Merge pull request #1811 from zerotier/cleanup/typos

Cleanup/typos
This commit is contained in:
Grant Limberg 2022-12-07 08:33:12 -08:00 committed by GitHub
commit a02f42188c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 7 additions and 7 deletions

View File

@ -113,7 +113,7 @@ MemberNotificationReceiver::MemberNotificationReceiver(PostgreSQL *p, pqxx::conn
: pqxx::notification_receiver(c, channel) : pqxx::notification_receiver(c, channel)
, _psql(p) , _psql(p)
{ {
fprintf(stderr, "initialize MemberNotificaitonReceiver\n"); fprintf(stderr, "initialize MemberNotificationReceiver\n");
} }
@ -140,7 +140,7 @@ NetworkNotificationReceiver::NetworkNotificationReceiver(PostgreSQL *p, pqxx::co
} }
void NetworkNotificationReceiver::operator() (const std::string &payload, int packend_pid) { void NetworkNotificationReceiver::operator() (const std::string &payload, int packend_pid) {
fprintf(stderr, "Network Notificaiton received: %s\n", payload.c_str()); fprintf(stderr, "Network Notification received: %s\n", payload.c_str());
json tmp(json::parse(payload)); json tmp(json::parse(payload));
json &ov = tmp["old_val"]; json &ov = tmp["old_val"];
json &nv = tmp["new_val"]; json &nv = tmp["new_val"];
@ -185,7 +185,7 @@ PostgreSQL::PostgreSQL(const Identity &myId, const char *path, int listenPort, R
fprintf(stderr, "ZT_SSO_PSK: %s\n", ssoPskHex); fprintf(stderr, "ZT_SSO_PSK: %s\n", ssoPskHex);
#endif #endif
if (ssoPskHex) { if (ssoPskHex) {
// SECURITY: note that ssoPskHex will always be null-terminated if libc acatually // SECURITY: note that ssoPskHex will always be null-terminated if libc actually
// returns something non-NULL. If the hex encodes something shorter than 48 bytes, // returns something non-NULL. If the hex encodes something shorter than 48 bytes,
// it will be padded at the end with zeroes. If longer, it'll be truncated. // it will be padded at the end with zeroes. If longer, it'll be truncated.
Utils::unhex(ssoPskHex, _ssoPsk, sizeof(_ssoPsk)); Utils::unhex(ssoPskHex, _ssoPsk, sizeof(_ssoPsk));
@ -1387,7 +1387,7 @@ void PostgreSQL::commitThread()
"sso_enabled = EXCLUDED.sso_enabled", "sso_enabled = EXCLUDED.sso_enabled",
id, id,
_myAddressStr, _myAddressStr,
OSUtils::jsonDump(config["capabilitles"], -1), OSUtils::jsonDump(config["capabilities"], -1),
(bool)config["enableBroadcast"], (bool)config["enableBroadcast"],
OSUtils::now(), OSUtils::now(),
(int)config["mtu"], (int)config["mtu"],
@ -1586,7 +1586,7 @@ void PostgreSQL::onlineNotificationThread()
/** /**
* ONLY UNCOMMENT FOR TEMPORARY DB MAINTENANCE * ONLY UNCOMMENT FOR TEMPORARY DB MAINTENANCE
* *
* This define temproarly turns off writing to the member status table * This define temporarily turns off writing to the member status table
* so it can be reindexed when the indexes get too large. * so it can be reindexed when the indexes get too large.
*/ */

View File

@ -246,7 +246,7 @@ This returns a JSON object containing all member IDs as keys and their `memberRe
| vMajor | integer | Most recently known major version | no | | vMajor | integer | Most recently known major version | no |
| vMinor | integer | Most recently known minor version | no | | vMinor | integer | Most recently known minor version | no |
| vRev | integer | Most recently known revision | no | | vRev | integer | Most recently known revision | no |
| vProto | integer | Most recently known protocl version | no | | vProto | integer | Most recently known protocol version | no |
Note that managed IP assignments are only used if they fall within a managed route. Otherwise they are ignored. Note that managed IP assignments are only used if they fall within a managed route. Otherwise they are ignored.

View File

@ -81,7 +81,7 @@ These are found in the service's working directory.
If the ZeroTier One service is built with the network controller enabled, it periodically backs up its controller.db database in this file (currently every 5 minutes if there have been changes). Since this file is not a currently in use SQLite3 database it's safer to back up without corruption. On new backups the file is rotated out rather than being rewritten in place. If the ZeroTier One service is built with the network controller enabled, it periodically backs up its controller.db database in this file (currently every 5 minutes if there have been changes). Since this file is not a currently in use SQLite3 database it's safer to back up without corruption. On new backups the file is rotated out rather than being rewritten in place.
* `iddb.d/` (directory): * `iddb.d/` (directory):
Caches the public identity of every peer ZeroTier has spoken with in the last 60 days. This directory and its contents can be deleted, but this may result in slower connection initations since it will require that we go out and re-fetch full identities for peers we're speaking to. Caches the public identity of every peer ZeroTier has spoken with in the last 60 days. This directory and its contents can be deleted, but this may result in slower connection initiations since it will require that we go out and re-fetch full identities for peers we're speaking to.
* `networks.d` (directory): * `networks.d` (directory):
This caches network configurations and certificate information for networks you belong to. ZeroTier scans this directory for <network ID>.conf files on startup to recall its networks, so "touch"ing an empty <network ID>.conf file in this directory is a way of pre-configuring ZeroTier to join a specific network on startup without using the API. If the config file is empty ZeroTIer will just fetch it from the network's controller. This caches network configurations and certificate information for networks you belong to. ZeroTier scans this directory for <network ID>.conf files on startup to recall its networks, so "touch"ing an empty <network ID>.conf file in this directory is a way of pre-configuring ZeroTier to join a specific network on startup without using the API. If the config file is empty ZeroTIer will just fetch it from the network's controller.