Fix more typos (#7439)

* Fix more typos in plugins/.

* Fix typos in tests/unit/.

* Fix typos in tests/integration/.

* Fix more typos.

Co-authored-by: Sebastian Gumprich <rndmh3ro@users.noreply.github.com>

---------

Co-authored-by: Sebastian Gumprich <rndmh3ro@users.noreply.github.com>
This commit is contained in:
Felix Fontein 2023-10-29 18:04:44 +01:00 committed by GitHub
commit 2b62826082
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
62 changed files with 99 additions and 99 deletions

View file

@ -90,7 +90,7 @@
size: -2G
state: present
- name: Resizing /mksysb to 100G (no enought space)
- name: Resizing /mksysb to 100G (not enough space)
aix_filesystem:
filesystem: /mksysb
size: +100G

View file

@ -73,7 +73,7 @@
state: absent
force: true
- name: reenable autoindex
- name: re-enable autoindex
community.general.apache2_module:
name: autoindex
state: present

View file

@ -1,4 +1,4 @@
# Copyright (c) Ansible Projec
# Copyright (c) Ansible Project
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later

View file

@ -161,7 +161,7 @@
- result['role']['ServiceIdentities'][0]['ServiceName'] == "web"
- result['role']['ServiceIdentities'][0]['Datacenters'][0] == "dc1"
- result['role']['Policies'] is not defined
- result['role']['NodeIdentities'] == [] # in check mode the cleared field is returned as an emtpy array
- result['role']['NodeIdentities'] == [] # in check mode the cleared field is returned as an empty array
- name: Update the role with service identity to remove the service identities
consul_role:

View file

@ -11,7 +11,7 @@ tested_filesystems:
# - XFS: 20Mo
# - Btrfs: 150Mo (50Mo when "--metadata single" is used and 100Mb when on newer Fedora versions)
# - f2fs:
# - 1.2.0 requires at leat 116Mo
# - 1.2.0 requires at least 116Mo
# - 1.7.0 requires at least 30Mo
# - 1.10.0 requires at least 38Mo
# - resizefs asserts when initial fs is smaller than 60Mo and seems to require 1.10.0

View file

@ -109,7 +109,7 @@
- current_gems.stdout is not search('gist\s+\([0-9.]+\)')
when: ansible_user_uid == 0
# Check cutom gem directory
# Check custom gem directory
- name: Install gem in a custom directory with incorrect options
gem:
name: gist

View file

@ -59,7 +59,7 @@
failed_when: customized_result.msg.find("does not exist") == -1
# Test: filenames with whitespaces
# We report error: the user should be reponsible for the it
# We report error: the user should be responsible for the it
- name: "Testcase: filenames with whitespaces"
community.general.iso_customize:
src_iso: "{{ test_dir }}/test.iso"

View file

@ -181,7 +181,7 @@
- result_x509_changed is changed
- name: |
We also want to make sure that the status doesnt change if we import the same cert
We also want to make sure that the status does not change if we import the same cert
community.general.java_cert:
cert_alias: test_cert
cert_path: "{{ test_cert2_path }}"

View file

@ -20,7 +20,7 @@ docker run --name mykeycloak -p 8080:8080 -e KC_HTTP_RELATIVE_PATH=/auth -e KEYC
This test suite can run against a fresh unconfigured server instance
(no preconfiguration required) and cleans up after itself (undoes all
its config changes) as long as it runs through completly. While its active
its config changes) as long as it runs through completely. While its active
it changes the server configuration in the following ways:
* creating, modifying and deleting some keycloak groups

View file

@ -20,7 +20,7 @@ docker run --name mykeycloak -p 8080:8080 -e KC_HTTP_RELATIVE_PATH=/auth -e KEYC
This test suite can run against a fresh unconfigured server instance
(no preconfiguration required) and cleans up after itself (undoes all
its config changes) as long as it runs through completly. While its active
its config changes) as long as it runs through completely. While its active
it changes the server configuration in the following ways:
* creating, modifying and deleting some keycloak groups

View file

@ -20,7 +20,7 @@ docker run --name mykeycloak -p 8080:8080 -e KC_HTTP_RELATIVE_PATH=/auth -e KEYC
This test suite can run against a fresh unconfigured server instance
(no preconfiguration required) and cleans up after itself (undoes all
its config changes) as long as it runs through completly. While its active
its config changes) as long as it runs through completely. While its active
it changes the server configuration in the following ways:
* creating, modifying and deleting some keycloak groups

View file

@ -20,7 +20,7 @@ docker run --name mykeycloak -p 8080:8080 -e KC_HTTP_RELATIVE_PATH=/auth -e KEYC
This test suite can run against a fresh unconfigured server instance
(no preconfiguration required) and cleans up after itself (undoes all
its config changes) as long as it runs through completly. While its active
its config changes) as long as it runs through completely. While its active
it changes the server configuration in the following ways:
* creating, modifying and deleting some keycloak groups

View file

@ -140,7 +140,7 @@
that:
- "'active' == '{{ item }}'"
- name: Deactive volume group in check mode
- name: Deactivate volume group in check mode
lvg:
state: inactive
vg: testvg

View file

@ -117,7 +117,7 @@
that:
- install_status.stat.exists == true
- name: Unistall Rested
- name: Uninstall Rested
mas:
id: 421879749
state: absent

