Message ID | 20220408131031.7825-1-cgzones@googlemail.com (mailing list archive) |
---|---|
State | Accepted |
Commit | fd67b2f4b193 |
Headers | show |
Series | Correct misc typos | expand |
On Fri, Apr 8, 2022 at 11:24 AM Christian Göttsche <cgzones@googlemail.com> wrote: > > Found by typos[1]. > > [1]: https://github.com/crate-ci/typos > > Signed-off-by: Christian Göttsche <cgzones@googlemail.com> Acked-by: James Carter <jwcart2@gmail.com> > --- > libsemanage/src/genhomedircon.c | 2 +- > libsemanage/src/handle.h | 2 +- > libsemanage/src/semanage_store.c | 2 +- > libsemanage/tests/test_iface.c | 2 +- > policycoreutils/newrole/newrole.pamd | 2 +- > policycoreutils/run_init/run_init.pamd | 2 +- > python/sepolgen/src/sepolgen/objectmodel.py | 2 +- > python/sepolgen/src/sepolgen/refpolicy.py | 2 +- > python/sepolgen/tests/test_audit.py | 2 +- > python/sepolgen/tests/test_refpolicy.py | 2 +- > python/sepolicy/sepolicy-bash-completion.sh | 6 +++--- > python/sepolicy/sepolicy/gui.py | 4 ++-- > 12 files changed, 15 insertions(+), 15 deletions(-) > > diff --git a/libsemanage/src/genhomedircon.c b/libsemanage/src/genhomedircon.c > index 7ca9afc3..8f8774d3 100644 > --- a/libsemanage/src/genhomedircon.c > +++ b/libsemanage/src/genhomedircon.c > @@ -490,7 +490,7 @@ static int STR_COMPARATOR(const void *a, const void *b) > return strcmp((const char *) a, (const char *) b); > } > > -/* make_tempate > +/* make_template > * @param s the settings holding the paths to various files > * @param pred function pointer to function to use as filter for slurp > * file filter > diff --git a/libsemanage/src/handle.h b/libsemanage/src/handle.h > index 4d2aae8f..c7f4e903 100644 > --- a/libsemanage/src/handle.h > +++ b/libsemanage/src/handle.h > @@ -72,7 +72,7 @@ struct semanage_handle { > int do_check_contexts; /* whether to run setfiles check the file contexts file */ > > /* This timeout is used for transactions and waiting for lock > - -1 means wait indefinetely > + -1 means wait indefinitely > 0 means return immediately > >0 means wait that many seconds */ > int timeout; > diff --git a/libsemanage/src/semanage_store.c b/libsemanage/src/semanage_store.c > index c6d2c5e7..14a0957a 100644 > --- a/libsemanage/src/semanage_store.c > +++ b/libsemanage/src/semanage_store.c > @@ -1327,7 +1327,7 @@ static char **split_args(const char *arg0, char *arg_string, > goto cleanup; > s = arg_string; > /* parse the argument string one character at a time, > - * repsecting quotes and other special characters */ > + * respecting quotes and other special characters */ > while (s != NULL && *s != '\0') { > switch (*s) { > case '\\':{ > diff --git a/libsemanage/tests/test_iface.c b/libsemanage/tests/test_iface.c > index 434372f8..46937e10 100644 > --- a/libsemanage/tests/test_iface.c > +++ b/libsemanage/tests/test_iface.c > @@ -47,7 +47,7 @@ void test_iface_get_set_msgcon(void); > void test_iface_create(void); > void test_iface_clone(void); > > -/* iterfaces_policy.h */ > +/* interfaces_policy.h */ > void test_iface_query(void); > void test_iface_exists(void); > void test_iface_count(void); > diff --git a/policycoreutils/newrole/newrole.pamd b/policycoreutils/newrole/newrole.pamd > index de3582f3..683c5441 100644 > --- a/policycoreutils/newrole/newrole.pamd > +++ b/policycoreutils/newrole/newrole.pamd > @@ -1,5 +1,5 @@ > #%PAM-1.0 > -# Uncomment the next line if you do not want to enter your passwd everytime > +# Uncomment the next line if you do not want to enter your passwd every time > # auth sufficient pam_rootok.so > auth include system-auth > account include system-auth > diff --git