typo unsuccesSful, presense/presence, accessSlog

This commit is contained in:
Дилян Палаузов 2022-12-18 14:27:41 +02:00 committed by Quanah Gibson-Mount
parent 192282d987
commit 08e1e2c66c
11 changed files with 19 additions and 19 deletions

View File

@ -35,7 +35,7 @@ class StringList{
* For internal use only
*
* This constructor is used by the library internally to create a
* list of string from a array for c-Strings (char*)thar was
* list of string from an array for c-Strings (char*)that was
* returned by the C-API
*/
StringList(char** values);

View File

@ -1077,7 +1077,7 @@ decoding_error:;
return rc;
}
// checkAcess F (ALL)
// checkAccess F (ALL)
static int
rbac_check_access( Operation *op, SlapReply *rs )
{
@ -1146,7 +1146,7 @@ done:
return rs->sr_err;
}
// checkAcess A loop back
// checkAccess A loop back
static int
rbac_check_accessA( Operation *op, SlapReply *rs )
{
@ -1162,7 +1162,7 @@ rbac_check_accessA( Operation *op, SlapReply *rs )
return rc;
}
// checkAcess B parse
// checkAccess B parse
static int
rbac_check_accessB( Operation *op, SlapReply *rs )
{
@ -1190,7 +1190,7 @@ rbac_check_accessB( Operation *op, SlapReply *rs )
return rc;
}
// checkAcess C - parse request & read session record
// checkAccess C - parse request & read session record
static int
rbac_check_accessC( Operation *op, SlapReply *rs )
{
@ -1230,7 +1230,7 @@ done:
return rc;
}
// checkAcess D, parse, read perm
// checkAccess D, parse, read perm
static int
rbac_check_accessD( Operation *op, SlapReply *rs )
{
@ -1282,7 +1282,7 @@ done:
return rc;
}
// checkAcess E everything but the audit insert
// checkAccess E everything but the audit insert
static int
rbac_check_accessE( Operation *op, SlapReply *rs )
{

View File

@ -1695,7 +1695,7 @@ Appendix C. Suggested DIT structure
Naming context ObjectClass
============================================================
ou=people,dc=... posixAccount
shadowAcount
shadowAccount
ou=group,dc=... posixGroup
ou=services,dc=... ipService
ou=protocols,dc=... ipProtocol

View File

@ -1319,7 +1319,7 @@
Naming context ObjectClass
============================================================
ou=people,dc=... posixAccount
shadowAcount
shadowAccount
ou=group,dc=... posixGroup
ou=services,dc=... ipService
ou=protocols,dc=... ipProtocol

View File

@ -234,7 +234,7 @@ The accessControlSchemes attribute in the ldapACISubEntry
indicates which access control mechanism is in effect for
the scope of that ldapACISubEntry. The
supportedAccessControlSchemes attribute in the rootDSE
indicates which acess control mechanisms are supported by
indicates which access control mechanisms are supported by
the server; those mechanisms are in effect in that server's
DIT unless overridden by a mechanism defined in a
ldapACISubEntry elsewhere in that DIT.

View File

@ -636,7 +636,7 @@ static ConfigTable config_back_cf_table[] = {
&config_generic,
"( OLcfgBkAt:13.26 "
"NAME 'olcBkLloadIOTimeout' "
"DESC 'I/O timeout threshold in miliseconds' "
"DESC 'I/O timeout threshold in milliseconds' "
"EQUALITY integerMatch "
"SYNTAX OMsInteger "
"SINGLE-VALUE )",

View File

@ -118,7 +118,7 @@ SLAPD_OBJECTS = $(@PLAT@_SLAPD_OBJECTS)
#
# 2) be used to generate the symdummy.c file.
#
# 3) be used to help create slapd.exp, the binary-formated slapd export file.
# 3) be used to help create slapd.exp, the binary-formatted slapd export file.
#
# The import library is used by dynamic modules at link time. With this
# library, dynamic modules indicate to the linker that it will resolve

View File

@ -678,7 +678,7 @@ presence_candidates(
rc = 0;
} else if( rc != LDAP_SUCCESS ) {
Debug( LDAP_DEBUG_TRACE,
"<= mdb_presense_candidates: (%s) "
"<= mdb_presence_candidates: (%s) "
"key read failed (%d)\n",
desc->ad_cname.bv_val, rc );
goto done;

View File

@ -3577,7 +3577,7 @@ syncprov_setup_accesslog(void)
if ( slap_str2ad( "reqType", &ad_reqType, &text ) ) {
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
"couldn't get definition for attribute reqType, "
"is accessslog configured?\n" );
"is accesslog configured?\n" );
return rc;
}
}
@ -3586,7 +3586,7 @@ syncprov_setup_accesslog(void)
if ( slap_str2ad( "reqResult", &ad_reqResult, &text ) ) {
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
"couldn't get definition for attribute reqResult, "
"is accessslog configured?\n" );
"is accesslog configured?\n" );
return rc;
}
}
@ -3595,7 +3595,7 @@ syncprov_setup_accesslog(void)
if ( slap_str2ad( "reqDN", &ad_reqDN, &text ) ) {
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
"couldn't get definition for attribute reqDN, "
"is accessslog configured?\n" );
"is accesslog configured?\n" );
return rc;
}
}
@ -3604,7 +3604,7 @@ syncprov_setup_accesslog(void)
if ( slap_str2ad( "reqEntryUUID", &ad_reqEntryUUID, &text ) ) {
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
"couldn't get definition for attribute reqEntryUUID, "
"is accessslog configured?\n" );
"is accesslog configured?\n" );
return rc;
}
}

View File

@ -76,7 +76,7 @@ $SLAPCAT -F $CFPRO -g -b "dc=example,dc=com" -l $TESTDIR/slapcat.out >> $TESTOUT
RC=$?
if test $RC != 0 ; then
echo "slapcat -g failed for root databse ($RC)!"
echo "slapcat -g failed for root database ($RC)!"
exit $RC
fi

View File

@ -139,7 +139,7 @@ if test $RC != 0 ; then
fi
#
# UNSUCCESFUL SEARCH
# UNSUCCESSFUL SEARCH
#
echo "Using ldapsearch with idassert-bind..."
$LDAPSEARCH -S "" -b "$BASEDN" -D "cn=Manager,dc=local,dc=com" -H $URI2 -w "secret" \