Skip to content

Commit 5736d12

Browse files
authored
docs: fix typos using codespell (#1114)
1 parent 253d3bf commit 5736d12

File tree

76 files changed

+111
-111
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+111
-111
lines changed

CHANGELOG.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -531,7 +531,7 @@ Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0
531531
### 🐛 Bug Fixes
532532

533533
<details>
534-
<summary>Karpenter bugfix, EKS add-ons to mangaed node group @Nuru (#816)</summary>
534+
<summary>Karpenter bugfix, EKS add-ons to managed node group @Nuru (#816)</summary>
535535

536536
### what
537537

@@ -553,7 +553,7 @@ Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0
553553

554554
### what
555555

556-
- Upsteam the latest `ecs-service` component
556+
- Upstream the latest `ecs-service` component
557557

558558
### why
559559

@@ -820,7 +820,7 @@ Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0
820820

821821
### why
822822

823-
- to help future implementors of CloudPosse's architectures
823+
- to help future implementers of CloudPosse's architectures
824824

825825
### references
826826

@@ -841,7 +841,7 @@ Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0
841841

842842
- fix incorrect shape for one of the items in `aws_team_roles_rbac`
843843
- improve consistency
844-
- remove variables that are not appliable for the component
844+
- remove variables that are not applicable for the component
845845

846846
### references
847847

@@ -3840,7 +3840,7 @@ N/A
38403840
### what
38413841
38423842
- bumped ecr
3843-
- remove unnecssary variable
3843+
- remove unnecessary variable
38443844
38453845
### why
38463846
@@ -4627,7 +4627,7 @@ NOTE: I don't know if the default of `default` is valid or if it is `Default`. I
46274627
46284628
### what
46294629
4630-
- Bump Versin of EC2 Client VPN
4630+
- Bump Version of EC2 Client VPN
46314631
46324632
### why
46334633
@@ -4758,7 +4758,7 @@ This is an alternative way of deprovisioning - proactive one.
47584758
47594759
```
47604760
There is another way to configure Karpenter to deprovision nodes called Consolidation.
4761-
This mode is preferred for workloads such as microservices and is imcompatible with setting
4761+
This mode is preferred for workloads such as microservices and is incompatible with setting
47624762
up the ttlSecondsAfterEmpty . When set in consolidation mode Karpenter works to actively
47634763
reduce cluster cost by identifying when nodes can be removed as their workloads will run
47644764
on other nodes in the cluster and when nodes can be replaced with cheaper variants due

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ update:
127127
dry_run: no
128128
```
129129

130-
For the full documentation on how to use the Component Updater GitHub Action, please see the [Atmos Intergations](https://atmos.tools/integrations/github-actions/component-updater) documentation.
130+
For the full documentation on how to use the Component Updater GitHub Action, please see the [Atmos Integrations](https://atmos.tools/integrations/github-actions/component-updater) documentation.
131131

