5
0
mirror of git://git.proxmox.com/git/pve-firewall.git synced 2025-01-09 01:18:04 +03:00

various typo fixes

Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
This commit is contained in:
Thomas Lamprecht 2020-09-18 16:37:06 +02:00
parent 72194c7c6e
commit e1bfce947d
2 changed files with 10 additions and 10 deletions

View File

@ -213,7 +213,7 @@ my $pve_fw_macros = {
{ action => 'PARAM', proto => 'udp', dport => '6881' },
],
'Ceph' => [
"Ceph Storage Cluster traffic (Ceph Monitors, OSD & MDS Deamons)",
"Ceph Storage Cluster traffic (Ceph Monitors, OSD & MDS Daemons)",
# Legacy port for protocol v1
{ action => 'PARAM', proto => 'tcp', dport => '6789' },
# New port for protocol v2
@ -276,7 +276,7 @@ my $pve_fw_macros = {
{ action => 'PARAM', proto => 'tcp', dport => '9418' },
],
'HKP' => [
"OpenPGP HTTP keyserver protocol traffic",
"OpenPGP HTTP key server protocol traffic",
{ action => 'PARAM', proto => 'tcp', dport => '11371' },
],
'HTTP' => [
@ -636,7 +636,7 @@ $pve_std_chains_conf->{4} = {
],
'PVEFW-tcpflags' => [
# same as shorewall tcpflags action.
# Packets arriving on this interface are checked for som illegal combinations of TCP flags
# Packets arriving on this interface are checked for some illegal combinations of TCP flags
{ match => '-p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG', target => '-g PVEFW-logflags' },
{ match => '-p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE', target => '-g PVEFW-logflags' },
{ match => '-p tcp -m tcp --tcp-flags SYN,RST SYN,RST', target => '-g PVEFW-logflags' },
@ -729,7 +729,7 @@ $pve_std_chains_conf->{6} = {
],
'PVEFW-tcpflags' => [
# same as shorewall tcpflags action.
# Packets arriving on this interface are checked for som illegal combinations of TCP flags
# Packets arriving on this interface are checked for some illegal combinations of TCP flags
{ match => '-p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG', target => '-g PVEFW-logflags' },
{ match => '-p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE', target => '-g PVEFW-logflags' },
{ match => '-p tcp -m tcp --tcp-flags SYN,RST SYN,RST', target => '-g PVEFW-logflags' },
@ -1609,7 +1609,7 @@ sub verify_rule {
my $set_ip_version = sub {
my $vers = shift;
if ($vers) {
die "detected mixed ipv4/ipv6 adresses in rule\n"
die "detected mixed ipv4/ipv6 addresses in rule\n"
if $ipversion && ($vers != $ipversion);
$ipversion = $vers;
}
@ -1999,7 +1999,7 @@ sub ebtables_get_chains {
return $res;
}
# substitude action of rule according to action hash
# substitute action of rule according to action hash
sub rule_substitude_action {
my ($rule, $actions) = @_;
@ -3857,7 +3857,7 @@ sub compile_ipsets {
return if !$vmfw_conf;
# When the 'ipfilter' option is enabled every device for which there
# is no 'ipfilter-netX' ipset defiend gets an implicit empty default
# is no 'ipfilter-netX' ipset defined gets an implicit empty default
# ipset.
# The reason is that ipfilter ipsets are always filled with standard
# IPv6 link-local filters.
@ -3896,7 +3896,7 @@ sub compile_ipsets {
return if !$vmfw_conf;
# When the 'ipfilter' option is enabled every device for which there
# is no 'ipfilter-netX' ipset defiend gets an implicit empty default
# is no 'ipfilter-netX' ipset defined gets an implicit empty default
# ipset.
# The reason is that ipfilter ipsets are always filled with standard
# IPv6 link-local filters, as well as the IP addresses configured

View File

@ -1035,11 +1035,11 @@ main(int argc, char *argv[])
for (int i = 10; i >= 0; i--) {
if (flock(lockfd, LOCK_EX|LOCK_NB) != 0) {
if (!i) {
fprintf(stderr, "unable to aquire lock '%s': %s\n", LOCKFILE, strerror (errno));
fprintf(stderr, "unable to acquire lock '%s': %s\n", LOCKFILE, strerror (errno));
exit(-1);
}
if (i == 10)
fprintf(stderr, "unable to aquire lock '%s' - trying again.\n", LOCKFILE);
fprintf(stderr, "unable to acquire lock '%s' - trying again.\n", LOCKFILE);
sleep(1);
}