1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262
|
Description: Spelling fixes from lintian
Author: Sergey B Kirpichev
Forwarded: no
---
apache2/mod_qos.c | 22 +++++++++++-----------
tools/man1/qsfilter2.1 | 8 ++++----
tools/man1/qslog.1 | 4 ++--
tools/man1/qslogger.1 | 2 +-
tools/src/qsfilter2.c | 8 ++++----
tools/src/qslog.c | 4 ++--
tools/src/qslogger.c | 2 +-
tools/src/qspng.c | 2 +-
8 files changed, 26 insertions(+), 26 deletions(-)
--- a/apache2/mod_qos.c
+++ b/apache2/mod_qos.c
@@ -3658,7 +3658,7 @@ static int qos_json(request_rec *r, qos_
#endif
data = copyq;
if(strlen(data) != len) {
- *msg = apr_pstrdup(r->pool, "null chracter within data structure in query");
+ *msg = apr_pstrdup(r->pool, "null character within data structure in query");
return HTTP_BAD_REQUEST;
}
} else {
@@ -3671,7 +3671,7 @@ static int qos_json(request_rec *r, qos_
apr_table_t *tl = apr_table_make(r->pool, 200);
int rc;
if(strlen(value) != len) {
- *msg = apr_pstrdup(r->pool, "null chracter within data structure");
+ *msg = apr_pstrdup(r->pool, "null character within data structure");
return HTTP_BAD_REQUEST;
}
rc = j_val(r->pool, &value, tl, "J", 0);
@@ -13360,7 +13360,7 @@ static const command_rec qos_config_cmds
AP_INIT_TAKE1("QS_SrvMaxConnExcludeIP", qos_max_conn_ex_cmd, NULL,
RSRC_CONF,
"QS_SrvMaxConnExcludeIP <addr>, excludes an IP address or"
- " address range from beeing limited."),
+ " address range from being limited."),
AP_INIT_TAKE12("QS_SrvSerialize", qos_serialize_cmd, NULL,
RSRC_CONF,
@@ -13380,14 +13380,14 @@ static const command_rec qos_config_cmds
AP_INIT_TAKE12("QS_SrvRequestRate", qos_req_rate_cmd, NULL,
RSRC_CONF,
"QS_SrvRequestRate <bytes per seconds> [<max bytes per second>],"
- " defines the minumum upload"
+ " defines the minimum upload"
" throughput a client must generate. See also QS_SrvMinDataRate."),
#ifdef AP_TAKE_ARGV
AP_INIT_TAKE_ARGV("QS_SrvMinDataRate", qos_min_rate_cmd, NULL,
RSRC_CONF,
"QS_SrvMinDataRate <bytes per seconds> [<max bytes per second> [<connections>]],"
- " defines the minumum upload/download"
+ " defines the minimum upload/download"
" throughput a client must generate (the bytes send/received by the client"
" per seconds). This bandwidth is measured while transmitting the data"
" (request line, header fields, request body, or response data). The"
@@ -13409,7 +13409,7 @@ static const command_rec qos_config_cmds
AP_INIT_TAKE2("QS_SrvMinDataRate", qos_min_rate_cmd, NULL,
RSRC_CONF,
"QS_SrvMinDataRate <bytes per seconds> [<max bytes per second>],"
- " defines the minumum upload/download"
+ " defines the minimum upload/download"
" throughput a client must generate (the bytes send/received by the client"
" per seconds). This bandwidth is measured while transmitting the data"
" (request line, header fields, request body, or response data). The"
@@ -13665,7 +13665,7 @@ static const command_rec qos_config_cmds
" are set in the request environment variable list (not case"
" sensitive). This is used to combine multiple variables"
" to a new event type. Alternatively, a regular expression"
- " can be specifed for variable1's value and variable2 must be"
+ " can be specified for variable1's value and variable2 must be"
" omitted in order to simply set a new variable if"
" the regular expression matches."),
@@ -13821,7 +13821,7 @@ static const command_rec qos_config_cmds
AP_INIT_TAKE_ARGV("QS_ClientContentTypes", qos_client_contenttype, NULL,
RSRC_CONF,
"QS_ClientContentTypes <html> <css/js> <images> <other> <304>,"