132132
## Using `pre-commit` Hooks
133133

README.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ usage: |-
147147
dry_run: no
148148
```
149149
150-
For the full documentation on how to use the Component Updater GitHub Action, please see the [Atmos Intergations](https://atmos.tools/integrations/github-actions/component-updater) documentation.
150+
For the full documentation on how to use the Component Updater GitHub Action, please see the [Atmos Integrations](https://atmos.tools/integrations/github-actions/component-updater) documentation.
151151
152152
## Using `pre-commit` Hooks
153153

deprecated/aws/backing-services/rds-replica.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ variable "rds_replica_snapshot" {
4545
variable "rds_replica_multi_az" {
4646
type = string
4747
default = "false"
48-
description = "Run instaces in multiple az"
48+
description = "Run instances in multiple az"
4949
}
5050

5151
variable "rds_replica_storage_type" {

deprecated/aws/backing-services/rds.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ variable "rds_parameter_group_name" {
8181
variable "rds_multi_az" {
8282
type = string
8383
default = "false"
84-
description = "Run instaces in multiple az"
84+
description = "Run instances in multiple az"
8585
}
8686

8787
variable "rds_storage_type" {

deprecated/aws/grafana-backing-services/aurora-mysql.tf

+3-3
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ resource "random_string" "mysql_admin_password" {
8787
# "Read SSM parameter to get allowed CIDR blocks"
8888
data "aws_ssm_parameter" "allowed_cidr_blocks" {
8989
# The data source will throw an error if it cannot find the parameter,
90-
# so do not reference it unless it is neeeded.
90+
# so do not reference it unless it is needed.
9191
count = local.allowed_cidr_blocks_use_ssm ? 1 : 0
9292

9393
# name = substr(mysql_cluster_allowed_cidr_blocks, 0, 1) == "/" ? mysql_cluster_allowed_cidr_blocks : "/aws/service/global-infrastructure/version"
@@ -97,15 +97,15 @@ data "aws_ssm_parameter" "allowed_cidr_blocks" {
9797
# "Read SSM parameter to get allowed VPC ID"
9898
data "aws_ssm_parameter" "vpc_id" {
9999
# The data source will throw an error if it cannot find the parameter,
100-
# so do not reference it unless it is neeeded.
100+
# so do not reference it unless it is needed.
101101
count = local.vpc_id_use_ssm ? 1 : 0
102102
name = var.vpc_id
103103
}
104104

105105
# "Read SSM parameter to get allowed VPC subnet IDs"
106106
data "aws_ssm_parameter" "vpc_subnet_ids" {
107107
# The data source will throw an error if it cannot find the parameter,
108-
# so do not reference it unless it is neeeded.
108+
# so do not reference it unless it is needed.
109109
count = local.vpc_subnet_ids_use_ssm ? 1 : 0
110110
name = var.vpc_subnet_ids
111111
}

deprecated/aws/keycloak-backing-services/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ an authorized local service.
4343
To keep the database encrypted, this module will have to be extended:
4444
1 Create a KMS key for encrypting the database. Using the RDS default key
4545
is not advisable since the only practical advantage of the key comes from
46-
limiting access to it, and the default key will likey have relatively
46+
limiting access to it, and the default key will likely have relatively
4747
wide access.
4848
1. Create an IAM role for Keycloak that has access to the key. Nodes running
4949
`kiam-server` will need to be able to assume this role.

deprecated/aws/kops/variables.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ variable "name" {
2121
variable "region" {
2222
type = string
2323
default = ""
24-
description = "AWS region for resources. Can be overriden by `resource_region` and `state_store_region`"
24+
description = "AWS region for resources. Can be overridden by `resource_region` and `state_store_region`"
2525
}
2626

2727
variable "state_store_region" {

deprecated/aws/sentry/aurora-postgres.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,13 @@ variable "postgres_db_name" {
3030

3131
variable "aurora_postgres_engine_version" {
3232
type = string
33-
description = "Database Engine Version for Aurora PostgeSQL"
33+
description = "Database Engine Version for Aurora postgresql"
3434
default = "9.6.12"
3535
}
3636

3737
variable "aurora_postgres_cluster_family" {
3838
type = string
39-
description = "Database Engine Version for Aurora PostgeSQL"
39+
description = "Database Engine Version for Aurora postgresql"
4040
default = "9.6.12"
4141
}
4242

deprecated/aws/teleport/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ resource "aws_iam_role" "teleport" {
9191
data "aws_iam_policy_document" "teleport" {
9292
// Teleport can use LetsEncrypt to get TLS certificates. For this // it needs additional permissions which are not included here.
9393

94-
