Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/freeipa/ipa-4-8/fr/changes/?format=api&page=7
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 940,
    "next": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/changes/?format=api&page=8",
    "previous": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/changes/?format=api&page=6",
    "results": [
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709813/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:19.048949Z",
            "action": 30,
            "target": "Next Domain Name",
            "old": "Domain name",
            "details": {},
            "id": 1161527,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161527/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709811/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:19.014818Z",
            "action": 30,
            "target": "NSEC Next Domain Name",
            "old": "NIS domain name",
            "details": {},
            "id": 1161526,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161526/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709799/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.812430Z",
            "action": 30,
            "target": "Public Key",
            "old": "Public key",
            "details": {},
            "id": 1161524,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161524/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709797/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.774443Z",
            "action": 30,
            "target": "KEY Public Key",
            "old": "Public key",
            "details": {},
            "id": 1161523,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161523/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709796/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.749612Z",
            "action": 30,
            "target": "KEY Algorithm",
            "old": "Algorithm",
            "details": {},
            "id": 1161521,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161521/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709793/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.702976Z",
            "action": 30,
            "target": "KEY Protocol",
            "old": "KEY record",
            "details": {},
            "id": 1161520,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161520/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709791/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.676041Z",
            "action": 30,
            "target": "KEY Flags",
            "old": "Flags",
            "details": {},
            "id": 1161519,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161519/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709767/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.273850Z",
            "action": 30,
            "target": "A list of global forwarders. A custom port can be specified for each forwarder using a standard format \"IP_ADDRESS port PORT\"",
            "old": "Global forwarders. A custom port can be specified for each forwarder using a standard format \"IP_ADDRESS port PORT\"",
            "details": {},
            "id": 1161518,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161518/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709764/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.222651Z",
            "action": 30,
            "target": "Comma-separated list of permissions to grant (read, write). Default is write.",
            "old": "Permissions to grant (read, write). Default is write.",
            "details": {},
            "id": 1161517,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161517/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709762/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.201421Z",
            "action": 30,
            "target": "\nGroup to Group Delegation\n\nA permission enables fine-grained delegation of permissions. Access Control\nRules, or instructions (ACIs), grant permission to permissions to perform\ngiven tasks such as adding a user, modifying a group, etc.\n\nGroup to Group Delegations grants the members of one group to update a set\nof attributes of members of another group.\n\nEXAMPLES:\n\n Add a delegation rule to allow managers to edit employee's addresses:\n   ipa delegation-add --attrs=street --group=managers --membergroup=employees \"managers edit employees' street\"\n\n When managing the list of attributes you need to include all attributes\n in the list, including existing ones. Add postalCode to the list:\n   ipa delegation-mod --attrs=street,postalCode --group=managers --membergroup=employees \"managers edit employees' street\"\n\n Display our updated rule:\n   ipa delegation-show \"managers edit employees' street\"\n\n Delete a rule:\n   ipa delegation-del \"managers edit employees' street\"\n",
            "old": "\nGroup to Group Delegation\n\nA permission enables fine-grained delegation of permissions. Access Control\nRules, or instructions (ACIs), grant permission to permissions to perform\ngiven tasks such as adding a user, modifying a group, etc.\n\nGroup to Group Delegations grants the members of one group to update a set\nof attributes of members of another group.\n\nEXAMPLES:\n\n Add a delegation rule to allow managers to edit employee's addresses:\n   ipa delegation-add --attrs=street --group=managers --membergroup=employees \"managers edit employees' street\"\n\n When managing the list of attributes you need to include all attributes\n in the list, including existing ones. Add postalCode to the list:\n   ipa delegation-mod --attrs=street --attrs=postalCode --group=managers --membergroup=employees \"managers edit employees' street\"\n\n Display our updated rule:\n   ipa delegation-show \"managers edit employees' street\"\n\n Delete a rule:\n   ipa delegation-del \"managers edit employees' street\"\n",
