Commit 909391ff authored by Xavier Guimard's avatar Xavier Guimard

Spelling errors

parent dfcb0f86
......@@ -77,7 +77,7 @@ print "</div>\n";
print "<div class=\"panel panel-info\">\n";
print "<div class=\"panel-heading\">\n";
print "<h2 class=\"panel-title text-center\">Main informations</h2>\n";
print "<h2 class=\"panel-title text-center\">Main information</h2>\n";
print "</div>\n";
print "<div class=\"panel-body\">\n";
print "<ul class=\"list-unstyled\">\n";
......
......@@ -178,7 +178,7 @@ lemonldap-ng (1.9.0) stable; urgency=low
* [LEMONLDAP-824] - autocomplete=off does not prevent anymore password manager use
* [LEMONLDAP-833] - Manager - Multi : display only the selected modules
* [LEMONLDAP-865] - Check conditions in AuthSlave and UserDBSlave
* [LEMONLDAP-877] - Replace Storable by JSON to be arch independant
* [LEMONLDAP-877] - Replace Storable by JSON to be arch independent
* [LEMONLDAP-908] - Replace own minifier by external
* [LEMONLDAP-911] - Possibility to set a specific logo for a choice module
* [LEMONLDAP-917] - Possibility to define finely sessions timeout activity
......@@ -1091,7 +1091,7 @@ lemonldap-ng (1.0) stable; urgency=low
* [LEMONLDAP-97] - Add configuration parameters for private keys passwords
* [LEMONLDAP-103] - String encoding in sessions
* [LEMONLDAP-120] - Force UTF-8 in File backend
* [LEMONLDAP-130] - Create a "reload" vhost independant from test
* [LEMONLDAP-130] - Create a "reload" vhost independent from test
applications
* [LEMONLDAP-131] - SAML documentation
* [LEMONLDAP-147] - Add an activation parameter for each IssuerDB
......
......@@ -54,7 +54,6 @@ override_dh_auto_install:
DOCDIR=/usr/share/doc/lemonldap-ng-fr-doc \
USEDEBIANLIBS=yes
mkdir $(TMP)/$(LMSHAREDIR)/portal
mv $(TMP)/$(LMVARDIR)/portal/*.pl $(TMP)/$(LMSHAREDIR)/portal/
for i in handler portal manager test; do \
mv $(TMP)/etc/lemonldap-ng/$$i-apache2.X.conf $(TMP)/etc/lemonldap-ng/$$i-apache2.conf; \
done
......
......@@ -24,7 +24,7 @@
<ul class="toc">
<li class="level1"><div class="li"><a href="#presentation">Presentation</a></div></li>
<li class="level1"><div class="li"><a href="#request_informations">Request informations</a></div></li>
<li class="level1"><div class="li"><a href="#request_information">Request information</a></div></li>
<li class="level1"><div class="li"><a href="#extended_functions_list">Extended Functions List</a></div>
<ul class="toc">
<li class="level2"><div class="li"><a href="#date">date</a></div></li>
......@@ -81,7 +81,7 @@ Inside this jail, you can access to:
</li>
<li class="level1"><div class="li"> Environment variables, in some cases (through %ENV)</div>
</li>
<li class="level1"><div class="li"> <a href="#request_informations" title="documentation:2.0:extendedfunctions ↵" class="wikilink1">Informations about current request</a></div>
<li class="level1"><div class="li"> <a href="#request_information" title="documentation:2.0:extendedfunctions ↵" class="wikilink1">Informations about current request</a></div>
</li>
<li class="level1"><div class="li"> <a href="#extended_functions_list" title="documentation:2.0:extendedfunctions ↵" class="wikilink1">Extended functions</a>:</div>
<ul>
......@@ -106,7 +106,7 @@ Inside this jail, you can access to:
</div>
</div>
<!-- EDIT2 SECTION "Presentation" [35-1108] -->
<h2 class="sectionedit3" id="request_informations">Request informations</h2>
<h2 class="sectionedit3" id="request_information">Request information</h2>
<div class="level2">
<p>
......@@ -132,7 +132,7 @@ The following data about the current request are available through functions :
</ul>
</div>
<!-- EDIT3 SECTION "Request informations" [1109-1515] -->
<!-- EDIT3 SECTION "Request information" [1109-1515] -->
<h2 class="sectionedit4" id="extended_functions_list">Extended Functions List</h2>
<div class="level2">
......
......@@ -50,7 +50,7 @@ POST data can be static values or computed from user&#039;s session.
<div class="level2">
<p>
You should grab some informations:
You should grab some information:
</p>
<ul>
<li class="level1"><div class="li"> <abbr title="Uniform Resource Identifier">URI</abbr> of the html page which contains the form</div>
......
......@@ -76,7 +76,7 @@ attributetype ( SSOOID:1.6
# SSO user
objectClass ( SSOOID:2.1
NAME 'ssoUser'
DESC 'SSO extended informations for a user'
DESC 'SSO extended information for a user'
SUP top
AUXILIARY
MAY ( ssoName $ ssoRoles $ ssoLogonHours $
......
......@@ -435,7 +435,7 @@ case, a user is authorized 10 minutes after he lost his rights.
=head3 B<Authorization>
Authorization is controled only by handlers because the portal knows nothing
Authorization is controlled only by handlers because the portal knows nothing
about the way the user will choose. When configuring your Web-SSO, you have to:
=over
......
......@@ -243,7 +243,6 @@ site/htdocs/static/impact/images/logo-lock.png
site/htdocs/static/impact/images/logo-ok.png
site/htdocs/static/impact/images/logo-warn.png
site/htdocs/static/impact/README
site/htdocs/static/js/portal.min.js
site/htdocs/static/languages/en.json
site/htdocs/static/languages/fr.json
site/htdocs/static/pastel/css/styles.css
......
......@@ -65,7 +65,7 @@ authentication modules.
=head1 DESCRIPTION
This base library must be used to build Lemonldap::NG authentication modules.
Authentication modules are independant objects that are instanciated by
Authentication modules are independent objects that are instantiated by
Lemonldap::NG portal. They must provides methods described below.
=head1 METHODS
......@@ -134,7 +134,7 @@ object.
=head4 extractFormInfo($req)
First authentication method called during authentication process. It must set
$req->user that will be used by the userDB object to get user informations.
$req->user that will be used by the userDB object to get user information.
=head4 authenticate($req)
......
......@@ -75,7 +75,7 @@ qr/^($saml_slo_soap_url|$saml_slo_soap_url_ret|$saml_slo_get_url|$saml_slo_get_u
sub extractFormInfo {
my ( $self, $req ) = @_;
# 1. Get HTTP request informations to know
# 1. Get HTTP request information to know
# if we are receving SAML request or response
my $url = $req->uri;
my $request_method = $req->method;
......@@ -1125,7 +1125,7 @@ sub setAuthSessionInfo {
}
}
# Store other informations in session
# Store other information in session
$req->{sessionInfo}->{_idp} = $idp;
$req->{sessionInfo}->{_idpConfKey} = $idpConfKey;
......
......@@ -36,7 +36,7 @@ sub extractFormInfo {
my $self = shift;
my $server = $self->{_lassoServer};
# 1. Get HTTP request informations to know
# 1. Get HTTP request information to know
# if we are receving SAML request or response
my $url = $self->url( -absolute => 1 );
my $request_method = $self->request_method();
......@@ -1087,7 +1087,7 @@ sub setAuthSessionInfo {
}
}
# Store other informations in session
# Store other information in session
$self->{sessionInfo}->{_user} = $self->{user};
$self->{sessionInfo}->{_idp} = $idp;
$self->{sessionInfo}->{_idpConfKey} = $idpConfKey;
......
......@@ -115,7 +115,7 @@ sub run {
# Session creation timestamp
my $time = $req->{sessionInfo}->{_utime} || time();
# Get HTTP request informations to know
# Get HTTP request information to know
# if we are receving SAML request or response
my $url = $req->uri;
my $request_method = $req->param('issuerMethod') || $req->method;
......
......@@ -81,7 +81,7 @@ sub issuerForUnAuthUser {
my $saml_att_soap_url = $self->getMetaDataURL(
"samlAttributeAuthorityDescriptorAttributeServiceSOAP", 1 );
# Get HTTP request informations to know
# Get HTTP request information to know
# if we are receving SAML request or response
my $url = $self->url( -absolute => 1 );
my $request_method = $self->request_method();
......@@ -1146,7 +1146,7 @@ sub issuerForAuthUser {
$self->getMetaDataURL( "samlIDPSSODescriptorSingleLogoutServiceHTTPPost",
2 );
# Get HTTP request informations to know
# Get HTTP request information to know
# if we are receving SAML request or response
my $url = $self->url( -absolute => 1 );
my $request_method = $self->request_method();
......
......@@ -31,7 +31,7 @@ sub init {
# RUNNING METHODS
## @apmethod int checkRemoteId()
# check if a CDA mechanism has been instanciated and if session is available.
# check if a CDA mechanism has been instantiated and if session is available.
# Redirect the user to the remote portal else by calling goToPortal().
# @return Lemonldap::NG::Portal constant
sub checkRemoteId {
......
......@@ -167,7 +167,7 @@ Lemonldap::NG::Portal::Main::Constants constant.
A classic identity provider needs a "issuerDBE<gt>XXXE<lt>Path" parameter in
LLNG configuration to declare its base URI path (see
L<Lemonldap::NG::Manager::Build>). Example: /saml/. All requests that starts
with /saml/ will call run() after authenticatio if needed, and noone else.
with /saml/ will call run() after authenticatio if needed, and no one else.
The logout() function is called when user asks for logout on this server. If
you want to write an identity provider, you must implement a single logout
......
......@@ -447,7 +447,7 @@ __END__
=encoding utf8
Lemonldap::NG::Portal::Register - Regsiter a new user
Lemonldap::NG::Portal::Register - Register a new user
=head1 SYNOPSIS
......
(function(){window.translatePage=function(a){return $("[trspan]").each(function(){return this.text(translate(this.attr("trspan")))})};$(document).ready(function(){return translatePage(lang)})}).call(this);
\ No newline at end of file
......@@ -725,7 +725,7 @@ rm -rf %{buildroot}
- Merge with existing .spec file from RPMforge.
- Use the same directories as the Debian package.
- Create a symlink in Apache confguration.
- Create specific portal/manager/handler/conf packages independant from CPAN packages
- Create specific portal/manager/handler/conf packages independent from CPAN packages
* Thu Nov 20 2008 Jean-Christophe Toussaint <jean-christophe.toussaint@ac-nancy-metz.fr> - 0.9.2-1DSI
- Updated to release 0.9.2.
- Using official tar.gz from forge.
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment