On Wed, Sep 29, 2021 at 3:22 AM Petr Lautrbach <plautrba@xxxxxxxxxx> wrote: > > Christian Göttsche <cgzones@xxxxxxxxxxxxxx> writes: > > > Found by codespell > > > > Signed-off-by: Christian Göttsche <cgzones@xxxxxxxxxxxxxx> > > Acked-by: Petr Lautrbach <plautrba@xxxxxxxxxx> > This patch has been merged. Thanks, Jim > Thanks! > > > > > --- > > policycoreutils/newrole/Makefile | 2 +- > > policycoreutils/newrole/newrole.c | 2 +- > > python/semanage/semanage | 6 +++--- > > python/sepolgen/src/sepolgen/refpolicy.py | 2 +- > > python/sepolgen/src/sepolgen/yacc.py | 2 +- > > python/sepolicy/sepolicy/manpage.py | 2 +- > > secilc/docs/cil_access_vector_rules.md | 2 +- > > secilc/docs/secil.xml | 2 +- > > secilc/test/block_test.cil | 2 +- > > 9 files changed, 11 insertions(+), 11 deletions(-) > > > > diff --git a/policycoreutils/newrole/Makefile b/policycoreutils/newrole/Makefile > > index 0e7ebce3..4dedb7dd 100644 > > --- a/policycoreutils/newrole/Makefile > > +++ b/policycoreutils/newrole/Makefile > > @@ -12,7 +12,7 @@ AUDITH ?= $(shell test -f $(INCLUDEDIR)/libaudit.h && echo y) > > # This will make newrole a setuid root program. > > # The capabilities used are: CAP_AUDIT_WRITE. > > AUDIT_LOG_PRIV ?= n > > -# Enable capabilities to permit newrole to utilitize the pam_namespace module. > > +# Enable capabilities to permit newrole to utilize the pam_namespace module. > > # This will make newrole a setuid root program. > > # The capabilities used are: CAP_SYS_ADMIN, CAP_CHOWN, CAP_FOWNER and > > # CAP_DAC_OVERRIDE. > > diff --git a/policycoreutils/newrole/newrole.c b/policycoreutils/newrole/newrole.c > > index 7c1f062f..31b51c5a 100644 > > --- a/policycoreutils/newrole/newrole.c > > +++ b/policycoreutils/newrole/newrole.c > > @@ -1022,7 +1022,7 @@ static int set_signal_handles(void) > > int main(int argc, char *argv[]) > > { > > char *new_context = NULL; /* target security context */ > > - char *old_context = NULL; /* original securiy context */ > > + char *old_context = NULL; /* original security context */ > > char *tty_context = NULL; /* current context of tty */ > > char *new_tty_context = NULL; /* new context of tty */ > > > > diff --git a/python/semanage/semanage b/python/semanage/semanage > > index 18a27105..ff9fb66b 100644 > > --- a/python/semanage/semanage > > +++ b/python/semanage/semanage > > @@ -129,7 +129,7 @@ class SetImportFile(argparse.Action): > > sys.exit(1) > > setattr(namespace, self.dest, values) > > > > -# define dictonary for seobject OBEJCTS > > +# define dictionary for seobject OBEJCTS > > object_dict = { > > 'login': seobject.loginRecords, > > 'user': seobject.seluserRecords, > > @@ -146,7 +146,7 @@ object_dict = { > > } > > > > def generate_custom_usage(usage_text, usage_dict): > > - # generate custom usage from given text and dictonary > > + # generate custom usage from given text and dictionary > > sorted_keys = [] > > for i in usage_dict.keys(): > > sorted_keys.append(i) > > @@ -160,7 +160,7 @@ def generate_custom_usage(usage_text, usage_dict): > > > > > > def handle_opts(args, dict, target_key): > > - # handle conflict and required options for given dictonary > > + # handle conflict and required options for given dictionary > > # {action:[conflict_opts,require_opts]} > > > > # first we need to catch conflicts > > diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py > > index 74763687..3e907e91 100644 > > --- a/python/sepolgen/src/sepolgen/refpolicy.py > > +++ b/python/sepolgen/src/sepolgen/refpolicy.py > > @@ -42,7 +42,7 @@ PERMS = 3 > > ROLE = 4 > > DEST_TYPE = 5 > > > > -# String represenations of the above constants > > +# String representations of the above constants > > field_to_str = ["source", "target", "object", "permission", "role", "destination" ] > > str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS, > > "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } > > diff --git a/python/sepolgen/src/sepolgen/yacc.py b/python/sepolgen/src/sepolgen/yacc.py > > index 55c1ef7d..c1c79880 100644 > > --- a/python/sepolgen/src/sepolgen/yacc.py > > +++ b/python/sepolgen/src/sepolgen/yacc.py > > @@ -1502,7 +1502,7 @@ class Grammar(object): > > self.Precedence = {} # Precedence rules for each terminal. Contains tuples of the > > # form ('right',level) or ('nonassoc', level) or ('left',level) > > > > - self.UsedPrecedence = set() # Precedence rules that were actually used by the grammer. > > + self.UsedPrecedence = set() # Precedence rules that were actually used by the grammar. > > # This is only used to provide error checking and to generate > > # a warning about unused precedence rules. > > > > diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py > > index 2f847abb..3e61e333 100755 > > --- a/python/sepolicy/sepolicy/manpage.py > > +++ b/python/sepolicy/sepolicy/manpage.py > > @@ -797,7 +797,7 @@ SELinux %(domainname)s policy is very flexible allowing users to setup their %(d > > .B STANDARD FILE CONTEXT > > > > SELinux defines the file context types for the %(domainname)s, if you wanted to > > -store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk. > > +store files with these types in a diffent paths, you need to execute the semanage command to specify alternate labeling and then use restorecon to put the labels on disk. > > > > .B semanage fcontext -a -t %(type)s '/srv/%(domainname)s/content(/.*)?' > > .br > > diff --git a/secilc/docs/cil_access_vector_rules.md b/secilc/docs/cil_access_vector_rules.md > > index fa68609e..f0ba4a90 100644 > > --- a/secilc/docs/cil_access_vector_rules.md > > +++ b/secilc/docs/cil_access_vector_rules.md > > @@ -360,7 +360,7 @@ dontauditx > > > > Do not audit the access rights defined when access denied. This stops excessive log entries for known events. > > > > -Note that for this to work there must *also* be atleast one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type. > > +Note that for this to work there must *also* be at least one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type. > > > > Note that these rules can be omitted by the CIL compiler command line parameter `-D` or `--disable-dontaudit` flags. > > > > diff --git a/secilc/docs/secil.xml b/secilc/docs/secil.xml > > index daa80ded..b015490d 100644 > > --- a/secilc/docs/secil.xml > > +++ b/secilc/docs/secil.xml > > @@ -208,7 +208,7 @@ > > <context name="String" attribute="String" lineEndContext="#stay"> > > <RegExpr attribute="Char" context="#stay" String="#\\."/> > > > > - <!-- allow escaping " or similiar --> > > + <!-- allow escaping " or similar --> > > <HlCStringChar attribute="String Char" context="#stay"/> > > > > <DetectChar attribute="String" context="#pop" char="""/> > > diff --git a/secilc/test/block_test.cil b/secilc/test/block_test.cil > > index 2dfcb899..2dd30c23 100644 > > --- a/secilc/test/block_test.cil > > +++ b/secilc/test/block_test.cil > > @@ -84,7 +84,7 @@ > > ) > > > > > > -;; Inherting the abstract block causes the allow rule to be in the policy > > +;; Inheriting the abstract block causes the allow rule to be in the policy > > (type t5) > > (block b5 > > (blockabstract b5) > > -- > > 2.33.0 >