Hello Ilia,

Can you rebase it in top of master? I can't find a commit around your
submission date where the patch applies.

Thanks,

On Sun, Feb 22, 2026 at 06:51:37PM +0100, Ilia Shipitsin wrote:
> Subject: [PATCH] Fix spelling and wording errors across HAProxy codebase
> Correct multiple typos and wording issues in source files, documentation, and 
> CLI tools. Changes include fixes such as "specifiy → specify", "explicitely → 
> explicitly", "targetting → targeting", "therefor → therefore", "accross → 
> across", "explaination → explanation", and similar minor corrections. These 
> updates improve clarity, consistency, and professionalism in user-facing 
> docs, comments, and internal code annotations.
> ---
>  admin/cli/haproxy-dump-certs |  2 +-
>  doc/configuration.txt        | 10 +++++-----
>  doc/management.txt           |  2 +-
>  include/haproxy/proxy-t.h    |  4 ++--
>  include/haproxy/ssl_sock-t.h |  2 +-
>  src/backend.c                |  4 ++--
>  src/cfgparse-ssl.c           |  2 +-
>  src/chunk.c                  |  4 ++--
>  src/haproxy.c                |  2 +-
>  src/haterm.c                 |  6 +++---
>  src/haterm_init.c            |  4 ++--
>  src/http_fetch.c             |  2 +-
>  src/jwe.c                    |  8 ++++----
>  src/proxy.c                  |  2 +-
>  src/stream.c                 |  4 ++--
>  15 files changed, 29 insertions(+), 29 deletions(-)
> 
> diff --git a/admin/cli/haproxy-dump-certs b/admin/cli/haproxy-dump-certs
> index 59a507711..e15bb66d1 100755
> --- a/admin/cli/haproxy-dump-certs
> +++ b/admin/cli/haproxy-dump-certs
> @@ -149,7 +149,7 @@ usage() {
>       echo "Options:"
>       echo "  -S, --master-socket <path>   Use the master socket at <path> 
> (default: ${SOCKET})"
>       echo "  -s, --socket <path>          Use the stats socket at <path>"
> -     echo "  -p, --path <path>            Specifiy a base path for relative 
> files (default: ${BASEPATH})"
> +     echo "  -p, --path <path>            Specify a base path for relative 
> files (default: ${BASEPATH})"
>       echo "  -n, --dry-run                Read certificates on the socket 
> but don't dump them"
>       echo "  -d, --debug                  Debug mode, set -x"
>       echo "  -v, --verbose                Verbose mode"
> diff --git a/doc/configuration.txt b/doc/configuration.txt
> index 6c14abfe7..28a51503d 100644
> --- a/doc/configuration.txt
> +++ b/doc/configuration.txt
> @@ -5345,7 +5345,7 @@ tune.ssl.certificate-compression { auto | off }
>  
>    When set to "auto" it uses the default value of the TLS library.
>  
> -  With "off" it tries to explicitely disable the support of the feature.
> +  With "off" it tries to explicitly disable the support of the feature.
>    HAProxy won't try to send compressed certificates anymore nor accept
>    compressed certificates.
>  
> @@ -7171,7 +7171,7 @@ default_backend <backend>
>    used when no rule has matched. It generally is the dynamic backend which
>    will catch all undetermined requests.
>  
> -  If a backend is disabled or unpublished, default_backend rules targetting 
> it
> +  If a backend is disabled or unpublished, default_backend rules targeting it
>    will be ignored and stream processing will remain on the original proxy.
>  
>    Example :
> @@ -21478,7 +21478,7 @@ jwt_decrypt_cert(<cert>)
>    decrypted thanks to the certificate provided.
>    The <cert> parameter must be a path to an already loaded certificate (that
>    can be dumped via the "dump ssl cert" CLI command). The certificate must 
> have
> -  its "jwt" option explicitely set to "on" (see "jwt" crt-list option). It 
> can
> +  its "jwt" option explicitly set to "on" (see "jwt" crt-list option). It can
>    be provided directly or via a variable.
>    The only tokens managed yet are the ones using the Compact Serialization
>    format (five dot-separated base64-url encoded strings).
> @@ -31269,9 +31269,9 @@ user <username> [password|insecure-password 
> <password>]
>    slower than their glibc counterparts when calculating hashes, so you might
>    want to consider this aspect too.
>  
> -  All passwords are considered normal arguments and are therefor subject to
> +  All passwords are considered normal arguments and are therefore subject to
>    regular section 2.2 Quoting and escaping. Single quoting passwords is
> -  therefor recommended.
> +  therefore recommended.
>  
>    Example:
>          userlist L1
> diff --git a/doc/management.txt b/doc/management.txt
> index cee9f5b56..dbaf78196 100644
> --- a/doc/management.txt
> +++ b/doc/management.txt
> @@ -1731,7 +1731,7 @@ add backend <name> from <defproxy> [mode <mode>] [guid 
> <guid>] [ EXPERIMENTAL ]
>    Only TCP or HTTP proxies can be created. All of the settings are inherited
>    from <defproxy> default proxy instance. By default, it is mandatory to
>    specify the backend mode via the argument of the same name, unless 
> <defproxy>
> -  already defines it explicitely. It is also possible to use an optional GUID
> +  already defines it explicitly. It is also possible to use an optional GUID
>    argument if wanted.
>  
>    Servers can be added via the command "add server". The backend is 
> initialized
> diff --git a/include/haproxy/proxy-t.h b/include/haproxy/proxy-t.h
> index 21c9aae4f..ff980e20c 100644
> --- a/include/haproxy/proxy-t.h
> +++ b/include/haproxy/proxy-t.h
> @@ -242,12 +242,12 @@ enum PR_SRV_STATE_FILE {
>  /* Proxy flags */
>  #define PR_FL_DISABLED           0x01  /* The proxy was disabled in the 
> configuration (not at runtime) */
>  #define PR_FL_STOPPED            0x02  /* The proxy was stopped */
> -#define PR_FL_DEF_EXPLICIT_MODE  0x04  /* Proxy mode is explicitely defined 
> - only used for defaults instance */
> +#define PR_FL_DEF_EXPLICIT_MODE  0x04  /* Proxy mode is explicitly defined - 
> only used for defaults instance */
>  #define PR_FL_EXPLICIT_REF       0x08  /* The default proxy is explicitly 
> referenced by another proxy */
>  #define PR_FL_IMPLICIT_REF       0x10  /* The default proxy is implicitly 
> referenced by another proxy */
>  #define PR_FL_PAUSED             0x20  /* The proxy was paused at run time 
> (reversible) */
>  #define PR_FL_CHECKED            0x40  /* The proxy configuration was fully 
> checked (including postparsing checks) */
> -#define PR_FL_BE_UNPUBLISHED     0x80  /* The proxy cannot be targetted by 
> content switching rules */
> +#define PR_FL_BE_UNPUBLISHED     0x80  /* The proxy cannot be targeted by 
> content switching rules */
>  
>  struct stream;
>  
> diff --git a/include/haproxy/ssl_sock-t.h b/include/haproxy/ssl_sock-t.h
> index 8b18e8241..6af6dea9f 100644
> --- a/include/haproxy/ssl_sock-t.h
> +++ b/include/haproxy/ssl_sock-t.h
> @@ -339,7 +339,7 @@ struct global_ssl {
>       char **passphrase_cmd;
>       int passphrase_cmd_args_cnt;
>  
> -     unsigned int certificate_compression:1; /* allow to explicitely disable 
> certificate compression */
> +     unsigned int certificate_compression:1; /* allow to explicitly disable 
> certificate compression */
>  };
>  
>  /* The order here matters for picking a default context,
> diff --git a/src/backend.c b/src/backend.c
> index 109fba3aa..7094c2f02 100644
> --- a/src/backend.c
> +++ b/src/backend.c
> @@ -2067,7 +2067,7 @@ int connect_server(struct stream *s)
>                        * available.
>                        *
>                        * This check must be performed before conn_prepare()
> -                      * to ensure consistency accross the whole stack, in
> +                      * to ensure consistency across the whole stack, in
>                        * particular for QUIC between quic-conn and mux layer.
>                        */
>                       if (IS_HTX_STRM(s) && srv->use_ssl &&
> @@ -3063,7 +3063,7 @@ int be_downtime(struct proxy *px) {
>  
>  /* Checks if <px> backend supports the addition of servers at runtime. 
> Either a
>   * backend or a defaults proxy are supported. If proxy is incompatible, <msg>
> - * will be allocated to contain a textual explaination.
> + * will be allocated to contain a textual explanation.
>   */
>  int be_supports_dynamic_srv(struct proxy *px, char **msg)
>  {
> diff --git a/src/cfgparse-ssl.c b/src/cfgparse-ssl.c
> index 8b8d7f5e1..cb9247ce1 100644
> --- a/src/cfgparse-ssl.c
> +++ b/src/cfgparse-ssl.c
> @@ -496,7 +496,7 @@ static int ssl_parse_global_keylog(char **args, int 
> section_type, struct proxy *
>  }
>  #endif
>  
> -/* Allow to explicitely disable certificate compression when set to "off" */
> +/* Allow to explicitly disable certificate compression when set to "off" */
>  #ifdef SSL_OP_NO_RX_CERTIFICATE_COMPRESSION
>  static int ssl_parse_certificate_compression(char **args, int section_type, 
> struct proxy *curpx,
>                                               const struct proxy *defpx, 
> const char *file, int line,
> diff --git a/src/chunk.c b/src/chunk.c
> index 54e9561b6..a3d519fc2 100644
> --- a/src/chunk.c
> +++ b/src/chunk.c
> @@ -80,7 +80,7 @@ struct buffer *get_trash_chunk(void)
>  }
>  
>  /* Similar to get_trash_chunk() but return a pre-allocated large chunk
> - * instead. Becasuse large buffers are not enabled by default, this function 
> may
> + * instead. Because large buffers are not enabled by default, this function 
> may
>   * return NULL.
