From 7d23b7cac8c82d85138422b036a961ebee50eb30 Mon Sep 17 00:00:00 2001 From: Thomas Lamprecht Date: Fri, 3 Jun 2022 13:58:07 +0200 Subject: [PATCH] tree wide: typo fixes Signed-off-by: Thomas Lamprecht --- README | 6 +++--- debian/changelog | 10 +++++----- src/PVE/AccessControl.pm | 2 +- src/PVE/Auth/Plugin.pm | 2 +- src/PVE/RPCEnvironment.pm | 2 +- 5 files changed, 11 insertions(+), 11 deletions(-) diff --git a/README b/README index c706e5b..306a351 100644 --- a/README +++ b/README @@ -37,7 +37,7 @@ LDAP: example.com There are 2 special authentication domains name 'pve' and 'pam': - * pve: stores paswords to "/etc/pve/priv/shadow.cfg" (SHA256 crypt); + * pve: stores passwords to "/etc/pve/priv/shadow.cfg" (SHA256 crypt); * pam: use unix 'pam' @@ -132,7 +132,7 @@ privileges: role: - defines a sets of priviledges + defines a sets of privileges predefined roles: @@ -158,7 +158,7 @@ An access control list (ACL) is a list of permissions attached to an object. The Object: A Virtual machine, Network (bridge, venet), Hosts, Host Memory, Storage, ... -We can identify our objects by an unique (file system like) path, which also defines a tree like hierarchy relation. ACL can be inherited. Permissions are inherited if the propagate flag is set on the parent. Child permissions always overwrite inherited permissions. User permission takes precedence over all group permissions. If multiple group permission apply the resulting role is the union of all those group priviledges. +We can identify our objects by an unique (file system like) path, which also defines a tree like hierarchy relation. ACL can be inherited. Permissions are inherited if the propagate flag is set on the parent. Child permissions always overwrite inherited permissions. User permission takes precedence over all group permissions. If multiple group permission apply the resulting role is the union of all those group privileges. There is at most one object permission per user or group diff --git a/debian/changelog b/debian/changelog index f7e9e11..f002e3d 100644 --- a/debian/changelog +++ b/debian/changelog @@ -181,7 +181,7 @@ libpve-access-control (6.0-7) pve; urgency=medium * add realm sub commands to pveum CLI tool - * api: domains: add user group sync API enpoint + * api: domains: add user group sync API endpoint * allow one to sync and import users and groups from LDAP/AD based realms @@ -266,7 +266,7 @@ libpve-access-control (5.1-10) unstable; urgency=medium libpve-access-control (5.1-9) unstable; urgency=medium * store the tfa type in user.cfg allowing to get it without proxying the call - to a higher priviledged daemon. + to a higher privileged daemon. * tfa: realm required TFA should lock out users without TFA configured, as it was done before Proxmox VE 5.4 @@ -652,7 +652,7 @@ libpve-access-control (3.0-4) unstable; urgency=low libpve-access-control (3.0-3) unstable; urgency=low - * Add new role PVETemplateUser (and VM.Clone priviledge) + * Add new role PVETemplateUser (and VM.Clone privilege) -- Proxmox Support Team Mon, 29 Apr 2013 11:42:15 +0200 @@ -719,7 +719,7 @@ libpve-access-control (1.0-19) unstable; urgency=low libpve-access-control (1.0-18) unstable; urgency=low - * fix bug #151: corretly parse username inside ticket + * fix bug #151: correctly parse username inside ticket * fix bug #152: allow user to change his own password @@ -814,7 +814,7 @@ libpve-access-control (1.0-4) unstable; urgency=low libpve-access-control (1.0-3) unstable; urgency=low * add support for delayed parameter parsing - We need that to disable - file upload for normal API request (avoid DOS attacs) + file upload for normal API request (avoid DOS attacks) -- Proxmox Support Team Fri, 02 Dec 2011 09:56:10 +0100 diff --git a/src/PVE/AccessControl.pm b/src/PVE/AccessControl.pm index d0dbabc..a2e0458 100644 --- a/src/PVE/AccessControl.pm +++ b/src/PVE/AccessControl.pm @@ -590,7 +590,7 @@ sub read_x509_subject_spice { my $subject = Net::SSLeay::X509_NAME_oneline($nameobj); Net::SSLeay::X509_free($x509); - # remote-viewer wants comma as seperator (not '/') + # remote-viewer wants comma as separator (not '/') $subject =~ s!^/!!; $subject =~ s!/(\w+=)!,$1!g; diff --git a/src/PVE/Auth/Plugin.pm b/src/PVE/Auth/Plugin.pm index 7e431f3..03d3342 100755 --- a/src/PVE/Auth/Plugin.pm +++ b/src/PVE/Auth/Plugin.pm @@ -285,7 +285,7 @@ sub delete_user { # called during addition of realm (before the new domain config got written) # `password` is moved to %param to avoid writing it out to the config -# die to abort additon if there are (grave) problems +# die to abort addition if there are (grave) problems # NOTE: runs in a domain config *locked* context sub on_add_hook { my ($class, $realm, $config, %param) = @_; diff --git a/src/PVE/RPCEnvironment.pm b/src/PVE/RPCEnvironment.pm index 18fbe6c..e03974a 100644 --- a/src/PVE/RPCEnvironment.pm +++ b/src/PVE/RPCEnvironment.pm @@ -582,7 +582,7 @@ sub init_request { } } -# hacks: to provide better backwards compatibiliy +# hacks: to provide better backwards compatibility # old code uses PVE::RPCEnvironment::get(); # new code should use PVE::RPCEnvironment->get(); -- 2.39.2