Browse Source

Fix typos encountered while updating de translation

tags/devuan/2.0.1+devuan1
Chris Leick David Kalnischkies 2 years ago
parent
commit
b6b159cc5e
16 changed files with 46 additions and 49 deletions
  1. +1
    -1
      apt-pkg/orderlist.cc
  2. +1
    -1
      debian/changelog
  3. +1
    -1
      doc/apt-transport-https.1.xml
  4. +1
    -1
      doc/apt.8.xml
  5. +1
    -1
      doc/apt.conf.5.xml
  6. +4
    -4
      doc/po/apt-doc.pot
  7. +4
    -7
      doc/po/de.po
  8. +4
    -4
      doc/po/es.po
  9. +4
    -4
      doc/po/fr.po
  10. +4
    -4
      doc/po/it.po
  11. +4
    -4
      doc/po/ja.po
  12. +4
    -4
      doc/po/nl.po
  13. +4
    -4
      doc/po/pl.po
  14. +4
    -4
      doc/po/pt.po
  15. +4
    -4
      doc/po/pt_BR.po
  16. +1
    -1
      doc/sources.list.5.xml

+ 1
- 1
apt-pkg/orderlist.cc View File

@@ -889,7 +889,7 @@ bool pkgOrderList::DepConfigure(DepIterator D)
/*}}}*/
// OrderList::DepRemove - Removal ordering /*{{{*/
// ---------------------------------------------------------------------
/* Checks all given dependencies if they are broken by the remove of a
/* Checks all given dependencies if they are broken by the removal of a
package and if so fix it by visiting another provider or or-group
member to ensure that the dependee keeps working which is especially
important for Immediate packages like e.g. those depending on an


+ 1
- 1
debian/changelog View File

@@ -5878,7 +5878,7 @@ apt (0.8.11) unstable; urgency=low
- if --print-uris is used don't setup downloader as we don't need
progress, lock nor the directories it would create otherwise
- show dependencies of essential packages which are going to remove
only if they cause the remove of this essential (Closes: #601961)
only if they cause the removal of this essential (Closes: #601961)
- keep not installed garbage packages uninstalled instead of showing
in the autoremove section and installing those (Closes: #604222)
- change pkg/release behavior to use the new SetCandidateRelease


+ 1
- 1
doc/apt-transport-https.1.xml View File

@@ -38,7 +38,7 @@ a user but used by APT tools based on user configuration.</para>
which, as indicated by the appended S, is wrapped in an encrypted layer known as
Transport Layer Security (TLS) to provide end-to-end encryption.
A sufficiently capable attacker can still observe the communication partners
and deeper analyse of the encrypted communication might still reveal important details.
and deeper analysis of the encrypted communication might still reveal important details.
An overview over available alternative transport methods is given in &sources-list;.</para>
</refsect1>



+ 1
- 1
doc/apt.8.xml View File

@@ -57,7 +57,7 @@
sources configured via &sources-list;. New packages will be
installed if required to satisfy dependencies, but existing
packages will never be removed. If an upgrade for a package requires
the remove of an installed package the upgrade for this package
the removal of an installed package the upgrade for this package
isn't performed.
</para></listitem>
</varlistentry>


+ 1
- 1
doc/apt.conf.5.xml View File

@@ -722,7 +722,7 @@ APT::Compressor::rev {
<para>
The <literal>Ignore-Files-Silently</literal> list can be used to specify
which files APT should silently ignore while parsing the files in the
fragment directories. Per default a file which end with <literal>.disabled</literal>,
fragment directories. Per default a file which ends with <literal>.disabled</literal>,
<literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-z]+</literal>
is silently ignored. As seen in the last default value these patterns can use regular
expression syntax.


+ 4
- 4
doc/po/apt-doc.pot View File

@@ -565,7 +565,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""

@@ -3753,7 +3753,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with "
"fragment directories. Per default a file which ends with "
"<literal>.disabled</literal>, <literal>~</literal>, <literal>.bak</literal> "
"or <literal>.dpkg-[a-z]+</literal> is silently ignored. As seen in the last "
"default value these patterns can use regular expression syntax."
@@ -5736,7 +5736,7 @@ msgid ""
"is that the communication between apt and server (or proxy) is "
"encrypted. Note that the encryption does not prevent an attacker from "
"knowing which server (or proxy) apt is communicating with and deeper "
"analyses can potentially still reveal which data was downloaded. If this is "
"analysis can potentially still reveal which data was downloaded. If this is "
"a concern the Tor-based schemes mentioned further below might be a suitable "
"alternative."
msgstr ""
@@ -7276,7 +7276,7 @@ msgid ""
"&apt-transport-http;), which, as indicated by the appended S, is wrapped in "
"an encrypted layer known as Transport Layer Security (TLS) to provide "
"end-to-end encryption. A sufficiently capable attacker can still observe "
"the communication partners and deeper analyse of the encrypted communication "
"the communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 4
- 7
doc/po/de.po View File

@@ -692,7 +692,6 @@ msgstr ""
"Daten, zum Beispiel, um Paket-Upgrades durchzuführen oder um darin zu suchen "
"und um Einzelheiten über alle zur Installation verfügbaren Pakete anzuzeigen."

