Commits on Source (65)
-
Iker Pedrosa authored
Support for Fedora 36-, RHEL/CentOS 6 and 7 in master branch ended, so let's remove them. In addition, Python2 support only exists in RHEL/Centos 8, so make only those two dstributions use `python2-bindings`. Finally, include RHEL/CentOS 10 for configurable features. Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com> (cherry picked from commit 3edc04d1)
ba7b9938 -
Iker Pedrosa authored
Support for Fedora 36- in master branch ended, so let's remove them. Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com> (cherry picked from commit 39a0de22)
31617400 -
Iker Pedrosa authored
Support for Fedora 36- in master branch ended, so let's remove them. Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com> (cherry picked from commit 05ea3f1b)
52acc394 -
Iker Pedrosa authored
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com> (cherry picked from commit 292ef326)
776f6e19 -
Jakub Vavra authored
Reviewed-by: Alejandro Lopez <allopez@redhat.com> Reviewed-by: Dan Lavu <dlavu@redhat.com> Reviewed-by: Justin Stephenson <jstephen@redhat.com> (cherry picked from commit 0f1a6e35)
fd414aae -
Alexey Tikhonov authored
Resolves following rpminspect warning: ``` Subpackage sssd-proxy carries 'Requires: libsss_certmap.so.0()(64bit)' which comes from subpackage libsss_certmap but does not carry an explicit package version requirement. Please add 'Requires: libsss_certmap = %{version}-%{release}' to the spec file to avoid the need to test interoperability between various combinations of old and new subpackages. ``` Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 3eae4cc5)
f394acee -
Alexey Tikhonov authored
Resolves: https://github.com/SSSD/sssd/issues/6790 Reviewed-by: Justin Stephenson <jstephen@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 2617dcfd)
4b4564c3 -
Alexey Tikhonov authored
Sizes might not match on some platforms. Resolves: https://github.com/SSSD/sssd/issues/6790 Reviewed-by: Justin Stephenson <jstephen@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 098bf64a)
1e2af0d1 -
Dan Lavu authored
- added markers to pytest.ini - added markers to tests - consolidated two sssctl test files into one, sssctl_config_check.py and sssctl.py - renamed test_id.py, to test_identity.py, just to match the marker groups - renamed the test cases in test_identity.py to be more readable - renamed test_ldap_extra_attrs.py to test_schema.py , after looking at the tests, its testing the schema attributes - appended test_shadow.py to test_ldap.py , tests shadowlastchange = 0 in LDAP Reviewed-by: Jakub Vávra <jvavra@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com> Reviewed-by: Scott Poore <spoore@redhat.com> (cherry picked from commit 92e85f1a)
b536e4b3 -
Alejandro López authored
sssd_kcm is not registered with SSSD's monitor, so it is not signaled when it must restart the log. Adding this command will directly signal sssd_kcm (in addition to the monitor). If sssd_kcm is also running in one or more containers, they will also receive the signal. Because only the log files in the host where rotated, the instances in the containers will go on using the same log files. Nothing will happen except for the "Received SIGHUP. Rotating logfiles." message in the log files. If we want to avoid this, we should implement a PID file. Reviewed-by: Sumit Bose <sbose@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 230e7757)
469ddcbf -
Alejandro López authored
The per-UID quota is internally increased by 2. This value is no longer hard-coded but replaced by the KCM_MAX_UID_EXTRA_SECRETS macro. Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit c73b7eb8)
8c832345 -
Alejandro López authored
The pointer to the newly allocated iobuffer is stored into state->op_ctx->reply but the check for NULL is done on state->reply, which we already know is not NULL because it was checked before and not modified after that. Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 3cba6d11)
855d0465 -
Alejandro López authored