// Teleport can use SSM to publish "join tokens" and retreive the enterprise // license, but that is not fully documented, so permissions to access SSM // are not included at this time.
94+
// Teleport can use SSM to publish "join tokens" and retrieve the enterprise // license, but that is not fully documented, so permissions to access SSM // are not included at this time.
9595

9696
// S3 permissions are needed to save and replay SSH sessions
9797
statement {

deprecated/aws/vpc-peering-intra-account/variables.tf

+4-4
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ variable "aws_assume_role_arn" {
99

1010
variable "requestor_vpc_id" {
1111
type = string
12-
description = "Requestor VPC ID"
12+
description = "Requester VPC ID"
1313
default = ""
1414
}
1515

1616
variable "requestor_vpc_tags" {
1717
type = map(string)
18-
description = "Requestor VPC tags"
18+
description = "Requester VPC tags"
1919
default = {}
2020
}
2121

@@ -38,12 +38,12 @@ variable "auto_accept" {
3838

3939
variable "acceptor_allow_remote_vpc_dns_resolution" {
4040
default = "true"
41-
description = "Allow acceptor VPC to resolve public DNS hostnames to private IP addresses when queried from instances in the requestor VPC"
41+
description = "Allow acceptor VPC to resolve public DNS hostnames to private IP addresses when queried from instances in the requester VPC"
4242
}
4343

4444
variable "requestor_allow_remote_vpc_dns_resolution" {
4545
default = "true"
46-
description = "Allow requestor VPC to resolve public DNS hostnames to private IP addresses when queried from instances in the acceptor VPC"
46+
description = "Allow requester VPC to resolve public DNS hostnames to private IP addresses when queried from instances in the acceptor VPC"
4747
}
4848

4949
variable "namespace" {

deprecated/aws/vpc/outputs.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ output "cidr_block" {
2323
}
2424

2525
output "availability_zones" {
26-
description = "Comma-separated string list of avaialbility zones where subnets have been created"
26+
description = "Comma-separated string list of availability zones where subnets have been created"
2727
value = aws_ssm_parameter.availability_zones.value
2828
}
2929

deprecated/aws/vpc/variables.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ variable "region" {
3030

3131
variable "max_subnet_count" {
3232
default = 0
33-
description = "Sets the maximum amount of subnets to deploy. 0 will deploy a subnet for every provided availablility zone (in `availability_zones` variable) within the region"
33+
description = "Sets the maximum amount of subnets to deploy. 0 will deploy a subnet for every provided availability zone (in `availability_zones` variable) within the region"
3434
}
3535

3636
variable "availability_zones" {

deprecated/eks/eks-without-spotinst/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ module "eks_cluster" {
5656
# exec_auth is more reliable than data_auth when the aws CLI is available
5757
# Details at https://github.com/cloudposse/terraform-aws-eks-cluster/releases/tag/0.42.0
5858
kube_exec_auth_enabled = !var.kubeconfig_file_enabled
59-
# If using `exec` method (recommended) for authentication, provide an explict
59+
# If using `exec` method (recommended) for authentication, provide an explicit
6060
# IAM role ARN to exec as for authentication to EKS cluster.
6161
kube_exec_auth_role_arn = coalesce(var.import_role_arn, module.iam_roles.terraform_role_arn)
6262
kube_exec_auth_role_arn_enabled = true

deprecated/github-actions-runner/variables.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ variable "runner_configurations" {
192192
error_message = "Variable runner_configurations can contain only one target key of either `repo` or `org` not both."
193193
}
194194

195-
# runner_configuration may only conatain map keys "repo", "org", "runner_type", "autoscale_type"
195+
# runner_configuration may only contain map keys "repo", "org", "runner_type", "autoscale_type"
196196
validation {
197197
condition = alltrue([for r in var.runner_configurations : alltrue([for k in keys(r) : contains(["repo", "org", "runner_type", "autoscale_type"], k)])])
198198
error_message = "Unknown map key, must be one of repo, org, runner_type or autoscale_type."

deprecated/securityhub/securityhub/common/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ done
133133
|------|-------------|------|---------|:--------:|
134134
| <a name="input_account_map_tenant"></a> [account\_map\_tenant](#input\_account\_map\_tenant) | The tenant where the `account_map` component required by remote-state is deployed | `string` | `""` | no |
135135
| <a name="input_additional_tag_map"></a> [additional\_tag\_map](#input\_additional\_tag\_map) | Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`.<br>This is for some rare cases where resources want additional configuration of tags<br>and therefore take a list of maps with tag key, value, and additional configuration. | `map(string)` | `{}` | no |