- " defines the distribution of HTTP response content types a client normaly"
+ " defines the distribution of HTTP response content types a client normally"
" receives when accessing the server. mod_qos normally learns the average"
" behavior automatically by default but you may specify a static configuration"
" in order to avoid influences by a high number of abnormal clients."),
@@ -13836,7 +13836,7 @@ static const command_rec qos_config_cmds
AP_INIT_TAKE1("QS_ClientEventBlockExcludeIP", qos_client_ex_cmd, NULL,
RSRC_CONF,
"QS_ClientEventBlockExcludeIP <addr>, excludes an IP address or"
- " address range from beeing limited by QS_ClientEventBlockCount."),
+ " address range from being limited by QS_ClientEventBlockCount."),
AP_INIT_TAKE123("QS_ClientEventLimitCount", qos_client_limit_cmd, NULL,
RSRC_CONF,
@@ -13870,7 +13870,7 @@ static const command_rec qos_config_cmds
AP_INIT_TAKE1("QS_ClientEventRequestLimit", qos_client_event_req_cmd, NULL,
RSRC_CONF,
"QS_ClientEventRequestLimit <number>, defines the allowed"
- " number of concurrent requests comming from the same client"
+ " number of concurrent requests coming from the same client"
" source IP address"
" having the QS_EventRequest variable set."
" Directive is allowed in global server context only."),
@@ -13878,7 +13878,7 @@ static const command_rec qos_config_cmds
AP_INIT_NO_ARGS("QS_ClientSerialize", qos_client_serial_cmd, NULL,
RSRC_CONF,
"QS_ClientSerialize, serializes requests having the "QS_SERIALIZE" variable"
- " set if they are comming from the same IP address."),
+ " set if they are coming from the same IP address."),
AP_INIT_TAKE1("QS_ClientIpFromHeader", qos_client_forwardedfor_cmd, NULL,
RSRC_CONF,
--- a/tools/src/qsfilter2.c
+++ b/tools/src/qsfilter2.c
@@ -376,7 +376,7 @@ static void usage(char *cmd, int man) {
qs_man_print(man, " users or to protect the server from malicious patterns. The\n");
qs_man_print(man, " QS_Permit* rules implement a positive security model (whitelist).\n");
qs_man_print(man, " These directives are used to define allowed request line patterns.\n");
- qs_man_print(man, " Request which do not match any of thses patterns are not allowed\n");
+ qs_man_print(man, " Request which do not match any of these patterns are not allowed\n");
qs_man_print(man, " to access the server.\n");
if(man) printf("\n\n");
qs_man_print(man, " %s is an audit log analyzer used to generate filter\n", cmd);
@@ -448,7 +448,7 @@ static void usage(char *cmd, int man) {
if(man) printf("\n.TP\n");
qs_man_print(man, " -p\n");
if(man) printf("\n");
- qs_man_print(man, " Repesents query by pcre only (no literal strings).\n");
+ qs_man_print(man, " Represents query by pcre only (no literal strings).\n");
if(man) printf("\n.TP\n");
qs_man_print(man, " -s\n");
if(man) printf("\n");
@@ -456,7 +456,7 @@ static void usage(char *cmd, int man) {
if(man) printf("\n.TP\n");
qs_man_print(man, " -m\n");
if(man) printf("\n");
- qs_man_print(man, " Uses one pcre for multipe query values (recommended mode).\n");
+ qs_man_print(man, " Uses one pcre for multiple query values (recommended mode).\n");
if(man) printf("\n.TP\n");
qs_man_print(man, " -o\n");
if(man) printf("\n");
@@ -482,7 +482,7 @@ static void usage(char *cmd, int man) {
if(man) printf("\n.TP\n");
qs_man_print(man, " -p\n");
if(man) printf("\n");
- qs_man_print(man, " Repesents query by pcre only (no literal strings).\n");
+ qs_man_print(man, " Represents query by pcre only (no literal strings).\n");
qs_man_print(man, " Determines the worst case performance for the generated whitelist\n");
