From 7e3916b767e1f02fae67630ce7e81bdf47825282 Mon Sep 17 00:00:00 2001 From: Lee Garrett Date: Sat, 27 Jul 2024 18:16:34 +0200 Subject: [PATCH] Typo fixes and other bits and bobs (#83672) Co-authored-by: Lee Garrett --- .github/ISSUE_TEMPLATE/bug_report.yml | 2 +- .github/ISSUE_TEMPLATE/feature_request.yml | 2 +- changelogs/fragments/83540-update_disto_version.yml | 2 +- lib/ansible/cli/config.py | 4 ++-- lib/ansible/cli/console.py | 2 +- lib/ansible/cli/doc.py | 4 ++-- lib/ansible/config/base.yml | 4 ++-- lib/ansible/executor/interpreter_discovery.py | 2 +- lib/ansible/executor/powershell/exec_wrapper.ps1 | 2 +- lib/ansible/executor/task_queue_manager.py | 2 +- lib/ansible/executor/task_result.py | 2 +- lib/ansible/galaxy/collection/concrete_artifact_manager.py | 2 +- lib/ansible/galaxy/dependency_resolution/providers.py | 6 +++--- lib/ansible/module_utils/basic.py | 2 +- lib/ansible/module_utils/common/collections.py | 2 +- lib/ansible/module_utils/facts/hardware/openbsd.py | 2 +- lib/ansible/module_utils/facts/network/hpux.py | 2 +- lib/ansible/module_utils/facts/system/service_mgr.py | 2 +- .../powershell/Ansible.ModuleUtils.AddType.psm1 | 2 +- .../powershell/Ansible.ModuleUtils.CamelConversion.psm1 | 2 +- lib/ansible/module_utils/splitter.py | 2 +- lib/ansible/modules/apt.py | 2 +- lib/ansible/modules/git.py | 2 +- lib/ansible/modules/hostname.py | 2 +- lib/ansible/modules/sysvinit.py | 2 +- lib/ansible/modules/user.py | 2 +- lib/ansible/parsing/yaml/objects.py | 2 +- lib/ansible/playbook/playbook_include.py | 4 ++-- lib/ansible/playbook/role/__init__.py | 4 ++-- lib/ansible/plugins/action/__init__.py | 2 +- lib/ansible/plugins/cliconf/__init__.py | 2 +- lib/ansible/plugins/connection/psrp.py | 2 +- lib/ansible/plugins/filter/strftime.yml | 2 +- lib/ansible/plugins/filter/to_uuid.yml | 2 +- lib/ansible/plugins/inventory/script.py | 2 +- lib/ansible/plugins/list.py | 2 +- lib/ansible/plugins/lookup/config.py | 2 +- lib/ansible/plugins/shell/__init__.py | 2 +- lib/ansible/plugins/strategy/__init__.py | 2 +- lib/ansible/template/__init__.py | 2 +- .../tasks/fail_fast_resolvelib.yml | 2 +- .../targets/ansible-galaxy-collection/tasks/verify.yml | 2 +- .../tasks/virtual_direct_requests.yml | 2 +- .../targets/ansible-pull/pull-integration-test/local.yml | 2 +- .../targets/apt_key/tasks/apt_key_inline_data.yml | 2 +- test/integration/targets/apt_repository/tasks/mode.yaml | 6 +++--- test/integration/targets/assert/runme.sh | 2 +- .../integration/targets/async_fail/action_plugins/normal.py | 2 +- .../blockinfile/tasks/add_block_to_existing_file.yml | 4 ++-- test/integration/targets/blocks/issue71306.yml | 2 +- test/integration/targets/callback_results/runme.sh | 2 +- .../targets/check_mode/check_mode-not-on-cli.yml | 2 +- .../targets/connection_ssh/check_ssh_defaults.yml | 4 ++-- .../files/{port_overrride_ssh.cfg => port_override_ssh.cfg} | 0 test/integration/targets/copy/tasks/check_mode.yml | 2 +- ...legate_vars_hanldling.yml => delegate_vars_handling.yml} | 2 +- test/integration/targets/delegate_to/runme.sh | 2 +- .../delegate_to/test_delegate_to_loop_randomness.yml | 2 +- test/integration/targets/fetch/injection/library/slurp.py | 2 +- test/integration/targets/fetch/runme.sh | 2 +- test/integration/targets/file/tasks/directory_as_dest.yml | 2 +- test/integration/targets/get_url/tasks/use_netrc.yml | 4 ++-- test/integration/targets/git/tasks/submodules.yml | 2 +- test/integration/targets/ignore_unreachable/runme.sh | 2 +- test/integration/targets/include_import/runme.sh | 2 +- .../integration/targets/inventory/host_vars_constructed.yml | 2 +- ...ructed_with_hostvars.py => constructed_with_hostvars.py} | 0 test/integration/targets/lineinfile/tasks/main.yml | 2 +- test/integration/targets/lookup_ini/test_case_sensitive.yml | 2 +- test/integration/targets/pause/runme.sh | 2 +- test/integration/targets/pause/test-pause.yml | 2 +- test/integration/targets/pip/tasks/pip.yml | 6 +++--- test/integration/targets/plugin_loader/use_coll_name.yml | 2 +- .../targets/prepare_http_tests/tasks/kerberos.yml | 2 +- test/integration/targets/register/runme.sh | 2 +- .../rel_plugin_loading/subdir/inventory_plugins/notyaml.py | 2 +- test/integration/targets/roles/roles/data/tasks/main.yml | 2 +- test/integration/targets/rpm_key/tasks/rpm_key.yaml | 2 +- test/integration/targets/script/tasks/main.yml | 2 +- .../shell/connection_plugins/test_connection_default.py | 2 +- test/integration/targets/special_vars/tasks/main.yml | 2 +- test/integration/targets/tasks/playbook.yml | 2 +- test/integration/targets/template/corner_cases.yml | 2 +- test/integration/targets/throttle/test_throttle.yml | 2 +- .../targets/unarchive/tasks/test_missing_binaries.yml | 2 +- .../targets/unarchive/tasks/test_parent_not_writeable.yml | 2 +- test/integration/targets/unarchive/tasks/test_symlink.yml | 2 +- test/integration/targets/unicode/unicode.yml | 2 +- test/integration/targets/unsafe_writes/runme.sh | 2 +- test/integration/targets/uri/tasks/main.yml | 2 +- test/integration/targets/uri/tasks/unix-socket.yml | 2 +- test/integration/targets/win_raw/tasks/main.yml | 2 +- test/lib/ansible_test/_internal/ci/azp.py | 2 +- .../_internal/commands/integration/cloud/hcloud.py | 2 +- .../lib/ansible_test/_util/target/sanity/import/importer.py | 2 +- .../ansible/netcommon/plugins/action/net_put.py | 4 ++-- .../ansible/windows/plugins/module_utils/WebRequest.psm1 | 2 +- .../plugins/modules/win_certificate_store.ps1 | 4 ++-- .../windows-integration/plugins/modules/win_copy.ps1 | 2 +- .../support/windows-integration/plugins/modules/win_copy.py | 2 +- test/units/cli/test_galaxy.py | 2 +- test/units/cli/test_vault.py | 2 +- test/units/executor/test_play_iterator.py | 2 +- test/units/executor/test_task_result.py | 2 +- test/units/galaxy/test_api.py | 2 +- test/units/galaxy/test_collection_install.py | 2 +- test/units/module_utils/basic/test_sanitize_keys.py | 2 +- test/units/module_utils/common/test_locale.py | 2 +- test/units/module_utils/common/warnings/test_warn.py | 2 +- test/units/module_utils/facts/network/test_fc_wwn.py | 2 +- test/units/module_utils/facts/test_collector.py | 2 +- test/units/module_utils/facts/test_facts.py | 2 +- test/units/playbook/test_base.py | 2 +- test/units/playbook/test_included_file.py | 2 +- test/units/plugins/action/test_raw.py | 4 ++-- test/units/plugins/connection/test_ssh.py | 2 +- test/units/template/test_template_utilities.py | 2 +- 117 files changed, 132 insertions(+), 132 deletions(-) rename test/integration/targets/connection_ssh/files/{port_overrride_ssh.cfg => port_override_ssh.cfg} (100%) rename test/integration/targets/delegate_to/{delegate_vars_hanldling.yml => delegate_vars_handling.yml} (98%) rename test/integration/targets/inventory/inventory_plugins/{contructed_with_hostvars.py => constructed_with_hostvars.py} (100%) diff --git a/.github/ISSUE_TEMPLATE/bug_report.yml b/.github/ISSUE_TEMPLATE/bug_report.yml index 3159784d158..75104bb5296 100644 --- a/.github/ISSUE_TEMPLATE/bug_report.yml +++ b/.github/ISSUE_TEMPLATE/bug_report.yml @@ -54,7 +54,7 @@ body: Why? - We would do it by ourselves but unfortunatelly, the curent + We would do it by ourselves but unfortunately, the current edition of GitHub Issue Forms Alpha does not support this yet 🤷 diff --git a/.github/ISSUE_TEMPLATE/feature_request.yml b/.github/ISSUE_TEMPLATE/feature_request.yml index dd39c40de1c..89541cdec51 100644 --- a/.github/ISSUE_TEMPLATE/feature_request.yml +++ b/.github/ISSUE_TEMPLATE/feature_request.yml @@ -109,7 +109,7 @@ body: Why? - We would do it by ourselves but unfortunatelly, the curent + We would do it by ourselves but unfortunately, the current edition of GitHub Issue Forms Alpha does not support this yet 🤷 diff --git a/changelogs/fragments/83540-update_disto_version.yml b/changelogs/fragments/83540-update_disto_version.yml index 9de3b480cad..47141746bb6 100644 --- a/changelogs/fragments/83540-update_disto_version.yml +++ b/changelogs/fragments/83540-update_disto_version.yml @@ -1,2 +1,2 @@ bugfixes: - - disro package - update the distro package version from 1.8.0 to 1.9.0 (https://github.com/ansible/ansible/issues/82935) \ No newline at end of file + - distro package - update the distro package version from 1.8.0 to 1.9.0 (https://github.com/ansible/ansible/issues/82935) diff --git a/lib/ansible/cli/config.py b/lib/ansible/cli/config.py index e17a26f369d..da9231af74b 100755 --- a/lib/ansible/cli/config.py +++ b/lib/ansible/cli/config.py @@ -506,7 +506,7 @@ class ConfigCLI(CLI): # prep loading loader = getattr(plugin_loader, '%s_loader' % ptype) - # acumulators + # accumulators output = [] config_entries = {} @@ -523,7 +523,7 @@ class ConfigCLI(CLI): plugin_cs = loader.all(class_only=True) for plugin in plugin_cs: - # in case of deprecastion they diverge + # in case of deprecation they diverge finalname = name = plugin._load_name if name.startswith('_'): if os.path.islink(plugin._original_path): diff --git a/lib/ansible/cli/console.py b/lib/ansible/cli/console.py index 5805b97fce8..60f9cdd84a7 100755 --- a/lib/ansible/cli/console.py +++ b/lib/ansible/cli/console.py @@ -545,7 +545,7 @@ class ConsoleCLI(CLI, cmd.Cmd): if path: module_loader.add_directory(path) - # dynamically add 'cannonical' modules as commands, aliases coudld be used and dynamically loaded + # dynamically add 'canonical' modules as commands, aliases could be used and dynamically loaded self.modules = self.list_modules() for module in self.modules: setattr(self, 'do_' + module, lambda arg, module=module: self.default(module + ' ' + arg)) diff --git a/lib/ansible/cli/doc.py b/lib/ansible/cli/doc.py index 4d9dfbe57d2..8a0fefa0224 100755 --- a/lib/ansible/cli/doc.py +++ b/lib/ansible/cli/doc.py @@ -50,7 +50,7 @@ PB_OBJECTS = ['Play', 'Role', 'Block', 'Task', 'Handler'] PB_LOADED = {} SNIPPETS = ['inventory', 'lookup', 'module'] -# harcoded from ascii values +# hardcoded from ascii values STYLE = { 'BLINK': '\033[5m', 'BOLD': '\033[1m', @@ -1195,7 +1195,7 @@ class DocCLI(CLI, RoleMixin): opt_leadin = "-" key = "%s%s %s" % (base_indent, opt_leadin, _format(o, 'yellow')) - # description is specifically formated and can either be string or list of strings + # description is specifically formatted and can either be string or list of strings if 'description' not in opt: raise AnsibleError("All (sub-)options and return values must have a 'description' field") text.append('') diff --git a/lib/ansible/config/base.yml b/lib/ansible/config/base.yml index edeae44f795..6fabaee0813 100644 --- a/lib/ansible/config/base.yml +++ b/lib/ansible/config/base.yml @@ -1018,7 +1018,7 @@ DEFAULT_STDOUT_CALLBACK: EDITOR: name: editor application to use default: vi - descrioption: + description: - for the cases in which Ansible needs to return a file within an editor, this chooses the application to use. ini: - section: defaults @@ -1781,7 +1781,7 @@ OLD_PLUGIN_CACHE_CLEARING: PAGER: name: pager application to use default: less - descrioption: + description: - for the cases in which Ansible needs to return output in a pageable fashion, this chooses the application to use. ini: - section: defaults diff --git a/lib/ansible/executor/interpreter_discovery.py b/lib/ansible/executor/interpreter_discovery.py index 6d105817b03..24b2174d3c8 100644 --- a/lib/ansible/executor/interpreter_discovery.py +++ b/lib/ansible/executor/interpreter_discovery.py @@ -41,7 +41,7 @@ class InterpreterDiscoveryRequiredError(Exception): def discover_interpreter(action, interpreter_name, discovery_mode, task_vars): # interpreter discovery is a 2-step process with the target. First, we use a simple shell-agnostic bootstrap to # get the system type from uname, and find any random Python that can get us the info we need. For supported - # target OS types, we'll dispatch a Python script that calls plaform.dist() (for older platforms, where available) + # target OS types, we'll dispatch a Python script that calls platform.dist() (for older platforms, where available) # and brings back /etc/os-release (if present). The proper Python path is looked up in a table of known # distros/versions with included Pythons; if nothing is found, depending on the discovery mode, either the # default fallback of /usr/bin/python is used (if we know it's there), or discovery fails. diff --git a/lib/ansible/executor/powershell/exec_wrapper.ps1 b/lib/ansible/executor/powershell/exec_wrapper.ps1 index cce99abc77f..4ecc1367c84 100644 --- a/lib/ansible/executor/powershell/exec_wrapper.ps1 +++ b/lib/ansible/executor/powershell/exec_wrapper.ps1 @@ -16,7 +16,7 @@ begin { .SYNOPSIS Converts a JSON string to a Hashtable/Array in the fastest way possible. Unfortunately ConvertFrom-Json is still faster but outputs - a PSCustomObject which is combersone for module consumption. + a PSCustomObject which is cumbersome for module consumption. .PARAMETER InputObject [String] The JSON string to deserialize. diff --git a/lib/ansible/executor/task_queue_manager.py b/lib/ansible/executor/task_queue_manager.py index f6e8c8bf7e0..3b9e251da81 100644 --- a/lib/ansible/executor/task_queue_manager.py +++ b/lib/ansible/executor/task_queue_manager.py @@ -223,7 +223,7 @@ class TaskQueueManager: callback_type = getattr(callback_plugin, 'CALLBACK_TYPE', '') callback_needs_enabled = getattr(callback_plugin, 'CALLBACK_NEEDS_ENABLED', getattr(callback_plugin, 'CALLBACK_NEEDS_WHITELIST', False)) - # try to get colleciotn world name first + # try to get collection world name first cnames = getattr(callback_plugin, '_redirected_names', []) if cnames: # store the name the plugin was loaded as, as that's what we'll need to compare to the configured callback list later diff --git a/lib/ansible/executor/task_result.py b/lib/ansible/executor/task_result.py index 2690f3a52bb..821189367d1 100644 --- a/lib/ansible/executor/task_result.py +++ b/lib/ansible/executor/task_result.py @@ -139,7 +139,7 @@ class TaskResult: elif self._result: result._result = module_response_deepcopy(self._result) - # actualy remove + # actually remove for remove_key in ignore: if remove_key in result._result: del result._result[remove_key] diff --git a/lib/ansible/galaxy/collection/concrete_artifact_manager.py b/lib/ansible/galaxy/collection/concrete_artifact_manager.py index a67138fd2f4..06c1cf6f93b 100644 --- a/lib/ansible/galaxy/collection/concrete_artifact_manager.py +++ b/lib/ansible/galaxy/collection/concrete_artifact_manager.py @@ -61,7 +61,7 @@ class ConcreteArtifactsManager: """ def __init__(self, b_working_directory, validate_certs=True, keyring=None, timeout=60, required_signature_count=None, ignore_signature_errors=None): # type: (bytes, bool, str, int, str, list[str]) -> None - """Initialize ConcreteArtifactsManager caches and costraints.""" + """Initialize ConcreteArtifactsManager caches and constraints.""" self._validate_certs = validate_certs # type: bool self._artifact_cache = {} # type: dict[bytes, bytes] self._galaxy_artifact_cache = {} # type: dict[Candidate | Requirement, bytes] diff --git a/lib/ansible/galaxy/dependency_resolution/providers.py b/lib/ansible/galaxy/dependency_resolution/providers.py index 716f5423b37..7578cae785c 100644 --- a/lib/ansible/galaxy/dependency_resolution/providers.py +++ b/lib/ansible/galaxy/dependency_resolution/providers.py @@ -126,7 +126,7 @@ class CollectionDependencyProviderBase(AbstractProvider): the current candidate list * ``parent`` specifies the candidate that provides - (dependend on) the requirement, or `None` + (depended on) the requirement, or `None` to indicate a root requirement. resolvelib >=0.7.0, < 0.8.0 @@ -202,7 +202,7 @@ class CollectionDependencyProviderBase(AbstractProvider): remote archives), the one-and-only match is returned For a "named" requirement, Galaxy-compatible APIs are consulted - to find concrete candidates for this requirement. Of theres a + to find concrete candidates for this requirement. If there's a pre-installed candidate, it's prepended in front of others. resolvelib >=0.5.3, <0.6.0 @@ -437,7 +437,7 @@ class CollectionDependencyProviderBase(AbstractProvider): # FIXME: differs. So how do we resolve this case? Priority? # FIXME: Taking into account a pinned hash? Exploding on # FIXME: any differences? - # NOTE: The underlying implmentation currently uses first found + # NOTE: The underlying implementation currently uses first found req_map = self._api_proxy.get_collection_dependencies(candidate) # NOTE: This guard expression MUST perform an early exit only diff --git a/lib/ansible/module_utils/basic.py b/lib/ansible/module_utils/basic.py index 154b081c78a..e8f19e68c58 100644 --- a/lib/ansible/module_utils/basic.py +++ b/lib/ansible/module_utils/basic.py @@ -1431,7 +1431,7 @@ class AnsibleModule(object): kwargs['deprecations'] = deprecations # preserve bools/none from no_log - # TODO: once python version on target high enough, dict comprh + # TODO: once python version on target high enough, dict comprehensions preserved = {} for k, v in kwargs.items(): if v is None or isinstance(v, bool): diff --git a/lib/ansible/module_utils/common/collections.py b/lib/ansible/module_utils/common/collections.py index e4cb9ec1d70..28c53e14e2c 100644 --- a/lib/ansible/module_utils/common/collections.py +++ b/lib/ansible/module_utils/common/collections.py @@ -65,7 +65,7 @@ class ImmutableDict(Hashable, Mapping): def is_string(seq): - """Identify whether the input has a string-like type (inclding bytes).""" + """Identify whether the input has a string-like type (including bytes).""" # AnsibleVaultEncryptedUnicode inherits from Sequence, but is expected to be a string like object return isinstance(seq, (text_type, binary_type)) or getattr(seq, '__ENCRYPTED__', False) diff --git a/lib/ansible/module_utils/facts/hardware/openbsd.py b/lib/ansible/module_utils/facts/hardware/openbsd.py index f6765422536..b5f08c0092b 100644 --- a/lib/ansible/module_utils/facts/hardware/openbsd.py +++ b/lib/ansible/module_utils/facts/hardware/openbsd.py @@ -54,7 +54,7 @@ class OpenBSDHardware(Hardware): hardware_facts.update(self.get_dmi_facts()) hardware_facts.update(self.get_uptime_facts()) - # storage devices notorioslly prone to hang/block so they are under a timeout + # storage devices notoriously prone to hang/block so they are under a timeout try: hardware_facts.update(self.get_mount_facts()) except timeout.TimeoutError: diff --git a/lib/ansible/module_utils/facts/network/hpux.py b/lib/ansible/module_utils/facts/network/hpux.py index 5c8905a2763..2f01825bb24 100644 --- a/lib/ansible/module_utils/facts/network/hpux.py +++ b/lib/ansible/module_utils/facts/network/hpux.py @@ -20,7 +20,7 @@ from ansible.module_utils.facts.network.base import Network, NetworkCollector class HPUXNetwork(Network): """ - HP-UX-specifig subclass of Network. Defines networking facts: + HP-UX-specific subclass of Network. Defines networking facts: - default_interface - interfaces (a list of interface names) - interface_ dictionary of ipv4 address information. diff --git a/lib/ansible/module_utils/facts/system/service_mgr.py b/lib/ansible/module_utils/facts/system/service_mgr.py index 0d5462fdd62..20257967c1e 100644 --- a/lib/ansible/module_utils/facts/system/service_mgr.py +++ b/lib/ansible/module_utils/facts/system/service_mgr.py @@ -106,7 +106,7 @@ class ServiceMgrFactCollector(BaseFactCollector): proc_1 = proc_1.strip() if proc_1 is not None and (proc_1 == 'init' or proc_1.endswith('sh')): - # many systems return init, so this cannot be trusted, if it ends in 'sh' it probalby is a shell in a container + # many systems return init, so this cannot be trusted, if it ends in 'sh' it probably is a shell in a container proc_1 = None # if not init/None it should be an identifiable or custom init, so we are done! diff --git a/lib/ansible/module_utils/powershell/Ansible.ModuleUtils.AddType.psm1 b/lib/ansible/module_utils/powershell/Ansible.ModuleUtils.AddType.psm1 index b18a9a1729b..3a1a317ec66 100644 --- a/lib/ansible/module_utils/powershell/Ansible.ModuleUtils.AddType.psm1 +++ b/lib/ansible/module_utils/powershell/Ansible.ModuleUtils.AddType.psm1 @@ -37,7 +37,7 @@ Function Add-CSharpType { .PARAMETER CompileSymbols [String[]] A list of symbols to be defined during compile time. These are added to the existing symbols, 'CORECLR', 'WINDOWS', 'UNIX' that are set - conditionalls in this cmdlet. + conditionals in this cmdlet. .NOTES The following features were added to control the compiling options from the diff --git a/lib/ansible/module_utils/powershell/Ansible.ModuleUtils.CamelConversion.psm1 b/lib/ansible/module_utils/powershell/Ansible.ModuleUtils.CamelConversion.psm1 index 9b86f84188a..fb9fb11c490 100644 --- a/lib/ansible/module_utils/powershell/Ansible.ModuleUtils.CamelConversion.psm1 +++ b/lib/ansible/module_utils/powershell/Ansible.ModuleUtils.CamelConversion.psm1 @@ -4,7 +4,7 @@ # used by Convert-DictToSnakeCase to convert a string in camelCase # format to snake_case Function Convert-StringToSnakeCase($string) { - # cope with pluralized abbreaviations such as TargetGroupARNs + # cope with pluralized abbreviations such as TargetGroupARNs if ($string -cmatch "[A-Z]{3,}s") { $replacement_string = $string -creplace $matches[0], "_$($matches[0].ToLower())" diff --git a/lib/ansible/module_utils/splitter.py