From 973a33af01779295fcc29219859ecb35350d5e33 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Alejandro=20Criado-P=C3=A9rez?= Date: Thu, 10 Aug 2023 02:37:08 +0200 Subject: [PATCH] Fix on yml and tf files --- ansible/group_vars/all.yml | 2 +- ansible/roles/common/tasks/main.yml | 4 ++-- modules/securitygroups/main.tf | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/ansible/group_vars/all.yml b/ansible/group_vars/all.yml index 3810bbe..78ee3ec 100644 --- a/ansible/group_vars/all.yml +++ b/ansible/group_vars/all.yml @@ -12,7 +12,7 @@ edge_tag: v1.0.1 geth_tag: v1.12.0 go_tag: 1.19.10.linux-amd64 -# this is the amount of value that will be transfered on the rootchain to the deployer address and the validators +# this is the amount of value that will be transferred on the rootchain to the deployer address and the validators rootchain_validator_fund_amount: 100ether rootchain_deployer_fund_amount: 10000000ether # rootchain_deployer_fund_amount: 10ether diff --git a/ansible/roles/common/tasks/main.yml b/ansible/roles/common/tasks/main.yml index af81e47..6661896 100644 --- a/ansible/roles/common/tasks/main.yml +++ b/ansible/roles/common/tasks/main.yml @@ -12,13 +12,13 @@ mode: 0755 force: false when: not deployment_id_file.stat.exists - - name: "Check wether /etc/polygon-deployment-id contains {{ deployment_name }}" + - name: "Check whether /etc/polygon-deployment-id contains {{ deployment_name }}" ansible.builtin.command: grep -Fxq "{{ deployment_name }}" /etc/polygon-deployment-id register: checkdeployment check_mode: false ignore_errors: true changed_when: false - - name: "Check wether /etc/polygon-deployment-id contains {{ deployment_name }}" + - name: "Check whether /etc/polygon-deployment-id contains {{ deployment_name }}" ansible.builtin.assert: that: - checkdeployment.rc == 0 diff --git a/modules/securitygroups/main.tf b/modules/securitygroups/main.tf index a08c999..cf0570a 100644 --- a/modules/securitygroups/main.tf +++ b/modules/securitygroups/main.tf @@ -62,7 +62,7 @@ resource "aws_network_interface_sg_attachment" "open_rpc" { } resource "aws_security_group" "open_http" { name = "external-explorer-access" - description = "Allowing explorer acccess" + description = "Allowing explorer access" vpc_id = var.devnet_id } resource "aws_security_group_rule" "open_http" {