Skip to content

Commit

Permalink
Correct some typos
Browse files Browse the repository at this point in the history
Found by codespell

Signed-off-by: Christian Göttsche <[email protected]>
Acked-by: Petr Lautrbach <[email protected]>
  • Loading branch information
cgzones authored and jwcart2 committed Sep 30, 2021
1 parent 0b83397 commit b1a3c20
Show file tree
Hide file tree
Showing 9 changed files with 11 additions and 11 deletions.
2 changes: 1 addition & 1 deletion policycoreutils/newrole/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ AUDITH ?= $(shell test -f $(INCLUDEDIR)/libaudit.h && echo y)
# This will make newrole a setuid root program.
# The capabilities used are: CAP_AUDIT_WRITE.
AUDIT_LOG_PRIV ?= n
# Enable capabilities to permit newrole to utilitize the pam_namespace module.
# Enable capabilities to permit newrole to utilize the pam_namespace module.
# This will make newrole a setuid root program.
# The capabilities used are: CAP_SYS_ADMIN, CAP_CHOWN, CAP_FOWNER and
# CAP_DAC_OVERRIDE.
Expand Down
2 changes: 1 addition & 1 deletion policycoreutils/newrole/newrole.c
Original file line number Diff line number Diff line change
Expand Up @@ -1022,7 +1022,7 @@ static int set_signal_handles(void)
int main(int argc, char *argv[])
{
char *new_context = NULL; /* target security context */
char *old_context = NULL; /* original securiy context */
char *old_context = NULL; /* original security context */
char *tty_context = NULL; /* current context of tty */
char *new_tty_context = NULL; /* new context of tty */

Expand Down
6 changes: 3 additions & 3 deletions python/semanage/semanage
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ class SetImportFile(argparse.Action):
sys.exit(1)
setattr(namespace, self.dest, values)

# define dictonary for seobject OBEJCTS
# define dictionary for seobject OBEJCTS
object_dict = {
'login': seobject.loginRecords,
'user': seobject.seluserRecords,
Expand All @@ -146,7 +146,7 @@ object_dict = {
}

def generate_custom_usage(usage_text, usage_dict):
# generate custom usage from given text and dictonary
# generate custom usage from given text and dictionary
sorted_keys = []
for i in usage_dict.keys():
sorted_keys.append(i)
Expand All @@ -160,7 +160,7 @@ def generate_custom_usage(usage_text, usage_dict):


def handle_opts(args, dict, target_key):
# handle conflict and required options for given dictonary
# handle conflict and required options for given dictionary
# {action:[conflict_opts,require_opts]}

# first we need to catch conflicts
Expand Down
2 changes: 1 addition & 1 deletion python/sepolgen/src/sepolgen/refpolicy.py
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@
ROLE = 4
DEST_TYPE = 5

# String represenations of the above constants
# String representations of the above constants
field_to_str = ["source", "target", "object", "permission", "role", "destination" ]
str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS,
"permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE }
Expand Down
2 changes: 1 addition & 1 deletion python/sepolgen/src/sepolgen/yacc.py
Original file line number Diff line number Diff line change
Expand Up @@ -1502,7 +1502,7 @@ def __init__(self, terminals):
self.Precedence = {} # Precedence rules for each terminal. Contains tuples of the
# form ('right',level) or ('nonassoc', level) or ('left',level)

self.UsedPrecedence = set() # Precedence rules that were actually used by the grammer.
self.UsedPrecedence = set() # Precedence rules that were actually used by the grammar.
# This is only used to provide error checking and to generate
# a warning about unused precedence rules.

Expand Down
2 changes: 1 addition & 1 deletion python/sepolicy/sepolicy/manpage.py
Original file line number Diff line number Diff line change
Expand Up @@ -797,7 +797,7 @@ def _file_context(self):
.B STANDARD FILE CONTEXT
SELinux defines the file context types for the %(domainname)s, if you wanted to
store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk.
store files with these types in a diffent paths, you need to execute the semanage command to specify alternate labeling and then use restorecon to put the labels on disk.
.B semanage fcontext -a -t %(type)s '/srv/%(domainname)s/content(/.*)?'
.br
Expand Down
2 changes: 1 addition & 1 deletion secilc/docs/cil_access_vector_rules.md
Original file line number Diff line number Diff line change
Expand Up @@ -360,7 +360,7 @@ dontauditx

Do not audit the access rights defined when access denied. This stops excessive log entries for known events.

Note that for this to work there must *also* be atleast one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type.
Note that for this to work there must *also* be at least one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type.

Note that these rules can be omitted by the CIL compiler command line parameter `-D` or `--disable-dontaudit` flags.

Expand Down
2 changes: 1 addition & 1 deletion secilc/docs/secil.xml
Original file line number Diff line number Diff line change
Expand Up @@ -208,7 +208,7 @@
<context name="String" attribute="String" lineEndContext="#stay">
<RegExpr attribute="Char" context="#stay" String="#\\."/>

<!-- allow escaping " or similiar -->
<!-- allow escaping " or similar -->
<HlCStringChar attribute="String Char" context="#stay"/>

<DetectChar attribute="String" context="#pop" char="&quot;"/>
Expand Down
2 changes: 1 addition & 1 deletion secilc/test/block_test.cil
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@
)


;; Inherting the abstract block causes the allow rule to be in the policy
;; Inheriting the abstract block causes the allow rule to be in the policy
(type t5)
(block b5
(blockabstract b5)
Expand Down

0 comments on commit b1a3c20

Please sign in to comment.