Merge "[codespell] Fixing Spelling Mistakes"

This commit is contained in:
Zuul 2024-01-27 00:00:48 +00:00 committed by Gerrit Code Review
commit 93bef2405a
17 changed files with 32 additions and 32 deletions

View File

@ -246,7 +246,7 @@ def get_autoneg_cap(pmd):
Dependent (PMD) capability bits.
:param pmd: PMD bits
:return: Sorted ist containing capability strings
:return: Sorted list containing capability strings
"""
caps_set = set()

View File

@ -45,7 +45,7 @@ class SwiftAPI(object):
def __init__(self):
"""Constructor for creating a SwiftAPI object.
Authentification is loaded from config file.
Authentication is loaded from config file.
"""
global SWIFT_SESSION

View File

@ -487,7 +487,7 @@ def get_rules_conditions(**fields):
:returns: list of conditions
"""
# NOTE(TheJulia): This appears to exist largely to help unit
# testing of rules funcitonality.
# testing of rules functionality.
with session_for_read() as session:
query = session.query(
model.RuleCondition
@ -510,7 +510,7 @@ def get_rules_actions(**fields):
:returns: list of actions
"""
# NOTE(TheJulia): This appears to exist largely to help unit
# testing of rules funcitonality.
# testing of rules functionality.
with session_for_read() as session:
query = session.query(
model.RuleAction

View File

@ -51,7 +51,7 @@ def upgrade():
#
# The prior net effect was that the field was being altered to
# be varchar(10), to house the largest enum value, except the added
# value only requres varchar(9), so this is sort of entirely
# value only requires varchar(9), so this is sort of entirely
# redundant at this point. For what it is worth, while
# batch_alter_table *does* include an option to prevent
# recration, column widths cannot be modified dynamically with

View File

@ -281,7 +281,7 @@ def api(path, is_public_api=False, rule=None, verb_to_rule_map=None,
as public, with minimal access enforcement
:param rule: API access policy rule to enforce.
If rule is None, the 'default' policy rule will be enforced,
which is "deny all" if not overridden in policy confif file.
which is "deny all" if not overridden in policy config file.
:param verb_to_rule_map: if both rule and this are given,
defines mapping between http verbs (uppercase)
and strings to format the 'rule' string with

View File

@ -62,7 +62,7 @@ class NodeInfo(object):
self.invalidate_cache()
# NOTE(TheJulia): version_id is unused at this time and can be
# removed at a later point in time. Primarily it remains for
# compatability.
# compatibility.
self._version_id = version_id
self._state = state
self._node = node
@ -676,7 +676,7 @@ def start_introspection(uuid, **kwargs):
recorded_state = node_info.state
if istate.States.error == recorded_state:
# If there was a failure, return to starting state to avoid
# letting the cache block new runs from occuring.
# letting the cache block new runs from occurring.
state = istate.States.starting
else:
state = recorded_state
@ -698,7 +698,7 @@ def add_node(uuid, state, manage_boot=True, **attributes):
"""
started_at = timeutils.utcnow()
with db.session_for_write() as session:
# TODO(TheJulia): This needs ot be moved to the DBAPI, but for change
# TODO(TheJulia): This needs to be moved to the DBAPI, but for change
# reviewer sanity, is here for now.
session.execute(
delete(db_model.Attribute).where(
@ -1006,7 +1006,7 @@ def store_introspection_data(node_id, introspection_data, processed=True):
:param processed: Specify the type of introspected data, set to False
indicates the data is unprocessed.
"""
# NOTE(TheJulia): For compatability, but at the same time there is
# NOTE(TheJulia): For compatibility, but at the same time there is
# two nodes of introspection data operation, DB and originally swift.
db.store_introspection_data(
node_id=node_id,
@ -1022,6 +1022,6 @@ def get_introspection_data(node_id, processed=True):
indicates retrieving the unprocessed data.
:return: A dictionary representation of intropsected data
"""
# NOTE(TheJulia): Moved to db api, here for compatability.
# NOTE(TheJulia): Moved to db api, here for compatibility.
return db.get_introspection_data(node_id=node_id,
processed=processed)

View File

@ -53,7 +53,7 @@ class GenericLocalLinkConnectionHook(base.ProcessingHook):
except TypeError:
LOG.warning("TLV value for TLV type %d not in correct"
"format, ensure TLV value is in "
"hexidecimal format when sent to "
"hexadecimal format when sent to "
"inspector", tlv_type, node_info=node_info)
return

View File

@ -266,7 +266,7 @@ def init_enforcer(policy_file=None, rules=None,
default_rule=default_rule,
use_conf=use_conf)
# NOTE(gmann): Explictly disable the warnings for policies
# NOTE(gmann): Explicitly disable the warnings for policies
# changing their default check_str. With new RBAC policy
# work, all the policy defaults have been changed and warning for
# each policy started filling the logs limit for various tool.

View File

@ -579,7 +579,7 @@ class TestAbort(BaseTest):
self.assertEqual(0, self.sync_filter_mock.call_count)
self.assertEqual(0, cli.set_node_power_state.call_count)
self.assertEqual(0, self.node_info.finshed.call_count)
self.assertEqual(0, self.node_info.finished.call_count)
self.assertEqual(0, self.node_info.fsm_event.call_count)
def test_firewall_update_exception(self, client_mock, get_mock):

View File

@ -1,7 +1,7 @@
---
features:
- |
Adds an ``accelerators`` plugin to identify acclerator devices and update
Adds an ``accelerators`` plugin to identify accelerator devices and update
the bare metal node for future scheduling. The accelerator devices will be
saved to node properties under the key ``accelerators``. Introduces a
configuration option ``[accelerators]known_devices`` to specify a

View File

@ -3,7 +3,7 @@ fixes:
- |
The ``extra_hardware`` processing hook no longer refuses to parse extra
data if some records are empty or have unexpected length. These records
are now discared.
are now discarded.
The previous behavior can be returned by setting the new option
``[extra_hardware]strict`` to ``True``.