>   */
>  struct buffer *get_large_trash_chunk(void)
> @@ -127,7 +127,7 @@ struct buffer *get_larger_trash_chunk(struct buffer *chk)
>       if (!chk)
>               return get_trash_chunk();
>  
> -     /* No large buffers or current chunk is alread a large trash chunk */
> +     /* No large buffers or current chunk is already a large trash chunk */
>       if (!large_trash_size || chk->size == large_trash_size)
>               return NULL;
>  
> diff --git a/src/haproxy.c b/src/haproxy.c
> index 177df7bcb..2eb48b6cc 100644
> --- a/src/haproxy.c
> +++ b/src/haproxy.c
> @@ -2822,7 +2822,7 @@ void deinit(void)
>        * they are respectively cleaned up in sink_deinit() and 
> deinit_log_forward()
>        */
>  
> -     /* If named defaults were preserved, ensure refcount is resetted. */
> +     /* If named defaults were preserved, ensure refcount is reset. */
>       if (!(global.tune.options & GTUNE_PURGE_DEFAULTS))
>               defaults_px_unref_all();
>       /* All proxies are removed now, so every defaults should also be freed
> diff --git a/src/haterm.c b/src/haterm.c
> index 9299a9f5c..4bbafc3a1 100644
> --- a/src/haterm.c
> +++ b/src/haterm.c
> @@ -47,7 +47,7 @@ const char *HTTP_HELP =
>          " - /?R=<enable>      Enable sending random data if >0.\n"
>          "\n"
>          "Note that those arguments may be cumulated on one line separated by 
> a set of\n"
> -        "delimitors among [&?,;/] :\n"
> +        "delimiters among [&?,;/] :\n"
>          " -  GET /?s=20k&c=1&t=700&K=30r HTTP/1.0\n"
>          " -  GET /?r=500?s=0?c=0?t=1000 HTTP/1.0\n"
>          "\n";
> @@ -323,7 +323,7 @@ static int hstream_htx_buf_snd(struct connection *conn, 
> struct hstream *hs)
>       }
>  
>       /* The HTX data are not fully sent if the last HTX data
> -      * were not fully transfered or if there are remaining data
> +      * were not fully transferred or if there are remaining data
>        * to send (->to_write > 0).
>        */
>       if (!htx_is_empty(htxbuf(&hs->res))) {
> @@ -1007,7 +1007,7 @@ static int hstream_build_responses(void)
>  
>       /* original haterm chunk mode responses are made of 1-byte chunks
>        * but the haproxy muxes do not support this. At this time
> -      * these reponses are handled the same way as for common
> +      * these responses are handled the same way as for common
>        * responses with a pre-built buffer.
>        */
>       for (i = 0; i < sizeof(common_chunk_resp); i++)
> diff --git a/src/haterm_init.c b/src/haterm_init.c
> index 65baad54f..2a7cb3897 100644
> --- a/src/haterm_init.c
> +++ b/src/haterm_init.c
> @@ -106,7 +106,7 @@ static inline size_t hbuf_is_null(const struct hbuf *h)
>  
>  /* Simple function, to append <line> to <b> without without
>   * trailing '\0' character.
> - * Take into an account the '\t' and '\n' escaped sequeces.
> + * Take into an account the '\t' and '\n' escaped sequences.
>   */
>  static void hstream_str_buf_append(struct hbuf *h, const char *line)
>  {
> @@ -215,7 +215,7 @@ void haproxy_init_args(int argc, char **argv)
>               argc--; argv++;
>       }
>  
> -     /* Restore the argumenst */
> +     /* Restore the arguments */
>       argc = sargc; argv = sargv;
>       while (argc > 0) {
>               char *opt;
> diff --git a/src/http_fetch.c b/src/http_fetch.c
> index eae140b3b..df9de7eb5 100644
> --- a/src/http_fetch.c
> +++ b/src/http_fetch.c
> @@ -44,7 +44,7 @@
>  /* this struct is used between calls to smp_fetch_hdr() or 
> smp_fetch_cookie() */
>  static THREAD_LOCAL struct http_hdr_ctx static_http_hdr_ctx;
>  /* this is used to convert raw connection buffers to htx */
> -/* NOTE: For now, raw bufers cannot exceeds the standard size */
> +/* NOTE: For now, raw buffers cannot exceeds the standard size */
>  static THREAD_LOCAL struct buffer static_raw_htx_chunk;
>  static THREAD_LOCAL char *static_raw_htx_buf;
>  
> diff --git a/src/jwe.c b/src/jwe.c
> index bfa73d901..e095537d5 100644
> --- a/src/jwe.c
> +++ b/src/jwe.c
> @@ -326,7 +326,7 @@ static int decrypt_cek_aeskw(struct buffer *cek, struct 
> buffer *decrypted_cek, s
>   * the one found in the JWE token.
