This commit is contained in:
Roland Gruber 2020-12-21 17:05:53 +01:00
parent cbacdc664e
commit 223319836a
23 changed files with 62 additions and 62 deletions

View file

@ -47,7 +47,7 @@ AC_PATH_PROG(MKDIR, mkdir)
AC_PATH_PROG(RM, rm) AC_PATH_PROG(RM, rm)
AC_PATH_PROG(TAR, tar) AC_PATH_PROG(TAR, tar)
# Find a sutable copy command # Find a suitable copy command
AC_PATH_PROG(COPY, copy) AC_PATH_PROG(COPY, copy)
AC_PATH_PROG(CP, cp) AC_PATH_PROG(CP, cp)
if test x$COPY = x ; then if test x$COPY = x ; then

View file

@ -1071,7 +1071,7 @@ March 2021 7.5
- new login layout - new login layout
- added Hungarian and Japanese translations - added Hungarian and Japanese translations
- fixed bugs: - fixed bugs:
Samba paswords were sometimes empty for new users (892272) Samba passwords were sometimes empty for new users (892272)
links in list views may not work with web servers other than Apache links in list views may not work with web servers other than Apache

View file

@ -8,7 +8,7 @@
ServerURL: ldap://localhost:389 ServerURL: ldap://localhost:389
# list of users who are allowed to use LDAP Account Manager # list of users who are allowed to use LDAP Account Manager
# names have to be seperated by semicolons # names have to be separated by semicolons
# e.g. admins: cn=admin,dc=yourdomain,dc=org;cn=root,dc=yourdomain,dc=org # e.g. admins: cn=admin,dc=yourdomain,dc=org;cn=root,dc=yourdomain,dc=org
Admins: cn=Manager,dc=my-domain,dc=com Admins: cn=Manager,dc=my-domain,dc=com

View file

@ -2,7 +2,7 @@
# #
# Do not modify! # Do not modify!
# Each line consists of a ":"-seperated entry. The first part is the locale name, # Each line consists of a ":"-separated entry. The first part is the locale name,
# the second is the character encoding and the third the language name. # the second is the character encoding and the third the language name.
# Catalan # Catalan

View file

@ -8,7 +8,7 @@
ServerURL: ldap://localhost:389 ServerURL: ldap://localhost:389
# list of users who are allowed to use LDAP Account Manager # list of users who are allowed to use LDAP Account Manager
# names have to be seperated by semicolons # names have to be separated by semicolons
# e.g. admins: cn=admin,dc=yourdomain,dc=org;cn=root,dc=yourdomain,dc=org # e.g. admins: cn=admin,dc=yourdomain,dc=org;cn=root,dc=yourdomain,dc=org
Admins: cn=Manager,dc=my-domain,dc=com Admins: cn=Manager,dc=my-domain,dc=com

View file

@ -8,7 +8,7 @@
ServerURL: ldap://localhost:389 ServerURL: ldap://localhost:389
# list of users who are allowed to use LDAP Account Manager # list of users who are allowed to use LDAP Account Manager
# names have to be seperated by semicolons # names have to be separated by semicolons
# e.g. admins: cn=admin,dc=yourdomain,dc=org;cn=root,dc=yourdomain,dc=org # e.g. admins: cn=admin,dc=yourdomain,dc=org;cn=root,dc=yourdomain,dc=org
Admins: cn=Manager,dc=my-domain,dc=com Admins: cn=Manager,dc=my-domain,dc=com

View file

@ -8,7 +8,7 @@
ServerURL: ldap://pdc.my-domain.com ServerURL: ldap://pdc.my-domain.com
# list of users who are allowed to use LDAP Account Manager # list of users who are allowed to use LDAP Account Manager
# names have to be seperated by semicolons # names have to be separated by semicolons
# e.g. admins: cn=admin,dc=yourdomain,dc=org;cn=root,dc=yourdomain,dc=org # e.g. admins: cn=admin,dc=yourdomain,dc=org;cn=root,dc=yourdomain,dc=org
Admins: cn=Administrator,cn=users,dc=my-domain,dc=com Admins: cn=Administrator,cn=users,dc=my-domain,dc=com

