the bug; if the <quote>watcher</quote> would not normally be
allowed to view a bug, the watcher cannot get around the
system by setting herself up to watch the bugs of someone
- with bugs outside her priveleges. She would still only
+ with bugs outside her privileges. She would still only
receive email updates for those bugs she could normally
view.</para>
<para>For Bugzilla sites which require strong inter-Product
<emphasis>Editusers</emphasis>: This flag allows a user
do what you're doing right now: edit other users. This
will allow those with the right to do so to remove
- administrator priveleges from other users or grant them
+ administrator privileges from other users or grant them
to themselves. Enable with care.
</para>
</listitem>
Bug7 can be seen by anyone who is in Group1, Group2, and Group3. This
is only User4. All of the others are missing at least one of those
-group priveleges, and thus cannot see the bug.
+group privileges, and thus cannot see the bug.
Bug8 can be seen by anyone who is in Group1, Group2, Group3, and
Group4. There is nobody in all four of these groups, so nobody can
OR
-mysql> GRANT ALL PRIVELEGES
+mysql> GRANT ALL PRIVILEGES
ON keystone.*
TO <$sys_dbuser name>@localhost
IDENTIFIED BY '(password)'
the bug; if the <quote>watcher</quote> would not normally be
allowed to view a bug, the watcher cannot get around the
system by setting herself up to watch the bugs of someone
- with bugs outside her priveleges. She would still only
+ with bugs outside her privileges. She would still only
receive email updates for those bugs she could normally
view.</para>
<para>For Bugzilla sites which require strong inter-Product
<emphasis>Editusers</emphasis>: This flag allows a user
do what you're doing right now: edit other users. This
will allow those with the right to do so to remove
- administrator priveleges from other users or grant them
+ administrator privileges from other users or grant them
to themselves. Enable with care.
</para>
</listitem>
Bug7 can be seen by anyone who is in Group1, Group2, and Group3. This
is only User4. All of the others are missing at least one of those
-group priveleges, and thus cannot see the bug.
+group privileges, and thus cannot see the bug.
Bug8 can be seen by anyone who is in Group1, Group2, Group3, and
Group4. There is nobody in all four of these groups, so nobody can
OR
-mysql> GRANT ALL PRIVELEGES
+mysql> GRANT ALL PRIVILEGES
ON keystone.*
TO <$sys_dbuser name>@localhost
IDENTIFIED BY '(password)'
print "<TD COLSPAN=3 ALIGN=LEFT><B>Can turn this bit on for other users</B></TD>\n";
print "</TR><TR>\n<TD ALIGN=CENTER><B>|</B></TD>\n";
}
- print "<TD COLSPAN=2 ALIGN=LEFT><B>User has these priveleges</B></TD>\n";
+ print "<TD COLSPAN=2 ALIGN=LEFT><B>User has these privileges</B></TD>\n";
while (MoreSQLData()) {
my ($bit,$name,$description,$checked,$blchecked) = FetchSQLData();
print "</TR><TR>\n";
}
}
} else {
- print "</TR><TR><TH ALIGN=RIGHT>Groups and<br>Priveleges:</TH><TD><TABLE><TR>";
+ print "</TR><TR><TH ALIGN=RIGHT>Groups and<br>Privileges:</TH><TD><TABLE><TR>";
print "<TD COLSPAN=3>The new user will be inserted into groups " .
"based on their userregexps.<BR>To change the group " .
"permissions for this user, you must edit the account after ".