@@ -590,7 +590,7 @@ def read_certificate(certificate):
590
590
591
591
def read_certificates (glob_path ):
592
592
'''
593
- Returns a dict containing details of a all certificates matching a glob
593
+ Returns a dict containing details of all certificates matching a glob
594
594
595
595
glob_path:
596
596
A path to certificates to be read and returned.
@@ -651,8 +651,8 @@ def read_crl(crl):
651
651
652
652
:depends: - OpenSSL command line tool
653
653
654
- csl :
655
- A path or PEM encoded string containing the CSL to read.
654
+ crl :
655
+ A path or PEM encoded string containing the CRL to read.
656
656
657
657
CLI Example:
658
658
@@ -747,17 +747,17 @@ def write_pem(text, path, overwrite=True, pem_type=None):
747
747
PEM string input to be written out.
748
748
749
749
path:
750
- Path of the file to write the pem out to.
750
+ Path of the file to write the PEM out to.
751
751
752
752
overwrite:
753
- If True(default), write_pem will overwrite the entire pem file.
753
+ If `` True`` (default), write_pem will overwrite the entire PEM file.
754
754
Set False to preserve existing private keys and dh params that may
755
- exist in the pem file.
755
+ exist in the PEM file.
756
756
757
757
pem_type:
758
758
The PEM type to be saved, for example ``CERTIFICATE`` or
759
759
``PUBLIC KEY``. Adding this will allow the function to take
760
- input that may contain multiple pem types.
760
+ input that may contain multiple PEM types.
761
761
762
762
CLI Example:
763
763
@@ -871,22 +871,22 @@ def create_crl( # pylint: disable=too-many-arguments,too-many-locals
871
871
:depends: - PyOpenSSL Python module
872
872
873
873
path:
874
- Path to write the crl to.
874
+ Path to write the CRL to.
875
875
876
876
text:
877
877
If ``True``, return the PEM text without writing to a file.
878
878
Default ``False``.
879
879
880
880
signing_private_key:
881
881
A path or string of the private key in PEM format that will be used
882
- to sign this crl . This is required.
882
+ to sign the CRL . This is required.
883
883
884
884
signing_private_key_passphrase:
885
885
Passphrase to decrypt the private key.
886
886
887
887
signing_cert:
888
888
A certificate matching the private key that will be used to sign
889
- this crl . This is required.
889
+ the CRL . This is required.
890
890
891
891
revoked:
892
892
A list of dicts containing all the certificates to revoke. Each dict
@@ -1119,9 +1119,9 @@ def create_certificate(
1119
1119
Default ``False``.
1120
1120
1121
1121
overwrite:
1122
- If True(default), create_certificate will overwrite the entire pem
1122
+ If `` True`` (default), create_certificate will overwrite the entire PEM
1123
1123
file. Set False to preserve existing private keys and dh params that
1124
- may exist in the pem file.
1124
+ may exist in the PEM file.
1125
1125
1126
1126
kwargs:
1127
1127
Any of the properties below can be included as additional
@@ -1131,7 +1131,7 @@ def create_certificate(
1131
1131
Request a remotely signed certificate from ca_server. For this to
1132
1132
work, a ``signing_policy`` must be specified, and that same policy
1133
1133
must be configured on the ca_server (name or list of ca server). See ``signing_policy`` for
1134
- details. Also the salt master must permit peers to call the
1134
+ details. Also, the salt master must permit peers to call the
1135
1135
``sign_remote_certificate`` function.
1136
1136
1137
1137
Example:
@@ -1192,7 +1192,7 @@ def create_certificate(
1192
1192
1193
1193
public_key:
1194
1194
The public key to be included in this certificate. This can be sourced
1195
- from a public key, certificate, csr or private key. If a private key
1195
+ from a public key, certificate, CSR or private key. If a private key
1196
1196
is used, the matching public key from the private key will be
1197
1197
generated before any processing is done. This means you can request a
1198
1198
certificate from a remote CA using a private key file as your
@@ -1256,7 +1256,7 @@ def create_certificate(
1256
1256
X509v3 Subject Alternative Name
1257
1257
1258
1258
crlDistributionPoints:
1259
- X509v3 CRL distribution points
1259
+ X509v3 CRL Distribution points
1260
1260
1261
1261
issuingDistributionPoint:
1262
1262
X509v3 Issuing Distribution Point
@@ -1316,7 +1316,7 @@ def create_certificate(
1316
1316
signing_policy:
1317
1317
A signing policy that should be used to create this certificate.
1318
1318
Signing policies should be defined in the minion configuration, or in
1319
- a minion pillar. It should be a yaml formatted list of arguments
1319
+ a minion pillar. It should be a YAML formatted list of arguments
1320
1320
which will override any arguments passed to this function. If the
1321
1321
``minions`` key is included in the signing policy, only minions
1322
1322
matching that pattern (see match.glob and match.compound) will be
@@ -1717,7 +1717,7 @@ def verify_private_key(private_key, public_key, passphrase=None):
1717
1717
1718
1718
public_key:
1719
1719
The public key to verify, can be a string or path to a PEM formatted
1720
- certificate, csr , or another private key.
1720
+ certificate, CSR , or another private key.
1721
1721
1722
1722
passphrase:
1723
1723
Passphrase to decrypt the private key.
@@ -1743,7 +1743,7 @@ def verify_signature(certificate, signing_pub_key=None,
1743
1743
1744
1744
signing_pub_key:
1745
1745
The public key to verify, can be a string or path to a PEM formatted
1746
- certificate, csr , or private key.
1746
+ certificate, CSR , or private key.
1747
1747
1748
1748
signing_pub_key_passphrase:
1749
1749
Passphrase to the signing_pub_key if it is an encrypted private key.
@@ -1883,7 +1883,7 @@ def will_expire(certificate, days):
1883
1883
ret ['cn' ] = _parse_subject (cert .get_subject ())['CN' ]
1884
1884
ret ['will_expire' ] = _expiration_date .strftime (ts_pt ) <= _check_time .strftime (ts_pt )
1885
1885
except ValueError as err :
1886
- log .debug ('Unable to return details of a sertificate expiration: %s' , err )
1886
+ log .debug ('Unable to return details of a certificate expiration: %s' , err )
1887
1887
log .trace (err , exc_info = True )
1888
1888
1889
1889
return ret
0 commit comments