Author: jreidinger Date: Mon Jun 13 10:26:30 2011 New Revision: 64320 URL: http://svn.opensuse.org/viewcvs/yast?rev=64320&view=rev Log: fix types in translatable strings (BNC#693326) Modified: branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/GenProf.ycp branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/LogProf.ycp branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/apparmor_ycp_utils.ycp branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/capabilities.ycp branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/profile_dialogs.ycp Modified: branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/GenProf.ycp URL: http://svn.opensuse.org/viewcvs/yast/branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/GenProf.ycp?rev=64320&r1=64319&r2=64320&view=diff ============================================================================== --- branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/GenProf.ycp (original) +++ branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/GenProf.ycp Mon Jun 13 10:26:30 2011 @@ -182,7 +182,7 @@ execute permissions provide added security by stripping the environment that is inherited by the child program of specific variables. You will be prompted to choose whether you want to sanitize the - enviroment if you choose 'p' or 'u' during the profiling process. + environment if you choose 'p' or 'u' during the profiling process. The variables are: <ul> <li>GCONV_PATH</li> Modified: branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/LogProf.ycp URL: http://svn.opensuse.org/viewcvs/yast/branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/LogProf.ycp?rev=64320&r1=64319&r2=64320&view=diff ============================================================================== --- branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/LogProf.ycp (original) +++ branches/SuSE-Code-11-SP2-Branch/apparmor/src/clients/LogProf.ycp Mon Jun 13 10:26:30 2011 @@ -177,7 +177,7 @@ <br> The Clean Exec option for the discrete profile and unconstrained execute permissions provide added security by stripping the - enviroment that is inherited by the child program of specific + environment that is inherited by the child program of specific variables. You will be prompted to choose whether you want to sanitize the environment if you choose 'p' or 'u' during the profiling process. The variables are: Modified: branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/apparmor_ycp_utils.ycp URL: http://svn.opensuse.org/viewcvs/yast/branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/apparmor_ycp_utils.ycp?rev=64320&r1=64319&r2=64320&view=diff ============================================================================== --- branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/apparmor_ycp_utils.ycp (original) +++ branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/apparmor_ycp_utils.ycp Mon Jun 13 10:26:30 2011 @@ -25,7 +25,7 @@ map CMDS = $[ ]; CMDS["CMD_ALLOW"] = _("&Allow"); CMDS["CMD_DENY"] = _("&Deny"); - CMDS["CMD_ABORT"] = _("Abo(r)t"); + CMDS["CMD_ABORT"] = _("Abo&rt"); CMDS["CMD_FINISHED"] = Label::FinishButton(); CMDS["CMD_AUDIT_NEW"] = _("Audi&t"); CMDS["CMD_AUDIT_OFF"] = _("Audi&t off"); @@ -196,7 +196,7 @@ `HSpacing(1) ), `VSpacing(1), - `PushButton(`id(`signin), _("&Signin as existing user...")) + `PushButton(`id(`signin), _("&Sign in as existing user...")) ); UI::OpenDialog(`opt(`decorated), dialog); Modified: branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/capabilities.ycp URL: http://svn.opensuse.org/viewcvs/yast/branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/capabilities.ycp?rev=64320&r1=64319&r2=64320&view=diff ============================================================================== --- branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/capabilities.ycp (original) +++ branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/capabilities.ycp Mon Jun 13 10:26:30 2011 @@ -72,7 +72,7 @@ "linux_immutable" : $[ "name" : "CAP_LINUX_IMMUTABLE", - "info" : _("<ul><li>Allow modification of S_IMMUTABLE and S_APPEND file attributes</li></ul>"), + "info" : _("<ul><li>Allows modification of S_IMMUTABLE and S_APPEND file attributes</li></ul>"), ], "net_bind_service" : @@ -84,25 +84,25 @@ "net_broadcast" : $[ "name" : "CAP_NET_BROADCAST", - "info" : _("<ul><li> Allow broadcasting, listen to multicast </li></ul>"), + "info" : _("<ul><li> Allows broadcasting, listen to multicast </li></ul>"), ], "net_admin" : $[ "name" : "CAP_NET_ADMIN", - "info" : _("<ul><li> Allow interface configuration</li> <li> Allow administration of IP firewall, masquerading and accounting</li> <li> Allow setting debug option on sockets</li> <li> Allow modification of routing tables</li> <li> Allow setting arbitrary process / process group ownership on sockets</li> <li> Allow binding to any address for transparent proxying</li> <li> Allow setting TOS (type of service)</li> <li> Allow setting promiscuous mode</li> <li> Allow clearing driver statistics</li> <li> Allow multicasting</li> <li> Allow read/write of device-specific registers</li> <li> Allow activation of ATM control sockets </li></ul>"), + "info" : _("<ul><li> Allows interface configuration</li> <li> Allows administration of IP firewall, masquerading and accounting</li> <li> Allows setting debug option on sockets</li> <li> Allows modification of routing tables</li> <li> Allows setting arbitrary process / process group ownership on sockets</li> <li> Allows binding to any address for transparent proxying</li> <li> Allows setting TOS (type of service)</li> <li> Allows setting promiscuous mode</li> <li> Allows clearing driver statistics</li> <li> Allows multicasting</li> <li> Allows read/write of device-specific registers</li> <li> Allows activation of ATM control sockets </li></ul>"), ], "net_raw" : $[ "name" : "CAP_NET_RAW", - "info" : _("<ul><li> Allow use of RAW sockets</li> <li> Allow use of PACKET sockets </li></ul>"), + "info" : _("<ul><li> Allows use of RAW sockets</li> <li> Allows use of PACKET sockets </li></ul>"), ], "ipc_lock" : $[ "name" : "CAP_IPC_LOCK", - "info" : _("<ul><li> Allow locking of shared memory segments</li> <li> Allow mlock and mlockall (which doesn't really have anything to do with IPC) </li></ul>"), + "info" : _("<ul><li> Allows locking of shared memory segments</li> <li> Allows mlock and mlockall (which doesn't really have anything to do with IPC) </li></ul>"), ], "ipc_owner" : @@ -120,68 +120,68 @@ "sys_rawio" : $[ "name" : "CAP_SYS_RAWIO", - "info" : _("<ul><li> Allow ioperm/iopl access</li> <li> Allow sending USB messages to any device via /proc/bus/usb </li></ul>"), + "info" : _("<ul><li> Allows ioperm/iopl access</li> <li> Allows sending USB messages to any device via /proc/bus/usb </li></ul>"), ], "sys_chroot" : $[ "name" : "CAP_SYS_CHROOT", - "info" : _("<ul><li> Allow use of chroot() </li></ul>"), + "info" : _("<ul><li> Allows use of chroot() </li></ul>"), ], "sys_ptrace" : $[ "name" : "CAP_SYS_PTRACE", - "info" : _("<ul><li> Allow ptrace() of any process </li></ul>"), + "info" : _("<ul><li> Allows ptrace() of any process </li></ul>"), ], "sys_pacct" : $[ "name" : "CAP_SYS_PACCT", - "info" : _("<ul><li> Allow configuration of process accounting </li></ul>"), + "info" : _("<ul><li> Allows configuration of process accounting </li></ul>"), ], "sys_admin" : $[ "name" : "CAP_SYS_ADMIN", - "info" : _("<ul><li> Allow configuration of the secure attention key</li> <li> Allow administration of the random device</li> <li> Allow examination and configuration of disk quotas</li> <li> Allow configuring the kernel's syslog (printk behaviour)</li> <li> Allow setting the domain name</li> <li> Allow setting the hostname</li> <li> Allow calling bdflush()</li> <li> Allow mount() and umount(), setting up new smb connection</li> <li> Allow some autofs root ioctls</li> <li> Allow nfsservctl</li> <li> Allow VM86_REQUEST_IRQ</li> <li> Allow to read/write pci config on alpha</li> <li> Allow irix_prctl on mips (setstacksize)</li> <li> Allow flushing all cache on m68k (sys_cacheflush)</li> <li> Allow removing semaphores</li> <li> Used instead of CAP_CHOWN to \"chown\" IPC message queues, semaphores and shared memory</li> <li> Allow locking/unlocking of shared memory segment</li> <li> Allow turning swap on/off</li> <li> Allow forged pids on socket credentials passing</li> <li> A llow setting read ahead and flushing buffers on block devices</li> <li> Allow setting geometry in floppy driver</li> <li> Allow turning DMA on/off in xd driver</li> <li> Allow administration of md devices (mostly the above, but some extra ioctls)</li> <li> Allow tuning the ide driver</li> <li> Allow access to the nvram device</li> <li> Allow administration of apm_bios, serial and bttv (TV) device</li> <li> Allow manufacturer commands in isdn CAPI support driver</li> <li> Allow reading non-standardized portions of pci configuration space</li> <li> Allow DDI debug ioctl on sbpcd driver</li> <li> Allow setting up serial ports</li> <li> Allow sending raw qic-117 commands</li> <li> Allow enabling/disabling tagged queuing on SCSI controllers and sending arbitrary SCSI commands</li> <li> Allow setting encryption key on loopback filesystem </li></ul>"), + "info" : _("<ul><li> Allows configuration of the secure attention key</li> <li> Allows administration of the random device</li> <li> Allows examination and configuration of disk quotas</li> <li> Allows configuring the kernel's syslog (printk behaviour)</li> <li> Allows setting the domain name</li> <li> Allows setting the hostname</li> <li> Allows calling bdflush()</li> <li> Allows mount() and umount(), setting up new smb connection</li> <li> Allows some autofs root ioctls</li> <li> Allows nfsservctl</li> <li> Allows VM86_REQUEST_IRQ</li> <li> Allows to read/write pci config on alpha</li> <li> Allows irix_prctl on mips (setstacksize)</li> <li> Allows flushing all cache on m68k (sys_cacheflush)</li> <li> Allows removing semaphores</li> <li> Used instead of CAP_CHOWN to \"chown\" IPC message queues, semaphores and shared memory</li> <li> Allows locking/unlocking of shared memory segment</li> <li> Allows turning swap on/off</li> <li> Allows forged pids on socket credentials p assing</li> <li> Allows setting read ahead and flushing buffers on block devices</li> <li> Allows setting geometry in floppy driver</li> <li> Allows turning DMA on/off in xd driver</li> <li> Allows administration of md devices (mostly the above, but some extra ioctls)</li> <li> Allows tuning the ide driver</li> <li> Allows access to the nvram device</li> <li> Allows administration of apm_bios, serial and bttv (TV) device</li> <li> Allows manufacturer commands in isdn CAPI support driver</li> <li> Allows reading non-standardized portions of pci configuration space</li> <li> Allows DDI debug ioctl on sbpcd driver</li> <li> Allows setting up serial ports</li> <li> Allows sending raw qic-117 commands</li> <li> Allows enabling/disabling tagged queuing on SCSI controllers and sending arbitrary SCSI commands</li> <li> Allows setting encryption key on loopback filesystem </li></ul>"), ], "sys_boot" : $[ "name" : "CAP_SYS_BOOT", - "info" : _("<ul><li> Allow use of reboot() </li></ul>"), + "info" : _("<ul><li> Allows use of reboot() </li></ul>"), ], "sys_nice" : $[ "name" : "CAP_SYS_NICE", - "info" : _("<ul><li> Allow raising priority and setting priority on other (different UID) processes</li> <li> Allow use of FIFO and round-robin (realtime) scheduling on own processes and setting the scheduling algorithm used by another process.</li> <li> Allow setting cpu affinity on other processes </li></ul>"), + "info" : _("<ul><li> Allows raising priority and setting priority on other (different UID) processes</li> <li> Allows use of FIFO and round-robin (realtime) scheduling on own processes and setting the scheduling algorithm used by another process.</li> <li> Allows setting cpu affinity on other processes </li></ul>"), ], "sys_resource" : $[ "name" : "CAP_SYS_RESOURCE", - "info" : _("<ul><li> Override resource limits. Set resource limits.