aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorEugeni Dodonov <eugeni@mandriva.org>2009-01-29 18:34:56 +0000
committerEugeni Dodonov <eugeni@mandriva.org>2009-01-29 18:34:56 +0000
commit94f0a52befa8d4a330c403ebb1acee6225207579 (patch)
treec29a51cef14b899d806f49bec1fb103ee5272350 /src
parentfa75f70a365b48545492aee2f50496a337a2fda3 (diff)
downloadmsec-94f0a52befa8d4a330c403ebb1acee6225207579.tar
msec-94f0a52befa8d4a330c403ebb1acee6225207579.tar.gz
msec-94f0a52befa8d4a330c403ebb1acee6225207579.tar.bz2
msec-94f0a52befa8d4a330c403ebb1acee6225207579.tar.xz
msec-94f0a52befa8d4a330c403ebb1acee6225207579.zip
A few more spelling changes and imported pygettext.py.
Diffstat (limited to 'src')
-rwxr-xr-xsrc/msec/libmsec.py10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/msec/libmsec.py b/src/msec/libmsec.py
index 2639df8..019e16f 100755
--- a/src/msec/libmsec.py
+++ b/src/msec/libmsec.py
@@ -817,7 +817,7 @@ class MSEC:
msec.set_shell_variable('UMASK_USER', umask)
def allow_x_connections(self, arg):
- ''' Allow connections to X server from other users. Accepted arguments: yes (all connections are allowed), local (only local connection), no (no connection).'''
+ ''' Allow local users to connect to X server. Accepted arguments: yes (all connections are allowed), local (only local connection), no (no connection).'''
xinit = self.configfiles.get_config_file(MSEC_XINIT)
val = xinit.get_match('/usr/bin/xhost\s*(\+\s*[^#]*)', '@1')
@@ -1431,7 +1431,7 @@ class MSEC:
# Do we need this?
def enable_msec_cron(self, arg):
- ''' Perform hourly security check, checking for changes in system configuration.'''
+ ''' Perform hourly security check for changes in system configuration.'''
mseccron = self.configfiles.get_config_file(MSECCRON)
val = mseccron.exists()
@@ -1578,15 +1578,15 @@ class MSEC:
# TODO: unfinished
def enable_apparmor(self, param):
- """Enable support for AppArmor security framework"""
+ """Enable AppArmor security framework on boot"""
pass
def enable_policykit(self, param):
- """Enable support for PolicyKit framework, which allows ordinary users to run system application"""
+ """Enable PolicyKit security framework"""
pass
def enable_sudo(self, param):
- """Enable support for sudo application, which allows users to run applications using system account. If yes, users must autenticate themselves using password. If this parameter is set to 'wheel', users must belong to the 'wheel' group to be able to use sudo"""
+ """Allow users to authenticate with their passwords for sudo. If this parameter is set to 'wheel', users must belong to the 'wheel' group to be able to use sudo"""
pass
def notify_warn(self, param):