[yast-commit] r39197 - in /trunk/kerberos-server/src: advanced_items.ycp helps.ycp
Author: mcalmer Date: Fri Jul 6 12:49:40 2007 New Revision: 39197 URL: http://svn.opensuse.org/viewcvs/yast?rev=39197&view=rev Log: add advanced help texts Modified: trunk/kerberos-server/src/advanced_items.ycp trunk/kerberos-server/src/helps.ycp Modified: trunk/kerberos-server/src/advanced_items.ycp URL: http://svn.opensuse.org/viewcvs/yast/trunk/kerberos-server/src/advanced_items.ycp?rev=39197&r1=39196&r2=39197&view=diff ============================================================================== --- trunk/kerberos-server/src/advanced_items.ycp (original) +++ trunk/kerberos-server/src/advanced_items.ycp Fri Jul 6 12:49:40 2007 @@ -725,7 +725,8 @@ `VBox(`TextEntry(`id(`id_database_name), _("&Database Path"), KerberosServer::getDBvalue("database_name")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_database_name"]:"") ) ), "getCallback" : ``(get_adv_database_name()), @@ -736,7 +737,8 @@ `VBox(`TextEntry(`id(`id_acl_file), _("ACL &File"), KerberosServer::getDBvalue("acl_file")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_acl_file"]:"") ) ), "getCallback" : ``(get_adv_acl_file()), @@ -746,7 +748,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_admin_keytab),"", KerberosServer::getDBvalue("admin_keytab")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_admin_keytab"]:"") ) ), "getCallback" : ``(get_adv_admin_keytab()), @@ -756,7 +759,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_default_principal_expiration),"", KerberosServer::getDBvalue("default_principal_expiration")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_default_principal_expiration"]:"") ) ), "getCallback" : ``(get_adv_default_principal_expiration()), @@ -786,19 +790,22 @@ // checkbox text in MultiSelectionBox _("Requires hwauth"), false)), // checkbox text in MultiSelectionBox - `Left(`CheckBox(`id (`kdc_flags_allow_svr), _("Allow svr"), false)), + `Left(`CheckBox(`id (`kdc_flags_allow_svr), + _("Allow service"), false)), `Left(`CheckBox(`id (`kdc_flags_allow_tgs_req), // checkbox text in MultiSelectionBox _("Allow tgs request"), false)), // checkbox text in MultiSelectionBox - `Left(`CheckBox(`id (`kdc_flags_allow_tix), _("Allow tix"), false)), + `Left(`CheckBox(`id (`kdc_flags_allow_tix), + _("Allow tickets"), false)), `Left(`CheckBox(`id (`kdc_flags_needchange), // checkbox text in MultiSelectionBox _("Needchange"), false)), `Left(`CheckBox(`id (`kdc_flags_password_changing_service), // checkbox text in MultiSelectionBox _("Password changing service"), false)), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_default_principal_flags"]:"") ) ), "default" : ``(get_adv_default_principal_flags()), @@ -809,7 +816,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_dict_file), "", KerberosServer::getDBvalue("dict_file")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_dict_file"]:"") ) ), "getCallback" : ``(get_adv_dict_file()), @@ -819,7 +827,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_kadmind_port), "", KerberosServer::getDBvalue("kadmind_port")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_kadmind_port"]:"") ) ), "getCallback" : ``(get_adv_kadmind_port()), @@ -829,7 +838,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_kpasswd_port), "", KerberosServer::getDBvalue("kpasswd_port")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_kpasswd_port"]:"") ) ), "getCallback" : ``(get_adv_kpasswd_port()), @@ -839,7 +849,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_key_stash_file), "", KerberosServer::getDBvalue("key_stash_file")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_key_stash_file"]:"") ) ), "getCallback" : ``(get_adv_key_stash_file()), @@ -849,7 +860,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_kdc_ports), "", KerberosServer::getDBvalue("kdc_ports")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_kdc_ports"]:"") ) ), "getCallback" : ``(get_adv_kdc_ports()), @@ -859,7 +871,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_master_key_name), "", KerberosServer::getDBvalue("master_key_name")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_master_key_name"]:"") ) ), "getCallback" : ``(get_adv_master_key_name()), @@ -869,7 +882,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_master_key_type), "", KerberosServer::getDBvalue("master_key_type")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_master_key_type"]:"") ) ), "getCallback" : ``(get_adv_master_key_type()), @@ -885,7 +899,9 @@ 0, 365, 0), `Time(`id(`id_max_life_time), _("Time")) - ) + ), + `VSpacing(1.5), + `RichText( HELPS["adv_max_life"]:"") ) ), "default" : ``(get_adv_max_life()), @@ -902,7 +918,9 @@ 0, 365, 0), `Time(`id(`id_max_renewable_life_time), _("Time")) - ) + ), + `VSpacing(1.5), + `RichText( HELPS["adv_max_renew_life"]:"") ) ), "default" : ``(get_adv_max_renewable_life()), @@ -913,7 +931,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_supported_enctypes), "", KerberosServer::getDBvalue("supported_enctypes")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_supported_enctypes"]:"") ) ), "getCallback" : ``(get_adv_supported_enctypes()), @@ -923,7 +942,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_kdc_supported_enctypes), "", KerberosServer::getDBvalue("kdc_supported_enctypes")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_kdc_supported_enctypes"]:"") ) ), "getCallback" : ``(get_adv_kdc_supported_enctypes()), @@ -933,7 +953,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_reject_bad_transit), "", KerberosServer::getDBvalue("reject_bad_transit")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_reject_bad_transit"]:"") ) ), "getCallback" : ``(get_adv_reject_bad_transit()), @@ -943,7 +964,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_ldap_conns_per_server), "", KerberosServer::getLdapDBvalue("ldap_conns_per_server")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_ldap_conns_per_server"]:"") ) ), "getCallback" : ``(get_adv_ldap_conns_per_server()), @@ -953,7 +975,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_ldap_service_password_file), "", KerberosServer::getLdapDBvalue("ldap_service_password_file")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_ldap_service_password_file"]:"") ) ), "getCallback" : ``(get_adv_ldap_service_password_file()), @@ -971,7 +994,9 @@ (KerberosServer::getKdbvalue("kdb_sscope") == "sub")?true:false)), `Left(`RadioButton(`id(`one), _("one level"), (KerberosServer::getKdbvalue("kdb_sscope") == "sub")?false:true)) - )))) + )))), + `VSpacing(1.5), + `RichText( HELPS["adv_kdb_subtrees"]:"") ) ), "getCallback" : ``(get_adv_kdb_subtrees()), @@ -981,7 +1006,8 @@ "widget" : `Frame ("", `VBox(`TextEntry(`id(`id_kdb_containerref), "", KerberosServer::getKdbvalue("kdb_containerref")), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_kdb_containerref"]:"") ) ), "getCallback" : ``(get_adv_kdb_containerref()), @@ -997,7 +1023,9 @@ 0, 365, 0), `Time(`id(`id_kdb_maxtktlife_time), _("Time")) - ) + ), + `VSpacing(1.5), + `RichText( HELPS["adv_kdb_maxtktlife"]:"") ) ), "default" : ``(get_adv_kdb_maxtktlife()), @@ -1014,7 +1042,9 @@ 0, 365, 0), `Time(`id(`id_kdb_maxrenewlife_time), _("Time")) - ) + ), + `VSpacing(1.5), + `RichText( HELPS["adv_kdb_maxrenewlife"]:"") ) ), "default" : ``(get_adv_kdb_maxrenewlife()), @@ -1045,19 +1075,22 @@ // checkbox text in MultiSelectionBox _("Requires hwauth"), false)), // checkbox text in MultiSelectionBox - `Left(`CheckBox(`id (`kdb_flags_allow_svr), _("Allow svr"), false)), + `Left(`CheckBox(`id (`kdb_flags_allow_svr), + _("Allow service"), false)), `Left(`CheckBox(`id (`kdb_flags_allow_tgs_req), // checkbox text in MultiSelectionBox _("Allow tgs request"), false)), // checkbox text in MultiSelectionBox - `Left(`CheckBox(`id (`kdb_flags_allow_tix), _("Allow tix"), false)), + `Left(`CheckBox(`id (`kdb_flags_allow_tix), + _("Allow tickets"), false)), `Left(`CheckBox(`id (`kdb_flags_needchange), // checkbox text in MultiSelectionBox _("Needchange"), false)), `Left(`CheckBox(`id (`kdb_flags_password_changing_service), // checkbox text in MultiSelectionBox _("Password changing