#3556 Fix minor spelling mistakes
Merged 6 years ago by sobek. Opened 6 years ago by sobek.
SSSD/ sobek/sssd fix-spelling-mistake  into  master

file modified
+3 -3
@@ -241,7 +241,7 @@ 

  account sources. It is also the basis to provide client auditing and policy

  services for projects like FreeIPA.

  

- The sssd subpackage is a meta-package that contains the deamon as well as all

+ The sssd subpackage is a meta-package that contains the daemon as well as all

  the existing back ends.

  

  %package common
@@ -496,7 +496,7 @@ 

  Requires(postun): /sbin/ldconfig

  

  %description -n libsss_idmap

- Utility library to convert SIDs to Unix uids and gids

+ Utility library to convert SIDs to UNIX UIDs and GIDs

  

  %package -n libsss_idmap-devel

  Summary: FreeIPA Idmap library
@@ -505,7 +505,7 @@ 

  Requires: libsss_idmap = %{version}-%{release}

  

  %description -n libsss_idmap-devel

- Utility library to SIDs to Unix uids and gids

+ Utility library to SIDs to UNIX UIDs and GIDs

  

  %package -n libipa_hbac

  Summary: FreeIPA HBAC Evaluator library

file modified
+1 -1
@@ -185,7 +185,7 @@ 

  

  /* The utility function to create a subdomain sss_domain_info object is handy

   * for unit tests, so it should be available in a header, but not a public util

-  * one, because the only interface for the deamon itself should be adding

+  * one, because the only interface for the daemon itself should be adding

   * the sysdb domain object and calling sysdb_update_subdomains()

   */

  struct sss_domain_info *new_subdomain(TALLOC_CTX *mem_ctx,

file modified
+2 -2
@@ -722,7 +722,7 @@ 

          goto done;

      }

  

-     /* Safe orginal values in attributes prefixed by OriginalAD. */

+     /* Safe original values in attributes prefixed by OriginalAD. */

      for (c = 0; allowed_attrs[c] != NULL; c++) {

          el = ldb_msg_find_element(orig_obj->msgs[0], allowed_attrs[c]);

          if (el != NULL) {
@@ -753,7 +753,7 @@ 

      el = ldb_msg_find_element(orig_obj->msgs[0], SYSDB_NAME_ALIAS);

      if (el != NULL) {

          for (c = 0; c < el->num_values; c++) {

-             /* To avoid issue with ldb_modify if e.g. the orginal and the

+             /* To avoid issue with ldb_modify if e.g. the original and the

               * override name are the same, we use the *_safe version here. */

              ret = sysdb_attrs_add_val_safe(attrs, SYSDB_NAME_ALIAS,

                                             &el->values[c]);

@@ -32,7 +32,7 @@ 

  # An example Active Directory domain. Please note that this configuration

  # works for AD 2003R2 and AD 2008, because they use pretty much RFC2307bis

  # compliant attribute names. To support UNIX clients with AD 2003 or older,

- # you must install Microsoft Services For Unix and map LDAP attributes onto

+ # you must install Microsoft Services For UNIX and map LDAP attributes onto

  # msSFU30* attribute names.

  ; [domain/AD]

  ; id_provider = ldap

@@ -719,7 +719,7 @@ 

  EXCLUDE                =

  

  # The EXCLUDE_SYMLINKS tag can be used to select whether or not files or

- # directories that are symbolic links (a Unix file system feature) are excluded

+ # directories that are symbolic links (a UNIX file system feature) are excluded

  # from the input.

  

  EXCLUDE_SYMLINKS       = NO

file modified
+1 -1
@@ -46,7 +46,7 @@ 

               project was born to deal with this problem in cloud like

               environments, but we found the idea compelling even at a

               single system level. As a security service, SSSD is ideal to

-              host this capability while offering the same API via a Unix

+              host this capability while offering the same API via a UNIX

               Socket. This will make it possible to use local calls and have

               them transparently routed to a local or a remote key management

               store like IPA Vault for storage, escrow and recovery.

file modified
+2 -2
@@ -680,7 +680,7 @@ 

   * named "ApplyGroupPolicy" (AGP) is allowed, by comparing the specified

   * user_sid and group_sids against the specified access control entry (ACE).

   * This function returns ALLOWED, DENIED, or NEUTRAL depending on whether

-  * the ACE explictly allows, explicitly denies, or does neither.

+  * the ACE explicitly allows, explicitly denies, or does neither.

