/[smecontribs]/rpms/smeserver-remoteuseraccess/contribs8/smeserver-remoteuseraccess-1.2-locale-2009-03-01.patch
ViewVC logotype

Annotation of /rpms/smeserver-remoteuseraccess/contribs8/smeserver-remoteuseraccess-1.2-locale-2009-03-01.patch

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph


Revision 1.1 - (hide annotations) (download)
Thu Feb 7 02:21:40 2013 UTC (11 years, 8 months ago) by unnilennium
Branch: MAIN
CVS Tags: smeserver-remoteuseraccess-1_2-37_el5_sme, smeserver-remoteuseraccess-1_2-40_el5_sme, smeserver-remoteuseraccess-1_2-39_el5_sme, smeserver-remoteuseraccess-1_2-38_el5_sme, HEAD
Initial import

1 unnilennium 1.1 --- smeserver-remoteuseraccess-1.2/root/etc/e-smith/locale/nb/etc/e-smith/web/functions/remoteuseraccess 1969-12-31 17:00:00.000000000 -0700
2     +++ smeserver-remoteuseraccess-1.2.update/root/etc/e-smith/locale/nb/etc/e-smith/web/functions/remoteuseraccess 2009-03-01 00:22:34.000000000 -0700
3     @@ -0,0 +1,62 @@
4     +<lexicon lang="nb">
5     + <entry>
6     + <base>User Remote Access</base>
7     + <trans>User Remote Access</trans>
8     + </entry>
9     + <entry>
10     + <base>SSH keys</base>
11     + <trans>SSH keys</trans>
12     + </entry>
13     + <entry>
14     + <base>FORM_TITLE</base>
15     + <trans>Change user remote access settings</trans>
16     + </entry>
17     + <entry>
18     + <base>SHELL_ACCESS</base>
19     + <trans>Shell</trans>
20     + </entry>
21     + <entry>
22     + <base>SUDO</base>
23     + <trans>Sudo</trans>
24     + </entry>
25     + <entry>
26     + <base>SSH_KEYS</base>
27     + <trans>SSH Keys</trans>
28     + </entry>
29     + <entry>
30     + <base>CHROOT_PATH</base>
31     + <trans>Chroot Path</trans>
32     + </entry>
33     + <entry>
34     + <base>CHROOT_PATH_NOT_GIVEN</base>
35     + <trans>Chroot Path not given</trans>
36     + </entry>
37     + <entry>
38     + <base>CHROOT_PATH_NON_EXISTANT</base>
39     + <trans>Chroot Path does not exist</trans>
40     + </entry>
41     + <entry>
42     + <base>SELECT_CHROOT_PATH</base>
43     + <trans>Select Chroot Path</trans>
44     + </entry>
45     + <entry>
46     + <base>VPN_ACCESS</base>
47     + <trans>RSSH + VPN Access</trans>
48     + </entry>
49     + <entry>
50     + <base>SHELL_ACCESS</base>
51     + <trans>Shell Access</trans>
52     + </entry>
53     + <entry>
54     + <base>SUDOER_ACCESS</base>
55     + <trans>Sudo Access</trans>
56     + </entry>
57     + <entry>
58     + <base>MODIFY_DESCRIPTION</base>
59     + <trans><![CDATA[ <p> Enabling bash shell access for a user account poses a security risk. Only use this option if you know what you are doing. A safer option is to allow rssh access (sftp, ssh & rsync). </p> <p> Sudo access allows users to execute commands with the permissions of the root account without knowing the root password. This is more desirable than passing around the root password. Setting Sudo to yes also sets the shell to bash </p> <p> SHELL, VPN & FTP access for users depend on the settings in the Remote Access Panel being opened. </p> <p> Select an FTP Chroot path from the drop down box or enter it in the text field, the selection will overwrite the text field. </p> <p> Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys". </p> ]]></trans>
60     + </entry>
61     + <entry>
62     + <base>SSHKEYS_DESCRIPTION</base>
63     + <trans>Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".</trans>
64     + </entry>
65     +</lexicon>
66     --- smeserver-remoteuseraccess-1.2/root/etc/e-smith/locale/ru/etc/e-smith/web/functions/remoteuseraccess 1969-12-31 17:00:00.000000000 -0700
67     +++ smeserver-remoteuseraccess-1.2.update/root/etc/e-smith/locale/ru/etc/e-smith/web/functions/remoteuseraccess 2009-03-01 00:22:35.000000000 -0700
68     @@ -0,0 +1,62 @@
69     +<lexicon lang="ru">
70     + <entry>
71     + <base>User Remote Access</base>
72     + <trans>User Remote Access</trans>
73     + </entry>
74     + <entry>
75     + <base>SSH keys</base>
76     + <trans>SSH keys</trans>
77     + </entry>
78     + <entry>
79     + <base>FORM_TITLE</base>
80     + <trans>Change user remote access settings</trans>
81     + </entry>
82     + <entry>
83     + <base>SHELL_ACCESS</base>
84     + <trans>Shell</trans>
85     + </entry>
86     + <entry>
87     + <base>SUDO</base>
88     + <trans>Sudo</trans>
89     + </entry>
90     + <entry>
91     + <base>SSH_KEYS</base>
92     + <trans>SSH Keys</trans>
93     + </entry>
94     + <entry>
95     + <base>CHROOT_PATH</base>
96     + <trans>Chroot Path</trans>
97     + </entry>
98     + <entry>
99     + <base>CHROOT_PATH_NOT_GIVEN</base>
100     + <trans>Chroot Path not given</trans>
101     + </entry>
102     + <entry>
