Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
bugzilla
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Ivan Ivlev
bugzilla
Commits
5a4c7d80
Commit
5a4c7d80
authored
Apr 23, 2002
by
gerv%gerv.net
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Bug 139051 - fix misspelling of "privilege". Patch by mental <xor@ivwnet.com>, 2xr=bbaetz.
parent
379af653
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
10 additions
and
10 deletions
+10
-10
administration.sgml
docs/sgml/administration.sgml
+3
-3
database.sgml
docs/sgml/database.sgml
+1
-1
administration.xml
docs/xml/administration.xml
+3
-3
database.xml
docs/xml/database.xml
+1
-1
editusers.cgi
editusers.cgi
+2
-2
No files found.
docs/sgml/administration.sgml
View file @
5a4c7d80
...
...
@@ -249,7 +249,7 @@
the bug; if the <quote>watcher</quote> would not normally be
allowed to view a bug, the watcher cannot get around the
system by setting herself up to watch the bugs of someone
with bugs outside her priv
e
leges. She would still only
with bugs outside her priv
i
leges. She would still only
receive email updates for those bugs she could normally
view.</para>
<para>For Bugzilla sites which require strong inter-Product
...
...
@@ -587,7 +587,7 @@
<emphasis>Editusers</emphasis>: This flag allows a user
do what you're doing right now: edit other users. This
will allow those with the right to do so to remove
administrator priv
e
leges from other users or grant them
administrator priv
i
leges from other users or grant them
to themselves. Enable with care.
</para>
</listitem>
...
...
@@ -1280,7 +1280,7 @@ because he is not in Group3.
Bug7 can be seen by anyone who is in Group1, Group2, and Group3. This
is only User4. All of the others are missing at least one of those
group priv
e
leges, and thus cannot see the bug.
group priv
i
leges, and thus cannot see the bug.
Bug8 can be seen by anyone who is in Group1, Group2, Group3, and
Group4. There is nobody in all four of these groups, so nobody can
...
...
docs/sgml/database.sgml
View file @
5a4c7d80
...
...
@@ -486,7 +486,7 @@ FILE,
OR
mysql> GRANT ALL PRIV
E
LEGES
mysql> GRANT ALL PRIV
I
LEGES
ON keystone.*
TO <$sys_dbuser name>@localhost
IDENTIFIED BY '(password)'
...
...
docs/xml/administration.xml
View file @
5a4c7d80
...
...
@@ -249,7 +249,7 @@
the bug; if the
<quote>
watcher
</quote>
would not normally be
allowed to view a bug, the watcher cannot get around the
system by setting herself up to watch the bugs of someone
with bugs outside her priv
e
leges. She would still only
with bugs outside her priv
i
leges. She would still only
receive email updates for those bugs she could normally
view.
</para>
<para>
For Bugzilla sites which require strong inter-Product
...
...
@@ -587,7 +587,7 @@
<emphasis>
Editusers
</emphasis>
: This flag allows a user
do what you're doing right now: edit other users. This
will allow those with the right to do so to remove
administrator priv
e
leges from other users or grant them
administrator priv
i
leges from other users or grant them
to themselves. Enable with care.
</para>
</listitem>
...
...
@@ -1280,7 +1280,7 @@ because he is not in Group3.
Bug7 can be seen by anyone who is in Group1, Group2, and Group3. This
is only User4. All of the others are missing at least one of those
group priv
e
leges, and thus cannot see the bug.
group priv
i
leges, and thus cannot see the bug.
Bug8 can be seen by anyone who is in Group1, Group2, Group3, and
Group4. There is nobody in all four of these groups, so nobody can
...
...
docs/xml/database.xml
View file @
5a4c7d80
...
...
@@ -486,7 +486,7 @@ FILE,
OR
mysql> GRANT ALL PRIV
E
LEGES
mysql> GRANT ALL PRIV
I
LEGES
ON keystone.*
TO
<
$sys_dbuser name>@localhost
IDENTIFIED BY '(password)'
...
...
editusers.cgi
View file @
5a4c7d80
...
...
@@ -170,7 +170,7 @@ sub EmitFormElements ($$$$$)
print
"<TD COLSPAN=3 ALIGN=LEFT><B>Can turn this bit on for other users</B></TD>\n"
;
print
"</TR><TR>\n<TD ALIGN=CENTER><B>|</B></TD>\n"
;
}
print
"<TD COLSPAN=2 ALIGN=LEFT><B>User has these priv
e
leges</B></TD>\n"
;
print
"<TD COLSPAN=2 ALIGN=LEFT><B>User has these priv
i
leges</B></TD>\n"
;
while
(
MoreSQLData
())
{
my
(
$bit
,
$name
,
$description
,
$checked
,
$blchecked
)
=
FetchSQLData
();
print
"</TR><TR>\n"
;
...
...
@@ -184,7 +184,7 @@ sub EmitFormElements ($$$$$)
}
}
}
else
{
print
"</TR><TR><TH ALIGN=RIGHT>Groups and<br>Priv
e
leges:</TH><TD><TABLE><TR>"
;
print
"</TR><TR><TH ALIGN=RIGHT>Groups and<br>Priv
i
leges:</TH><TD><TABLE><TR>"
;
print
"<TD COLSPAN=3>The new user will be inserted into groups "
.
"based on their userregexps.<BR>To change the group "
.
"permissions for this user, you must edit the account after "
.
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment