Correct misc typos
Found by typos[1]. [1]: https://github.com/crate-ci/typos Acked-by: James Carter <jwcart2@gmail.com> Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
This commit is contained in:
parent
e205e3e84a
commit
fd67b2f4b1
12 changed files with 15 additions and 15 deletions
|
@ -490,7 +490,7 @@ static int STR_COMPARATOR(const void *a, const void *b)
|
|||
return strcmp((const char *) a, (const char *) b);
|
||||
}
|
||||
|
||||
/* make_tempate
|
||||
/* make_template
|
||||
* @param s the settings holding the paths to various files
|
||||
* @param pred function pointer to function to use as filter for slurp
|
||||
* file filter
|
||||
|
|
|
@ -72,7 +72,7 @@ struct semanage_handle {
|
|||
int do_check_contexts; /* whether to run setfiles check the file contexts file */
|
||||
|
||||
/* This timeout is used for transactions and waiting for lock
|
||||
-1 means wait indefinetely
|
||||
-1 means wait indefinitely
|
||||
0 means return immediately
|
||||
>0 means wait that many seconds */
|
||||
int timeout;
|
||||
|
|
|
@ -1327,7 +1327,7 @@ static char **split_args(const char *arg0, char *arg_string,
|
|||
goto cleanup;
|
||||
s = arg_string;
|
||||
/* parse the argument string one character at a time,
|
||||
* repsecting quotes and other special characters */
|
||||
* respecting quotes and other special characters */
|
||||
while (s != NULL && *s != '\0') {
|
||||
switch (*s) {
|
||||
case '\\':{
|
||||
|
|
|
@ -47,7 +47,7 @@ void test_iface_get_set_msgcon(void);
|
|||
void test_iface_create(void);
|
||||
void test_iface_clone(void);
|
||||
|
||||
/* iterfaces_policy.h */
|
||||
/* interfaces_policy.h */
|
||||
void test_iface_query(void);
|
||||
void test_iface_exists(void);
|
||||
void test_iface_count(void);
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
#%PAM-1.0
|
||||
# Uncomment the next line if you do not want to enter your passwd everytime
|
||||
# Uncomment the next line if you do not want to enter your passwd every time
|
||||
# auth sufficient pam_rootok.so
|
||||
auth include system-auth
|
||||
account include system-auth
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
#%PAM-1.0
|
||||
# Uncomment the next line if you do not want to enter your passwd everytime
|
||||
# Uncomment the next line if you do not want to enter your passwd every time
|
||||
#auth sufficient pam_rootok.so
|
||||
auth include system-auth
|
||||
account include system-auth
|
||||
|
|
|
@ -95,7 +95,7 @@ class PermMappings:
|
|||
"""The information flow properties of a set of object classes and permissions.
|
||||
|
||||
PermMappings maps one or more classes and permissions to their PermMap objects
|
||||
describing their information flow charecteristics.
|
||||
describing their information flow characteristics.
|
||||
"""
|
||||
def __init__(self):
|
||||
self.classes = { }
|
||||
|
|
|
@ -34,7 +34,7 @@ import selinux
|
|||
# the data structures that we need for policy generation.
|
||||
#
|
||||
|
||||
# Constans for referring to fields
|
||||
# Constants for referring to fields
|
||||
SRC_TYPE = 0
|
||||
TGT_TYPE = 1
|
||||
OBJ_CLASS = 2
|
||||
|
|
|
@ -230,7 +230,7 @@ class TestGeneration(unittest.TestCase):
|
|||
|
||||
self.assertEqual(len(avs), 1)
|
||||
|
||||
def test_genaration_granted(self):
|
||||
def test_generation_granted(self):
|
||||
parser = sepolgen.audit.AuditParser()
|
||||
parser.parse_string(granted1)
|
||||
avs = parser.to_access()
|
||||
|
|
|
@ -144,7 +144,7 @@ class TestSecurityContext(unittest.TestCase):
|
|||
self.assertNotEqual(sc1, sc3)
|
||||
self.assertNotEqual(sc1, sc4)
|
||||
|
||||
class TestObjecClass(unittest.TestCase):
|
||||
class TestObjectClass(unittest.TestCase):
|
||||
def test_init(self):
|
||||
o = refpolicy.ObjectClass(name="file")
|
||||
self.assertEqual(o.name, "file")
|
||||
|
|
|
@ -36,10 +36,10 @@ __get_all_booleans () {
|
|||
__get_all_types () {
|
||||
seinfo -t 2> /dev/null | tail -n +3
|
||||
}
|
||||
__get_all_admin_interaces () {
|
||||
__get_all_admin_interfaces () {
|
||||
awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }'
|
||||
}
|
||||
__get_all_user_role_interaces () {
|
||||
__get_all_user_role_interfaces () {
|
||||
awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }'
|
||||
}
|
||||
__get_all_user_domains () {
|
||||
|
@ -139,7 +139,7 @@ _sepolicy () {
|
|||
COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") )
|
||||
return 0
|
||||
elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then
|
||||
COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") )
|
||||
COMPREPLY=( $(compgen -W "$( __get_all_admin_interfaces ) " -- "$cur") )
|
||||
return 0
|
||||
elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then
|
||||
COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") )
|
||||
|
|
|
@ -1309,9 +1309,9 @@ class SELinuxGui():
|
|||
filename = i['filename']
|
||||
else:
|
||||
filename = None
|
||||
self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename)
|
||||
self.transitions_files_initial_data_insert(i['target'], i['class'], i['transtype'], filename)
|
||||
|
||||
def transitions_files_inital_data_insert(self, path, tclass, dest, name):
|
||||
def transitions_files_initial_data_insert(self, path, tclass, dest, name):
|
||||
iter = self.transitions_file_liststore.append()
|
||||
self.transitions_file_liststore.set_value(iter, 0, path)
|
||||
self.transitions_file_liststore.set_value(iter, 1, tclass)
|
||||
|
|
Loading…
Reference in a new issue