Skip to content

Commit

Permalink
Merge pull request #87 from evannetwork/feature/fix-typos
Browse files Browse the repository at this point in the history
Fix typos
  • Loading branch information
S3bb1 authored Sep 18, 2023
2 parents 8910e50 + 04b15c5 commit 4dd98e9
Show file tree
Hide file tree
Showing 4 changed files with 9 additions and 9 deletions.
8 changes: 4 additions & 4 deletions src/api/vade_evan_api.rs
Original file line number Diff line number Diff line change
Expand Up @@ -287,7 +287,7 @@ impl VadeEvan {
/// * `use_valid_until` - true if `validUntil` will be present in credential
/// * `issuer_did` - DID of issuer
/// * `is_credential_status_included` - true if credentialStatus is included in credential
/// * `required_reveal_statements` - required_revealed_statements indices array in searialized form
/// * `required_reveal_statements` - required_revealed_statements indices array in serialized form
///
/// # Returns
/// * credential offer as JSON serialized [`BbsCredentialOffer`](https://docs.rs/vade_evan_bbs/*/vade_evan_bbs/struct.BbsCredentialOffer.html)
Expand Down Expand Up @@ -832,7 +832,7 @@ impl VadeEvan {
.map_err(|err| err.into())
}

/// Creates a self issued presention.
/// Creates a self issued presentation.
/// The presentation doesn't contain proof.
///
/// # Arguments
Expand Down Expand Up @@ -1850,7 +1850,7 @@ impl VadeEvan {
///
/// did: did to update,
/// operation: type of did update to be performed ,
/// update_key: JSON string containing pubilc key in JWK format,
/// update_key: JSON string containing public key in JWK format,
/// payload: payload of update command as per operation,
///
/// # Example
Expand All @@ -1867,7 +1867,7 @@ impl VadeEvan {
/// let did = "did:evan:0x123334233232";
/// let update_key = r#"{"kty":"EC","crv":"secp256k1","x":"W8rj8Dko_f0KgqY-nzCvzy_pNbVmYyiaY1GpiuvZKsw","y":"E2cKPqGtq55iiyZIdTCe59HgeQ1bdnMcNdbf9tI5ogo","d":"yZv5g_rjyC0nnUii7pxEh7V2M6XZHeJCu5OjfLMNlSI"}"#;
/// let operation = r#"AddServiceEndpoint"#;
/// let service = r#"{"id":"sds","r#type":"SecureDataStrore","service_endpoint":"www.google.com"}"#;
/// let service = r#"{"id":"sds","r#type":"SecureDataStore","service_endpoint":"www.google.com"}"#;
/// let payload = &serde_json::to_string(&service)?;
/// let update_response = vade_evan
/// .helper_did_update(did, operation, update_key, payload)
Expand Down
2 changes: 1 addition & 1 deletion src/helpers/credential.rs
Original file line number Diff line number Diff line change
Expand Up @@ -994,7 +994,7 @@ mod tests {
}
Err(_) => assert!(
false,
"error occured when creating the self issued credential"
"error occurred when creating the self issued credential"
),
};

Expand Down
4 changes: 2 additions & 2 deletions src/helpers/did.rs
Original file line number Diff line number Diff line change
Expand Up @@ -429,7 +429,7 @@ mod tests {

let service = Service {
id: "sds".to_string(),
service_type: "SecureDataStrore".to_string(),
service_type: "SecureDataStore".to_string(),
service_endpoint: service_endpoint.clone(),
};

Expand Down Expand Up @@ -468,7 +468,7 @@ mod tests {

let service = Service {
id: "sds".to_string(),
service_type: "SecureDataStrore".to_string(),
service_type: "SecureDataStore".to_string(),
service_endpoint: service_endpoint.clone(),
};

Expand Down
4 changes: 2 additions & 2 deletions src/wasm_lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -180,7 +180,7 @@ struct HelperCreatePresentationPayload {
}
#[derive(Serialize, Deserialize)]
#[serde(rename_all = "camelCase")]
struct HelperCreateSelftIssuedPresentationPayload {
struct HelperCreateSelfIssuedPresentationPayload {
unsigned_credential: String,
}

Expand Down Expand Up @@ -866,7 +866,7 @@ pub async fn execute_vade(
}
#[cfg(all(feature = "vc-zkp-bbs"))]
"helper_create_self_issued_presentation" => {
let payload_result = parse::<HelperCreateSelftIssuedPresentationPayload>(&payload);
let payload_result = parse::<HelperCreateSelfIssuedPresentationPayload>(&payload);
match payload_result {
Ok(payload) => {
helper_create_self_issued_presentation(payload.unsigned_credential).await
Expand Down

0 comments on commit 4dd98e9

Please sign in to comment.