Spelling fixes: scripts

* accessing
* across
* adding
* additional
* addresses
* afterwards
* analyzer
* ancillary
* answer
* associated
* attempts
* because
* belonging
* buffer
* cleanup
* committed
* connects
* database
* destination
* destroy
* distinguished
* encoded
* entries
* entry
* hopefully
* image
* include
* incorrect
* information
* initial
* initiate
* interval
* into
* java
* negotiation
* nodes
* nonexistent
* ntlm
* occasional
* omitted
* otherwise
* ourselves
* paragraphs
* particular
* perform
* received
* receiver
* referring
* release
* repetitions
* request
* responded
* retrieval
* running
* search
* separate
* separator
* should
* synchronization
* target
* that
* the
* threshold
* timeout
* transaction
* transferred
* transmission
* triggered
* vetoes
* virtual

Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
This commit is contained in:
Josh Soref 2022-10-23 16:00:49 -04:00
parent 5aa7d80e88
commit 21e0d777b3
52 changed files with 93 additions and 93 deletions

View file

@ -71,7 +71,7 @@ event Control::configuration_update_request()
# Don't need to do anything in particular here, it's just indicating that
# the configuration is going to be updated. This event could be handled
# by other scripts if they need to do some ancilliary processing if
# by other scripts if they need to do some ancillary processing if
# redef-able consts are modified at runtime.
event Control::configuration_update_response();
}

View file

@ -169,7 +169,7 @@ export {
## Response to a :zeek:see:`Management::Agent::API::restart_request`
## event. The agent sends this back to the controller when the
## Supervisor has restarted all nodes affected, or a timoeut occurs.
## Supervisor has restarted all nodes affected, or a timeout occurs.
##
## reqid: the request identifier used in the request event.
##

View file

@ -49,7 +49,7 @@ export {
requests: set[string] &default=set();
};
## Request state for restart requests, tracking eceived responses.
## Request state for restart requests, tracking received responses.
type RestartState: record {
## Request state for every node the agent asks the Supervisor
## to restart.
@ -820,7 +820,7 @@ event Management::Agent::API::node_dispatch_request(reqid: string, action: vecto
res = Management::Result($reqid=reqid,
$instance = Management::Agent::get_name(),
$success = F,
$error = fmt("cluster node %s not in runnning state", node),
$error = fmt("cluster node %s not in running state", node),
$node=node);
req$results += res;
}

View file

@ -17,12 +17,12 @@ export {
## running.
const role = Management::NONE &redef;
## The fallback listen address if more specific adddresses, such as
## The fallback listen address if more specific addresses, such as
## the controller's :zeek:see:`Management::Controller::listen_address`
## remains empty. Unless redefined, this listens on all interfaces.
const default_address = "0.0.0.0" &redef;
## The retry interval for Broker connnects. Defaults to a more
## The retry interval for Broker connects. Defaults to a more
## aggressive value compared to Broker's 30s.
const connect_retry = 1sec &redef;

View file

@ -851,7 +851,7 @@ event Management::Agent::API::deploy_response(reqid: string, results: Management
delete req$deploy_state$requests[areq$id];
# If there are any pending requests to the agents, we're
# done: we respond once every agent has responed (or we time out).
# done: we respond once every agent has responded (or we time out).
if ( |req$deploy_state$requests| > 0 )
return;

View file

@ -15,7 +15,7 @@ export {
## :zeek:see:`Management::Request::finish` clears the state when
## a corresponding response event comes in, or the state times out.
type Request: record {
## Each request has a hopfully unique ID provided by the requester.
## Each request has a hopefully unique ID provided by the requester.
id: string;
## For requests that result based upon another request (such as when
@ -51,7 +51,7 @@ export {
## ensure response to the client.
const timeout_interval = 10sec &redef;
## A token request that serves as a null/nonexistant request.
## A token request that serves as a null/nonexistent request.
global null_req = Request($id="", $finished=T);
## This function establishes request state.
@ -71,7 +71,7 @@ export {
## its internal state. When the request does not exist, this does
## nothing.
##
## reqid: the ID of the request state to releaase.
## reqid: the ID of the request state to release.
##
global finish: function(reqid: string): bool;

View file

@ -51,7 +51,7 @@ export {
## The record type that is used for representing and logging
type CatchReleaseInfo: record {
## The absolute time indicating when the action for this log-line occured.
## The absolute time indicating when the action for this log-line occurred.
ts: time &log;
## The rule id that this log line refers to.
rule_id: string &log &optional;
@ -59,7 +59,7 @@ export {
ip: addr &log;
## The action that was taken in this log-line.
action: CatchReleaseActions &log;
## The current block_interaval (for how long the address is blocked).
## The current block_interval (for how long the address is blocked).
block_interval: interval &log &optional;
## The current watch_interval (for how long the address will be watched and re-block if it reappears).
watch_interval: interval &log &optional;

View file

@ -17,7 +17,7 @@ export {
}
# This is inefficient; however, since this script only executes once on
# startup, this shold be ok.
# startup, this should be ok.
function get_indent(level: count): string
{
local out = "";

View file

@ -53,7 +53,7 @@ event http_message_done(c: connection, is_orig: bool, stat: http_message_stat)
# If a Flash was detected, it has to be logged considering the user agent.
if ( is_orig && c$http?$flash_version )
{
# AdobeAIR contains a seperate Flash, which should be emphasized.
# AdobeAIR contains a separate Flash, which should be emphasized.
# Note: We assume that the user agent header was not reset by the app.
if( c$http?$user_agent )
{

View file

@ -33,7 +33,7 @@ export {
## keys: key material
global add_keys: event(client_random: string, keys: string);
## This event can be triggered, e.g., via Broker to add known secrets to the TLS secret datbase.
## This event can be triggered, e.g., via Broker to add known secrets to the TLS secret database.
##
## client_random: client random for which the secret is set
##

View file

@ -18,7 +18,7 @@ export {
};
}
# Do not disable analyzers after detection - otherwhise we will not notice
# Do not disable analyzers after detection - otherwise we will not notice
# encrypted attacks.
redef SSL::disable_analyzer_after_detection=F;

View file

@ -6,7 +6,7 @@
@load base/files/x509
redef record X509::Info += {
## Base64 endoded X.509 certificate.
## Base64 encoded X.509 certificate.
cert: string &log &optional;
};

View file

@ -1,6 +1,6 @@
##! Perform validation of stapled OCSP responses.
#!
#! Note: this _only_ performs validation of stapled OCSP responsed. It does
#! Note: this _only_ performs validation of stapled OCSP responded. It does
#! not validate OCSP responses that are retrieved via HTTP, because we do not
#! have a mapping to certificates.

View file

@ -30,7 +30,7 @@ export {
## Warn if the DH key length is smaller than the certificate key length. This is
## potentially unsafe because it gives a wrong impression of safety due to the
## certificate key length. However, it is very common and cannot be avoided in some
## settings (e.g. with old jave clients).
## settings (e.g. with old java clients).
option notify_dh_length_shorter_cert_length = T;
## Warn if a server negotiates a SSL session with a protocol version smaller than