            "details": {},
            "id": 1161516,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161516/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709760/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.155422Z",
            "action": 30,
            "target": "\nIPA certificate operations\n\nImplements a set of commands for managing server SSL certificates.\n\nCertificate requests exist in the form of a Certificate Signing Request (CSR)\nin PEM format.\n\nIf using the selfsign back end then the subject in the CSR needs to match\nthe subject configured in the server. The dogtag CA uses just the CN\nvalue of the CSR and forces the rest of the subject.\n\nA certificate is stored with a service principal and a service principal\nneeds a host.\n\nIn order to request a certificate:\n\n* The host must exist\n* The service must exist (or you use the --add option to automatically add it)\n\nEXAMPLES:\n\n Request a new certificate and add the principal:\n   ipa cert-request --add --principal=HTTP/lion.example.com example.csr\n\n Retrieve an existing certificate:\n   ipa cert-show 1032\n\n Revoke a certificate (see RFC 5280 for reason details):\n   ipa cert-revoke --revocation-reason=6 1032\n\n Remove a certificate from revocation hold status:\n   ipa cert-remove-hold 1032\n\n Check the status of a signing request:\n   ipa cert-status 10\n\nIPA currently immediately issues (or declines) all certificate requests so\nthe status of a request is not normally useful. This is for future use\nor the case where a CA does not immediately issue a certificate.\n\nThe following revocation reasons are supported:\n\n    * 0 - unspecified\n    * 1 - keyCompromise\n    * 2 - cACompromise\n    * 3 - affiliationChanged\n    * 4 - superseded\n    * 5 - cessationOfOperation\n    * 6 - certificateHold\n    * 8 - removeFromCRL\n    * 9 - privilegeWithdrawn\n    * 10 - aACompromise\n\nNote that reason code 7 is not used.  See RFC 5280 for more details:\n\nhttp://www.ietf.org/rfc/rfc5280.txt\n",
            "old": "\nIPA certificate operations\n\nImplements a set of commands for managing server SSL certificates.\n\nCertificate requests exist in the form of a Certificate Signing Request (CSR)\nin PEM format.\n\nThe dogtag CA uses just the CN value of the CSR and forces the rest of the\nsubject to values configured in the server.\n\nA certificate is stored with a service principal and a service principal\nneeds a host.\n\nIn order to request a certificate:\n\n* The host must exist\n* The service must exist (or you use the --add option to automatically add it)\n\nSEARCHING:\n\nCertificates may be searched on by certificate subject, serial number,\nrevocation reason, validity dates and the issued date.\n\nWhen searching on dates the _from date does a >= search and the _to date\ndoes a <= search. When combined these are done as an AND.\n\nDates are treated as GMT to match the dates in the certificates.\n\nThe date format is YYYY-mm-dd.\n\nEXAMPLES:\n\n Request a new certificate and add the principal:\n   ipa cert-request --add --principal=HTTP/lion.example.com example.csr\n\n Retrieve an existing certificate:\n   ipa cert-show 1032\n\n Revoke a certificate (see RFC 5280 for reason details):\n   ipa cert-revoke --revocation-reason=6 1032\n\n Remove a certificate from revocation hold status:\n   ipa cert-remove-hold 1032\n\n Check the status of a signing request:\n   ipa cert-status 10\n\n Search for certificates by hostname:\n   ipa cert-find --subject=ipaserver.example.com\n\n Search for revoked certificates by reason:\n   ipa cert-find --revocation-reason=5\n\n Search for certificates based on issuance date\n   ipa cert-find --issuedon-from=2013-02-01 --issuedon-to=2013-02-07\n\nIPA currently immediately issues (or declines) all certificate requests so\nthe status of a request is not normally useful. This is for future use\nor the case where a CA does not immediately issue a certificate.\n\nThe following revocation reasons are supported:\n\n    * 0 - unspecified\n    * 1 - keyCompromise\n    * 2 - cACompromise\n    * 3 - affiliationChanged\n    * 4 - superseded\n    * 5 - cessationOfOperation\n    * 6 - certificateHold\n    * 8 - removeFromCRL\n    * 9 - privilegeWithdrawn\n    * 10 - aACompromise\n\nNote that reason code 7 is not used.  See RFC 5280 for more details:\n\nhttp://www.ietf.org/rfc/rfc5280.txt\n",
            "details": {},
            "id": 1161515,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161515/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709755/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:18.062453Z",
            "action": 30,
            "target": "comma-separated list of permissions to grant(read, write, add, delete, all)",
            "old": "Permissions to grant(read, write, add, delete, all)",
            "details": {},
            "id": 1161514,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161514/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709750/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.980703Z",
            "action": 30,
            "target": "Search for servers without these managed suffixes.",
            "old": "Search for netgroups without these member users.",
            "details": {},
            "id": 1161513,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161513/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709748/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.954480Z",
            "action": 30,
            "target": "Search for servers with these managed suffixes.",