</li> <li> Override quota limits.</li> <li> Override reserved space on ext2 filesystem</li> <li> Modify data journaling mode on ext3 filesystem (uses journaling resources)</li> <li> NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too</li> <li> Override size restrictions on IPC message queues</li> <li> Allow more than 64hz interrupts from the real-time clock</li> <li> Override max number of consoles on console allocation</li> <li> Override max number of keymaps </li></ul>"), + "info" : _("<ul><li> Override resource limits. Set resource limits.</li> <li> Override quota limits.</li> <li> Override reserved space on ext2 filesystem</li> <li> Modify data journaling mode on ext3 filesystem (uses journaling resources)</li> <li> NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too</li> <li> Override size restrictions on IPC message queues</li> <li> Allows more than 64hz interrupts from the real-time clock</li> <li> Override max number of consoles on console allocation</li> <li> Override max number of keymaps </li></ul>"), ], "sys_time" : $[ "name" : "CAP_SYS_TIME", - "info" : _("<ul><li> Allow manipulation of system clock</li> <li> Allow irix_stime on mips</li> <li> Allow setting the real-time clock </li></ul>"), + "info" : _("<ul><li> Allows manipulation of system clock</li> <li> Allows irix_stime on mips</li> <li> Allows setting the real-time clock </li></ul>"), ], "sys_tty_config" : $[ "name" : "CAP_SYS_TTY_CONFIG", - "info" : _("<ul><li> Allow configuration of tty devices</li> <li> Allow vhangup() of tty </li></ul>"), + "info" : _("<ul><li> Allows configuration of tty devices</li> <li> Allows vhangup() of tty </li></ul>"), ], "mknod" : $[ "name" : "CAP_MKNOD", - "info" : _("<ul><li> Allow the privileged aspects of mknod() </li></ul>"), + "info" : _("<ul><li> Allows the privileged aspects of mknod() </li></ul>"), ], "lease" : $[ "name" : "CAP_LEASE", - "info" : _("<ul><li> Allow taking of leases on files </li></ul>"), + "info" : _("<ul><li> Allows taking of leases on files </li></ul>"), ], ]; Modified: branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/profile_dialogs.ycp URL: http://svn.opensuse.org/viewcvs/yast/branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/profile_dialogs.ycp?rev=64320&r1=64319&r2=64320&view=diff ============================================================================== --- branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/profile_dialogs.ycp (original) +++ branches/SuSE-Code-11-SP2-Branch/apparmor/src/include/subdomain/profile_dialogs.ycp Mon Jun 13 10:26:30 2011 @@ -782,7 +782,7 @@ /* help text - part x5 */ string help_net = _("<li><b>Network Entry</b><br>Add a network rule entry to this profile. This option will allow you to specify network access privileges for the profile. You may specify a network address family and socket type.</li>"); /* help text - part x6 */ - string helpHat = _("<li><b>Hat</b><br>Add a sub-profile for this profile - called a Hat. This option is analagous to manually creating a new profile, which can selected during execution only in the context of being asked for by a <b>changehat aware</b> application. For more information on changehat please see <b>man changehat</b> on your system or the Novell AppArmor Administration Guide.</li>"); + string helpHat = _("<li><b>Hat</b><br>Add a sub-profile for this profile - called a Hat. This option is analogous to manually creating a new profile, which can selected during execution only in the context of being asked for by a <b>changehat aware</b> application. For more information on changehat please see <b>man changehat</b> on your system or the Novell AppArmor Administration Guide.</li>"); /* help text - part x7 */ string helpEdit = _("</ul></p><p><b>Edit Entry:</b><br>Edit the selected entry.</p>"); -- To unsubscribe, e-mail: yast-commit+unsubscribe@opensuse.org For additional commands, e-mail: yast-commit+help@opensuse.org