Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: remove repeat words #2579

Merged
merged 5 commits into from
Aug 14, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion x/incentive/keeper/scenario_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -303,7 +303,7 @@ func TestZeroBondedAtProgramEnd(t *testing.T) {
require.Equal(t, incentive.ProgramStatusOngoing, k.programStatus(1), "program 1 status ongoing (time 150)")
require.Equal(t, sdk.NewInt(6_666667), program.RemainingRewards.Amount, "one third of program rewards distributed")

// unbond half of the supply. Since Alice is is the only supplier, this should not change reward distribution
// unbond half of the supply. Since Alice is the only supplier, this should not change reward distribution
// also, alice claims rewards when unbonding
k.mustBeginUnbond(alice, coin.New(uUmee, 50_000000))

Expand Down
2 changes: 1 addition & 1 deletion x/leverage/types/keys.go
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@ func KeyCollateralAmountNoDenom(addr sdk.AccAddress) []byte {
return util.ConcatBytes(0, KeyPrefixCollateralAmount, address.MustLengthPrefix(addr))
}

// KeyReserveAmount returns a KVStore key for getting and setting the amount reserved of a a given token.
// KeyReserveAmount returns a KVStore key for getting and setting the amount reserved of a given token.
func KeyReserveAmount(tokenDenom string) []byte {
// reserveamountprefix | denom | 0x00 for null-termination
return util.ConcatBytes(1, KeyPrefixReserveAmount, []byte(tokenDenom))
Expand Down
2 changes: 1 addition & 1 deletion x/leverage/types/token.go
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@
}
// The following rules ensure the utilization:APY graph is continuous
if t.KinkUtilization.GT(t.MaxSupplyUtilization) {
return fmt.Errorf("kink utilization (%s) cannot be greater than than max supply utilization (%s)",
return fmt.Errorf("kink utilization (%s) cannot be greater than max supply utilization (%s)",

Check warning on line 62 in x/leverage/types/token.go

View check run for this annotation

Codecov / codecov/patch

x/leverage/types/token.go#L62

Added line #L62 was not covered by tests
t.KinkUtilization, t.MaxSupplyUtilization)
}
if t.KinkUtilization.Equal(t.MaxSupplyUtilization) && !t.MaxBorrowRate.Equal(t.KinkBorrowRate) {
Expand Down
2 changes: 1 addition & 1 deletion x/uibc/quota/quota_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ func TestUnitCheckAndUpdateQuota(t *testing.T) {
assert.ErrorContains(t, err, "quota")
k.checkOutflows(umee, 8, 52)

// transferring 1 umee => 2USD, will will be still OK (8+2 <= 10)
// transferring 1 umee => 2USD, will be still OK (8+2 <= 10)
err = k.CheckAndUpdateQuota(umee, sdk.NewInt(1))
assert.NilError(t, err)
k.checkOutflows(umee, 10, 54)
Expand Down
Loading