service"), false)), - `VSpacing(1.5) + `VSpacing(1.5), + `RichText( HELPS["adv_default_principal_flags"]:"") ) ), "default" : ``(get_adv_kdb_flags()), Modified: trunk/kerberos-server/src/helps.ycp URL: http://svn.opensuse.org/viewcvs/yast/trunk/kerberos-server/src/helps.ycp?rev=39197&r1=39196&r2=39197&view=diff ============================================================================== --- trunk/kerberos-server/src/helps.ycp (original) +++ trunk/kerberos-server/src/helps.ycp Fri Jul 6 12:49:40 2007 @@ -130,8 +130,125 @@ _("<p>With the radio buttons you can enable or disable this service</p>") + /* Help text: Summary 3/3 */ - _("<p>When you click on the <big>Edit</big> Button you can change some values of your configuration.</p>") + _("<p>When you click on the <big>Edit</big> Button you can change some values of your configuration.</p>"), + /* ============================================================================== */ + + /* advanced item help */ + "adv_database_name" : _("<p>This string specifies the location of the Kerberos database for this realm.</p>"), + + /* advanced item help */ + "adv_acl_file" : _("<p>This string specifies the location of the access control list (acl) file that kadmin uses to determine which principals are allowed which permissions on the database.</p>"), + + /* advanced item help */ + "adv_admin_keytab" : _("<p>This string Specifies the location of the keytab file that kadmin uses to authenticate to the database.</p>"), + + /* advanced item help */ + "adv_default_principal_expiration" : _("<p>This absolute time specifies the default expiration date of principals created in this realm.</p>"), + + /* advanced item help principal_flags 1/13 */ + "adv_default_principal_flags" : _("<p>These flags specifies the default attributes of principals created in this realm.</p>") + + + "<ul><li><b>"+_("Allow postdated")+"</b> "+ + /* advanced item help principal_flags 2/13 */ + _("Enabling this flag allows the principal to obtain postdateable tickets.")+"</li>" + + + "<li><b>"+_("Allow forwardable")+"</b> "+ + /* advanced item help principal_flags 3/13 */ + _("Enabling this flag allows the principal to obtain forwardable tickets.")+"</li>" + + + "<li><b>"+_("Allow renewable")+"</b> "+ + /* advanced item help principal_flags 4/13 */ + _("Enabling this flag allows the principal to obtain renewable tickets.")+"</li>" + + + "<li><b>"+_("Allow proxiable")+"</b> "+ + /* advanced item help principal_flags 5/13 */ + _("Enabling this flag allows the principal to obtain proxy tickets.")+"</li>" + + + "<li><b>"+_("Enable user-to-user authentication")+"</b> "+ + /* advanced item help principal_flags 6/13 */ + _("Enabling this flag allows the principal to obtain a session key for another user, permitting user-to-user authentication for this principal.")+"</li>" + + + "<li><b>"+_("Requires preauth")+"</b> "+ + /* advanced item help principal_flags 7/13 */ + _("If this flag is enabled on a client principal, then that principal is required to preauthenticate to the KDC before receiving any tickets. On a service principal, enabling this flag means that service tickets for this principal will only be issued to clients with a TGT that has the preauthenticated ticket set.")+"</li>" + + + "<li><b>"+_("Requires hwauth")+"</b> "+ + /* advanced item help principal_flags 8/13 */ + _("If this flag is enabled, then the principal is required to preauthenticate using a hardware device before receiving any tickets.")+"</li>" + + + "<li><b>"+_("Allow service")+"</b> "+ + /* advanced item help principal_flags 9/13 */ + _("Enabling this flag allows the KDC to issue service tickets for this principal.")+"</li>" + + + "<li><b>"+_("Allow tgs request")+"</b> "+ + /* advanced item help principal_flags 10/13 */ + _("Enabling this flag allows a principal to obtain tickets based on a ticket-granting-ticket, rather than repeating the authentication process that was used to obtain the TGT.")+"</li>" + + + "<li><b>"+_("Allow tickets")+"</b> "+ + /* advanced item help principal_flags 11/13 */ + _("Enabling this flag means that the KDC will issue tickets for this principal. Disabling this flag essentially deactivates the principal within this realm.")