summaryrefslogtreecommitdiff
path: root/spec/unit
diff options
context:
space:
mode:
Diffstat (limited to 'spec/unit')
-rw-r--r--spec/unit/cookbook_version_spec.rb2
-rw-r--r--spec/unit/file_content_management/deploy/mv_unix_spec.rb2
-rw-r--r--spec/unit/mixin/openssl_helper_spec.rb2
-rw-r--r--spec/unit/provider/package/cab_spec.rb2
-rw-r--r--spec/unit/provider/package/msu_spec.rb2
-rw-r--r--spec/unit/provider/package/rpm_spec.rb2
-rw-r--r--spec/unit/provider/package_spec.rb4
-rw-r--r--spec/unit/resource/windows_workgroup_spec.rb4
-rw-r--r--spec/unit/user_v1_spec.rb18
-rw-r--r--spec/unit/win32/link_spec.rb6
10 files changed, 22 insertions, 22 deletions
diff --git a/spec/unit/cookbook_version_spec.rb b/spec/unit/cookbook_version_spec.rb
index 3dff9e94d8..2697bd5c99 100644
--- a/spec/unit/cookbook_version_spec.rb
+++ b/spec/unit/cookbook_version_spec.rb
@@ -49,7 +49,7 @@ describe Chef::CookbookVersion do
let(:cookbook_paths_by_type) do
{
- # Dunno if the paths here are representitive of what is set by CookbookLoader...
+ # Dunno if the paths here are representative of what is set by CookbookLoader...
all_files: Dir[File.join(cookbook_root, "**", "**")],
}
end
diff --git a/spec/unit/file_content_management/deploy/mv_unix_spec.rb b/spec/unit/file_content_management/deploy/mv_unix_spec.rb
index 491457e8c6..3f869b5b71 100644
--- a/spec/unit/file_content_management/deploy/mv_unix_spec.rb
+++ b/spec/unit/file_content_management/deploy/mv_unix_spec.rb
@@ -76,7 +76,7 @@ describe Chef::FileContentManagement::Deploy::MvUnix do
context "when the user does not have permissions to set file ownership" do
# The test code does not care what these values are. These values are
- # chosen because they're representitive of the case that chef-client is
+ # chosen because they're representative of the case that chef-client is
# running as non-root and is managing a file that got ownership set to
# root somehow. In this example, gid==20 is something like "staff" which
# the user running chef-client is a member of (but it's not that user's
diff --git a/spec/unit/mixin/openssl_helper_spec.rb b/spec/unit/mixin/openssl_helper_spec.rb
index 460cd8a37d..4ae8754610 100644
--- a/spec/unit/mixin/openssl_helper_spec.rb
+++ b/spec/unit/mixin/openssl_helper_spec.rb
@@ -862,7 +862,7 @@ describe Chef::Mixin::OpenSSLHelper do
@certfile = Tempfile.new("certfile")
end
- context "When the cert file doesn't not exist" do
+ context "When the cert file doesn't exist" do
it "returns true" do
expect(instance.cert_need_renewall?("/tmp/bad_filename", 3650)).to be_truthy
end
diff --git a/spec/unit/provider/package/cab_spec.rb b/spec/unit/provider/package/cab_spec.rb
index 0ffbcd4a51..f281e2c69b 100644
--- a/spec/unit/provider/package/cab_spec.rb
+++ b/spec/unit/provider/package/cab_spec.rb
@@ -132,7 +132,7 @@ describe Chef::Provider::Package::Cab do
new_resource.cookbook_name = "cab_package"
end
- it "sets the desired parameters of downloades cab file" do
+ it "sets the desired parameters of downloaded cab file" do
allow(provider).to receive(:default_download_cache_path).and_return("C:\\chef\\cache\\package")
source_resource = provider.source_resource
expect(source_resource.path).to be == "C:\\chef\\cache\\package"
diff --git a/spec/unit/provider/package/msu_spec.rb b/spec/unit/provider/package/msu_spec.rb
index 905d48649f..b3cfa0576a 100644
--- a/spec/unit/provider/package/msu_spec.rb
+++ b/spec/unit/provider/package/msu_spec.rb
@@ -141,7 +141,7 @@ describe Chef::Provider::Package::Msu, :windows_only do
