[Pkg-shadow-devel] Bug#266281: marked as done (shadow: [INTL:i18n] some strings not tagged with gettext)

Debian Bug Tracking System owner@bugs.debian.org
Tue, 05 Jul 2005 16:48:55 -0700


Your message dated Tue, 05 Jul 2005 16:02:32 -0400
with message-id <E1Dptcm-00069m-00@newraff.debian.org>
and subject line Bug#266281: fixed in shadow 1:4.0.3-36
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 17 Aug 2004 11:17:58 +0000
>From guillem@gluck.debian.org Tue Aug 17 04:17:58 2004
Return-path: <guillem@gluck.debian.org>
Received: from gluck.debian.org [192.25.206.10] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Bx1yX-0004MZ-00; Tue, 17 Aug 2004 04:17:57 -0700
Received: from guillem by gluck.debian.org with local (Exim 3.35 1 (Debian))
	id 1Bx1yV-0007Qg-00; Tue, 17 Aug 2004 05:17:57 -0600
Date: Tue, 17 Aug 2004 13:17:02 +0200
From: Guillem Jover <guillem@debian.org>
To: submit@bugs.debian.org
Subject: shadow: [INTL:i18n] some strings not tagged with gettext
Message-ID: <20040817111702.GA13180@zulo.hadrons.org>
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="BXVAT5kNtrzKuDFl"
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040803i
Sender: Guillem Jover <guillem@gluck.debian.org>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 


--BXVAT5kNtrzKuDFl
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Package: shadow
Version: 1:4.0.3-30
Tags: patch, l10n
Severity: wishlist

Hi Karl,

As told offlist I'm including here a patch to gettext tag some
strings that were not tagged before. It can wait after sarge as
this package is already frozen.

Also all strings inside perror(3) are not tagged, they are very
short some times and would have to be extended so translators
could get the meaning, but I was not sure if that change was
desirable. If you think it is, I could work on it.

regards,
guillem

--BXVAT5kNtrzKuDFl
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename="shadow-4.0.3-30_i18n.patch"

diff -Naur shadow-4.0.3/libmisc/obscure.c shadow-4.0.3.intl/libmisc/obscure.c
--- shadow-4.0.3/libmisc/obscure.c	1999-03-07 20:14:40.000000000 +0100
+++ shadow-4.0.3.intl/libmisc/obscure.c	2004-08-16 05:26:05.000000000 +0200
@@ -161,7 +161,7 @@
 #endif
 
 	if (strcmp(new, old) == 0)
-		return "no change";
+		return _("no change");
 
 	newmono = str_lower(xstrdup(new));
 	oldmono = str_lower(xstrdup(old));
@@ -170,19 +170,19 @@
 	strcat (wrapped, oldmono);
 
 	if (palindrome(oldmono, newmono))
-		msg = "a palindrome";
+		msg = _("a palindrome");
 
 	if (!msg && strcmp(oldmono, newmono) == 0)
-		msg = "case changes only";
+		msg = _("case changes only");
 
 	if (!msg && similar(oldmono, newmono))
-		msg = "too similar";
+		msg = _("too similar");
 
 	if (!msg && simple(old, new))
-		msg = "too simple";
+		msg = _("too simple");
 
 	if (!msg && strstr(wrapped, newmono))
-		msg = "rotated";
+		msg = _("rotated");
 
 #ifdef HAVE_LIBCRACK
 	/*
@@ -223,7 +223,7 @@
 #endif
 
 	if ( newlen < getdef_num("PASS_MIN_LEN", 0) )
-		return "too short";
+		return _("too short");
 
 	/*
 	 * Remaining checks are optional.
diff -Naur shadow-4.0.3/libmisc/pam_pass.c shadow-4.0.3.intl/libmisc/pam_pass.c
--- shadow-4.0.3/libmisc/pam_pass.c	2004-08-16 07:03:09.000000000 +0200
+++ shadow-4.0.3.intl/libmisc/pam_pass.c	2004-08-16 05:26:37.000000000 +0200
@@ -51,7 +51,7 @@
 		exit(10);  /* XXX */
 	}
 
-	fputs("passwd: password updated successfully\n", stderr);
+	fputs(_("passwd: password updated successfully\n"), stderr);
 	pam_end(pamh, PAM_SUCCESS);
 }
 #else /* !USE_PAM */
diff -Naur shadow-4.0.3/libmisc/utmp.c shadow-4.0.3.intl/libmisc/utmp.c
--- shadow-4.0.3/libmisc/utmp.c	2004-08-16 07:03:09.000000000 +0200
+++ shadow-4.0.3.intl/libmisc/utmp.c	2004-08-16 05:45:11.000000000 +0200
@@ -54,9 +54,9 @@
 extern	void	endutent();
 
 #define	NO_UTENT \
-	"No utmp entry.  You must exec \"login\" from the lowest level \"sh\""
+	_("No utmp entry.  You must exec \"login\" from the lowest level \"sh\"")
 #define	NO_TTY \
-	"Unable to determine your tty name."
+	_("Unable to determine your tty name.")
 