View File

@ -2,16 +2,16 @@
features:
- Ironic-Inspector is now using keystoneauth and proper auth_plugins
instead of keystoneclient for communicating with Ironic and Swift.
It allows to finely tune authentification for each service independently.
It allows to finely tune authentication for each service independently.
For each service, the keystone session is created and reused, minimizing
the number of authentification requests to Keystone.
the number of authentication requests to Keystone.
upgrade:
- Operators are advised to specify a proper keystoneauth plugin
and its appropriate settings in [ironic] and [swift] config sections.
Backward compatibility with previous authentification options is included.
Using authentification informaiton for Ironic and Swift from
Backward compatibility with previous authentication options is included.
Using authentication information for Ironic and Swift from
[keystone_authtoken] config section is no longer supported.
deprecations:
- Most of current authentification options for either Ironic or Swift are
- Most of current authentication options for either Ironic or Swift are
deprecated and will be removed in a future release. Please configure
the keystoneauth auth plugin authentification instead.
the keystoneauth auth plugin authentication instead.

View File

@ -1,7 +1,7 @@
---
features:
- |
Adds an API access policy enforcment based on **oslo.policy** rules.
Adds an API access policy enforcement based on **oslo.policy** rules.
Similar to other OpenStack services, operators now can configure
fine-grained access policies using ``policy.yaml`` file. See
`policy.yaml.sample`_ in the code tree for the list of available policies

View File

@ -9,7 +9,7 @@ features:
ironic may boot the inspection image.
A new option was added ``[pxe_filter]deny_unknown_macs`` which allow
changeing this behaviour so that the DHCP server only allow enrolled nodes
changing this behaviour so that the DHCP server only allow enrolled nodes
being introspected and deny everything else.
.. Note:: If this option is ``True``, nodes must have at least one

View File

@ -8,7 +8,7 @@ fixes:
as the Inspector service is considered an "admin-only" service.
Also in alignment with overall community position changes, where the
``admin`` role is sufficent without an explicit ``system`` scope. To
``admin`` role is sufficient without an explicit ``system`` scope. To
help ensure a high level of security, explicit testing was also added
for the ``manager`` role, which is unavailable as that role is reserved
for administrative functions inside of a tenant's project.

View File

@ -22,7 +22,7 @@ deprecations:
- |
Plugin maintainers should be aware that the Node Cache object field
``version_id`` filed is no longer in use. It is still returned
by the data model if stored for the purposes of compatability, but
by the data model if stored for the purposes of compatibility, but
Inspector will not update the field through the normal course of it's
operation.
other:

View File

@ -226,7 +226,7 @@ msgstr ""
msgid ""
"A new option was added ``[pxe_filter]deny_unknown_macs`` which allow "
"changeing this behaviour so that the DHCP server only allow enrolled nodes "
"changing this behaviour so that the DHCP server only allow enrolled nodes "
"being introspected and deny everything else."
msgstr ""
"A new option was added ``[pxe_filter]deny_unknown_macs`` which allow "
@ -377,7 +377,7 @@ msgstr ""
"at the web server root resource."
msgid ""
"Adds an ``accelerators`` plugin to identify acclerator devices and update "
"Adds an ``accelerators`` plugin to identify accelerator devices and update "
"the bare metal node for future scheduling. The accelerator devices will be "
"saved to node properties under the key ``accelerators``. Introduces a "
"configuration option ``[accelerators]known_devices`` to specify a "
@ -1195,7 +1195,7 @@ msgstr "Pike Series (6.0.0 - 6.0.x) Release Notes"
msgid ""
"Plugin maintainers should be aware that the Node Cache object field "
"``version_id`` filed is no longer in use. It is still returned by the data "
"model if stored for the purposes of compatability, but Inspector will not "
"model if stored for the purposes of compatibility, but Inspector will not "
"update the field through the normal course of it's operation."
msgstr ""
"Plugin maintainers should be aware that the Node Cache object field "
@ -1353,7 +1353,7 @@ msgstr "Stein Series (8.1.0 - 8.2.x) Release Notes"
msgid ""
"Stops introspection when setting boot device is failed, as the node is not "
"guarenteed to perform a PXE boot in this case."
"guaranteed to perform a PXE boot in this case."
msgstr ""
"Stops introspection when setting boot device is failed, as the node is not "
"guaranteed to perform a PXE boot in this case."
@ -1431,7 +1431,7 @@ msgstr ""
msgid ""
"The ``extra_hardware`` processing hook no longer refuses to parse extra data "
"if some records are empty or have unexpected length. These records are now "
"discared."
"discarded."
msgstr ""
"The ``extra_hardware`` processing hook no longer refuses to parse extra data "
"if some records are empty or have unexpected length. These records are now "
@ -1552,7 +1552,7 @@ msgstr ""
"iptables pxe-filter.)"
msgid ""
"The filter uses the systemd service name used by the RDO distrubution "
"The filter uses the systemd service name used by the RDO distribution "
"(``openstack-ironic-inspector-dnsmasq.service``)."
msgstr ""
"The filter uses the systemd service name used by the RDO distribution "