            "old": "Search for netgroups with these member users.",
            "details": {},
            "id": 1161512,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161512/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709746/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.926453Z",
            "action": 30,
            "target": "\nSimulate use of Host-based access controls\n\nHBAC rules control who can access what services on what hosts.\nYou can use HBAC to control which users or groups can access a service,\nor group of services, on a target host.\n\nSince applying HBAC rules implies use of a production environment,\nthis plugin aims to provide simulation of HBAC rules evaluation without\nhaving access to the production environment.\n\n Test user coming to a service on a named host against\n existing enabled rules.\n\n ipa hbactest --user= --host= --service=\n              [--rules=rules-list] [--nodetail] [--enabled] [--disabled]\n              [--sizelimit= ]\n\n --user, --host, and --service are mandatory, others are optional.\n\n If --rules is specified simulate enabling of the specified rules and test\n the login of the user using only these rules.\n\n If --enabled is specified, all enabled HBAC rules will be added to simulation\n\n If --disabled is specified, all disabled HBAC rules will be added to simulation\n\n If --nodetail is specified, do not return information about rules matched/not matched.\n\n If both --rules and --enabled are specified, apply simulation to --rules _and_\n all IPA enabled rules.\n\n If no --rules specified, simulation is run against all IPA enabled rules.\n By default there is a IPA-wide limit to number of entries fetched, you can change it\n with --sizelimit option.\n\nEXAMPLES:\n\n    1. Use all enabled HBAC rules in IPA database to simulate:\n    $ ipa  hbactest --user=a1a --host=bar --service=sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Matched rules: allow_all\n\n    2. Disable detailed summary of how rules were applied:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --nodetail\n    --------------------\n    Access granted: True\n    --------------------\n\n    3. Test explicitly specified HBAC rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --rules=myrule --rules=my-second-rule\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: my-second-rule\n      Not matched rules: myrule\n\n    4. Use all enabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --rules=myrule --rules=my-second-rule --enabled\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Matched rules: allow_all\n\n    5. Test all disabled HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: new-rule\n\n    6. Test all disabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --rules=myrule --rules=my-second-rule --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n\n    7. Test all (enabled and disabled) HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd           --enabled --disabled\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Not matched rules: new-rule\n      Matched rules: allow_all\n\n\nHBACTEST AND TRUSTED DOMAINS\n\nWhen an external trusted domain is configured in IPA, HBAC rules are also applied\non users accessing IPA resources from the trusted domain. Trusted domain users and\ngroups (and their SIDs) can be then assigned to external groups which can be\nmembers of POSIX groups in IPA which can be used in HBAC rules and thus allowing\naccess to resources protected by the HBAC system.\n\nhbactest plugin is capable of testing access for both local IPA users and users\nfrom the trusted domains, either by a fully qualified user name or by user SID.\nSuch user names need to have a trusted domain specified as a short name\n(DOMAIN\\Administrator) or with a user principal name (UPN), Administrator@ad.test.\n\nPlease note that hbactest executed with a trusted domain user as --user parameter\ncan be only run by members of \"trust admins\" group.\n\nEXAMPLES:\n\n    1. Test if a user from a trusted domain specified by its shortname matches any\n       rule:\n\n    $ ipa hbactest --user 'DOMAIN\\Administrator' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    2. Test if a user from a trusted domain specified by its domain name matches\n       any rule:\n\n    $ ipa hbactest --user 'Administrator@domain.com' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    3. Test if a user from a trusted domain specified by its SID matches any rule:\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-500             --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    4. Test if other user from a trusted domain specified by its SID matches any rule:\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-1203             --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n\n   5. Test if other user from a trusted domain specified by its shortname matches\n       any rule:\n\n    $ ipa hbactest --user 'DOMAIN\\Otheruser' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n",