136-
| <a name="input_admin_delegated"></a> [admin\_delegated](#input\_admin\_delegated) | A flag to indicate if the Security Hub Admininstrator account has been designated from the root account.<br><br> This component should be applied with this variable set to `false`, then the securityhub/root component should be applied<br> to designate the administrator account, then this component should be applied again with this variable set to `true`. | `bool` | `false` | no |
136+
| <a name="input_admin_delegated"></a> [admin\_delegated](#input\_admin\_delegated) | A flag to indicate if the Security Hub Administrator account has been designated from the root account.<br><br> This component should be applied with this variable set to `false`, then the securityhub/root component should be applied<br> to designate the administrator account, then this component should be applied again with this variable set to `true`. | `bool` | `false` | no |
137137
| <a name="input_attributes"></a> [attributes](#input\_attributes) | ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`,<br>in the order they appear in the list. New attributes are appended to the<br>end of the list. The elements of the list are joined by the `delimiter`<br>and treated as a single ID element. | `list(string)` | `[]` | no |
138138
| <a name="input_central_resource_collector_account"></a> [central\_resource\_collector\_account](#input\_central\_resource\_collector\_account) | The name of the account that is the centralized aggregation account | `string` | n/a | yes |
139139
| <a name="input_central_resource_collector_region"></a> [central\_resource\_collector\_region](#input\_central\_resource\_collector\_region) | The region that collects findings | `string` | n/a | yes |

deprecated/securityhub/securityhub/common/variables.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ variable "admin_delegated" {
6767
type = bool
6868
default = false
6969
description = <<DOC
70-
A flag to indicate if the Security Hub Admininstrator account has been designated from the root account.
70+
A flag to indicate if the Security Hub Administrator account has been designated from the root account.
7171
7272
This component should be applied with this variable set to `false`, then the securityhub/root component should be applied
7373
to designate the administrator account, then this component should be applied again with this variable set to `true`.

deprecated/spacelift/docs/spacelift-overview.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ large-scale installations - dozens of teams, hundreds of engineers and tens of t
66

77
## Projects & Configuration
88

9-
There are two projects located in this repository that are required for the deplyoment & day-to-day operation of
9+
There are two projects located in this repository that are required for the deployment & day-to-day operation of
1010
Spacelift.
1111

1212
| Project | Description |

deprecated/tgw/cross-region-hub-connector/providers.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Assuming region-a is default.
22
# tgw_this_region is network of region-b
3-
# tgw_home_reigon is netowrk of region-a
3+
# tgw_home_reigon is network of region-a
44

55
provider "aws" {
66
alias = "tgw_this_region"

modules/account-map/modules/iam-roles/providers.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ provider "awsutils" {
44
alias = "iam-roles"
55

66
# If the provider block is empty, Terraform will output a deprecation warning,
7-
# because earlier versions of Terraform used empty provider blocks to decalare provider requirements,
7+
# because earlier versions of Terraform used empty provider blocks to declare provider requirements,
88
# which is now deprecated in favor of the required_providers block.
99
# So we add a useless setting to the provider block to avoid the deprecation warning.
1010
profile = null

modules/account/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ unintended and a security risk.
3333

3434
**IMPORTANT**: Account Name building blocks (such as tenant, stage, environment) must not contain dashes. Doing so will
3535
lead to unpredictable resource names as a `-` is the default delimiter. Additionally, account names must be lower case
36-
alpha-numeric with no special characters. For example:
36+
alphanumeric with no special characters. For example:
3737

3838
| Key | Value | Correctness |
3939
| ---------------- | --------------- | ----------- |
@@ -362,8 +362,8 @@ other steps, for example while waiting for Terraform to create resources.
362362
save the account number in a separate field.
363363
364364
2. Log in using the new password, choose "My Security Credentials" from the account dropdown menu and set up
365-
Multi-Factor Authentication (MFA) to use a Virutal MFA device. Save the MFA TOTP key in 1Password by using
366-
