Found by typos[1]. [1]: https://github.com/crate-ci/typos Signed-off-by: Christian Göttsche <cgzones@xxxxxxxxxxxxxx> --- libsemanage/src/genhomedircon.c | 2 +- libsemanage/src/handle.h | 2 +- libsemanage/src/semanage_store.c | 2 +- libsemanage/tests/test_iface.c | 2 +- policycoreutils/newrole/newrole.pamd | 2 +- policycoreutils/run_init/run_init.pamd | 2 +- python/sepolgen/src/sepolgen/objectmodel.py | 2 +- python/sepolgen/src/sepolgen/refpolicy.py | 2 +- python/sepolgen/tests/test_audit.py | 2 +- python/sepolgen/tests/test_refpolicy.py | 2 +- python/sepolicy/sepolicy-bash-completion.sh | 6 +++--- python/sepolicy/sepolicy/gui.py | 4 ++-- 12 files changed, 15 insertions(+), 15 deletions(-) diff --git a/libsemanage/src/genhomedircon.c b/libsemanage/src/genhomedircon.c index 7ca9afc3..8f8774d3 100644 --- a/libsemanage/src/genhomedircon.c +++ b/libsemanage/src/genhomedircon.c @@ -490,7 +490,7 @@ static int STR_COMPARATOR(const void *a, const void *b) return strcmp((const char *) a, (const char *) b); } -/* make_tempate +/* make_template * @param s the settings holding the paths to various files * @param pred function pointer to function to use as filter for slurp * file filter diff --git a/libsemanage/src/handle.h b/libsemanage/src/handle.h index 4d2aae8f..c7f4e903 100644 --- a/libsemanage/src/handle.h +++ b/libsemanage/src/handle.h @@ -72,7 +72,7 @@ struct semanage_handle { int do_check_contexts; /* whether to run setfiles check the file contexts file */ /* This timeout is used for transactions and waiting for lock - -1 means wait indefinetely + -1 means wait indefinitely 0 means return immediately >0 means wait that many seconds */ int timeout; diff --git a/libsemanage/src/semanage_store.c b/libsemanage/src/semanage_store.c index c6d2c5e7..14a0957a 100644 --- a/libsemanage/src/semanage_store.c +++ b/libsemanage/src/semanage_store.c @@ -1327,7 +1327,7 @@ static char **split_args(const char *arg0, char *arg_string, goto cleanup; s = arg_string; /* parse the argument string one character at a time, - * repsecting quotes and other special characters */ + * respecting quotes and other special characters */ while (s != NULL && *s != '\0') { switch (*s) { case '\\':{ diff --git a/libsemanage/tests/test_iface.c b/libsemanage/tests/test_iface.c index 434372f8..46937e10 100644 --- a/libsemanage/tests/test_iface.c +++ b/libsemanage/tests/test_iface.c @@ -47,7 +47,7 @@ void test_iface_get_set_msgcon(void); void test_iface_create(void); void test_iface_clone(void); -/* iterfaces_policy.h */ +/* interfaces_policy.h */ void test_iface_query(void); void test_iface_exists(void); void test_iface_count(void); diff --git a/policycoreutils/newrole/newrole.pamd b/policycoreutils/newrole/newrole.pamd index de3582f3..683c5441 100644 --- a/policycoreutils/newrole/newrole.pamd +++ b/policycoreutils/newrole/newrole.pamd @@ -1,5 +1,5 @@ #%PAM-1.0 -# Uncomment the next line if you do not want to enter your passwd everytime +# Uncomment the next line if you do not want to enter your passwd every time # auth sufficient pam_rootok.so auth include system-auth account include system-auth diff --git a/policycoreutils/run_init/run_init.pamd b/policycoreutils/run_init/run_init.pamd index 1c323d20..ef460134 100644 --- a/policycoreutils/run_init/run_init.pamd +++ b/policycoreutils/run_init/run_init.pamd @@ -1,5 +1,5 @@ #%PAM-1.0 -# Uncomment the next line if you do not want to enter your passwd everytime +# Uncomment the next line if you do not want to enter your passwd every time #auth sufficient pam_rootok.so auth include system-auth account include system-auth diff --git a/python/sepolgen/src/sepolgen/objectmodel.py