mirror of
https://git.openldap.org/openldap/openldap.git
synced 2025-02-23 14:09:39 +08:00
typo unsuccesSful, presense/presence, accessSlog
This commit is contained in:
parent
192282d987
commit
08e1e2c66c
@ -35,7 +35,7 @@ class StringList{
|
||||
* For internal use only
|
||||
*
|
||||
* This constructor is used by the library internally to create a
|
||||
* list of string from a array for c-Strings (char*)thar was
|
||||
* list of string from an array for c-Strings (char*)that was
|
||||
* returned by the C-API
|
||||
*/
|
||||
StringList(char** values);
|
||||
|
@ -1077,7 +1077,7 @@ decoding_error:;
|
||||
return rc;
|
||||
}
|
||||
|
||||
// checkAcess F (ALL)
|
||||
// checkAccess F (ALL)
|
||||
static int
|
||||
rbac_check_access( Operation *op, SlapReply *rs )
|
||||
{
|
||||
@ -1146,7 +1146,7 @@ done:
|
||||
return rs->sr_err;
|
||||
}
|
||||
|
||||
// checkAcess A loop back
|
||||
// checkAccess A loop back
|
||||
static int
|
||||
rbac_check_accessA( Operation *op, SlapReply *rs )
|
||||
{
|
||||
@ -1162,7 +1162,7 @@ rbac_check_accessA( Operation *op, SlapReply *rs )
|
||||
return rc;
|
||||
}
|
||||
|
||||
// checkAcess B parse
|
||||
// checkAccess B parse
|
||||
static int
|
||||
rbac_check_accessB( Operation *op, SlapReply *rs )
|
||||
{
|
||||
@ -1190,7 +1190,7 @@ rbac_check_accessB( Operation *op, SlapReply *rs )
|
||||
return rc;
|
||||
}
|
||||
|
||||
// checkAcess C - parse request & read session record
|
||||
// checkAccess C - parse request & read session record
|
||||
static int
|
||||
rbac_check_accessC( Operation *op, SlapReply *rs )
|
||||
{
|
||||
@ -1230,7 +1230,7 @@ done:
|
||||
return rc;
|
||||
}
|
||||
|
||||
// checkAcess D, parse, read perm
|
||||
// checkAccess D, parse, read perm
|
||||
static int
|
||||
rbac_check_accessD( Operation *op, SlapReply *rs )
|
||||
{
|
||||
@ -1282,7 +1282,7 @@ done:
|
||||
return rc;
|
||||
}
|
||||
|
||||
// checkAcess E everything but the audit insert
|
||||
// checkAccess E everything but the audit insert
|
||||
static int
|
||||
rbac_check_accessE( Operation *op, SlapReply *rs )
|
||||
{
|
||||
|
@ -1695,7 +1695,7 @@ Appendix C. Suggested DIT structure
|
||||
Naming context ObjectClass
|
||||
============================================================
|
||||
ou=people,dc=... posixAccount
|
||||
shadowAcount
|
||||
shadowAccount
|
||||
ou=group,dc=... posixGroup
|
||||
ou=services,dc=... ipService
|
||||
ou=protocols,dc=... ipProtocol
|
||||
|
@ -1319,7 +1319,7 @@
|
||||
Naming context ObjectClass
|
||||
============================================================
|
||||
ou=people,dc=... posixAccount
|
||||
shadowAcount
|
||||
shadowAccount
|
||||
ou=group,dc=... posixGroup
|
||||
ou=services,dc=... ipService
|
||||
ou=protocols,dc=... ipProtocol
|
||||
|
@ -234,7 +234,7 @@ The accessControlSchemes attribute in the ldapACISubEntry
|
||||
indicates which access control mechanism is in effect for
|
||||
the scope of that ldapACISubEntry. The
|
||||
supportedAccessControlSchemes attribute in the rootDSE
|
||||
indicates which acess control mechanisms are supported by
|
||||
indicates which access control mechanisms are supported by
|
||||
the server; those mechanisms are in effect in that server's
|
||||
DIT unless overridden by a mechanism defined in a
|
||||
ldapACISubEntry elsewhere in that DIT.
|
||||
|
@ -636,7 +636,7 @@ static ConfigTable config_back_cf_table[] = {
|
||||
&config_generic,
|
||||
"( OLcfgBkAt:13.26 "
|
||||
"NAME 'olcBkLloadIOTimeout' "
|
||||
"DESC 'I/O timeout threshold in miliseconds' "
|
||||
"DESC 'I/O timeout threshold in milliseconds' "
|
||||
"EQUALITY integerMatch "
|
||||
"SYNTAX OMsInteger "
|
||||
"SINGLE-VALUE )",
|
||||
|
@ -118,7 +118,7 @@ SLAPD_OBJECTS = $(@PLAT@_SLAPD_OBJECTS)
|
||||
#
|
||||
# 2) be used to generate the symdummy.c file.
|
||||
#
|
||||
# 3) be used to help create slapd.exp, the binary-formated slapd export file.
|
||||
# 3) be used to help create slapd.exp, the binary-formatted slapd export file.
|
||||
#
|
||||
# The import library is used by dynamic modules at link time. With this
|
||||
# library, dynamic modules indicate to the linker that it will resolve
|
||||
|
@ -678,7 +678,7 @@ presence_candidates(
|
||||
rc = 0;
|
||||
} else if( rc != LDAP_SUCCESS ) {
|
||||
Debug( LDAP_DEBUG_TRACE,
|
||||
"<= mdb_presense_candidates: (%s) "
|
||||
"<= mdb_presence_candidates: (%s) "
|
||||
"key read failed (%d)\n",
|
||||
desc->ad_cname.bv_val, rc );
|
||||
goto done;
|
||||
|
@ -3577,7 +3577,7 @@ syncprov_setup_accesslog(void)
|
||||
if ( slap_str2ad( "reqType", &ad_reqType, &text ) ) {
|
||||
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
|
||||
"couldn't get definition for attribute reqType, "
|
||||
"is accessslog configured?\n" );
|
||||
"is accesslog configured?\n" );
|
||||
return rc;
|
||||
}
|
||||
}
|
||||
@ -3586,7 +3586,7 @@ syncprov_setup_accesslog(void)
|
||||
if ( slap_str2ad( "reqResult", &ad_reqResult, &text ) ) {
|
||||
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
|
||||
"couldn't get definition for attribute reqResult, "
|
||||
"is accessslog configured?\n" );
|
||||
"is accesslog configured?\n" );
|
||||
return rc;
|
||||
}
|
||||
}
|
||||
@ -3595,7 +3595,7 @@ syncprov_setup_accesslog(void)
|
||||
if ( slap_str2ad( "reqDN", &ad_reqDN, &text ) ) {
|
||||
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
|
||||
"couldn't get definition for attribute reqDN, "
|
||||
"is accessslog configured?\n" );
|
||||
"is accesslog configured?\n" );
|
||||
return rc;
|
||||
}
|
||||
}
|
||||
@ -3604,7 +3604,7 @@ syncprov_setup_accesslog(void)
|
||||
if ( slap_str2ad( "reqEntryUUID", &ad_reqEntryUUID, &text ) ) {
|
||||
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
|
||||
"couldn't get definition for attribute reqEntryUUID, "
|
||||
"is accessslog configured?\n" );
|
||||
"is accesslog configured?\n" );
|
||||
return rc;
|
||||
}
|
||||
}
|
||||
|
@ -76,7 +76,7 @@ $SLAPCAT -F $CFPRO -g -b "dc=example,dc=com" -l $TESTDIR/slapcat.out >> $TESTOUT
|
||||
RC=$?
|
||||
|
||||
if test $RC != 0 ; then
|
||||
echo "slapcat -g failed for root databse ($RC)!"
|
||||
echo "slapcat -g failed for root database ($RC)!"
|
||||
exit $RC
|
||||
fi
|
||||
|
||||
|
@ -139,7 +139,7 @@ if test $RC != 0 ; then
|
||||
fi
|
||||
|
||||
#
|
||||
# UNSUCCESFUL SEARCH
|
||||
# UNSUCCESSFUL SEARCH
|
||||
#
|
||||
echo "Using ldapsearch with idassert-bind..."
|
||||
$LDAPSEARCH -S "" -b "$BASEDN" -D "cn=Manager,dc=local,dc=com" -H $URI2 -w "secret" \
|
||||
|
Loading…
Reference in New Issue
Block a user