mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
fix minor spelling mistakes
Reviewed-By: Stanislav Laznicka <slaznick@redhat.com>
This commit is contained in:
@@ -375,7 +375,7 @@ def add_external_post_callback(ldap, dn, entry_attrs, failed, completed,
|
||||
membertype - the object type of the member (e.g. host)
|
||||
externalattr - the attribute name that IPA uses to store the membership
|
||||
of the entries that are not managed by IPA
|
||||
(e.g externalhost)
|
||||
(e.g. externalhost)
|
||||
|
||||
Returns the number of completed entries so far (the number of entries
|
||||
handled by IPA incremented by the number of handled external entries) and
|
||||
@@ -445,7 +445,7 @@ def remove_external_post_callback(ldap, dn, entry_attrs, failed, completed,
|
||||
membertype - the object type of the member (e.g. host)
|
||||
externalattr - the attribute name that IPA uses to store the membership
|
||||
of the entries that are not managed by IPA
|
||||
(e.g externalhost)
|
||||
(e.g. externalhost)
|
||||
|
||||
Returns the number of completed entries so far (the number of entries
|
||||
handled by IPA incremented by the number of handled external entries) and
|
||||
|
||||
@@ -259,7 +259,7 @@ EXAMPLES:
|
||||
queries, which cannot be answered from its local cache, to configured
|
||||
forwarders.
|
||||
""") + _("""
|
||||
Semantics of the --forwarder-policy option:
|
||||
Semantics of the --forward-policy option:
|
||||
* none - disable forwarding for the given zone.
|
||||
* first - forward all queries to configured forwarders. If they fail,
|
||||
do resolution using DNS root servers.
|
||||
|
||||
@@ -92,7 +92,7 @@ while creating the ID range.
|
||||
This ID range is then used by the IPA server and the SSSD IPA provider to
|
||||
assign Posix UIDs to users from the trusted domain.
|
||||
|
||||
If e.g a range for a trusted domain is configured with the following values:
|
||||
If e.g. a range for a trusted domain is configured with the following values:
|
||||
base-id = 1200000
|
||||
range-size = 200000
|
||||
rid-base = 0
|
||||
|
||||
@@ -54,7 +54,9 @@ if api.env.in_server and api.env.context in ['lite', 'server']:
|
||||
|
||||
__doc__ = _("""
|
||||
ID Views
|
||||
|
||||
Manage ID Views
|
||||
|
||||
IPA allows to override certain properties of users and groups per each host.
|
||||
This functionality is primarily used to allow migration from older systems or
|
||||
other Identity Management solutions.
|
||||
@@ -357,7 +359,7 @@ class baseidview_apply(LDAPQuery):
|
||||
|
||||
ldap.update_entry(host_entry)
|
||||
|
||||
# If no exception was raised, view assigment went well
|
||||
# If no exception was raised, view assignment went well
|
||||
completed = completed + 1
|
||||
succeeded['host'].append(host)
|
||||
except errors.EmptyModlist:
|
||||
@@ -527,7 +529,7 @@ def resolve_object_to_anchor(ldap, obj_type, obj, fallback_to_ldap):
|
||||
Takes options:
|
||||
ldap - the backend
|
||||
obj_type - either 'user' or 'group'
|
||||
obj - the name of the object, e.g 'admin' or 'testuser'
|
||||
obj - the name of the object, e.g. 'admin' or 'testuser'
|
||||
"""
|
||||
|
||||
try:
|
||||
@@ -546,7 +548,7 @@ def resolve_object_to_anchor(ldap, obj_type, obj, fallback_to_ldap):
|
||||
if required_objectclass not in entry['objectclass']:
|
||||
raise errors.ValidationError(
|
||||
name=_('IPA object'),
|
||||
error=_('system IPA objects (e.g system groups, user '
|
||||
error=_('system IPA objects (e.g. system groups, user '
|
||||
'private groups) cannot be overridden')
|
||||
)
|
||||
|
||||
@@ -559,7 +561,7 @@ def resolve_object_to_anchor(ldap, obj_type, obj, fallback_to_ldap):
|
||||
except errors.NotFound:
|
||||
pass
|
||||
|
||||
# If not successfull, try looking up the object in the trusted domain
|
||||
# If not successful, try looking up the object in the trusted domain
|
||||
try:
|
||||
if _dcerpc_bindings_installed:
|
||||
domain_validator = ipaserver.dcerpc.DomainValidator(api)
|
||||
|
||||
Reference in New Issue
Block a user