b/python/sepolgen/src/sepolgen/objectmodel.py index 84955f7c..ccce86c1 100644 --- a/python/sepolgen/src/sepolgen/objectmodel.py +++ b/python/sepolgen/src/sepolgen/objectmodel.py @@ -95,7 +95,7 @@ class PermMappings: """The information flow properties of a set of object classes and permissions. PermMappings maps one or more classes and permissions to their PermMap objects - describing their information flow charecteristics. + describing their information flow characteristics. """ def __init__(self): self.classes = { } diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py index 3e907e91..9cac1b95 100644 --- a/python/sepolgen/src/sepolgen/refpolicy.py +++ b/python/sepolgen/src/sepolgen/refpolicy.py @@ -34,7 +34,7 @@ import selinux # the data structures that we need for policy generation. # -# Constans for referring to fields +# Constants for referring to fields SRC_TYPE = 0 TGT_TYPE = 1 OBJ_CLASS = 2 diff --git a/python/sepolgen/tests/test_audit.py b/python/sepolgen/tests/test_audit.py index dbe6be2a..b659bf3b 100644 --- a/python/sepolgen/tests/test_audit.py +++ b/python/sepolgen/tests/test_audit.py @@ -230,7 +230,7 @@ class TestGeneration(unittest.TestCase): self.assertEqual(len(avs), 1) - def test_genaration_granted(self): + def test_generation_granted(self): parser = sepolgen.audit.AuditParser() parser.parse_string(granted1) avs = parser.to_access() diff --git a/python/sepolgen/tests/test_refpolicy.py b/python/sepolgen/tests/test_refpolicy.py index c7219fd5..a24381a6 100644 --- a/python/sepolgen/tests/test_refpolicy.py +++ b/python/sepolgen/tests/test_refpolicy.py @@ -144,7 +144,7 @@ class TestSecurityContext(unittest.TestCase): self.assertNotEqual(sc1, sc3) self.assertNotEqual(sc1, sc4) -class TestObjecClass(unittest.TestCase): +class TestObjectClass(unittest.TestCase): def test_init(self): o = refpolicy.ObjectClass(name="file") self.assertEqual(o.name, "file") diff --git a/python/sepolicy/sepolicy-bash-completion.sh b/python/sepolicy/sepolicy-bash-completion.sh index 779fd75b..13638e4d 100644 --- a/python/sepolicy/sepolicy-bash-completion.sh +++ b/python/sepolicy/sepolicy-bash-completion.sh @@ -36,10 +36,10 @@ __get_all_booleans () { __get_all_types () { seinfo -t 2> /dev/null | tail -n +3 } -__get_all_admin_interaces () { +__get_all_admin_interfaces () { awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }' } -__get_all_user_role_interaces () { +__get_all_user_role_interfaces () { awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }' } __get_all_user_domains () { @@ -139,7 +139,7 @@ _sepolicy () { COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") ) return 0 elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then - COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") ) + COMPREPLY=( $(compgen -W "$( __get_all_admin_interfaces ) " -- "$cur") ) return 0 elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") ) diff --git a/python/sepolicy/sepolicy/gui.py b/python/sepolicy/sepolicy/gui.py index c9ca158d..4f892f82 100644 --- a/python/sepolicy/sepolicy/gui.py +++ b/python/sepolicy/sepolicy/gui.py @@ -1309,9 +1309,9 @@ class SELinuxGui(): filename = i['filename'] else: filename = None - self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename) + self.transitions_files_initial_data_insert(i['target'], i['class'], i['transtype'], filename) - def transitions_files_inital_data_insert(self, path, tclass, dest, name): + def transitions_files_initial_data_insert(self, path, tclass, dest, name): iter = self.transitions_file_liststore.append() self.transitions_file_liststore.set_value(iter, 0, path) self.transitions_file_liststore.set_value(iter, 1, tclass) -- 2.35.1