diff options
author | gerv%gerv.net <> | 2002-04-23 06:09:13 +0200 |
---|---|---|
committer | gerv%gerv.net <> | 2002-04-23 06:09:13 +0200 |
commit | 5a4c7d804f3dffdb2badd9e2a2579f0d81258608 (patch) | |
tree | 0a29a7d5c5a12ab4504bacbbbe9e647752dc56cc /docs | |
parent | 379af653e173a2aa6bdf8a68c18b4584fae30fe6 (diff) | |
download | bugzilla-5a4c7d804f3dffdb2badd9e2a2579f0d81258608.tar.gz bugzilla-5a4c7d804f3dffdb2badd9e2a2579f0d81258608.tar.xz |
Bug 139051 - fix misspelling of "privilege". Patch by mental <xor@ivwnet.com>, 2xr=bbaetz.
Diffstat (limited to 'docs')
-rw-r--r-- | docs/sgml/administration.sgml | 6 | ||||
-rw-r--r-- | docs/sgml/database.sgml | 2 | ||||
-rw-r--r-- | docs/xml/administration.xml | 6 | ||||
-rw-r--r-- | docs/xml/database.xml | 2 |
4 files changed, 8 insertions, 8 deletions
diff --git a/docs/sgml/administration.sgml b/docs/sgml/administration.sgml index 39e80c650..353110e47 100644 --- a/docs/sgml/administration.sgml +++ b/docs/sgml/administration.sgml @@ -249,7 +249,7 @@ the bug; if the <quote>watcher</quote> would not normally be allowed to view a bug, the watcher cannot get around the system by setting herself up to watch the bugs of someone - with bugs outside her priveleges. She would still only + with bugs outside her privileges. She would still only receive email updates for those bugs she could normally view.</para> <para>For Bugzilla sites which require strong inter-Product @@ -587,7 +587,7 @@ <emphasis>Editusers</emphasis>: This flag allows a user do what you're doing right now: edit other users. This will allow those with the right to do so to remove - administrator priveleges from other users or grant them + administrator privileges from other users or grant them to themselves. Enable with care. </para> </listitem> @@ -1280,7 +1280,7 @@ because he is not in Group3. Bug7 can be seen by anyone who is in Group1, Group2, and Group3. This is only User4. All of the others are missing at least one of those -group priveleges, and thus cannot see the bug. +group privileges, and thus cannot see the bug. Bug8 can be seen by anyone who is in Group1, Group2, Group3, and Group4. There is nobody in all four of these groups, so nobody can diff --git a/docs/sgml/database.sgml b/docs/sgml/database.sgml index bf4aaf4f0..848555520 100644 --- a/docs/sgml/database.sgml +++ b/docs/sgml/database.sgml @@ -486,7 +486,7 @@ FILE, OR -mysql> GRANT ALL PRIVELEGES +mysql> GRANT ALL PRIVILEGES ON keystone.* TO <$sys_dbuser name>@localhost IDENTIFIED BY '(password)' diff --git a/docs/xml/administration.xml b/docs/xml/administration.xml index 39e80c650..353110e47 100644 --- a/docs/xml/administration.xml +++ b/docs/xml/administration.xml @@ -249,7 +249,7 @@ the bug; if the <quote>watcher</quote> would not normally be allowed to view a bug, the watcher cannot get around the system by setting herself up to watch the bugs of someone - with bugs outside her priveleges. She would still only + with bugs outside her privileges. She would still only receive email updates for those bugs she could normally view.</para> <para>For Bugzilla sites which require strong inter-Product @@ -587,7 +587,7 @@ <emphasis>Editusers</emphasis>: This flag allows a user do what you're doing right now: edit other users. This will allow those with the right to do so to remove - administrator priveleges from other users or grant them + administrator privileges from other users or grant them to themselves. Enable with care. </para> </listitem> @@ -1280,7 +1280,7 @@ because he is not in Group3. Bug7 can be seen by anyone who is in Group1, Group2, and Group3. This is only User4. All of the others are missing at least one of those -group priveleges, and thus cannot see the bug. +group privileges, and thus cannot see the bug. Bug8 can be seen by anyone who is in Group1, Group2, Group3, and Group4. There is nobody in all four of these groups, so nobody can diff --git a/docs/xml/database.xml b/docs/xml/database.xml index bf4aaf4f0..848555520 100644 --- a/docs/xml/database.xml +++ b/docs/xml/database.xml @@ -486,7 +486,7 @@ FILE, OR -mysql> GRANT ALL PRIVELEGES +mysql> GRANT ALL PRIVILEGES ON keystone.* TO <$sys_dbuser name>@localhost IDENTIFIED BY '(password)' |