# FIXME s/remove/removal/
#. type: Content of: <refentry><refsect1><variablelist><varlistentry><listitem><para>
#: apt.8.xml
msgid ""
@@ -700,7 +699,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""
"<literal>upgrade</literal> wird verwendet, um verfügbare Upgrades für alle "
@@ -5411,13 +5410,12 @@ msgstr ""
"etwas nur relativen Pfaden voranstellen möchten, setzen Sie stattdessen "
"<literal>Dir</literal>."

# FIXME s/which end/which ends/
#. type: Content of: <refentry><refsect1><para>
#: apt.conf.5.xml
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with <literal>.disabled</"
"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -8286,7 +8284,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
"server (or proxy) apt is communicating with and deeper analyses can "
"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -10425,7 +10423,6 @@ msgstr ""
"einen Benutzer aufgerufen wird, jedoch von APT-Werkzeugen basierend auf der "
"Konfiguration des Benutzers."

# FIXME s/analyse/analysis/
#. type: Content of: <refentry><refsect1><para>
#: apt-transport-https.1.xml
msgid ""
@@ -10433,7 +10430,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communication "
"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 4
- 4
doc/po/es.po View File

@@ -768,7 +768,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""

@@ -5379,7 +5379,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with <literal>.disabled</"
"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -8048,7 +8048,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
"server (or proxy) apt is communicating with and deeper analyses can "
"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -10105,7 +10105,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communication "
"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 4
- 4
doc/po/fr.po View File

@@ -696,7 +696,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""
"La commande <literal>upgrade</literal> permet d'installer les mises à jour "
@@ -5407,7 +5407,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with <literal>.disabled</"
"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -8219,7 +8219,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
"server (or proxy) apt is communicating with and deeper analyses can "
"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -10348,7 +10348,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communication "
"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 4
- 4
doc/po/it.po View File

@@ -746,7 +746,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""
"<option>upgrade</option> viene usato per installare gli aggiornamenti "
@@ -5394,7 +5394,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with <literal>.disabled</"
"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -8198,7 +8198,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
"server (or proxy) apt is communicating with and deeper analyses can "
"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -10262,7 +10262,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communication "
"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 4
- 4
doc/po/ja.po View File

@@ -743,7 +743,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""
"<option>upgrade</option> は、&sources-list; で設定された取得元からシステムに"
@@ -5181,7 +5181,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with <literal>.disabled</"
"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -7859,7 +7859,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
"server (or proxy) apt is communicating with and deeper analyses can "
"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -9875,7 +9875,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communication "
"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 4
- 4
doc/po/nl.po View File

@@ -750,7 +750,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""
"<literal>upgrade</literal> wordt gebruikt om voor alle pakketten die "
@@ -5518,7 +5518,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with <literal>.disabled</"
"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -8412,7 +8412,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
"server (or proxy) apt is communicating with and deeper analyses can "
"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -10573,7 +10573,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communication "
"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 4
- 4
doc/po/pl.po View File

@@ -728,7 +728,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""

@@ -4984,7 +4984,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with <literal>.disabled</"
"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -7495,7 +7495,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
"server (or proxy) apt is communicating with and deeper analyses can "
"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -9262,7 +9262,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communication "
"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 4
- 4
doc/po/pt.po View File

@@ -735,7 +735,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""
"<literal>upgrade</literal> é usado para instalar as versões mais recentes de "
@@ -5301,7 +5301,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with <literal>.disabled</"
"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -7974,7 +7974,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
"server (or proxy) apt is communicating with and deeper analyses can "
"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -10041,7 +10041,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communication "
"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 4
- 4
doc/po/pt_BR.po View File

@@ -548,7 +548,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
"a package requires the remove of an installed package the upgrade for this "
"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""

@@ -3686,7 +3686,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
"fragment directories. Per default a file which end with <literal>.disabled</"
"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -6030,7 +6030,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
"server (or proxy) apt is communicating with and deeper analyses can "
"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -7582,7 +7582,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
"communication partners and deeper analyse of the encrypted communication "
"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""


+ 1
- 1
doc/sources.list.5.xml View File

@@ -409,7 +409,7 @@ deb-src [ option1=value1 option2=value2 ] uri suite [component1] [component2] [.
difference is that the communication between apt and server (or proxy) is
encrypted. Note that the encryption does not prevent an attacker from
knowing which server (or proxy) apt is communicating with and deeper
analyses can potentially still reveal which data was downloaded. If this is
analysis can potentially still reveal which data was downloaded. If this is
a concern the Tor-based schemes mentioned further below might be a suitable
alternative.</para></listitem>
</varlistentry>


Loading…
Cancel
Save