            "old": "\nSimulate use of Host-based access controls\n\nHBAC rules control who can access what services on what hosts.\nYou can use HBAC to control which users or groups can access a service,\nor group of services, on a target host.\n\nSince applying HBAC rules implies use of a production environment,\nthis plugin aims to provide simulation of HBAC rules evaluation without\nhaving access to the production environment.\n\n Test user coming to a service on a named host against\n existing enabled rules.\n\n ipa hbactest --user= --host= --service=\n              [--rules=rules-list] [--nodetail] [--enabled] [--disabled]\n              [--sizelimit= ]\n\n --user, --host, and --service are mandatory, others are optional.\n\n If --rules is specified simulate enabling of the specified rules and test\n the login of the user using only these rules.\n\n If --enabled is specified, all enabled HBAC rules will be added to simulation\n\n If --disabled is specified, all disabled HBAC rules will be added to simulation\n\n If --nodetail is specified, do not return information about rules matched/not matched.\n\n If both --rules and --enabled are specified, apply simulation to --rules _and_\n all IPA enabled rules.\n\n If no --rules specified, simulation is run against all IPA enabled rules.\n By default there is a IPA-wide limit to number of entries fetched, you can change it\n with --sizelimit option.\n\nEXAMPLES:\n\n    1. Use all enabled HBAC rules in IPA database to simulate:\n    $ ipa  hbactest --user=a1a --host=bar --service=sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Matched rules: allow_all\n\n    2. Disable detailed summary of how rules were applied:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --nodetail\n    --------------------\n    Access granted: True\n    --------------------\n\n    3. Test explicitly specified HBAC rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd \\\n          --rules=myrule --rules=my-second-rule\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: my-second-rule\n      Not matched rules: myrule\n\n    4. Use all enabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd \\\n          --rules=myrule --rules=my-second-rule --enabled\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Matched rules: allow_all\n\n    5. Test all disabled HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: new-rule\n\n    6. Test all disabled HBAC rules in IPA database + explicitly specified rules:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd \\\n          --rules=myrule --rules=my-second-rule --disabled\n    ---------------------\n    Access granted: False\n    ---------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n\n    7. Test all (enabled and disabled) HBAC rules in IPA database:\n    $ ipa hbactest --user=a1a --host=bar --service=sshd \\\n          --enabled --disabled\n    --------------------\n    Access granted: True\n    --------------------\n      Not matched rules: my-second-rule\n      Not matched rules: my-third-rule\n      Not matched rules: myrule\n      Not matched rules: new-rule\n      Matched rules: allow_all\n\n\nHBACTEST AND TRUSTED DOMAINS\n\nWhen an external trusted domain is configured in IPA, HBAC rules are also applied\non users accessing IPA resources from the trusted domain. Trusted domain users and\ngroups (and their SIDs) can be then assigned to external groups which can be\nmembers of POSIX groups in IPA which can be used in HBAC rules and thus allowing\naccess to resources protected by the HBAC system.\n\nhbactest plugin is capable of testing access for both local IPA users and users\nfrom the trusted domains, either by a fully qualified user name or by user SID.\nSuch user names need to have a trusted domain specified as a short name\n(DOMAIN\\Administrator) or with a user principal name (UPN), Administrator@ad.test.\n\nPlease note that hbactest executed with a trusted domain user as --user parameter\ncan be only run by members of \"trust admins\" group.\n\nEXAMPLES:\n\n    1. Test if a user from a trusted domain specified by its shortname matches any\n       rule:\n\n    $ ipa hbactest --user 'DOMAIN\\Administrator' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    2. Test if a user from a trusted domain specified by its domain name matches\n       any rule:\n\n    $ ipa hbactest --user 'Administrator@domain.com' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    3. Test if a user from a trusted domain specified by its SID matches any rule:\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-500 \\\n            --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Matched rules: can_login\n\n    4. Test if other user from a trusted domain specified by its SID matches any rule:\n\n    $ ipa hbactest --user S-1-5-21-3035198329-144811719-1378114514-1203 \\\n            --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n\n   5. Test if other user from a trusted domain specified by its shortname matches\n       any rule:\n\n    $ ipa hbactest --user 'DOMAIN\\Otheruser' --host `hostname` --service sshd\n    --------------------\n    Access granted: True\n    --------------------\n      Matched rules: allow_all\n      Not matched rules: can_login\n",
            "details": {},
            "id": 1161511,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161511/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709743/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.824768Z",
            "action": 30,
            "target": "\nModify ID range.\n\n=======\nWARNING:\n\nDNA plugin in 389-ds will allocate IDs based on the ranges configured for the\nlocal domain. Currently the DNA plugin *cannot* be reconfigured itself based\non the local ranges set via this family of commands.\n\nManual configuration change has to be done in the DNA plugin configuration for\nthe new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\nIDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\nmodified to match the new range.\n=======\n    ",
            "old": "\nAdd new ID range.\n\n    To add a new ID range you always have to specify\n\n        --base-id\n        --range-size\n\n    Additionally\n\n        --rid-base\n        --secondary-rid-base\n\n    may be given for a new ID range for the local domain while\n\n        --rid-base\n        --dom-sid\n\n    must be given to add a new range for a trusted AD domain.\n\n    WARNING:\n\n    DNA plugin in 389-ds will allocate IDs based on the ranges configured for the\n    local domain. Currently the DNA plugin *cannot* be reconfigured itself based\n    on the local ranges set via this family of commands.\n\n    Manual configuration change has to be done in the DNA plugin configuration for\n    the new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\n    IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\n    modified to match the new range.\n    ",
