fix typos in modules (#62135)

This commit is contained in:
Andrey Klychkov 2019-09-11 21:40:22 +03:00 committed by Alicia Cozine
parent 1b2fd2cb5f
commit 5eb5f74083
66 changed files with 85 additions and 86 deletions

View file

@ -174,7 +174,7 @@ orders:
returned: when server returns this
error:
description:
- In case an error occured during processing, this contains information about the error.
- In case an error occurred during processing, this contains information about the error.
- The field is structured as a problem document (RFC7807).
type: complex
returned: when an error occurred

View file

@ -532,7 +532,7 @@ class ACMEClient(object):
def _add_or_update_auth(self, identifier_type, identifier, auth):
'''
Add or update the given authroization in the global authorizations list.
Add or update the given authorization in the global authorizations list.
Return True if the auth was updated/added and False if no change was
necessary.
'''

View file

@ -202,7 +202,7 @@ def main():
result, info = account.send_signed_request(endpoint, payload)
if info['status'] != 200:
already_revoked = False
# Standarized error from draft 14 on (https://tools.ietf.org/html/rfc8555#section-7.6)
# Standardized error from draft 14 on (https://tools.ietf.org/html/rfc8555#section-7.6)
if result.get('type') == 'urn:ietf:params:acme:error:alreadyRevoked':
already_revoked = True
else:

View file

@ -356,7 +356,7 @@ class CryptHandler(Handler):
% (device, result[STDERR]))
def run_luks_add_key(self, device, keyfile, new_keyfile):
''' Add new key to given 'device'; authentization done using 'keyfile'
''' Add new key to given 'device'; authentication done using 'keyfile'
Raises ValueError when command fails
'''
result = self._run_command([self._cryptsetup_bin, 'luksAddKey', device,

View file

@ -363,7 +363,7 @@ class Certificate(object):
def is_same_datetime(self, datetime_one, datetime_two):
# This function is for backwards compatability only because .total_seconds() is new in python2.7
# This function is for backwards compatibility only because .total_seconds() is new in python2.7
def timedelta_total_seconds(time_delta):
return (time_delta.microseconds + 0.0 + (time_delta.seconds + time_delta.days * 24 * 3600) * 10 ** 6) / 10 ** 6
# try to use .total_ seconds() from python2.7

View file

@ -319,7 +319,7 @@ EXAMPLES = r'''
- www.ansible.com
- m.ansible.com
- name: Force re-generate an OpenSSL Certificate Signing Request
- name: Force regenerate an OpenSSL Certificate Signing Request
openssl_csr:
path: /etc/ssl/csr/www.ansible.com.csr
privatekey_path: /etc/ssl/private/ansible.com.pem

View file

@ -527,7 +527,7 @@ class CertificateSigningRequestInfoPyOpenSSL(CertificateSigningRequestInfo):
return None, False
def _normalize_san(self, san):
# apperently openssl returns 'IP address' not 'IP' as specifier when converting the subjectAltName to string
# apparently openssl returns 'IP address' not 'IP' as specifier when converting the subjectAltName to string
# although it won't accept this specifier when generating the CSR. (https://github.com/openssl/openssl/issues/4004)
if san.startswith('IP Address:'):
san = 'IP:' + san[len('IP Address:'):]

View file

@ -271,7 +271,7 @@ class Pkcs(crypto_utils.OpenSSLObject):
return False
if pkcs12_privatekey:
# This check is required because pyOpenSSL will not return a firendly name
# This check is required because pyOpenSSL will not return a friendly name
# if the private key is not set in the file
if ((self.pkcs12.get_friendlyname() is not None) and (pkcs12_friendly_name is not None)):
if self.pkcs12.get_friendlyname() != pkcs12_friendly_name:

View file

@ -269,7 +269,7 @@ def main():
marker0 = re.sub(b(r'{mark}'), b(params['marker_begin']), marker)
marker1 = re.sub(b(r'{mark}'), b(params['marker_end']), marker)
if present and block:
# Escape seqeuences like '\n' need to be handled in Ansible 1.x
# Escape sequences like '\n' need to be handled in Ansible 1.x
if module.ansible_version.startswith('1.'):
block = re.sub('', block, '')
blocklines = [marker0] + block.splitlines() + [marker1]

View file

@ -770,7 +770,7 @@ def ensure_symlink(path, src, follow, force, timestamps):
# Now that we might have created the symlink, get the arguments.
# We need to do it now so we can properly follow the symlink if needed
# because load_file_common_arguments sets 'path' according
# the value of follow and the symlink existance.
# the value of follow and the symlink existence.
file_args = module.load_file_common_arguments(module.params)
# Whenever we create a link to a nonexistent target we know that the nonexistent target

View file

@ -200,7 +200,7 @@ notes:
- rsync daemon must be up and running with correct permission when using rsync protocol in source or destination path.
- The C(synchronize) module forces `--delay-updates` to avoid leaving a destination in a broken in-between state if the underlying rsync process
encounters an error. Those synchronizing large numbers of files that are willing to trade safety for performance should call rsync directly.
- link_destination is subject to the same limitations as the underlaying rsync daemon. Hard links are only preserved if the relative subtrees
- link_destination is subject to the same limitations as the underlying rsync daemon. Hard links are only preserved if the relative subtrees
of the source and destination are the same. Attempts to hardlink into a directory that is a subdirectory of the source will be prevented.
seealso:
- module: copy

View file

@ -274,7 +274,7 @@ EXAMPLES = r'''
xpath: /business/website
children: []
# In case of namespaces, like in below XML, they have to be explicitely stated.
# In case of namespaces, like in below XML, they have to be explicitly stated.
#
# <foo xmlns="http://x.test" xmlns:attr="http://z.test">
# <bar>
@ -639,7 +639,7 @@ def set_target_inner(module, tree, xpath, namespaces, attribute, value):
except Exception as e:
missing_namespace = ""
# NOTE: This checks only the namespaces defined in root element!
# TODO: Implement a more robust check to check for child namespaces' existance
# TODO: Implement a more robust check to check for child namespaces' existence
if tree.getroot().nsmap and ":" not in xpath:
missing_namespace = "XML document has namespace(s) defined, but no namespace prefix(es) used in xpath!\n"
module.fail_json(msg="%sXpath %s causes a failure: %s\n -- tree is %s" %

View file

@ -155,7 +155,7 @@ options:
default: second
sslmode:
description:
- SSL mode for C(postgres) datasoure type.
- SSL mode for C(postgres) datasource type.
choices: [ disable, require, verify-ca, verify-full ]
trends:
required: false

View file

@ -47,7 +47,7 @@ options:
required: false
description:
description:
- The description contains extra meta-data about a particular annotation
- The description contains extra metadata about a particular annotation
- The description should contain specifics on the individual annotation e.g. Deployed 9b562b2 shipped new feature foo!
required: false
start_time:

View file

@ -52,7 +52,7 @@ options:
NOTE Host and Hostgroup tasks should always be performed via delegate_to: localhost. There are no benefits to running these tasks on the
remote host and doing so will typically cause problems.
required: true
choices: ['collector', 'host', 'datsource', 'hostgroup']
choices: ['collector', 'host', 'datasource', 'hostgroup']
action:
description:
- The action you wish to perform on target.
@ -1185,7 +1185,7 @@ class Host(LogicMonitor):
self.groups = None
def create(self):
"""Idemopotent function to create if missing,
"""Idempotent function to create if missing,
update if changed, or skip"""
self.module.debug("Running Host.create...")

View file

@ -369,7 +369,7 @@ class LogicMonitor(object):
class Host(LogicMonitor):
def __init__(self, params, module=None):
"""Initializor for the LogicMonitor host object"""
"""Initializer for the LogicMonitor host object"""
self.change = False
self.params = params
self.collector = None
@ -469,7 +469,7 @@ class Host(LogicMonitor):
class Hostgroup(LogicMonitor):
def __init__(self, params, module=None):
"""Initializor for the LogicMonitor host object"""
"""Initializer for the LogicMonitor host object"""
self.change = False
self.params = params

View file

@ -121,7 +121,7 @@ options:
- When I(type) is set to C(trigger_severity), the choices
are (case-insensitive) C(not classified), C(information), C(warning), C(average), C(high), C(disaster)
irrespective of user-visible names being changed in Zabbix. Defaults to C(not classified) if omitted.
- Besides the above options, this is usualy either the name
- Besides the above options, this is usually either the name
of the object or a string to compare with.
operator:
description:
@ -784,7 +784,7 @@ class Action(object):
self._zapi_wrapper = zapi_wrapper
def _construct_parameters(self, **kwargs):
"""Contruct parameters.
"""Construct parameters.
Args:
**kwargs: Arbitrary keyword parameters.
@ -1609,7 +1609,7 @@ def compare_dictionaries(d1, d2, diff_dict):
Used in recursion with compare_lists() function.
Args:
d1: first dictionary to compare
d2: second ditionary to compare
d2: second dictionary to compare
diff_dict: dictionary to store the difference
Returns:

View file

@ -54,7 +54,7 @@ options:
version_added: '2.9'
template_groups:
description:
- List of host groups to add template to when template is createad.
- List of host groups to add template to when template is created.
- Replaces the current host groups the template belongs to if the template is already present.
- Required when creating a new template with C(state=present) and I(template_name) is used.
Not required when updating an existing template.
@ -363,7 +363,7 @@ class Template(object):
template_macros, template_content, template_type):
"""Compares template parameters to already existing values if any are found.
template_json - JSON structures are compared as deep sorted dictonaries,
template_json - JSON structures are compared as deep sorted dictionaries,
template_xml - XML structures are compared as strings, but filtered and formatted first,
If none above is used, all the other arguments are compared to their existing counterparts
retrieved from Zabbix API."""
@ -379,7 +379,7 @@ class Template(object):
return changed
existing_template = self.dump_template(template_ids, template_type='json')
# Compare JSON objects as deep sorted python dictonaries
# Compare JSON objects as deep sorted python dictionaries
if template_content is not None and template_type == 'json':
parsed_template_json = self.load_json_template(template_content)
if self.diff_template(parsed_template_json, existing_template):
@ -509,7 +509,7 @@ class Template(object):
if element.text is None and len(list(element)) == 0:
template.remove(element)
# Filter new lines and identation
# Filter new lines and indentation
xml_root_text = list(line.strip() for line in ET.tostring(parsed_xml_root).split('\n'))
return ''.join(xml_root_text)

View file

@ -41,7 +41,7 @@ options:
order_by:
description:
- Field to sort the results on.
- Can prefix with "-" or "+" to change decending or ascending sort order.
- Can prefix with "-" or "+" to change descending or ascending sort order.
type: str
default: "-created_on"
required: false

View file

@ -31,7 +31,7 @@ options:
default: present
chdir:
description:
- The directory to execute the bundler commands from. This directoy
- The directory to execute the bundler commands from. This directory
needs to contain a valid Gemfile or .bundle/ directory
default: temporary working directory
exclude_groups:

View file

@ -61,7 +61,7 @@ options:
install_dir:
description:
- Install the gems into a specific directory.
These gems will be independant from the global installed ones.
These gems will be independent from the global installed ones.
Specifying this requires user_install to be false.
required: false
version_added: "2.6"

View file

@ -1222,7 +1222,7 @@ class DnfModule(YumDnf):
)
# Set state as installed by default
# This is not set in AnsibleModule() because the following shouldn't happend
# This is not set in AnsibleModule() because the following shouldn't happen
# - dnf: autoremove=yes state=installed
if self.state is None:
self.state = 'installed'

View file

@ -65,7 +65,7 @@ options:
- The name of the flatpak to manage.
- When used with I(state=present), I(name) can be specified as an C(http(s)) URL to a
C(flatpakref) file or the unique reverse DNS name that identifies a flatpak.
- When suppying a reverse DNS name, you can use the I(remote) option to specify on what remote
- When supplying a reverse DNS name, you can use the I(remote) option to specify on what remote
to look for the flatpak. An example for a reverse DNS name is C(org.gnome.gedit).
- When used with I(state=absent), it is recommended to specify the name in the reverse DNS
format.

View file

@ -28,7 +28,7 @@ options:
type: list
strategy:
description:
- This option controls how the module queres the package managers on the system.
- This option controls how the module queries the package managers on the system.
C(first) means it will return only information for the first supported package manager available.
C(all) will return information for all supported and available package managers on the system.
choices: ['first', 'all']

View file

@ -285,7 +285,7 @@ def update_package_db(module):
if rc == 0:
if re.search('database for.*is up-to-date\n$', out):
return False, "datebase is up-to-date"
return False, "database is up-to-date"
else:
return True, "updated repository database"
else:

View file

@ -119,10 +119,10 @@ def main():
try:
session = client.auth.login(user, password)
except Exception as e:
module.fail_json(msg="Unable to establish session with Sattelite server: %s " % to_text(e))
module.fail_json(msg="Unable to establish session with Satellite server: %s " % to_text(e))
if not session:
module.fail_json(msg="Failed to establish session with Sattelite server.")
module.fail_json(msg="Failed to establish session with Satellite server.")
# get systemid
try:

View file

@ -358,7 +358,7 @@ def main():
channels=dict(type='list', default=[]),
),
# username/password is required for state=absent, or if channels is not empty
# (basically anything that uses self.api requires username/password) but it doesnt
# (basically anything that uses self.api requires username/password) but it doesn't
# look like we can express that with required_if/required_together/mutually_exclusive
# only username+password can be used for unregister

View file

@ -87,7 +87,7 @@ from ansible.module_utils.basic import AnsibleModule
def run_subscription_manager(module, arguments):
# Execute subuscription-manager with arguments and manage common errors
# Execute subscription-manager with arguments and manage common errors
rhsm_bin = module.get_bin_path('subscription-manager')
if not rhsm_bin:
module.fail_json(msg='The executable file subscription-manager was not found in PATH')

View file

@ -39,7 +39,7 @@ options:
choices: [ absent, present ]
classic:
description:
- Confinement policy. The classic confinment allows a snap to have
- Confinement policy. The classic confinement allows a snap to have
the same level of access to the system as "classic" packages,
like those managed by APT. This option corresponds to the --classic argument.
This option can only be specified if there is a single snap in the task.

View file

@ -33,7 +33,7 @@ options:
If not specified, the default format is used.
manifest:
description:
- The manifest contains information about the bundles at certaion version of the OS.
- The manifest contains information about the bundles at certain version of the OS.
Specify a Manifest version to verify against that version or leave unspecified to
verify against the current version.
aliases: [release, version]

View file

@ -393,7 +393,7 @@ class YumModule(YumDnf):
self.lockfile = '/var/run/yum.pid'
def _enablerepos_with_error_checking(self, yumbase):
# NOTE: This seems unintuitive, but it mirrors yum's CLI bahavior
# NOTE: This seems unintuitive, but it mirrors yum's CLI behavior
if len(self.enablerepo) == 1:
try:
yumbase.repos.enableRepo(self.enablerepo[0])
@ -662,7 +662,7 @@ class YumModule(YumDnf):
pkgs = my.returnPackagesByDep(req_spec) + my.returnInstalledPackagesByDep(req_spec)
except Exception as e:
# If a repo with `repo_gpgcheck=1` is added and the repo GPG
# key was never accepted, quering this repo will throw an
# key was never accepted, querying this repo will throw an
# error: 'repomd.xml signature could not be verified'. In that
# situation we need to run `yum -y makecache` which will accept
# the key and try again.
@ -962,7 +962,7 @@ class YumModule(YumDnf):
(name, ver, rel, epoch, arch) = splitFilename(envra)
installed_pkgs = self.is_installed(repoq, name)
# case for two same envr but differrent archs like x86_64 and i686
# case for two same envr but different archs like x86_64 and i686
if len(installed_pkgs) == 2:
(cur_name0, cur_ver0, cur_rel0, cur_epoch0, cur_arch0) = splitFilename(installed_pkgs[0])
(cur_name1, cur_ver1, cur_rel1, cur_epoch1, cur_arch1) = splitFilename(installed_pkgs[1])
@ -1146,7 +1146,7 @@ class YumModule(YumDnf):
installed = self.is_installed(repoq, pkg)
if installed:
# Return a mesage so it's obvious to the user why yum failed
# Return a message so it's obvious to the user why yum failed
# and which package couldn't be removed. More details:
# https://github.com/ansible/ansible/issues/35672
res['msg'] = "Package '%s' couldn't be removed!" % pkg
@ -1462,7 +1462,7 @@ class YumModule(YumDnf):
self.yum_basecmd.extend(e_cmd)
if self.state in ('installed', 'present', 'latest'):
""" The need of this entire if conditional has to be chalanged
""" The need of this entire if conditional has to be changed
this function is the ensure function that is called
in the main section.