>   * The tag is built out of a HMAC of some concatenated data taken from the 
> JWE
>   * token (see https://datatracker.ietf.org/doc/html/rfc7518#section-5.2). The
> - * firest half of the previously decrypted cek is used as HMAC key.
> + * first half of the previously decrypted cek is used as HMAC key.
>   * Returns 0 in case of success, 1 otherwise.
>   */
>  static int build_and_check_tag(jwe_enc enc,  struct jwt_item 
> items[JWE_ELT_MAX],
> @@ -504,7 +504,7 @@ static inline void clear_decoded_items(struct buffer 
> *decoded_items[JWE_ELT_MAX]
>  /*
>   * Decrypt the contents of a JWE token thanks to the user-provided base64
>   * encoded secret. This converter can only be used for tokens that have a
> - * symetric algorithm (AESKW, AESGCMKW or "dir" special case).
> + * symmetric algorithm (AESKW, AESGCMKW or "dir" special case).
>   * Returns the decrypted contents, or nothing if any error happened.
>   */
>  static int sample_conv_jwt_decrypt_secret(const struct arg *args, struct 
> sample *smp, void *private)
> @@ -761,7 +761,7 @@ static int decrypt_cek_rsa(struct buffer *cek, struct 
> buffer *decrypted_cek,
>  /*
>   * Decrypt the contents of a JWE token thanks to the user-provided 
> certificate
>   * and private key. This converter can only be used for tokens that have an
> - * asymetric algorithm (RSA only for now).
> + * asymmetric algorithm (RSA only for now).
>   * Returns the decrypted contents, or nothing if any error happened.
>   */
>  static int sample_conv_jwt_decrypt_cert(const struct arg *args, struct 
> sample *smp, void *private)
> @@ -827,7 +827,7 @@ static int sample_conv_jwt_decrypt_cert(const struct arg 
> *args, struct sample *s
>       if (chunk_printf(cert, "%.*s", (int)b_data(&cert_smp.data.u.str), 
> b_orig(&cert_smp.data.u.str)) <= 0)
>               goto end;
>  
> -     /* With asymetric crypto algorithms we should always have a CEK */
> +     /* With asymmetric crypto algorithms we should always have a CEK */
>       if (!items[JWE_ELT_CEK].length)
>               goto end;
>  
> diff --git a/src/proxy.c b/src/proxy.c
> index dadcff0c6..8718ce995 100644
> --- a/src/proxy.c
> +++ b/src/proxy.c
> @@ -4857,7 +4857,7 @@ static int cli_parse_add_backend(char **args, char 
> *payload, struct appctx *appc
>               return 1;
>       }
>       if (!(defpx->flags & PR_FL_DEF_EXPLICIT_MODE) && !mode) {
> -             cli_dynerr(appctx, memprintf(&msg, "Mode is required as '%s' 
> default proxy does not explicitely defines it.\n", def_name));
> +             cli_dynerr(appctx, memprintf(&msg, "Mode is required as '%s' 
> default proxy does not explicitly defines it.\n", def_name));
>               return 1;
>       }
>       if (defpx->mode != PR_MODE_TCP && defpx->mode != PR_MODE_HTTP) {
> diff --git a/src/stream.c b/src/stream.c
> index b2eef9187..35ea931eb 100644
> --- a/src/stream.c
> +++ b/src/stream.c
> @@ -1141,12 +1141,12 @@ enum act_return process_use_service(struct act_rule 
> *rule, struct proxy *px,
>       return ACT_RET_STOP;
>  }
>  
> -/* Parses persist-rules attached to <fe> frontend and report the first 
> macthing
> +/* Parses persist-rules attached to <fe> frontend and report the first 
> matching
>   * entry, using <sess> session and <s> stream as sample source.
>   *
>   * As this function is called several times in the same stream context,
>   * <persist> will act as a caching value to avoid reprocessing of a similar
> - * ruleset. It must be set to a negative value for the first invokation.
> + * ruleset. It must be set to a negative value for the first invocation.
>   *
>   * Returns 1 if a rule matches, else 0.
>   */
> -- 
> 2.46.0.windows.1
> 
> 
> 

-- 
William Lallemand


Reply via email to