Branch: Tag:

2000-11-27

2000-11-27 06:17:28 by Per Hedbor <ph@opera.com>

More translations. And a suggestion: How about _not_ updating the .xml translation files when nothing is changed? It would make these checkins somewhat smaller. :-)

Rev: server/modules/database/sqltag.pike:1.67
Rev: server/modules/directories/directories.pike:1.87
Rev: server/modules/directories/indexfiles.pike:1.18
Rev: server/modules/examples/auth.pike:1.4
Rev: server/modules/examples/common_api.pike:1.5
Rev: server/modules/examples/fnord.pike:1.13
Rev: server/modules/examples/newstyle_fnord.pike:1.10
Rev: server/modules/filesystems/filesystem.pike:1.91
Rev: server/translations/ces/admin_tasks.xml:1.6
Rev: server/translations/ces/roxen_config.xml:1.8
Rev: server/translations/configs/admin_tasks.xml:1.6
Rev: server/translations/configs/roxen_config.xml:1.10
Rev: server/translations/configs/roxen_message.xml:1.7
Rev: server/translations/deu/admin_tasks.xml:1.4
Rev: server/translations/deu/roxen_config.xml:1.5
Rev: server/translations/eng/admin_tasks.xml:1.7
Rev: server/translations/eng/mod_SQLuserdb.xml:1.3
Rev: server/translations/eng/mod_auth.xml:1.1
Rev: server/translations/eng/mod_common_api.xml:1.1
Rev: server/translations/eng/mod_compat.xml:1.3
Rev: server/translations/eng/mod_directories.xml:1.1
Rev: server/translations/eng/mod_filesystem.xml:1.1
Rev: server/translations/eng/mod_fnord.xml:1.1
Rev: server/translations/eng/mod_indexfiles.xml:1.1
Rev: server/translations/eng/mod_obox.xml:1.4
Rev: server/translations/eng/mod_sqldb.xml:1.3
Rev: server/translations/eng/mod_sqltag.xml:1.1
Rev: server/translations/eng/roxen_config.xml:1.14
Rev: server/translations/eng/roxen_message.xml:1.11
Rev: server/translations/eng/roxen_start.xml:1.11
Rev: server/translations/hun/admin_tasks.xml:1.4
Rev: server/translations/hun/roxen_config.xml:1.5
Rev: server/translations/jpn/admin_tasks.xml:1.4
Rev: server/translations/jpn/roxen_config.xml:1.5
Rev: server/translations/nld/admin_tasks.xml:1.4
Rev: server/translations/nld/roxen_config.xml:1.8
Rev: server/translations/swe/admin_tasks.xml:1.4
Rev: server/translations/swe/roxen_config.xml:1.12
Rev: server/translations/swe/roxen_message.xml:1.7
Rev: server/translations/swe/roxen_start.xml:1.8

7:   inherit "module";   inherit "socket";    - constant cvs_version= "$Id: filesystem.pike,v 1.90 2000/11/24 16:50:38 per Exp $"; + constant cvs_version= "$Id: filesystem.pike,v 1.91 2000/11/27 06:17:14 per Exp $";   constant thread_safe=1;      #include <module.h>
39:   #endif      constant module_type = MODULE_LOCATION; - LocaleString module_name_locale = LOCALE(0,"File system"); + LocaleString module_name_locale = LOCALE(1,"File system");   LocaleString module_doc_locale = - LOCALE(0,"This is the basic file system module that makes it possible " + LOCALE(2,"This is the basic file system module that makes it possible "    "to mount a directory structure in the virtual file system of "    "your site.");   constant module_unique = 0;
