Index: openacs-4/packages/acs-ldap-authentication/sql/oracle/LdapLogin.sqlj =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-ldap-authentication/sql/oracle/LdapLogin.sqlj,v diff -u -N -r1.1 -r1.2 --- openacs-4/packages/acs-ldap-authentication/sql/oracle/LdapLogin.sqlj 20 Apr 2001 20:51:09 -0000 1.1 +++ openacs-4/packages/acs-ldap-authentication/sql/oracle/LdapLogin.sqlj 31 Jan 2018 20:54:06 -0000 1.2 @@ -7,7 +7,7 @@ private static final String ERROR_PREFIX = "__LDAP_ERROR"; private static String pretty_error (Exception e) { - // Return a nicely formatted error message from the given execption. + // Return a nicely formatted error message from the given exception. if (e instanceof IllegalArgumentException) { return ERROR_PREFIX + ": Illegal Argument {"+e.getMessage()+"} {"+e.toString()+"}"; } Index: openacs-4/packages/acs-ldap-authentication/tcl/ldap-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-ldap-authentication/tcl/ldap-procs.tcl,v diff -u -N -r1.2 -r1.3 --- openacs-4/packages/acs-ldap-authentication/tcl/ldap-procs.tcl 1 Nov 2003 08:45:37 -0000 1.2 +++ openacs-4/packages/acs-ldap-authentication/tcl/ldap-procs.tcl 31 Jan 2018 20:54:06 -0000 1.3 @@ -334,7 +334,7 @@ } ad_proc -private ldap_set_environment {} { - A convenience function for setting up common local variables from LDAP Package paramter + A convenience function for setting up common local variables from LDAP Package parameter values. } { set url [default_parameter_value LdapUrl acs-ldap-authentication] Index: openacs-4/packages/acs-ldap-authentication/www/doc/design.html =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-ldap-authentication/www/doc/design.html,v diff -u -N -r1.3 -r1.4 --- openacs-4/packages/acs-ldap-authentication/www/doc/design.html 20 Apr 2005 11:48:56 -0000 1.3 +++ openacs-4/packages/acs-ldap-authentication/www/doc/design.html 31 Jan 2018 20:54:06 -0000 1.4 @@ -37,8 +37,8 @@
ArsDigita, as the administrator of these two sites can use the LDAP -authentication package to create "cannonical accounts" that are shared between -the sites. The cannonical accounts are the authoritative source for a user's +authentication package to create "canonical accounts" that are shared between +the sites. The canonical accounts are the authoritative source for a user's primary information such as e-mail address, password, first names, and last name. Each ACS installation (www.arsdigita.com and acs.arsdigita.com in this example) still have their own users table, but they use the LDAP authentication @@ -230,7 +230,7 @@ The user interface currently provides a list of all granted permissions on the object. If the user wishes to revoke privileges, she may select a set of grants, choose revoke, confirm their deletion, -and be returned to the same page after those priviliges have been +and be returned to the same page after those privileges have been revoked.
Index: openacs-4/packages/acs-ldap-authentication/www/doc/ldap-authentication.html =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-ldap-authentication/www/doc/ldap-authentication.html,v diff -u -N -r1.1 -r1.2 --- openacs-4/packages/acs-ldap-authentication/www/doc/ldap-authentication.html 13 Sep 2002 15:16:27 -0000 1.1 +++ openacs-4/packages/acs-ldap-authentication/www/doc/ldap-authentication.html 31 Jan 2018 20:54:06 -0000 1.2 @@ -182,7 +182,7 @@ parameter file. -Returnsok
if the bind was successfull. If not, it
+Returns ok
if the bind was successful. If not, it
returns Error: explanation
@@ -222,7 +222,7 @@ ServerURL=ldap://ldap.yourdomain.com ; The base DN under which all the users of this website resides BaseDN=ou=people,dc=yourdomain,dc=com -; Preferred security mechanisms seperated by space, e.g. +; Preferred security mechanisms separated by space, e.g. ; simple, CRAM-MD5, DIGEST-MD5 SecurityMechanism=simple @@ -250,8 +250,8 @@
Interface Discovery is available programmatically as well as via documentation through ad_proc.
The Service Contract interface specification was inspired by -WDSL, the interface specfication for web services.
+WDSL, the interface specification for web services.defines a type based on spec. Spec should be a string (possibly
-emtpy) that defines the names and types that compose this type.
+empty) that defines the names and types that compose this type.
example ObjectDisplay.Name.InputType
as name
object_id:integer
as spec.
Interface Discovery is available programmatically as well as via documentation through ad_proc.
The Service Contract interface specification was inspired by - WDSL, the interface specfication for web services.
defines a type based on spec. Spec should
- be a string (possibly emtpy) that defines the
+ be a string (possibly empty) that defines the
names and types that compose this type.
example ObjectDisplay.Name.InputType
as name
object_id:integer
as spec.
xolp
for which we expect only a few instances.
For example, we will only need a handful of ActivityVerbs and EvaluationSchemas, and in practice
probably even not too many EvalutionScales (if the client application cares about deduplication).
- By refering to these resources via human-readable identifiers, we are able to write nice readable
+ By referring to these resources via human-readable identifiers, we are able to write nice readable
code such as
::xolp::EvaluationSchema require -iri "https://dotlrn.org/xolp/evaluation-schemas/at-five-to-one"
or
@@ -121,7 +121,7 @@
Slowly Changing Dimension (of Type 2).