b/lib/ansible/module_utils/splitter.py index 7bddd32dae1..e2a3da50543 100644 --- a/lib/ansible/module_utils/splitter.py +++ b/lib/ansible/module_utils/splitter.py @@ -81,7 +81,7 @@ def split_args(args): ''' # the list of params parsed out of the arg string - # this is going to be the result value when we are donei + # this is going to be the result value when we are done params = [] # here we encode the args, so we have a uniform charset to diff --git a/lib/ansible/modules/apt.py b/lib/ansible/modules/apt.py index fa22d905351..70a2a07cc07 100644 --- a/lib/ansible/modules/apt.py +++ b/lib/ansible/modules/apt.py @@ -507,7 +507,7 @@ def package_best_match(pkgname, version_cmp, version, release, cache): policy.create_pin('Release', pkgname, release, 990) if version_cmp == "=": # Installing a specific version from command line overrides all pinning - # We don't mimmic this exactly, but instead set a priority which is higher than all APT built-in pin priorities. + # We don't mimic this exactly, but instead set a priority which is higher than all APT built-in pin priorities. policy.create_pin('Version', pkgname, version, 1001) pkg = cache[pkgname] pkgver = policy.get_candidate_ver(pkg) diff --git a/lib/ansible/modules/git.py b/lib/ansible/modules/git.py index 747acf0f1ba..c9ccff4bfc8 100644 --- a/lib/ansible/modules/git.py +++ b/lib/ansible/modules/git.py @@ -468,7 +468,7 @@ def write_ssh_wrapper(module): def set_git_ssh_env(key_file, ssh_opts, git_version, module): ''' use environment variables to configure git's ssh execution, - which varies by version but this functino should handle all. + which varies by version but this function should handle all. ''' # initialise to existing ssh opts and/or append user provided diff --git a/lib/ansible/modules/hostname.py b/lib/ansible/modules/hostname.py index 7fe04ad82d8..4b2ee682f2e 100644 --- a/lib/ansible/modules/hostname.py +++ b/lib/ansible/modules/hostname.py @@ -516,7 +516,7 @@ class DarwinStrategy(BaseStrategy): However, macOS also has LocalHostName and ComputerName settings. LocalHostName controls the Bonjour/ZeroConf name, used by services like AirDrop. This class implements a method, _scrub_hostname(), that mimics - the transformations macOS makes on hostnames when enterened in the Sharing + the transformations macOS makes on hostnames when entered in the Sharing preference pane. It replaces spaces with dashes and removes all special characters. diff --git a/lib/ansible/modules/sysvinit.py b/lib/ansible/modules/sysvinit.py index 69b00accdbf..8788162819e 100644 --- a/lib/ansible/modules/sysvinit.py +++ b/lib/ansible/modules/sysvinit.py @@ -203,7 +203,7 @@ def main(): worked = is_started = get_ps(module, pattern) else: if location.get('service'): - # standard tool that has been 'destandarized' by reimplementation in other OS/distros + # standard tool that has been 'destandardized' by reimplementation in other OS/distros cmd = '%s %s status' % (location['service'], name) elif script: # maybe script implements status (not LSB) diff --git a/lib/ansible/modules/user.py b/lib/ansible/modules/user.py index 1e8aa830bf9..8cf27b37b2d 100644 --- a/lib/ansible/modules/user.py +++ b/lib/ansible/modules/user.py @@ -2331,7 +2331,7 @@ class DarwinUser(User): super(DarwinUser, self).__init__(module) - # make the user hidden if option is set or deffer to system option + # make the user hidden if option is set or defer to system option if self.hidden is None: if self.system: self.hidden = 1 diff --git a/lib/ansible/parsing/yaml/objects.py b/lib/ansible/parsing/yaml/objects.py index b6a8e9a5681..6ec4850b192 100644 --- a/lib/ansible/parsing/yaml/objects.py +++ b/lib/ansible/parsing/yaml/objects.py @@ -122,7 +122,7 @@ class AnsibleVaultEncryptedUnicode(Sequence, AnsibleBaseYAMLObject): return True def __reversed__(self): - # This gets inerhited from ``collections.Sequence`` which returns a generator + # This gets inherited from ``collections.Sequence`` which returns a generator # make this act more like the string implementation return to_text(self[::-1], errors='surrogate_or_strict') diff --git a/lib/ansible/playbook/playbook_include.py b/lib/ansible/playbook/playbook_include.py index 613f93995aa..8f1e03d7e78 100644 --- a/lib/ansible/playbook/playbook_include.py +++ b/lib/ansible/playbook/playbook_include.py @@ -90,7 +90,7 @@ class PlaybookInclude(Base, Conditional, Taggable): # it is a collection playbook, setup default collections AnsibleCollectionConfig.default_collection = playbook_collection else: - # it is NOT a collection playbook, setup adjecent paths + # it is NOT a collection playbook, setup adjacent paths AnsibleCollectionConfig.playbook_paths.append(os.path.dirname(os.path.abspath(to_bytes(playbook, errors='surrogate_or_strict')))) pb._load_playbook_data(file_name=playbook, variable_manager=variable_manager, vars=self.vars.copy()) @@ -123,7 +123,7 @@ class PlaybookInclude(Base, Conditional, Taggable): def preprocess_data(self, ds): ''' - Regorganizes the data for a PlaybookInclude datastructure to line + Reorganizes the data for a PlaybookInclude datastructure to line up with what we expect the proper attributes to be ''' diff --git a/lib/ansible/playbook/role/__init__.py b/lib/ansible/playbook/role/__init__.py index 1c82e5335c4..c37f4be6dbe 100644 --- a/lib/ansible/playbook/role/__init__.py +++ b/lib/ansible/playbook/role/__init__.py @@ -107,7 +107,7 @@ class Role(Base, Conditional, Taggable, CollectionSearch, Delegatable): self.static = static # includes (static=false) default to private, while imports (static=true) default to public - # but both can be overriden by global config if set + # but both can be overridden by global config if set if public is None: global_private, origin = C.config.get_config_value_and_origin('DEFAULT_PRIVATE_ROLE_VARS') if origin == 'default': @@ -508,7 +508,7 @@ class Role(Base, Conditional, Taggable, CollectionSearch, Delegatable): # get exported variables from meta/dependencies seen = [] for dep in self.get_all_dependencies(): - # Avoid reruning dupe deps since they can have vars from previous invocations and they accumulate in deps + # Avoid rerunning dupe deps since they can have vars from previous invocations and they accumulate in deps # TODO: re-examine dep loading to see if we are somehow improperly adding the same dep too many times if dep not in seen: # only take 'exportable' vars from deps diff --git a/lib/ansible/plugins/action/__init__.py b/lib/ansible/plugins/action/__init__.py index 4177d6bad6f..de0f58a96b2 100644 --- a/lib/ansible/plugins/action/__init__.py +++ b/lib/ansible/plugins/action/__init__.py @@ -146,7 +146,7 @@ class ActionBase(ABC): Be cautious when directly passing ``new_module_args`` directly to a module invocation, as it will contain the defaults, and not only the args supplied from the task. If you do this, the module - should not define ``mututally_exclusive`` or similar. + should not define ``mutually_exclusive`` or similar. This code is roughly copied from the ``validate_argument_spec`` action plugin for use by other action plugins. diff --git a/lib/ansible/plugins/cliconf/__init__.py b/lib/ansible/plugins/cliconf/__init__.py index 9befd36f332..6bbc8f850ef 100644 --- a/lib/ansible/plugins/cliconf/__init__.py +++ b/lib/ansible/plugins/cliconf/__init__.py @@ -263,7 +263,7 @@ class CliconfBase(AnsiblePlugin): 'supports_commit_comment': , # identify if adding comment to commit is supported of not 'supports_onbox_diff': , # identify if on box diff capability is supported or not 'supports_generate_diff': , # identify if diff capability is supported within plugin - 'supports_multiline_delimiter': , # identify if multiline demiliter is supported within config + 'supports_multiline_delimiter': , # identify if multiline delimiter is supported within config 'supports_diff_match': , # identify if match is supported 'supports_diff_ignore_lines': , # identify if ignore line in diff is supported 'supports_config_replace': , # identify if running config replace with candidate config is supported diff --git a/lib/ansible/plugins/connection/psrp.py b/lib/ansible/plugins/connection/psrp.py index b69a1d80f0e..c9895d4450c 100644 --- a/lib/ansible/plugins/connection/psrp.py +++ b/lib/ansible/plugins/connection/psrp.py @@ -346,7 +346,7 @@ class Connection(ConnectionBase): has_pipelining = True allow_extras = True - # Satifies mypy as this connection only ever runs with this plugin + # Satisfies mypy as this connection only ever runs with this plugin _shell: PowerShellPlugin def __init__(self, *args: t.Any, **kwargs: t.Any) -> None: diff --git a/lib/ansible/plugins/filter/strftime.yml b/lib/ansible/plugins/filter/strftime.yml index 972072948a9..fffa6d447d1 100644 --- a/lib/ansible/plugins/filter/strftime.yml +++ b/lib/ansible/plugins/filter/strftime.yml @@ -3,7 +3,7 @@ DOCUMENTATION: version_added: "2.4" short_description: date formating description: - - Using Python's C(strftime) function, take a data formating string and a date/time to create a formated date. + - Using Python's C(strftime) function, take a data formating string and a date/time to create a formatted date. notes: - This is a passthrough to Python's C(stftime), for a complete set of formatting options go to https://strftime.org/. positional: _input, second, utc diff --git a/lib/ansible/plugins/filter/to_uuid.yml b/lib/ansible/plugins/filter/to_uuid.yml index 266bf05fca6..50824779dad 100644 --- a/lib/ansible/plugins/filter/to_uuid.yml +++ b/lib/ansible/plugins/filter/to_uuid.yml @@ -3,7 +3,7 @@ DOCUMENTATION: version_added: "2.9" short_description: namespaced UUID generator description: - - Use to generate namespeced Universal Unique ID. + - Use to generate namespaced Universal Unique ID. positional: _input, namespace options: _input: diff --git a/lib/ansible/plugins/inventory/script.py b/lib/ansible/plugins/inventory/script.py index d3bfc8e83ae..9b4c316ebdd 100644 --- a/lib/ansible/plugins/inventory/script.py +++ b/lib/ansible/plugins/inventory/script.py @@ -130,7 +130,7 @@ EXAMPLES = r'''# fmt: code mandatory_options = arg_parser.add_mutually_exclusive_group() mandatory_options.add_argument('--list', action='store', nargs="*", help="Get inventory JSON from our API") mandatory_options.add_argument('--host', action='store', - help="Get variables for specific host, not used but kept for compatability") + help="Get variables for specific host, not used but kept for compatibility") try: config = load_config() diff --git a/lib/ansible/plugins/list.py b/lib/ansible/plugins/list.py index 18cbd4586ed..96f1b0f31d5 100644 --- a/lib/ansible/plugins/list.py +++ b/lib/ansible/plugins/list.py @@ -84,7 +84,7 @@ def _list_plugins_from_paths(ptype, dirs, collection, depth=0): to_native(b_ext) in C.REJECT_EXTS, # general extensions to ignore b_ext in (b'.yml', b'.yaml', b'.json'), # ignore docs files TODO: constant! plugin in IGNORE.get(bkey, ()), # plugin in reject list - os.path.islink(full_path), # skip aliases, author should document in 'aliaes' field + os.path.islink(full_path), # skip aliases, author should document in 'aliases' field ]): continue diff --git a/lib/ansible/plugins/lookup/config.py b/lib/ansible/plugins/lookup/config.py index 4c6b000b64b..093c1a50036 100644 --- a/lib/ansible/plugins/lookup/config.py +++ b/lib/ansible/plugins/lookup/config.py @@ -8,7 +8,7 @@ DOCUMENTATION = """ version_added: "2.5" short_description: Display the 'resolved' Ansible option values. description: - - Retrieves the value of an Ansible configuration setting, resolving all sources, from defaults, ansible.cfg, envirionmnet, + - Retrieves the value of an Ansible configuration setting, resolving all sources, from defaults, ansible.cfg, environment, CLI, and variables, but not keywords. - The values returned assume the context of the current host or C(inventory_hostname). - You can use C(ansible-config list) to see the global available settings, add C(-t all) to also show plugin options. diff --git a/lib/ansible/plugins/shell/__init__.py b/lib/ansible/plugins/shell/__init__.py index 19365d38d2e..1da3b1f6d10 100644 --- a/lib/ansible/plugins/shell/__init__.py +++ b/lib/ansible/plugins/shell/__init__.py @@ -129,7 +129,7 @@ class ShellBase(AnsiblePlugin): # other users can read and access the tmp directory. # This is because we use system to create tmp dirs for unprivileged users who are # sudo'ing to a second unprivileged user. - # The 'system_tmpdirs' setting defines dirctories we can use for this purpose + # The 'system_tmpdirs' setting defines directories we can use for this purpose # the default are, /tmp and /var/tmp. # So we only allow one of those locations if system=True, using the # passed in tmpdir if it is valid or the first one from the setting if not. diff --git a/lib/ansible/plugins/strategy/__init__.py b/lib/ansible/plugins/strategy/__init__.py index c2ef9048237..481009b8df9 100644 --- a/lib/ansible/plugins/strategy/__init__.py +++ b/lib/ansible/plugins/strategy/__init__.py @@ -646,7 +646,7 @@ class StrategyBase: for result_item in result_items: if '_ansible_notify' in result_item and task_result.is_changed(): # only ensure that notified handlers exist, if so save the notifications for when - # handlers are actually flushed so the last defined handlers are exexcuted, + # handlers are actually flushed so the last defined handlers are executed, # otherwise depending on the setting either error or warn host_state = iterator.get_state_for_host(original_host.name) for notification in result_item['_ansible_notify']: diff --git a/lib/ansible/template/__init__.py b/lib/ansible/template/__init__.py index a42e5ce14ba..e23b3c5f5c9 100644 --- a/lib/ansible/template/__init__.py +++ b/lib/ansible/template/__init__.py @@ -469,7 +469,7 @@ class JinjaPluginIntercept(MutableMapping): if self._pluginloader.type == 'filter': # filter need wrapping if key in C.STRING_TYPE_FILTERS: - # avoid litera_eval when you WANT strings + # avoid literal_eval when you WANT strings func = _wrap_native_text(func) else: # conditionally unroll iterators/generators to avoid having to use `|list` after every filter diff --git a/test/integration/targets/ansible-galaxy-collection/tasks/fail_fast_resolvelib.yml b/test/integration/targets/ansible-galaxy-collection/tasks/fail_fast_resolvelib.yml index d861cb4d008..f0c94629f10 100644 --- a/test/integration/targets/ansible-galaxy-collection/tasks/fail_fast_resolvelib.yml +++ b/test/integration/targets/ansible-galaxy-collection/tasks/fail_fast_resolvelib.yml @@ -7,7 +7,7 @@ dest: "{{ galaxy_dir }}/resolvelib/ns/coll" state: directory - - name: create galaxy.yml with a dependecy on a galaxy-sourced collection + - name: create galaxy.yml with a dependency on a galaxy-sourced collection copy: dest: "{{ galaxy_dir }}/resolvelib/ns/coll/galaxy.yml" content: | diff --git a/test/integration/targets/ansible-galaxy-collection/tasks/verify.yml b/test/integration/targets/ansible-galaxy-collection/tasks/verify.yml index 2ad9c832172..9dda1b71b53 100644 --- a/test/integration/targets/ansible-galaxy-collection/tasks/verify.yml +++ b/test/integration/targets/ansible-galaxy-collection/tasks/verify.yml @@ -153,7 +153,7 @@ that: - "updated_file.stat.checksum != file.stat.checksum" -- name: test verifying checksumes of the modified collection +- name: test verifying checksums of the modified collection command: ansible-galaxy collection verify ansible_test.verify:2.0.0 -s {{ test_name }} {{ galaxy_verbosity }} register: verify failed_when: verify.rc == 0 diff --git a/test/integration/targets/ansible-galaxy-collection/tasks/virtual_direct_requests.yml b/test/integration/targets/ansible-galaxy-collection/tasks/virtual_direct_requests.yml index 7b1931f0cc1..742d7943ad7 100644 --- a/test/integration/targets/ansible-galaxy-collection/tasks/virtual_direct_requests.yml +++ b/test/integration/targets/ansible-galaxy-collection/tasks/virtual_direct_requests.yml @@ -31,7 +31,7 @@ - name: Initialize git repository command: 'git init {{ scm_path }}/test_prereleases' - - name: Configure commiter for the repo + - name: Configure committer for the repo shell: git config user.email ansible-test@ansible.com && git config user.name ansible-test args: chdir: "{{ scm_path }}/test_prereleases" diff --git a/test/integration/targets/ansible-pull/pull-integration-test/local.yml b/test/integration/targets/ansible-pull/pull-integration-test/local.yml index d358ee86863..8b5953e7f34 100644 --- a/test/integration/targets/ansible-pull/pull-integration-test/local.yml +++ b/test/integration/targets/ansible-pull/pull-integration-test/local.yml @@ -13,7 +13,7 @@ - name: final task, has to be reached for the test to succeed debug: msg="MAGICKEYWORD" - - name: check that extra vars are correclty passed + - name: check that extra vars are correctly passed assert: that: - docker_registries_login is defined diff --git a/test/integration/targets/apt_key/tasks/apt_key_inline_data.yml b/test/integration/targets/apt_key/tasks/apt_key_inline_data.yml index 916fa5ae76d..1558eac31a1 100644 --- a/test/integration/targets/apt_key/tasks/apt_key_inline_data.yml +++ b/test/integration/targets/apt_key/tasks/apt_key_inline_data.yml @@ -1,4 +1,4 @@ -- name: "Ensure import of a deliberately corrupted downloaded GnuPG binary key results in an 'inline data' occurence in the message" +- name: "Ensure import of a deliberately corrupted downloaded GnuPG binary key results in an 'inline data' occurrence in the message" apt_key: url: https://ci-files.testing.ansible.com/test/integration/targets/apt_key/apt-key-corrupt-zeros-2k.gpg register: gpg_inline_result diff --git a/test/integration/targets/apt_repository/tasks/mode.yaml b/test/integration/targets/apt_repository/tasks/mode.yaml index 4b4fabf3c67..fd29cf30fa0 100644 --- a/test/integration/targets/apt_repository/tasks/mode.yaml +++ b/test/integration/targets/apt_repository/tasks/mode.yaml @@ -123,12 +123,12 @@ # a literal 600 as the mode will fail currently, in the sense that it # doesn't guess and consider 600 and 0600 to be the same, and will instead -# intepret literal 600 as the decimal 600 (and thereby octal 1130). +# interpret literal 600 as the decimal 600 (and thereby octal 1130). # The literal 0600 can be interpreted as octal correctly. Note that -# a decimal 644 is octal 420. The default perm is 0644 so a mis intrpretation +# a decimal 644 is octal 420. The default perm is 0644 so a misinterpretation # of 644 was previously resulting in a default file mode of 0420. # 'mode: 600' is likely not what a user meant but there isnt enough info -# to determine that. Note that a string arg of '600' will be intrepeted as 0600. +# to determine that. Note that a string arg of '600' will be interpreted as 0600. # See https://github.com/ansible/ansible/issues/16370 - name: Assert mode_given_yaml_literal_600 is correct assert: diff --git a/test/integration/targets/assert/runme.sh b/test/integration/targets/assert/runme.sh index ca0a8587264..542e43959d1 100755 --- a/test/integration/targets/assert/runme.sh +++ b/test/integration/targets/assert/runme.sh @@ -25,7 +25,7 @@ run_test() { sed -i -e 's/ *$//' "${OUTFILE}.${testname}.stdout" sed -i -e 's/ *$//' "${OUTFILE}.${testname}.stderr" - # Scrub deprication warning that shows up in Python 2.6 on CentOS 6 + # Scrub deprecation warning that shows up in Python 2.6 on CentOS 6 sed -i -e '/RandomPool_DeprecationWarning/d' "${OUTFILE}.${testname}.stderr" diff -u "${ORIGFILE}.${testname}.stdout" "${OUTFILE}.${testname}.stdout" || diff_failure diff --git a/test/integration/targets/async_fail/action_plugins/normal.py b/test/integration/targets/async_fail/action_plugins/normal.py index a288290ba2c..22e2a3faeea 100644 --- a/test/integration/targets/async_fail/action_plugins/normal.py +++ b/test/integration/targets/async_fail/action_plugins/normal.py @@ -52,7 +52,7 @@ class ActionModule(ActionBase): # Simulate a transient network failure if self._task.action == 'async_status' and 'finished' in result and result['finished'] != 1: - raise AnsibleError('Pretend to fail somewher ein executing async_status') + raise AnsibleError('Pretend to fail somewhere in executing async_status') if not wrap_async: # remove a temporary path we created diff --git a/test/integration/targets/blockinfile/tasks/add_block_to_existing_file.yml b/test/integration/targets/blockinfile/tasks/add_block_to_existing_file.yml index c610905cdf1..afaef2b2be5 100644 --- a/test/integration/targets/blockinfile/tasks/add_block_to_existing_file.yml +++ b/test/integration/targets/blockinfile/tasks/add_block_to_existing_file.yml @@ -12,7 +12,7 @@ backup: yes register: blockinfile_test0 -- name: ensure we have a bcackup file +- name: ensure we have a backup file assert: that: - "'backup_file' in blockinfile_test0" @@ -38,7 +38,7 @@ - 'blockinfile_test0.msg == "Block inserted"' - 'blockinfile_test0_grep.stdout == "2"' -- name: check idemptotence +- name: check idempotence blockinfile: path: "{{ remote_tmp_dir_test }}/sshd_config" block: | diff --git a/test/integration/targets/blocks/issue71306.yml b/test/integration/targets/blocks/issue71306.yml index 9762f6ee838..049145eab0a 100644 --- a/test/integration/targets/blocks/issue71306.yml +++ b/test/integration/targets/blocks/issue71306.yml @@ -13,4 +13,4 @@ run_once: true rescue: - debug: - msg: "Attemp 1 failed!" + msg: "Attempt 1 failed!" diff --git a/test/integration/targets/callback_results/runme.sh b/test/integration/targets/callback_results/runme.sh index fe3a0a6a34a..f43b43c6832 100755 --- a/test/integration/targets/callback_results/runme.sh +++ b/test/integration/targets/callback_results/runme.sh @@ -16,7 +16,7 @@ grep -e "${EXPECTED_REGEX}" "${OUTFILE}" # test connection tracking EXPECTED_CONNECTION='{"testhost":{"ssh":4}}' OUTPUT_TAIL=$(tail -n5 ${OUTFILE} | tr -d '[:space:]') -echo "Checking for connection strin ${OUTPUT_TAIL} in stdout." +echo "Checking for connection string ${OUTPUT_TAIL} in stdout." [ "${EXPECTED_CONNECTION}" == "${OUTPUT_TAIL}" ] echo $? diff --git a/test/integration/targets/check_mode/check_mode-not-on-cli.yml b/test/integration/targets/check_mode/check_mode-not-on-cli.yml index 1b0c734b98b..d4573b52b87 100644 --- a/test/integration/targets/check_mode/check_mode-not-on-cli.yml +++ b/test/integration/targets/check_mode/check_mode-not-on-cli.yml @@ -1,5 +1,5 @@ --- -# Run withhout --check +# Run without --check - hosts: testhost gather_facts: False tasks: diff --git a/test/integration/targets/connection_ssh/check_ssh_defaults.yml b/test/integration/targets/connection_ssh/check_ssh_defaults.yml index 937f1f7d44c..1732675a628 100644 --- a/test/integration/targets/connection_ssh/check_ssh_defaults.yml +++ b/test/integration/targets/connection_ssh/check_ssh_defaults.yml @@ -4,7 +4,7 @@ ansible_connection: ssh ansible_ssh_timeout: 10 tasks: - - name: contain the maddness + - name: contain the madness block: - name: test all is good ping: @@ -16,7 +16,7 @@ ping: ignore_unreachable: True vars: - ansible_ssh_args: "-F {{playbook_dir}}/files/port_overrride_ssh.cfg" + ansible_ssh_args: "-F {{playbook_dir}}/files/port_override_ssh.cfg" register: expected - name: check all is as expected diff --git a/test/integration/targets/connection_ssh/files/port_overrride_ssh.cfg b/test/integration/targets/connection_ssh/files/port_override_ssh.cfg similarity index 100% rename from test/integration/targets/connection_ssh/files/port_overrride_ssh.cfg rename to test/integration/targets/connection_ssh/files/port_override_ssh.cfg diff --git a/test/integration/targets/copy/tasks/check_mode.yml b/test/integration/targets/copy/tasks/check_mode.yml index 9702e07089a..29b176963bc 100644 --- a/test/integration/targets/copy/tasks/check_mode.yml +++ b/test/integration/targets/copy/tasks/check_mode.yml @@ -36,7 +36,7 @@ - check_mode_subdir_real_stat.stat.exists # Do some finagling here. First, use check_mode to ensure it never gets - # created. Then actualy create it, and use check_mode to ensure that doing + # created. Then actually create it, and use check_mode to ensure that doing # the same copy gets marked as no change. # # This same pattern repeats for several other src/dest combinations. diff --git a/test/integration/targets/delegate_to/delegate_vars_hanldling.yml b/test/integration/targets/delegate_to/delegate_vars_handling.yml similarity index 98% rename from test/integration/targets/delegate_to/delegate_vars_hanldling.yml rename to test/integration/targets/delegate_to/delegate_vars_handling.yml index 6ac64e9ced9..13860a910c9 100644 --- a/test/integration/targets/delegate_to/delegate_vars_hanldling.yml +++ b/test/integration/targets/delegate_to/delegate_vars_handling.yml @@ -1,4 +1,4 @@ -- name: setup delegated hsot +- name: setup delegated host hosts: localhost gather_facts: false tasks: diff --git a/test/integration/targets/delegate_to/runme.sh b/test/integration/targets/delegate_to/runme.sh index e0dcc746aa5..ce5a607d25f 100755 --- a/test/integration/targets/delegate_to/runme.sh +++ b/test/integration/targets/delegate_to/runme.sh @@ -57,7 +57,7 @@ ansible-playbook delegate_facts_block.yml -i inventory -v "$@" ansible-playbook test_delegate_to_loop_caching.yml -i inventory -v "$@" # ensure we are using correct settings when delegating -ANSIBLE_TIMEOUT=3 ansible-playbook delegate_vars_hanldling.yml -i inventory -v "$@" +ANSIBLE_TIMEOUT=3 ansible-playbook delegate_vars_handling.yml -i inventory -v "$@" ansible-playbook has_hostvars.yml -i inventory -v "$@" diff --git a/test/integration/targets/delegate_to/test_delegate_to_loop_randomness.yml b/test/integration/targets/delegate_to/test_delegate_to_loop_randomness.yml index 81033a16a00..9669469d0e6 100644 --- a/test/integration/targets/delegate_to/test_delegate_to_loop_randomness.yml +++ b/test/integration/targets/delegate_to/test_delegate_to_loop_randomness.yml @@ -11,7 +11,7 @@ ansible_python_interpreter: "{{ ansible_playbook_python }}" loop: "{{ range(10)|list }}" - # We expect all of the next 3 runs to succeeed + # We expect all of the next 3 runs to succeed # this is done multiple times to increase randomness - assert: that: diff --git a/test/integration/targets/fetch/injection/library/slurp.py b/test/integration/targets/fetch/injection/library/slurp.py index 1fcd5c25043..5a1ccb23c5e 100644 --- a/test/integration/targets/fetch/injection/library/slurp.py +++ b/test/integration/targets/fetch/injection/library/slurp.py @@ -4,7 +4,7 @@ from __future__ import annotations DOCUMENTATION = """ module: fakeslurp - short_desciptoin: fake slurp module + short_description: fake slurp module description: - this is a fake slurp module options: diff --git a/test/integration/targets/fetch/runme.sh b/test/integration/targets/fetch/runme.sh index a508a0a672f..d2857449b33 100755 --- a/test/integration/targets/fetch/runme.sh +++ b/test/integration/targets/fetch/runme.sh @@ -27,7 +27,7 @@ ansible-playbook -i ../../inventory injection/avoid_slurp_return.yml -e "output_ # Change the known_hosts file to avoid changing the test environment export ANSIBLE_CACHE_PLUGIN=jsonfile export ANSIBLE_CACHE_PLUGIN_CONNECTION="${OUTPUT_DIR}/cache" -# Create a non-root user account and configure SSH acccess for that account +# Create a non-root user account and configure SSH access for that account ansible-playbook -i "${INVENTORY_PATH}" setup_unreadable_test.yml -e "output_dir=${OUTPUT_DIR}" "$@" # Run the tests as the unprivileged user without become to test the use of the stat module from the fetch module diff --git a/test/integration/targets/file/tasks/directory_as_dest.yml b/test/integration/targets/file/tasks/directory_as_dest.yml index 161a12a4bea..5b99d9f675a 100644 --- a/test/integration/targets/file/tasks/directory_as_dest.yml +++ b/test/integration/targets/file/tasks/directory_as_dest.yml @@ -24,7 +24,7 @@ content: 'Hello World' # -# Error condtion: specify a directory with state={link,file}, force=False +# Error condition: specify a directory with state={link,file}, force=False # # file raises an error diff --git a/test/integration/targets/get_url/tasks/use_netrc.yml b/test/integration/targets/get_url/tasks/use_netrc.yml index abef08e5218..c4b02075317 100644 --- a/test/integration/targets/get_url/tasks/use_netrc.yml +++ b/test/integration/targets/get_url/tasks/use_netrc.yml @@ -25,7 +25,7 @@ that: - (response['content'] | b64decode | from_json).user == 'foo' -- name: Test Bearer authorization is successfull with use_netrc=False +- name: Test Bearer authorization is successful with use_netrc=False get_url: url: https://{{ httpbin_host }}/bearer use_netrc: false @@ -40,7 +40,7 @@ src: "{{ remote_tmp_dir }}/msg.txt" register: response -- name: assert Test Bearer authorization is successfull with use_netrc=False +- name: assert Test Bearer authorization is successful with use_netrc=False assert: that: - (response['content'] | b64decode | from_json).token == 'foobar' diff --git a/test/integration/targets/git/tasks/submodules.yml b/test/integration/targets/git/tasks/submodules.yml index 0b311e7984d..44d50df1f37 100644 --- a/test/integration/targets/git/tasks/submodules.yml +++ b/test/integration/targets/git/tasks/submodules.yml @@ -30,7 +30,7 @@ command: 'ls -1a {{ checkout_dir }}/submodule1' register: submodule1 -- name: SUBMODULES | Ensure submodu1 is at the appropriate commit +- name: SUBMODULES | Ensure submodule1 is at the appropriate commit assert: that: '{{ submodule1.stdout_lines | length }} == 2' diff --git a/test/integration/targets/ignore_unreachable/runme.sh b/test/integration/targets/ignore_unreachable/runme.sh index 5b0ef190ef5..ff0ab736a05 100755 --- a/test/integration/targets/ignore_unreachable/runme.sh +++ b/test/integration/targets/ignore_unreachable/runme.sh @@ -2,7 +2,7 @@ set -eux export ANSIBLE_CONNECTION_PLUGINS=./fake_connectors -# use fake connectors that raise srrors at different stages +# use fake connectors that raise errors at different stages ansible-playbook test_with_bad_plugins.yml -i inventory -v "$@" unset ANSIBLE_CONNECTION_PLUGINS diff --git a/test/integration/targets/include_import/runme.sh b/test/integration/targets/include_import/runme.sh index 12ee15b1476..0f69eb512f6 100755 --- a/test/integration/targets/include_import/runme.sh +++ b/test/integration/targets/include_import/runme.sh @@ -68,7 +68,7 @@ ANSIBLE_STRATEGY='free' ansible-playbook test_copious_include_tasks.yml -i inve ANSIBLE_STRATEGY='free' ansible-playbook test_copious_include_tasks_fqcn.yml -i inventory "$@" rm -f tasks/hello/*.yml -# Inlcuded tasks should inherit attrs from non-dynamic blocks in parent chain +# Included tasks should inherit attrs from non-dynamic blocks in parent chain # https://github.com/ansible/ansible/pull/38827 ANSIBLE_STRATEGY='linear' ansible-playbook test_grandparent_inheritance.yml -i inventory "$@" ANSIBLE_STRATEGY='linear' ansible-playbook test_grandparent_inheritance_fqcn.yml -i inventory "$@" diff --git a/test/integration/targets/inventory/host_vars_constructed.yml b/test/integration/targets/inventory/host_vars_constructed.yml index eec52509938..19c3bf992cf 100644 --- a/test/integration/targets/inventory/host_vars_constructed.yml +++ b/test/integration/targets/inventory/host_vars_constructed.yml @@ -1,4 +1,4 @@ -plugin: ansible.legacy.contructed_with_hostvars +plugin: ansible.legacy.constructed_with_hostvars groups: host_var1_defined: host_var1 is defined keyed_groups: diff --git a/test/integration/targets/inventory/inventory_plugins/contructed_with_hostvars.py b/test/integration/targets/inventory/inventory_plugins/constructed_with_hostvars.py similarity index 100% rename from test/integration/targets/inventory/inventory_plugins/contructed_with_hostvars.py rename to test/integration/targets/inventory/inventory_plugins/constructed_with_hostvars.py diff --git a/test/integration/targets/lineinfile/tasks/main.yml b/test/integration/targets/lineinfile/tasks/main.yml index 1914920ab7a..752e96dff6b 100644 --- a/test/integration/targets/lineinfile/tasks/main.yml +++ b/test/integration/targets/lineinfile/tasks/main.yml @@ -875,7 +875,7 @@ path: "{{ remote_tmp_dir }}/testempty.txt" register: oneline_insbefore_file -- name: Assert that insertebefore worked properly with a one line file +- name: Assert that insertbefore worked properly with a one line file assert: that: - oneline_insbefore_test1 is changed diff --git a/test/integration/targets/lookup_ini/test_case_sensitive.yml b/test/integration/targets/lookup_ini/test_case_sensitive.yml index f66674cabe6..21b5264865d 100644 --- a/test/integration/targets/lookup_ini/test_case_sensitive.yml +++ b/test/integration/targets/lookup_ini/test_case_sensitive.yml @@ -22,7 +22,7 @@ msg: "{{ lookup('ini', 'NAME', file='lookup_case_check.properties', type='properties', case_sensitive=True) }}" register: duplicate_case_sensitive_properties_NAME - - name: Ensure the correct case-sensitive values were retieved + - name: Ensure the correct case-sensitive values were retrieved assert: that: - duplicate_case_sensitive_name.msg == 'bob' diff --git a/test/integration/targets/pause/runme.sh b/test/integration/targets/pause/runme.sh index eb2c6f7c7e8..f3c2d31a319 100755 --- a/test/integration/targets/pause/runme.sh +++ b/test/integration/targets/pause/runme.sh @@ -23,7 +23,7 @@ if sleep 0 | ansible localhost -m pause -a 'seconds=1' 2>&1 | grep '\[WARNING\]: echo "Incorrectly issued warning when run in the background" exit 1 else - echo "Succesfully ran in the background with no warning" + echo "Successfully ran in the background with no warning" fi # Test redirecting stdout diff --git a/test/integration/targets/pause/test-pause.yml b/test/integration/targets/pause/test-pause.yml index 1c8045b3e52..b2e9eeed5c9 100644 --- a/test/integration/targets/pause/test-pause.yml +++ b/test/integration/targets/pause/test-pause.yml @@ -4,7 +4,7 @@ become: no tasks: - - name: non-integer for duraction (EXPECTED FAILURE) + - name: non-integer for duration (EXPECTED FAILURE) pause: seconds: hello register: result diff --git a/test/integration/targets/pip/tasks/pip.yml b/test/integration/targets/pip/tasks/pip.yml index 9f1034d29a9..abe90db803c 100644 --- a/test/integration/targets/pip/tasks/pip.yml +++ b/test/integration/targets/pip/tasks/pip.yml @@ -219,13 +219,13 @@ state: absent name: "{{ remote_tmp_dir }}/pipenv" -- name: install pip throught pip into fresh virtualenv +- name: install pip through pip into fresh virtualenv pip: name: pip virtualenv: "{{ remote_tmp_dir }}/pipenv" register: pip_install_venv -- name: make sure pip in fresh virtualenv report changed +- name: make sure pip in fresh virtualenv reports changed assert: that: - "pip_install_venv is changed" @@ -371,7 +371,7 @@ version: "<100,!=1.0,>0.0.0" register: version2 -- name: assert no changes ocurred +- name: assert no changes occurred assert: that: "not version2.changed" diff --git a/test/integration/targets/plugin_loader/use_coll_name.yml b/test/integration/targets/plugin_loader/use_coll_name.yml index 66507ced2c1..3d6931c9747 100644 --- a/test/integration/targets/plugin_loader/use_coll_name.yml +++ b/test/integration/targets/plugin_loader/use_coll_name.yml @@ -1,4 +1,4 @@ -- name: ensure configuration is loaded when we use FQCN and have already loaded using 'short namne' (which is case will all builtin connection plugins) +- name: ensure configuration is loaded when we use FQCN and have already loaded using 'short name' (which is case will all builtin connection plugins) hosts: all gather_facts: false tasks: diff --git a/test/integration/targets/prepare_http_tests/tasks/kerberos.yml b/test/integration/targets/prepare_http_tests/tasks/kerberos.yml index 4b3d4887e77..80ab72815e4 100644 --- a/test/integration/targets/prepare_http_tests/tasks/kerberos.yml +++ b/test/integration/targets/prepare_http_tests/tasks/kerberos.yml @@ -41,7 +41,7 @@ paths: - '{{ role_path }}/vars' -- name: Install Kerberos sytem packages +- name: Install Kerberos system packages package: name: '{{ krb5_packages }}' state: present diff --git a/test/integration/targets/register/runme.sh b/test/integration/targets/register/runme.sh index 8adc5047551..8957096852b 100755 --- a/test/integration/targets/register/runme.sh +++ b/test/integration/targets/register/runme.sh @@ -5,7 +5,7 @@ set -eux # does it work? ansible-playbook can_register.yml -i ../../inventory -v "$@" -# ensure we do error when it its apprpos +# ensure we continue when ansible-playbook errors out set +e result="$(ansible-playbook invalid.yml -i ../../inventory -v "$@" 2>&1)" set -e diff --git a/test/integration/targets/rel_plugin_loading/subdir/inventory_plugins/notyaml.py b/test/integration/targets/rel_plugin_loading/subdir/inventory_plugins/notyaml.py index 4242e2e95f0..e93b500c286 100644 --- a/test/integration/targets/rel_plugin_loading/subdir/inventory_plugins/notyaml.py +++ b/test/integration/targets/rel_plugin_loading/subdir/inventory_plugins/notyaml.py @@ -105,7 +105,7 @@ class InventoryModule(BaseFileInventoryPlugin): raise AnsibleParserError('Plugin configuration YAML file, not YAML inventory') # We expect top level keys to correspond to groups, iterate over them - # to get host, vars and subgroups (which we iterate over recursivelly) + # to get host, vars and subgroups (which we iterate over recursively) if isinstance(data, MutableMapping): for group_name in data: self._parse_group(group_name, data[group_name]) diff --git a/test/integration/targets/roles/roles/data/tasks/main.yml b/test/integration/targets/roles/roles/data/tasks/main.yml index 8d85580c825..ab25f71a666 100644 --- a/test/integration/targets/roles/roles/data/tasks/main.yml +++ b/test/integration/targets/roles/roles/data/tasks/main.yml @@ -1,4 +1,4 @@ -- name: ensure data was correctly defind +- name: ensure data was correctly defined assert: that: - defined_var is defined diff --git a/test/integration/targets/rpm_key/tasks/rpm_key.yaml b/test/integration/targets/rpm_key/tasks/rpm_key.yaml index 204b42acfbd..fb0139b3ae4 100644 --- a/test/integration/targets/rpm_key/tasks/rpm_key.yaml +++ b/test/integration/targets/rpm_key/tasks/rpm_key.yaml @@ -51,7 +51,7 @@ key: /tmp/RPM-GPG-KEY-EPEL-7 register: idempotent_test -- name: check idempontence +- name: check idempotence assert: that: "not idempotent_test.changed" diff --git a/test/integration/targets/script/tasks/main.yml b/test/integration/targets/script/tasks/main.yml index b4deaedbe0d..59dc6eb2407 100644 --- a/test/integration/targets/script/tasks/main.yml +++ b/test/integration/targets/script/tasks/main.yml @@ -205,7 +205,7 @@ var: _check_mode_test2 verbosity: 2 -- name: Assert that task was skipped and mesage was returned +- name: Assert that task was skipped and message was returned assert: that: - _check_mode_test2 is skipped diff --git a/test/integration/targets/shell/connection_plugins/test_connection_default.py b/test/integration/targets/shell/connection_plugins/test_connection_default.py index 6f13102b075..5ff494c8126 100644 --- a/test/integration/targets/shell/connection_plugins/test_connection_default.py +++ b/test/integration/targets/shell/connection_plugins/test_connection_default.py @@ -17,7 +17,7 @@ from ansible.plugins.connection import ConnectionBase class Connection(ConnectionBase): - ''' test connnection ''' + ''' test connection ''' transport = 'test_connection_default' diff --git a/test/integration/targets/special_vars/tasks/main.yml b/test/integration/targets/special_vars/tasks/main.yml index 0e71f1dcdd8..4a9140c18c7 100644 --- a/test/integration/targets/special_vars/tasks/main.yml +++ b/test/integration/targets/special_vars/tasks/main.yml @@ -89,7 +89,7 @@ include_role: name: include_parent_role_vars -- name: check that ansible_parent_role_names is normally unset when not included/imported (after both import and inlcude) +- name: check that ansible_parent_role_names is normally unset when not included/imported (after both import and include) assert: that: - "ansible_parent_role_names is undefined" diff --git a/test/integration/targets/tasks/playbook.yml b/test/integration/targets/tasks/playbook.yml index 10bd8591bd7..83b64793f95 100644 --- a/test/integration/targets/tasks/playbook.yml +++ b/test/integration/targets/tasks/playbook.yml @@ -6,7 +6,7 @@ debug: msg: Hello - # ensure we properly test for an action name, not a task name when cheking for a meta task + # ensure we properly test for an action name, not a task name when checking for a meta task - name: "meta" debug: msg: Hello diff --git a/test/integration/targets/template/corner_cases.yml b/test/integration/targets/template/corner_cases.yml index 9d41ed94d90..ad711e5a927 100644 --- a/test/integration/targets/template/corner_cases.yml +++ b/test/integration/targets/template/corner_cases.yml @@ -6,7 +6,7 @@ dont: I SHOULD NOT BE TEMPLATED other: I WORK tasks: - - name: 'ensure we are not interpolating data from outside of j2 delmiters' + - name: 'ensure we are not interpolating data from outside of j2 delimiters' assert: that: - '"I SHOULD NOT BE TEMPLATED" not in adjacent' diff --git a/test/integration/targets/throttle/test_throttle.yml b/test/integration/targets/throttle/test_throttle.yml index 8990ea2f21a..94385a116fa 100644 --- a/test/integration/targets/throttle/test_throttle.yml +++ b/test/integration/targets/throttle/test_throttle.yml @@ -54,7 +54,7 @@ throttle: 12 throttle: 15 - block: - - name: "Teat 5 (max throttle: 3)" + - name: "Test 5 (max throttle: 3)" script: "test_throttle.py {{throttledir}} {{inventory_hostname}} 3" vars: test_id: 5 diff --git a/test/integration/targets/unarchive/tasks/test_missing_binaries.yml b/test/integration/targets/unarchive/tasks/test_missing_binaries.yml index 39bf4df5edc..8d9256e78ce 100644 --- a/test/integration/targets/unarchive/tasks/test_missing_binaries.yml +++ b/test/integration/targets/unarchive/tasks/test_missing_binaries.yml @@ -80,7 +80,7 @@ - zip - tar - - name: Reinsntall zip binaries + - name: Reinstall zip binaries package: name: - zip diff --git a/test/integration/targets/unarchive/tasks/test_parent_not_writeable.yml b/test/integration/targets/unarchive/tasks/test_parent_not_writeable.yml index bfb082c6aa7..9e0351e5659 100644 --- a/test/integration/targets/unarchive/tasks/test_parent_not_writeable.yml +++ b/test/integration/targets/unarchive/tasks/test_parent_not_writeable.yml @@ -4,7 +4,7 @@ ignore_errors: True register: unarchive04 -- name: fail if the proposed destination file exists for safey +- name: fail if the proposed destination file exists for safety fail: msg: /tmp/foo-unarchive.txt already exists, aborting