Hi,

here with the actual patches...

Regards

Carsten

>From 0b956e2e22388d368452ede5e630205a3d326b57 Mon Sep 17 00:00:00 2001
From: Carsten Leonhardt <l...@debian.org>
Date: Sat, 30 Nov 2024 12:19:38 +0100
Subject: [PATCH 1/2] Change **StartTLS** to \texttt{StartTLS}

For consistency with commit 71e9f56f8add21709bfd0491c3f4c592101eaf90
---
 docs/manuals/en/main/dirdconf.tex | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/docs/manuals/en/main/dirdconf.tex b/docs/manuals/en/main/dirdconf.tex
index abcd04a5..a48ec19c 100644
--- a/docs/manuals/en/main/dirdconf.tex
+++ b/docs/manuals/en/main/dirdconf.tex
@@ -4239,7 +4239,7 @@ where \texttt{parameters} are the space separated list of one or more plugin par
    point and \texttt{<filter>} is a standard LDAP search object filter which support dynamic string
    substitution: \texttt{\%u} will be replaced by credential's username and \texttt{\%p} by credential's
    password, i.e. \texttt{query=dc=bacula,dc=com/(cn=\%u)}.
- \item  [starttls] - instruct BPAM LDAP Plugin to use **StartTLS** extension if LDAP Directory service
+ \item  [starttls] - instruct BPAM LDAP Plugin to use \texttt{StartTLS} extension if LDAP Directory service
    will support it and follback to no TLS if this extension is not available.
 \item [starttlsforce] - does the same what `starttls` but resport error on fallback.
 \end{itemize}
@@ -4815,7 +4815,7 @@ where \texttt{parameters} are the space separated list of one or more plugin par
    point and \texttt{<filter>} is a standard LDAP search object filter which support dynamic string
    substitution: \texttt{\%u} will be replaced by credential's username and \texttt{\%p} by credential's
    password, i.e. \texttt{query=dc=bacula,dc=com/(cn=\%u)}.
- \item  [starttls] - instruct BPAM LDAP Plugin to use **StartTLS** extension if LDAP Directory service
+ \item  [starttls] - instruct BPAM LDAP Plugin to use \texttt{StartTLS} extension if LDAP Directory service
    will support it and follback to no TLS if this extension is not available.
 \item [starttlsforce] - does the same what `starttls` but resport error on fallback.
 \end{itemize}
-- 
2.39.5

>From f7d1b5676d0a5feab3d8d13928addbaea1b59a30 Mon Sep 17 00:00:00 2001
From: Carsten Leonhardt <l...@debian.org>
Date: Sat, 30 Nov 2024 12:22:15 +0100
Subject: [PATCH 2/2] Fix build errors with newer LaTex

Some change after Latex as distributed in Texlive after version
2022.20230122 causes errors without these changes.
---
 docs/manuals/en/main/cdp.tex        | 2 +-
 docs/manuals/en/main/postgresql.tex | 2 +-
 docs/manuals/en/main/tls.tex        | 2 +-
 3 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/docs/manuals/en/main/cdp.tex b/docs/manuals/en/main/cdp.tex
index 25e35820..d5b06f2f 100644
--- a/docs/manuals/en/main/cdp.tex
+++ b/docs/manuals/en/main/cdp.tex
@@ -1,4 +1,4 @@
-\chapter{Using \bacula{} \acl{CDP}}
+\chapter{Using \bacula{} CDP}
 \label{blb:cdp}
 \index[general]{CDP}
 \index[general]{Continuous Data Protection}
diff --git a/docs/manuals/en/main/postgresql.tex b/docs/manuals/en/main/postgresql.tex
index 589b2d80..f8319bad 100644
--- a/docs/manuals/en/main/postgresql.tex
+++ b/docs/manuals/en/main/postgresql.tex
@@ -305,7 +305,7 @@ mt -f /dev/nst0 weof
 Where you should replace \bfilename{/dev/nst0} with the appropriate tape drive
 device name for your machine.
 
-\section{Installing \postgresql{} from \acsp{RPM}}
+\section{Installing \postgresql{} from RPM}
 \index[general]{\postgresql{}!Installing from \acsp{RPM}}
 \index[general]{Installing \postgresql{} from \acsp{RPM}}
 If you are installing \postgresql{} from \acsp{RPM}, you will need to install
diff --git a/docs/manuals/en/main/tls.tex b/docs/manuals/en/main/tls.tex
index 914b8e35..db125a84 100644
--- a/docs/manuals/en/main/tls.tex
+++ b/docs/manuals/en/main/tls.tex
@@ -841,7 +841,7 @@ Let's consider ``darkstar-fd'' (on ``darkstar.example.com'') and ``arrakis-fd''
 Please note that the \bdirectivename{\acs{TLS} Allowed CN} directive is only configured on the Storage Daemon side.
 This is due to the fact that the communication in this case is always between the Storage Daemon acting as a ``\acs{TLS} server'' and the File Daemon acting as a ``\acs{TLS} client''.  In this case, the client is the peer in the \acs{TLS} communications context.  The \ac{CN} in the client's certificate subject will be checked by the Storage Daemon if it is an ``\emph{Allowed \acs{CN}}''.  in the case of the above example, \bdirectivename{\acs{TLS} Allowed CN = darkstar.example.com, arrakis.example.com} is allowing ``darkstar-fd'' (at darkstar.example.com) and ``arrakis-fd'' (at arrakis.example.com) clients to connect to ``caladan-sd'' storage daemon at ``caladan.example.com'' using \acs{TLS}.
 
-\subsection{Using Certificates Issued by Different Root \acsp{CA}}
+\subsection{Using Certificates Issued by Different Root CA}
 
 It is possible to have a \acs{TLS} environment that uses certificates issued by different \acsp{CA}. In the above examples, we have been using only one root \acs{CA}:
 \begin{bVerbatim}
-- 
2.39.5

_______________________________________________
Bacula-devel mailing list
Bacula-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-devel

Reply via email to