This field is never set and never used. Let's remove it. Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 12692054)
14e7d7c0 -
Alejandro López authored
`cc-> client` could be NULL. Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 2eb67afc)
3e740a25 -
Alejandro López authored
sss_iobuf_init_empty() and related functions zero the allocated memory even though it is not needed. Most of the time, all the fields in the structures will be set to non-zero values. In these cases zeroing the is useless and we stop doing it. Only in two cases, some pointers were being left unmodified, so they are now being manually set to NULL. Resolves: https://github.com/SSSD/sssd/issues/7014 Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit edb63cde)
a5c96e29 -
Alejandro López authored
Some packages are being allocated to their maximum size, even though all that memory is not required. When the amount of memory needed is not know, We reduce the amount of memory allocated to the initial size defined by the KCM_PACKET_INITIAL_SIZE macro. The existing KCM_REPLY_MAX was replaced by KCM_PACKET_MAX_SIZE. Resolves: https://github.com/SSSD/sssd/issues/7014 Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit fe6c35ad)
78d0a97d -
Alejandro López authored
A few more cases where memory is allocated and zeroed when it is not required. Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit b4f9f63b)
60fde9d5 -
Patrik Rosecky authored
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Jakub Vávra <jvavra@redhat.com> (cherry picked from commit e9189052)
c5d04578 -
Sumit Bose authored
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit e9e6d80e)
ff520020 -
Sumit Bose authored
sss_nss_getgrouplist_timeout() is intended as a replacement for getgrouplist() which only gets secondary groups from SSSD. Currently it returns an ENOENT error if there are no secondary groups returned by SSSD. However, as with getgrouplist(), there is the second parameter which expects a single GID which will be added to the result. This means that sss_nss_getgrouplist_timeout() will always return at least this GID as a result and an ENOENT error does not make sense. With this patch sss_nss_getgrouplist_timeout() will not return an error anymore if there are no secondary groups but just a result with the single GID from the second parameter. Reviewed-by: Alejandro López <allopez@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit cffe6e09)
e03921e4 -
Sumit Bose authored
It is expected that the files provider ignores the local_auth_policy option and supports Smartcard authentication by default. Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Justin Stephenson <jstephen@redhat.com> (cherry picked from commit 5e7cd889)
9a6ff9e7 -
Madhuri Upadhye authored
Test cases are as follows: 4. Check auth deny for incorrect pin for LDAP, IPA, Ad and Samba. 5. Check auth deny for incorrect passkey mapping for LDAP, IPA, AD and Samba. 6. Check auth of user when server is not resolvable for IPA, LDAP, AD and Samba. Signed-off-by: Madhuri Upadhye <mupadhye@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Jakub Vávra <jvavra@redhat.com> (cherry picked from commit f4c9d6ef)
a8928a9a -
Sumit Bose authored
There is no requirement for root to run the test and if the user does not has the needed privileges to access the related services this is good as a test result as well. Additionally at least pam_chauthtok() behaves differently when being called as root compared to an ordinary user. Reviewed-by: Alejandro López <allopez@redhat.com> Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> (cherry picked from commit 8ff7fdc1)
be5399c1 -
Jakub Vavra authored
Ticket: https://issues.redhat.com/browse/SSSD-5687 Reviewed-by: Alejandro López <allopez@redhat.com> Reviewed-by: Anuj Borah <aborah@redhat.com> (cherry picked from commit 38db355a)
e44ad324 -
Patrik Rosecky authored
Reviewed-by: Jakub Vávra <jvavra@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit a5f636bb)
2bc72a2b -
Pavel Březina authored
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 76d3b5a4)
35bcb91b -
