From: Tobias Stoeckmann Date: Fri, 19 Dec 2025 10:56:50 +0000 (+0000) Subject: Fix documentation style X-Git-Tag: 4.19.0~28 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=876e874684a7e6c1d604dc75cb5a2782404ea7d4;p=thirdparty%2Fshadow.git Fix documentation style Always start a sentence with lowercase letter after 'Note:', 'Warning:', etc. This unifies all occurrences. No functional change. Signed-off-by: Tobias Stoeckmann --- diff --git a/doc/HOWTO b/doc/HOWTO index 62b8d85dc..084b7c5a7 100644 --- a/doc/HOWTO +++ b/doc/HOWTO @@ -346,7 +346,7 @@ return value points to static data whose content is overwritten by each call. - Warning: The key space consists of 2**56 equal 7.2e16 possible values. + Warning: the key space consists of 2**56 equal 7.2e16 possible values. Exhaustive searches of this key space are possible using massively parallel computers. Software, such as crack(1), is available which will search the portion of this key space that is generally used by @@ -996,7 +996,7 @@ sudo for the shadow suite, is available as at: - Warning: When you install sudo your /etc/sudoers file will be replaced + Warning: when you install sudo your /etc/sudoers file will be replaced with a default one, so you need to make a backup of it if you have added anything to the default one. (you could also edit the Makefile and remove the line that copies the default file to /etc). diff --git a/doc/contributions/build_install.md b/doc/contributions/build_install.md index a08629477..4b1b99193 100644 --- a/doc/contributions/build_install.md +++ b/doc/contributions/build_install.md @@ -81,7 +81,7 @@ you may encounter issues. Here are common troubleshooting steps: **Post-test inspection:** -- **Container persistence**: After tests complete, containers are left running +- **Container persistence**: after tests complete, containers are left running to allow inspection of the test environment and debugging of any failures. This enables you to examine logs, file states, and system configuration that existed when tests ran. diff --git a/doc/contributions/tests.md b/doc/contributions/tests.md index 4ecf2b683..beefc8467 100644 --- a/doc/contributions/tests.md +++ b/doc/contributions/tests.md @@ -145,10 +145,10 @@ pytest --mh-config=mhc.yaml --mh-lazy-ssh -v -k test_useradd__add_user ``` **Command options explained:** -- `--mh-config=mhc.yaml`: Specifies the multihost configuration file -- `--mh-lazy-ssh`: Enables lazy SSH connections for better performance -- `-v`: Verbose output showing individual test results -- `-k`: Filters tests by name pattern +- `--mh-config=mhc.yaml`: specifies the multihost configuration file +- `--mh-lazy-ssh`: enables lazy SSH connections for better performance +- `-v`: verbose output showing individual test results +- `-k`: filters tests by name pattern For additional running options, see the [pytest-mh running tests documentation](https://pytest-mh.readthedocs.io/en/latest/articles/running-tests.html). diff --git a/etc/login.defs b/etc/login.defs index 33622c296..4f60724ec 100644 --- a/etc/login.defs +++ b/etc/login.defs @@ -6,7 +6,7 @@ # # Delay in seconds before being allowed another attempt after a login failure -# Note: When PAM is used, some modules may enforce a minimum delay (e.g. +# Note: when PAM is used, some modules may enforce a minimum delay (e.g. # pam_unix(8) enforces a 2s delay) # FAIL_DELAY 3 @@ -308,7 +308,7 @@ CHFN_RESTRICT rwh # Set to "no" if you need to copy encrypted passwords to other systems # which don't understand the new algorithm. Default is "no". # -# Note: If you use PAM, it is recommended to use a value consistent with +# Note: if you use PAM, it is recommended to use a value consistent with # the PAM modules configuration. # # This variable is deprecated. You should use ENCRYPT_METHOD