On Fri, Apr 8, 2022 at 11:24 AM Christian Göttsche <cgzones@xxxxxxxxxxxxxx> wrote: > > Found by typos[1]. > > [1]: https://github.com/crate-ci/typos > > Signed-off-by: Christian Göttsche <cgzones@xxxxxxxxxxxxxx> Acked-by: James Carter <jwcart2@xxxxxxxxx> > --- > libsemanage/src/genhomedircon.c | 2 +- > libsemanage/src/handle.h | 2 +- > libsemanage/src/semanage_store.c | 2 +- > libsemanage/tests/test_iface.c | 2 +- > policycoreutils/newrole/newrole.pamd | 2 +- > policycoreutils/run_init/run_init.pamd | 2 +- > python/sepolgen/src/sepolgen/objectmodel.py | 2 +- > python/sepolgen/src/sepolgen/refpolicy.py | 2 +- > python/sepolgen/tests/test_audit.py | 2 +- > python/sepolgen/tests/test_refpolicy.py | 2 +- > python/sepolicy/sepolicy-bash-completion.sh | 6 +++--- > python/sepolicy/sepolicy/gui.py | 4 ++-- > 12 files changed, 15 insertions(+), 15 deletions(-) > > diff --git a/libsemanage/src/genhomedircon.c b/libsemanage/src/genhomedircon.c > index 7ca9afc3..8f8774d3 100644 > --- a/libsemanage/src/genhomedircon.c > +++ b/libsemanage/src/genhomedircon.c > @@ -490,7 +490,7 @@ static int STR_COMPARATOR(const void *a, const void *b) > return strcmp((const char *) a, (const char *) b); > } > > -/* make_tempate > +/* make_template > * @param s the settings holding the paths to various files > * @param pred function pointer to function to use as filter for slurp > * file filter > diff --git a/libsemanage/src/handle.h b/libsemanage/src/handle.h > index 4d2aae8f..c7f4e903 100644 > --- a/libsemanage/src/handle.h > +++ b/libsemanage/src/handle.h > @@ -72,7 +72,7 @@ struct semanage_handle { > int do_check_contexts; /* whether to run setfiles check the file contexts file */ > > /* This timeout is used for transactions and waiting for lock > - -1 means wait indefinetely > + -1 means wait indefinitely > 0 means return immediately > >0 means wait that many seconds */ > int timeout; > diff --git a/libsemanage/src/semanage_store.c b/libsemanage/src/semanage_store.c > index c6d2c5e7..14a0957a 100644 > --- a/libsemanage/src/semanage_store.c > +++ b/libsemanage/src/semanage_store.c > @@ -1327,7 +1327,7 @@ static char **split_args(const char *arg0, char *arg_string, > goto cleanup; > s = arg_string; > /* parse the argument string one character at a time, > - * repsecting quotes and other special characters */ > + * respecting quotes and other special characters */ > while (s != NULL && *s != '\0') { > switch (*s) { > case '\\':{ > diff --git a/libsemanage/tests/test_iface.c b/libsemanage/tests/test_iface.c > index 434372f8..46937e10 100644 > --- a/libsemanage/tests/test_iface.c > +++ b/libsemanage/tests/test_iface.c > @@ -47,7 +47,7 @@ void test_iface_get_set_msgcon(void); > void test_iface_create(void); > void test_iface_clone(void); > > -/* iterfaces_policy.h */ > +/* interfaces_policy.h */ > void test_iface_query(void); > void test_iface_exists(void); > void test_iface_count(void); > diff --git a/policycoreutils/newrole/newrole.pamd b/policycoreutils/newrole/newrole.pamd > index de3582f3..683c5441 100644 > --- a/policycoreutils/newrole/newrole.pamd > +++ b/policycoreutils/newrole/newrole.pamd > @@ -1,5 +1,5 @@ > #%PAM-1.0 > -# Uncomment the next line if you do not want to enter your passwd everytime > +# Uncomment the next line if you do not want to enter your passwd every time > # auth sufficient pam_rootok.so > auth include system-auth > account include system-auth > diff --git a/policycoreutils/run_init/run_init.pamd b/policycoreutils/run_init/run_init.pamd > index 1c323d20..ef460134 100644 > --- a/policycoreutils/run_init/run_init.pamd > +++ b/policycoreutils/run_init/run_init.pamd > @@ -1,5 +1,5 @@ > #%PAM-1.0 > -# Uncomment the next line if you do not want to enter your passwd everytime > +# Uncomment the next line if you do not want to enter your passwd every time > #auth sufficient pam_rootok.so > auth include system-auth > account include system-auth > diff --git a/python/sepolgen/src/sepolgen/objectmodel.py b/python/sepolgen/src/sepolgen/objectmodel.py > index 84955f7c..ccce86c1 100644 > --- a/python/sepolgen/src/sepolgen/objectmodel.py > +++ b/python/sepolgen/src/sepolgen/objectmodel.py > @@ -95,7 +95,7 @@ class PermMappings: > """The information flow properties of a set of object classes and permissions. > > PermMappings maps one or more classes and permissions to their PermMap objects > - describing their information flow charecteristics. > + describing their information flow characteristics. > """ > def __init__(self): > self.classes = { } > diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py > index 3e907e91..9cac1b95 100644 > --- a/python/sepolgen/src/sepolgen/refpolicy.py > +++ b/python/sepolgen/src/sepolgen/refpolicy.py > @@ -34,7 +34,7 @@ import selinux > # the data structures that we need for policy generation. > # > > -# Constans for referring to fields > +# Constants for referring to fields > SRC_TYPE = 0 > TGT_TYPE = 1 > OBJ_CLASS = 2 > diff --git a/python/sepolgen/tests/test_audit.py b/python/sepolgen/tests/test_audit.py > index dbe6be2a..b659bf3b 100644 > --- a/python/sepolgen/tests/test_audit.py > +++ b/python/sepolgen/tests/test_audit.py > @@ -230,7 +230,7 @@ class TestGeneration(unittest.TestCase): > > self.assertEqual(len(avs), 1) > > - def test_genaration_granted(self): > + def test_generation_granted(self): > parser = sepolgen.audit.AuditParser() > parser.parse_string(granted1) > avs = parser.to_access() > diff --git a/python/sepolgen/tests/test_refpolicy.py b/python/sepolgen/tests/test_refpolicy.py > index c7219fd5..a24381a6 100644 > --- a/python/sepolgen/tests/test_refpolicy.py > +++ b/python/sepolgen/tests/test_refpolicy.py > @@ -144,7 +144,7 @@ class TestSecurityContext(unittest.TestCase): > self.assertNotEqual(sc1, sc3) > self.assertNotEqual(sc1, sc4) > > -class TestObjecClass(unittest.TestCase): > +class TestObjectClass(unittest.TestCase): > def test_init(self): > o = refpolicy.ObjectClass(name="file") > self.assertEqual(o.name, "file") > diff --git a/python/sepolicy/sepolicy-bash-completion.sh b/python/sepolicy/sepolicy-bash-completion.sh > index 779fd75b..13638e4d 100644 > --- a/python/sepolicy/sepolicy-bash-completion.sh > +++ b/python/sepolicy/sepolicy-bash-completion.sh > @@ -36,10 +36,10 @@ __get_all_booleans () { > __get_all_types () { > seinfo -t 2> /dev/null | tail -n +3 > } > -__get_all_admin_interaces () { > +__get_all_admin_interfaces () { > awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }' > } > -__get_all_user_role_interaces () { > +__get_all_user_role_interfaces () { > awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }' > } > __get_all_user_domains () { > @@ -139,7 +139,7 @@ _sepolicy () { > COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") ) > return 0 > elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then > - COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") ) > + COMPREPLY=( $(compgen -W "$( __get_all_admin_interfaces ) " -- "$cur") ) > return 0 > elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then > COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") ) > diff --git a/python/sepolicy/sepolicy/gui.py b/python/sepolicy/sepolicy/gui.py > index c9ca158d..4f892f82 100644 > --- a/python/sepolicy/sepolicy/gui.py > +++ b/python/sepolicy/sepolicy/gui.py > @@ -1309,9 +1309,9 @@ class SELinuxGui(): > filename = i['filename'] > else: > filename = None > - self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename) > + self.transitions_files_initial_data_insert(i['target'], i['class'], i['transtype'], filename) > > - def transitions_files_inital_data_insert(self, path, tclass, dest, name): > + def transitions_files_initial_data_insert(self, path, tclass, dest, name): > iter = self.transitions_file_liststore.append() > self.transitions_file_liststore.set_value(iter, 0, path) > self.transitions_file_liststore.set_value(iter, 1, tclass) > -- > 2.35.1 >