   *

   * Note that the 'M' abbreviation used in the evaluation algorithm stands for

   * "access_mask", which represents the set of access rights associated with an
@@ -3860,7 +3860,7 @@ 

      ret = sysdb_attrs_get_int32_t(result, AD_AT_FUNC_VERSION,

                                    &gp_gpo->gpo_func_version);

      if (ret == ENOENT) {

-         /* If this attrbute is missing we can skip the GPO. It will

+         /* If this attribute is missing we can skip the GPO. It will

           * be filtered out according to MS-GPOL:

           * https://msdn.microsoft.com/en-us/library/cc232538.aspx */

          DEBUG(SSSDBG_TRACE_ALL, "GPO with GUID %s is missing attribute "

file modified
+1 -1
@@ -706,7 +706,7 @@ 

          return;

      }

  

-     /* The second address matched either immediatelly or after a retry.

+     /* The second address matched either immediately or after a retry.

       * No need to retry again. */

      ret = EOK;

  

@@ -412,7 +412,7 @@ 

  {

      if (dp_req->handler_req == NULL) {

          /* This may occur when the handler already finished but the caller

-          * of dp request did not yet recieved data/free dp_req. We just

+          * of dp request did not yet received data/free dp_req. We just

           * return here. */

          return;

      }

@@ -1612,7 +1612,7 @@ 

          goto done;

      }

  

-     /* Successfull authentication! Check if ccache contains the

+     /* Successful authentication! Check if ccache contains the

       * right principal...

       */

      kerr = sss_krb5_check_ccache_princ(kr->ctx, kr->ccname, kr->creds->client);

@@ -616,7 +616,7 @@ 

      }

      in_transaction = false;

  

-     DEBUG(SSSDBG_TRACE_FUNC, "Sudoers is successfuly stored in cache\n");

+     DEBUG(SSSDBG_TRACE_FUNC, "Sudoers is successfully stored in cache\n");

  

      /* remember new usn */

      ret = sysdb_get_highest_usn(state, rules, rules_count, &usn);

@@ -210,7 +210,7 @@ 

  /*

   * Creates an array of principal elements that will be used later

   * in the form of:

-  *          "componenets": [ "elem1", "elem2", ...]

+  *          "components": [ "elem1", "elem2", ...]

   */

  static json_t *princ_data_to_json(TALLOC_CTX *mem_ctx,

                                    krb5_principal princ)

@@ -179,7 +179,7 @@ 

      case HASH_ERROR_KEY_NOT_FOUND:

          /* No request for this UID yet. Enqueue this request in case

           * another one comes in and return EOK to run the current request

-          * immediatelly

+          * immediately

           */

          DEBUG(SSSDBG_TRACE_LIBS, "No existing queue for this ID\n");

  
@@ -220,7 +220,7 @@ 

   * Enqueue a request.

   *

   * If the request queue /for the given ID/ is empty, that is, if this

-  * request is the first one in the queue, run the request immediatelly.

+  * request is the first one in the queue, run the request immediately.

   *

   * Otherwise just add it to the queue and wait until the previous request

   * finishes and only at that point mark the current request as done, which

@@ -179,7 +179,7 @@ 

  

      conn->incoming_signals = sbus_incoming_signal_hash_init(conn);

      if (conn->incoming_signals == NULL) {

-         DEBUG(SSSDBG_CRIT_FAILURE, "Cannot create incoming singals "

+         DEBUG(SSSDBG_CRIT_FAILURE, "Cannot create incoming signals "

                "hash table\n");

          talloc_free(conn);

          return EIO;
@@ -327,7 +327,7 @@ 

  

  /*

   * sbus_get_connection

-  * Utility function to retreive the DBusConnection object

+  * Utility function to retrieve the DBusConnection object

   * from a sbus_connection

   */

  DBusConnection *sbus_get_connection(struct sbus_connection *conn)

file modified
+2 -2
@@ -98,8 +98,8 @@ 

      SAFEALIGN_SETMEM_VALUE(dest, value, uint16_t, pctr)

  

  /* These macros are the same as their equivalents without _CHECK suffix,

-  * but additionally make the caller return EINVAL immediatelly if *pctr

-  * would excceed len. */

+  * but additionally make the caller return EINVAL immediately if *pctr

+  * would exceed len. */

  #define SAFEALIGN_COPY_UINT32_CHECK(dest, src, len, pctr) do { \

      if ((*(pctr) + sizeof(uint32_t)) > (len) || \

          SIZE_T_OVERFLOW(*(pctr), sizeof(uint32_t))) { return EINVAL; } \

@@ -30,7 +30,7 @@ 

  #define MAX_AUTOMNTMAPNAME_LEN  NAME_MAX

  #define MAX_AUTOMNTKEYNAME_LEN  PATH_MAX

  

