From: Josh Soref <2119212+jsoref@users.noreply.github.com> Date: Fri, 22 Jul 2022 05:54:46 +0000 (-0400) Subject: spelling: nonexistent X-Git-Tag: dnsdist-1.8.0-rc3~10^2~16 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=e746a2f6d9e8719c5d830b5ba8a6faecaaa3e19c;p=thirdparty%2Fpdns.git spelling: nonexistent Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com> --- diff --git a/docs/changelog/pre-4.0.rst b/docs/changelog/pre-4.0.rst index b0d26f78b8..d552634c21 100644 --- a/docs/changelog/pre-4.0.rst +++ b/docs/changelog/pre-4.0.rst @@ -5246,7 +5246,7 @@ Changes ^^^^^^^ - The monitor command **set** no longer allows the changing of - non-existent variables. + nonexistent variables. - IBM Universal Database DB2 backend now included in source distribution (untested!) - Oracle backend now included in source distribution (slightly tested!) diff --git a/pdns/auth-main.cc b/pdns/auth-main.cc index 0282498018..0eb9bfb1ec 100644 --- a/pdns/auth-main.cc +++ b/pdns/auth-main.cc @@ -489,7 +489,7 @@ static void declareStats() S.declare( "xfr-queue", "Size of the queue of zones to be XFRd", [](const string&) { return Communicator.getSuckRequestsWaiting(); }, StatType::gauge); S.declareDNSNameQTypeRing("queries", "UDP Queries Received"); - S.declareDNSNameQTypeRing("nxdomain-queries", "Queries for non-existent records within existent zones"); + S.declareDNSNameQTypeRing("nxdomain-queries", "Queries for nonexistent records within existent zones"); S.declareDNSNameQTypeRing("noerror-queries", "Queries for existing records, but for type we don't have"); S.declareDNSNameQTypeRing("servfail-queries", "Queries that could not be answered due to backend errors"); S.declareDNSNameQTypeRing("unauth-queries", "Queries for zones that we are not authoritative for"); diff --git a/pdns/recursordist/docs/changelog/pre-4.0.rst b/pdns/recursordist/docs/changelog/pre-4.0.rst index 9ecf0dd539..096ce635b4 100644 --- a/pdns/recursordist/docs/changelog/pre-4.0.rst +++ b/pdns/recursordist/docs/changelog/pre-4.0.rst @@ -1018,7 +1018,7 @@ Changes between RC2 and -release - 'Make install' when an existing configuration file contained a 'fork' statement has been fixed. Spotted by Darren Gamble, code in `commit 1534 `__. -- Reloading a non-existent allow-from-file caused the control thread to +- Reloading a nonexistent allow-from-file caused the control thread to stop working. Spotted by Imre Gergely, code in `commit 1532 `__. - Parser got confused by reading en empty line in auth-forward-zones. diff --git a/pdns/recursordist/nod.cc b/pdns/recursordist/nod.cc index 9c41df5907..f2f064f2be 100644 --- a/pdns/recursordist/nod.cc +++ b/pdns/recursordist/nod.cc @@ -120,7 +120,7 @@ void PersistentSBF::setCacheDir(const std::string& cachedir) if (!d_init) { filesystem::path p(cachedir); if (!exists(p)) - throw PDNSException("NODDB setCacheDir specified non-existent directory: " + cachedir); + throw PDNSException("NODDB setCacheDir specified nonexistent directory: " + cachedir); else if (!is_directory(p)) throw PDNSException("NODDB setCacheDir specified a file not a directory: " + cachedir); d_cachedir = cachedir; diff --git a/pdns/statbag.hh b/pdns/statbag.hh index ee794c1a9d..7836e3c950 100644 --- a/pdns/statbag.hh +++ b/pdns/statbag.hh @@ -98,7 +98,7 @@ public: if (d_doRings) { auto it = d_rings.find(name); if (it == d_rings.end()) { - throw runtime_error("Attempting to account to non-existent ring '"+std::string(name)+"'"); + throw runtime_error("Attempting to account to nonexistent ring '"+std::string(name)+"'"); } it->second.lock()->account(item); @@ -109,7 +109,7 @@ public: if (d_doRings) { auto it = d_comboRings.find(name); if (it == d_comboRings.end()) { - throw runtime_error("Attempting to account to non-existent comboRing '"+std::string(name)+"'"); + throw runtime_error("Attempting to account to nonexistent comboRing '"+std::string(name)+"'"); } it->second.lock()->account(item); } @@ -119,7 +119,7 @@ public: if (d_doRings) { auto it = d_dnsnameqtyperings.find(name); if (it == d_dnsnameqtyperings.end()) { - throw runtime_error("Attempting to account to non-existent dnsname+qtype ring '"+std::string(name)+"'"); + throw runtime_error("Attempting to account to nonexistent dnsname+qtype ring '"+std::string(name)+"'"); } it->second.lock()->account(std::make_tuple(dnsname, qtype)); } diff --git a/regression-tests.recursor-dnssec/test_AggressiveNSECCache.py b/regression-tests.recursor-dnssec/test_AggressiveNSECCache.py index 99c8ff8efe..305ee05ca9 100644 --- a/regression-tests.recursor-dnssec/test_AggressiveNSECCache.py +++ b/regression-tests.recursor-dnssec/test_AggressiveNSECCache.py @@ -49,7 +49,7 @@ class AggressiveNSECCacheBase(RecursorTest): def testNoData(self): self.wipe() - # first we query a non-existent type, to get the NSEC in our cache + # first we query a nonexistent type, to get the NSEC in our cache entries = self.getMetric('aggressive-nsec-cache-entries') res = self.sendQuery('host1.secure.example.', 'TXT') self.assertRcodeEqual(res, dns.rcode.NOERROR) @@ -83,7 +83,7 @@ class AggressiveNSECCacheNSEC(AggressiveNSECCacheBase): def testNXD(self): self.wipe() - # first we query a non-existent name, to get the needed NSECs (name + widcard) in our cache + # first we query a nonexistent name, to get the needed NSECs (name + widcard) in our cache entries = self.getMetric('aggressive-nsec-cache-entries') hits = self.getMetric('aggressive-nsec-cache-nsec-hits') res = self.sendQuery('host2.secure.example.', 'TXT') @@ -115,7 +115,7 @@ class AggressiveNSECCacheNSEC(AggressiveNSECCacheBase): def testWildcard(self): self.wipe() - # first we query a non-existent name, but for which a wildcard matches, + # first we query a nonexistent name, but for which a wildcard matches, # to get the NSEC in our cache res = self.sendQuery('test1.wildcard.secure.example.', 'A') expected = dns.rrset.from_text('test1.wildcard.secure.example.', 0, dns.rdataclass.IN, 'A', '{prefix}.10'.format(prefix=self._PREFIX)) @@ -263,7 +263,7 @@ class AggressiveNSECCacheNSEC3(AggressiveNSECCacheBase): def testNXD(self): self.wipe() - # first we query a non-existent name, to get the needed NSEC3s in our cache + # first we query a nonexistent name, to get the needed NSEC3s in our cache res = self.sendQuery('host2.secure.example.', 'TXT') self.assertRcodeEqual(res, dns.rcode.NXDOMAIN) self.assertAnswerEmpty(res) @@ -295,7 +295,7 @@ class AggressiveNSECCacheNSEC3(AggressiveNSECCacheBase): self.assertAuthorityHasSOA(res) self.assertMessageIsAuthenticated(res) - # we query a non-existent name, but for which a wildcard matches, + # we query a nonexistent name, but for which a wildcard matches, # to get the NSEC3 in our cache res = self.sendQuery('test5.wildcard.secure.example.', 'A') expected = dns.rrset.from_text('test5.wildcard.secure.example.', 0, dns.rdataclass.IN, 'A', '{prefix}.10'.format(prefix=self._PREFIX)) diff --git a/regression-tests/tests/ds-at-apex-noerror/description b/regression-tests/tests/ds-at-apex-noerror/description index 5cc9ca5f74..b5228f6b9e 100644 --- a/regression-tests/tests/ds-at-apex-noerror/description +++ b/regression-tests/tests/ds-at-apex-noerror/description @@ -1 +1 @@ -This test tries to resolve a non-existent DS at apex +This test tries to resolve a nonexistent DS at apex diff --git a/regression-tests/tests/minimal-nxdomain/description b/regression-tests/tests/minimal-nxdomain/description index 212c5e8bd6..6d3f54a822 100644 --- a/regression-tests/tests/minimal-nxdomain/description +++ b/regression-tests/tests/minimal-nxdomain/description @@ -1,2 +1,2 @@ -Minimal zone (only NS records) Make sure non-existent hosts generates a correct +Minimal zone (only NS records) Make sure nonexistent hosts generates a correct NSEC(3) denial.