File: 01_spelling.patch

package info (click to toggle)
libapache2-mod-qos 11.36-1
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 2,500 kB
  • ctags: 2,814
  • sloc: ansic: 19,808; sh: 1,042; makefile: 52
file content (262 lines) | stat: -rw-r--r-- 16,046 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
Description: Spelling fixes from lintian
Author: Sergey B Kirpichev
Forwarded: no

---
 apache2/mod_qos.c      |   22 +++++++++++-----------
 tools/man1/qsfilter2.1 |    8 ++++----
 tools/man1/qslog.1     |    4 ++--
 tools/man1/qslogger.1  |    2 +-
 tools/src/qsfilter2.c  |    8 ++++----
 tools/src/qslog.c      |    4 ++--
 tools/src/qslogger.c   |    2 +-
 tools/src/qspng.c      |    2 +-
 8 files changed, 26 insertions(+), 26 deletions(-)

--- a/apache2/mod_qos.c
+++ b/apache2/mod_qos.c
@@ -3658,7 +3658,7 @@ static int qos_json(request_rec *r, qos_
 #endif
         data = copyq;
         if(strlen(data) != len) {
-          *msg = apr_pstrdup(r->pool, "null chracter within data structure in query");
+          *msg = apr_pstrdup(r->pool, "null character within data structure in query");
           return HTTP_BAD_REQUEST;
         }
       } else {
@@ -3671,7 +3671,7 @@ static int qos_json(request_rec *r, qos_
       apr_table_t *tl = apr_table_make(r->pool, 200);
       int rc;
       if(strlen(value) != len) {
-        *msg = apr_pstrdup(r->pool, "null chracter within data structure");
+        *msg = apr_pstrdup(r->pool, "null character within data structure");
         return HTTP_BAD_REQUEST;
       }
       rc = j_val(r->pool, &value, tl, "J", 0);
@@ -13360,7 +13360,7 @@ static const command_rec qos_config_cmds
   AP_INIT_TAKE1("QS_SrvMaxConnExcludeIP", qos_max_conn_ex_cmd, NULL,
                 RSRC_CONF,
                 "QS_SrvMaxConnExcludeIP <addr>, excludes an IP address or"
-                " address range from beeing limited."),
+                " address range from being limited."),
 
   AP_INIT_TAKE12("QS_SrvSerialize", qos_serialize_cmd, NULL,
                RSRC_CONF,
@@ -13380,14 +13380,14 @@ static const command_rec qos_config_cmds
   AP_INIT_TAKE12("QS_SrvRequestRate", qos_req_rate_cmd, NULL,
                  RSRC_CONF,
                  "QS_SrvRequestRate <bytes per seconds> [<max bytes per second>],"
-                 " defines the minumum upload"
+                 " defines the minimum upload"
                  " throughput a client must generate. See also QS_SrvMinDataRate."),
 
 #ifdef AP_TAKE_ARGV
   AP_INIT_TAKE_ARGV("QS_SrvMinDataRate", qos_min_rate_cmd, NULL,
                     RSRC_CONF,
                     "QS_SrvMinDataRate <bytes per seconds> [<max bytes per second> [<connections>]],"
-                    " defines the minumum upload/download"
+                    " defines the minimum upload/download"
                     " throughput a client must generate (the bytes send/received by the client"
                     " per seconds). This bandwidth is measured while transmitting the data"
                     " (request line, header fields, request body, or response data). The"
@@ -13409,7 +13409,7 @@ static const command_rec qos_config_cmds
   AP_INIT_TAKE2("QS_SrvMinDataRate", qos_min_rate_cmd, NULL,
                     RSRC_CONF,
                     "QS_SrvMinDataRate <bytes per seconds> [<max bytes per second>],"
-                    " defines the minumum upload/download"
+                    " defines the minimum upload/download"
                     " throughput a client must generate (the bytes send/received by the client"
                     " per seconds). This bandwidth is measured while transmitting the data"
                     " (request line, header fields, request body, or response data). The"
@@ -13665,7 +13665,7 @@ static const command_rec qos_config_cmds
                  " are set in the request environment variable list (not case"
                  " sensitive). This is used to combine multiple variables"
                  " to a new event type. Alternatively, a regular expression"
-                 " can be specifed for variable1's value and variable2 must be"
+                 " can be specified for variable1's value and variable2 must be"
                  " omitted in order to simply set a new variable if"
                  " the regular expression matches."),
 