- /* How many entries shall _sss_getautomntent_r retreive at once */

+ /* How many entries shall _sss_getautomntent_r retrieve at once */

  #define GETAUTOMNTENT_MAX_ENTRIES   512

  

  struct automtent {
@@ -287,7 +287,7 @@ 

      data_len = sizeof(uint32_t) +            /* mapname len */

                 name_len + 1 +                /* mapname\0   */

                 sizeof(uint32_t) +            /* index into the map */

-                sizeof(uint32_t);             /* num entries to retreive */

+                sizeof(uint32_t);             /* num entries to retrieve */

  

      data = malloc(data_len);

      if (!data) {

@@ -616,7 +616,7 @@ 

  EXCLUDE                =

  

  # The EXCLUDE_SYMLINKS tag can be used select whether or not files or

- # directories that are symbolic links (a Unix filesystem feature) are excluded

+ # directories that are symbolic links (a UNIX filesystem feature) are excluded

  # from the input.

  

  EXCLUDE_SYMLINKS       = NO

@@ -606,7 +606,7 @@ 

      WBC_SSSD_NOT_IMPLEMENTED;

  }

  

- /* Return the unix group array belonging to the given user */

+ /* Return the Unix group array belonging to the given user */

  wbcErr wbcGetGroups(const char *account,

              uint32_t *num_groups,

              gid_t **_groups)

@@ -87,11 +87,11 @@ 

  };

  

  /**

-  * @brief Send a request to SSSD to retreive all SUDO rules for a given

+  * @brief Send a request to SSSD to retrieve all SUDO rules for a given

   * user.

   *

-  * @param[in] uid         The uid of the user to retreive the rules for.

-  * @param[in] username    The username to retreive the rules for

+  * @param[in] uid         The uid of the user to retrieve the rules for.

+  * @param[in] username    The username to retrieve the rules for

   * @param[in] domainname  The domain name the user is a member of.

   * @param[out] _error     The result of the search in SSSD's domains. If the

   *                        user was present in the domain, the _error code is
@@ -122,9 +122,9 @@ 

   * @brief Send a request to SSSD to retrieve the default options, commonly

   * stored in the "cn=defaults" record,

   *

-  * @param[in] uid          The uid of the user to retreive the rules for.

+  * @param[in] uid          The uid of the user to retrieve the rules for.

   *

-  * @param[in] username     The username to retreive the rules for.

+  * @param[in] username     The username to retrieve the rules for.

   *

   * @param[out] _error      The result of the search in SSSD's domains. If the

   *                         options were present in the domain, the _error code

@@ -24,7 +24,7 @@ 

  #include "responder/common/responder.h"

  #include "tests/cmocka/common_mock_resp.h"

  

- /* Mock DP requests that finish immediatelly and return

+ /* Mock DP requests that finish immediately and return

   * mocked values as per previous set by mock_account_recv

   */

  struct tevent_req *

@@ -72,7 +72,7 @@ 

  

      escaped = sbus_opath_escape_part(mem_ctx, "path_with_underscore");

      assert_non_null(escaped);

-     /* underscore is 0x5F in ascii */

+     /* underscore is 0x5F in ASCII */

      assert_string_equal(escaped, "path_5fwith_5funderscore");

      raw = sbus_opath_unescape_part(mem_ctx, escaped);

      talloc_free(escaped);

@@ -97,7 +97,7 @@ 

      return ret;

  }

  

- bool sss_deamon_running(void)

+ bool sss_daemon_running(void)

  {

      return sss_signal(0) == EOK;

  }

@@ -23,7 +23,7 @@ 

  

  #include "util/util.h"

  

- bool sss_deamon_running(void);

+ bool sss_daemon_running(void);

  errno_t sss_signal(int signum);

  

  #endif /* _SSS_PROCESS_H_ */

file modified
+2 -2
@@ -148,7 +148,7 @@ 

      enum sssctl_prompt_result prompt;

      errno_t ret;

  

-     if (sss_deamon_running()) {

+     if (sss_daemon_running()) {

          return true;

      }

  
@@ -187,7 +187,7 @@ 

      enum sssctl_prompt_result prompt;

      errno_t ret;

  

-     if (!sss_deamon_running()) {

+     if (!sss_daemon_running()) {

          return true;

      }

  

@@ -270,7 +270,7 @@ 

          return ret;

      }

  

-     if (sss_deamon_running()) {

+     if (sss_daemon_running()) {

          return ERR_SSSD_RUNNING;

      }

  

@@ -7,7 +7,7 @@ 

   *  Sumit Bose <sbose@redhat.com>

   *  George McCollister <georgem@novatech-llc.com>

   */

- /* SHA512-based Unix crypt implementation.

+ /* SHA512-based UNIX crypt implementation.

     Released into the Public Domain by Ulrich Drepper <drepper@redhat.com>.  */

  

  #include "config.h"

@@ -5,7 +5,7 @@ 

   *

   *  Sumit Bose <sbose@redhat.com>

   */

- /* SHA512-based Unix crypt implementation.