            "details": {},
            "id": 1161510,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161510/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709742/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.778254Z",
            "action": 30,
            "target": "\nAdd new ID range.\n\n    To add a new ID range you always have to specify\n\n        --base-id\n        --range-size\n\n    Additionally\n\n        --rid-base\n        --secondary-rid-base\n\n    may be given for a new ID range for the local domain while\n\n        --rid-base\n        --dom-sid\n\n    must be given to add a new range for a trusted AD domain.\n\n=======\nWARNING:\n\nDNA plugin in 389-ds will allocate IDs based on the ranges configured for the\nlocal domain. Currently the DNA plugin *cannot* be reconfigured itself based\non the local ranges set via this family of commands.\n\nManual configuration change has to be done in the DNA plugin configuration for\nthe new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\nIDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\nmodified to match the new range.\n=======\n    ",
            "old": "\nAdd new ID range.\n\n    To add a new ID range you always have to specify\n\n        --base-id\n        --range-size\n\n    Additionally\n\n        --rid-base\n        --secondary-rid-base\n\n    may be given for a new ID range for the local domain while\n\n        --rid-base\n        --dom-sid\n\n    must be given to add a new range for a trusted AD domain.\n\n    WARNING:\n\n    DNA plugin in 389-ds will allocate IDs based on the ranges configured for the\n    local domain. Currently the DNA plugin *cannot* be reconfigured itself based\n    on the local ranges set via this family of commands.\n\n    Manual configuration change has to be done in the DNA plugin configuration for\n    the new local range. Specifically, The dnaNextRange attribute of 'cn=Posix\n    IDs,cn=Distributed Numeric Assignment Plugin,cn=plugins,cn=config' has to be\n    modified to match the new range.\n    ",
            "details": {},
            "id": 1161508,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161508/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709738/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.708415Z",
            "action": 30,
            "target": "owner service",
            "old": "Owner services",
            "details": {},
            "id": 1161507,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161507/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709737/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.688208Z",
            "action": 30,
            "target": "owner group",
            "old": "Owner groups",
            "details": {},
            "id": 1161506,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161506/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709735/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.669379Z",
            "action": 30,
            "target": "owner user",
            "old": "Owner users",
            "details": {},
            "id": 1161505,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161505/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709732/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.601205Z",
            "action": 30,
            "target": "\nVerify replication topology for suffix.\n\nChecks done:\n  1. check if a topology is not disconnected. In other words if there are\n     replication paths between all servers.\n  2. check if servers don't have more than the recommended number of\n     replication agreements\n    ",
            "old": "\nVerify replication topology for suffix.\n\nChecks done:\n  1. check if a topology is not disconnected. In other words if there are\n     replication paths between all servers.\n  2. check if servers don't have more than the recommended number of\n     replication agreements\n",
            "details": {},
            "id": 1161504,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161504/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709730/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.539452Z",
            "action": 30,
            "target": "Attributes to replicate",
            "old": "Attributes to strip",
            "details": {},
            "id": 1161503,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161503/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709728/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.515165Z",
            "action": 30,
            "target": "Rename the stage user object",
            "old": "Rename the group object",
            "details": {},
            "id": 1161502,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161502/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709727/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.496602Z",
            "action": 30,
            "target": "Search for stage users without these member of sudo rules.",
            "old": "Search for hosts without these member of sudo rules.",
            "details": {},
            "id": 1161500,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161500/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709725/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.473591Z",
            "action": 30,
            "target": "Search for stage users with these member of sudo rules.",
            "old": "Search for hosts without these member of sudo rules.",
            "details": {},
            "id": 1161499,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161499/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709724/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.448594Z",
            "action": 30,
            "target": "Search for stage users without these member of HBAC rules.",
            "old": "Search for hosts with these member of HBAC rules.",
            "details": {},
            "id": 1161498,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161498/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709722/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.423813Z",
            "action": 30,
            "target": "Search for stage users with these member of HBAC rules.",
            "old": "Search for hosts with these member of HBAC rules.",
            "details": {},
            "id": 1161497,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161497/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709720/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.396171Z",
            "action": 30,
            "target": "Search for stage users without these member of roles.",
            "old": "Search for hosts without these member of roles.",
            "details": {},
            "id": 1161496,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161496/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709718/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.370835Z",
            "action": 30,
            "target": "Search for stage users with these member of roles.",
            "old": "Search for hosts without these member of roles.",
            "details": {},
            "id": 1161495,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161495/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709716/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.346335Z",
            "action": 30,
            "target": "Search for stage users without these member of netgroups.",
            "old": "Search for netgroups without these member of netgroups.",
            "details": {},
            "id": 1161494,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161494/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709715/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.320978Z",
            "action": 30,
            "target": "Search for stage users with these member of netgroups.",
            "old": "Search for netgroups with these member of netgroups.",
            "details": {},
            "id": 1161493,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161493/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709713/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.298008Z",
            "action": 30,
            "target": "Search for stage users without these member of groups.",
            "old": "Search for netgroups without these member of netgroups.",
            "details": {},
            "id": 1161492,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161492/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709711/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.277239Z",
            "action": 30,
            "target": "Search for stage users with these member of groups.",
            "old": "Search for netgroups with these member of netgroups.",
            "details": {},
            "id": 1161491,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161491/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709709/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.251351Z",
            "action": 30,
            "target": "\nStageusers\n\nManage stage user entries.\n\nStage user entries are directly under the container: \"cn=stage users,\ncn=accounts, cn=provisioning, SUFFIX\".\nUser can not authenticate with those entries (even if the entries\ncontain credentials) and are candidate to become Active entries.\n\nActive user entries are Posix users directly under the container: \"cn=accounts, SUFFIX\".\nUser can authenticate with Active entries, at the condition they have\ncredentials\n\nDelete user entries are Posix users directly under the container: \"cn=deleted users,\ncn=accounts, cn=provisioning, SUFFIX\".\nUser can not authenticate with those entries (even if the entries contain credentials)\n\nThe stage user container contains entries\n    - created by 'stageuser-add' commands that are Posix users\n    - created by external provisioning system\n\nA valid stage user entry MUST:\n    - entry RDN is 'uid'\n    - ipaUniqueID is 'autogenerate'\n\nIPA supports a wide range of username formats, but you need to be aware of any\nrestrictions that may apply to your particular environment. For example,\nusernames that start with a digit or usernames that exceed a certain length\nmay cause problems for some UNIX systems.\nUse 'ipa config-mod' to change the username format allowed by IPA tools.\n\n\nEXAMPLES:\n\n Add a new stageuser:\n   ipa stageuser-add --first=Tim --last=User --password tuser1\n\n Add a stageuser from the Delete container\n   ipa stageuser-add  --first=Tim --last=User --from-delete tuser1\n",
