mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 06:38:20 +00:00
Spelling fixes: scripts
* accessing * across * adding * additional * addresses * afterwards * analyzer * ancillary * answer * associated * attempts * because * belonging * buffer * cleanup * committed * connects * database * destination * destroy * distinguished * encoded * entries * entry * hopefully * image * include * incorrect * information * initial * initiate * interval * into * java * negotiation * nodes * nonexistent * ntlm * occasional * omitted * otherwise * ourselves * paragraphs * particular * perform * received * receiver * referring * release * repetitions * request * responded * retrieval * running * search * separate * separator * should * synchronization * target * that * the * threshold * timeout * transaction * transferred * transmission * triggered * vetoes * virtual Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
This commit is contained in:
parent
5aa7d80e88
commit
21e0d777b3
52 changed files with 93 additions and 93 deletions
|
@ -71,7 +71,7 @@ event Control::configuration_update_request()
|
|||
|
||||
# Don't need to do anything in particular here, it's just indicating that
|
||||
# the configuration is going to be updated. This event could be handled
|
||||
# by other scripts if they need to do some ancilliary processing if
|
||||
# by other scripts if they need to do some ancillary processing if
|
||||
# redef-able consts are modified at runtime.
|
||||
event Control::configuration_update_response();
|
||||
}
|
||||
|
|
|
@ -169,7 +169,7 @@ export {
|
|||
|
||||
## Response to a :zeek:see:`Management::Agent::API::restart_request`
|
||||
## event. The agent sends this back to the controller when the
|
||||
## Supervisor has restarted all nodes affected, or a timoeut occurs.
|
||||
## Supervisor has restarted all nodes affected, or a timeout occurs.
|
||||
##
|
||||
## reqid: the request identifier used in the request event.
|
||||
##
|
||||
|
|
|
@ -49,7 +49,7 @@ export {
|
|||
requests: set[string] &default=set();
|
||||
};
|
||||
|
||||
## Request state for restart requests, tracking eceived responses.
|
||||
## Request state for restart requests, tracking received responses.
|
||||
type RestartState: record {
|
||||
## Request state for every node the agent asks the Supervisor
|
||||
## to restart.
|
||||
|
@ -820,7 +820,7 @@ event Management::Agent::API::node_dispatch_request(reqid: string, action: vecto
|
|||
res = Management::Result($reqid=reqid,
|
||||
$instance = Management::Agent::get_name(),
|
||||
$success = F,
|
||||
$error = fmt("cluster node %s not in runnning state", node),
|
||||
$error = fmt("cluster node %s not in running state", node),
|
||||
$node=node);
|
||||
req$results += res;
|
||||
}
|
||||
|
|
|
@ -17,12 +17,12 @@ export {
|
|||
## running.
|
||||
const role = Management::NONE &redef;
|
||||
|
||||
## The fallback listen address if more specific adddresses, such as
|
||||
## The fallback listen address if more specific addresses, such as
|
||||
## the controller's :zeek:see:`Management::Controller::listen_address`
|
||||
## remains empty. Unless redefined, this listens on all interfaces.
|
||||
const default_address = "0.0.0.0" &redef;
|
||||
|
||||
## The retry interval for Broker connnects. Defaults to a more
|
||||
## The retry interval for Broker connects. Defaults to a more
|
||||
## aggressive value compared to Broker's 30s.
|
||||
const connect_retry = 1sec &redef;
|
||||
|
||||
|
|
|
@ -851,7 +851,7 @@ event Management::Agent::API::deploy_response(reqid: string, results: Management
|
|||
delete req$deploy_state$requests[areq$id];
|
||||
|
||||
# If there are any pending requests to the agents, we're
|
||||
# done: we respond once every agent has responed (or we time out).
|
||||
# done: we respond once every agent has responded (or we time out).
|
||||
if ( |req$deploy_state$requests| > 0 )
|
||||
return;
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@ export {
|
|||
## :zeek:see:`Management::Request::finish` clears the state when
|
||||
## a corresponding response event comes in, or the state times out.
|
||||
type Request: record {
|
||||
## Each request has a hopfully unique ID provided by the requester.
|
||||
## Each request has a hopefully unique ID provided by the requester.
|
||||
id: string;
|
||||
|
||||
## For requests that result based upon another request (such as when
|
||||
|
@ -51,7 +51,7 @@ export {
|
|||
## ensure response to the client.
|
||||
const timeout_interval = 10sec &redef;
