Skip to content

Commit

Permalink
Merge remote-tracking branch 'origin/pr/2'
Browse files Browse the repository at this point in the history
Conflicts:
	package/yast2-ldap-server.changes
  • Loading branch information
mvidner committed Jul 29, 2013
2 parents 83a117c + 3c912d3 commit c15e57e
Show file tree
Hide file tree
Showing 4 changed files with 19 additions and 17 deletions.
6 changes: 6 additions & 0 deletions package/yast2-ldap-server.changes
Original file line number Diff line number Diff line change
@@ -1,3 +1,9 @@
-------------------------------------------------------------------
Mon Jul 29 11:02:52 UTC 2013 - varkoly@suse.com

- bnc#777449 - Puzzlestring in yasts ldap server module (ldap-server.pot)
- bnc#757132 - Puzzle-String in ldap-server module

-------------------------------------------------------------------
Tue Jul 2 11:44:46 UTC 2013 - varkoly@suse.com

Expand Down
5 changes: 2 additions & 3 deletions src/LdapDatabase.ycp
Original file line number Diff line number Diff line change
Expand Up @@ -323,9 +323,8 @@
{
map<string, string> err = LdapServer::ReadError();
boolean res = Popup::AnyQuestion(Label::WarningMsg(),
_("The Base Object: \"") + db["suffix"]:"" +
_("\" can not be auto created by YaST.\n") +
err["msg"]:"",
sformat(_("The Base Object: \"%1\" cannot be auto created by YaST:\n%2"),
db["suffix"]:"", err["msg"]:""),
Label::OKButton(), Label::CancelButton(), `focus);
if ( res == false ) {
continue;
Expand Down
21 changes: 10 additions & 11 deletions src/LdapServer.pm
Original file line number Diff line number Diff line change
Expand Up @@ -1519,7 +1519,7 @@ sub WriteTlsConfig
{
$self->SetError(_("Can not set a filesystem ACL on the private key."),
"setfacl -m u:ldap:r ".$tls->{'certKeyFile'}." failed.\n".
"Do you have filesystem acl support disabled?" );
_("Do you have filesystem acl support disabled?") );
return 0;
}
}
Expand Down Expand Up @@ -2554,7 +2554,7 @@ sub CheckSuffixAutoCreate
if(!defined $attr[0] || !defined $val)
{
y2error("Error while extracting RDN values");
$self->SetError( _("Invalid LDAP DN: \""). $suffix. _("\", cannot extract RDN values"));
$self->SetError( sprintf(_("Invalid LDAP DN: \"%s\", cannot extract RDN values"),$suffix), "");
return -1;
}
if( (lc($attr[0]) eq "ou") || ( lc($attr[0]) eq "o") || ( lc($attr[0]) eq "l") ||
Expand All @@ -2581,12 +2581,12 @@ sub CheckDatabase
y2milestone("CheckDatabase");
my $suffix_object = X500::DN->ParseRFC2253($db->{'suffix'});
if(! defined $suffix_object) {
$self->SetError( _("Base DN") ." \"". $db->{'suffix'} ."\" ". _("is not a valid LDAP DN."), "");
$self->SetError( sprintf(_("Base DN \"%s\" is not a valid LDAP DN."),$db->{'suffix'}), "");
return 0;
}
elsif ( $suffix_object->hasMultivaluedRDNs() )
{
$self->SetError( _("Base DN") ." \"". $db->{'suffix'} ."\" ". _("has multivalued RDNs (not supported by YaST)."), "");
$self->SetError( sprintf(_("Base DN \"%s\" has multivalued RDNs (not supported by YaST)."),$db->{'suffix'}), "");
return 0;
}

Expand All @@ -2595,13 +2595,12 @@ sub CheckDatabase
{
my $object = X500::DN->ParseRFC2253($db->{'rootdn'});
if(! defined $object) {
$self->SetError(_("Root DN"). " \"". $db->{'rootdn'} ."\" ". _("is not a valid LDAP DN."), "");
$self->SetError( sprintf(_("Root DN \"%s\" is not a valid LDAP DN."),$db->{'rootdn'}), "");
return 0;
}
elsif ( $object->hasMultivaluedRDNs() )
{
$self->SetError(_("Root DN"). " \"". $db->{'rootdn'} ."\" ".
_("has multivalued RDNs (not supported by YaST)."), "");
$self->SetError( sprintf(_("Root DN \"%s\" has multivalued RDNs (not supported by YaST)."),$db->{'rootdn'}), "");
return 0;
}

Expand Down Expand Up @@ -3402,7 +3401,7 @@ sub VerifyTlsSetup
y2milestone("TlsConfig ". Data::Dumper->Dump([$tls]) );
if ( SCR->Read(".target.size", $tls->{"caCertFile"}) <= 0)
{
$self->SetError( _("CA Certificate File: \"") . $tls->{"caCertFile"}. _("\" does not exist."), "");
$self->SetError( sprintf(_("CA Certificate File: \"%s\" does not exist."),$tls->{"caCertFile"}), "");
return 0;
}
else
Expand All @@ -3413,20 +3412,20 @@ sub VerifyTlsSetup
if ( $rc->{'exit'} != 0 )
{
$self->SetError( _("Error while trying to verify the server certificate of the provider server.\n").
_("Please make sure that \"".$tls->{"caCertFile"}."\" contains the correct\nCA file to verify the remote Server Certificate."),
sprintf(_("Please make sure that \"%s\" contains the correct\nCA file to verify the remote Server Certificate."),$tls->{"caCertFile"}),
$rc->{'stderr'} );
return 0;
}
}

if ( SCR->Read(".target.size", $tls->{"certFile"}) <= 0)
{
$self->SetError( _("Certificate File: \""). $tls->{"certFile"}. _(\" does not exist."), "" );
$self->SetError( sprintf(_("Certificate File: \"%s\" does not exist."),$tls->{"certFile"}), "" );
return 0;
}
if ( SCR->Read(".target.size", $tls->{"certKeyFile"}) <= 0)
{
$self->SetError( _("Certificate Key File: \""). $tls->{"certKeyFile"} . _("\" does not exist."), "");
$self->SetError( sprintf(_("Certificate Key File: \"%s\" does not exist."),$tls->{"certKeyFile"}), "" );
return 0;
}
return 1;
Expand Down
4 changes: 1 addition & 3 deletions src/mirrormode-wizard.ycp
Original file line number Diff line number Diff line change
Expand Up @@ -116,9 +116,7 @@ any MirrorModeOverview()
continue;
}

if( Popup::YesNo( _("Do you really want to remove ") +
"\"" + serverids[ selected, "uri" ]:"" + "\"" +
_("from the MirrorMode setup?\n") +
if( Popup::YesNo( sformat(_("Do you really want to remove \"%1\" from the MirrorMode setup?\n"),serverids[ selected, "uri" ]:"") +
_("Changes will take effect immediately after clicking \"Yes\"") ) )
{
LdapServer::RemoveMMSyncrepl( serverids[ selected, "uri" ]:"" );
Expand Down

0 comments on commit c15e57e

Please sign in to comment.