View file

@ -1025,7 +1025,7 @@ def create_archive(git_path, module, dest, archive, version, repo, result):
except OSError as e:
module.fail_json(msg="Failed to move %s to %s" %
(new_archive, archive),
details=u"Error occured while moving : %s"
details=u"Error occurred while moving : %s"
% to_text(e))
else:
# Perform archive from local directory

View file

@ -191,7 +191,7 @@ class GitLabHook(object):
self.hookObject = None
'''
@param prokect Project Object
@param project Project Object
@param hook_url Url to call on event
@param description Description of the group
@param parent Parent group full path

View file

@ -47,7 +47,7 @@ options:
type: str
purge:
description:
- When set to true, all variables which are not untoucheded in the task will be deleted.
- When set to true, all variables which are not untouched in the task will be deleted.
default: false
type: bool
vars:

View file

@ -111,7 +111,7 @@ options:
version_added: "2.4"
isadmin:
description:
- Grant admin privilieges to the user
- Grant admin privileges to the user
type: bool
default: no
version_added: "2.8"

View file

@ -113,7 +113,7 @@ class CapabilitiesModule(object):
# '/foo ='
# If file xattrs are unset the output will be:
# '/foo'
# If the file does not eixst the output will be (with rc == 0...):
# If the file does not exist the output will be (with rc == 0...):
# '/foo (No such file or directory)'
if rc != 0 or (stdout.strip() != path and stdout.count(' =') != 1):
self.module.fail_json(msg="Unable to get capabilities of %s" % path, stdout=stdout.strip(), stderr=stderr)

View file

@ -372,7 +372,7 @@ def main():
# --- user input validation ---
if name is None and ensure_present:
module.fail_json(msg="You must specify 'name' to insert a new cron variabale")
module.fail_json(msg="You must specify 'name' to insert a new cron variable")
if value is None and ensure_present:
module.fail_json(msg="You must specify 'value' to insert a new cron variable")

View file

@ -556,7 +556,7 @@ def get_linux_mounts(module, mntinfo_file="/proc/self/mountinfo"):
if (
len(m['root']) > 1 and
mnt['root'].startswith("%s/" % m['root'])):
# Ommit the parent's root in the child's root
# Omit the parent's root in the child's root
# == Example:
# 140 136 253:2 /rootfs / rw - ext4 /dev/sdb2 rw
# 141 140 253:2 /rootfs/tmp/aaa /tmp/bbb rw - ext4 /dev/sdb2 rw

View file

@ -95,7 +95,7 @@ EXAMPLES = r'''
login: yes
target: iqn.1986-03.com.sun:02:f8c1f9e0-c3ec-ec84-c9c9-8bfb0cd5de3d
- name: Discconnect from the cached named target
- name: Disconnect from the cached named target
open_iscsi:
login: no
target: iqn.1986-03.com.sun:02:f8c1f9e0-c3ec-ec84-c9c9-8bfb0cd5de3d

View file

@ -605,7 +605,7 @@ class PamdService(object):
if next_rule is not None and not next_rule.matches(new_type, new_control, new_path):
# If the previous rule doesn't match we'll insert our new rule.
# Second set the original next rule's previuous to the new_rule
# Second set the original next rule's previous to the new_rule
next_rule.prev = new_rule
# Third, set the new_rule's next to the original next rule
new_rule.next = next_rule
@ -810,7 +810,7 @@ def main():
file %s with error %s.' %
(fname, str(e)))
# Assuming we didnt fail, create the service
# Assuming we didn't fail, create the service
service = PamdService(content)
# Set the action
action = module.params['state']

View file

@ -84,7 +84,7 @@ not_found:
type: dict
sample:
- boto4
- riquests
- requests
'''
import re

View file

@ -82,7 +82,7 @@ notes:
output of your scripts.
This option was added in Ansible 2.1.
- This module is also supported for Windows targets.
- This module should be run with elevated priviliges on BSD systems to gather facts like ansible_product_version.
- This module should be run with elevated privileges on BSD systems to gather facts like ansible_product_version.
author:
- "Ansible Core Team"
- "Michael DeHaan"

View file

@ -149,7 +149,7 @@ class SysctlModule(object):
# get the current proc fs value
self.proc_value = self.get_token_curr_value(thisname)
# get the currect sysctl file value
# get the current sysctl file value
self.read_sysctl_file()
if thisname not in self.file_values:
self.file_values[thisname] = None

View file

@ -59,7 +59,7 @@ options:
type: bool
description:
- Have the module daemonize as the service itself might not do so properly.
- This is useful with badly written init scripts or deamons, which
- This is useful with badly written init scripts or daemons, which
commonly manifests as the task hanging as it is still holding the
tty or the service dying when the task is over as the connection
closes the session.

