summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPeter Stachowski <peter@tesora.com>2015-02-13 10:26:44 -0500
committerPeter Stachowski <peter@tesora.com>2015-02-13 17:30:25 -0500
commit740379da939ee9d71511d6a56e13ae01060316fb (patch)
tree0b89c868ad81136dac7596cf726d3c8f339f1559
parenta67f6b1a789915251918922a00cd2f7fefb1ff22 (diff)
downloadpython-troveclient-740379da939ee9d71511d6a56e13ae01060316fb.tar.gz
Fix grammatical errors in profiler messages
While testing the osprofiler code, certain grammatical inconsistencies were found in the help/messages. These have been fixed. Change-Id: Ia0b81870e15a9bc118bcaa81e698ef0e44c96f94
-rw-r--r--troveclient/shell.py19
1 files changed, 9 insertions, 10 deletions
diff --git a/troveclient/shell.py b/troveclient/shell.py
index ecdf539..3c7dfd8 100644
--- a/troveclient/shell.py
+++ b/troveclient/shell.py
@@ -186,15 +186,14 @@ class OpenStackTroveShell(object):
metavar='HMAC_KEY',
default=utils.env('OS_PROFILE_HMACKEY',
default=None),
- help='HMAC key to use for encrypting context '
- 'data for performance profiling of operation. '
- 'This key should be the value of HMAC key '
- 'configured in osprofiler middleware in '
- 'Trove, it is specified in paste '
- 'configure file at /etc/trove/api-paste.ini. '
- 'Without key the profiling will not be '
- 'triggered even if osprofiler is enabled '
- 'on server side. '
+ help='HMAC key used to encrypt context '
+ 'data when profiling the performance of an '
+ 'operation. This key should be set to one of '
+ 'the HMAC keys configured in Trove (they are '
+ 'found in api-paste.ini, typically in '
+ '/etc/trove). Without the key, profiling '
+ 'will not be triggered even if it is enabled '
+ 'on the server side. '
'Defaults to env[OS_PROFILE_HMACKEY].')
self._append_global_identity_args(parser)
@@ -546,7 +545,7 @@ class OpenStackTroveShell(object):
if profile:
trace_id = osprofiler_profiler.get().get_base_id()
print("Trace ID: %s" % trace_id)
- print("To display trace use next command:\n"
+ print("To display the trace, use the following command:\n"
"osprofiler trace show --html %s" % trace_id)
def _run_extension_hooks(self, hook_type, *args, **kwargs):