<para>
you can talloc_free() the pointer itself if it has at maximum one
parent. This behaviour has been changed since the release of version
- 2.0. Further informations in the description of "talloc_free".
+ 2.0. Further information in the description of "talloc_free".
</para>
</listitem>
</itemizedlist>
*
* - you can talloc_free() the pointer itself if it has at maximum one
* parent. This behaviour has been changed since the release of version
- * 2.0. Further informations in the description of "talloc_free".
+ * 2.0. Further information in the description of "talloc_free".
*
* For more control on which parent to remove, see talloc_unlink()
* @param[in] ctx The additional parent.
*
* You can just use talloc_free() instead of talloc_unlink() if there
* is at maximum one parent. This behaviour has been changed since the
- * release of version 2.0. Further informations in the description of
+ * release of version 2.0. Further information in the description of
* "talloc_free".
*
* @param[in] context The talloc parent to remove.
- you can talloc_free() the pointer itself if it has at maximum one
parent. This behaviour has been changed since the release of version
- 2.0. Further informations in the description of "talloc_free".
+ 2.0. Further information in the description of "talloc_free".
For more control on which parent to remove, see talloc_unlink()
You can just use talloc_free() instead of talloc_unlink() if there
is at maximum one parent. This behaviour has been changed since the
-release of version 2.0. Further informations in the description of
+release of version 2.0. Further information in the description of
"talloc_free".
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
def netcmd_get_domain_infos_via_cldap(lp, creds, address=None):
- '''Return domain informations (CLDAP record) of the ldap-capable
+ '''Return domain information (CLDAP record) of the ldap-capable
DC with the specified address'''
net = Net(creds=creds, lp=lp)
cldap_ret = net.finddc(address=address,
except Exception as e:
raise CommandError("Could not retrieve password properties!", e)
- self.message("Password informations for domain '%s'" % domain_dn)
+ self.message("Password information for domain '%s'" % domain_dn)
self.message("")
if pwd_props & DOMAIN_PASSWORD_COMPLEX != 0:
self.message("Password complexity: on")
group_dn = "CN=%s,%s,%s" % (groupname, (groupou or "CN=Users"), self.domain_dn())
# The new user record. Note the reliance on the SAMLDB module which
- # fills in the default informations
+ # fills in the default information
ldbmessage = {"dn": group_dn,
"sAMAccountName": groupname,
"objectClass": "group"}
dnsdomain = ldb.Dn(self, self.domain_dn()).canonical_str().replace("/", "")
user_principal_name = "%s@%s" % (username, dnsdomain)
# The new user record. Note the reliance on the SAMLDB module which
- # fills in the default informations
+ # fills in the default information
ldbmessage = {"dn": user_dn,
"sAMAccountName": username,
"userPrincipalName": user_principal_name,
delete_force(self.ldb_admin, ouname)
def test_dirsync_with_controls(self):
- """Check that dirsync return correct informations when dealing with the NC"""
+ """Check that dirsync return correct information when dealing with the NC"""
res = self.ldb_admin.search(self.base_dn,
expression="(distinguishedName=%s)" % str(self.base_dn),
attrs=["name"],
controls=["dirsync:1:0:10000", "extended_dn:1", "show_deleted:1"])
def test_dirsync_basenc(self):
- """Check that dirsync return correct informations when dealing with the NC"""
+ """Check that dirsync return correct information when dealing with the NC"""
res = self.ldb_admin.search(self.base_dn,
expression="(distinguishedName=%s)" % str(self.base_dn),
attrs=["name"],
self.assertGreaterEqual(lastLogon, lastLogonTimestamp)
# Open a second LDB connection with the user credentials. Use the
- # command line credentials for informations like the domain, the realm
+ # command line credentials for information like the domain, the realm
# and the workstation.
creds_lockout = self.insta_creds(creds)
# time should increase.
# Open a second LDB connection with the user credentials. Use the
- # command line credentials for informations like the domain, the realm
+ # command line credentials for information like the domain, the realm
# and the workstation.
username = creds.get_username()
userdn = "cn=%s,cn=users,%s" % (username, self.base_dn)
self.ldb.enable_account("(sAMAccountName=testuser)")
# Open a second LDB connection with the user credentials. Use the
- # command line credentials for informations like the domain, the realm
+ # command line credentials for information like the domain, the realm
# and the workstation.
creds2 = Credentials()
creds2.set_username("testuser")
creds = self.lockout1ntlm_creds
# Open a second LDB connection with the user credentials. Use the
- # command line credentials for informations like the domain, the realm
+ # command line credentials for information like the domain, the realm
# and the workstation.
creds_lockout = self.insta_creds(creds)
userpass = creds.get_password()
# Open a second LDB connection with the user credentials. Use the
- # command line credentials for informations like the domain, the realm
+ # command line credentials for information like the domain, the realm
# and the workstation.
creds_lockout = self.insta_creds(creds)
self.assertNotEqual(int(res1[0]["pwdLastSet"][0]), 0)
# Open a second LDB connection with the user credentials. Use the
- # command line credentials for informations like the domain, the realm
+ # command line credentials for information like the domain, the realm
# and the workstation.
sasl_creds = Credentials()
sasl_creds.set_username(username)
-# Additional informations for DNS setup using BIND
+# Additional information for DNS setup using BIND
# If you are running a capable version of BIND and you wish to support secure
# GSS-TSIG updates, you must make the following configuration changes:
-# Additional informations for DNS setup using BIND
+# Additional information for DNS setup using BIND
# If you are running a capable version of BIND and you wish to support
# secure GSS-TSIG updates, you must make the following configuration
-# Additional informations for DNS setup using BIND
+# Additional information for DNS setup using BIND
# If you are running a capable version of BIND and you wish to support
# secure GSS-TSIG updates, you must make the following configuration