View file

@ -116,7 +116,7 @@ Switch ($audit_type_string)
$CurrentRule = Get-AuditPolicy $GetString
#exit if the audit_type is already set properly for the categroy
#exit if the audit_type is already set properly for the category
If (-not ($CurrentRule.Values | Where-Object {$_ -ne $audit_type_check}) )
{
$results.current_audit_policy = Get-AuditPolicy $GetString

View file

@ -73,7 +73,7 @@ Function New-CertFile($module, $cert, $path, $type, $password) {
$missing_key = $true
}
if ($missing_key) {
$module.FailJson("Cannot export cert with key as PKCS12 when the key is not marked as exportable or not accesible by the current user")
$module.FailJson("Cannot export cert with key as PKCS12 when the key is not marked as exportable or not accessible by the current user")
}
}

View file

@ -128,7 +128,7 @@ ansible_facts:
sample: username
packages:
description: List of installed Packages
returned: alway
returned: always
type: complex
contains:
package:

View file

@ -88,7 +88,7 @@ if ($state -eq "absent") {
$diff_text = $null
if ($null -ne $group) {
# will be overriden later if no change actually occurs
# will be overridden later if no change actually occurs
$diff_text += "[$name]`n"
# change the path of the group
@ -237,7 +237,7 @@ if ($state -eq "absent") {
}
}
# make sure our diff text is null if no change occured
# make sure our diff text is null if no change occurred
if ($result.changed -eq $false) {
$diff_text = $null
}

View file

@ -126,7 +126,7 @@ EXAMPLES = r'''
scope: global
path: OU=groups,DC=ansible,DC=local
- name: Ensure the group Cow does't exist using the Distinguished Name
- name: Ensure the group Cow doesn't exist using the Distinguished Name
win_domain_group:
name: CN=Cow,OU=groups,DC=ansible,DC=local
state: absent

View file

@ -153,7 +153,7 @@ If ($state -eq 'present') {
}
If ($password) {
# Don't uncecessary check for working credentials.
# Don't unnecessary check for working credentials.
# Set the password if we need to.
# For new_users there is also no difference between always and when_changed
# so we don't need to differentiate between this two states.

View file

@ -76,7 +76,7 @@ options:
description:
- One or more (powershell or regex) patterns to compare filenames with.
- The type of pattern matching is controlled by C(use_regex) option.
- The patterns retrict the list of files or folders to be returned based on the filenames.
- The patterns restrict the list of files or folders to be returned based on the filenames.
- For a file to be matched it only has to match with one pattern in a list provided.
type: list
aliases: [ "regex", "regexp" ]

View file

@ -57,7 +57,7 @@ options:
- The name of the IE connection to set the proxy settings for.
- These are the connections under the I(Dial-up and Virtual Private Network)
header in the IE settings.
- When ommited, the default LAN connection is used.
- When omitted, the default LAN connection is used.
type: str
proxy:
description:

View file

@ -41,7 +41,7 @@ options:
version_added: '2.8'
creates_path:
description:
- Will check the existance of the path specified and use the result to
- Will check the existence of the path specified and use the result to
determine whether the package is already installed.
- You can use this in conjunction with C(product_id) and other C(creates_*).
type: path
@ -248,7 +248,7 @@ log:
sample: Installation completed successfully
rc:
description: The return code of the package process.
returned: change occured
returned: change occurred
type: int
sample: 0
reboot_required:

View file

@ -48,7 +48,7 @@ options:
choices: [ machine, user ]
default: machine
notes:
- This module is for modifying indidvidual elements of path-like
- This module is for modifying individual elements of path-like
environment variables. For general-purpose management of other
environment vars, use the M(win_environment) module.
- This module does not broadcast change events.

View file

@ -29,7 +29,7 @@ options:
tags:
description:
- Runs only tests in Describe blocks with specified Tags values.
- Accepts multiple comma seperated tags.
- Accepts multiple comma separated tags.
type: list
version_added: '2.9'
test_parameters:

View file

@ -36,7 +36,7 @@ options:
default: present
description:
description:
- Optionnal description of the resource authorization policy.
- Optional description of the resource authorization policy.
type: str
user_groups:
description:

View file

@ -140,7 +140,7 @@ output:
type: str
sample: "------------------------------------\\n ROBOCOPY :: Robust File Copy for Windows \\n------------------------------------\\n "
msg:
description: Output intrepreted into a concise message.
description: Output interpreted into a concise message.
returned: always
type: str
sample: No files copied!