 /*
  * checkutmp - see if utmp file is correct for this process
diff -Naur shadow-4.0.3/src/chage.c shadow-4.0.3.intl/src/chage.c
--- shadow-4.0.3/src/chage.c	2004-08-16 07:03:10.000000000 +0200
+++ shadow-4.0.3.intl/src/chage.c	2004-08-16 05:55:59.000000000 +0200
@@ -586,7 +586,7 @@
 	}
 
 	if (lflg && (setgid (getgid ()) || setuid (ruid))) {
-		fprintf (stderr, "%s: failed to drop privileges (%s)\n",
+		fprintf (stderr, _("%s: failed to drop privileges (%s)\n"),
 			 Prog, strerror (errno));
 		exit (1);
 	}
diff -Naur shadow-4.0.3/src/cppw.c shadow-4.0.3.intl/src/cppw.c
--- shadow-4.0.3/src/cppw.c	2004-08-16 07:03:10.000000000 +0200
+++ shadow-4.0.3.intl/src/cppw.c	2004-08-16 07:06:51.000000000 +0200
@@ -97,7 +97,7 @@
   if (filelocked) (*unlock)();
   if (msg) fprintf(stderr, "%s: %s", progname, msg);
   if (syserr) fprintf(stderr, ": %s", strerror(err));
-  fprintf(stderr, "\n%s: %s is unchanged\n", progname, filename);
+  fprintf(stderr, _("\n%s: %s is unchanged\n"), progname, filename);
   exit(ret);
 }
 
@@ -114,14 +114,14 @@
   filenewname = filenew;
   
   if (access(file, F_OK)) cppwexit(file, 1, 1);
-  if (!file_lock()) cppwexit("Couldn't lock file", errno, 5);
+  if (!file_lock()) cppwexit(_("Couldn't lock file"), errno, 5);
   filelocked = 1;
 
   /* file to copy has same owners, perm */
   if (stat(file, &st1)) cppwexit(file, 1, 1);
   if (!(f = fopen(in_file, "r"))) cppwexit(file, 1, 1);
   if (create_backup_file(f, filenew, &st1))
-    cppwexit("Couldn't make backup", errno, 1);
+    cppwexit(_("Couldn't make backup"), errno, 1);
   
   /* XXX - here we should check filenew for errors; if there are any,
      fail w/ an appropriate error code and let the user manually fix
@@ -129,7 +129,7 @@
      stolen from '--marekm's comment) */
 
   if (rename(filenew, file) == -1) {
-    fprintf(stderr, "%s: can't copy %s: %s)\n",
+    fprintf(stderr, _("%s: can't copy %s: (%s)\n"),
 	    progname, filenew, strerror(errno));
     cppwexit(0,0,1);
   }
@@ -148,6 +148,10 @@
   int e = 1;
   int do_cppw;
 
+  setlocale (LC_ALL, "");
+  bindtextdomain (PACKAGE, LOCALEDIR);
+  textdomain (PACKAGE);
+
   progname = ((c = strrchr(*argv, '/')) ? c+1 : *argv);
   do_cppw = (strcmp(progname, "cpgr") != 0);
 
@@ -165,16 +169,16 @@
     case 'h':
       e = 0;
     default:
-      printf("Usage:\n\
+      printf(_("Usage:\n\
 `cppw <file>' copys over /etc/passwd   `cppw -s <file>' copys over /etc/shadow\n\
 `cpgr <file>' copys over /etc/group    `cpgr -s <file>' copys over /etc/gshadow\n\
-");
+"));
       exit(e);
     }
   }
 
   if (optind >= argc) {
-    cppwexit ("missing file argument, -h for usage",0,1);
+    cppwexit (_("missing file argument, -h for usage"),0,1);
   }
 