64:      string status()   { -  return "<h2>"+LOCALE(0,"Accesses to this filesystem")+"</h2>"+ -  (redirects?"<b>"+LOCALE(0,"Redirects")+"</b>: "+redirects+"<br>":"")+ -  (accesses?"<b>"+LOCALE(0,"Normal files")+"</b>: "+accesses+"<br>" -  :LOCALE(0,"No file accesses)")+"<br>")+ -  (QUERY(put)&&puts?"<b>"+LOCALE(0,"PUTs")+"</b>: "+puts+"<br>":"")+ -  (QUERY(put)&&mkdirs?"<b>"+LOCALE(0,"MKDIRs")+"</b>: "+mkdirs+"<br>":"")+ +  return "<h2>"+LOCALE(3,"Accesses to this filesystem")+"</h2>"+ +  (redirects?"<b>"+LOCALE(4,"Redirects")+"</b>: "+redirects+"<br>":"")+ +  (accesses?"<b>"+LOCALE(5,"Normal files")+"</b>: "+accesses+"<br>" +  :LOCALE(6,"No file accesses)")+"<br>")+ +  (QUERY(put)&&puts?"<b>"+LOCALE(7,"PUTs")+"</b>: "+puts+"<br>":"")+ +  (QUERY(put)&&mkdirs?"<b>"+LOCALE(8,"MKDIRs")+"</b>: "+mkdirs+"<br>":"")+    (QUERY(put)&&QUERY(delete)&&moves? -  "<b>"+LOCALE(0,"Moved files")+"</b>: "+moves+"<br>":"")+ -  (QUERY(put)&&chmods?"<b>"+LOCALE(0,"CHMODs")+"</b>: "+chmods+"<br>":"")+ -  (QUERY(delete)&&deletes?"<b>"+LOCALE(0,"Deletes")+"</b>: "+deletes+"<br>":"")+ -  (errors?"<b>"+LOCALE(0,"Permission denied")+"</b>: "+errors -  +" ("+LOCALE(0,"not counting .htaccess")+")<br>":"")+ -  (dirlists?"<b>"+LOCALE(0,"Directories")+"</b>:"+dirlists+"<br>":""); +  "<b>"+LOCALE(9,"Moved files")+"</b>: "+moves+"<br>":"")+ +  (QUERY(put)&&chmods?"<b>"+LOCALE(10,"CHMODs")+"</b>: "+chmods+"<br>":"")+ +  (QUERY(delete)&&deletes?"<b>"+LOCALE(11,"Deletes")+"</b>: "+deletes+"<br>":"")+ +  (errors?"<b>"+LOCALE(12,"Permission denied")+"</b>: "+errors +  +" ("+LOCALE(13,"not counting .htaccess")+")<br>":"")+ +  (dirlists?"<b>"+LOCALE(14,"Directories")+"</b>:"+dirlists+"<br>":"");   }      void create()   { -  defvar("mountpoint", "/", LOCALE(0,"Mount point"), TYPE_LOCATION|VAR_INITIAL, -  LOCALE(0,"Where the module will be mounted in the site's virtual " +  defvar("mountpoint", "/", LOCALE(15,"Mount point"), TYPE_LOCATION|VAR_INITIAL, +  LOCALE(16,"Where the module will be mounted in the site's virtual "    "file system."));    -  defvar("searchpath", "NONE", LOCALE(0,"Search path"), TYPE_DIR|VAR_INITIAL, -  LOCALE(0,"The directory that contains the files.")); +  defvar("searchpath", "NONE", LOCALE(17,"Search path"), TYPE_DIR|VAR_INITIAL, +  LOCALE(18,"The directory that contains the files."));    -  defvar(".files", 0, LOCALE(0,"Show hidden files"), TYPE_FLAG|VAR_MORE, -  LOCALE(0,"If set, hidden files, ie files that begin with a '.', " +  defvar(".files", 0, LOCALE(19,"Show hidden files"), TYPE_FLAG|VAR_MORE, +  LOCALE(20,"If set, hidden files, ie files that begin with a '.', "    "will be shown in directory listings." ));    -  defvar("dir", 1, LOCALE(0,"Enable directory listings per default"), +  defvar("dir", 1, LOCALE(21,"Enable directory listings per default"),    TYPE_FLAG|VAR_MORE, -  LOCALE(0,"If set, it will be possible to get a directory listings " +  LOCALE(22,"If set, it will be possible to get a directory listings "    "from directories in this file system. It is possible to "    "force a directory to never be browsable by putting a "    "<tt>.www_not_browsable</tt> or a <tt>.nodiraccess</tt> file "
