Index: openacs-4/packages/acs-subsite/www/permissions/perm-user-add-include.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-subsite/www/permissions/perm-user-add-include.tcl,v diff -u -N -r1.9 -r1.10 --- openacs-4/packages/acs-subsite/www/permissions/perm-user-add-include.tcl 7 Aug 2017 23:47:59 -0000 1.9 +++ openacs-4/packages/acs-subsite/www/permissions/perm-user-add-include.tcl 15 May 2018 21:41:34 -0000 1.10 @@ -10,7 +10,7 @@ permission::require_permission -object_id $object_id -privilege admin # TODO: -# parties, select privilges, css, clean up +# parties, select privileges, css, clean up #set templating datasources Index: openacs-4/packages/calendar/sql/oracle/calendar-create.sql =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/calendar/sql/oracle/calendar-create.sql,v diff -u -N -r1.12 -r1.13 --- openacs-4/packages/calendar/sql/oracle/calendar-create.sql 22 Apr 2018 18:05:23 -0000 1.12 +++ openacs-4/packages/calendar/sql/oracle/calendar-create.sql 15 May 2018 21:41:34 -0000 1.13 @@ -352,7 +352,7 @@ delete from acs_permissions where object_id = calendar.del.calendar_id; - -- Delete all privilges of the cal_items that's associated + -- Delete all privileges of the cal_items that's associated -- with this calendar delete from acs_permissions where object_id in ( Index: openacs-4/packages/calendar/sql/oracle/upgrade/upgrade-1.0-2.0d1.sql =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/calendar/sql/oracle/upgrade/upgrade-1.0-2.0d1.sql,v diff -u -N -r1.2 -r1.3 --- openacs-4/packages/calendar/sql/oracle/upgrade/upgrade-1.0-2.0d1.sql 7 Aug 2017 23:48:05 -0000 1.2 +++ openacs-4/packages/calendar/sql/oracle/upgrade/upgrade-1.0-2.0d1.sql 15 May 2018 21:41:34 -0000 1.3 @@ -368,7 +368,7 @@ delete from acs_permissions where object_id = calendar.del.calendar_id; - -- Delete all privilges of the cal_items that's associated + -- Delete all privileges of the cal_items that's associated -- with this calendar delete from acs_permissions where object_id in ( Index: openacs-4/packages/glossary/sql/oracle/glossary-drop.sql =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/glossary/sql/oracle/glossary-drop.sql,v diff -u -N -r1.5 -r1.6 --- openacs-4/packages/glossary/sql/oracle/glossary-drop.sql 30 Sep 2003 12:10:07 -0000 1.5 +++ openacs-4/packages/glossary/sql/oracle/glossary-drop.sql 15 May 2018 21:41:34 -0000 1.6 @@ -22,7 +22,7 @@ / show errors --- drop all grantings of privleges +-- drop all grantings of privileges -- and then drop privileges on glossaries -- DRB: friggin drop script did not work as inherited from aD Index: openacs-4/packages/glossary/sql/postgresql/glossary-drop.sql =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/glossary/sql/postgresql/glossary-drop.sql,v diff -u -N -r1.2 -r1.3 --- openacs-4/packages/glossary/sql/postgresql/glossary-drop.sql 18 Dec 2001 02:54:09 -0000 1.2 +++ openacs-4/packages/glossary/sql/postgresql/glossary-drop.sql 15 May 2018 21:41:34 -0000 1.3 @@ -18,7 +18,7 @@ drop function glossary__new(integer, varchar, varchar, varchar, integer, integer, varchar, integer, boolean); --- drop all grantings of privleges +-- drop all grantings of privileges -- and then drop privileges on glossaries select acs_privilege__remove_child('glossary_admin','glossary_create'); Index: openacs-4/packages/lors-central/tcl/test/lors-central-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/lors-central/tcl/test/lors-central-procs.tcl,v diff -u -N -r1.3 -r1.4 --- openacs-4/packages/lors-central/tcl/test/lors-central-procs.tcl 23 Mar 2018 23:53:02 -0000 1.3 +++ openacs-4/packages/lors-central/tcl/test/lors-central-procs.tcl 15 May 2018 21:41:34 -0000 1.4 @@ -580,7 +580,7 @@ } aa_register_case lors_central_check_privilege { - Checks lors_central::check_privilige proc + Checks lors_central::check_privilege proc ** Requirements: 1. One Course } { Index: openacs-4/packages/lors-central/www/lc-admin/grant.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/lors-central/www/lc-admin/grant.tcl,v diff -u -N -r1.2 -r1.3 --- openacs-4/packages/lors-central/www/lc-admin/grant.tcl 4 Apr 2018 20:29:27 -0000 1.2 +++ openacs-4/packages/lors-central/www/lc-admin/grant.tcl 15 May 2018 21:41:34 -0000 1.3 @@ -16,7 +16,7 @@ if { [info exists class_com_id] } { - # Grant admin privilige to all users in this class or community + # Grant admin privilege to all users in this class or community db_foreach get_all_members { } { permission::grant -party_id $user_id -object_id $man_id -privilege "admin" } Index: openacs-4/packages/lors-central/www/lc-admin/revoke.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/lors-central/www/lc-admin/revoke.tcl,v diff -u -N -r1.2 -r1.3 --- openacs-4/packages/lors-central/www/lc-admin/revoke.tcl 4 Apr 2018 20:29:27 -0000 1.2 +++ openacs-4/packages/lors-central/www/lc-admin/revoke.tcl 15 May 2018 21:41:34 -0000 1.3 @@ -16,7 +16,7 @@ if { [info exists class_com_id] } { - # Grant admin privilige to all users in this class or community + # Grant admin privilege to all users in this class or community db_foreach get_all_members { } { if { ![lors_central::owner -user_id $user_id -object_id $man_id] } { permission::revoke -party_id $user_id -object_id $man_id -privilege "admin" Index: openacs-4/packages/monitoring/sql/oracle/cassandracle.sql =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/monitoring/sql/oracle/cassandracle.sql,v diff -u -N -r1.1 -r1.2 --- openacs-4/packages/monitoring/sql/oracle/cassandracle.sql 20 Apr 2001 20:51:11 -0000 1.1 +++ openacs-4/packages/monitoring/sql/oracle/cassandracle.sql 15 May 2018 21:41:34 -0000 1.2 @@ -2,14 +2,14 @@ -- 1999-12-09 -- David Ambercrobie: abe@arsdigita.com -- --- Cassandracle normally connects as a user with DBA privleges, --- but we can also grant select privledges to a role, then +-- Cassandracle normally connects as a user with DBA privileges, +-- but we can also grant select privileges to a role, then -- grant this role to normal database users. This allows a -- normal ACS Oracle user to be able to use Cassandracle -- using the normal driver without worrying about DBA role -- users running amok. -- --- More privliges will be added to this role as Cassandracle evolves. +-- More privileges will be added to this role as Cassandracle evolves. -- -- You might need to restart the server after granting this -- role to an ACS Oracle user: granting a new role to a Index: openacs-4/packages/xotcl-core/tcl/policy-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/xotcl-core/tcl/policy-procs.tcl,v diff -u -N -r1.28 -r1.29 --- openacs-4/packages/xotcl-core/tcl/policy-procs.tcl 21 Mar 2018 15:03:50 -0000 1.28 +++ openacs-4/packages/xotcl-core/tcl/policy-procs.tcl 15 May 2018 21:41:34 -0000 1.29 @@ -73,7 +73,7 @@ Policy instproc get_privilege {{-query_context "::xo::cc"} permission object method} { # the privilege might by primitive (one word privilege) # or it might be complex (attribute + privilege) - # or it might be conditional (primitive or complex) in a list of privilges + # or it might be conditional (primitive or complex) in a list of privileges foreach p $permission { #my msg "checking permission '$p'" Index: openacs-4/packages/xowiki/tcl/xowiki-www-procs.tcl =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/xowiki/tcl/xowiki-www-procs.tcl,v diff -u -N -r1.353 -r1.354 --- openacs-4/packages/xowiki/tcl/xowiki-www-procs.tcl 9 May 2018 15:33:34 -0000 1.353 +++ openacs-4/packages/xowiki/tcl/xowiki-www-procs.tcl 15 May 2018 21:41:34 -0000 1.354 @@ -1903,7 +1903,7 @@ if {$fields eq ""} {return ""} foreach field $fields { # - # Handling first TEXTARA + # Handling first TEXTAREA # if {[$field nodeName] eq "textarea"} { return [$field nodeValue]