View file

@ -28,7 +28,7 @@ options:
type: str
msg_file:
description:
- Full path to a windows format text file containing the text to be spokend.
- Full path to a windows format text file containing the text to be spoken.
- Use either C(msg) or C(msg_file).
- Optional so that you can use this module just to play sounds.
type: path

View file

@ -273,7 +273,7 @@ options:
version_added: '2.4'
update_password:
description:
- Whether to update the password even when not other changes have occured.
- Whether to update the password even when not other changes have occurred.
- When C(yes) will always result in a change when executing the module.
type: bool
default: yes

View file

@ -288,12 +288,12 @@ settings:
type: bool
sample: true
use_unified_scheduling_engine:
description: Whether the task will use the unifed scheduling engine.
description: Whether the task will use the unified scheduling engine.
returned: ''
type: bool
sample: false
volatile:
description: Whether thet ask is volatile.
description: Whether the task is volatile.
returned: ''
type: bool
sample: false

View file

@ -78,7 +78,7 @@ if ((Get-Process -Name explorer -ErrorAction SilentlyContinue).Count -gt 0){
}
} else {
$result.toast_sent = $false
$result.no_toast_sent_reason = 'No logged in users to notifiy'
$result.no_toast_sent_reason = 'No logged in users to notify'
}
$endsend_at = Get-Date | Out-String

View file

@ -76,7 +76,7 @@ EXAMPLES = r'''
RETURN = r'''
expire_at_utc:
description: Calculated utc date time when the notification expires.
returned: allways
returned: always
type: str
sample: 07 July 2017 04:50:54
no_toast_sent_reason:
@ -86,17 +86,17 @@ no_toast_sent_reason:
sample: No logged in users to notify
sent_localtime:
description: local date time when the notification was sent.
returned: allways
returned: always
type: str
sample: 07 July 2017 05:45:54
time_taken:
description: How long the module took to run on the remote windows host in seconds.
returned: allways
returned: always
type: float
sample: 0.3706631999999997
toast_sent:
description: Whether the module was able to send a toast notification or not.
returned: allways
returned: always
type: bool
sample: false
'''

View file

@ -65,7 +65,7 @@ options:
description:
- When checking for a running process C(present) will block execution
until the process exists, or until the timeout has been reached.
C(absent) will block execution untile the processs no longer exists,
C(absent) will block execution until the process no longer exists,
or until the timeout has been reached.
- When waiting for C(present), the module will return changed only if
the process was not present on the initial check but became present on

View file

@ -178,7 +178,7 @@ rights:
"SeRemoteInteractiveLogonRight"
]
logon_server:
description: The name of the server used to authentcate the owner of the
description: The name of the server used to authenticate the owner of the
logon session.
returned: success
type: str

View file

@ -798,4 +798,4 @@
file_type: pkcs12
vars: *become_vars
register: fail_export_non_exportable
failed_when: fail_export_non_exportable.msg != 'Cannot export cert with key as PKCS12 when the key is not marked as exportable or not accesible by the current user'
failed_when: fail_export_non_exportable.msg != 'Cannot export cert with key as PKCS12 when the key is not marked as exportable or not accessible by the current user'

View file

@ -2344,7 +2344,6 @@ lib/ansible/modules/monitoring/logentries.py validate-modules:parameter-type-not
lib/ansible/modules/monitoring/logentries.py validate-modules:doc-missing-type
lib/ansible/modules/monitoring/logicmonitor.py validate-modules:no-default-for-required-parameter
lib/ansible/modules/monitoring/logicmonitor.py validate-modules:doc-default-does-not-match-spec
lib/ansible/modules/monitoring/logicmonitor.py validate-modules:doc-choices-do-not-match-spec
lib/ansible/modules/monitoring/logicmonitor.py validate-modules:parameter-type-not-in-doc
lib/ansible/modules/monitoring/logicmonitor.py validate-modules:doc-missing-type
lib/ansible/modules/monitoring/logicmonitor_facts.py validate-modules:no-default-for-required-parameter