103:    "<tt>.www_browsable</tt> file in it.\n"));       defvar("nobrowse", ({ ".www_not_browsable", ".nodiraccess" }), -  LOCALE(0,"List prevention files"), TYPE_STRING_LIST|VAR_MORE, -  LOCALE(0,"All directories containing any of these files will not be " +  LOCALE(23,"List prevention files"), TYPE_STRING_LIST|VAR_MORE, +  LOCALE(24,"All directories containing any of these files will not be "    "browsable."));       -  defvar("tilde", 0, LOCALE(0,"Show backup files"), TYPE_FLAG|VAR_MORE, -  LOCALE(0,"If set, files ending with '~', '#' or '.bak' will "+ +  defvar("tilde", 0, LOCALE(25,"Show backup files"), TYPE_FLAG|VAR_MORE, +  LOCALE(26,"If set, files ending with '~', '#' or '.bak' will "+    "be shown in directory listings"));    -  defvar("put", 0, LOCALE(0,"Handle the PUT method"), TYPE_FLAG, -  LOCALE(0,"If set, it will be possible to upload files with the HTTP " +  defvar("put", 0, LOCALE(27,"Handle the PUT method"), TYPE_FLAG, +  LOCALE(28,"If set, it will be possible to upload files with the HTTP "    "method PUT, or through FTP."));    -  defvar("delete", 0, LOCALE(0,"Handle the DELETE method"), TYPE_FLAG, -  LOCALE(0,"If set, it will be possible to delete files with the HTTP " +  defvar("delete", 0, LOCALE(29,"Handle the DELETE method"), TYPE_FLAG, +  LOCALE(30,"If set, it will be possible to delete files with the HTTP "    "method DELETE, or through FTP."));    -  defvar("check_auth", 1, LOCALE(0,"Require authentication for modification"), +  defvar("check_auth", 1, LOCALE(31,"Require authentication for modification"),    TYPE_FLAG, -  LOCALE(0,"Only allow users authenticated by a authentication module " +  LOCALE(32,"Only allow users authenticated by a authentication module "    "to use methods that can modify the files, such as PUT or "    "DELETE. If this is not set the file system will be a "    "<b>very</b> public one since anyone will be able to edit "    "files."));    -  defvar("stat_cache", 0, LOCALE(0,"Cache the results of stat(2)"), +  defvar("stat_cache", 0, LOCALE(33,"Cache the results of stat(2)"),    TYPE_FLAG|VAR_MORE, -  LOCALE(0,"A performace option that can speed up retrieval of files " +  LOCALE(34,"A performace option that can speed up retrieval of files "    "from NFS with up to 50%. In turn it uses some memory and the "    "file system will not notice that files have changed unless "    "it gets a pragma no-cache request (produced e.g. by "    "Alt-Ctrl-Reload in Netscape). Therefore this option should "    "not be used on file systems that change a lot."));    -  defvar("access_as_user", 0, LOCALE(0,"Access file as the logged in user"), +  defvar("access_as_user", 0, LOCALE(35,"Access file as the logged in user"),    TYPE_FLAG|VAR_MORE, -  LOCALE(0,"If set, the module will access files as the authenticated " +  LOCALE(36,"If set, the module will access files as the authenticated "    "user. This assumes that a authentication module which imports"    " the users from the operating systems, such as the <i>User "    "database</i> module is used. This option is very useful for "    "named FTP sites, but it will have severe performance impacts "    "since all threads will be locked for each access."));    -  defvar("no_symlinks", 0, LOCALE(0,"Forbid access to symlinks"), +  defvar("no_symlinks", 0, LOCALE(37,"Forbid access to symlinks"),    TYPE_FLAG|VAR_MORE, -  LOCALE(0,"It set, the file system will not follow symbolic links. " +  LOCALE(38,"It set, the file system will not follow symbolic links. "    "This option can lower performace by a lot." ));    -  defvar("charset", "iso-8859-1", LOCALE(0,"File contents charset"), +  defvar("charset", "iso-8859-1", LOCALE(39,"File contents charset"),    TYPE_STRING, -  LOCALE(0,"The charset of the contents of the files on this