diff options
author | Daniil Baturin <daniil@baturin.org> | 2022-10-01 10:57:39 +0100 |
---|---|---|
committer | Daniil Baturin <daniil@baturin.org> | 2022-10-01 10:57:39 +0100 |
commit | 8bda23594d95803b9c812fe4ba93beee2c465f58 (patch) | |
tree | df624375eb848524b8cb056e1109a17f986eafcf /src/op_mode/ikev2_profile_generator.py | |
parent | 4105b464491f72aa87765aa3b072fb56ace71b89 (diff) | |
download | vyos-1x-8bda23594d95803b9c812fe4ba93beee2c465f58.tar.gz vyos-1x-8bda23594d95803b9c812fe4ba93beee2c465f58.zip |
T4722: consistently use the "IPsec" spelling for IPsec
Diffstat (limited to 'src/op_mode/ikev2_profile_generator.py')
-rwxr-xr-x | src/op_mode/ikev2_profile_generator.py | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/op_mode/ikev2_profile_generator.py b/src/op_mode/ikev2_profile_generator.py index 21561d16f..a22f04c45 100755 --- a/src/op_mode/ikev2_profile_generator.py +++ b/src/op_mode/ikev2_profile_generator.py @@ -119,7 +119,7 @@ config_base = ipsec_base + ['remote-access', 'connection'] pki_base = ['pki'] conf = ConfigTreeQuery() if not conf.exists(config_base): - exit('IPSec remote-access is not configured!') + exit('IPsec remote-access is not configured!') profile_name = 'VyOS IKEv2 Profile' if args.profile: @@ -131,7 +131,7 @@ if args.name: conn_base = config_base + [args.connection] if not conf.exists(conn_base): - exit(f'IPSec remote-access connection "{args.connection}" does not exist!') + exit(f'IPsec remote-access connection "{args.connection}" does not exist!') data = conf.get_config_dict(conn_base, key_mangling=('-', '_'), get_first_key=True, no_tag_node_value_mangle=True) @@ -178,7 +178,7 @@ for _, proposal in ike_proposal.items(): proposal['hash'] in set(vyos2client_integrity) and proposal['dh_group'] in set(supported_dh_groups)): - # We 're-code' from the VyOS IPSec proposals to the Apple naming scheme + # We 're-code' from the VyOS IPsec proposals to the Apple naming scheme proposal['encryption'] = vyos2client_cipher[ proposal['encryption'] ] proposal['hash'] = vyos2client_integrity[ proposal['hash'] ] @@ -191,7 +191,7 @@ count = 1 for _, proposal in esp_proposals.items(): if {'encryption', 'hash'} <= set(proposal): if proposal['encryption'] in set(vyos2client_cipher) and proposal['hash'] in set(vyos2client_integrity): - # We 're-code' from the VyOS IPSec proposals to the Apple naming scheme + # We 're-code' from the VyOS IPsec proposals to the Apple naming scheme proposal['encryption'] = vyos2client_cipher[ proposal['encryption'] ] proposal['hash'] = vyos2client_integrity[ proposal['hash'] ] |