1Password's TOTP field and built-in screen scanner. Also, save the Virutal MFA ARN (sometimes shown as "serial
365+
Multi-Factor Authentication (MFA) to use a Virtual MFA device. Save the MFA TOTP key in 1Password by using
366+
1Password's TOTP field and built-in screen scanner. Also, save the Virtual MFA ARN (sometimes shown as "serial
367367
number").
368368
369369
3. While logged in, enable optional regions as described in the next step, if needed.

modules/aurora-mysql/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Example deployment with primary cluster deployed to us-east-1 in a `platform-dev
9191
## Disaster Recovery with Cross-Region Replication
9292

9393
This component is designed to support cross-region replication with continuous replication. If enabled and deployed, a
94-
secondary cluster will be deployed in a different region than the primary cluster. This approach is highly aggresive and
94+
secondary cluster will be deployed in a different region than the primary cluster. This approach is highly aggressive and
9595
costly, but in a disaster scenario where the primary cluster fails, the secondary cluster can be promoted to take its
9696
place. Follow these steps to handle a Disaster Recovery.
9797

modules/aurora-postgres-resources/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ that type in the specified schema.
115115
|------|-------------|------|---------|:--------:|
116116
| <a name="input_additional_databases"></a> [additional\_databases](#input\_additional\_databases) | Additional databases to be created with the cluster | `set(string)` | `[]` | no |
117117
| <a name="input_additional_grants"></a> [additional\_grants](#input\_additional\_grants) | Create additional database user with specified grants.<br>If `var.ssm_password_source` is set, passwords will be retrieved from SSM parameter store,<br>otherwise, passwords will be generated and stored in SSM parameter store under the service's key. | <pre>map(list(object({<br> grant : list(string)<br> db : string<br> })))</pre> | `{}` | no |
118-
| <a name="input_additional_schemas"></a> [additional\_schemas](#input\_additional\_schemas) | Create additonal schemas for a given database.<br>If no database is given, the schema will use the database used by the provider configuration | <pre>map(object({<br> database : string<br> }))</pre> | `{}` | no |
118+
| <a name="input_additional_schemas"></a> [additional\_schemas](#input\_additional\_schemas) | Create additional schemas for a given database.<br>If no database is given, the schema will use the database used by the provider configuration | <pre>map(object({<br> database : string<br> }))</pre> | `{}` | no |
119119
| <a name="input_additional_tag_map"></a> [additional\_tag\_map](#input\_additional\_tag\_map) | Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`.<br>This is for some rare cases where resources want additional configuration of tags<br>and therefore take a list of maps with tag key, value, and additional configuration. | `map(string)` | `{}` | no |
120120
| <a name="input_additional_users"></a> [additional\_users](#input\_additional\_users) | Create additional database user for a service, specifying username, grants, and optional password.<br>If no password is specified, one will be generated. Username and password will be stored in<br>SSM parameter store under the service's key. | <pre>map(object({<br> db_user : string<br> db_password : string<br> grants : list(object({<br> grant : list(string)<br> db : string<br> schema : string<br> object_type : string<br> }))<br> }))</pre> | `{}` | no |
121121
| <a name="input_admin_password"></a> [admin\_password](#input\_admin\_password) | postgresql password for the admin user | `string` | `""` | no |

modules/aurora-postgres-resources/variables.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ variable "additional_schemas" {
9494
}))
9595
default = {}
9696
description = <<-EOT
97-
Create additonal schemas for a given database.
97+
Create additional schemas for a given database.
9898
If no database is given, the schema will use the database used by the provider configuration
9999
EOT
100100
}

modules/aws-config/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ component by default. Note that this can be overridden by the `scope` variable i
9898
>
9999
> #### Using the organization default_scope
100100
>
101-
> If default_scope == `organization`, AWS Config is global unless overriden in the `conformance_packs` items. You will
101+
> If default_scope == `organization`, AWS Config is global unless overridden in the `conformance_packs` items. You will
102102
> need to update your org to allow the `config-multiaccountsetup.amazonaws.com` service access principal for this to
103103
> work. If you are using our `account` component, just add that principal to the `aws_service_access_principals`
104104
> variable.

0 commit comments

Comments
 (0)