@@ -13821,7 +13821,7 @@ static const command_rec qos_config_cmds
   AP_INIT_TAKE_ARGV("QS_ClientContentTypes", qos_client_contenttype, NULL,
                     RSRC_CONF,
                     "QS_ClientContentTypes <html> <css/js> <images> <other> <304>,"
-                    " defines the distribution of HTTP response content types a client normaly"
+                    " defines the distribution of HTTP response content types a client normally"
                     " receives when accessing the server. mod_qos normally learns the average"
                     " behavior automatically by default but you may specify a static configuration"
                     " in order to avoid influences by a high number of abnormal clients."),
@@ -13836,7 +13836,7 @@ static const command_rec qos_config_cmds
   AP_INIT_TAKE1("QS_ClientEventBlockExcludeIP", qos_client_ex_cmd, NULL,
                  RSRC_CONF,
                  "QS_ClientEventBlockExcludeIP <addr>, excludes an IP address or"
-                " address range from beeing limited by QS_ClientEventBlockCount."),
+                " address range from being limited by QS_ClientEventBlockCount."),
 
   AP_INIT_TAKE123("QS_ClientEventLimitCount", qos_client_limit_cmd, NULL,
                   RSRC_CONF,
@@ -13870,7 +13870,7 @@ static const command_rec qos_config_cmds
   AP_INIT_TAKE1("QS_ClientEventRequestLimit", qos_client_event_req_cmd, NULL,
                 RSRC_CONF,
                 "QS_ClientEventRequestLimit <number>, defines the allowed"
-                " number of concurrent requests comming from the same client"
+                " number of concurrent requests coming from the same client"
                 " source IP address"
                 " having the QS_EventRequest variable set."
                 " Directive is allowed in global server context only."),
@@ -13878,7 +13878,7 @@ static const command_rec qos_config_cmds
   AP_INIT_NO_ARGS("QS_ClientSerialize", qos_client_serial_cmd, NULL,
                   RSRC_CONF,
                   "QS_ClientSerialize, serializes requests having the "QS_SERIALIZE" variable"
-                  " set if they are comming from the same IP address."),
+                  " set if they are coming from the same IP address."),
 