+ /* SHA512-based UNIX crypt implementation.

     Released into the Public Domain by Ulrich Drepper <drepper@redhat.com>.  */

  

  #include "config.h"

file modified
+3 -3
@@ -69,7 +69,7 @@ 

  #endif

  }

  

- static void deamon_parent_sigterm(int sig)

+ static void daemon_parent_sigterm(int sig)

  {

      _exit(0);

  }
@@ -88,10 +88,10 @@ 

          pid = fork();

          if (pid != 0) {

              /* Terminate parent process on demand so we can hold systemd

-              * or initd from starting next service until sssd in initialized.

+              * or initd from starting next service until sssd is initialized.

               * We use signals directly here because we don't have a tevent

               * context yet. */

-             CatchSignal(SIGTERM, deamon_parent_sigterm);

+             CatchSignal(SIGTERM, daemon_parent_sigterm);

  

              /* or exit when sssd monitor is terminated */

              do {

file modified
+1 -1
@@ -94,7 +94,7 @@ 

  struct ref_array *

  sss_ini_get_ra_error_list(struct sss_ini_initdata *init_data);

  

- /* Get pointer to list of successfuly merged snippet files */

+ /* Get pointer to list of successfully merged snippet files */

  struct ref_array *

  sss_ini_get_ra_success_list(struct sss_ini_initdata *init_data);

  

file modified
+1 -1
@@ -67,7 +67,7 @@ 

  struct tcurl_sock {

      struct tcurl_ctx *tctx;     /* Backchannel to the main context */

  

-     curl_socket_t sockfd;       /* curl socket is an int typedef on Unix */

+     curl_socket_t sockfd;       /* curl socket is an int typedef on UNIX */

      struct tevent_fd *fde;      /* tevent tracker of the fd events */

  };

  

file modified
+1 -1
@@ -74,7 +74,7 @@ 

                  return ret;

              }

          } else if (ret == 0) {

-             /* File successfuly locked */

+             /* File successfully locked */

              break;

          }

      }

no initial comment

Please do not change src/man/po/sssd-docs.pot. IIRC it is autogenerated before release.

Please also rebase on top of current master

rebased onto 1b230f8

6 years ago

I believe you. I still have to gain experience with the Zanata-based translation workflow.
Rebase has been performed. Changes to src/man/po/sssd-docs.pot have been dropped. While checking the result I found 2 more minor spelling mistakes that I previously missed (excceed ; until sssd in initialized.). Changes have been forcefully pushed.

Commit a02a5ed fixes this pull-request

Pull-Request has been merged by liebundartig@freenet.de

6 years ago
Metadata
Changes Summary 31
+3 -3
file changed
contrib/sssd.spec.in
+1 -1
file changed
src/db/sysdb_private.h
+2 -2
file changed
src/db/sysdb_views.c
+1 -1
file changed
src/examples/sssd-example.conf
+1 -1
file changed
src/lib/idmap/sss_idmap.doxy.in
+1 -1
file changed
src/man/sssd-secrets.5.xml
+2 -2
file changed
src/providers/ad/ad_gpo.c
+1 -1
file changed
src/providers/be_dyndns.c
+1 -1
file changed
src/providers/data_provider/dp_request.c
+1 -1
file changed
src/providers/krb5/krb5_child.c
+1 -1
file changed
src/providers/ldap/sdap_async_sudo.c
+1 -1
file changed
src/responder/kcm/kcmsrv_ccache_json.c
+2 -2
file changed
src/responder/kcm/kcmsrv_op_queue.c
+2 -2
file changed
src/sbus/sssd_dbus_connection.c
+2 -2
file changed
src/shared/safealign.h
+2 -2
file changed
src/sss_client/autofs/sss_autofs.c
+1 -1
file changed
src/sss_client/idmap/sss_nss_idmap.doxy.in
+1 -1
file changed
src/sss_client/libwbclient/wbc_pwd_sssd.c
+5 -5
file changed
src/sss_client/sudo/sss_sudo.h
+1 -1
file changed
src/tests/cmocka/common_mock_resp_dp.c
+1 -1
file changed
src/tests/cmocka/test_sbus_opath.c
+1 -1
file changed
src/tools/common/sss_process.c
+1 -1
file changed
src/tools/common/sss_process.h
+2 -2
file changed
src/tools/sssctl/sssctl.c
+1 -1
file changed
src/tools/sssctl/sssctl_data.c
+1 -1
file changed
src/util/crypto/libcrypto/crypto_sha512crypt.c
+1 -1
file changed
src/util/crypto/nss/nss_sha512crypt.c
+3 -3
file changed
src/util/server.c
+1 -1
file changed
src/util/sss_ini.h
+1 -1
file changed
src/util/tev_curl.c
+1 -1
file changed
src/util/util_lock.c