From 1ca024d8dcfce29ce4c230e3be89bdcc6691d495 Mon Sep 17 00:00:00 2001 From: Kevin_Zheng Date: Thu, 22 Dec 2016 08:51:09 +0800 Subject: [PATCH] Trival fix some typo 1. What is the problem? There were some typos in this module, which should be modified. 2. What is the solution to the problem? This change modifies the spelling mistakes. 3. What the features need to be implemented to the Tricircle to realize the solution? No new features Change-Id: I988a974e8887c09c730bc0172aacee0fb85b2c3b --- devstack/verify_top_install.sh | 2 +- tricircle/api/controllers/routing.py | 2 +- tricircle/network/helper.py | 2 +- tricircle/tests/unit/network/test_central_plugin.py | 2 +- tricircle/xjob/xmanager.py | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/devstack/verify_top_install.sh b/devstack/verify_top_install.sh index 8fc69279..fd2ae3d1 100755 --- a/devstack/verify_top_install.sh +++ b/devstack/verify_top_install.sh @@ -26,7 +26,7 @@ if [ ! -r admin-openrc.sh ];then exit 1 fi -echo "Begining the verify testing..." +echo "Beginning the verify testing..." echo "Import client environment variables:" source $TEST_DIR/admin-openrc.sh diff --git a/tricircle/api/controllers/routing.py b/tricircle/api/controllers/routing.py index f73601a9..4968ee93 100644 --- a/tricircle/api/controllers/routing.py +++ b/tricircle/api/controllers/routing.py @@ -122,7 +122,7 @@ class RoutingController(rest.RestController): if not policy.enforce(context, policy.ADMIN_API_ROUTINGS_LIST): return utils.format_api_error( - 403, _('Unauthorized to to show all resource routings')) + 403, _('Unauthorized to show all resource routings')) filters = self._get_filters(kwargs) filters = [{'key': key, diff --git a/tricircle/network/helper.py b/tricircle/network/helper.py index ce792070..b02c3c63 100644 --- a/tricircle/network/helper.py +++ b/tricircle/network/helper.py @@ -571,7 +571,7 @@ class NetworkHelper(object): @staticmethod def get_create_sg_rule_body(rule, sg_id, ip=None): ip = ip or rule['remote_ip_prefix'] - # if ip is passed, this is a extended rule for remote group + # if ip is passed, this is an extended rule for remote group return {'security_group_rule': { 'tenant_id': rule['tenant_id'], 'remote_group_id': None, diff --git a/tricircle/tests/unit/network/test_central_plugin.py b/tricircle/tests/unit/network/test_central_plugin.py index f6d9e41d..3cf39cba 100644 --- a/tricircle/tests/unit/network/test_central_plugin.py +++ b/tricircle/tests/unit/network/test_central_plugin.py @@ -1513,7 +1513,7 @@ class PluginTest(unittest.TestCase, for net in TOP_NETS: if net['name'].startswith('ns_bridge'): t_ns_bridge_net_id = net['id'] - # N-S bridge not created since no extenal network created + # N-S bridge not created since no external network created self.assertIsNone(t_ns_bridge_net_id) device_ids = ['', '', ''] diff --git a/tricircle/xjob/xmanager.py b/tricircle/xjob/xmanager.py index b6a14a05..76c26537 100644 --- a/tricircle/xjob/xmanager.py +++ b/tricircle/xjob/xmanager.py @@ -672,7 +672,7 @@ class XManager(PeriodicTasks): @staticmethod def _construct_bottom_rule(rule, sg_id, ip=None): ip = ip or rule['remote_ip_prefix'] - # if ip is passed, this is a extended rule for remote group + # if ip is passed, this is an extended rule for remote group return {'remote_group_id': None, 'direction': rule['direction'], 'remote_ip_prefix': ip,