+"</li>" + + + "<li><b>"+_("Needchange")+"</b> "+ + /* advanced item help principal_flags 12/13 */ + _("Enabling this flag forces a password change for this principal.")+"</li>" + + + "<li><b>"+_("Password changing service")+"</b> "+ + /* advanced item help principal_flags 13/13 */ + _("If this flag is enabled, it marks this principal as a password change service. This should only be used in special cases, for example, if a user's password has expired, the user has to get tickets for that principal to be able to change it without going through the normal password authentication.")+"</li></ul>", + + /* advanced item help */ + "adv_dict_file" : _("<p>This string location of the dictionary file containing strings that are not allowed as passwords. If this tag is not set or if there is no policy assigned to the principal, then no check will be done.</p>"), + + /* advanced item help */ + "adv_kadmind_port" : _("<p>This port number specifies the port on which the kadmind daemon is to listen for this realm.</p>"), + + /* advanced item help */ + "adv_kpasswd_port" : _("<p>This port number specifies the port on which the kadmind daemon is to listen for this realm.</p>"), + + /* advanced item help */ + "adv_key_stash_file" : _("<p>This string specifies the location where the master key has been stored with kdb5_stash.</p>"), + + /* advanced item help */ + "adv_kdc_ports" : _("<p>This string specifies the list of ports that the KDC is to listen to for this realm.</p>"), + + /* advanced item help */ + "adv_master_key_name" : _("<p>This string specifies the name of the principal associated with the master key. The default value is K/M.</p>"), + + /* advanced item help */ + "adv_master_key_type" : _("<p>This key type string represents the master key's key type.</p>"), + + /* advanced item help */ + "adv_max_life" : _("<p>This delta time specifes the maximum time period that a ticket may be valid for in this realm.</p>"), + /* advanced item help */ + "adv_max_renew_life" : _("<p>This delta time specifies the maximum time period that a ticket may be renewed for in this realm.</p>"), + + /* advanced item help */ + "adv_supported_enctypes" : _("<p>A List of key:salt strings that specifies the default key/salt combinations of principals for this realm.</p>"), + + /* advanced item help */ + "adv_kdc_supported_enctypes" : _("<p>Specifies the permitted key-salt combinations of principals for this realm.</p>"), + + /* advanced item help */ + "adv_reject_bad_transit" : _("<p>Specifies whether or not the list of transited realms for cross-realm tickets should be checked against the transit path computed from the realm names and the [capaths] section of its krb5.conf file</p>"), + + /* advanced item help */ + "adv_ldap_conns_per_server" : _("<p>This LDAP specific tag indicates the number of connections to be maintained per LDAP server.</p>"), + + /* advanced item help */ + "adv_ldap_service_password_file" : _("<p>This LDAP specific tag indicates the file containing the stashed passwords for the objects used for starting the Kerberos servers.</p>"), + + /* advanced item help */ + "adv_kdb_subtrees" : _("<p>Specifies the list of subtrees containing the principals of a realm. The list contains the DNs of the subtree objects separated by colon(:).</p><p>The search scope specifies the scope for searching the principals under the subtree.</p>"), + + /* advanced item help */ + "adv_kdb_containerref" : _("<p>Specifies the DN of the container object in which the principals of a realm will be created. If the container reference is not configured for a realm, the principals will be created in the realm container.</p>"), + + /* advanced item help */ + "adv_kdb_maxtktlife" : _("<p>Specifies maximum ticket life for principals in this realm.</p>"), + + /* advanced item help */ + "adv_kdb_maxrenewlife" : _("<p>Specifies maximum renewable life of tickets for principals in this realm.</p>") ]; /* EOF */ -- To unsubscribe, e-mail: yast-commit+unsubscribe@opensuse.org For additional commands, e-mail: yast-commit+help@opensuse.org
participants (1)
-
mcalmer@svn.opensuse.org