly documented, and serves as a great reference when developing your smart contract application. You can also ask for help or follow Contracts' development in the [community forum](https://forum.openzeppelin.com).
7474

7575
Finally, you may want to take a look at the [guides on our blog](https://blog.openzeppelin.com/), which cover several common use cases and good practices. The following articles provide great background reading, though please note that some of the referenced tools have changed, as the tooling in the ecosystem continues to rapidly evolve.
7676

RELEASING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ OpenZeppelin Contracts uses a fully automated release process that takes care of
44

55
## Changesets
66

7-
[Changesets](https://github.com/changesets/changesets/) is used as part of our release process for `CHANGELOG.md` management. Each change that is relevant for the codebase is expected to include a changeset.
7+
[Changesets](https://github.com/changesets/changesets/) are used as part of our release process for `CHANGELOG.md` management. Each change that is relevant for the codebase is expected to include a changeset.
88

99
## Branching model
1010

SECURITY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,4 +40,4 @@ Note as well that the Solidity language itself only guarantees security updates
4040

4141
## Legal
4242

43-
Smart contracts are a nascent technology and carry a high level of technical risk and uncertainty. OpenZeppelin Contracts is made available under the MIT License, which disclaims all warranties in relation to the project and which limits the liability of those that contribute and maintain the project, including OpenZeppelin. Your use of the project is also governed by the terms found at www.openzeppelin.com/tos (the "Terms"). As set out in the Terms, you are solely responsible for any use of OpenZeppelin Contracts and you assume all risks associated with any such use. This Security Policy in no way evidences or represents an on-going duty by any contributor, including OpenZeppelin, to correct any flaws or alert you to all or any of the potential risks of utilizing the project.
43+
Smart contracts are a nascent technology and carry a high level of technical risk and uncertainty. OpenZeppelin Contracts is made available under the MIT License, which disclaims all warranties in relation to the project and which limits the liability of those that contribute and maintain the project, including OpenZeppelin. Your use of the project is also governed by the terms found at www.openzeppelin.com/tos (the "Terms"). As set out in the Terms, you are solely responsible for any use of OpenZeppelin Contracts and you assume all risks associated with any such use. This Security Policy in no way evidences or represents an ongoing duty by any contributor, including OpenZeppelin, to correct any flaws or alert you to all or any of the potential risks of utilizing the project.

audits/2017-03.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The git commit hash we evaluated is:
2020

2121
# Disclaimer
2222

23-
The audit makes no statements or warrantees about utility of the code, safety of the code, suitability of the business model, regulatory regime for the business model, or any other statements about fitness of the contracts to purpose, or their bugfree status. The audit documentation is for discussion purposes only.
23+
The audit makes no statements or warrantees about utility of the code, safety of the code, suitability of the business model, regulatory regime for the business model, or any other statements about fitness of the contracts to purpose, or their bug free status. The audit documentation is for discussion purposes only.
2424

2525
# Executive Summary
2626

certora/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22

33
These instructions detail the process for running Certora Verification Tool on OpenZeppelin Contracts.
44

5-
Documentation for CVT and the specification language are available [here](https://certora.atlassian.net/wiki/spaces/CPD/overview).
5+
Documentation for CVT and the specification language is available [here](https://certora.atlassian.net/wiki/spaces/CPD/overview).
66

77
## Prerequisites
88

99
Follow the [Certora installation guide](https://docs.certora.com/en/latest/docs/user-guide/getting-started/install.html) in order to get the Certora Prover Package and the `solc` executable folder in your path.
1010

1111
> **Note**
12-
> An API Key is required for local testing. Although the prover will run on a Github Actions' CI environment on selected Pull Requests.
12+
> An API Key is required for local testing. Although the prover will run on a GitHub Actions' CI environment on selected Pull Requests.
1313
1414
## Running the verification
1515

certora/specs/AccessControlDefaultAdminRules.spec

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ rule renounceRoleEffect(env e, bytes32 role) {
176176

177177
/*
178178
┌─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┐
179-
│ Rule: defaultAdmin is only affected by accepting an admin transfer or renoucing
179+
│ Rule: defaultAdmin is only affected by accepting an admin transfer or renouncing
180180
└─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┘
181181
*/
182182
rule noDefaultAdminChange(env e, method f, calldataarg args) {
@@ -188,7 +188,7 @@ rule noDefaultAdminChange(env e, method f, calldataarg args) {
188188
f.selector == sig:acceptDefaultAdminTransfer().selector ||
189189
f.selector == sig:renounceRole(bytes32,address).selector
190190
),
191-
"default admin is only affected by accepting an admin transfer or renoucing";
191+
"default admin is only affected by accepting an admin transfer or renouncing";
192192
}
193193

194194
/*

certora/specs/ERC20FlashMint.spec

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ methods {
1818
*/
1919
ghost mapping(address => mathint) trackedMintAmount;
2020
ghost mapping(address => mathint) trackedBurnAmount;
21-
ghost mapping(address => mapping(address => mathint)) trackedTransferedAmount;
21+
ghost mapping(address => mapping(address => mathint)) trackedTransferredAmount;
2222

2323
function specUpdate(address from, address to, uint256 amount) {
2424
if (from == 0 && to == 0) { assert(false); } // defensive
@@ -28,7 +28,7 @@ function specUpdate(address from, address to, uint256 amount) {
2828
} else if (to == 0) {
2929
trackedBurnAmount[from] = amount;
3030
} else {
31-
trackedTransferedAmount[from][to] = amount;
31+
trackedTransferredAmount[from][to] = amount;
3232
}
3333
}
3434

@@ -51,5 +51,5 @@ rule checkMintAndBurn(env e) {
5151

5252
assert trackedMintAmount[receiver] == to_mathint(amount);
5353
assert trackedBurnAmount[receiver] == amount + to_mathint(recipient == 0 ? fees : 0);
54-
assert (fees > 0 && recipient != 0) => trackedTransferedAmount[receiver][recipient] == to_mathint(fees);
54+
assert (fees > 0 && recipient != 0) => trackedTransferredAmount[receiver][recipient] == to_mathint(fees);
5555
}

contracts/finance/VestingWallet.sol

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ import {Ownable} from "../access/Ownable.sol";
1616
* Consequently, if the vesting has already started, any amount of tokens sent to this contract will (at least partly)
1717
* be immediately releasable.
1818
*
19-
* By setting the duration to 0, one can configure this contract to behave like an asset timelock that hold tokens for
19+
* By setting the duration to 0, one can configure this contract to behave like an asset timelock that holds tokens for
2020
* a beneficiary until a specified time.
2121
*
2222
* NOTE: Since the wallet is {Ownable}, and ownership can be transferred, it is possible to sell unvested tokens.

contracts/governance/extensions/GovernorCountingFractional.sol

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,9 +125,9 @@ abstract contract GovernorCountingFractional is Governor {
125125
*
126126
* `abi.encodePacked(uint128(againstVotes), uint128(forVotes), uint128(abstainVotes))`
127127
*
128-
* NOTE: Consider that fractional voting restricts the number of casted vote (in each category) to 128 bits.
128+
* NOTE: Consider that fractional voting restricts the number of casted votes (in each category) to 128 bits.
129129
* Depending on how many decimals the underlying token has, a single voter may require to split their vote into
130-
* multiple vote operations. For precision higher than ~30 decimals, large token holders may require an
130+
* multiple vote operations. For precision higher than ~30 decimals, large token holders may require a
131131
* potentially large number of calls to cast all their votes. The voter has the possibility to cast all the
132132
* remaining votes in a single operation using the traditional "bravo" vote.
133133
*/

0 commit comments

Comments
 (0)