qs_man_print(man, " by applying each rule for each request line (output is real time\n");
qs_man_print(man, " filter duration per request line in milliseconds).\n");
--- a/tools/src/qslog.c
+++ b/tools/src/qslog.c
@@ -1848,7 +1848,7 @@ static void usage(const char *cmd, int m
qs_man_println(man, " - number of requests within measured time (req)\n");
qs_man_println(man, " - bytes sent to the client per second ("NBS")\n");
qs_man_println(man, " - bytes received from the client per second ("NBIS")\n");
- qs_man_println(man, " - repsonse status codes within the last minute (1xx,2xx,3xx,4xx,5xx)\n");
+ qs_man_println(man, " - response status codes within the last minute (1xx,2xx,3xx,4xx,5xx)\n");
qs_man_println(man, " - average response duration ("NAV")\n");
qs_man_println(man, " - average response duration in milliseconds ("NAVMS")\n");
qs_man_println(man, " - distribution of response durations within the last minute\n");
@@ -1876,7 +1876,7 @@ static void usage(const char *cmd, int m
qs_man_print(man, " Defines the log data format and the positions of data\n");
qs_man_print(man, " elements processed by this utility.\n");
qs_man_print(man, " See to the 'LogFormat' directive of the httpd.conf file\n");
- qs_man_print(man, " to see the format defintions of the servers access log data.\n");
+ qs_man_print(man, " to see the format definitions of the servers access log data.\n");
if(man) printf("\n");
qs_man_println(man, " %s knows the following elements:\n", cmd);
qs_man_println(man, " I defines the client ip address (%%h)\n");
--- a/tools/src/qslogger.c
+++ b/tools/src/qslogger.c
@@ -262,7 +262,7 @@ static void usage(const char *cmd, int m
qs_man_print(man, " -l <level>\n");
if(man) printf("\n");
qs_man_print(man, " Defines the minimal severity a message must have in order to\n");
- qs_man_print(man, " be forwarded. Default is 'DEBUG' (fowarding everything).\n");
+ qs_man_print(man, " be forwarded. Default is 'DEBUG' (forwarding everything).\n");
if(man) printf("\n.TP\n");
qs_man_print(man, " -x <prefix>\n");
if(man) printf("\n");
--- a/tools/src/qspng.c
+++ b/tools/src/qspng.c
@@ -80,7 +80,7 @@ static const qs_png_elt_t qs_png_elts[]
{ "qV", "created VIP sessions", 55, 50, 155 },
{ "qS", "session pass", 55, 75, 160 },
{ "qD", "access denied", 55, 70, 170 },
- { "qK", "conection closed", 55, 60, 145 },
+ { "qK", "connection closed", 55, 60, 145 },
{ "qT", "dynamic keep-alive", 55, 55, 153 },
{ "qL", "slow down", 55, 65, 140 },
{ "qA", "connection aborts", 55, 50, 175 },
--- a/tools/man1/qsfilter2.1
+++ b/tools/man1/qsfilter2.1
@@ -5,7 +5,7 @@ qsfilter2 \- an utility to generate mod_
.SH SYNOPSIS
qsfilter2 \-i <path> [\-c <path>] [\-d <num>] [\-h] [\-b <num>] [\-p|\-s|\-m|\-o] [\-l <len>] [\-n] [\-e] [\-u 'uni'] [\-k <prefix>] [\-t] [\-f <path>] [\-v 0|1|2]
.SH DESCRIPTION
-mod_qos implements a request filter which validates each request line. The module supports both, negative and positive security model. The QS_Deny* directives are used to specify request line patterns which are not allowed to access the server (negative security model / blacklist). These rules are used to restrict access to certain resources which should not be available to users or to protect the server from malicious patterns. The QS_Permit* rules implement a positive security model (whitelist). These directives are used to define allowed request line patterns. Request which do not match any of thses patterns are not allowed to access the server.