103     + <base>CHROOT_PATH_NON_EXISTANT</base>
104     + <trans>Chroot Path does not exist</trans>
105     + </entry>
106     + <entry>
107     + <base>SELECT_CHROOT_PATH</base>
108     + <trans>Select Chroot Path</trans>
109     + </entry>
110     + <entry>
111     + <base>VPN_ACCESS</base>
112     + <trans>RSSH + VPN Access</trans>
113     + </entry>
114     + <entry>
115     + <base>SHELL_ACCESS</base>
116     + <trans>Shell Access</trans>
117     + </entry>
118     + <entry>
119     + <base>SUDOER_ACCESS</base>
120     + <trans>Sudo Access</trans>
121     + </entry>
122     + <entry>
123     + <base>MODIFY_DESCRIPTION</base>
124     + <trans><![CDATA[ <p> Enabling bash shell access for a user account poses a security risk. Only use this option if you know what you are doing. A safer option is to allow rssh access (sftp, ssh & rsync). </p> <p> Sudo access allows users to execute commands with the permissions of the root account without knowing the root password. This is more desirable than passing around the root password. Setting Sudo to yes also sets the shell to bash </p> <p> SHELL, VPN & FTP access for users depend on the settings in the Remote Access Panel being opened. </p> <p> Select an FTP Chroot path from the drop down box or enter it in the text field, the selection will overwrite the text field. </p> <p> Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys". </p> ]]></trans>
125     + </entry>
126     + <entry>
127     + <base>SSHKEYS_DESCRIPTION</base>
128     + <trans>Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".</trans>
129     + </entry>
130     +</lexicon>
131     --- smeserver-remoteuseraccess-1.2/root/etc/e-smith/locale/zh-cn/etc/e-smith/web/functions/remoteuseraccess 1969-12-31 17:00:00.000000000 -0700
132     +++ smeserver-remoteuseraccess-1.2.update/root/etc/e-smith/locale/zh-cn/etc/e-smith/web/functions/remoteuseraccess 2009-03-01 00:22:36.000000000 -0700
133     @@ -0,0 +1,62 @@
134     +<lexicon lang="zh-cn">
135     + <entry>
136     + <base>User Remote Access</base>
137     + <trans>User Remote Access</trans>
138     + </entry>
139     + <entry>
140     + <base>SSH keys</base>
141     + <trans>SSH keys</trans>
142     + </entry>
143     + <entry>
144     + <base>FORM_TITLE</base>
145     + <trans>Change user remote access settings</trans>
146     + </entry>
147     + <entry>
148     + <base>SHELL_ACCESS</base>
149     + <trans>Shell</trans>
150     + </entry>
151     + <entry>
152     + <base>SUDO</base>
153     + <trans>Sudo</trans>
154     + </entry>
155     + <entry>
156     + <base>SSH_KEYS</base>
157     + <trans>SSH Keys</trans>
158     + </entry>
159     + <entry>
160     + <base>CHROOT_PATH</base>
161     + <trans>Chroot Path</trans>
162     + </entry>
163     + <entry>
164     + <base>CHROOT_PATH_NOT_GIVEN</base>
165     + <trans>Chroot Path not given</trans>
166     + </entry>
167     + <entry>
168     + <base>CHROOT_PATH_NON_EXISTANT</base>
169     + <trans>Chroot Path does not exist</trans>
170     + </entry>
171     + <entry>
172     + <base>SELECT_CHROOT_PATH</base>
173     + <trans>Select Chroot Path</trans>
174     + </entry>
175     + <entry>
176     + <base>VPN_ACCESS</base>
177     + <trans>RSSH + VPN Access</trans>
178     + </entry>
179     + <entry>
180     + <base>SHELL_ACCESS</base>
181     + <trans>Shell Access</trans>
182     + </entry>
183     + <entry>
184     + <base>SUDOER_ACCESS</base>
185     + <trans>Sudo Access</trans>
186     + </entry>
187     + <entry>
188     + <base>MODIFY_DESCRIPTION</base>
189     + <trans><![CDATA[ <p> Enabling bash shell access for a user account poses a security risk. Only use this option if you know what you are doing. A safer option is to allow rssh access (sftp, ssh & rsync). </p> <p> Sudo access allows users to execute commands with the permissions of the root account without knowing the root password. This is more desirable than passing around the root password. Setting Sudo to yes also sets the shell to bash </p> <p> SHELL, VPN & FTP access for users depend on the settings in the Remote Access Panel being opened. </p> <p> Select an FTP Chroot path from the drop down box or enter it in the text field, the selection will overwrite the text field. </p> <p> Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys". </p> ]]></trans>
190     + </entry>
191     + <entry>
192     + <base>SSHKEYS_DESCRIPTION</base>
193     + <trans>Enter the public SSH Keys to allow ssh access without passwords, keys should be pasted as a single line, but they will wrap onto three or more lines in the display. To delete all keys type "deletekeys".</trans>
194     + </entry>
195     +</lexicon>

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed