Spelling errors

This commit is contained in:
Xavier Guimard 2016-12-19 20:47:44 +00:00
parent dfcb0f8605
commit 909391ffc7
18 changed files with 23 additions and 26 deletions

View File

@ -77,7 +77,7 @@ print "</div>\n";
print "<div class=\"panel panel-info\">\n";
print "<div class=\"panel-heading\">\n";
print "<h2 class=\"panel-title text-center\">Main informations</h2>\n";
print "<h2 class=\"panel-title text-center\">Main information</h2>\n";
print "</div>\n";
print "<div class=\"panel-body\">\n";
print "<ul class=\"list-unstyled\">\n";

View File

@ -178,7 +178,7 @@ lemonldap-ng (1.9.0) stable; urgency=low
* [LEMONLDAP-824] - autocomplete=off does not prevent anymore password manager use
* [LEMONLDAP-833] - Manager - Multi : display only the selected modules
* [LEMONLDAP-865] - Check conditions in AuthSlave and UserDBSlave
* [LEMONLDAP-877] - Replace Storable by JSON to be arch independant
* [LEMONLDAP-877] - Replace Storable by JSON to be arch independent
* [LEMONLDAP-908] - Replace own minifier by external
* [LEMONLDAP-911] - Possibility to set a specific logo for a choice module
* [LEMONLDAP-917] - Possibility to define finely sessions timeout activity
@ -1091,7 +1091,7 @@ lemonldap-ng (1.0) stable; urgency=low
* [LEMONLDAP-97] - Add configuration parameters for private keys passwords
* [LEMONLDAP-103] - String encoding in sessions
* [LEMONLDAP-120] - Force UTF-8 in File backend
* [LEMONLDAP-130] - Create a "reload" vhost independant from test
* [LEMONLDAP-130] - Create a "reload" vhost independent from test
applications
* [LEMONLDAP-131] - SAML documentation
* [LEMONLDAP-147] - Add an activation parameter for each IssuerDB

1
debian/rules vendored
View File

@ -54,7 +54,6 @@ override_dh_auto_install:
DOCDIR=/usr/share/doc/lemonldap-ng-fr-doc \
USEDEBIANLIBS=yes
mkdir $(TMP)/$(LMSHAREDIR)/portal
mv $(TMP)/$(LMVARDIR)/portal/*.pl $(TMP)/$(LMSHAREDIR)/portal/
for i in handler portal manager test; do \
mv $(TMP)/etc/lemonldap-ng/$$i-apache2.X.conf $(TMP)/etc/lemonldap-ng/$$i-apache2.conf; \
done

View File

@ -24,7 +24,7 @@
<ul class="toc">
<li class="level1"><div class="li"><a href="#presentation">Presentation</a></div></li>
<li class="level1"><div class="li"><a href="#request_informations">Request informations</a></div></li>
<li class="level1"><div class="li"><a href="#request_information">Request information</a></div></li>
<li class="level1"><div class="li"><a href="#extended_functions_list">Extended Functions List</a></div>
<ul class="toc">
<li class="level2"><div class="li"><a href="#date">date</a></div></li>
@ -81,7 +81,7 @@ Inside this jail, you can access to:
</li>
<li class="level1"><div class="li"> Environment variables, in some cases (through %ENV)</div>
</li>
<li class="level1"><div class="li"> <a href="#request_informations" title="documentation:2.0:extendedfunctions ↵" class="wikilink1">Informations about current request</a></div>
<li class="level1"><div class="li"> <a href="#request_information" title="documentation:2.0:extendedfunctions ↵" class="wikilink1">Informations about current request</a></div>
</li>
<li class="level1"><div class="li"> <a href="#extended_functions_list" title="documentation:2.0:extendedfunctions ↵" class="wikilink1">Extended functions</a>:</div>
<ul>
@ -106,7 +106,7 @@ Inside this jail, you can access to:
</div>
</div>
<!-- EDIT2 SECTION "Presentation" [35-1108] -->
<h2 class="sectionedit3" id="request_informations">Request informations</h2>
<h2 class="sectionedit3" id="request_information">Request information</h2>
<div class="level2">
<p>
@ -132,7 +132,7 @@ The following data about the current request are available through functions :
</ul>
</div>
<!-- EDIT3 SECTION "Request informations" [1109-1515] -->
<!-- EDIT3 SECTION "Request information" [1109-1515] -->
<h2 class="sectionedit4" id="extended_functions_list">Extended Functions List</h2>
<div class="level2">

View File

@ -50,7 +50,7 @@ POST data can be static values or computed from user&#039;s session.
<div class="level2">
<p>
You should grab some informations:
You should grab some information:
</p>
<ul>
<li class="level1"><div class="li"> <abbr title="Uniform Resource Identifier">URI</abbr> of the html page which contains the form</div>

View File

@ -76,7 +76,7 @@ attributetype ( SSOOID:1.6
# SSO user
objectClass ( SSOOID:2.1
NAME 'ssoUser'
DESC 'SSO extended informations for a user'
DESC 'SSO extended information for a user'
SUP top
AUXILIARY
MAY ( ssoName $ ssoRoles $ ssoLogonHours $

View File

@ -435,7 +435,7 @@ case, a user is authorized 10 minutes after he lost his rights.
=head3 B<Authorization>
Authorization is controled only by handlers because the portal knows nothing
Authorization is controlled only by handlers because the portal knows nothing
about the way the user will choose. When configuring your Web-SSO, you have to:
=over