+mod_qos implements a request filter which validates each request line. The module supports both, negative and positive security model. The QS_Deny* directives are used to specify request line patterns which are not allowed to access the server (negative security model / blacklist). These rules are used to restrict access to certain resources which should not be available to users or to protect the server from malicious patterns. The QS_Permit* rules implement a positive security model (whitelist). These directives are used to define allowed request line patterns. Request which do not match any of these patterns are not allowed to access the server.
qsfilter2 is an audit log analyzer used to generate filter rules (perl compatible regular expressions) which may be used by mod_qos to deny access for suspect requests (QS_PermitUri rules). It parses existing audit log files in order to generate request patterns covering all allowed requests.
.SH OPTIONS
@@ -41,13 +41,13 @@ Always use a string representing the han
Replaces url pattern by the regular expression when detecting a base64/hex encoded string. Detecting sensibility is defined by a numeric value. You should use values higher than 5 (default) or 0 to disable this function.
.TP
\-p
-Repesents query by pcre only (no literal strings).
+Represents query by pcre only (no literal strings).
.TP
\-s
Uses one single pcre for the whole query string.
.TP
\-m
-Uses one pcre for multipe query values (recommended mode).
+Uses one pcre for multiple query values (recommended mode).
.TP
\-o
Does not care the order of query parameters.
@@ -65,7 +65,7 @@ Exit on error.
Enables additional decoding methods. Use the same settings as you have used for the QS_Decoding directive.
.TP
\-p
-Repesents query by pcre only (no literal strings). Determines the worst case performance for the generated whitelist by applying each rule for each request line (output is real time filter duration per request line in milliseconds).
+Represents query by pcre only (no literal strings). Determines the worst case performance for the generated whitelist by applying each rule for each request line (output is real time filter duration per request line in milliseconds).
.TP
\-k <prefix>
Prefix used to generate rule identifiers (QSF by default).
--- a/tools/man1/qslog.1
+++ b/tools/man1/qslog.1
@@ -10,7 +10,7 @@ qslog is a real time access log analyzer
\- number of requests within measured time (req)
\- bytes sent to the client per second (b/s)
\- bytes received from the client per second (ib/s)
- \- repsonse status codes within the last minute (1xx,2xx,3xx,4xx,5xx)
+ \- response status codes within the last minute (1xx,2xx,3xx,4xx,5xx)
\- average response duration (av)
\- average response duration in milliseconds (avms)
\- distribution of response durations within the last minute
@@ -26,7 +26,7 @@ qv=VIP IP,qS=session pass, qD=access den
.SH OPTIONS
.TP
\-f <format_string>
-Defines the log data format and the positions of data elements processed by this utility. See to the 'LogFormat' directive of the httpd.conf file to see the format defintions of the servers access log data.
+Defines the log data format and the positions of data elements processed by this utility. See to the 'LogFormat' directive of the httpd.conf file to see the format definitions of the servers access log data.
qslog knows the following elements:
I defines the client ip address (%h)
R defines the request line (%r)
--- a/tools/man1/qslogger.1
+++ b/tools/man1/qslogger.1
@@ -19,7 +19,7 @@ Defines the syslog facility. Default is
Becomes another user, e.g. www\-data.
.TP
\-l <level>
-Defines the minimal severity a message must have in order to be forwarded. Default is 'DEBUG' (fowarding everything).
+Defines the minimal severity a message must have in order to be forwarded. Default is 'DEBUG' (forwarding everything).
.TP
\-x <prefix>
Allows you to add a prefix (literal string) to every message.
|