aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorgerv%gerv.net <>2002-04-23 04:09:13 +0000
committergerv%gerv.net <>2002-04-23 04:09:13 +0000
commit5a4c7d804f3dffdb2badd9e2a2579f0d81258608 (patch)
tree0a29a7d5c5a12ab4504bacbbbe9e647752dc56cc
parent379af653e173a2aa6bdf8a68c18b4584fae30fe6 (diff)
downloadbugs-5a4c7d804f3dffdb2badd9e2a2579f0d81258608.tar
bugs-5a4c7d804f3dffdb2badd9e2a2579f0d81258608.tar.gz
bugs-5a4c7d804f3dffdb2badd9e2a2579f0d81258608.tar.bz2
bugs-5a4c7d804f3dffdb2badd9e2a2579f0d81258608.tar.xz
bugs-5a4c7d804f3dffdb2badd9e2a2579f0d81258608.zip
Bug 139051 - fix misspelling of "privilege". Patch by mental <xor@ivwnet.com>, 2xr=bbaetz.
-rw-r--r--docs/sgml/administration.sgml6
-rw-r--r--docs/sgml/database.sgml2
-rw-r--r--docs/xml/administration.xml6
-rw-r--r--docs/xml/database.xml2
-rwxr-xr-xeditusers.cgi4
5 files changed, 10 insertions, 10 deletions
diff --git a/docs/sgml/administration.sgml b/docs/sgml/administration.sgml
index 39e80c650..353110e47 100644
--- a/docs/sgml/administration.sgml
+++ b/docs/sgml/administration.sgml
@@ -249,7 +249,7 @@
the bug; if the <quote>watcher</quote> would not normally be
allowed to view a bug, the watcher cannot get around the
system by setting herself up to watch the bugs of someone
- with bugs outside her priveleges. She would still only
+ with bugs outside her privileges. She would still only
receive email updates for those bugs she could normally
view.</para>
<para>For Bugzilla sites which require strong inter-Product
@@ -587,7 +587,7 @@
<emphasis>Editusers</emphasis>: This flag allows a user
do what you're doing right now: edit other users. This
will allow those with the right to do so to remove
- administrator priveleges from other users or grant them
+ administrator privileges from other users or grant them
to themselves. Enable with care.
</para>
</listitem>
@@ -1280,7 +1280,7 @@ because he is not in Group3.
Bug7 can be seen by anyone who is in Group1, Group2, and Group3. This
is only User4. All of the others are missing at least one of those
-group priveleges, and thus cannot see the bug.
+group privileges, and thus cannot see the bug.
Bug8 can be seen by anyone who is in Group1, Group2, Group3, and
Group4. There is nobody in all four of these groups, so nobody can
diff --git a/docs/sgml/database.sgml b/docs/sgml/database.sgml
index bf4aaf4f0..848555520 100644
--- a/docs/sgml/database.sgml
+++ b/docs/sgml/database.sgml
@@ -486,7 +486,7 @@ FILE,
OR
-mysql> GRANT ALL PRIVELEGES
+mysql> GRANT ALL PRIVILEGES
ON keystone.*
TO &lt;$sys_dbuser name>@localhost
IDENTIFIED BY '(password)'
diff --git a/docs/xml/administration.xml b/docs/xml/administration.xml
index 39e80c650..353110e47 100644
--- a/docs/xml/administration.xml
+++ b/docs/xml/administration.xml
@@ -249,7 +249,7 @@
the bug; if the <quote>watcher</quote> would not normally be
allowed to view a bug, the watcher cannot get around the
system by setting herself up to watch the bugs of someone
- with bugs outside her priveleges. She would still only
+ with bugs outside her privileges. She would still only
receive email updates for those bugs she could normally
view.</para>
<para>For Bugzilla sites which require strong inter-Product
@@ -587,7 +587,7 @@
<emphasis>Editusers</emphasis>: This flag allows a user
do what you're doing right now: edit other users. This
will allow those with the right to do so to remove
- administrator priveleges from other users or grant them
+ administrator privileges from other users or grant them
to themselves. Enable with care.
</para>
</listitem>
@@ -1280,7 +1280,7 @@ because he is not in Group3.
Bug7 can be seen by anyone who is in Group1, Group2, and Group3. This
is only User4. All of the others are missing at least one of those
-group priveleges, and thus cannot see the bug.
+group privileges, and thus cannot see the bug.
Bug8 can be seen by anyone who is in Group1, Group2, Group3, and
Group4. There is nobody in all four of these groups, so nobody can
diff --git a/docs/xml/database.xml b/docs/xml/database.xml
index bf4aaf4f0..848555520 100644
--- a/docs/xml/database.xml
+++ b/docs/xml/database.xml
@@ -486,7 +486,7 @@ FILE,
OR
-mysql> GRANT ALL PRIVELEGES
+mysql> GRANT ALL PRIVILEGES
ON keystone.*
TO &lt;$sys_dbuser name>@localhost
IDENTIFIED BY '(password)'
diff --git a/editusers.cgi b/editusers.cgi
index 3c2409155..f15939ec2 100755
--- a/editusers.cgi
+++ b/editusers.cgi
@@ -170,7 +170,7 @@ sub EmitFormElements ($$$$$)
print "<TD COLSPAN=3 ALIGN=LEFT><B>Can turn this bit on for other users</B></TD>\n";
print "</TR><TR>\n<TD ALIGN=CENTER><B>|</B></TD>\n";
}
- print "<TD COLSPAN=2 ALIGN=LEFT><B>User has these priveleges</B></TD>\n";
+ print "<TD COLSPAN=2 ALIGN=LEFT><B>User has these privileges</B></TD>\n";
while (MoreSQLData()) {
my ($bit,$name,$description,$checked,$blchecked) = FetchSQLData();
print "</TR><TR>\n";
@@ -184,7 +184,7 @@ sub EmitFormElements ($$$$$)
}
}
} else {
- print "</TR><TR><TH ALIGN=RIGHT>Groups and<br>Priveleges:</TH><TD><TABLE><TR>";
+ print "</TR><TR><TH ALIGN=RIGHT>Groups and<br>Privileges:</TH><TD><TABLE><TR>";
print "<TD COLSPAN=3>The new user will be inserted into groups " .
"based on their userregexps.<BR>To change the group " .
"permissions for this user, you must edit the account after ".