file " +  LOCALE(40,"The charset of the contents of the files on this file "    "system. This variable makes it possible for Roxen to use "    "any text file, no matter what charset it is written in. If"    " necessary, Roxen will convert the file to Unicode before "    "processing the file."));    -  defvar("path_encoding", "iso-8859-1", LOCALE(0,"Filename charset"), +  defvar("path_encoding", "iso-8859-1", LOCALE(41,"Filename charset"),    TYPE_STRING, -  LOCALE(0,"The charset of the file names of the files on this file " +  LOCALE(42,"The charset of the file names of the files on this file "    "system. Unlike the <i>File contents charset</i> variable, "    "this might not work for all charsets simply because not "    "all browsers support anything except ISO-8859-1 "    "in URLs."));    -  defvar("internal_files", ({}), LOCALE(0,"Internal files"), TYPE_STRING_LIST, -  LOCALE(0,"A list of glob patterns that matches files which should be " +  defvar("internal_files", ({}), LOCALE(43,"Internal files"), TYPE_STRING_LIST, +  LOCALE(44,"A list of glob patterns that matches files which should be "    "considered internal. Internal files cannot be requested "    "directly from a browser, won't show up in directory listings "    "and can never be uploaded, moved or deleted by a browser."
519:    if(!o || (no_symlinks && (contains_symlinks(path, oldf))))    {    errors++; -  report_error(LOCALE(0,"Open of %s failed. Permission denied.\n"),f); +  report_error(LOCALE(45,"Open of %s failed. Permission denied.\n"),f);       TRACE_LEAVE("");    TRACE_LEAVE("Permission denied.");
572:    if (QUERY(no_symlinks) && (contains_symlinks(path, oldf))) {    privs = 0;    errors++; -  report_error(LOCALE(0,"Creation of %s failed. Permission denied.\n"),f); +  report_error(LOCALE(46,"Creation of %s failed. Permission denied.\n"),f);    TRACE_LEAVE("MKDIR: Contains symlinks. Permission denied");    return http_low_answer(403, "<h2>Permission denied.</h2>");    }
621:    if (id->misc->quota_obj && (id->misc->len > 0) &&    !id->misc->quota_obj->check_quota(URI, id->misc->len)) {    errors++; -  report_warning(LOCALE(0,"Creation of %s failed. Out of quota.\n"),f); +  report_warning(LOCALE(47,"Creation of %s failed. Out of quota.\n"),f);    TRACE_LEAVE("PUT: Out of quota.");    return http_low_answer(413, "<h2>Out of disk quota.</h2>",    "413 Out of disk quota");
636:    if (QUERY(no_symlinks) && (contains_symlinks(path, oldf))) {    privs = 0;    errors++; -  report_error(LOCALE(0,"Creation of %s failed. Permission denied.\n"),f); +  report_error(LOCALE(46,"Creation of %s failed. Permission denied.\n"),f);    TRACE_LEAVE("PUT: Contains symlinks. Permission denied");    return http_low_answer(403, "<h2>Permission denied.</h2>");    }
976:       if (QUERY(no_symlinks) && (contains_symlinks(path, oldf))) {    errors++; -  report_error(LOCALE(0,"Deletion of %s failed. Permission denied.\n"),f); +  report_error(LOCALE(48,"Deletion of %s failed. Permission denied.\n"),f);    TRACE_LEAVE("DELETE: Contains symlinks");    return http_low_answer(403, "<h2>Permission denied.</h2>");    }    -  report_notice(LOCALE(0,"DELETING the file %s.\n"),f); +  report_notice(LOCALE(49,"DELETING the file %s.\n"),f);    accesses++;       if (((int)id->misc->uid) && ((int)id->misc->gid)) {