            "old": "\nStageusers\n\nManage stage user entries.\n\nStage user entries are directly under the container: \"cn=stage users,\ncn=accounts, cn=provisioning, SUFFIX\".\nUsers can not authenticate with those entries (even if the entries\ncontain credentials). Those entries are only candidate to become Active entries.\n\nActive user entries are Posix users directly under the container: \"cn=accounts, SUFFIX\".\nUsers can authenticate with Active entries, at the condition they have\ncredentials.\n\nDeleted user entries are Posix users directly under the container: \"cn=deleted users,\ncn=accounts, cn=provisioning, SUFFIX\".\nUsers can not authenticate with those entries, even if the entries contain credentials.\n\nThe stage user container contains entries:\n    - created by 'stageuser-add' commands that are Posix users,\n    - created by external provisioning system.\n\nA valid stage user entry MUST have:\n    - entry RDN is 'uid',\n    - ipaUniqueID is 'autogenerate'.\n\nIPA supports a wide range of username formats, but you need to be aware of any\nrestrictions that may apply to your particular environment. For example,\nusernames that start with a digit or usernames that exceed a certain length\nmay cause problems for some UNIX systems.\nUse 'ipa config-mod' to change the username format allowed by IPA tools.\n\n\nEXAMPLES:\n\n Add a new stageuser:\n   ipa stageuser-add --first=Tim --last=User --password tuser1\n\n Add a stageuser from the deleted users container:\n   ipa stageuser-add  --first=Tim --last=User --from-delete tuser1\n\n",
            "details": {},
            "id": 1161490,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161490/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709708/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.204895Z",
            "action": 30,
            "target": "service delegation targets to remove",
            "old": "service delegation targets",
            "details": {},
            "id": 1161489,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161489/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709706/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.176170Z",
            "action": 30,
            "target": "principal to remove",
            "old": "roles to remove",
            "details": {},
            "id": 1161488,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161488/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709704/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.145186Z",
            "action": 30,
            "target": "Results should contain primary key attribute only (\"delegation-name\")",
            "old": "Results should contain primary key attribute only (\"group-name\")",
            "details": {},
            "id": 1161487,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161487/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709702/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.110603Z",
            "action": 30,
            "target": "service delegation targets to add",
            "old": "service delegation targets",
            "details": {},
            "id": 1161486,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161486/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709701/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.061011Z",
            "action": 30,
            "target": "member service delegation target",
            "old": "service delegation target",
            "details": {},
            "id": 1161485,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161485/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709699/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:17.035204Z",
            "action": 30,
            "target": "principal to add",
            "old": "principal not found\n",
            "details": {},
            "id": 1161484,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161484/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709697/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.984111Z",
            "action": 30,
            "target": "member principal",
            "old": "Member principals",
            "details": {},
            "id": 1161483,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161483/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709693/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.891314Z",
            "action": 30,
            "target": "\nManage Certificate Profiles\n\nCertificate Profiles are used by Certificate Authority (CA) in the signing of\ncertificates to determine if a Certificate Signing Request (CSR) is acceptable,\nand if so what features and extensions will be present on the certificate.\n\nThe Certificate Profile format is the property-list format understood by the\nDogtag or Red Hat Certificate System CA.\n\nPROFILE ID SYNTAX:\n\nA Profile ID is a string without spaces or punctuation starting with a letter\nand followed by a sequence of letters, digits or underscore (\"_\").\n\nEXAMPLES:\n\n  Import a profile that will not store issued certificates:\n    ipa certprofile-import ShortLivedUserCert       --file UserCert.profile --desc \"User Certificates\"       --store=false\n\n  Delete a certificate profile:\n    ipa certprofile-del ShortLivedUserCert\n\n  Show information about a profile:\n    ipa certprofile-show ShortLivedUserCert\n\n  Save profile configuration to a file:\n    ipa certprofile-show caIPAserviceCert --out caIPAserviceCert.cfg\n\n  Search for profiles that do not store certificates:\n    ipa certprofile-find --store=false\n\nPROFILE CONFIGURATION FORMAT:\n\nThe profile configuration format is the raw property-list format\nused by Dogtag Certificate System.  The XML format is not supported.\n\nThe following restrictions apply to profiles managed by FreeIPA:\n\n- When importing a profile the \"profileId\" field, if present, must\n  match the ID given on the command line.\n\n- The \"classId\" field must be set to \"caEnrollImpl\"\n\n- The \"auth.instance_id\" field must be set to \"raCertAuth\"\n\n- The \"certReqInputImpl\" input class and \"certOutputImpl\" output\n  class must be used.\n",