|
||||
|
||||
## A token request that serves as a null/nonexistant request.
|
||||
## A token request that serves as a null/nonexistent request.
|
||||
global null_req = Request($id="", $finished=T);
|
||||
|
||||
## This function establishes request state.
|
||||
|
@ -71,7 +71,7 @@ export {
|
|||
## its internal state. When the request does not exist, this does
|
||||
## nothing.
|
||||
##
|
||||
## reqid: the ID of the request state to releaase.
|
||||
## reqid: the ID of the request state to release.
|
||||
##
|
||||
global finish: function(reqid: string): bool;
|
||||
|
||||
|
|
|
@ -51,7 +51,7 @@ export {
|
|||
|
||||
## The record type that is used for representing and logging
|
||||
type CatchReleaseInfo: record {
|
||||
## The absolute time indicating when the action for this log-line occured.
|
||||
## The absolute time indicating when the action for this log-line occurred.
|
||||
ts: time &log;
|
||||
## The rule id that this log line refers to.
|
||||
rule_id: string &log &optional;
|
||||
|
@ -59,7 +59,7 @@ export {
|
|||
ip: addr &log;
|
||||
## The action that was taken in this log-line.
|
||||
action: CatchReleaseActions &log;
|
||||
## The current block_interaval (for how long the address is blocked).
|
||||
## The current block_interval (for how long the address is blocked).
|
||||
block_interval: interval &log &optional;
|
||||
## The current watch_interval (for how long the address will be watched and re-block if it reappears).
|
||||
watch_interval: interval &log &optional;
|
||||
|
|
|
@ -17,7 +17,7 @@ export {
|
|||
}
|
||||
|
||||
# This is inefficient; however, since this script only executes once on
|
||||
# startup, this shold be ok.
|
||||
# startup, this should be ok.
|
||||
function get_indent(level: count): string
|
||||
{
|
||||
local out = "";
|
||||
|
|
|
@ -53,7 +53,7 @@ event http_message_done(c: connection, is_orig: bool, stat: http_message_stat)
|
|||
# If a Flash was detected, it has to be logged considering the user agent.
|
||||
if ( is_orig && c$http?$flash_version )
|
||||
{
|
||||
# AdobeAIR contains a seperate Flash, which should be emphasized.
|
||||
# AdobeAIR contains a separate Flash, which should be emphasized.
|
||||
# Note: We assume that the user agent header was not reset by the app.
|
||||
if( c$http?$user_agent )
|
||||
{
|
||||
|
|
|
@ -33,7 +33,7 @@ export {
|
|||
## keys: key material
|
||||
global add_keys: event(client_random: string, keys: string);
|
||||
|
||||
## This event can be triggered, e.g., via Broker to add known secrets to the TLS secret datbase.
|
||||
## This event can be triggered, e.g., via Broker to add known secrets to the TLS secret database.
|
||||
##
|
||||
## client_random: client random for which the secret is set
|
||||
##
|
||||
|
|
|
@ -18,7 +18,7 @@ export {
|
|||
};
|
||||
}
|
||||
|
||||
# Do not disable analyzers after detection - otherwhise we will not notice
|
||||
# Do not disable analyzers after detection - otherwise we will not notice
|
||||
# encrypted attacks.
|
||||
redef SSL::disable_analyzer_after_detection=F;
|
||||
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
@load base/files/x509
|
||||
|
||||
redef record X509::Info += {
|
||||
## Base64 endoded X.509 certificate.
|
||||
## Base64 encoded X.509 certificate.
|
||||
cert: string &log &optional;
|
||||
};
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
##! Perform validation of stapled OCSP responses.
|
||||
#!
|
||||
#! Note: this _only_ performs validation of stapled OCSP responsed. It does
|
||||
#! Note: this _only_ performs validation of stapled OCSP responded. It does
|
||||
#! not validate OCSP responses that are retrieved via HTTP, because we do not
|
||||
#! have a mapping to certificates.
|
||||
|
||||
|
|
|
@ -30,7 +30,7 @@ export {
|
|||
## Warn if the DH key length is smaller than the certificate key length. This is
|
||||
## potentially unsafe because it gives a wrong impression of safety due to the
|
||||
## certificate key length. However, it is very common and cannot be avoided in some
|
||||
## settings (e.g. with old jave clients).
|
||||
## settings (e.g. with old java clients).
|
||||
option notify_dh_length_shorter_cert_length = T;
|
||||
|
||||
## Warn if a server negotiates a SSL session with a protocol version smaller than
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue