aboutsummaryrefslogtreecommitdiff
path: root/src/verify.c
diff options
context:
space:
mode:
authorSergey Poznyakoff <gray@gnu.org.ua>2009-02-23 10:03:37 +0200
committerSergey Poznyakoff <gray@gnu.org.ua>2009-02-23 10:03:37 +0200
commit337a06f32fb530e0e0884fef2f5f630cca9911a1 (patch)
treed0687ccd3e9ff527d9c5613fd052cbe0f79bb40a /src/verify.c
parent7543ff5973d1afe75b0f4226a3a02cc8d375ad3e (diff)
downloadwydawca-337a06f32fb530e0e0884fef2f5f630cca9911a1.tar.gz
wydawca-337a06f32fb530e0e0884fef2f5f630cca9911a1.tar.bz2
Add missing i18n markers
Diffstat (limited to 'src/verify.c')
-rw-r--r--src/verify.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/src/verify.c b/src/verify.c
index 5d82d2f..14651d2 100644
--- a/src/verify.c
+++ b/src/verify.c
@@ -49,7 +49,7 @@ fill_project_name (struct file_triplet *trp)
49 return 1; 49 return 1;
50 if (directive_get_value (trp, "directory", &directory)) 50 if (directive_get_value (trp, "directory", &directory))
51 { 51 {
52 logmsg (LOG_ERR, "%s: missing `directory' directive", 52 logmsg (LOG_ERR, _("%s: missing `directory' directive"),
53 trp->file[file_directive].name); 53 trp->file[file_directive].name);
54 return 1; 54 return 1;
55 } 55 }
@@ -59,7 +59,7 @@ fill_project_name (struct file_triplet *trp)
59 size_t len = p - directory; 59 size_t len = p - directory;
60 if (len == 0) 60 if (len == 0)
61 { 61 {
62 logmsg (LOG_ERR, "%s: empty `directory' directive", 62 logmsg (LOG_ERR, _("%s: empty `directory' directive"),
63 trp->file[file_directive].name); 63 trp->file[file_directive].name);
64 return 1; 64 return 1;
65 } 65 }
@@ -106,7 +106,7 @@ check_access_rights (struct file_triplet *trp, struct spool *spool,
106 return 1; 106 return 1;
107 107
108 if (debug_level) 108 if (debug_level)
109 logmsg (LOG_DEBUG, "verifying access rights for user %s to project %s", 109 logmsg (LOG_DEBUG, _("verifying access rights for user %s to project %s"),
110 user, trp->project); 110 user, trp->project);
111 111
112 md = method_open (method); 112 md = method_open (method);
@@ -124,7 +124,7 @@ check_access_rights (struct file_triplet *trp, struct spool *spool,
124 method_close (method, md); 124 method_close (method, md);
125 if (rc) 125 if (rc)
126 { 126 {
127 logmsg (LOG_ERR, "Cannot verify access rights for %s on %s", 127 logmsg (LOG_ERR, _("cannot verify access rights for %s on %s"),
128 user, trp->project); 128 user, trp->project);
129 return 1; 129 return 1;
130 } 130 }
@@ -133,7 +133,7 @@ check_access_rights (struct file_triplet *trp, struct spool *spool,
133 if (!result || strcmp (result, user)) 133 if (!result || strcmp (result, user))
134 { 134 {
135 UPDATE_STATS (STAT_ACCESS_VIOLATIONS); 135 UPDATE_STATS (STAT_ACCESS_VIOLATIONS);
136 logmsg (LOG_ERR, "%s: %s has no rights on %s", 136 logmsg (LOG_ERR, _("%s: %s has no rights on %s"),
137 trp->name, user, trp->project); 137 trp->name, user, trp->project);
138 notify (spool->notification, trp, ev_bad_ownership); 138 notify (spool->notification, trp, ev_bad_ownership);
139 return 1; 139 return 1;
@@ -162,7 +162,7 @@ verify_directive_file (struct file_triplet *trp, struct spool *spool)
162 pw = getpwuid (TRIPLET_UID (trp)); 162 pw = getpwuid (TRIPLET_UID (trp));
163 if (!pw) 163 if (!pw)
164 { 164 {
165 logmsg (LOG_ERR, "%s: getpwuid failed: %s", 165 logmsg (LOG_ERR, _("%s: getpwuid failed: %s"),
166 trp->name, strerror (errno)); 166 trp->name, strerror (errno));
167 method_close (method, md); 167 method_close (method, md);
168 return 1; 168 return 1;
@@ -179,7 +179,7 @@ verify_directive_file (struct file_triplet *trp, struct spool *spool)
179 free (command); 179 free (command);
180 if (rc) 180 if (rc)
181 { 181 {
182 logmsg (LOG_ERR, "Cannot get PGP key for %s", trp->user); 182 logmsg (LOG_ERR, _("cannot get PGP key for %s"), trp->user);
183 method_close (method, md); 183 method_close (method, md);
184 return 1; 184 return 1;
185 } 185 }
@@ -187,23 +187,23 @@ verify_directive_file (struct file_triplet *trp, struct spool *spool)
187 pubkey = method_result (method, md, 0, 0); 187 pubkey = method_result (method, md, 0, 0);
188 if (!pubkey || pubkey[0] == 0) 188 if (!pubkey || pubkey[0] == 0)
189 { 189 {
190 logmsg (LOG_ERR, "No GPG key for %s", trp->user); 190 logmsg (LOG_ERR, _("no GPG key for %s"), trp->user);
191 method_close (method, md); 191 method_close (method, md);
192 return 1; 192 return 1;
193 } 193 }
194 194
195 if (debug_level > 3) 195 if (debug_level > 3)
196 logmsg (LOG_DEBUG, "Public key: %s", pubkey); 196 logmsg (LOG_DEBUG, _("public key: %s"), pubkey);
197 197
198 if (verify_directive_signature (trp, spool, pubkey)) 198 if (verify_directive_signature (trp, spool, pubkey))
199 { 199 {
200 /*FIXME: Update stats */ 200 /*FIXME: Update stats */
201 logmsg (LOG_ERR, "invalid signature for %s", trp->name); 201 logmsg (LOG_ERR, _("invalid signature for %s"), trp->name);
202 method_close (method, md); 202 method_close (method, md);
203 return 1; 203 return 1;
204 } 204 }
205 else if (debug_level) 205 else if (debug_level)
206 logmsg (LOG_DEBUG, "%s: directive file signature OK", trp->name); 206 logmsg (LOG_DEBUG, _("%s: directive file signature OK"), trp->name);
207 207
208 method_close (method, md); 208 method_close (method, md);
209 209

Return to:

Send suggestions and report system problems to the System administrator.