Pavel Březina authored
This is expected on empty GPOs and we just skip the element. Therefore we should not print backtrace. Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 3e976dc6)
eabeb3a7 -
Pavel Březina authored
The firewall API was redesigned in order to make it more flexible and start supporting outbound rules as well. Blocking all communication to given host using an outbound rules is less prone to errors since it does not depend on specific ports. Reviewed-by: Dan Lavu <dlavu@redhat.com> Reviewed-by: Justin Stephenson <jstephen@redhat.com> (cherry picked from commit 0f9611cd)
d02874be -
Justin Stephenson authored
Reviewed-by: Dan Lavu <dlavu@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com> (cherry picked from commit 60fdacfd)
f4908728 -
Alexey Tikhonov authored
Since 9358a74d a domain might be skipped by 'ad_enabled_domains' option Reviewed-by: Sumit Bose <sbose@redhat.com> (cherry picked from commit 39cd0baa)
6959dc6a -
Patrik Rosecky authored
Reviewed-by: Justin Stephenson <jstephen@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com> (cherry picked from commit c2360811)
66bd91d5 -
Alexey Tikhonov authored
Reviewed-by: Justin Stephenson <jstephen@redhat.com> (cherry picked from commit 97c05c4e)
f6faf123 -
Justin Stephenson authored
In the AD case, the user altSecurityIdentities attribute can store passkey, smartcard, or ssh public key mapping data. Check to ensure we are handling passkey data before continuing in PAM passkey processing. :relnote: Fixes a crash when PAM passkey processing incorrectly handles non-passkey data. Resolves: https://github.com/SSSD/sssd/issues/7061 Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Sumit Bose <sbose@redhat.com> (cherry picked from commit 6ed1eff4)
4d01e11d -
Jakub Vavra authored
Reviewed-by: Anuj Borah <aborah@redhat.com> (cherry picked from commit ff8f248b)
1cffe5bc -
Jakub Vavra authored
Reviewed-by: Madhuri Upadhye <mupadhye@redhat.com> (cherry picked from commit df1b7454)
9f406d42 -
Jakub Vavra authored
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Madhuri Upadhye <mupadhye@redhat.com> (cherry picked from commit a5270f89)
cbd479d7 -
Jakub Vavra authored
Reviewed-by: Scott Poore <spoore@redhat.com> (cherry picked from commit 5fb0a9dd)
0ae92383 -
Jakub Vavra authored
I looks like realm join return value was parsed in one place so I am reverting the mishap change of the return type. Reviewed-by: Anuj Borah <aborah@redhat.com> Reviewed-by: Shridhar Gadekar <sgadekar@redhat.com> (cherry picked from commit b66035f3)
854edfb0 -
Andre Boscatto authored
Resolves: https://github.com/SSSD/sssd/issues/7094 Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> (cherry picked from commit 9abcaf90)
033f3db0 -
Justin Stephenson authored
Fix for: CID 336599: Memory - corruptions (OVERRUN) Overrunning dynamic array "result_creds" by passing it to a function that accesses it at byte "creds_len". Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> (cherry picked from commit 1d33bde4)
02c18320 -
Justin Stephenson authored
Fix for: CID 470374: Resource leaks (RESOURCE_LEAK) Variable "prompt_reply" going out of scope leaks the storage it points to. Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> (cherry picked from commit a134074c)
f5e3bb39 -
Justin Stephenson authored
==367086== Conditional jump or move depends on uninitialised value(s) ==367086== at 0x12BF1A31: string_get (load.c:894) ==367086== by 0x12BF291D: stream_get.part.0 (load.c:158) ==367086== by 0x12BF3182: UnknownInlinedFun (load.c:154) ==367086== by 0x12BF3182: UnknownInlinedFun (load.c:227) ==367086== by 0x12BF3182: lex_scan.isra.0 (load.c:573) ==367086== by 0x12BF7F6A: parse_json (load.c:868) ==367086== by 0x12BF80C8: json_loads (load.c:920) ==367086== by 0x12BDDFD9: sss_passkey_message_from_reply_json (passkey_utils.c:544) ==367086== by 0x12BDCA76: sss_passkeycl_process (passkey_clpreauth.c:321) ==367086== by 0x4906215: UnknownInlinedFun (preauth2.c:352) ==367086== by 0x4906215: UnknownInlinedFun (preauth2.c:679) ==367086== by 0x4906215: k5_preauth (preauth2.c:1018) ==367086== by 0x48F9489: UnknownInlinedFun (get_in_tkt.c:1351) ==367086== by 0x48F9489: UnknownInlinedFun (get_in_tkt.c:1912) ==367086== by 0x48F9489: krb5_init_creds_step (get_in_tkt.c:1868) ==367086== by 0x48FA43A: k5_init_creds_get (get_in_tkt.c:564) ==367086== by 0x48FB3EB: k5_get_init_creds (get_in_tkt.c:1978) ==367086== by 0x48FB817: krb5_get_init_creds_password (gic_pwd.c:210) Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> (cherry picked from commit 22d35690)
