1 new commit in galaxy-central: https://bitbucket.org/galaxy/galaxy-central/changeset/5359d1066d91/ changeset: 5359d1066d91 user: dannon date: 2012-09-18 15:34:51 summary: Grammar. it's -> its in admin panel (and tests) affected #: 2 files diff -r ba64c2178fbee9a83f79580c434ab280d8a0b738 -r 5359d1066d91849fbf075f95f4999613d17a9c45 templates/webapps/galaxy/admin/center.mako --- a/templates/webapps/galaxy/admin/center.mako +++ b/templates/webapps/galaxy/admin/center.mako @@ -51,7 +51,7 @@ then users that have Role2 will be able to access the library, but will not see those contained datasets whose [dataset] "access" permission is associated with only Role1. <p/> - In addition to the "access library" permission, permission to perform the following functions on the data library (and it's contents) can + In addition to the "access library" permission, permission to perform the following functions on the data library (and its contents) can be granted to users (a library item is one of: a data library, a library folder, a library dataset). <p/><ul> diff -r ba64c2178fbee9a83f79580c434ab280d8a0b738 -r 5359d1066d91849fbf075f95f4999613d17a9c45 test/functional/test_library_security.py --- a/test/functional/test_library_security.py +++ b/test/functional/test_library_security.py @@ -93,7 +93,7 @@ permissions_in = [ k for k, v in galaxy.model.Library.permitted_actions.items() ] permissions_out = [] # Role1 members are: admin_user, regular_user1, regular_user3. Each of these users will be permitted for - # LIBRARY_ACCESS, LIBRARY_ADD, LIBRARY_MODIFY, LIBRARY_MANAGE on library1 and it's contents. + # LIBRARY_ACCESS, LIBRARY_ADD, LIBRARY_MODIFY, LIBRARY_MANAGE on library1 and its contents. self.library_permissions( self.security.encode_id( library1.id ), library1.name, str( role1.id ), @@ -163,7 +163,7 @@ # Logged in as admin_user # # LIBRARY_ACCESS = Role1: admin_user, regular_user1, regular_user3. Each of these users will be permitted for - # LIBRARY_ACCESS, LIBRARY_ADD, LIBRARY_MODIFY, LIBRARY_MANAGE on this library and it's contents. + # LIBRARY_ACCESS, LIBRARY_ADD, LIBRARY_MODIFY, LIBRARY_MANAGE on this library and its contents. # # Legitimate roles displayed on the permission form are as follows: # 'Role1' since the LIBRARY_ACCESS permission is associated with Role1. # Role one members are: admin_user, regular_user1, regular_user3. @@ -239,7 +239,7 @@ # groups: group1 # users: test@bx.psu.edu, test1@bx.psu.edu via group1 # - # We first need to make library1 public, but leave it's contents permissions unchanged + # We first need to make library1 public, but leave its contents permissions unchanged self.make_library_item_public( self.security.encode_id( library1.id ), self.security.encode_id( library1.id ), item_type='library', @@ -433,7 +433,7 @@ permissions_in = [ k for k, v in galaxy.model.Library.permitted_actions.items() ] permissions_out = [] # Only admin_user will be permitted for - # LIBRARY_ACCESS, LIBRARY_ADD, LIBRARY_MODIFY, LIBRARY_MANAGE on library2 and it's contents. + # LIBRARY_ACCESS, LIBRARY_ADD, LIBRARY_MODIFY, LIBRARY_MANAGE on library2 and its contents. self.library_permissions( self.security.encode_id( library1.id ), library1.name, str( admin_user_private_role.id ), @@ -526,7 +526,7 @@ ldda8 = get_latest_ldda_by_name( filename ) assert ldda8 is not None, 'Problem retrieving LibraryDatasetDatasetAssociation ldda8 from the database' def test_090_make_library2_and_contents_public( self ): - """Testing making library2 and all of it's contents public""" + """Testing making library2 and all of its contents public""" self.make_library_item_public( self.security.encode_id( library2.id ), self.security.encode_id( library2.id ), item_type='library', Repository URL: https://bitbucket.org/galaxy/galaxy-central/ -- This is a commit notification from bitbucket.org. You are receiving this because you have the service enabled, addressing the recipient of this email.