new_resource.cookbook_name = "Msu_package"
end
- it "sets the desired parameters of downloades msu file" do
+ it "sets the desired parameters of downloaded msu file" do
allow(provider).to receive(:default_download_cache_path).and_return("C:\\chef\\cache\\package")
source_resource = provider.source_resource
expect(source_resource.path).to be == "C:\\chef\\cache\\package"
diff --git a/spec/unit/provider/package/rpm_spec.rb b/spec/unit/provider/package/rpm_spec.rb
index 4694348438..813eda0377 100644
--- a/spec/unit/provider/package/rpm_spec.rb
+++ b/spec/unit/provider/package/rpm_spec.rb
@@ -428,7 +428,7 @@ describe Chef::Provider::Package::Rpm do
provider.install_package("/tmp/ImageMagick-c++-6.5.4.7-7.el6_5.x86_64.rpm", "6.5.4.7-7.el6_5")
end
- it "should uprgrade from a path when the package is a path and the source is nil" do
+ it "should upgrade from a path when the package is a path and the source is nil" do
expect(new_resource.source).to eq("/tmp/ImageMagick-c++-6.5.4.7-7.el6_5.x86_64.rpm")
current_resource.version("21.4-19.el5")
provider.current_resource = current_resource
diff --git a/spec/unit/provider/package_spec.rb b/spec/unit/provider/package_spec.rb
index accd913ebe..ab2f60cd46 100644
--- a/spec/unit/provider/package_spec.rb
+++ b/spec/unit/provider/package_spec.rb
@@ -551,7 +551,7 @@ describe "Chef::Provider::Package - Multi" do
expect(new_resource).not_to be_updated_by_last_action
end
- it "raises an exception if both are not installed and no caondidates are available" do
+ it "raises an exception if both are not installed and no candidates are available" do
current_resource.version([nil, nil])
provider.candidate_version = [nil, nil]
expect { provider.run_action(:install) }.to raise_error(Chef::Exceptions::Package)
@@ -631,7 +631,7 @@ describe "Chef::Provider::Package - Multi" do
expect(new_resource).not_to be_updated_by_last_action
end
- it "should raise an exception if both are not installed and no caondidates are available" do
+ it "should raise an exception if both are not installed and no candidates are available" do
current_resource.version([nil, nil])
provider.candidate_version = [nil, nil]
expect { provider.run_action(:upgrade) }.to raise_error(Chef::Exceptions::Package)
diff --git a/spec/unit/resource/windows_workgroup_spec.rb b/spec/unit/resource/windows_workgroup_spec.rb
index 0ea0d8b291..14cec253bf 100644
--- a/spec/unit/resource/windows_workgroup_spec.rb
+++ b/spec/unit/resource/windows_workgroup_spec.rb
@@ -58,13 +58,13 @@ describe Chef::Resource::WindowsWorkgroup do
describe "#join_command" do
context "if password property is not specified" do
- it "contructs a command without credentials" do
+ it "constructs a command without credentials" do
expect(provider.join_command).to eql("Add-Computer -WorkgroupName example -Force")
end
end
context "if password property is specified" do
- it "contructs a command without credentials" do
+ it "constructs a command without credentials" do
resource.password("1234")
resource.user("admin")
expect(provider.join_command).to eql("$pswd = ConvertTo-SecureString '1234' -AsPlainText -Force;$credential = New-Object System.Management.Automation.PSCredential (\"admin\",$pswd);Add-Computer -WorkgroupName example -Credential $credential -Force")
diff --git a/spec/unit/user_v1_spec.rb b/spec/unit/user_v1_spec.rb
index 4bde7278fe..965d3e7719 100644
--- a/spec/unit/user_v1_spec.rb
+++ b/spec/unit/user_v1_spec.rb
@@ -26,7 +26,7 @@ describe Chef::UserV1 do
@user = Chef::UserV1.new
end