   AP_INIT_TAKE1("QS_ClientIpFromHeader", qos_client_forwardedfor_cmd, NULL,
                 RSRC_CONF,
--- a/tools/src/qsfilter2.c
+++ b/tools/src/qsfilter2.c
@@ -376,7 +376,7 @@ static void usage(char *cmd, int man) {
   qs_man_print(man, " users or to protect the server from malicious patterns. The\n");
   qs_man_print(man, " QS_Permit* rules implement a positive security model (whitelist).\n");
   qs_man_print(man, " These directives are used to define allowed request line patterns.\n");
-  qs_man_print(man, " Request which do not match any of thses patterns are not allowed\n");
+  qs_man_print(man, " Request which do not match any of these patterns are not allowed\n");
   qs_man_print(man, " to access the server.\n");
   if(man) printf("\n\n");
   qs_man_print(man, " %s is an audit log analyzer used to generate filter\n", cmd);
@@ -448,7 +448,7 @@ static void usage(char *cmd, int man) {
   if(man) printf("\n.TP\n");
   qs_man_print(man, "  -p\n");
   if(man) printf("\n");
-  qs_man_print(man, "     Repesents query by pcre only (no literal strings).\n");
+  qs_man_print(man, "     Represents query by pcre only (no literal strings).\n");
   if(man) printf("\n.TP\n");
   qs_man_print(man, "  -s\n");
   if(man) printf("\n");
@@ -456,7 +456,7 @@ static void usage(char *cmd, int man) {
   if(man) printf("\n.TP\n");
   qs_man_print(man, "  -m\n");
   if(man) printf("\n");
-  qs_man_print(man, "     Uses one pcre for multipe query values (recommended mode).\n");
+  qs_man_print(man, "     Uses one pcre for multiple query values (recommended mode).\n");
   if(man) printf("\n.TP\n");
   qs_man_print(man, "  -o\n");
   if(man) printf("\n");
@@ -482,7 +482,7 @@ static void usage(char *cmd, int man) {
   if(man) printf("\n.TP\n");
   qs_man_print(man, "  -p\n");
   if(man) printf("\n");
-  qs_man_print(man, "     Repesents query by pcre only (no literal strings).\n");
+  qs_man_print(man, "     Represents query by pcre only (no literal strings).\n");
   qs_man_print(man, "     Determines the worst case performance for the generated whitelist\n");
   qs_man_print(man, "     by applying each rule for each request line (output is real time\n");
   qs_man_print(man, "     filter duration per request line in milliseconds).\n");
--- a/tools/src/qslog.c
+++ b/tools/src/qslog.c
@@ -1848,7 +1848,7 @@ static void usage(const char *cmd, int m
   qs_man_println(man, "  - number of requests within measured time (req)\n");
   qs_man_println(man, "  - bytes sent to the client per second ("NBS")\n");
   qs_man_println(man, "  - bytes received from the client per second ("NBIS")\n");
-  qs_man_println(man, "  - repsonse status codes within the last minute (1xx,2xx,3xx,4xx,5xx)\n");
+  qs_man_println(man, "  - response status codes within the last minute (1xx,2xx,3xx,4xx,5xx)\n");
   qs_man_println(man, "  - average response duration ("NAV")\n");
   qs_man_println(man, "  - average response duration in milliseconds ("NAVMS")\n");
   qs_man_println(man, "  - distribution of response durations within the last minute\n");
@@ -1876,7 +1876,7 @@ static void usage(const char *cmd, int m
   qs_man_print(man, "     Defines the log data format and the positions of data\n");
   qs_man_print(man, "     elements processed by this utility.\n");
   qs_man_print(man, "     See to the 'LogFormat' directive of the httpd.conf file\n");
-  qs_man_print(man, "     to see the format defintions of the servers access log data.\n");
+  qs_man_print(man, "     to see the format definitions of the servers access log data.\n");
   if(man) printf("\n");
   qs_man_println(man, "     %s knows the following elements:\n", cmd);
   qs_man_println(man, "     I defines the client ip address (%%h)\n");
--- a/tools/src/qslogger.c
+++ b/tools/src/qslogger.c
@@ -262,7 +262,7 @@ static void usage(const char *cmd, int m
   qs_man_print(man, "  -l <level>\n");
   if(man) printf("\n");
   qs_man_print(man, "     Defines the minimal severity a message must have in order to\n");
-  qs_man_print(man, "     be forwarded. Default is 'DEBUG' (fowarding everything).\n");
+  qs_man_print(man, "     be forwarded. Default is 'DEBUG' (forwarding everything).\n");
   if(man) printf("\n.TP\n");
   qs_man_print(man, "  -x <prefix>\n");
   if(man) printf("\n");
--- a/tools/src/qspng.c
+++ b/tools/src/qspng.c
@@ -80,7 +80,7 @@ static const qs_png_elt_t qs_png_elts[]
   { "qV", "created VIP sessions",  55, 50, 155 },
   { "qS", "session pass",          55, 75, 160 },
   { "qD", "access denied",         55, 70, 170 },
-  { "qK", "conection closed",      55, 60, 145 },
+  { "qK", "connection closed",      55, 60, 145 },
   { "qT", "dynamic keep-alive",    55, 55, 153 },
   { "qL", "slow down",             55, 65, 140 },
   { "qA", "connection aborts",     55, 50, 175 },
--- a/tools/man1/qsfilter2.1
+++ b/tools/man1/qsfilter2.1
@@ -5,7 +5,7 @@ qsfilter2 \- an utility to generate mod_
 .SH SYNOPSIS
 qsfilter2 \-i <path> [\-c <path>] [\-d <num>] [\-h] [\-b <num>] [\-p|\-s|\-m|\-o] [\-l <len>] [\-n] [\-e] [\-u 'uni'] [\-k <prefix>] [\-t] [\-f <path>] [\-v 0|1|2] 
 .SH DESCRIPTION
-mod_qos implements a request filter which validates each request line. The module supports both, negative and positive security model. The QS_Deny* directives are used to specify request line patterns which are not allowed to access the server (negative security model / blacklist). These rules are used to restrict access to certain resources which should not be available to users or to protect the server from malicious patterns. The QS_Permit* rules implement a positive security model (whitelist). These directives are used to define allowed request line patterns. Request which do not match any of thses patterns are not allowed to access the server. 
+mod_qos implements a request filter which validates each request line. The module supports both, negative and positive security model. The QS_Deny* directives are used to specify request line patterns which are not allowed to access the server (negative security model / blacklist). These rules are used to restrict access to certain resources which should not be available to users or to protect the server from malicious patterns. The QS_Permit* rules implement a positive security model (whitelist). These directives are used to define allowed request line patterns. Request which do not match any of these patterns are not allowed to access the server. 
 