View file

@ -318,7 +318,7 @@ return false;<br>
</h2> </h2>
In most cases you will not have to implement this option if you use <span style="font-weight: bold;">$this-&gt;attributes</span> and <span style="font-weight: bold;">$this-&gt;orig</span> to manage the LDAP In most cases you will not have to implement this option if you use <span style="font-weight: bold;">$this-&gt;attributes</span> and <span style="font-weight: bold;">$this-&gt;orig</span> to manage the LDAP
attributes. The <span style="font-style: italic;">baseModule</span> attributes. The <span style="font-style: italic;">baseModule</span>
will generate the save comands for you.<br> will generate the save commands for you.<br>
<br> <br>
When all modules report that they are ready for LDAP add/modify and the When all modules report that they are ready for LDAP add/modify and the
user clicks on the add/modify button your module will be asked what user clicks on the add/modify button your module will be asked what

View file

@ -82,7 +82,7 @@ This script finally uploads the LDAP accounts with <span
style="font-style: italic;">ldap_add()</span>.<br> style="font-style: italic;">ldap_add()</span>.<br>
<br> <br>
The upload can last longer than the maximum execution time of PHP. The upload can last longer than the maximum execution time of PHP.
Therefore the script will check regulary how much time is left and Therefore the script will check regularly how much time is left and
pause the upload. This is resumed with a meta refresh which loads the pause the upload. This is resumed with a meta refresh which loads the
script again.<br> script again.<br>
<br> <br>

View file

@ -802,7 +802,7 @@ function searchLDAPByAttribute($name, $value, $objectClass, $attributes, $scopes
$entries = searchLDAPPaged($_SESSION['ldap']->server(), escapeDN($type->getSuffix()), $entries = searchLDAPPaged($_SESSION['ldap']->server(), escapeDN($type->getSuffix()),
$filter, $attributes, 0, $_SESSION['config']->get_searchLimit()); $filter, $attributes, 0, $_SESSION['config']->get_searchLimit());
if (ldap_errno($_SESSION['ldap']->server()) == 4) { if (ldap_errno($_SESSION['ldap']->server()) == 4) {
logNewMessage(LOG_WARNING, 'LDAP size limit exeeded. Please increase the limit on your server.'); logNewMessage(LOG_WARNING, 'LDAP size limit exceeded. Please increase the limit on your server.');
} }
$return = array_merge($return, $entries); $return = array_merge($return, $entries);
} }
@ -841,7 +841,7 @@ function searchLDAPByFilter($filter, $attributes, $scopes, $attrsOnly = false) {
$entries = searchLDAPPaged($_SESSION['ldap']->server(), escapeDN($type->getSuffix()), $entries = searchLDAPPaged($_SESSION['ldap']->server(), escapeDN($type->getSuffix()),
$filter, $attributes, $readAttributesOnly, $_SESSION['config']->get_searchLimit()); $filter, $attributes, $readAttributesOnly, $_SESSION['config']->get_searchLimit());
if (ldap_errno($_SESSION['ldap']->server()) == 4) { if (ldap_errno($_SESSION['ldap']->server()) == 4) {
logNewMessage(LOG_WARNING, 'LDAP size limit exeeded. Please increase the limit on your server.'); logNewMessage(LOG_WARNING, 'LDAP size limit exceeded. Please increase the limit on your server.');
} }
$return = array_merge($return, $entries); $return = array_merge($return, $entries);
} }
@ -864,7 +864,7 @@ function searchLDAP($suffix, $filter, $attributes) {
$return = searchLDAPPaged(getLDAPServerHandle(), escapeDN($suffix), $filter, $attributes, $return = searchLDAPPaged(getLDAPServerHandle(), escapeDN($suffix), $filter, $attributes,
0, $limit); 0, $limit);
if (ldap_errno(getLDAPServerHandle()) == 4) { if (ldap_errno(getLDAPServerHandle()) == 4) {
logNewMessage(LOG_WARNING, 'LDAP size limit exeeded. Please increase the limit on your server.'); logNewMessage(LOG_WARNING, 'LDAP size limit exceeded. Please increase the limit on your server.');
} }
return $return; return $return;
} }

View file

@ -1160,7 +1160,7 @@ abstract class baseModule {
* <br><b>"notchanged"</b> are attributes which stay unchanged * <br><b>"notchanged"</b> are attributes which stay unchanged
* <br><b>"info"</b> values with informational value (e.g. to be used later by pre/postModify actions) * <br><b>"info"</b> values with informational value (e.g. to be used later by pre/postModify actions)
* <br> * <br>
* <br>This builds the required comands from $this-attributes and $this->orig. * <br>This builds the required commands from $this-attributes and $this->orig.
* *
* @return array list of modifications * @return array list of modifications
*/ */
@ -1606,7 +1606,7 @@ abstract class baseModule {
* </ul> * </ul>
* *
* @param htmlResponsiveRow $container row * @param htmlResponsiveRow $container row
* @param string $labelFirst label of first selct * @param string $labelFirst label of first select
* @param string $labelSecond label of second select * @param string $labelSecond label of second select
* @param string[] $optionsFirst options of first select ('label' => 'value') * @param string[] $optionsFirst options of first select ('label' => 'value')
* @param string[] $selectedFirst selected options of first select * @param string[] $selectedFirst selected options of first select

View file

@ -866,7 +866,7 @@ class accountContainer {
$oldPage = $this->current_page; $oldPage = $this->current_page;
$oldSubpage = $this->subpage; $oldSubpage = $this->subpage;
$result = array(); $result = array();
$errorsOccured = false; $errorsOccurred = false;
$typeObject = $this->type->getBaseType(); $typeObject = $this->type->getBaseType();
$profileLoaded = $this->loadProfileIfRequested(); $profileLoaded = $this->loadProfileIfRequested();
if ($this->subpage == '') { if ($this->subpage == '') {
@ -924,7 +924,7 @@ class accountContainer {
if (is_array($result)) { // messages were returned, check for errors if (is_array($result)) { // messages were returned, check for errors
for ($i = 0; $i < sizeof($result); $i++) { for ($i = 0; $i < sizeof($result); $i++) {
if ($result[$i][0] == 'ERROR') { if ($result[$i][0] == 'ERROR') {
$errorsOccured = true; $errorsOccurred = true;
break; break;
} }
} }
@ -934,7 +934,7 @@ class accountContainer {
// run type post actions // run type post actions
$typeObject->runEditPagePostAction($this); $typeObject->runEditPagePostAction($this);
// save account // save account
if (!$errorsOccured && isset($_POST['accountContainerSaveAccount'])) { if (!$errorsOccurred && isset($_POST['accountContainerSaveAccount'])) {
// check if all modules are complete // check if all modules are complete
$modules = array_keys($this->module); $modules = array_keys($this->module);
$incompleteModules = array(); $incompleteModules = array();
@ -970,12 +970,12 @@ class accountContainer {
if (is_array($result)) { // messages were returned, check for errors if (is_array($result)) { // messages were returned, check for errors
for ($i = 0; $i < sizeof($result); $i++) { for ($i = 0; $i < sizeof($result); $i++) {
if ($result[$i][0] == 'ERROR') { if ($result[$i][0] == 'ERROR') {
$errorsOccured = true; $errorsOccurred = true;
break; break;
} }
} }
} }
if (!$errorsOccured) { if (!$errorsOccurred) {
// go to subpage of current module // go to subpage of current module
$postKeys = array_keys($_POST); $postKeys = array_keys($_POST);
for ($p = 0; $p < sizeof($postKeys); $p++) { for ($p = 0; $p < sizeof($postKeys); $p++) {
@ -1011,7 +1011,7 @@ class accountContainer {
$this->titleBarSubtitle = $typeObject->getTitleBarSubtitle($this); $this->titleBarSubtitle = $typeObject->getTitleBarSubtitle($this);
// prints a module content page // prints a module content page
$this->printModuleContent($result); $this->printModuleContent($result);
if (!$errorsOccured && ($oldPage == $this->current_page) && ($oldSubpage == $this->subpage) if (!$errorsOccurred && ($oldPage == $this->current_page) && ($oldSubpage == $this->subpage)
&& isset($_POST['scrollPositionTop']) && isset($_POST['scrollPositionLeft'])) { && isset($_POST['scrollPositionTop']) && isset($_POST['scrollPositionLeft'])) {
// scroll to last position // scroll to last position
echo '<script type="text/javascript"> echo '<script type="text/javascript">
@ -1200,7 +1200,7 @@ class accountContainer {
} }
$return = array( $return = array(
'messages' => '', 'messages' => '',
'errorsOccured' => 'false' 'errorsOccurred' => 'false'
); );
if ($random == 'true') { if ($random == 'true') {
$password1 = generateRandomPassword(); $password1 = generateRandomPassword();
@ -1210,13 +1210,13 @@ class accountContainer {
// check if passwords match // check if passwords match
if ($password1 != $password2) { if ($password1 != $password2) {
$return['messages'] .= StatusMessage('ERROR', _('Passwords are different!'), '', array(), true); $return['messages'] .= StatusMessage('ERROR', _('Passwords are different!'), '', array(), true);
$return['errorsOccured'] = 'true'; $return['errorsOccurred'] = 'true';
} }
// check passsword strength // check passsword strength
$pwdPolicyResult = checkPasswordStrength($password1, null, null); $pwdPolicyResult = checkPasswordStrength($password1, null, null);
if ($pwdPolicyResult !== true) { if ($pwdPolicyResult !== true) {
$return['messages'] .= StatusMessage('ERROR', $pwdPolicyResult, '', array(), true); $return['messages'] .= StatusMessage('ERROR', $pwdPolicyResult, '', array(), true);
$return['errorsOccured'] = 'true'; $return['errorsOccurred'] = 'true';
} }
} }
$forcePasswordChange = false; $forcePasswordChange = false;
@ -1228,14 +1228,14 @@ class accountContainer {
$sendMail = true; $sendMail = true;
} }
$return['forcePasswordChange'] = $forcePasswordChange; $return['forcePasswordChange'] = $forcePasswordChange;
if ($return['errorsOccured'] == 'false') { if ($return['errorsOccurred'] == 'false') {
// set new password // set new password
foreach ($this->module as $module) { foreach ($this->module as $module) {
if ($module instanceof passwordService) { if ($module instanceof passwordService) {
$messages = $module->passwordChangeRequested($password1, $modules, $forcePasswordChange); $messages = $module->passwordChangeRequested($password1, $modules, $forcePasswordChange);
for ($m = 0; $m < sizeof($messages); $m++) { for ($m = 0; $m < sizeof($messages); $m++) {
if ($messages[$m][0] == 'ERROR') { if ($messages[$m][0] == 'ERROR') {
$return['errorsOccured'] = 'true'; $return['errorsOccurred'] = 'true';
} }
if (sizeof($messages[$m]) == 2) { if (sizeof($messages[$m]) == 2) {
$return['messages'] .= StatusMessage($messages[$m][0], $messages[$m][1], '', array(), true); $return['messages'] .= StatusMessage($messages[$m][0], $messages[$m][1], '', array(), true);
@ -1255,12 +1255,12 @@ class accountContainer {
if (($_SESSION['config']->getLamProMailAllowAlternateAddress() != 'false') && !empty($input['sendMailAlternateAddress'])) { if (($_SESSION['config']->getLamProMailAllowAlternateAddress() != 'false') && !empty($input['sendMailAlternateAddress'])) {
if (!get_preg($input['sendMailAlternateAddress'], 'email')) { if (!get_preg($input['sendMailAlternateAddress'], 'email')) {
$return['messages'] .= StatusMessage('ERROR', _('Alternate recipient'), _('Please enter a valid email address!'), array(), true); $return['messages'] .= StatusMessage('ERROR', _('Alternate recipient'), _('Please enter a valid email address!'), array(), true);
$return['errorsOccured'] = 'true'; $return['errorsOccurred'] = 'true';
} }
$this->sendPasswordViaMailAlternateAddress = $input['sendMailAlternateAddress']; $this->sendPasswordViaMailAlternateAddress = $input['sendMailAlternateAddress'];
} }
} }
if ($return['errorsOccured'] == 'false') { if ($return['errorsOccurred'] == 'false') {
$return['messages'] .= StatusMessage('INFO', _('The new password will be stored in the directory after you save this account.'), '', array(), true); $return['messages'] .= StatusMessage('INFO', _('The new password will be stored in the directory after you save this account.'), '', array(), true);
} }
return $return; return $return;

View file

@ -892,7 +892,7 @@ class asteriskExtension extends baseModule {
* <br><b>"notchanged"</b> are attributes which stay unchanged * <br><b>"notchanged"</b> are attributes which stay unchanged
* <br><b>"info"</b> values with informational value (e.g. to be used later by pre/postModify actions) * <br><b>"info"</b> values with informational value (e.g. to be used later by pre/postModify actions)
* <br> * <br>
* <br>This builds the required comands from $this-attributes and $this->orig. * <br>This builds the required commands from $this-attributes and $this->orig.
* *
* @return array list of modifications * @return array list of modifications
*/ */

View file

@ -3175,7 +3175,7 @@ class inetOrgPerson extends baseModule implements passwordService {
} }
function inetOrgPersonDeletePhotoHandleReply(data) { function inetOrgPersonDeletePhotoHandleReply(data) {
if (data.errorsOccured == "false") { if (data.errorsOccurred == "false") {
jQuery(\'#inetOrgPersonPhotoUploadContent\').html(data.html); jQuery(\'#inetOrgPersonPhotoUploadContent\').html(data.html);
window.lam.tools.webcam.init(); window.lam.tools.webcam.init();
} }
@ -3259,7 +3259,7 @@ class inetOrgPerson extends baseModule implements passwordService {
} }
function inetOrgPersonDeleteCertificateHandleReply(data) { function inetOrgPersonDeleteCertificateHandleReply(data) {
if (data.errorsOccured == "false") { if (data.errorsOccurred == "false") {
jQuery(\'#userCertificateDiv\').html(data.html); jQuery(\'#userCertificateDiv\').html(data.html);
} }
else { else {
@ -3904,7 +3904,7 @@ class inetOrgPerson extends baseModule implements passwordService {
$content = ob_get_contents(); $content = ob_get_contents();
ob_end_clean(); ob_end_clean();
return array( return array(
'errorsOccured' => 'false', 'errorsOccurred' => 'false',
'html' => $content, 'html' => $content,
); );
} }
@ -3932,7 +3932,7 @@ class inetOrgPerson extends baseModule implements passwordService {
$content = ob_get_contents(); $content = ob_get_contents();
ob_end_clean(); ob_end_clean();
return array( return array(
'errorsOccured' => 'false', 'errorsOccurred' => 'false',
'html' => $content, 'html' => $content,
); );
} }
@ -3946,7 +3946,7 @@ class inetOrgPerson extends baseModule implements passwordService {
if ($message == null) { if ($message == null) {
$message = _('Invalid request'); $message = _('Invalid request');
} }
return array('errorsOccured' => 'true', 'errormessage' => $message); return array('errorsOccurred' => 'true', 'errormessage' => $message);
} }
/** /**

View file

@ -396,7 +396,7 @@ class ldapPublicKey extends baseModule {
} }
function ldapPublicKeyDeleteKeyHandleReply(data) { function ldapPublicKeyDeleteKeyHandleReply(data) {
if (data.errorsOccured == "false") { if (data.errorsOccurred == "false") {
jQuery(\'#sshPublicKeyDiv\').html(data.html); jQuery(\'#sshPublicKeyDiv\').html(data.html);
} }
else { else {
@ -419,7 +419,7 @@ class ldapPublicKey extends baseModule {
} }
function ldapPublicKeyAddKeyHandleReply(data) { function ldapPublicKeyAddKeyHandleReply(data) {
if (data.errorsOccured == "false") { if (data.errorsOccurred == "false") {
jQuery(\'#sshPublicKeyDiv\').html(data.html); jQuery(\'#sshPublicKeyDiv\').html(data.html);
} }
else { else {
@ -559,7 +559,7 @@ class ldapPublicKey extends baseModule {
$content = ob_get_contents(); $content = ob_get_contents();
ob_end_clean(); ob_end_clean();
$jsonReturn = array( $jsonReturn = array(
'errorsOccured' => 'false', 'errorsOccurred' => 'false',
'html' => $content, 'html' => $content,
); );
} }
@ -634,7 +634,7 @@ class ldapPublicKey extends baseModule {
$content = ob_get_contents(); $content = ob_get_contents();
ob_end_clean(); ob_end_clean();
return array( return array(
'errorsOccured' => 'false', 'errorsOccurred' => 'false',
'html' => $content, 'html' => $content,
); );
} }
@ -648,7 +648,7 @@ class ldapPublicKey extends baseModule {
if ($message == null) { if ($message == null) {
$message = _('Invalid request'); $message = _('Invalid request');
} }
return array('errorsOccured' => 'true', 'errormessage' => $message); return array('errorsOccurred' => 'true', 'errormessage' => $message);
} }
} }

View file

@ -1048,7 +1048,7 @@ class quota extends baseModule {
* <br><b>"notchanged"</b> are attributes which stay unchanged * <br><b>"notchanged"</b> are attributes which stay unchanged
* <br><b>"info"</b> values with informational value (e.g. to be used later by pre/postModify actions) * <br><b>"info"</b> values with informational value (e.g. to be used later by pre/postModify actions)
* <br> * <br>
* <br>This builds the required comands from $this-attributes and $this->orig. * <br>This builds the required commands from $this-attributes and $this->orig.
* *
* @return array list of modifications * @return array list of modifications
*/ */

