summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRené Genz <liebundartig@freenet.de>2017-04-19 08:36:12 +0000
committerLukas Slebodnik <lslebodn@redhat.com>2017-04-19 18:05:34 +0200
commit0a86dede8773ecce91b5bd2ae75a02f9ff89a358 (patch)
tree0e0630ec0fbe844eb7766f3d59c2b31f8324c6a7
parentc6f1bc32774a7cf2f8678499dfbced420be3a3a1 (diff)
downloadsssd-0a86dede8773ecce91b5bd2ae75a02f9ff89a358.tar.gz
sssd-0a86dede8773ecce91b5bd2ae75a02f9ff89a358.tar.xz
sssd-0a86dede8773ecce91b5bd2ae75a02f9ff89a358.zip
minor typo fixes
Merges: https://pagure.io/SSSD/sssd/pull-request/3374 Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> Reviewed-by: Justin Stephenson <jstephen@redhat.com>
-rw-r--r--src/man/idmap_sss.8.xml2
-rw-r--r--src/man/sssd-kcm.8.xml2
-rw-r--r--src/man/sssd-ldap.5.xml8
-rw-r--r--src/man/sssd.conf.5.xml18
-rw-r--r--src/tests/intg/test_files_provider.py2
5 files changed, 16 insertions, 16 deletions
diff --git a/src/man/idmap_sss.8.xml b/src/man/idmap_sss.8.xml
index 4c26a17f9..0b73966e5 100644
--- a/src/man/idmap_sss.8.xml
+++ b/src/man/idmap_sss.8.xml
@@ -32,7 +32,7 @@
<varlistentry>
<term>range = low - high</term>
<listitem><para>
- Defines the available matching uid and gid range for which the
+ Defines the available matching UID and GID range for which the
backend is authoritative.
</para></listitem>
</varlistentry>
diff --git a/src/man/sssd-kcm.8.xml b/src/man/sssd-kcm.8.xml
index 5dc93838e..db50ed8b4 100644
--- a/src/man/sssd-kcm.8.xml
+++ b/src/man/sssd-kcm.8.xml
@@ -48,7 +48,7 @@
<itemizedlist>
<listitem>
<para>
- since the process runs in userspace, it is subject to UID namespacing, ulike the kernel keyring
+ since the process runs in userspace, it is subject to UID namespacing, unlike the kernel keyring
</para>
</listitem>
<listitem>
diff --git a/src/man/sssd-ldap.5.xml b/src/man/sssd-ldap.5.xml
index fae669a8d..739ae15c3 100644
--- a/src/man/sssd-ldap.5.xml
+++ b/src/man/sssd-ldap.5.xml
@@ -965,7 +965,7 @@
domains.
</para>
<para>
- Default: groupType in the AD provider, othewise not
+ Default: groupType in the AD provider, otherwise not
set
</para>
</listitem>
@@ -1591,7 +1591,7 @@
</varlistentry>
<varlistentry>
- <term>ldap_min_id, ldap_max_id (interger)</term>
+ <term>ldap_min_id, ldap_max_id (integer)</term>
<listitem>
<para>
In contrast to the SID based ID mapping which is
@@ -1939,7 +1939,7 @@ ldap_access_filter = (employeeType=admin)
was granted access permission. If they were
granted access during their last login, they will
continue to be granted access while offline and
- vice-versa.
+ vice versa.
</para>
<para>
Default: Empty
@@ -2633,7 +2633,7 @@ ldap_access_filter = (employeeType=admin)
If the option <quote>ldap_use_tokengroups</quote> is
enabled. The searches against Active Directory will
not be restricted and return all groups memberships,
- even with no gid mapping. It is recommended to disable
+ even with no GID mapping. It is recommended to disable
this feature, if group names are not being displayed
correctly.
</para>
diff --git a/src/man/sssd.conf.5.xml b/src/man/sssd.conf.5.xml
index c4e30396f..c71287029 100644
--- a/src/man/sssd.conf.5.xml
+++ b/src/man/sssd.conf.5.xml
@@ -246,7 +246,7 @@
information. SSSD can use more domains
at the same time, but at least one
must be configured or SSSD won't start.
- This parameter described the list of domains
+ This parameter describes the list of domains
in the order you want them to be queried.
A domain name should only consist of alphanumeric
ASCII characters, dashes, dots and underscores.
@@ -264,7 +264,7 @@
<para>
Each domain can have an individual regular
expression configured. For some ID providers
- there are also default regular expressions. See
+ there are also default regular expressions. See
DOMAIN SECTIONS for more info on these regular
expressions.
</para>
@@ -490,7 +490,7 @@
<para>The nickname of the cert to trust
(expected) to sign the OCSP responses.
The certificate with the given nickname
- must be availble in the systems NSS
+ must be available in the systems NSS
database.</para>
<para>This option must be used together
with ocsp_default_responder.</para>
@@ -1253,7 +1253,7 @@ fallback_homedir = /home/%u
</para>
<para>
Note: Please be aware that message is only
- printed for the SSH service unless pam_verbostiy
+ printed for the SSH service unless pam_verbosity
is set to 3 (show all messages and debug
information).
</para>
@@ -1456,13 +1456,13 @@ pam_account_locked_message = Account locked, please contact help desk.
authentication to the PAC responder. The sub-domain provider
collects domain SID and ID ranges of the domain the client is
joined to and of remote trusted domains from the local domain
- controller. If the PAC is decoded and evaluated some of the
+ controller. If the PAC is decoded and evaluated some of the
following operations are done:
<itemizedlist>
<listitem><para>If the remote user does not exist in the
- cache, it is created. The uid is determined with the help
- of the SID, trusted domains will have UPGs and the gid
- will have the same value as the uid. The home directory is
+ cache, it is created. The UID is determined with the help
+ of the SID, trusted domains will have UPGs and the GID
+ will have the same value as the UID. The home directory is
set based on the subdomain_homedir parameter. The shell will
be empty by default, i.e. the system defaults are used, but
can be overwritten with the default_shell parameter.</para>
@@ -2110,7 +2110,7 @@ pam_account_locked_message = Account locked, please contact help desk.
</para>
<para>
<quote>ldap</quote> to change a password stored
- in a LDAP server. See
+ in a LDAP server. See
<citerefentry>
<refentrytitle>sssd-ldap</refentrytitle>
<manvolnum>5</manvolnum>
diff --git a/src/tests/intg/test_files_provider.py b/src/tests/intg/test_files_provider.py
index 8748ac10b..eced3997c 100644
--- a/src/tests/intg/test_files_provider.py
+++ b/src/tests/intg/test_files_provider.py
@@ -433,7 +433,7 @@ def test_incomplete_user_fail(setup_pw_with_canary, files_domain_only):
Test resolving an incomplete user where the missing field is required
to be present in the user record and thus the user shouldn't resolve.
- We cannot test uid and gid missing because nss_wrapper doesn't even
+ We cannot test UID and GID missing because nss_wrapper doesn't even
load the malformed passwd file, then.
"""
bad_incomplete_user_setup(setup_pw_with_canary, 'name')