Skip to content

Commit 1538a50

Browse files
authored
Merge pull request #297 from Castaglia/codespell-nits
Correcting misspellings noted by `codespell`; these are cosmetic chan…
2 parents a9de929 + e167905 commit 1538a50

File tree

13 files changed

+24
-24
lines changed

13 files changed

+24
-24
lines changed

doc/NOTES.dns-srv

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Implementation:
3434

3535
NOTE: Port numbers are NOT allowed in the URL if the SRV scheme is used!
3636
Why not? Because port numbers are returned in the SRV records themselves;
37-
avoid any possible collisions/conflicts. Besides, mutiple SRV records
37+
avoid any possible collisions/conflicts. Besides, multiple SRV records
3838
for the same service name might have different ports.
3939

4040
Similarly for TXT scheme; the port will be part of the URLs found in

doc/NOTES.health-checks

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ Health check (more properly "application server state" checks with applied
33
interpretation/policy) metrics:
44

55
TCP connect to port
6-
conect timeout
6+
connect timeout
77
number of retries
88
retry interval
99

@@ -22,7 +22,7 @@ interpretation/policy) metrics:
2222
retry interval
2323

2424
FTP login
25-
require succesful login (usually via anonymous login)
25+
require successful login (usually via anonymous login)
2626
require specific response string?
2727
timeout
2828
number of retries
@@ -57,7 +57,7 @@ Notes:
5757

5858
"RoundRobin is suitable where all available servers are assumed to be
5959
largely similar in functionality. Weighed/ratio'd RoundRobin builds
60-
weights into the system to deal with heterogenous capacity of the
60+
weights into the system to deal with heterogeneous capacity of the
6161
servers. (This is harder, since the "weight" factor is admin-assigned,
6262
and how exactly is it computed? 2x CPU? 4x memory? 6x network?)
6363

include/proxy/ftp/msg.h

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/*
22
* ProFTPD - mod_proxy FTP message API
3-
* Copyright (c) 2013-2021 TJ Saunders
3+
* Copyright (c) 2013-2025 TJ Saunders
44
*
55
* This program is free software; you can redistribute it and/or modify
66
* it under the terms of the GNU General Public License as published by
@@ -27,13 +27,13 @@
2727

2828
#include "mod_proxy.h"
2929

30-
/* Format a string containg the address for use in a PORT command or a
30+
/* Format a string containing the address for use in a PORT command or a
3131
* PASV response.
3232
*/
3333
const char *proxy_ftp_msg_fmt_addr(pool *, const pr_netaddr_t *,
3434
unsigned short, int);
3535

36-
/* Format a string containg the address for use in an EPRT command or an
36+
/* Format a string containing the address for use in an EPRT command or an
3737
* EPSV response.
3838
*/
3939
const char *proxy_ftp_msg_fmt_ext_addr(pool *, const pr_netaddr_t *,

lib/proxy/ftp/ctrl.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/*
22
* ProFTPD - mod_proxy FTP control conn routines
3-
* Copyright (c) 2012-2023 TJ Saunders
3+
* Copyright (c) 2012-2025 TJ Saunders
44
*
55
* This program is free software; you can redistribute it and/or modify
66
* it under the terms of the GNU General Public License as published by
@@ -183,7 +183,7 @@ pr_response_t *proxy_ftp_ctrl_recv_resp(pool *p, conn_t *ctrl_conn,
183183
}
184184

185185
/* If we are the first line of the response, the first three characters
186-
* MUST be numeric, followed by a hypen. Anything else is nonconformant
186+
* MUST be numeric, followed by a hyphen. Anything else is nonconformant
187187
* with RFC 959.
188188
*
189189
* If we are NOT the first line of the response, then we are probably

lib/proxy/ssh/bcrypt.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
* function with the following modifications:
3535
* 1. The input password and salt are preprocessed with SHA512.
3636
* 2. The output length is expanded to 256 bits.
37-
* 3. Subsequently the magic string to be encrypted is lengthened and modifed
37+
* 3. Subsequently the magic string to be encrypted is lengthened and modified
3838
* to "OxychromaticBlowfishSwatDynamite"
3939
* 4. The hash function is defined to perform 64 rounds of initial state
4040
* expansion. (More rounds are performed by iterating the hash.)

lib/proxy/ssh/keys.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3227,7 +3227,7 @@ static int deserialize_openssh_private_key(pool *p, const char *path,
32273227
len = proxy_ssh_msg_read_int(p, data, data_len, &secret_keylen);
32283228

32293229
/* NOTE: PuTTY's puttygen adds the public key _again_, in the second half
3230-
* of the secret key data, per commments in its
3230+
* of the secret key data, per comments in its
32313231
* `sshecc.c#eddsa_new_priv_openssh` function. Thus if this secret key
32323232
* length is larger than expected for Ed448 keys, only use the first half of
32333233
* it. Ugh. This "divide in half" hack only works for these keys where the

lib/proxy/tls.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/*
22
* ProFTPD - mod_proxy TLS implementation
3-
* Copyright (c) 2015-2024 TJ Saunders
3+
* Copyright (c) 2015-2025 TJ Saunders
44
*
55
* This program is free software; you can redistribute it and/or modify
66
* it under the terms of the GNU General Public License as published by
@@ -934,7 +934,7 @@ static int cert_match_ip_san(pool *p, X509 *cert, const char *ipstr) {
934934
} else {
935935
if (san_datalen == 16) {
936936
/* We need to handle the case where the iPAddress SAN might
937-
* have contained an IPv4-mapped IPv6 adress, and we're
937+
* have contained an IPv4-mapped IPv6 address, and we're
938938
* comparing against an IPv4 address.
939939
*/
940940
if (san_ipstrlen > 7 &&
@@ -1558,7 +1558,7 @@ static int tls_connect(conn_t *conn, const char *host_name,
15581558
(void) pr_inet_set_proto_nodelay(conn->pool, conn, 0);
15591559