- shared_examples_for "string fields with no contraints" do
+ shared_examples_for "string fields with no constraints" do
it "should let you set the public key" do
expect(@user.send(method, "some_string")).to eq("some_string")
end
@@ -109,49 +109,49 @@ describe Chef::UserV1 do
describe "string fields" do
describe "public_key" do
- it_should_behave_like "string fields with no contraints" do
+ it_should_behave_like "string fields with no constraints" do
let(:method) { :public_key }
end
end
describe "private_key" do
- it_should_behave_like "string fields with no contraints" do
+ it_should_behave_like "string fields with no constraints" do
let(:method) { :private_key }
end
end
describe "display_name" do
- it_should_behave_like "string fields with no contraints" do
+ it_should_behave_like "string fields with no constraints" do
let(:method) { :display_name }
end
end
describe "first_name" do
- it_should_behave_like "string fields with no contraints" do
+ it_should_behave_like "string fields with no constraints" do
let(:method) { :first_name }
end
end
describe "middle_name" do
- it_should_behave_like "string fields with no contraints" do
+ it_should_behave_like "string fields with no constraints" do
let(:method) { :middle_name }
end
end
describe "last_name" do
- it_should_behave_like "string fields with no contraints" do
+ it_should_behave_like "string fields with no constraints" do
let(:method) { :last_name }
end
end
describe "email" do
- it_should_behave_like "string fields with no contraints" do
+ it_should_behave_like "string fields with no constraints" do
let(:method) { :email }
end
end
describe "password" do
- it_should_behave_like "string fields with no contraints" do
+ it_should_behave_like "string fields with no constraints" do
let(:method) { :password }
end
end
diff --git a/spec/unit/win32/link_spec.rb b/spec/unit/win32/link_spec.rb
index de7b165dd0..04fc045703 100644
--- a/spec/unit/win32/link_spec.rb
+++ b/spec/unit/win32/link_spec.rb
@@ -46,14 +46,14 @@ describe Chef::ReservedNames::Win32::File, :windows_only do
allow(Chef::ReservedNames::Win32::File).to receive(:CreateSymbolicLinkW).with(any_args) { "don't //actually// do this" }
end
- it "will not pass the unpirivileged symlink flag if the node is not Windows 10" do
+ it "will not pass the unprivileged symlink flag if the node is not Windows 10" do
allow_any_instance_of(Chef::ReservedNames::Win32::Version).to receive(:windows_10?).and_return(false)
expect(Chef::ReservedNames::Win32::File).to receive(:CreateSymbolicLinkW).with("b", "a", without_privilege)
described_class.symlink("a", "b")
end
- it "will not pass the unpirivileged symlink flag if the node is not at least Windows 10 Creators Update" do
+ it "will not pass the unprivileged symlink flag if the node is not at least Windows 10 Creators Update" do
allow_any_instance_of(Chef::ReservedNames::Win32::Version).to receive(:windows_10?).and_return(true)
allow_any_instance_of(Chef::ReservedNames::Win32::Version).to receive(:build_number).and_return(1)
@@ -61,7 +61,7 @@ describe Chef::ReservedNames::Win32::File, :windows_only do
described_class.symlink("a", "b")
end
- it "will pass the unpirivileged symlink flag if the node is Windows 10 Creators Update or higher" do
+ it "will pass the unprivileged symlink flag if the node is Windows 10 Creators Update or higher" do
allow_any_instance_of(Chef::ReservedNames::Win32::Version).to receive(:windows_10?).and_return(true)
allow_any_instance_of(Chef::ReservedNames::Win32::Version).to receive(:build_number).and_return(15063)