From: Christophe Jaillet Date: Sun, 1 Dec 2013 21:13:56 +0000 (+0000) Subject: Fix missing spaces in messages X-Git-Tag: 2.5.0-alpha~4793 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=553054d0ba81cf31f924b1a935956ab9798c5b3a;p=apache Fix missing spaces in messages git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1546860 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/modules/aaa/mod_auth_digest.c b/modules/aaa/mod_auth_digest.c index 7561d8f063..316da19416 100644 --- a/modules/aaa/mod_auth_digest.c +++ b/modules/aaa/mod_auth_digest.c @@ -225,7 +225,7 @@ static apr_status_t cleanup_tables(void *not_used) static void log_error_and_cleanup(char *msg, apr_status_t sts, server_rec *s) { ap_log_error(APLOG_MARK, APLOG_ERR, sts, s, APLOGNO(01760) - "%s - all nonce-count checking and one-time nonces" + "%s - all nonce-count checking and one-time nonces " "disabled", msg); cleanup_tables(NULL); diff --git a/modules/aaa/mod_authnz_ldap.c b/modules/aaa/mod_authnz_ldap.c index ed8feb3470..3cd0ddc8b8 100644 --- a/modules/aaa/mod_authnz_ldap.c +++ b/modules/aaa/mod_authnz_ldap.c @@ -1661,17 +1661,17 @@ static const command_rec authnz_ldap_cmds[] = AP_INIT_FLAG("AuthLDAPGroupAttributeIsDN", ap_set_flag_slot, (void *)APR_OFFSETOF(authn_ldap_config_t, group_attrib_is_dn), OR_AUTHCFG, - "If set to 'on', auth_ldap uses the DN that is retrieved from the server for" - "subsequent group comparisons. If set to 'off', auth_ldap uses the string" + "If set to 'on', auth_ldap uses the DN that is retrieved from the server for " + "subsequent group comparisons. If set to 'off', auth_ldap uses the string " "provided by the client directly. Defaults to 'on'."), AP_INIT_TAKE1("AuthLDAPDereferenceAliases", mod_auth_ldap_set_deref, NULL, OR_AUTHCFG, - "Determines how aliases are handled during a search. Can be one of the" + "Determines how aliases are handled during a search. Can be one of the " "values \"never\", \"searching\", \"finding\", or \"always\". " "Defaults to always."), AP_INIT_TAKE1("AuthLDAPCharsetConfig", set_charset_config, NULL, RSRC_CONF, - "Character set conversion configuration file. If omitted, character set" + "Character set conversion configuration file. If omitted, character set " "conversion is disabled."), AP_INIT_TAKE1("AuthLDAPAuthorizePrefix", ap_set_string_slot, @@ -1689,12 +1689,12 @@ static const command_rec authnz_ldap_cmds[] = AP_INIT_FLAG("AuthLDAPSearchAsUser", ap_set_flag_slot, (void *)APR_OFFSETOF(authn_ldap_config_t, search_as_user), OR_AUTHCFG, - "Set to 'on' to perform authorization-based searches with the users credentials, when this module" - " has also performed authentication. Does not affect nested groups lookup."), + "Set to 'on' to perform authorization-based searches with the users credentials, when this module " + "has also performed authentication. Does not affect nested groups lookup."), AP_INIT_FLAG("AuthLDAPCompareAsUser", ap_set_flag_slot, (void *)APR_OFFSETOF(authn_ldap_config_t, compare_as_user), OR_AUTHCFG, - "Set to 'on' to perform authorization-based compares with the users credentials, when this module" - " has also performed authentication. Does not affect nested groups lookups."), + "Set to 'on' to perform authorization-based compares with the users credentials, when this module " + "has also performed authentication. Does not affect nested groups lookups."), {NULL} }; diff --git a/modules/mappers/mod_negotiation.c b/modules/mappers/mod_negotiation.c index 5ec0d4d02d..85650bf0b3 100644 --- a/modules/mappers/mod_negotiation.c +++ b/modules/mappers/mod_negotiation.c @@ -1035,7 +1035,7 @@ static int read_type_map(apr_file_t **map, negotiation_state *neg, *eol = '\0'; if ((mime_info.body = get_body(buffer, &len, tag, *map)) < 0) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00685) - "Syntax error in type map, no end tag '%s'" + "Syntax error in type map, no end tag '%s' " "found in %s for Body: content.", tag, r->filename); break; diff --git a/server/protocol.c b/server/protocol.c index 453428e77b..18f0afb88c 100644 --- a/server/protocol.c +++ b/server/protocol.c @@ -932,7 +932,7 @@ AP_DECLARE(void) ap_get_mime_headers_core(request_rec *r, apr_bucket_brigade *bb else if (ap_has_cntrl(value)) { err = HTTP_BAD_REQUEST; ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(02427) - "Request header field '%.*s' contains" + "Request header field '%.*s' contains " "control character", (int)LOG_NAME_MAX_LEN, last_field); }