BIND 10 trac1299, updated. 49f1f1bc36042d4b4c27a002e963f400deb694d7 [1299] typos

BIND 10 source code commits bind10-changes at lists.isc.org
Tue Dec 6 11:07:21 UTC 2011


The branch, trac1299 has been updated
       via  49f1f1bc36042d4b4c27a002e963f400deb694d7 (commit)
      from  b3c9fffb335e7a42ff07a99016df46ccaf3dae97 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 49f1f1bc36042d4b4c27a002e963f400deb694d7
Author: Jelte Jansen <jelte at isc.org>
Date:   Tue Dec 6 12:07:11 2011 +0100

    [1299] typos

-----------------------------------------------------------------------

Summary of changes:
 src/bin/xfrin/xfrin.py.in        |    6 +++---
 src/bin/xfrin/xfrin_messages.mes |    2 +-
 2 files changed, 4 insertions(+), 4 deletions(-)

-----------------------------------------------------------------------
diff --git a/src/bin/xfrin/xfrin.py.in b/src/bin/xfrin/xfrin.py.in
index de77a09..e65160e 100755
--- a/src/bin/xfrin/xfrin.py.in
+++ b/src/bin/xfrin/xfrin.py.in
@@ -713,16 +713,16 @@ class XfrinConnection(asyncore.dispatcher):
             raise XfrinProtocolError('Unexpected TSIG in response')
 
     def __parse_soa_response(self, msg, response_data):
-        '''Parse a response to SOA query and extranct the SOA from ansser.
+        '''Parse a response to SOA query and extract the SOA from answer.
 
         This is a subroutine of _check_soa_serial().  This method also
         validates message, and rejects bogus responses with XfrinProtocolError.
 
-        If evenrything is okay, it returns the SOA RR from the answer section
+        If everything is okay, it returns the SOA RR from the answer section
         of the response.
 
         '''
-        # Check TSIG integerity and validate the header.  Unlike AXFR/IXFR,
+        # Check TSIG integrity and validate the header.  Unlike AXFR/IXFR,
         # we should be more strict for SOA queries and check the AA flag, too.
         self._check_response_tsig(msg, response_data)
         self._check_response_header(msg)
diff --git a/src/bin/xfrin/xfrin_messages.mes b/src/bin/xfrin/xfrin_messages.mes
index b87cff4..5e182d8 100644
--- a/src/bin/xfrin/xfrin_messages.mes
+++ b/src/bin/xfrin/xfrin_messages.mes
@@ -15,7 +15,7 @@
 # No namespace declaration - these constants go in the global namespace
 # of the xfrin messages python module.
 
-% XFRIN_ZONE_CREATED Zone %1 not found in the given data source, newly crated
+% XFRIN_ZONE_CREATED Zone %1 not found in the given data source, newly created
 On starting an xfrin session, it is identified that the zone to be
 transferred is not found in the data source.  This can happen if a
 secondary DNS server first tries to perform AXFR from a primary server




More information about the bind10-changes mailing list