            "old": "\nManage Certificate Profiles\n\nCertificate Profiles are used by Certificate Authority (CA) in the signing of\ncertificates to determine if a Certificate Signing Request (CSR) is acceptable,\nand if so what features and extensions will be present on the certificate.\n\nThe Certificate Profile format is the property-list format understood by the\nDogtag or Red Hat Certificate System CA.\n\nPROFILE ID SYNTAX:\n\nA Profile ID is a string without spaces or punctuation starting with a letter\nand followed by a sequence of letters, digits or underscore (\"_\").\n\nEXAMPLES:\n\n  Import a profile that will not store issued certificates:\n    ipa certprofile-import ShortLivedUserCert \\\n      --file UserCert.profile --desc \"User Certificates\" \\\n      --store=false\n\n  Delete a certificate profile:\n    ipa certprofile-del ShortLivedUserCert\n\n  Show information about a profile:\n    ipa certprofile-show ShortLivedUserCert\n\n  Save profile configuration to a file:\n    ipa certprofile-show caIPAserviceCert --out caIPAserviceCert.cfg\n\n  Search for profiles that do not store certificates:\n    ipa certprofile-find --store=false\n\nPROFILE CONFIGURATION FORMAT:\n\nThe profile configuration format is the raw property-list format\nused by Dogtag Certificate System.  The XML format is not supported.\n\nThe following restrictions apply to profiles managed by FreeIPA:\n\n- When importing a profile the \"profileId\" field, if present, must\n  match the ID given on the command line.\n\n- The \"classId\" field must be set to \"caEnrollImpl\"\n\n- The \"auth.instance_id\" field must be set to \"raCertAuth\"\n\n- The \"certReqInputImpl\" input class and \"certOutputImpl\" output\n  class must be used.\n\n",
            "details": {},
            "id": 1161481,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161481/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709691/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.836362Z",
            "action": 30,
            "target": "Certificate Profiles to remove",
            "old": "Certificate Profile to use",
            "details": {},
            "id": 1161480,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161480/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709689/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.804576Z",
            "action": 30,
            "target": "Certificate Profiles to add",
            "old": "Certificate Profile to use",
            "details": {},
            "id": 1161479,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161479/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709687/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.779753Z",
            "action": 30,
            "target": "member Certificate Profile",
            "old": "Certificate Profile",
            "details": {},
            "id": 1161478,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161478/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709683/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.704563Z",
            "action": 30,
            "target": "Results should contain primary key attribute only (\"domain\")",
            "old": "Results should contain primary key attribute only (\"command\")",
            "details": {},
            "id": 1161477,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161477/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709681/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.682280Z",
            "action": 30,
            "target": "\nModify a trust (for future use).\n\n    Currently only the default option to modify the LDAP attributes is\n    available. More specific options will be added in coming releases.\n    ",
            "old": "\n    Modify a trust (for future use).\n\n    Currently only the default option to modify the LDAP attributes is\n    available. More specific options will be added in coming releases.\n    ",
            "details": {},
            "id": 1161476,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161476/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709679/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.637796Z",
            "action": 30,
            "target": "Results should contain primary key attribute only (\"realm\")",
            "old": "Results should contain primary key attribute only (\"name\")",
            "details": {},
            "id": 1161475,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161475/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709678/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.616914Z",
            "action": 30,
            "target": "Type of trusted domain ID range, one of ipa-ad-trust-posix, ipa-ad-trust",
            "old": "ID range type, one of ipa-ad-trust-posix, ipa-ad-trust, ipa-local",
            "details": {},
            "id": 1161474,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161474/?format=api"
        },
        {
            "unit": "https://translate.fedoraproject.org/api/units/4709675/?format=api",
            "component": "https://translate.fedoraproject.org/api/components/freeipa/ipa-4-8/?format=api",
            "translation": "https://translate.fedoraproject.org/api/translations/freeipa/ipa-4-8/fr/?format=api",
            "user": null,
            "author": null,
            "timestamp": "2020-08-04T08:20:16.523419Z",
            "action": 30,
            "target": "Search for groups without these member of sudo rules.",
            "old": "Search for hosts without these member of sudo rules.",
            "details": {},
            "id": 1161473,
            "action_name": "Source string changed",
            "url": "https://translate.fedoraproject.org/api/changes/1161473/?format=api"
        }
    ]
}