summaryrefslogtreecommitdiff
path: root/src/op_mode/ikev2_profile_generator.py
diff options
context:
space:
mode:
authorDaniil Baturin <daniil@baturin.org>2022-10-01 10:57:39 +0100
committerDaniil Baturin <daniil@baturin.org>2022-10-01 10:57:39 +0100
commit8bda23594d95803b9c812fe4ba93beee2c465f58 (patch)
treedf624375eb848524b8cb056e1109a17f986eafcf /src/op_mode/ikev2_profile_generator.py
parent4105b464491f72aa87765aa3b072fb56ace71b89 (diff)
downloadvyos-1x-8bda23594d95803b9c812fe4ba93beee2c465f58.tar.gz
vyos-1x-8bda23594d95803b9c812fe4ba93beee2c465f58.zip
T4722: consistently use the "IPsec" spelling for IPsec
Diffstat (limited to 'src/op_mode/ikev2_profile_generator.py')
-rwxr-xr-xsrc/op_mode/ikev2_profile_generator.py8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/op_mode/ikev2_profile_generator.py b/src/op_mode/ikev2_profile_generator.py
index 21561d16f..a22f04c45 100755
--- a/src/op_mode/ikev2_profile_generator.py
+++ b/src/op_mode/ikev2_profile_generator.py
@@ -119,7 +119,7 @@ config_base = ipsec_base + ['remote-access', 'connection']
pki_base = ['pki']
conf = ConfigTreeQuery()
if not conf.exists(config_base):
- exit('IPSec remote-access is not configured!')
+ exit('IPsec remote-access is not configured!')
profile_name = 'VyOS IKEv2 Profile'
if args.profile:
@@ -131,7 +131,7 @@ if args.name:
conn_base = config_base + [args.connection]
if not conf.exists(conn_base):
- exit(f'IPSec remote-access connection "{args.connection}" does not exist!')
+ exit(f'IPsec remote-access connection "{args.connection}" does not exist!')
data = conf.get_config_dict(conn_base, key_mangling=('-', '_'),
get_first_key=True, no_tag_node_value_mangle=True)
@@ -178,7 +178,7 @@ for _, proposal in ike_proposal.items():
proposal['hash'] in set(vyos2client_integrity) and
proposal['dh_group'] in set(supported_dh_groups)):
- # We 're-code' from the VyOS IPSec proposals to the Apple naming scheme
+ # We 're-code' from the VyOS IPsec proposals to the Apple naming scheme
proposal['encryption'] = vyos2client_cipher[ proposal['encryption'] ]
proposal['hash'] = vyos2client_integrity[ proposal['hash'] ]
@@ -191,7 +191,7 @@ count = 1
for _, proposal in esp_proposals.items():
if {'encryption', 'hash'} <= set(proposal):
if proposal['encryption'] in set(vyos2client_cipher) and proposal['hash'] in set(vyos2client_integrity):
- # We 're-code' from the VyOS IPSec proposals to the Apple naming scheme
+ # We 're-code' from the VyOS IPsec proposals to the Apple naming scheme
proposal['encryption'] = vyos2client_cipher[ proposal['encryption'] ]
proposal['hash'] = vyos2client_integrity[ proposal['hash'] ]