15601560
if (nstrm->strm_type == PR_NETIO_STRM_DATA) {
1561-
/* Reenable TCP_CORK (aka TCP_NOPUSH), now that the handshake is done. */
1561+
/* Re-enable TCP_CORK (aka TCP_NOPUSH), now that the handshake is done. */
15621562
if (pr_inet_set_proto_cork(conn->wfd, 1) < 0) {
15631563
pr_trace_msg(trace_channel, 9,
15641564
"error re-enabling TCP_CORK on data conn: %s", strerror(errno));

lib/proxy/uri.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/*
22
* ProFTPD - mod_proxy URI implementation
3-
* Copyright (c) 2012-2020 TJ Saunders
3+
* Copyright (c) 2012-2025 TJ Saunders
44
*
55
* This program is free software; you can redistribute it and/or modify
66
* it under the terms of the GNU General Public License as published by
@@ -139,7 +139,7 @@ static char *uri_parse_userinfo(pool *p, const char *orig_uri,
139139

140140
/* To handle the case where the password field might itself contain an
141141
* '@' character, we first search from the end for '@'. If found, then we
142-
* search for '@' from the beginning. If also found, AND if both ocurrences
142+
* search for '@' from the beginning. If also found, AND if both occurrences
143143
* are the same, then we have a plain "username:password@" string.
144144
*
145145
* Note that we can handle '@' characters within passwords (or usernames),

mod_proxy.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4676,7 +4676,7 @@ static int proxy_get_cmd_group(cmd_rec *cmd) {
46764676
}
46774677

46784678
/* Note that some commands legitimately have no group (G_NONE is NULL), thus
4679-
* the absense of a group could simply indicate G_NONE.
4679+
* the absence of a group could simply indicate G_NONE.
46804680
*/
46814681
if (cmd->group == NULL) {
46824682
pr_trace_msg(trace_channel, 15,
@@ -4756,7 +4756,7 @@ MODRET proxy_any(cmd_rec *cmd) {
47564756
return PR_DECLINED(cmd);
47574757
}
47584758

4759-
/* Honor any <Limit> sections for this comand. */
4759+
/* Honor any <Limit> sections for this command. */
47604760
if (proxy_have_limit(cmd, &resp_code) < 0) {
47614761
int xerrno = errno;
47624762

mod_proxy.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1590,7 +1590,7 @@ <h3><a name="ProxyTLSEngine">ProxyTLSEngine</a></h3>
15901590
Use of SSL/TLS to the backend server will attempt to <em>match</em> the
15911591
SSL/TLS usage of the frontend client. Thus if the frontend client uses
15921592
explicit FTPS, then explicit FTPS will be attempted with the backend;
1593-
similarly for implicit FTPS. And if the frontent client does not use
1593+
similarly for implicit FTPS. And if the frontend client does not use
15941594
FTPS, then SSL/TLS will not be used for the backend connection.
15951595
</li>
15961596
</ul>
@@ -1629,7 +1629,7 @@ <h3><a name="ProxyTLSOptions">ProxyTLSOptions</a></h3>
16291629
<li><code>EnableDiags</code>
16301630
<p>
16311631
Sets callbacks in the OpenSSL library such that <b>a lot</b> of
1632-
SSL/TLS protcol information is logged to the
1632+
SSL/TLS protocol information is logged to the
16331633
<a href="#ProxyLog"><code>ProxyLog</code></a> file. This option is
16341634
<b>very</b> useful when debugging strange interactions with FTPS servers.
16351635
</li>

t/api/db.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/*
22
* ProFTPD - mod_proxy testsuite
3-
* Copyright (c) 2015-2022 TJ Saunders <[email protected]>
3+
* Copyright (c) 2015-2025 TJ Saunders <[email protected]>
44
*
55
* This program is free software; you can redistribute it and/or modify
66
* it under the terms of the GNU General Public License as published by
@@ -202,7 +202,7 @@ START_TEST (db_open_with_version_test) {
202202
schema_name, schema_version, strerror(errno));
203203

204204
res = proxy_db_close(p, dbh);
205-
ck_assert_msg(res == 0, "Failed to close databas: %s", strerror(errno));
205+
ck_assert_msg(res == 0, "Failed to close database: %s", strerror(errno));
206206

207207
mark_point();
208208
schema_version = 99;

t/lib/ProFTPD/Tests/Modules/mod_proxy/tls.pm

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1750,7 +1750,7 @@ sub proxy_reverse_backend_tls_login_cached_ticket {
17501750
if (open(my $fh, ">> $config_file")) {
17511751
print $fh <<EOC;
17521752
<IfModule mod_tls.c>
1753-
# Recommended practice is to diable server-side session caching entirely,
1753+
# Recommended practice is to disable server-side session caching entirely,
17541754
# if you are going to use client-side session tickets. Why? It
17551755
# reduces the number of places where a session's master secret are held
17561756
# in memory for "long" periods of time.

t/lib/ProFTPD/Tests/Modules/mod_proxy/tls/redis.pm

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -341,7 +341,7 @@ sub proxy_reverse_backend_tls_login_redis_cached_ticket {
341341
if (open(my $fh, ">> $config_file")) {
342342
print $fh <<EOC;
343343
<IfModule mod_tls.c>
344-
# Recommended practice is to diable server-side session caching entirely,
344+
# Recommended practice is to disable server-side session caching entirely,
345345
# if you are going to use client-side session tickets. Why? It
346346
# reduces the number of places where a session's master secret are held
347347
# in memory for "long" periods of time.

0 commit comments

Comments
 (0)