when: unarchive04.stat.exists diff --git a/test/integration/targets/unarchive/tasks/test_symlink.yml b/test/integration/targets/unarchive/tasks/test_symlink.yml index a511ddde823..5b3b7ceec39 100644 --- a/test/integration/targets/unarchive/tasks/test_symlink.yml +++ b/test/integration/targets/unarchive/tasks/test_symlink.yml @@ -3,7 +3,7 @@ path: "{{ remote_tmp_dir }}/test-unarchive-tar-gz" state: directory -- name: Create a symlink to the detination dir +- name: Create a symlink to the destination dir file: path: "{{ remote_tmp_dir }}/link-to-unarchive-dir" src: "{{ remote_tmp_dir }}/test-unarchive-tar-gz" diff --git a/test/integration/targets/unicode/unicode.yml b/test/integration/targets/unicode/unicode.yml index 672133d580d..f586ba93eaf 100644 --- a/test/integration/targets/unicode/unicode.yml +++ b/test/integration/targets/unicode/unicode.yml @@ -82,7 +82,7 @@ that: - "'Zażółć gęślą jaźń' == results.ping" - - name: Command that echos a non-ascii env var + - name: Command that echoes a non-ascii env var command: "echo $option" environment: option: Zażółć diff --git a/test/integration/targets/unsafe_writes/runme.sh b/test/integration/targets/unsafe_writes/runme.sh index 619ce025680..90263cec4ea 100755 --- a/test/integration/targets/unsafe_writes/runme.sh +++ b/test/integration/targets/unsafe_writes/runme.sh @@ -8,5 +8,5 @@ ansible-playbook basic.yml -i ../../inventory "$@" # test enabled fallback env var ANSIBLE_UNSAFE_WRITES=1 ansible-playbook basic.yml -i ../../inventory "$@" -# test disnabled fallback env var +# test disabled fallback env var ANSIBLE_UNSAFE_WRITES=0 ansible-playbook basic.yml -i ../../inventory "$@" diff --git a/test/integration/targets/uri/tasks/main.yml b/test/integration/targets/uri/tasks/main.yml index 68f77cdc15d..b156f82cb99 100644 --- a/test/integration/targets/uri/tasks/main.yml +++ b/test/integration/targets/uri/tasks/main.yml @@ -232,7 +232,7 @@ register: result ignore_errors: true -- name: Ensure bad SSL site reidrect fails +- name: Ensure bad SSL site redirect fails assert: that: - result is failed diff --git a/test/integration/targets/uri/tasks/unix-socket.yml b/test/integration/targets/uri/tasks/unix-socket.yml index 6e6cf830eed..4a9d898ce3f 100644 --- a/test/integration/targets/uri/tasks/unix-socket.yml +++ b/test/integration/targets/uri/tasks/unix-socket.yml @@ -14,7 +14,7 @@ unix_socket: '{{ remote_tmp_dir }}/http.sock' register: unix_socket_http -- name: Test https connection to unix socket with valdiate_certs=false +- name: Test https connection to unix socket with validate_certs=false uri: url: https://localhost/get unix_socket: '{{ remote_tmp_dir }}/https.sock' diff --git a/test/integration/targets/win_raw/tasks/main.yml b/test/integration/targets/win_raw/tasks/main.yml index 31f90b85a6c..5c51c0a06f3 100644 --- a/test/integration/targets/win_raw/tasks/main.yml +++ b/test/integration/targets/win_raw/tasks/main.yml @@ -108,7 +108,7 @@ - name: unicode tests for psrp when: ansible_connection == 'psrp' block: - # Cannot test unicode passed into separate exec as PSRP doesn't run with a preset CP of 65001 which reuslts in ? for unicode chars + # Cannot test unicode passed into separate exec as PSRP doesn't run with a preset CP of 65001 which results in ? for unicode chars - name: run a raw command with unicode chars raw: Write-Output "! ЗАО. Руководство" register: raw_result2 diff --git a/test/lib/ansible_test/_internal/ci/azp.py b/test/lib/ansible_test/_internal/ci/azp.py index ebf260b9cfa..adc4f476741 100644 --- a/test/lib/ansible_test/_internal/ci/azp.py +++ b/test/lib/ansible_test/_internal/ci/azp.py @@ -221,7 +221,7 @@ class AzurePipelinesChanges: self.diff = [] def get_successful_merge_run_commits(self) -> set[str]: - """Return a set of recent successsful merge commits from Azure Pipelines.""" + """Return a set of recent successful merge commits from Azure Pipelines.""" parameters = dict( maxBuildsPerDefinition=100, # max 5000 queryOrder='queueTimeDescending', # assumes under normal circumstances that later queued jobs are for later commits diff --git a/test/lib/ansible_test/_internal/commands/integration/cloud/hcloud.py b/test/lib/ansible_test/_internal/commands/integration/cloud/hcloud.py index 04d6f7c62be..b9ee22747f3 100644 --- a/test/lib/ansible_test/_internal/commands/integration/cloud/hcloud.py +++ b/test/lib/ansible_test/_internal/commands/integration/cloud/hcloud.py @@ -78,7 +78,7 @@ class HcloudCloudProvider(CloudProvider): self._write_config(config) def _create_ansible_core_ci(self) -> AnsibleCoreCI: - """Return a Heztner instance of AnsibleCoreCI.""" + """Return a Hetzner instance of AnsibleCoreCI.""" return AnsibleCoreCI(self.args, CloudResource(platform='hetzner')) diff --git a/test/lib/ansible_test/_util/target/sanity/import/importer.py b/test/lib/ansible_test/_util/target/sanity/import/importer.py index 32eb424e226..d08f8e75dd0 100644 --- a/test/lib/ansible_test/_util/target/sanity/import/importer.py +++ b/test/lib/ansible_test/_util/target/sanity/import/importer.py @@ -159,7 +159,7 @@ def main(): loader = self._get_loader(fullname, path=path) if loader is not None: if has_py3_loader: - # loader is expected to be Optional[importlib.abc.Loader], but RestrictedModuleLoader does not inherit from importlib.abc.Loder + # loader is expected to be Optional[importlib.abc.Loader], but RestrictedModuleLoader does not inherit from importlib.abc.Loader return spec_from_loader(fullname, loader) # type: ignore[arg-type] raise ImportError("Failed to import '%s' due to a bug in ansible-test. Check importlib imports for typos." % fullname) return None diff --git a/test/support/network-integration/collections/ansible_collections/ansible/netcommon/plugins/action/net_put.py b/test/support/network-integration/collections/ansible_collections/ansible/netcommon/plugins/action/net_put.py index 38403c7e2a0..6b769e9060f 100644 --- a/test/support/network-integration/collections/ansible_collections/ansible/netcommon/plugins/action/net_put.py +++ b/test/support/network-integration/collections/ansible_collections/ansible/netcommon/plugins/action/net_put.py @@ -78,7 +78,7 @@ class ActionModule(ActionBase): except ValueError as exc: return dict(failed=True, msg=to_text(exc)) - # Now src has resolved file write to disk in current diectory for scp + # Now src has resolved file write to disk in current directory for scp src = self._task.args.get("src") filename = str(uuid.uuid4()) cwd = self._loader.get_basedir() @@ -137,7 +137,7 @@ class ActionModule(ActionBase): result["msg"] = "Exception received: %s" % exc if mode == "text": - # Cleanup tmp file expanded wih ansible vars + # Cleanup tmp file expanded with ansible vars os.remove(output_file) result["changed"] = changed diff --git a/test/support/windows-integration/collections/ansible_collections/ansible/windows/plugins/module_utils/WebRequest.psm1 b/test/support/windows-integration/collections/ansible_collections/ansible/windows/plugins/module_utils/WebRequest.psm1 index 8d077bd6964..649fb65ccdd 100644 --- a/test/support/windows-integration/collections/ansible_collections/ansible/windows/plugins/module_utils/WebRequest.psm1 +++ b/test/support/windows-integration/collections/ansible_collections/ansible/windows/plugins/module_utils/WebRequest.psm1 @@ -262,7 +262,7 @@ Function Get-AnsibleWindowsWebRequest { # proxy to work with, otherwise just ignore the credentials property. if ($null -ne $proxy) { if ($ProxyUseDefaultCredential) { - # Weird hack, $web_request.Proxy returns an IWebProxy object which only gurantees the Credentials + # Weird hack, $web_request.Proxy returns an IWebProxy object which only guarantees the Credentials # property. We cannot set UseDefaultCredentials so we just set the Credentials to the # DefaultCredentials in the CredentialCache which does the same thing. $proxy.Credentials = [System.Net.CredentialCache]::DefaultCredentials diff --git a/test/support/windows-integration/plugins/modules/win_certificate_store.ps1 b/test/support/windows-integration/plugins/modules/win_certificate_store.ps1 index db984130e70..baa877d023c 100644 --- a/test/support/windows-integration/plugins/modules/win_certificate_store.ps1 +++ b/test/support/windows-integration/plugins/modules/win_certificate_store.ps1 @@ -46,7 +46,7 @@ Function Get-CertFile($module, $path, $password, $key_exportable, $key_storage) $store_flags = $store_flags -bor [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable } - # TODO: If I'm feeling adventurours, write code to parse PKCS#12 PEM encoded + # TODO: If I'm feeling adventurous, write code to parse PKCS#12 PEM encoded # file as .NET does not have an easy way to import this $certs = New-Object -TypeName System.Security.Cryptography.X509Certificates.X509Certificate2Collection @@ -140,7 +140,7 @@ Function Get-CertFileType($path, $password) { } elseif ($certs[0].HasPrivateKey) { return "pkcs12" } elseif ($path.EndsWith(".pfx") -or $path.EndsWith(".p12")) { - # no way to differenciate a pfx with a der file so we must rely on the + # no way to differentiate a pfx with a der file so we must rely on the # extension return "pkcs12" } else { diff --git a/test/support/windows-integration/plugins/modules/win_copy.ps1 b/test/support/windows-integration/plugins/modules/win_copy.ps1 index 6a26ee722d0..f9fc3fa26e1 100644 --- a/test/support/windows-integration/plugins/modules/win_copy.ps1 +++ b/test/support/windows-integration/plugins/modules/win_copy.ps1 @@ -220,7 +220,7 @@ Function Extract-ZipLegacy($src, $dest) { # - 4: do not display a progress dialog box $dest_path.CopyHere($entry, 1044) - # once file is extraced, we need to rename it with non base64 name + # once file is extracted, we need to rename it with non base64 name $combined_encoded_path = [System.IO.Path]::Combine($dest, $encoded_archive_entry) Move-Item -LiteralPath $combined_encoded_path -Destination $entry_target_path -Force | Out-Null } diff --git a/test/support/windows-integration/plugins/modules/win_copy.py b/test/support/windows-integration/plugins/modules/win_copy.py index a55f4c65b7e..bb8dbd61f20 100644 --- a/test/support/windows-integration/plugins/modules/win_copy.py +++ b/test/support/windows-integration/plugins/modules/win_copy.py @@ -61,7 +61,7 @@ options: is different than destination. - If set to C(no), the file will only be transferred if the destination does not exist. - - If set to C(no), no checksuming of the content is performed which can + - If set to C(no), no checksumming of the content is performed which can help improve performance on larger files. type: bool default: yes diff --git a/test/units/cli/test_galaxy.py