View file

@ -9,7 +9,7 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
# ENVIRONENT PREPARACTION
# ENVIRONMENT PREPARACTION
- set_fact: test_number= 0

View file

@ -30,7 +30,7 @@
state: present
notify: Remove packages for yay-become
- name: Hack permssions for the remote_tmp_dir
- name: Hack permissions for the remote_tmp_dir
ansible.builtin.file:
path: "{{ remote_tmp_dir }}"
mode: '0777'

View file

@ -23,7 +23,7 @@
commercial_type: '{{ scaleway_commerial_type }}'
wait: true
- name: Get server informations of the first page
- name: Get server information of the first page
scaleway_server_info:
region: par1
query_parameters:
@ -37,7 +37,7 @@
that:
- first_page is success
- name: Get server informations of the second page
- name: Get server information of the second page
scaleway_server_info:
region: par1
query_parameters:

View file

@ -159,7 +159,7 @@
- cr_deletion_task is success
- cr_deletion_task is changed
- name: Delete container regitry (Confirmation)
- name: Delete container registry (Confirmation)
community.general.scaleway_container_registry:
state: absent
name: '{{ name }}'

View file

@ -8,7 +8,7 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
- name: Get image informations and register it in a variable
- name: Get image information and register it in a variable
scaleway_image_info:
region: par1
register: images
@ -22,7 +22,7 @@
that:
- images is success
- name: Get image informations from ams1 and register it in a variable
- name: Get image information from ams1 and register it in a variable
scaleway_image_info:
region: ams1
register: images_ams1

View file

@ -8,7 +8,7 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
- name: Get ip informations and register it in a variable
- name: Get ip information and register it in a variable
scaleway_ip_info:
region: par1
register: ips
@ -22,7 +22,7 @@
that:
- ips is success
- name: Get ip informations and register it in a variable
- name: Get ip information and register it in a variable
scaleway_ip_info:
region: ams1
register: ips_ams1

View file

@ -8,7 +8,7 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
- name: Get organization informations and register it in a variable
- name: Get organization information and register it in a variable
scaleway_organization_info:
register: organizations

View file

@ -8,7 +8,7 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
- name: Get security group informations and register it in a variable
- name: Get security group information and register it in a variable
scaleway_security_group_info:
region: par1
register: security_groups
@ -22,7 +22,7 @@
that:
- security_groups is success
- name: Get security group informations and register it in a variable (AMS1)
- name: Get security group information and register it in a variable (AMS1)
scaleway_security_group_info:
region: ams1
register: ams1_security_groups

View file

@ -8,7 +8,7 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
- name: Get server informations and register it in a variable
- name: Get server information and register it in a variable
scaleway_server_info:
region: par1
register: servers
@ -22,7 +22,7 @@
that:
- servers is success
- name: Get server informations and register it in a variable
- name: Get server information and register it in a variable
scaleway_server_info:
region: ams1
register: ams1_servers

View file

@ -8,7 +8,7 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
- name: Get snapshot informations and register it in a variable
- name: Get snapshot information and register it in a variable
scaleway_snapshot_info:
region: par1
register: snapshots
@ -22,7 +22,7 @@
that:
- snapshots is success
- name: Get snapshot informations and register it in a variable (AMS1)
- name: Get snapshot information and register it in a variable (AMS1)
scaleway_snapshot_info:
region: ams1
register: ams1_snapshots

View file

@ -8,7 +8,7 @@
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
# SPDX-License-Identifier: GPL-3.0-or-later
- name: Get volume informations and register it in a variable
- name: Get volume information and register it in a variable
scaleway_volume_info:
region: par1
register: volumes
@ -22,7 +22,7 @@
that:
- volumes is success
- name: Get volume informations and register it in a variable (AMS1)
- name: Get volume information and register it in a variable (AMS1)
scaleway_volume_info:
region: ams1
register: ams1_volumes

View file

@ -50,7 +50,7 @@
state: present
# Check if re-installing etcd3 is required
- name: Check if etcd3ctl exists for re-use.
- name: Check if etcd3ctl exists for reuse.
shell: "ETCDCTL_API=3 {{ etcd3_path }}/etcdctl --endpoints=localhost:2379 get foo"
args:
executable: /bin/bash

View file

@ -33,7 +33,7 @@
src: "{{ ssh_config_test }}"
register: slurp_ssh_config
- name: "Options - Verify that nothign was added to {{ ssh_config_test }} during change mode"
- name: "Options - Verify that nothing was added to {{ ssh_config_test }} during change mode"
assert:
that:
- "'options.example.com' not in slurp_ssh_config['content'] | b64decode"
@ -243,7 +243,7 @@
src: "{{ ssh_config_test }}"
register: slurp_ssh_config
- name: "Options - Verify that nothign was added to {{ ssh_config_test }} during change mode"
- name: "Options - Verify that nothing was added to {{ ssh_config_test }} during change mode"
assert:
that:
- "'options.example.com' not in slurp_ssh_config['content'] | b64decode"

View file

@ -63,5 +63,5 @@
loop_control:
index_var: provider_index
- name: Test Complex Varibles
- name: Test Complex Variables
ansible.builtin.include_tasks: complex_variables.yml