View File

@ -243,7 +243,6 @@ site/htdocs/static/impact/images/logo-lock.png
site/htdocs/static/impact/images/logo-ok.png
site/htdocs/static/impact/images/logo-warn.png
site/htdocs/static/impact/README
site/htdocs/static/js/portal.min.js
site/htdocs/static/languages/en.json
site/htdocs/static/languages/fr.json
site/htdocs/static/pastel/css/styles.css

View File

@ -65,7 +65,7 @@ authentication modules.
=head1 DESCRIPTION
This base library must be used to build Lemonldap::NG authentication modules.
Authentication modules are independant objects that are instanciated by
Authentication modules are independent objects that are instantiated by
Lemonldap::NG portal. They must provides methods described below.
=head1 METHODS
@ -134,7 +134,7 @@ object.
=head4 extractFormInfo($req)
First authentication method called during authentication process. It must set
$req->user that will be used by the userDB object to get user informations.
$req->user that will be used by the userDB object to get user information.
=head4 authenticate($req)

View File

@ -75,7 +75,7 @@ qr/^($saml_slo_soap_url|$saml_slo_soap_url_ret|$saml_slo_get_url|$saml_slo_get_u
sub extractFormInfo {
my ( $self, $req ) = @_;
# 1. Get HTTP request informations to know
# 1. Get HTTP request information to know
# if we are receving SAML request or response
my $url = $req->uri;
my $request_method = $req->method;
@ -1125,7 +1125,7 @@ sub setAuthSessionInfo {
}
}
# Store other informations in session
# Store other information in session
$req->{sessionInfo}->{_idp} = $idp;
$req->{sessionInfo}->{_idpConfKey} = $idpConfKey;

View File

@ -36,7 +36,7 @@ sub extractFormInfo {
my $self = shift;
my $server = $self->{_lassoServer};
# 1. Get HTTP request informations to know
# 1. Get HTTP request information to know
# if we are receving SAML request or response
my $url = $self->url( -absolute => 1 );
my $request_method = $self->request_method();
@ -1087,7 +1087,7 @@ sub setAuthSessionInfo {
}
}
# Store other informations in session
# Store other information in session
$self->{sessionInfo}->{_user} = $self->{user};
$self->{sessionInfo}->{_idp} = $idp;
$self->{sessionInfo}->{_idpConfKey} = $idpConfKey;

View File

@ -115,7 +115,7 @@ sub run {
# Session creation timestamp
my $time = $req->{sessionInfo}->{_utime} || time();
# Get HTTP request informations to know
# Get HTTP request information to know
# if we are receving SAML request or response
my $url = $req->uri;
my $request_method = $req->param('issuerMethod') || $req->method;

View File

@ -81,7 +81,7 @@ sub issuerForUnAuthUser {
my $saml_att_soap_url = $self->getMetaDataURL(
"samlAttributeAuthorityDescriptorAttributeServiceSOAP", 1 );
# Get HTTP request informations to know
# Get HTTP request information to know
# if we are receving SAML request or response
my $url = $self->url( -absolute => 1 );
my $request_method = $self->request_method();
@ -1146,7 +1146,7 @@ sub issuerForAuthUser {
$self->getMetaDataURL( "samlIDPSSODescriptorSingleLogoutServiceHTTPPost",
2 );
# Get HTTP request informations to know
# Get HTTP request information to know
# if we are receving SAML request or response
my $url = $self->url( -absolute => 1 );
my $request_method = $self->request_method();

View File

@ -31,7 +31,7 @@ sub init {
# RUNNING METHODS
## @apmethod int checkRemoteId()
# check if a CDA mechanism has been instanciated and if session is available.
# check if a CDA mechanism has been instantiated and if session is available.
# Redirect the user to the remote portal else by calling goToPortal().
# @return Lemonldap::NG::Portal constant
sub checkRemoteId {

View File

@ -167,7 +167,7 @@ Lemonldap::NG::Portal::Main::Constants constant.
A classic identity provider needs a "issuerDBE<gt>XXXE<lt>Path" parameter in
LLNG configuration to declare its base URI path (see
L<Lemonldap::NG::Manager::Build>). Example: /saml/. All requests that starts
with /saml/ will call run() after authenticatio if needed, and noone else.
with /saml/ will call run() after authenticatio if needed, and no one else.
The logout() function is called when user asks for logout on this server. If
you want to write an identity provider, you must implement a single logout

View File

@ -447,7 +447,7 @@ __END__
=encoding utf8
Lemonldap::NG::Portal::Register - Regsiter a new user
Lemonldap::NG::Portal::Register - Register a new user
=head1 SYNOPSIS

View File

@ -1 +0,0 @@
(function(){window.translatePage=function(a){return $("[trspan]").each(function(){return this.text(translate(this.attr("trspan")))})};$(document).ready(function(){return translatePage(lang)})}).call(this);

View File

@ -725,7 +725,7 @@ rm -rf %{buildroot}
- Merge with existing .spec file from RPMforge.
- Use the same directories as the Debian package.
- Create a symlink in Apache confguration.
- Create specific portal/manager/handler/conf packages independant from CPAN packages
- Create specific portal/manager/handler/conf packages independent from CPAN packages
* Thu Nov 20 2008 Jean-Christophe Toussaint <jean-christophe.toussaint@ac-nancy-metz.fr> - 0.9.2-1DSI
- Updated to release 0.9.2.
- Using official tar.gz from forge.