View file

@ -316,7 +316,7 @@ class range extends baseModule {
} }
$subnet = $this->getAccountContainer()->getAccountModule('dhcp_settings')->attributes['cn'][0]; $subnet = $this->getAccountContainer()->getAccountModule('dhcp_settings')->attributes['cn'][0];
$mask = $this->getAccountContainer()->getAccountModule('dhcp_settings')->getDHCPOption('subnet-mask'); $mask = $this->getAccountContainer()->getAccountModule('dhcp_settings')->getDHCPOption('subnet-mask');
$errorOccured = false; $errorOccurred = false;
$this->reset_overlapped_range(); $this->reset_overlapped_range();
if ($this->getAccountContainer()->getAccountModule('dhcp_settings')->attributes['cn'][0]!="") { if ($this->getAccountContainer()->getAccountModule('dhcp_settings')->attributes['cn'][0]!="") {
@ -337,39 +337,39 @@ class range extends baseModule {
// Check range_start: // Check range_start:
$_POST['range_start_'.$id] = trim($_POST['range_start_'.$id]); $_POST['range_start_'.$id] = trim($_POST['range_start_'.$id]);
if (!check_ip($_POST['range_start_'.$id])) { if (!check_ip($_POST['range_start_'.$id])) {
$errorOccured = true; $errorOccurred = true;
} }
$this->ranges[$id]['range_start'] = $_POST['range_start_'.$id]; $this->ranges[$id]['range_start'] = $_POST['range_start_'.$id];
// Check end: // Check end:
$_POST['range_end_'.$id] = trim($_POST['range_end_'.$id]); $_POST['range_end_'.$id] = trim($_POST['range_end_'.$id]);
if (!check_ip($_POST['range_end_'.$id])) { if (!check_ip($_POST['range_end_'.$id])) {
$errorOccured = true; $errorOccurred = true;
} }
$this->ranges[$id]['range_end'] = $_POST['range_end_'.$id]; $this->ranges[$id]['range_end'] = $_POST['range_end_'.$id];
// Check if ip overlapped: // Check if ip overlapped:
if(!$this->isNotOverlappedRange($_POST['range_start_'.$id],$_POST['range_end_'.$id])) { if(!$this->isNotOverlappedRange($_POST['range_start_'.$id],$_POST['range_end_'.$id])) {
$errorOccured = true; $errorOccurred = true;
} }
// Check if Subnet and range first are valid: // Check if Subnet and range first are valid:
if (!range::check_subnet_range($_POST['range_start_'.$id], $subnet, $mask)) { if (!range::check_subnet_range($_POST['range_start_'.$id], $subnet, $mask)) {
$errorOccured = true; $errorOccurred = true;
} }
// Check if Subnet and range last are valid: // Check if Subnet and range last are valid:
if (!range::check_subnet_range($_POST['range_end_'.$id], $subnet, $mask)) { if (!range::check_subnet_range($_POST['range_end_'.$id], $subnet, $mask)) {
$errorOccured = true; $errorOccurred = true;
} }
// Check if Range is valid // Check if Range is valid
if (!$this->check_range($_POST['range_start_'.$id],$_POST['range_end_'.$id])) { if (!$this->check_range($_POST['range_start_'.$id],$_POST['range_end_'.$id])) {
$errorOccured = true; $errorOccurred = true;
} }
// Check, if range_start and range_end are ok! // Check, if range_start and range_end are ok!
if (!$errorOccured) { if (!$errorOccurred) {
$this->attributes['dhcpRange'][$id] = $_POST['range_start_'.$id]." ".$_POST['range_end_'.$id]; $this->attributes['dhcpRange'][$id] = $_POST['range_start_'.$id]." ".$_POST['range_end_'.$id];
} }
else { else {
@ -382,7 +382,7 @@ class range extends baseModule {
// Add new Range // Add new Range
if(isset($_POST['add_range'])) { if(isset($_POST['add_range'])) {
// Check, if there where no errors: // Check, if there where no errors:
if ($errorOccured) { if ($errorOccurred) {
$errors[] = $this->messages['add_range'][0]; $errors[] = $this->messages['add_range'][0];
} }
else else
@ -438,7 +438,7 @@ class range extends baseModule {
|| !range::check_subnet_range($from, $subnet, $mask) || !range::check_subnet_range($from, $subnet, $mask)
|| !range::check_subnet_range($to, $subnet, $mask) || !range::check_subnet_range($to, $subnet, $mask)
|| !$this->check_range($from, $to)) { || !$this->check_range($from, $to)) {
$errorOccured = true; $errorOccurred = true;
} }
} }
} }
@ -463,7 +463,7 @@ class range extends baseModule {
} }
// Check if there was a error: // Check if there was a error:
if ($errorOccured) { if ($errorOccurred) {
$errors[] = $this->messages['range_errors'][0]; $errors[] = $this->messages['range_errors'][0];
} }

View file

@ -983,7 +983,7 @@ class windowsGroup extends baseModule {
* <br><b>"notchanged"</b> are attributes which stay unchanged * <br><b>"notchanged"</b> are attributes which stay unchanged
* <br><b>"info"</b> values with informational value (e.g. to be used later by pre/postModify actions) * <br><b>"info"</b> values with informational value (e.g. to be used later by pre/postModify actions)
* <br> * <br>
* <br>This builds the required comands from $this-attributes and $this->orig. * <br>This builds the required commands from $this-attributes and $this->orig.
* *
* @return array list of modifications * @return array list of modifications
*/ */

View file

@ -351,7 +351,7 @@ class yubiKeyUser extends baseModule {
} }
function yubiKeyIdDeleteKeyHandleReply(data) { function yubiKeyIdDeleteKeyHandleReply(data) {
if (data.errorsOccured == "false") { if (data.errorsOccurred == "false") {
jQuery(\'#yubiKeyIdDiv\').html(data.html); jQuery(\'#yubiKeyIdDiv\').html(data.html);
} }
else { else {
@ -374,7 +374,7 @@ class yubiKeyUser extends baseModule {
} }
function yubiKeyIdAddKeyHandleReply(data) { function yubiKeyIdAddKeyHandleReply(data) {
if (data.errorsOccured == "false") { if (data.errorsOccurred == "false") {
jQuery(\'#yubiKeyIdDiv\').html(data.html); jQuery(\'#yubiKeyIdDiv\').html(data.html);
} }
else { else {
@ -484,7 +484,7 @@ class yubiKeyUser extends baseModule {
$content = ob_get_contents(); $content = ob_get_contents();
ob_end_clean(); ob_end_clean();
$jsonReturn = array( $jsonReturn = array(
'errorsOccured' => 'false', 'errorsOccurred' => 'false',
'html' => $content, 'html' => $content,
); );
} }
@ -515,7 +515,7 @@ class yubiKeyUser extends baseModule {
$content = ob_get_contents(); $content = ob_get_contents();
ob_end_clean(); ob_end_clean();
return array( return array(
'errorsOccured' => 'false', 'errorsOccurred' => 'false',
'html' => $content, 'html' => $content,
); );
} }
@ -529,7 +529,7 @@ class yubiKeyUser extends baseModule {
if ($message == null) { if ($message == null) {
$message = _('Invalid request'); $message = _('Invalid request');
} }
return array('errorsOccured' => 'true', 'errormessage' => $message); return array('errorsOccurred' => 'true', 'errormessage' => $message);
} }
/** /**

View file

@ -586,7 +586,7 @@ class ldap_pla extends myldap {
} }
/** /**
* Check if the session timeout has occured for this LDAP server. * Check if the session timeout has occurred for this LDAP server.
*/ */
public function isSessionValid() { public function isSessionValid() {
# If inactiveTime() returns a value, we need to check that it has not expired. # If inactiveTime() returns a value, we need to check that it has not expired.

View file

@ -134,7 +134,7 @@ printHeaderContents(_("Import and export configuration"), '../..');
/** /**
* Shows the login dialog for the configuration master password. * Shows the login dialog for the configuration master password.
* *
* @param htmlStatusMessage $message message to show if any error occured * @param htmlStatusMessage $message message to show if any error occurred
*/ */
function showLoginDialog($message = null) { function showLoginDialog($message = null) {
$tabindex = 0; $tabindex = 0;

View file

@ -423,7 +423,7 @@ $row->add($toolSettingsContent, 12);
$row->addVerticalSpacer('2rem'); $row->addVerticalSpacer('2rem');
// security setings // security settings
$row->add(new htmlSubTitle(_("Security settings"), '../../graphics/security.png', null, true), 12); $row->add(new htmlSubTitle(_("Security settings"), '../../graphics/security.png', null, true), 12);
// login method // login method
$loginOptions = array( $loginOptions = array(

View file

@ -285,7 +285,7 @@ function passwordHandleInput(random, ajaxURL, tokenName, tokenValue) {
* @param data JSON reply * @param data JSON reply
*/ */
function passwordHandleReply(data) { function passwordHandleReply(data) {
if (data.errorsOccured == "false") { if (data.errorsOccurred == "false") {
jQuery('#passwordDialogMessageArea').html(""); jQuery('#passwordDialogMessageArea').html("");
jQuery('#passwordDialog').dialog("close"); jQuery('#passwordDialog').dialog("close");
jQuery('#passwordMessageArea').html(data.messages); jQuery('#passwordMessageArea').html(data.messages);
@ -1400,7 +1400,7 @@ window.lam.dynamicSelect.onScroll = function(selectField, event, maxOptions, num
/** /**
* Loads the next bunch of options at the end. * Loads the next bunch of options at the end.
* *
* @param selectField selct field * @param selectField select field
* @param maxOptions maximum options to show * @param maxOptions maximum options to show
* @param numberOfOptionsToLoad number of options to add * @param numberOfOptionsToLoad number of options to add
*/ */
@ -1431,7 +1431,7 @@ window.lam.dynamicSelect.loadNextOptions = function(selectField, maxOptions, num
/** /**
* Loads the next bunch of options at the beginning. * Loads the next bunch of options at the beginning.
* *
* @param selectField selct field * @param selectField select field
* @param maxOptions maximum options to show * @param maxOptions maximum options to show
* @param numberOfOptionsToLoad number of options to add * @param numberOfOptionsToLoad number of options to add
*/ */