51f90318 -
Alexey Tikhonov authored
don't return anything but EINVAL, because `_nss_sss_*()` functions can have a special handling for other error codes (for ERANGE in particular). Reviewed-by: Alejandro López <allopez@redhat.com> Reviewed-by: Sumit Bose <sbose@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 958a5e25)
160738ee -
Alexey Tikhonov authored
Real life example would be: https://github.com/TigerVNC/tigervnc/blob/effd854bfd19654fa67ff3d39514a91a246b8ae6/unix/xserver/hw/vnc/xvnc.c#L369 - TigerVNC unconditionally overwrites fd=3 Resolves: https://github.com/SSSD/sssd/issues/6986 Reviewed-by: Alejandro López <allopez@redhat.com> Reviewed-by: Sumit Bose <sbose@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 0344c41a)
a186224d -
Alexey Tikhonov authored
Real life example would be: https://github.com/TigerVNC/tigervnc/blob/effd854bfd19654fa67ff3d39514a91a246b8ae6/unix/xserver/hw/vnc/xvnc.c#L369 - TigerVNC unconditionally overwrites fd=3 Reviewed-by: Alejandro López <allopez@redhat.com> Reviewed-by: Sumit Bose <sbose@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 2bcfb7f9)
abb146e1 -
Pavel Březina authored
... also switch to gpg2. Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> (cherry picked from commit 2e75d735)
8bf25b6c -
Pavel Březina authored
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> (cherry picked from commit c7a6e62d)
5c224730 -
Alejandro López authored
When an operation is processed, a buffer is allocated for the reply and its parent is the client context (struct cli_ctx). This buffer is not explicitly freed but it is released when the client context is freed. With each operation a new buffer is allocated and the previous one gets "lost." This is not an actual leak because the lost buffers are released by talloc once the client context is freed, when the connection is closed. But on long-lived connections this can consume a large amount of memory before the connection is closed. To solve this, the request context (struct kcm_req_ctx) is the new parent of the buffer. The request is freed as soon as the operation is completed and no buffer gets lost. Resolves: https://github.com/SSSD/sssd/issues/7072 Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Sumit Bose <sbose@redhat.com> (cherry picked from commit cbae6855)
46f4161e -
Patrik Rosecky authored
Reviewed-by: Jakub Vávra <jvavra@redhat.com> Reviewed-by: Justin Stephenson <jstephen@redhat.com> (cherry picked from commit 543eda19)
8a78c75a -
Jakub Vavra authored
Add a pytest plugin to remove / duplicate test log from console and put it into a stand-alone per-test log files. Reviewed-by: Scott Poore <spoore@redhat.com> (cherry picked from commit 9d6caaed)
5a2256cb -
Patrik Rosecky authored
Reviewed-by: Justin Stephenson <jstephen@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit d3a2bd08)
852b9e0c -
Patrik Rosecky authored
Reviewed-by: Dan Lavu <dlavu@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> (cherry picked from commit ea7de588)
bd9cf6f4 -
Madhuri Upadhye authored
Test cases are as follows: 7. Check offline authentication of a user with LDAP, IPA, AD and Samba 8. Fetch user from cache for LDAP, IPA, AD and Samba server 9. Check authentication of user when multiple keys added for same user with LDAP, IPA, AD and Samba server. 10. Check authentication of user when same key added for multiple user with LDAP, IPA, AD and Samba server. Signed-off-by: Madhuri Upadhye <mupadhye@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Justin Stephenson <jstephen@redhat.com> Reviewed-by: Scott Poore <spoore@redhat.com> (cherry picked from commit 173f3114)
