Correct misspelled words

Change-Id: I7f98cd32ecd64e49d2fd7376ce5f4b6df9fe6ff9
Closes-Bug: 1257295
This commit is contained in:
Kiall Mac Innes 2014-02-20 16:20:58 +00:00
parent 86634f5122
commit 517ec9531a
7 changed files with 14 additions and 14 deletions

View File

@ -69,7 +69,7 @@ class Extractor:
" # Open quote
(?P<file> [^"]+ ) # The included file (without quotes), as group 'file'
" # Close quote
\s* ; # Semicolon, possibly preceeded by whitespace
\s* ; # Semicolon, possibly preceded by whitespace
""", re.MULTILINE | re.VERBOSE)
_zone_regex = re.compile(
@ -84,14 +84,14 @@ class Extractor:
(?P<content> [^{}]+ ) # The contents of the zone block (without
# brackets) as group 'content'
} # Close bracket
\s* ; # Semicolon, possibly preceeded by whitespace
\s* ; # Semicolon, possibly preceded by whitespace
""", re.MULTILINE | re.VERBOSE)
_type_master_regex = re.compile(
r"""
type \s+ # The type keyword, followed by some whitespace
master # The master keyword
\s* ; # Semicolon, possibly preceeded by whitespace
\s* ; # Semicolon, possibly preceded by whitespace
""", re.MULTILINE | re.VERBOSE)
_zonefile_regex = re.compile(r"""
@ -99,7 +99,7 @@ class Extractor:
" # Open quote
(?P<file> [^"]+ ) # The zonefile (without quotes), as group 'file'
" # Close quote
\s* ; # Semicolor, possible preceeded by whitespace
\s* ; # Semicolor, possible preceded by whitespace
""", re.MULTILINE | re.VERBOSE)
def __init__(self, conf_file):

View File

@ -53,7 +53,7 @@ class CommunicationFailure(Base):
class NeutronCommunicationFailure(CommunicationFailure):
"""
Raised in case one of the alledged Neutron endpoints fails.
Raised in case one of the alleged Neutron endpoints fails.
"""
error_type = 'neutron_communication_failure'

View File

@ -51,13 +51,13 @@ class NeutronFloatingHandler(BaseAddressHandler):
]
def process_notification(self, event_type, payload):
LOG.debug('%s recieved notification - %s',
LOG.debug('%s received notification - %s',
self.get_canonical_name(), event_type)
# FIXME: Neutron doesn't send ipv in the payload, should maybe
# determine this?
if event_type not in self.get_event_types():
msg = '%s recieved an invalid event type %s' % (
msg = '%s received an invalid event type %s' % (
self, event_type)
raise ValueError(msg)

View File

@ -51,7 +51,7 @@ class NovaFixedHandler(BaseAddressHandler):
]
def process_notification(self, event_type, payload):
LOG.debug('NovaFixedHandler recieved notification - %s' % event_type)
LOG.debug('NovaFixedHandler received notification - %s' % event_type)
if event_type == 'compute.instance.create.end':
self._create(payload['fixed_ips'], payload,
@ -62,4 +62,4 @@ class NovaFixedHandler(BaseAddressHandler):
self._delete(resource_id=payload['instance_id'],
resource_type='instance')
else:
raise ValueError('NovaFixedHandler recieved an invalid event type')
raise ValueError('NovaFixedHandler received an invalid event type')

View File

@ -101,10 +101,10 @@ class ApiV1DomainsTest(ApiV1Test):
# Create a domain
fixture = self.get_domain_fixture(0)
#Give it a UTF-8 filled description
# Give it a UTF-8 filled description
fixture['description'] = "utf-8:2H₂+O₂⇌2H₂O,R=4.7kΩ,⌀200mm∮E⋅da=Q,n" \
",∑f(i)=∏g(i),∀x∈:⌈x⌉"
#Create the domain, ensuring it suceeds, thus UTF-8 is supported
# Create the domain, ensuring it succeeds, thus UTF-8 is supported
self.post('domains', data=fixture)
def test_create_domain_description_too_long(self):

View File

@ -35,7 +35,7 @@ class StorageQuotaTest(tests.TestCase):
self.assertEqual(quota, {'domains': 1500})
# Drop into the storage layer directly to ensure the quota was created
# sucessfully.
# successfully
criterion = {
'tenant_id': 'tenant_id',
'resource': 'domains'
@ -58,7 +58,7 @@ class StorageQuotaTest(tests.TestCase):
self.quota.set_quota(context, 'tenant_id', 'domains', 1234)
# Drop into the storage layer directly to ensure the quota was updated
# sucessfully
# successfully
criterion = {
'tenant_id': 'tenant_id',
'resource': 'domains'

View File

@ -60,7 +60,7 @@ DNS Backend
~~~~~~~~~~~
Designate supports multiple backend implementations, PowerDNS, BIND and MySQL BIND, you are also free to implement your own backend to fit your needs, as well as extensions to provide extra functionality to complement existing backends.
There are various ways to provide a highly available authorative DNS service, here are some suggestions:
There are various ways to provide a highly available authoritative DNS service, here are some suggestions:
* Multiple PowerDNS instances using the same database being maintained by :ref:`designate-central`, optionally using MySQL Replication to propagate the data to multiple locations.
* DNS AXFR (Zone Transfer) multiple slave DNS server get notified of zone updates from a DNS server being managed by :ref:`designate-central`.