Skip to content

Commit

Permalink
Minor spellcheck updates
Browse files Browse the repository at this point in the history
Fixes detected by a rule that didn't quite work out

Signed-off-by: Tim Smith <[email protected]>
  • Loading branch information
tas50 committed Dec 23, 2024
1 parent 1784c48 commit 44067c7
Show file tree
Hide file tree
Showing 6 changed files with 6 additions and 5 deletions.
1 change: 1 addition & 0 deletions .github/actions/spelling/line_forbidden.patterns
Original file line number Diff line number Diff line change
Expand Up @@ -329,6 +329,7 @@

# s.b. Microsoft IIS
\bIIS Server\b

#
# VMware Products
#
Expand Down
2 changes: 1 addition & 1 deletion mql/internal/execution_manager.go
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ func (em *executionManager) Start() {
if r.Error != "" {
// This case is tricky to handle. If we cannot run the query at
// all, its unclear what to report for the datapoint. If we
// report them in, then another query cant report them, at least
// report them in, then another query can't report them, at least
// with the way things are right now. If we don't report them,
// things will wait around for datapoint results that will never
// arrive.
Expand Down
2 changes: 1 addition & 1 deletion providers-sdk/v1/lr/lr.go
Original file line number Diff line number Diff line change
Expand Up @@ -283,7 +283,7 @@ func Parse(input string) (*LR, error) {
name = *f.Embeddable.Alias
} else {
// use the first part of the type name as a id, i.e. os for os.any
// this wont work if there're are multiple embedded resources without aliases that share the same package, i.e os.any and os.base
// this won't work if there're are multiple embedded resources without aliases that share the same package, i.e os.any and os.base
name = strings.Split(f.Embeddable.Type, ".")[0]
}
newField := &Field{
Expand Down
2 changes: 1 addition & 1 deletion providers/aws/connection/connection.go
Original file line number Diff line number Diff line change
Expand Up @@ -182,7 +182,7 @@ func parseOptsToFilters(opts map[string]string) DiscoveryFilters {
}

func parseFlagsForConnectionOptions(m1 map[string]string, m2 map[string]string, creds []*vault.Credential) []ConnectionOption {
// merge the options to make sure we dont miss anything
// merge the options to make sure we don't miss anything
m := m1
if m == nil {
m = make(map[string]string)
Expand Down
2 changes: 1 addition & 1 deletion providers/aws/resources/discovery.go
Original file line number Diff line number Diff line change
Expand Up @@ -170,7 +170,7 @@ func handleTargets(targets []string) []string {

// for now we have to post process the filters
// more ideally, we should pass the filters in when discovering
// so that we dont unnecessarily discover assets we will later discard
// so that we don't unnecessarily discover assets we will later discard
func discover(runtime *plugin.Runtime, awsAccount *mqlAwsAccount, target string, filters connection.DiscoveryFilters) ([]*inventory.Asset, error) {
conn := runtime.Connection.(*connection.AwsConnection)
accountId := trimAwsAccountIdToJustId(awsAccount.Id.Data)
Expand Down
2 changes: 1 addition & 1 deletion providers/aws/resources/discovery_conversion.go
Original file line number Diff line number Diff line change
Expand Up @@ -342,7 +342,7 @@ func addConnectionInfoToEc2Asset(instance *mqlAwsEc2Instance, accountId string,
Type: vault.CredentialType_aws_ec2_ssm_session,
})
} else {
// if we dont have a connection already, we need to add one
// if we don't have a connection already, we need to add one
creds := []*vault.Credential{
{
User: probableUsername,
Expand Down

0 comments on commit 44067c7

Please sign in to comment.