 qsfilter2 is an audit log analyzer used to generate filter rules (perl compatible regular expressions) which may be used by mod_qos to deny access for suspect requests (QS_PermitUri rules). It parses existing audit log files in order to generate request patterns covering all allowed requests. 
 .SH OPTIONS
@@ -41,13 +41,13 @@ Always use a string representing the han
 Replaces url pattern by the regular expression when detecting a base64/hex encoded string. Detecting sensibility is defined by a numeric value. You should use values higher than 5 (default) or 0 to disable this function. 
 .TP
 \-p 
-Repesents query by pcre only (no literal strings). 
+Represents query by pcre only (no literal strings). 
 .TP
 \-s 
 Uses one single pcre for the whole query string. 
 .TP
 \-m 
-Uses one pcre for multipe query values (recommended mode). 
+Uses one pcre for multiple query values (recommended mode). 
 .TP
 \-o 
 Does not care the order of query parameters. 
@@ -65,7 +65,7 @@ Exit on error.
 Enables additional decoding methods. Use the same settings as you have used for the QS_Decoding directive. 
 .TP
 \-p 
-Repesents query by pcre only (no literal strings). Determines the worst case performance for the generated whitelist by applying each rule for each request line (output is real time filter duration per request line in milliseconds). 
+Represents query by pcre only (no literal strings). Determines the worst case performance for the generated whitelist by applying each rule for each request line (output is real time filter duration per request line in milliseconds). 
 .TP
 \-k <prefix> 
 Prefix used to generate rule identifiers (QSF by default). 
--- a/tools/man1/qslog.1
+++ b/tools/man1/qslog.1
@@ -10,7 +10,7 @@ qslog is a real time access log analyzer
   \- number of requests within measured time (req)
   \- bytes sent to the client per second (b/s)
   \- bytes received from the client per second (ib/s)
-  \- repsonse status codes within the last minute (1xx,2xx,3xx,4xx,5xx)
+  \- response status codes within the last minute (1xx,2xx,3xx,4xx,5xx)
   \- average response duration (av)
   \- average response duration in milliseconds (avms)
   \- distribution of response durations within the last minute
@@ -26,7 +26,7 @@ qv=VIP IP,qS=session pass, qD=access den
 .SH OPTIONS
 .TP
 \-f <format_string> 
-Defines the log data format and the positions of data elements processed by this utility. See to the 'LogFormat' directive of the httpd.conf file to see the format defintions of the servers access log data. 
+Defines the log data format and the positions of data elements processed by this utility. See to the 'LogFormat' directive of the httpd.conf file to see the format definitions of the servers access log data. 
      qslog knows the following elements:
      I defines the client ip address (%h)
      R defines the request line (%r)
--- a/tools/man1/qslogger.1
+++ b/tools/man1/qslogger.1
@@ -19,7 +19,7 @@ Defines the syslog facility. Default is
 Becomes another user, e.g. www\-data. 
 .TP
 \-l <level> 
-Defines the minimal severity a message must have in order to be forwarded. Default is 'DEBUG' (fowarding everything). 
+Defines the minimal severity a message must have in order to be forwarded. Default is 'DEBUG' (forwarding everything). 
 .TP
 \-x <prefix> 
 Allows you to add a prefix (literal string) to every message.