instead. @@ -326,7 +326,7 @@ CHFN_RESTRICT rwh # MD5 and DES should not be used for new hashes, see crypt(5) for recommendations. # Overrides the MD5_CRYPT_ENAB option # -# Note: If you use PAM, it is recommended to use a value consistent with +# Note: if you use PAM, it is recommended to use a value consistent with # the PAM modules configuration. # #ENCRYPT_METHOD DES @@ -467,7 +467,7 @@ PREVENT_NO_AUTH superuser # Used in pam_timestamp module to calculate the keyed-hash message # authentication code. # -# Note: It is recommended to check hmac(3) to see the possible algorithms +# Note: it is recommended to check hmac(3) to see the possible algorithms # that are available in your system. # #HMAC_CRYPTO_ALGO SHA512 diff --git a/lib/defines.h b/lib/defines.h index 8e2f4a066..09c0965a0 100644 --- a/lib/defines.h +++ b/lib/defines.h @@ -81,7 +81,7 @@ syslogd should log the current system time for each event, and not trust the formatted time received from the unix domain (or worse, UDP) socket. -MM */ -/* Avoid translated PAM error messages: Set LC_ALL to "C". +/* Avoid translated PAM error messages: set LC_ALL to "C". * --Nekral */ #define SYSLOG(x) \ do { \ diff --git a/lib/find_new_gid.c b/lib/find_new_gid.c index a716445a5..ea1b8dc98 100644 --- a/lib/find_new_gid.c +++ b/lib/find_new_gid.c @@ -26,10 +26,10 @@ * * This function will return the minimum and maximum ranges for IDs * - * 0: The function completed successfully - * EINVAL: The provided ranges are impossible (such as maximum < minimum) + * 0: the function completed successfully + * EINVAL: the provided ranges are impossible (such as maximum < minimum) * - * preferred_min: The special-case minimum value for a specifically- + * preferred_min: the special-case minimum value for a specifically- * requested ID, which may be lower than the standard min_id */ static int get_ranges (bool sys_group, gid_t *min_id, gid_t *max_id, diff --git a/lib/find_new_uid.c b/lib/find_new_uid.c index d2e9d1f69..3c5000e3e 100644 --- a/lib/find_new_uid.c +++ b/lib/find_new_uid.c @@ -25,10 +25,10 @@ * * This function will return the minimum and maximum ranges for IDs * - * 0: The function completed successfully - * EINVAL: The provided ranges are impossible (such as maximum < minimum) + * 0: the function completed successfully + * EINVAL: the provided ranges are impossible (such as maximum < minimum) * - * preferred_min: The special-case minimum value for a specifically- + * preferred_min: the special-case minimum value for a specifically- * requested ID, which may be lower than the standard min_id */ static int get_ranges (bool sys_user, uid_t *min_id, uid_t *max_id, diff --git a/lib/isexpired.c b/lib/isexpired.c index be137c7a8..3280e0131 100644 --- a/lib/isexpired.c +++ b/lib/isexpired.c @@ -33,11 +33,11 @@ * password expiration criteria. * * Return value: - * 0: The password is still valid - * 1: The password has expired, it must be changed - * 2: The password has expired since a long time and the account is + * 0: the password is still valid + * 1: the password has expired, it must be changed + * 2: the password has expired since a long time and the account is * now disabled. (password cannot be changed) - * 3: The account has expired + * 3: the account has expired */ int isexpired (const struct passwd *pw, /*@null@*/const struct spwd *sp) { diff --git a/lib/limits.c b/lib/limits.c index 2d80a3217..4c7ac6ab1 100644 --- a/lib/limits.c +++ b/lib/limits.c @@ -66,11 +66,11 @@ static int setrlimit_value (unsigned int resource, if (a2i(rlim_t, &l, value, NULL, 10, 0, type_max(rlim_t)) == -1 && errno != ENOTSUP) { - return 0; // FIXME: We could instead throw an error, though. + return 0; // FIXME: we could instead throw an error, though. } if (__builtin_mul_overflow(l, multiplier, &limit)) { - /* FIXME: Again, silent error handling... + /* FIXME: again, silent error handling... * Wouldn't screaming make more sense? */ return 0; @@ -167,7 +167,7 @@ static int check_logins (const char *name, const char *maxlogins) * [Tt]: t = RLIMIT_CPU max CPU time (MIN) * [Uu]: u = RLIMIT_NPROC max number of processes * - * NOTE: Remember to extend the "no-limits" string below when adding a new + * NOTE: remember to extend the "no-limits" string below when adding a new * limit... * * Return value: @@ -287,7 +287,7 @@ static int do_user_limits (const char *buf, const char *name) #endif default: /* Only report invalid strings once */ - /* Note: A string can be invalid just because a + /* Note: a string can be invalid just because a * specific (theoretically valid) setting is not * supported by this build. * It is just a warning in syslog anyway. The line @@ -364,7 +364,7 @@ static int setup_user_limits (const char *uname) * - '#' (comment) chars only as first chars on a line; * - username must start on first column (or *, or @group) * - * FIXME: A better (smarter) checking should be done + * FIXME: a better (smarter) checking should be done */ while (fgets (buf, 1024, fil) != NULL) { if (strprefix(buf, "#") || strprefix(buf, "\n")) { @@ -386,7 +386,7 @@ static int setup_user_limits (const char *uname) * account) * @group: the limit applies to the members of the group * - * To clarify: The first entry with matching user name rules, + * To clarify: the first entry with matching user name rules, * everything after it is ignored. If there is no user entry, * the last encountered entry for a matching group rules. * If there is no matching group entry, the default limits rule. @@ -465,7 +465,7 @@ void setup_limits (const struct passwd *info) if (info->pw_uid != 0) { if ((setup_user_limits (info->pw_name) & LOGIN_ERROR_LOGIN) != 0) { (void) fputs (_("Too many logins.\n"), log_get_logfd()); - (void) sleep (2); /* XXX: Should be FAIL_DELAY */ + (void) sleep (2); /* XXX: should be FAIL_DELAY */ exit (EXIT_FAILURE); } } diff --git a/lib/shadow/passwd/sgetpwent.c b/lib/shadow/passwd/sgetpwent.c index 1d4a06070..73473e68b 100644 --- a/lib/shadow/passwd/sgetpwent.c +++ b/lib/shadow/passwd/sgetpwent.c @@ -33,7 +33,7 @@ * presence of the correct number of colons. Any failing tests result * in a NULL pointer being returned. * - * NOTE: This function uses hard-coded string scanning functions for + * NOTE: this function uses hard-coded string scanning functions for * performance reasons. I am going to come up with some conditional * compilation glarp to improve on this in the future. */ diff --git a/lib/string/README b/lib/string/README index 25e2cdf10..9fbcbd842 100644 --- a/lib/string/README +++ b/lib/string/README @@ -229,7 +229,7 @@ strspn/ - String span searching Naming conventions: - 'r': reverse (search from the end). - 'c': complement (negate the second argument). - - 'stp': Return a pointer instead of a length. + - 'stp': return a pointer instead of a length. stpspn() Like strspn(3), but return a pointer instead of an offset. diff --git a/lib/subordinateio.c b/lib/subordinateio.c index b2cadfd02..acd3f1ffd 100644 --- a/lib/subordinateio.c +++ b/lib/subordinateio.c @@ -143,7 +143,7 @@ static struct commonio_ops subordinate_ops = { }; /* - * range_exists: Check whether @owner owns any ranges + * range_exists: check whether @owner owns any ranges * * @db: database to query * @owner: owner being queried diff --git a/libsubid/subid.h.in b/libsubid/subid.h.in index 7090c6c80..decc28b76 100644 --- a/libsubid/subid.h.in +++ b/libsubid/subid.h.in @@ -42,9 +42,9 @@ extern "C" { /* * subid_init: initialize libsubid * - * @progname: Name to display as program. If NULL, then "(libsubid)" will be + * @progname: name to display as program. If NULL, then "(libsubid)" will be * shown in error messages. - * @logfd: Open file pointer to pass error messages to. If NULL, then + * @logfd: open file pointer to pass error messages to. If NULL, then * /dev/null will be opened and messages will be sent there. The * default if libsubid_init() is not called is stderr (2). * @@ -58,7 +58,7 @@ bool subid_init(const char *progname, FILE *logfd); /* * subid_free: free memory allocated in any subid_* function * - * @ptr: Pointer to a memory block to release. + * @ptr: pointer to a memory block to release. * * Some functions like @subid_get_uid_ranges allocate memory internally. As * soon as a result is no longer needed, it should be freed with this routine. @@ -98,7 +98,7 @@ int subid_get_gid_ranges(const char *owner, struct subid_range **ranges); * subid_get_uid_owners: return a list of uids to which the given uid has been * delegated. * - * @uid: The subuid being queried + * @uid: the subuid being queried * @owners: a pointer to an array of uids into which the results are placed. * The returned array must be freed by the caller. * @@ -110,7 +110,7 @@ int subid_get_uid_owners(uid_t uid, uid_t **owner); * subid_get_gid_owners: return a list of uids to which the given gid has been * delegated. * - * @uid: The subgid being queried + * @uid: the subgid being queried * @owners: a pointer to an array of uids into which the results are placed. * The returned array must be freed by the caller. * diff --git a/man/login.1.xml b/man/login.1.xml index 26e6ea440..83aa52d28 100644 --- a/man/login.1.xml +++ b/man/login.1.xml @@ -194,7 +194,7 @@ Do not perform authentication, user is preauthenticated. - Note: In that case, username is + Note: in that case, username is mandatory. diff --git a/man/login.defs.d/BCRYPT_MIN_ROUNDS.xml b/man/login.defs.d/BCRYPT_MIN_ROUNDS.xml index 81ee5c9af..acb70d312 100644 --- a/man/login.defs.d/BCRYPT_MIN_ROUNDS.xml +++ b/man/login.defs.d/BCRYPT_MIN_ROUNDS.xml @@ -31,7 +31,7 @@ used. - Note: This only affect the generation of group passwords. + Note: this only affect the generation of group passwords. The generation of user passwords is done by PAM and subject to the PAM configuration. It is recommended to set this variable consistently with the PAM configuration. diff --git a/man/login.defs.d/ENCRYPT_METHOD.xml b/man/login.defs.d/ENCRYPT_METHOD.xml index c0df16f71..4ae1f087e 100644 --- a/man/login.defs.d/ENCRYPT_METHOD.xml +++ b/man/login.defs.d/ENCRYPT_METHOD.xml @@ -26,7 +26,7 @@ variable. - Note: This only affects the generation of group passwords. + Note: this only affects the generation of group passwords. The generation of user passwords is done by PAM and subject to the PAM configuration. It is recommended to set this variable consistently with the PAM configuration. diff --git a/man/login.defs.d/HMAC_CRYPTO_ALGO.xml b/man/login.defs.d/HMAC_CRYPTO_ALGO.xml index 3aa3370a7..a3e6a2b97 100644 --- a/man/login.defs.d/HMAC_CRYPTO_ALGO.xml +++ b/man/login.defs.d/HMAC_CRYPTO_ALGO.xml @@ -13,7 +13,7 @@ code. - Note: Check hmac3 + Note: check hmac3 to see the possible algorithms that are available in your system. diff --git a/man/login.defs.d/MD5_CRYPT_ENAB.xml b/man/login.defs.d/MD5_CRYPT_ENAB.xml index 94006a645..7aef62fc5 100644 --- a/man/login.defs.d/MD5_CRYPT_ENAB.xml +++ b/man/login.defs.d/MD5_CRYPT_ENAB.xml @@ -27,7 +27,7 @@ . - Note: This only affect the generation of group passwords. + Note: this only affect the generation of group passwords. The generation of user passwords is done by PAM and subject to the PAM configuration. It is recommended to set this variable consistently with the PAM configuration. diff --git a/man/login.defs.d/SHA_CRYPT_MIN_ROUNDS.xml b/man/login.defs.d/SHA_CRYPT_MIN_ROUNDS.xml index a22c324c4..64cd8dceb 100644 --- a/man/login.defs.d/SHA_CRYPT_MIN_ROUNDS.xml +++ b/man/login.defs.d/SHA_CRYPT_MIN_ROUNDS.xml @@ -36,7 +36,7 @@ used. - Note: This only affect the generation of group passwords. + Note: this only affect the generation of group passwords. The generation of user passwords is done by PAM and subject to the PAM configuration. It is recommended to set this variable consistently with the PAM configuration. diff --git a/man/login.defs.d/YESCRYPT_COST_FACTOR.xml b/man/login.defs.d/YESCRYPT_COST_FACTOR.xml index b9c531406..3603d9d49 100644 --- a/man/login.defs.d/YESCRYPT_COST_FACTOR.xml +++ b/man/login.defs.d/YESCRYPT_COST_FACTOR.xml @@ -20,7 +20,7 @@ The value must be inside the 1-11 range. - Note: This only affect the generation of group passwords. + Note: this only affect the generation of group passwords. The generation of user passwords is done by PAM and subject to the PAM configuration. It is recommended to set this variable consistently with the PAM configuration. diff --git a/src/gpasswd.c b/src/gpasswd.c index 0c364321d..a917de683 100644 --- a/src/gpasswd.c +++ b/src/gpasswd.c @@ -708,7 +708,7 @@ static void update_group (struct group *gr) * The information are copied in group structure(s) so that they can be * modified later. * - * Note: If !is_shadowgrp, *sg will not be initialized. + * Note: if !is_shadowgrp, *sg will not be initialized. */ #ifdef SHADOWGRP static void get_group(struct group *gr, struct sgrp *sg, const struct option_flags *flags) diff --git a/src/grpck.c b/src/grpck.c index a78d092ad..90c724c9b 100644 --- a/src/grpck.c +++ b/src/grpck.c @@ -444,7 +444,7 @@ static int check_members (const char *groupname, * also in other_members. * file and other_file are used for logging. * - * TODO: No changes are performed on the lists. + * TODO: no changes are performed on the lists. */ static void compare_members_lists (const char *groupname, char **members, diff --git a/src/login.c b/src/login.c index 076dd3d4d..2af11b477 100644 --- a/src/login.c +++ b/src/login.c @@ -797,7 +797,7 @@ int main (int argc, char **argv) retcode = pam_setcred (pamh, PAM_ESTABLISH_CRED); PAM_FAIL_CHECK; - /* NOTE: If pam_setcred changes PAM_USER, this will not be taken + /* Note: if pam_setcred changes PAM_USER, this will not be taken * into account. */ diff --git a/src/useradd.c b/src/useradd.c index e248cfbda..a71a049da 100644 --- a/src/useradd.c +++ b/src/useradd.c @@ -785,7 +785,7 @@ static int get_groups(char *list, const struct option_flags *flags) /* * There must be a match, either by GID value or by * string name. - * FIXME: It should exist according to gr_locate, + * FIXME: it should exist according to gr_locate, * otherwise, we can't change its members */ if (NULL == grp) { diff --git a/src/userdel.c b/src/userdel.c index fd211d54d..56f308f0f 100644 --- a/src/userdel.c +++ b/src/userdel.c @@ -1088,7 +1088,7 @@ int main (int argc, char **argv) #endif /* WITH_TCB */ /* * Check to make certain the user isn't logged in. - * Note: This is a best effort basis. The user may log in between, + * Note: this is a best effort basis. The user may log in between, * a cron job may be started on her behalf, etc. */ if (streq(prefix, "") && !flags.chroot && user_busy(user_name, user_id) != 0) { diff --git a/tests/chage/01/run b/tests/chage/01/run index 4434fcff1..fbabc87ab 100755 --- a/tests/chage/01/run +++ b/tests/chage/01/run @@ -106,17 +106,17 @@ ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:0:99999:7:1:18294:' ] || exit 1 echo "testing option -I" -# NOTE: I could pass a date to -I +# Note: I could pass a date to -I chage -I 42 myuser7 ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:0:99999:7:42:18294:' ] || exit 1 echo "testing option -I -1" -# NOTE: this behavior is not documented +# Note: this behavior is not documented chage -I -1 myuser7 ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:0:99999:7::18294:' ] || exit 1 echo "testing option -I 0" -# NOTE: We should check that this is the expected behavior +# Note: we should check that this is the expected behavior chage -I 0 myuser7 ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:0:99999:7:0:18294:' ] || exit 1 @@ -130,7 +130,7 @@ chage -m 24 myuser7 ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:24:99999:7:12:18294:' ] || exit 1 echo "testing option -m -1" -# NOTE: this behavior is not documented +# Note: this behavior is not documented chage -m -1 myuser7 ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280::99999:7:12:18294:' ] || exit 1 @@ -140,7 +140,7 @@ ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:0:99999:7:12:18294:' ] || exit 1 echo "testing option --mindays" chage --min 1 myuser7 -# NOTE: that shouldn't have work +# Note: that shouldn't have work ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:1:99999:7:12:18294:' ] || exit 1 @@ -149,7 +149,7 @@ chage -M 25 myuser7 ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:1:25:7:12:18294:' ] || exit 1 echo "testing option -M -1" -# NOTE: this behavior is not documented +# Note: this behavior is not documented chage -M -1 myuser7 ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:1::7:12:18294:' ] || exit 1 @@ -167,7 +167,7 @@ chage -W 26 myuser7 ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:1:2:26:12:18294:' ] || exit 1 echo "testing option -W -1" -# NOTE: this behavior is not documented +# Note: this behavior is not documented chage -W -1 myuser7 ent=$(getent shadow myuser7) [ "$ent" = 'myuser7:$1$yQnIAZWV$gDAMB2IkqaONgrQiRdo4y.:15280:1:2::12:18294:' ] || exit 1 diff --git a/tests/usertools/chpasswd-PAM/04_chpasswd_no_shadow_entry/chpasswd.test b/tests/usertools/chpasswd-PAM/04_chpasswd_no_shadow_entry/chpasswd.test index 266021344..4f5d7eb5d 100755 --- a/tests/usertools/chpasswd-PAM/04_chpasswd_no_shadow_entry/chpasswd.test +++ b/tests/usertools/chpasswd-PAM/04_chpasswd_no_shadow_entry/chpasswd.test @@ -8,7 +8,7 @@ cd $(dirname $0) . ../../../common/log.sh log_start "$0" "chpasswd changes the passwd entry if there are no shadow entries" -# FIXME: The PAM and !PAM versions differs: +# FIXME: the PAM and !PAM versions differs: # PAM will create a shadow entry if the shadow file exists # !PAM will update the passwd entry and leave the shadow file untouched diff --git a/tests/usertools/chpasswd-PAM/29_chpasswd-e_no_shadow_entry/chpasswd.test b/tests/usertools/chpasswd-PAM/29_chpasswd-e_no_shadow_entry/chpasswd.test index c34128588..ef5274a6f 100755 --- a/tests/usertools/chpasswd-PAM/29_chpasswd-e_no_shadow_entry/chpasswd.test +++ b/tests/usertools/chpasswd-PAM/29_chpasswd-e_no_shadow_entry/chpasswd.test @@ -8,7 +8,7 @@ cd $(dirname $0) . ../../../common/log.sh log_start "$0" "chpasswd changes the passwd entry if there are no shadow entries" -# FIXME: The PAM and !PAM versions differs: +# FIXME: the PAM and !PAM versions differs: # PAM will create a shadow entry if the shadow file exists # !PAM will update the passwd entry and leave the shadow file untouched diff --git a/tests/usertools/chpasswd/04_chpasswd_no_shadow_entry/chpasswd.test b/tests/usertools/chpasswd/04_chpasswd_no_shadow_entry/chpasswd.test index d97d8b563..81a006bf4 100755 --- a/tests/usertools/chpasswd/04_chpasswd_no_shadow_entry/chpasswd.test +++ b/tests/usertools/chpasswd/04_chpasswd_no_shadow_entry/chpasswd.test @@ -8,7 +8,7 @@ cd $(dirname $0) . ../../../common/log.sh log_start "$0" "chpasswd changes the passwd entry if there are no shadow entries" -# FIXME: The PAM and !PAM versions differs: +# FIXME: the PAM and !PAM versions differs: # PAM will create a shadow entry if the shadow file exists # !PAM will update the passwd entry and leave the shadow file untouched