Fix typos in comments

TrivialFix

Change-Id: I418a241ba1b1acd64b2bb17a50afeae4cf0f378a
This commit is contained in:
Adit Sarfaty 2017-11-05 14:25:47 +02:00
parent 2d3d1797e8
commit 609bc5e2ae
5 changed files with 5 additions and 5 deletions

View File

@ -236,7 +236,7 @@ class ClientCertificateManager(object):
"""Delete specified client certificate without storage verification"""
# This file may contain private key
# passing the pem through crypto will perform validation and
# stripp off the key
# strip off the key
cert = self._get_cert_from_file(filename)
cert_pem = crypto.dump_certificate(crypto.FILETYPE_PEM, cert)

View File

@ -139,7 +139,7 @@ class TimeoutSession(requests.Session):
# important).
# It would be optimal to populate certificate once per connection,
# per request. Unfortunately requests library verifies cert file
# existance regardless of whether certificate is going to be used
# existence regardless of whether certificate is going to be used
# for this request.
# Optimal solution for this would be to expose certificate as variable
# and not as a file to the SSL library

View File

@ -35,7 +35,7 @@ class NsxLibConfig(object):
instead of basic authentication.
:param insecure: If true, the NSX Manager server certificate is not
verified. If false the CA bundle specified via "ca_file"
will be used or if unsest the default system root CAs
will be used or if unset the default system root CAs
will be used.
:param ca_file: Specify a CA bundle file to use in verifying the NSX
Manager server certificate. This option is ignored if

View File

@ -395,7 +395,7 @@ class NsxLibFirewallSection(utils.NsxLibApiBase):
if force:
# shared sections (like default section) can serve multiple
# openstack deployments. If some operate under protected
# identities, force-owerwrite is needed.
# identities, force-overwrite is needed.
# REVISIT(annak): find better solution for shared sections
headers = {'X-Allow-Overwrite': 'true'}

View File

@ -60,7 +60,7 @@ def update_v3_tags(current_tags, tags_update):
current_scopes = set([tag['scope'] for tag in current_tags])
updated_scopes = set([tag['scope'] for tag in tags_update])
# All tags scopes which are either completley new or arleady defined on the
# All tags scopes which are either completely new or already defined on the
# resource are left in place, unless the tag value is empty, in that case
# it is ignored.
tags = [{'scope': tag['scope'], 'tag': tag['tag']}