diff options
author | Sergey Poznyakoff <gray@gnu.org.ua> | 2009-02-23 10:03:37 +0200 |
---|---|---|
committer | Sergey Poznyakoff <gray@gnu.org.ua> | 2009-02-23 10:03:37 +0200 |
commit | 337a06f32fb530e0e0884fef2f5f630cca9911a1 (patch) | |
tree | d0687ccd3e9ff527d9c5613fd052cbe0f79bb40a /src/verify.c | |
parent | 7543ff5973d1afe75b0f4226a3a02cc8d375ad3e (diff) | |
download | wydawca-337a06f32fb530e0e0884fef2f5f630cca9911a1.tar.gz wydawca-337a06f32fb530e0e0884fef2f5f630cca9911a1.tar.bz2 |
Add missing i18n markers
Diffstat (limited to 'src/verify.c')
-rw-r--r-- | src/verify.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/src/verify.c b/src/verify.c index 5d82d2f..14651d2 100644 --- a/src/verify.c +++ b/src/verify.c | |||
@@ -49,7 +49,7 @@ fill_project_name (struct file_triplet *trp) | |||
49 | return 1; | 49 | return 1; |
50 | if (directive_get_value (trp, "directory", &directory)) | 50 | if (directive_get_value (trp, "directory", &directory)) |
51 | { | 51 | { |
52 | logmsg (LOG_ERR, "%s: missing `directory' directive", | 52 | logmsg (LOG_ERR, _("%s: missing `directory' directive"), |
53 | trp->file[file_directive].name); | 53 | trp->file[file_directive].name); |
54 | return 1; | 54 | return 1; |
55 | } | 55 | } |
@@ -59,7 +59,7 @@ fill_project_name (struct file_triplet *trp) | |||
59 | size_t len = p - directory; | 59 | size_t len = p - directory; |
60 | if (len == 0) | 60 | if (len == 0) |
61 | { | 61 | { |
62 | logmsg (LOG_ERR, "%s: empty `directory' directive", | 62 | logmsg (LOG_ERR, _("%s: empty `directory' directive"), |
63 | trp->file[file_directive].name); | 63 | trp->file[file_directive].name); |
64 | return 1; | 64 | return 1; |
65 | } | 65 | } |
@@ -106,7 +106,7 @@ check_access_rights (struct file_triplet *trp, struct spool *spool, | |||
106 | return 1; | 106 | return 1; |
107 | 107 | ||
108 | if (debug_level) | 108 | if (debug_level) |
109 | logmsg (LOG_DEBUG, "verifying access rights for user %s to project %s", | 109 | logmsg (LOG_DEBUG, _("verifying access rights for user %s to project %s"), |
110 | user, trp->project); | 110 | user, trp->project); |
111 | 111 | ||
112 | md = method_open (method); | 112 | md = method_open (method); |
@@ -124,7 +124,7 @@ check_access_rights (struct file_triplet *trp, struct spool *spool, | |||
124 | method_close (method, md); | 124 | method_close (method, md); |
125 | if (rc) | 125 | if (rc) |
126 | { | 126 | { |
127 | logmsg (LOG_ERR, "Cannot verify access rights for %s on %s", | 127 | logmsg (LOG_ERR, _("cannot verify access rights for %s on %s"), |
128 | user, trp->project); | 128 | user, trp->project); |
129 | return 1; | 129 | return 1; |
130 | } | 130 | } |
@@ -133,7 +133,7 @@ check_access_rights (struct file_triplet *trp, struct spool *spool, | |||
133 | if (!result || strcmp (result, user)) | 133 | if (!result || strcmp (result, user)) |
134 | { | 134 | { |
135 | UPDATE_STATS (STAT_ACCESS_VIOLATIONS); | 135 | UPDATE_STATS (STAT_ACCESS_VIOLATIONS); |
136 | logmsg (LOG_ERR, "%s: %s has no rights on %s", | 136 | logmsg (LOG_ERR, _("%s: %s has no rights on %s"), |
137 | trp->name, user, trp->project); | 137 | trp->name, user, trp->project); |
138 | notify (spool->notification, trp, ev_bad_ownership); | 138 | notify (spool->notification, trp, ev_bad_ownership); |
139 | return 1; | 139 | return 1; |
@@ -162,7 +162,7 @@ verify_directive_file (struct file_triplet *trp, struct spool *spool) | |||
162 | pw = getpwuid (TRIPLET_UID (trp)); | 162 | pw = getpwuid (TRIPLET_UID (trp)); |
163 | if (!pw) | 163 | if (!pw) |
164 | { | 164 | { |
165 | logmsg (LOG_ERR, "%s: getpwuid failed: %s", | 165 | logmsg (LOG_ERR, _("%s: getpwuid failed: %s"), |
166 | trp->name, strerror (errno)); | 166 | trp->name, strerror (errno)); |
167 | method_close (method, md); | 167 | method_close (method, md); |
168 | return 1; | 168 | return 1; |
@@ -179,7 +179,7 @@ verify_directive_file (struct file_triplet *trp, struct spool *spool) | |||
179 | free (command); | 179 | free (command); |
180 | if (rc) | 180 | if (rc) |
181 | { | 181 | { |
182 | logmsg (LOG_ERR, "Cannot get PGP key for %s", trp->user); | 182 | logmsg (LOG_ERR, _("cannot get PGP key for %s"), trp->user); |
183 | method_close (method, md); | 183 | method_close (method, md); |
184 | return 1; | 184 | return 1; |
185 | } | 185 | } |
@@ -187,23 +187,23 @@ verify_directive_file (struct file_triplet *trp, struct spool *spool) | |||
187 | pubkey = method_result (method, md, 0, 0); | 187 | pubkey = method_result (method, md, 0, 0); |
188 | if (!pubkey || pubkey[0] == 0) | 188 | if (!pubkey || pubkey[0] == 0) |
189 | { | 189 | { |
190 | logmsg (LOG_ERR, "No GPG key for %s", trp->user); | 190 | logmsg (LOG_ERR, _("no GPG key for %s"), trp->user); |
191 | method_close (method, md); | 191 | method_close (method, md); |
192 | return 1; | 192 | return 1; |
193 | } | 193 | } |
194 | 194 | ||
195 | if (debug_level > 3) | 195 | if (debug_level > 3) |
196 | logmsg (LOG_DEBUG, "Public key: %s", pubkey); | 196 | logmsg (LOG_DEBUG, _("public key: %s"), pubkey); |
197 | 197 | ||
198 | if (verify_directive_signature (trp, spool, pubkey)) | 198 | if (verify_directive_signature (trp, spool, pubkey)) |
199 | { | 199 | { |
200 | /*FIXME: Update stats */ | 200 | /*FIXME: Update stats */ |
201 | logmsg (LOG_ERR, "invalid signature for %s", trp->name); | 201 | logmsg (LOG_ERR, _("invalid signature for %s"), trp->name); |
202 | method_close (method, md); | 202 | method_close (method, md); |
203 | return 1; | 203 | return 1; |
204 | } | 204 | } |
205 | else if (debug_level) | 205 | else if (debug_level) |
206 | logmsg (LOG_DEBUG, "%s: directive file signature OK", trp->name); | 206 | logmsg (LOG_DEBUG, _("%s: directive file signature OK"), trp->name); |
207 | 207 | ||
208 | method_close (method, md); | 208 | method_close (method, md); |
209 | 209 | ||