From: Josh Soref <2119212+jsoref@users.noreply.github.com> Date: Wed, 19 Nov 2025 19:16:57 +0000 (-0500) Subject: spelling: the X-Git-Tag: rec-5.4.0-alpha1~61^2~9 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=98fc94de18fbca93c4e7f0636f7be0b297c348b9;p=thirdparty%2Fpdns.git spelling: the Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com> --- diff --git a/pdns/credentials.hh b/pdns/credentials.hh index 76120fa655..6efcdbd9c5 100644 --- a/pdns/credentials.hh +++ b/pdns/credentials.hh @@ -63,7 +63,7 @@ public: /* if hashPlaintext is true, the password is in cleartext and hashing is available, the hashed form will be kept in memory. Note that accepting hashed password from an untrusted source might open - us to a denial of service, since we currently don't cap the the parameters, + us to a denial of service, since we currently don't cap the parameters, including the work factor */ CredentialsHolder(std::string&& password, bool hashPlaintext); ~CredentialsHolder(); diff --git a/pdns/dnsdistdist/dnsdist-console-completion.cc b/pdns/dnsdistdist/dnsdist-console-completion.cc index 93937fd590..6673e4ed39 100644 --- a/pdns/dnsdistdist/dnsdist-console-completion.cc +++ b/pdns/dnsdistdist/dnsdist-console-completion.cc @@ -198,7 +198,7 @@ static std::vector s_consoleKeywor {"NoneAction", true, "", "Does nothing. Subsequent rules are processed after this action"}, {"NotRule", true, "selector", "Matches the traffic if the selector rule does not match"}, {"OpcodeRule", true, "code", "Matches queries with opcode code. code can be directly specified as an integer, or one of the built-in DNSOpcodes"}, - {"OrRule", true, "selectors", "Matches the traffic if one or more of the the selectors rules does match"}, + {"OrRule", true, "selectors", "Matches the traffic if one or more of the selectors rules does match"}, {"PoolAction", true, "poolname [, stop]", "set the packet into the specified pool"}, {"PoolAvailableRule", true, "poolname", "Check whether a pool has any servers available to handle queries"}, {"PoolOutstandingRule", true, "poolname, limit", "Check whether a pool has outstanding queries above limit"}, diff --git a/pdns/dnsdistdist/dnsdist-dynblocks.hh b/pdns/dnsdistdist/dnsdist-dynblocks.hh index 7f93216d3f..c21ca8be63 100644 --- a/pdns/dnsdistdist/dnsdist-dynblocks.hh +++ b/pdns/dnsdistdist/dnsdist-dynblocks.hh @@ -425,7 +425,7 @@ public: static std::map>> getHitsForTopNetmasks(); static std::map>> getHitsForTopSuffixes(); - /* get the the top offenders based on the current value of the counters */ + /* get the top offenders based on the current value of the counters */ static std::map>> getTopNetmasks(size_t topN); static std::map>> getTopSuffixes(size_t topN); static void purgeExpired(const struct timespec& now); diff --git a/pdns/recursordist/test-syncres_cc9.cc b/pdns/recursordist/test-syncres_cc9.cc index a024b032e8..09297fce0c 100644 --- a/pdns/recursordist/test-syncres_cc9.cc +++ b/pdns/recursordist/test-syncres_cc9.cc @@ -948,7 +948,7 @@ BOOST_AUTO_TEST_CASE(test_cname_plus_authority_ns_ttl) cached.clear(); - /* Also check that the the part in additional is still not auth */ + /* Also check that the part in additional is still not auth */ BOOST_REQUIRE_GE(g_recCache->get(now, DNSName("a.gtld-servers.net."), QType(QType::A), MemRecursorCache::None, &cached, who, boost::none, nullptr, nullptr, nullptr, nullptr, &wasAuth), -1); BOOST_CHECK_EQUAL(cached.size(), 1U); BOOST_CHECK_EQUAL(wasAuth, false); diff --git a/pdns/shuffle.cc b/pdns/shuffle.cc index 9fb707b4ed..b195151f84 100644 --- a/pdns/shuffle.cc +++ b/pdns/shuffle.cc @@ -35,7 +35,7 @@ void pdns::shuffle(std::vector& rrs) std::vector::iterator first; std::vector::iterator second; - // We assume the CNAMES are listed first in the ANSWER section and the the other records + // We assume the CNAMES are listed first in the ANSWER section and the other records // and we want to shuffle the other records only // First we scan for the first non-CNAME ANSWER record diff --git a/regression-tests.auth-py/authtests.py b/regression-tests.auth-py/authtests.py index 5ffe878f01..51d36f848a 100644 --- a/regression-tests.auth-py/authtests.py +++ b/regression-tests.auth-py/authtests.py @@ -651,7 +651,7 @@ options { raise AssertionError("RRSIG found in answers for:\n%s" % ret) def assertAnswerEmpty(self, msg): - self.assertEqual(len(msg.answer), 0, "Data found in the the answer section for %s:\n%s" % (msg.question[0].to_text(), '\n'.join([i.to_text() for i in msg.answer]))) + self.assertEqual(len(msg.answer), 0, "Data found in the answer section for %s:\n%s" % (msg.question[0].to_text(), '\n'.join([i.to_text() for i in msg.answer]))) def assertAnswerNotEmpty(self, msg): self.assertGreater(len(msg.answer), 0, "Answer is empty") diff --git a/regression-tests.recursor-dnssec/recursortests.py b/regression-tests.recursor-dnssec/recursortests.py index e05067cc26..a5f8309a00 100644 --- a/regression-tests.recursor-dnssec/recursortests.py +++ b/regression-tests.recursor-dnssec/recursortests.py @@ -1116,10 +1116,10 @@ distributor-threads={threads} raise AssertionError("RRSIG found in answers for:\n%s" % ret) def assertAnswerEmpty(self, msg): - self.assertEqual(len(msg.answer), 0, "Data found in the the answer section for %s:\n%s" % (msg.question[0].to_text(), '\n'.join([i.to_text() for i in msg.answer]))) + self.assertEqual(len(msg.answer), 0, "Data found in the answer section for %s:\n%s" % (msg.question[0].to_text(), '\n'.join([i.to_text() for i in msg.answer]))) def assertAdditionalEmpty(self, msg): - self.assertEqual(len(msg.additional), 0, "Data found in the the additional section for %s:\n%s" % (msg.question[0].to_text(), '\n'.join([i.to_text() for i in msg.additional]))) + self.assertEqual(len(msg.additional), 0, "Data found in the additional section for %s:\n%s" % (msg.question[0].to_text(), '\n'.join([i.to_text() for i in msg.additional]))) def assertRcodeEqual(self, msg, rcode): if not isinstance(msg, dns.message.Message): diff --git a/regression-tests.recursor-dnssec/test_RecDnstap.py b/regression-tests.recursor-dnssec/test_RecDnstap.py index 0a905ad3af..e67f944485 100644 --- a/regression-tests.recursor-dnssec/test_RecDnstap.py +++ b/regression-tests.recursor-dnssec/test_RecDnstap.py @@ -37,7 +37,7 @@ def checkDnstapBase(testinstance, dnstap, protocol, initiator, responder, respon testinstance.assertTrue(dnstap.message.HasField('socket_family')) testinstance.assertEqual(dnstap.message.socket_family, dnstap_pb2.INET) # - # The query address and port are from the the recursor, we don't know the port + # The query address and port are from the recursor, we don't know the port # testinstance.assertTrue(dnstap.message.HasField('query_address')) testinstance.assertEqual(socket.inet_ntop(socket.AF_INET, dnstap.message.query_address), initiator)