80d5a34f -
Tomas Halman authored
In AD, a user from a domain can be a member of a group that is from a child of the domain. The old code did not account for this and created a cache object with incorrect DNs when ldap_use_tokengoups is set to False. This patch looks up the correct domain before saving group and membership attributes. Resolves: https://github.com/SSSD/sssd/issues/7084 Reviewed-by: Dan Lavu <dlavu@redhat.com> Reviewed-by: Sumit Bose <sbose@redhat.com> (cherry picked from commit 830a2e3d)
a3393156 -
Alexey Tikhonov authored
Reviewed-by: Andre Boscatto <aboscatt@redhat.com> (cherry picked from commit 4cdb4175)
98d8bedd -
Sumit Bose authored
Resolves: https://github.com/SSSD/sssd/issues/5708 Reviewed-by: Justin Stephenson <jstephen@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 9b73614c)
936b8281 -
Sumit Bose authored
With this patch the group-memberships of the client running SSSD are included in the evaluation of the security filtering. Similar as in AD the host object is more or less handled as a user object which allows to skip some code dedicated to computers only. Resolves: https://github.com/SSSD/sssd/issues/5708 Reviewed-by: Justin Stephenson <jstephen@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit c02e09af)
09dcc73e -
Sumit Bose authored
The related calls are not needed anymore. Resolves: https://github.com/SSSD/sssd/issues/5708 Reviewed-by: Justin Stephenson <jstephen@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit ff23e7e2)
dda0f2e0 -
Sumit Bose authored
This patch adds a new parameter set_non_posix to the user and group lookup calls. Currently the domain type is used to determine if the search should be restricted to POSIX objects or not. The new option allows to drop this restriction explicitly to look up non-POSIX objects. Resolves: https://github.com/SSSD/sssd/issues/5708 Reviewed-by: Justin Stephenson <jstephen@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit 5f63d9bf)
f5ce7c1d -
Tomas Halman authored
When we are evaluating GPO the SID of user's primary group is not returned in the list. This patch converts the value of origPrimaryGroupGidNumber attribute back to SID and that SID is added to the list of SIDs before evaluating the GPO rules. Reviewed-by: Dan Lavu <dlavu@redhat.com> Reviewed-by: Sumit Bose <sbose@redhat.com> (cherry picked from commit ecb0c637)
05de56d0 -
Dan Lavu authored
Reviewed-by: Dan Lavu <dlavu@redhat.com> (cherry picked from commit 90eca38e)
cb64d47b -
aborah authored
Error: remote username contains invalid characters Reviewed-by: Madhuri Upadhye <mupadhye@redhat.com> (cherry picked from commit 23087669)
c054fc00 -
Dan Lavu authored
Reviewed-by: Dan Lavu <dlavu@redhat.com> Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com> Reviewed-by: Tomáš Halman <thalman@redhat.com> (cherry picked from commit c6d216fb74108d798f9ef5b804c87b3654ab1c30)
1c5a11fc -
Pavel Březina authoredeecd4183
-
Pavel Březina authored02d3f214
Showing
- .github/workflows/ci.yml 1 addition, 0 deletions.github/workflows/ci.yml
- Makefile.am 8 additions, 3 deletionsMakefile.am
- contrib/ci/configure.sh 13 additions, 31 deletionscontrib/ci/configure.sh
- contrib/ci/deps.sh 2 additions, 3 deletionscontrib/ci/deps.sh
- contrib/ci/distro.sh 1 addition, 11 deletionscontrib/ci/distro.sh
- contrib/ci/sssd.supp 0 additions, 2 deletionscontrib/ci/sssd.supp
- contrib/sssd.spec.in 2 additions, 0 deletionscontrib/sssd.spec.in
- po/bg.po 9 additions, 9 deletionspo/bg.po
- po/ca.po 9 additions, 9 deletionspo/ca.po
- po/cs.po 9 additions, 9 deletionspo/cs.po
- po/de.po 9 additions, 9 deletionspo/de.po
- po/es.po 9 additions, 9 deletionspo/es.po
- po/eu.po 9 additions, 9 deletionspo/eu.po
- po/fi.po 9 additions, 9 deletionspo/fi.po
- po/fr.po 9 additions, 9 deletionspo/fr.po
- po/hu.po 9 additions, 9 deletionspo/hu.po
- po/id.po 9 additions, 9 deletionspo/id.po
- po/it.po 9 additions, 9 deletionspo/it.po
- po/ja.po 9 additions, 9 deletionspo/ja.po
- po/ka.po 9 additions, 9 deletionspo/ka.po