Skip to content
This repository was archived by the owner on Mar 11, 2025. It is now read-only.

Commit b4ac86a

Browse files
authored
chore: fix some comments (#6588)
Signed-off-by: hidewrong <[email protected]>
1 parent 8cd048f commit b4ac86a

File tree

5 files changed

+12
-12
lines changed

5 files changed

+12
-12
lines changed

single-pool/cli/src/cli.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -318,7 +318,7 @@ fn pool_source_group() -> ArgGroup<'static> {
318318
pub fn parse_address(path: &str, name: &str) -> Result<Pubkey, String> {
319319
if is_valid_pubkey(path).is_ok() {
320320
// this all is ugly but safe
321-
// wallet_manager doesnt need to be shared, it just saves cycles to cache it
321+
// wallet_manager doesn't need to be shared, it just saves cycles to cache it
322322
// and the only way argmatches default fails with an unchecked lookup is in the
323323
// prompt branch which seems unlikely to ever be used for pubkeys
324324
// the usb lookup in signer_from_path_with_config is safe

single-pool/program/tests/helpers/mod.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
#![allow(dead_code)] // needed because cargo doesnt understand test usage
1+
#![allow(dead_code)] // needed because cargo doesn't understand test usage
22

33
use {
44
solana_program_test::*,

single-pool/program/tests/helpers/stake.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
#![allow(dead_code)] // needed because cargo doesnt understand test usage
1+
#![allow(dead_code)] // needed because cargo doesn't understand test usage
22

33
use {
44
crate::get_account,

token/cli/src/command.rs

+5-5
Original file line numberDiff line numberDiff line change
@@ -888,7 +888,7 @@ async fn command_create_multisig(
888888
),
889889
);
890890

891-
// default is safe here because create_multisig doesnt use it
891+
// default is safe here because create_multisig doesn't use it
892892
let token = token_client_from_config(config, &Pubkey::default(), None)?;
893893

894894
let res = token
@@ -1127,7 +1127,7 @@ async fn command_authorize(
11271127

11281128
(mint_pubkey, previous_authority)
11291129
} else {
1130-
// default is safe here because authorize doesnt use it
1130+
// default is safe here because authorize doesn't use it
11311131
(Pubkey::default(), None)
11321132
};
11331133

@@ -1347,7 +1347,7 @@ async fn command_transfer(
13471347
Add `--allow-non-system-account-recipient` to complete the transfer.".into());
13481348
}
13491349
}
1350-
// if it doesnt exist, it definitely isnt a token account!
1350+
// if it doesn't exist, it definitely isnt a token account!
13511351
// we gate transfer with a different flag
13521352
else if maybe_recipient_account_data.is_none() && allow_unfunded_recipient {
13531353
false
@@ -2047,7 +2047,7 @@ async fn command_revoke(
20472047

20482048
(source_state.base.mint, delegate)
20492049
} else {
2050-
// default is safe here because revoke doesnt use it
2050+
// default is safe here because revoke doesn't use it
20512051
(Pubkey::default(), delegate)
20522052
};
20532053

@@ -2118,7 +2118,7 @@ async fn command_close(
21182118

21192119
token
21202120
} else {
2121-
// default is safe here because close doesnt use it
2121+
// default is safe here because close doesn't use it
21222122
token_client_from_config(config, &Pubkey::default(), None)?
21232123
};
21242124

token/program-2022-test/tests/cpi_guard.rs

+4-4
Original file line numberDiff line numberDiff line change
@@ -270,7 +270,7 @@ async fn test_cpi_guard_transfer() {
270270
let alice_state = token_obj.get_account_info(&alice.pubkey()).await.unwrap();
271271
assert_eq!(alice_state.base.amount, amount);
272272

273-
// user-auth cpi transfer with cpi guard doesnt work
273+
// user-auth cpi transfer with cpi guard doesn't work
274274
let error = token_obj
275275
.process_ixs(&[mk_transfer(alice.pubkey(), do_checked)], &[&alice])
276276
.await
@@ -389,7 +389,7 @@ async fn test_cpi_guard_burn() {
389389
let alice_state = token_obj.get_account_info(&alice.pubkey()).await.unwrap();
390390
assert_eq!(alice_state.base.amount, amount);
391391

392-
// user-auth cpi burn with cpi guard doesnt work
392+
// user-auth cpi burn with cpi guard doesn't work
393393
let error = token_obj
394394
.process_ixs(&[mk_burn(alice.pubkey(), do_checked)], &[&alice])
395395
.await
@@ -504,7 +504,7 @@ async fn test_cpi_guard_approve() {
504504
.await
505505
.unwrap();
506506

507-
// approve doesnt work through cpi
507+
// approve doesn't work through cpi
508508
let error = token_obj
509509
.process_ixs(&[mk_approve(do_checked)], &[&alice])
510510
.await
@@ -737,7 +737,7 @@ async fn test_cpi_guard_set_authority() {
737737
)
738738
.unwrap();
739739

740-
// this wraps it or doesnt based on the test case
740+
// this wraps it or doesn't based on the test case
741741
let instruction = if do_in_cpi {
742742
wrap_instruction(spl_instruction_padding::id(), token_instruction, vec![], 0).unwrap()
743743
} else {

0 commit comments

Comments
 (0)