diff options
author | Eugeni Dodonov <eugeni@mandriva.org> | 2009-01-29 18:34:56 +0000 |
---|---|---|
committer | Eugeni Dodonov <eugeni@mandriva.org> | 2009-01-29 18:34:56 +0000 |
commit | 94f0a52befa8d4a330c403ebb1acee6225207579 (patch) | |
tree | c29a51cef14b899d806f49bec1fb103ee5272350 /src | |
parent | fa75f70a365b48545492aee2f50496a337a2fda3 (diff) | |
download | msec-94f0a52befa8d4a330c403ebb1acee6225207579.tar msec-94f0a52befa8d4a330c403ebb1acee6225207579.tar.gz msec-94f0a52befa8d4a330c403ebb1acee6225207579.tar.bz2 msec-94f0a52befa8d4a330c403ebb1acee6225207579.tar.xz msec-94f0a52befa8d4a330c403ebb1acee6225207579.zip |
A few more spelling changes and imported pygettext.py.
Diffstat (limited to 'src')
-rwxr-xr-x | src/msec/libmsec.py | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/msec/libmsec.py b/src/msec/libmsec.py index 2639df8..019e16f 100755 --- a/src/msec/libmsec.py +++ b/src/msec/libmsec.py @@ -817,7 +817,7 @@ class MSEC: msec.set_shell_variable('UMASK_USER', umask) def allow_x_connections(self, arg): - ''' Allow connections to X server from other users. Accepted arguments: yes (all connections are allowed), local (only local connection), no (no connection).''' + ''' Allow local users to connect to X server. Accepted arguments: yes (all connections are allowed), local (only local connection), no (no connection).''' xinit = self.configfiles.get_config_file(MSEC_XINIT) val = xinit.get_match('/usr/bin/xhost\s*(\+\s*[^#]*)', '@1') @@ -1431,7 +1431,7 @@ class MSEC: # Do we need this? def enable_msec_cron(self, arg): - ''' Perform hourly security check, checking for changes in system configuration.''' + ''' Perform hourly security check for changes in system configuration.''' mseccron = self.configfiles.get_config_file(MSECCRON) val = mseccron.exists() @@ -1578,15 +1578,15 @@ class MSEC: # TODO: unfinished def enable_apparmor(self, param): - """Enable support for AppArmor security framework""" + """Enable AppArmor security framework on boot""" pass def enable_policykit(self, param): - """Enable support for PolicyKit framework, which allows ordinary users to run system application""" + """Enable PolicyKit security framework""" pass def enable_sudo(self, param): - """Enable support for sudo application, which allows users to run applications using system account. If yes, users must autenticate themselves using password. If this parameter is set to 'wheel', users must belong to the 'wheel' group to be able to use sudo""" + """Allow users to authenticate with their passwords for sudo. If this parameter is set to 'wheel', users must belong to the 'wheel' group to be able to use sudo""" pass def notify_warn(self, param): |