Fix typos
Typos found with codespell. Signed-off-by: Samanta Navarro <ferivoz@riseup.net>
This commit is contained in:
parent
194014678e
commit
b312bc0b4d
@ -60,7 +60,7 @@
|
|||||||
** Added in the password date field, which should always reflect the last
|
** Added in the password date field, which should always reflect the last
|
||||||
** date the password was changed, for expiry purposes. "passwd" always
|
** date the password was changed, for expiry purposes. "passwd" always
|
||||||
** updates this field, so the adduser program should set it up right
|
** updates this field, so the adduser program should set it up right
|
||||||
** initially (or a user could keep thier initial password forever ;)
|
** initially (or a user could keep their initial password forever ;)
|
||||||
** The number is in days since Jan 1st, 1970.
|
** The number is in days since Jan 1st, 1970.
|
||||||
**
|
**
|
||||||
** Have fun with it, and someone please make
|
** Have fun with it, and someone please make
|
||||||
|
@ -2,6 +2,6 @@
|
|||||||
#define _SHADOWLOG_INTERNAL_H
|
#define _SHADOWLOG_INTERNAL_H
|
||||||
|
|
||||||
extern const char *shadow_progname; /* Program name showed in error messages */
|
extern const char *shadow_progname; /* Program name showed in error messages */
|
||||||
extern FILE *shadow_logfd; /* file descripter to which error messages are printed */
|
extern FILE *shadow_logfd; /* file descriptor to which error messages are printed */
|
||||||
|
|
||||||
#endif /* _SHADOWLOG_INTERNAL_H */
|
#endif /* _SHADOWLOG_INTERNAL_H */
|
||||||
|
@ -985,7 +985,7 @@ bool new_subid_range(struct subordinate_range *range, enum subid_type id_type, b
|
|||||||
switch (id_type) {
|
switch (id_type) {
|
||||||
case ID_TYPE_UID:
|
case ID_TYPE_UID:
|
||||||
if (!sub_uid_lock()) {
|
if (!sub_uid_lock()) {
|
||||||
printf("Failed loging subuids (errno %d)\n", errno);
|
printf("Failed locking subuids (errno %d)\n", errno);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (!sub_uid_open(O_CREAT | O_RDWR)) {
|
if (!sub_uid_open(O_CREAT | O_RDWR)) {
|
||||||
@ -997,7 +997,7 @@ bool new_subid_range(struct subordinate_range *range, enum subid_type id_type, b
|
|||||||
break;
|
break;
|
||||||
case ID_TYPE_GID:
|
case ID_TYPE_GID:
|
||||||
if (!sub_gid_lock()) {
|
if (!sub_gid_lock()) {
|
||||||
printf("Failed loging subgids (errno %d)\n", errno);
|
printf("Failed locking subgids (errno %d)\n", errno);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (!sub_gid_open(O_CREAT | O_RDWR)) {
|
if (!sub_gid_open(O_CREAT | O_RDWR)) {
|
||||||
@ -1057,7 +1057,7 @@ bool release_subid_range(struct subordinate_range *range, enum subid_type id_typ
|
|||||||
switch (id_type) {
|
switch (id_type) {
|
||||||
case ID_TYPE_UID:
|
case ID_TYPE_UID:
|
||||||
if (!sub_uid_lock()) {
|
if (!sub_uid_lock()) {
|
||||||
printf("Failed loging subuids (errno %d)\n", errno);
|
printf("Failed locking subuids (errno %d)\n", errno);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (!sub_uid_open(O_CREAT | O_RDWR)) {
|
if (!sub_uid_open(O_CREAT | O_RDWR)) {
|
||||||
@ -1069,7 +1069,7 @@ bool release_subid_range(struct subordinate_range *range, enum subid_type id_typ
|
|||||||
break;
|
break;
|
||||||
case ID_TYPE_GID:
|
case ID_TYPE_GID:
|
||||||
if (!sub_gid_lock()) {
|
if (!sub_gid_lock()) {
|
||||||
printf("Failed loging subgids (errno %d)\n", errno);
|
printf("Failed locking subgids (errno %d)\n", errno);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (!sub_gid_open(O_CREAT | O_RDWR)) {
|
if (!sub_gid_open(O_CREAT | O_RDWR)) {
|
||||||
|
@ -562,7 +562,7 @@
|
|||||||
<varlistentry condition="gshadow">
|
<varlistentry condition="gshadow">
|
||||||
<term><filename>/etc/gshadow</filename></term>
|
<term><filename>/etc/gshadow</filename></term>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Secure group account informatio.</para>
|
<para>Secure group account information</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
|
@ -625,7 +625,7 @@ int main (int argc, char **argv)
|
|||||||
}
|
}
|
||||||
#endif /* HAVE_SETGROUPS */
|
#endif /* HAVE_SETGROUPS */
|
||||||
/*
|
/*
|
||||||
* For splitted groups (due to limitations of NIS), check all
|
* For split groups (due to limitations of NIS), check all
|
||||||
* groups of the same GID like the requested group for
|
* groups of the same GID like the requested group for
|
||||||
* membership of the current user.
|
* membership of the current user.
|
||||||
*/
|
*/
|
||||||
|
@ -409,7 +409,7 @@ static void get_defaults (void)
|
|||||||
if (MATCH (buf, DGROUPS)) {
|
if (MATCH (buf, DGROUPS)) {
|
||||||
if (get_groups (cp) != 0) {
|
if (get_groups (cp) != 0) {
|
||||||
fprintf (stderr,
|
fprintf (stderr,
|
||||||
_("%s: the '%s' configuraton in %s has an invalid group, ignoring the bad group\n"),
|
_("%s: the '%s' configuration in %s has an invalid group, ignoring the bad group\n"),
|
||||||
Prog, DGROUPS, default_file);
|
Prog, DGROUPS, default_file);
|
||||||
}
|
}
|
||||||
if (user_groups[0] != NULL) {
|
if (user_groups[0] != NULL) {
|
||||||
@ -2323,7 +2323,7 @@ static void create_home (void)
|
|||||||
strcat (path, cp);
|
strcat (path, cp);
|
||||||
if (access (path, F_OK) != 0) {
|
if (access (path, F_OK) != 0) {
|
||||||
/* Check if parent directory is BTRFS, fail if requesting
|
/* Check if parent directory is BTRFS, fail if requesting
|
||||||
subvolume but no BTRFS. The paths cound be different by the
|
subvolume but no BTRFS. The paths could be different by the
|
||||||
trailing slash
|
trailing slash
|
||||||
*/
|
*/
|
||||||
#if WITH_BTRFS
|
#if WITH_BTRFS
|
||||||
|
Loading…
Reference in New Issue
Block a user