   in_file = argv[argc - 1];
diff -Naur shadow-4.0.3/src/login.c shadow-4.0.3.intl/src/login.c
--- shadow-4.0.3/src/login.c	2004-08-16 07:03:10.000000000 +0200
+++ shadow-4.0.3.intl/src/login.c	2004-08-16 06:30:54.000000000 +0200
@@ -719,7 +719,7 @@
 		retcode = pam_start ("login", username, &conv, &pamh);
 		if (retcode != PAM_SUCCESS) {
 			fprintf (stderr,
-				 "login: PAM Failure, aborting: %s\n",
+				 _("login: PAM Failure, aborting: %s\n"),
 				 pam_strerror (pamh, retcode));
 			syslog (LOG_ERR, "Couldn't initialize PAM: %s",
 				pam_strerror (pamh, retcode));
@@ -748,11 +748,11 @@
 			if (!gethostname (hostn, sizeof (hostn)))
 				snprintf (login_prompt,
 					  sizeof (login_prompt),
-					  "%s login: ", hostn);
+					  _("%s login: "), hostn);
 			else
 				snprintf (login_prompt,
 					  sizeof (login_prompt),
-					  "login: ");
+					  _("login: "));
 
 			retcode =
 			    pam_set_item (pamh, PAM_USER_PROMPT,
@@ -841,7 +841,7 @@
 			  if (!failed)
 			    break;
 			  
-			  fprintf(stderr,"Login incorrect\n\n");
+			  fprintf(stderr, _("Login incorrect\n\n"));
 #ifndef USE_PAM
 			  if (pwd && getdef_bool("FAILLOG_ENAB"))
 			    failure (pwent.pw_uid, tty, &faillog);
@@ -1309,7 +1309,7 @@
 		if (child < 0) {
 			/* error in fork() */
 			fprintf (stderr,
-				 "login: failure forking: %s",
+				 _("login: failure forking: %s"),
 				 strerror (errno));
 			PAM_END;
 			exit (0);
diff -Naur shadow-4.0.3/src/logoutd.c shadow-4.0.3.intl/src/logoutd.c
--- shadow-4.0.3/src/logoutd.c	2002-01-05 16:41:43.000000000 +0100
+++ shadow-4.0.3.intl/src/logoutd.c	2004-08-16 06:32:31.000000000 +0200
@@ -48,7 +48,7 @@
 static char *Prog;
 
 #ifndef DEFAULT_HUP_MESG
-#define DEFAULT_HUP_MESG "login time exceeded\r\n"
+#define DEFAULT_HUP_MESG _("login time exceeded\r\n")
 #endif
 
 #ifndef HUP_MESG_FILE
diff -Naur shadow-4.0.3/src/newgrp.c shadow-4.0.3.intl/src/newgrp.c
--- shadow-4.0.3/src/newgrp.c	2004-08-16 07:03:10.000000000 +0200
+++ shadow-4.0.3.intl/src/newgrp.c	2004-08-16 06:36:06.000000000 +0200
@@ -431,7 +431,7 @@
 			child = fork ();
 			if (child < 0) {
 				/* error in fork() */
-				fprintf (stderr, "%s: failure forking: %s",
+				fprintf (stderr, _("%s: failure forking: %s"),
 					 is_newgrp ? "newgrp" : "sg",
 					 strerror (errno));
 				exit (1);
diff -Naur shadow-4.0.3/src/su.c shadow-4.0.3.intl/src/su.c
--- shadow-4.0.3/src/su.c	2004-08-16 07:03:10.000000000 +0200
+++ shadow-4.0.3.intl/src/su.c	2004-08-16 06:41:52.000000000 +0200
@@ -585,7 +585,7 @@
 	ret = pam_get_item(pamh, PAM_USER, (const void **) &tmp_name);
 	if (ret != PAM_SUCCESS) {
 		SYSLOG((LOG_ERR, "pam_get_item: internal PAM error\n"));
-		fprintf(stderr, "%s: Internal PAM error retrieving username\n", Prog);
+		fprintf(stderr, _("%s: Internal PAM error retrieving username\n"), Prog);
 		pam_end(pamh, ret);
 		su_failure(tty);
 	}
diff -Naur shadow-4.0.3/src/useradd.c shadow-4.0.3.intl/src/useradd.c
--- shadow-4.0.3/src/useradd.c	2004-08-16 07:03:10.000000000 +0200
+++ shadow-4.0.3.intl/src/useradd.c	2004-08-16 06:46:03.000000000 +0200
@@ -904,7 +904,7 @@
 		ngrp->gr_mem = add_list (ngrp->gr_mem, user_name);
 		if (!gr_update (ngrp)) {
 			fprintf (stderr,
-				 "%s: error adding new group entry\n",
+				 _("%s: error adding new group entry\n"),
 				 Prog);
 			fail_exit (E_GRP_UPDATE);
 		}
@@ -915,7 +915,7 @@
 
 		if (!gr_dbm_update (ngrp)) {
 			fprintf (stderr,
-				 "%s: cannot add new dbm group entry\n",
+				 _("%s: cannot add new dbm group entry\n"),
 				 Prog);
 			fail_exit (E_GRP_UPDATE);
 		} else