b/test/units/cli/test_galaxy.py index 39362043342..ccd51eb688f 100644 --- a/test/units/cli/test_galaxy.py +++ b/test/units/cli/test_galaxy.py @@ -1090,7 +1090,7 @@ def test_parse_requirements_file_that_isnt_yaml(requirements_cli, requirements_f - galaxy.role - anotherrole ''')], indirect=True) -def test_parse_requirements_in_older_format_illega(requirements_cli, requirements_file): +def test_parse_requirements_in_older_format_illegal(requirements_cli, requirements_file): expected = "Expecting requirements file to be a dict with the key 'collections' that contains a list of " \ "collections to install" diff --git a/test/units/cli/test_vault.py b/test/units/cli/test_vault.py index a049610f2f6..c6f41c5b912 100644 --- a/test/units/cli/test_vault.py +++ b/test/units/cli/test_vault.py @@ -31,7 +31,7 @@ from ansible.module_utils.common.text.converters import to_text from ansible.utils import context_objects as co -# TODO: make these tests assert something, likely by verifing +# TODO: make these tests assert something, likely by verifying # mock calls diff --git a/test/units/executor/test_play_iterator.py b/test/units/executor/test_play_iterator.py index 14a9cc4ae57..a700903d291 100644 --- a/test/units/executor/test_play_iterator.py +++ b/test/units/executor/test_play_iterator.py @@ -352,7 +352,7 @@ class TestPlayIterator(unittest.TestCase): self.assertEqual(task.args, dict(msg='this is the first task')) # fail the host itr.mark_host_failed(hosts[0]) - # get the resuce task + # get the rescue task (host_state, task) = itr.get_next_task_for_host(hosts[0]) self.assertIsNotNone(task) self.assertEqual(task.action, 'debug') diff --git a/test/units/executor/test_task_result.py b/test/units/executor/test_task_result.py index 54b86133afd..efbee5174f6 100644 --- a/test/units/executor/test_task_result.py +++ b/test/units/executor/test_task_result.py @@ -150,7 +150,7 @@ class TestTaskResult(unittest.TestCase): mock_host = MagicMock() mock_task = MagicMock() - # no_log should not remove presrved keys + # no_log should not remove preserved keys tr = TaskResult( mock_host, mock_task, diff --git a/test/units/galaxy/test_api.py b/test/units/galaxy/test_api.py index c7ee165b8af..6acd165b1df 100644 --- a/test/units/galaxy/test_api.py +++ b/test/units/galaxy/test_api.py @@ -66,7 +66,7 @@ def get_test_galaxy_api(url, version, token_ins=None, token_value=None, no_cache token_value = token_value or "my token" token_ins = token_ins or GalaxyToken(token_value) api = GalaxyAPI(None, "test", url, no_cache=no_cache) - # Warning, this doesn't test g_connect() because _availabe_api_versions is set here. That means + # Warning, this doesn't test g_connect() because _available_api_versions is set here. That means # that urls for v2 servers have to append '/api/' themselves in the input data. api._available_api_versions = {version: '%s' % version} api.token = token_ins diff --git a/test/units/galaxy/test_collection_install.py b/test/units/galaxy/test_collection_install.py index 9398c00e3bd..1803611d9c3 100644 --- a/test/units/galaxy/test_collection_install.py +++ b/test/units/galaxy/test_collection_install.py @@ -461,7 +461,7 @@ def test_build_requirement_from_name_with_prerelease(galaxy_server, monkeypatch, assert mock_get_versions.mock_calls[0][1] == ('namespace', 'collection') -def test_build_requirment_from_name_with_prerelease_explicit(galaxy_server, monkeypatch, tmp_path_factory): +def test_build_requirement_from_name_with_prerelease_explicit(galaxy_server, monkeypatch, tmp_path_factory): mock_get_versions = MagicMock() mock_get_versions.return_value = ['1.0.1', '2.0.1-beta.1', '2.0.1'] monkeypatch.setattr(galaxy_server, 'get_collection_versions', mock_get_versions) diff --git a/test/units/module_utils/basic/test_sanitize_keys.py b/test/units/module_utils/basic/test_sanitize_keys.py index 3b66f83057b..1f5814d4ef5 100644 --- a/test/units/module_utils/basic/test_sanitize_keys.py +++ b/test/units/module_utils/basic/test_sanitize_keys.py @@ -49,7 +49,7 @@ def _run_comparison(obj): def test_sanitize_keys_dict(): - """ Test that santize_keys works with a dict. """ + """ Test that sanitize_keys works with a dict. """ d = [ None, diff --git a/test/units/module_utils/common/test_locale.py b/test/units/module_utils/common/test_locale.py index 80e28de0272..4570aab3990 100644 --- a/test/units/module_utils/common/test_locale.py +++ b/test/units/module_utils/common/test_locale.py @@ -10,7 +10,7 @@ from ansible.module_utils.common.locale import get_best_parsable_locale class TestLocale: - """Tests for get_best_paresable_locale""" + """Tests for get_best_parsable_locale""" mock_module = MagicMock() mock_module.get_bin_path = MagicMock(return_value='/usr/bin/locale') diff --git a/test/units/module_utils/common/warnings/test_warn.py b/test/units/module_utils/common/warnings/test_warn.py index ebb21c4ecfb..71186c2c677 100644 --- a/test/units/module_utils/common/warnings/test_warn.py +++ b/test/units/module_utils/common/warnings/test_warn.py @@ -25,7 +25,7 @@ def test_warn(): assert warnings._global_warnings == ['Warning message'] -def test_multiple_warningss(warning_messages): +def test_multiple_warnings(warning_messages): for w in warning_messages: warn(w) diff --git a/test/units/module_utils/facts/network/test_fc_wwn.py b/test/units/module_utils/facts/network/test_fc_wwn.py index fd0cc3e9288..4d877444e10 100644 --- a/test/units/module_utils/facts/network/test_fc_wwn.py +++ b/test/units/module_utils/facts/network/test_fc_wwn.py @@ -14,7 +14,7 @@ fcs0 Defined 00-00 8Gb PCI Express Dual Port FC Adapter (df1000f114108a03) fcs1 Available 04-00 8Gb PCI Express Dual Port FC Adapter (df1000f114108a03) """ -# a bit cutted output of lscfg (from Z0 to ZC) +# slightly cut output of lscfg (from Z0 to ZC) LSCFG_OUTPUT = """ fcs1 U78CB.001.WZS00ZS-P1-C9-T1 8Gb PCI Express Dual Port FC Adapter (df1000f114108a03) diff --git a/test/units/module_utils/facts/test_collector.py b/test/units/module_utils/facts/test_collector.py index 852273c3669..95b110333b1 100644 --- a/test/units/module_utils/facts/test_collector.py +++ b/test/units/module_utils/facts/test_collector.py @@ -259,7 +259,7 @@ class TestGetCollectorNames(unittest.TestCase): # and then minimal_gather_subset is added. so '!all', 'other' == '!all' self.assertEqual(res, set(['whatever'])) - def test_invaid_gather_subset(self): + def test_invalid_gather_subset(self): valid_subsets = frozenset(['my_fact', 'something_else']) minimal_gather_subset = frozenset(['my_fact']) diff --git a/test/units/module_utils/facts/test_facts.py b/test/units/module_utils/facts/test_facts.py index d0381a1ef4f..07eefc6c82c 100644 --- a/test/units/module_utils/facts/test_facts.py +++ b/test/units/module_utils/facts/test_facts.py @@ -515,7 +515,7 @@ MTAB_ENTRIES = [ ], ['fusectl', '/sys/fs/fuse/connections', 'fusectl', 'rw,relatime', '0', '0'], # Mount path with space in the name - # The space is encoded as \040 since the fields in /etc/mtab are space-delimeted + # The space is encoded as \040 since the fields in /etc/mtab are space-delimited ['/dev/sdz9', r'/mnt/foo\040bar', 'ext4', 'rw,relatime', '0', '0'], ['\\\\Windows\\share', '/data/', 'cifs', 'credentials=/root/.creds', '0', '0'], ] diff --git a/test/units/playbook/test_base.py b/test/units/playbook/test_base.py index 58253b26542..fba0a46bb38 100644 --- a/test/units/playbook/test_base.py +++ b/test/units/playbook/test_base.py @@ -489,7 +489,7 @@ class TestBaseSubClass(TestBase): def test_attr_remote_user(self): ds = {'remote_user': 'testuser'} bsc = self._base_validate(ds) - # TODO: attemp to verify we called parent gettters etc + # TODO: attempt to verify we called parent getters etc self.assertEqual(bsc.remote_user, 'testuser') def test_attr_example_undefined(self): diff --git a/test/units/playbook/test_included_file.py b/test/units/playbook/test_included_file.py index 7d1e7079fc1..29422b34966 100644 --- a/test/units/playbook/test_included_file.py +++ b/test/units/playbook/test_included_file.py @@ -220,7 +220,7 @@ def test_process_include_simulate_free_block_role_tasks(mock_iterator, have the same parent but are different tasks. Previously the comparison for equality did not check if the tasks were the same and only checked that the parents were the same. This lead to some tasks being run - incorrectly and some tasks being silient dropped.""" + incorrectly and some tasks being silently dropped.""" fake_loader = DictDataLoader({ 'include_test.yml': "", diff --git a/test/units/plugins/action/test_raw.py b/test/units/plugins/action/test_raw.py index 9413fdfb159..df68e9e0afa 100644 --- a/test/units/plugins/action/test_raw.py +++ b/test/units/plugins/action/test_raw.py @@ -46,8 +46,8 @@ class TestCopyResultExclude(unittest.TestCase): task.args = {'_raw_params': 'Args1'} return task - # The current behavior of the raw aciton in regards to executable is currently in question; - # the test_raw_executable_is_not_empty_string verifies the current behavior (whether it is desireed or not. + # The current behavior of the raw action in regards to executable is currently in question; + # the test_raw_executable_is_not_empty_string verifies the current behavior (whether it is desired or not). # Please refer to the following for context: # Issue: https://github.com/ansible/ansible/issues/16054 # PR: https://github.com/ansible/ansible/pull/16085 diff --git a/test/units/plugins/connection/test_ssh.py b/test/units/plugins/connection/test_ssh.py index 5207af7ed81..0bba41b6f14 100644 --- a/test/units/plugins/connection/test_ssh.py +++ b/test/units/plugins/connection/test_ssh.py @@ -497,7 +497,7 @@ class TestSSHConnectionRun(object): assert self.conn._send_initial_data.call_count == 1 assert self.conn._send_initial_data.call_args[0][1] == 'this is input data' - def test_pasword_without_data(self): + def test_password_without_data(self): # simulate no data input but Popen using new pty's fails self.mock_popen.return_value = None self.mock_popen.side_effect = [OSError(), self.mock_popen_res] diff --git a/test/units/template/test_template_utilities.py b/test/units/template/test_template_utilities.py index 5f934d93884..eaa47a2600e 100644 --- a/test/units/template/test_template_utilities.py +++ b/test/units/template/test_template_utilities.py @@ -23,7 +23,7 @@ import unittest from ansible.template import AnsibleUndefined, _escape_backslashes, _count_newlines_from_end # These are internal utility functions only needed for templating. They're -# algorithmic so good candidates for unittesting by themselves +# algorithmic so good candidates for unit testing by themselves class TestBackslashEscape(unittest.TestCase):