--BXVAT5kNtrzKuDFl--

---------------------------------------
Received: (at 266281-close) by bugs.debian.org; 5 Jul 2005 20:12:54 +0000
>From katie@ftp-master.debian.org Tue Jul 05 13:12:54 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Dptmn-0003qn-00; Tue, 05 Jul 2005 13:12:53 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1Dptcm-00069m-00; Tue, 05 Jul 2005 16:02:32 -0400
From: Christian Perrier <bubulle@debian.org>
To: 266281-close@bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#266281: fixed in shadow 1:4.0.3-36
Message-Id: <E1Dptcm-00069m-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Tue, 05 Jul 2005 16:02:32 -0400
Delivered-To: 266281-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 9

Source: shadow
Source-Version: 1:4.0.3-36

We believe that the bug you reported is fixed in the latest version of
shadow, which is due to be installed in the Debian FTP archive:

login_4.0.3-36_i386.deb
  to pool/main/s/shadow/login_4.0.3-36_i386.deb
passwd_4.0.3-36_i386.deb
  to pool/main/s/shadow/passwd_4.0.3-36_i386.deb
shadow_4.0.3-36.diff.gz
  to pool/main/s/shadow/shadow_4.0.3-36.diff.gz
shadow_4.0.3-36.dsc
  to pool/main/s/shadow/shadow_4.0.3-36.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 266281@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Perrier <bubulle@debian.org> (supplier of updated shadow package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 20 Jun 2005 23:37:56 +0300
Source: shadow
Binary: login passwd
Architecture: source i386
Version: 1:4.0.3-36
Distribution: unstable
Urgency: low
Maintainer: Shadow package maintainers <pkg-shadow-devel@lists.alioth.debian.org>
Changed-By: Christian Perrier <bubulle@debian.org>
Description: 
 login      - system login tools
 passwd     - change and administer password and group data
Closes: 75181 78961 87301 109279 192849 219321 244754 245332 248150 256732 261490 266281 269583 276419 286258 286616 287410 288106 288827 290842 298060 298773 304350 309408 312428 312429 312430 312431 312471 314303 314407 314423 314539 314727 315362 315372 315375 315378 315391 315407 315426 315429 315434 315483 315567 315727 315767 315783 315809 315812 315840 315972 316026
Changes: 
 shadow (1:4.0.3-36) unstable; urgency=low
 .
   * Debian specific programs fixes:
     - Re-enable logging and displaying failures on login when login is
       compiled with PAM and when FAILLOG_ENAB is set to yes. And create the
       faillog file if it does not exist on postinst (as on Woody).
       Closes: #192849
     - do not localize login's syslog messages.
   * Debian packaging fixes:
     - Fix FTBFS with new dpkg 1.13 and use a correct dpkg-architecture
       invocation. Closes: #314407
     - Add a comment about potential sensitive information exposure
       when LOG_UNKFAIL_ENAB is set in login.defs
       Closes: #298773
     - Remove limits.5 and limits.conf.5 man pages which do not
       reflect the way we deal with limits in Debian
       Closes: #288106, #244754
     - debian/login.defs:
       - Make SU_PATH and PATH consistent with the values used in /etc/profile
         Closes: #286616
       - Comment the UMASK setting which is more confusing than useful
         as it only affects console logins. Better use pam_umask instead
         Closes: #314539, #248150
       - Add a comment about "appropriate" values for umask
         Closes: #269583
       - Correct the assertion about the variable defined by QMAIL_DIR
         which is MAILDIR, not MAIL
         Closes: #109279
       - Move the PASS_MAX_LEN variable at the end of login.defs as this
         is obsoleted when using PAM
         Closes: #87301
     - debian/passwd.config:
       - Re-enable the password confirmation question at critical priority
         Closes: #304350
       - Do no prompt again for the login name when the two passwords don't
         match while creating a new user
         Closes: #245332
     - debian/add-shell.sh, debian/remove-shell.sh, debian/shadowconfig.sh,
       debian/passwd.config, debian/passwd.postinst:
       - checked for bashisms, replaced "#!/bin/bash" with "#!/bin/sh",
         Closes: #315767
       - replaced "test XXX -a YYY" XSI:isms with "test XXX && test YYY",
         for rationale see:
         http://www.opengroup.org/onlinepubs/009695399/utilities/test.html
       - replaced all unneeded "egrep"s with basic "grep"s
         Closes: #256732
     - debian/rules:
       Remove the setuid bit on login
       Closes: #298060
     - debian/passwd.templates:
       Templates rewrite to shorten them down a little and make them DTSG
       compliant. Give more details about what the user's full name is used
       for.
       Closes: #287410
     - Updated to Standards: 3.6.2 (checked)
   * Debconf translation updates:
     - Estonian added. Closes: #312471
     - Basque updated. Closes: #314303
     - Malagasy updated. Closes: #290842
     - Punjabi updated. Closes: #315372
     - Danish updated. Closes: #315378
     - Polish updated. Closes: #315391
     - Japanese updated. Closes: #315407
     - Brazilian Portuguese updated. Closes: #315426
     - Czech updated. Closes: #315429
     - Spanish updated. Closes: #315434
     - Lithuanian updated. Closes: #315483
     - Galician updated. Closes: #315362
     - Portuguese updated. Closes: #315375
     - Simplified Chinese updated. Closes: #315567
     - French updated
     - Ukrainian updated. Closes: #315727
     - Welsh updated. Closes: #315809
     - Slovak updated. Closes: #315812
     - Romanian updated. Closes: #315783
     - Finnish updated. Closes: #315972
     - Catalan updated. Closes: #316026
   * Man pages translation updates:
     - Remove the too outdated Korean translation of newgrp.1
       which doesn't even mention sg
       Closes: #261490
   * Man pages correction for Debian specific issues:
     - 402_usermod.8-system-users-range-286258:
       Document the system user range from 0 to 999 in Debian
       Closes: #286258
   * Upstream bugs not fixed in upstream releases or CVS:
     - 423_su_pass_args_without_concatenation
       Thanks to Helmut Waitzmann.
       Closes: #276419
       * pass the argument to the shell or command without concatenation
         before the call to exec.
       * If no command is provided, the arguments after the username are for
         the shell, no -c has to be appended.
     - 008_su_ignore_SIGINT
       * Also ignore SIGQUIT in su to avoid defeating the delay.
         The gain in security is very minor.
         Closes: #288827
     - 424_pwck.8_quiet_option
       pwck(8): document the -q option. Closes: #309408
     - 425_lastlog_8_sparse
       lastlog(8): Document that lastlog is a sparse file, and don't need to be
       rotated. Closes: #219321
     - 426_grpck_group-gshadow_members_consistency
       * (grpck) warn for inconsistencies between members in /etc/group and gshadow
         Closes: #75181
       * (pwck and grpck) warn and propose a fix for entries present in the
         regular /etc/group or /etc/passwd files and not in shadow/gshadow.
     - 427_chage_expiry_0
       Fix chage display in the case of null expiry fields (do not display
       Never, but 01 Jan 1970)
       Closes: #78961
   * Upstream bugs already fixed in upstream releases or CVS:
     - Corrected typos in chfn.1. Closes: #312428
     - Corrected typos in gshadow.5. Closes: #312429
     - Corrected typos in shadow.5. Closes: #312430
     - Corrected typos in grpck.8. Closes: #312431
     - Added patch (356th) for su to propagate SIGSTOP up and SIGCONT down.
       Added similar patch (357th) for newgrp. Both changes only affect
       operation with CLOSE_SESSION set to yes (in /etc/login.defs).
       Closes: #314727
   * Translation updates:
     - debian/patches/010_more-i18ned-messages
       - More messages are translatable. We will deal with the translation
         updates after syncing with upstream.
         Closes: #266281
     - debian/patches/114_eu:
       - Basque translation update. Closes: #314423
     - debian/patches/132_vi.dpatch:
       - Vietnamese translation update. Closes: #315840
Files: 
 2b951dfb5a5258b06dbf4cc9c1c10a9b 843 base required shadow_4.0.3-36.dsc
 c282dd24f1a680566120ef684f5c0386 1405333 base required shadow_4.0.3-36.diff.gz
 c3e579b2641ed0587fa4d8a2fb00e56c 504416 base required passwd_4.0.3-36_i386.deb
 9608524e0d057f7cbe832b35bde32f2e 590616 base required login_4.0.3-36_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCyuJO1OXtrMAUPS0RAh8zAKCdD/46/ukzdT+o7jJwPZYJ/ZnP2QCeImF4
ZIx948C5htLynLJrbekYXn4=
=Mslh
-----END PGP SIGNATURE-----