a/policycoreutils/run_init/run_init.pamd b/policycoreutils/run_init/run_init.pamd > index 1c323d20..ef460134 100644 > --- a/policycoreutils/run_init/run_init.pamd > +++ b/policycoreutils/run_init/run_init.pamd > @@ -1,5 +1,5 @@ > #%PAM-1.0 > -# Uncomment the next line if you do not want to enter your passwd everytime > +# Uncomment the next line if you do not want to enter your passwd every time > #auth sufficient pam_rootok.so > auth include system-auth > account include system-auth > diff --git a/python/sepolgen/src/sepolgen/objectmodel.py b/python/sepolgen/src/sepolgen/objectmodel.py > index 84955f7c..ccce86c1 100644 > --- a/python/sepolgen/src/sepolgen/objectmodel.py > +++ b/python/sepolgen/src/sepolgen/objectmodel.py > @@ -95,7 +95,7 @@ class PermMappings: > """The information flow properties of a set of object classes and permissions. > > PermMappings maps one or more classes and permissions to their PermMap objects > - describing their information flow charecteristics. > + describing their information flow characteristics. > """ > def __init__(self): > self.classes = { } > diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py > index 3e907e91..9cac1b95 100644 > --- a/python/sepolgen/src/sepolgen/refpolicy.py > +++ b/python/sepolgen/src/sepolgen/refpolicy.py > @@ -34,7 +34,7 @@ import selinux > # the data structures that we need for policy generation. > # > > -# Constans for referring to fields > +# Constants for referring to fields > SRC_TYPE = 0 > TGT_TYPE = 1 > OBJ_CLASS = 2 > diff --git a/python/sepolgen/tests/test_audit.py b/python/sepolgen/tests/test_audit.py > index dbe6be2a..b659bf3b 100644 > --- a/python/sepolgen/tests/test_audit.py > +++ b/python/sepolgen/tests/test_audit.py > @@ -230,7 +230,7 @@ class TestGeneration(unittest.TestCase): > > self.assertEqual(len(avs), 1) > > - def test_genaration_granted(self): > + def test_generation_granted(self): > parser = sepolgen.audit.AuditParser() > parser.parse_string(granted1) > avs = parser.to_access() > diff --git a/python/sepolgen/tests/test_refpolicy.py b/python/sepolgen/tests/test_refpolicy.py > index c7219fd5..a24381a6 100644 > --- a/python/sepolgen/tests/test_refpolicy.py > +++ b/python/sepolgen/tests/test_refpolicy.py > @@ -144,7 +144,7 @@ class TestSecurityContext(unittest.TestCase): > self.assertNotEqual(sc1, sc3) > self.assertNotEqual(sc1, sc4) > > -class TestObjecClass(unittest.TestCase): > +class TestObjectClass(unittest.TestCase): > def test_init(self): > o = refpolicy.ObjectClass(name="file") > self.assertEqual(o.name, "file") > diff --git a/python/sepolicy/sepolicy-bash-completion.sh b/python/sepolicy/sepolicy-bash-completion.sh > index 779fd75b..13638e4d 100644 > --- a/python/sepolicy/sepolicy-bash-completion.sh > +++ b/python/sepolicy/sepolicy-bash-completion.sh > @@ -36,10 +36,10 @@ __get_all_booleans () { > __get_all_types () { > seinfo -t 2> /dev/null | tail -n +3 > } > -__get_all_admin_interaces () { > +__get_all_admin_interfaces () { > awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }' > } > -__get_all_user_role_interaces () { > +__get_all_user_role_interfaces () { > awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }' > } > __get_all_user_domains () { > @@ -139,7 +139,7 @@ _sepolicy () { > COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") ) > return 0 > elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then > - COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") ) > + COMPREPLY=( $(compgen -W "$( __get_all_admin_interfaces ) " -- "$cur") ) > return 0 > elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then > COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") ) > diff --git a/python/sepolicy/sepolicy/gui.py b/python/sepolicy/sepolicy/gui.py > index c9ca158d..4f892f82 100644 > --- a/python/sepolicy/sepolicy/gui.py > +++ b/python/sepolicy/sepolicy/gui.py > @@ -1309,9 +1309,9 @@ class SELinuxGui(): > filename = i['filename'] > else: > filename = None > - self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename) > + self.transitions_files_initial_data_insert(i['target'], i['class'], i['transtype'], filename) > > - def transitions_files_inital_data_insert(self, path, tclass, dest, name): > + def transitions_files_initial_data_insert(self, path, tclass, dest, name): > iter = self.transitions_file_liststore.append() > self.transitions_file_liststore.set_value(iter, 0, path) > self.transitions_file_liststore.set_value(iter, 1, tclass) > -- > 2.35.1 >
On Tue, Apr 12, 2022 at 9:45 AM James Carter <jwcart2@gmail.com> wrote: > > On Fri, Apr 8, 2022 at 11:24 AM Christian Göttsche > <cgzones@googlemail.com> wrote: > > > > Found by typos[1]. > > > > [1]: https://github.com/crate-ci/typos > > > > Signed-off-by: Christian Göttsche <cgzones@googlemail.com> > > Acked-by: James Carter <jwcart2@gmail.com> > Merged. thanks, Jim > > --- > > libsemanage/src/genhomedircon.c | 2 +- > > libsemanage/src/handle.h | 2 +- > > libsemanage/src/semanage_store.c | 2 +- > > libsemanage/tests/test_iface.c | 2 +- > > policycoreutils/newrole/newrole.pamd | 2 +- > > policycoreutils/run_init/run_init.pamd | 2 +- > > python/sepolgen/src/sepolgen/objectmodel.py | 2 +- > > python/sepolgen/src/sepolgen/refpolicy.py | 2 +- > > python/sepolgen/tests/test_audit.py | 2 +- > > python/sepolgen/tests/test_refpolicy.py | 2 +- > > python/sepolicy/sepolicy-bash-completion.sh | 6 +++--- > > python/sepolicy/sepolicy/gui.py | 4 ++-- > > 12 files changed, 15 insertions(+), 15 deletions(-) > > > > diff --git a/libsemanage/src/genhomedircon.c b/libsemanage/src/genhomedircon.c > > index 7ca9afc3..8f8774d3 100644 > > --- a/libsemanage/src/genhomedircon.c > > +++ b/libsemanage/src/genhomedircon.c > > @@ -490,7 +490,7 @@ static int STR_COMPARATOR(const void *a, const void *b) > > return strcmp((const char *) a, (const char *) b); > > } > > > > -/* make_tempate > > +/* make_template > > * @param s the settings holding the paths to various files > > * @param pred function pointer to function to use as filter for slurp > > * file filter > > diff --git a/libsemanage/src/handle.h b/libsemanage/src/handle.h > > index 4d2aae8f..c7f4e903 100644 > > --- a/libsemanage/src/handle.h > > +++ b/libsemanage/src/handle.h > > @@ -72,7 +72,7 @@ struct semanage_handle { > > int do_check_contexts; /* whether to run setfiles check the file contexts file */ > > > > /* This timeout is used for transactions and waiting for lock > > - -1 means wait indefinetely > > + -1 means wait indefinitely > > 0 means return immediately > > >0 means wait that many seconds */ > > int timeout; > > diff --git a/libsemanage/src/semanage_store.c b/libsemanage/src/semanage_store.c > > index c6d2c5e7..14a0957a 100644 > > --- a/libsemanage/src/semanage_store.c > > +++ b/libsemanage/src/semanage_store.c > > @@ -1327,7 +1327,7 @@ static char **split_args(const char *arg0, char *arg_string, > > goto cleanup; > > s = arg_string; > > /* parse the argument string one character at a time, > > - * repsecting quotes and other special characters */ > > + * respecting quotes and other special characters */ > > while (s != NULL && *s != '\0') { > > switch (*s) { > > case '\\':{ > > diff --git a/libsemanage/tests/test_iface.c b/libsemanage/tests/test_iface.c > > index 434372f8..46937e10 100644 > > --- a/libsemanage/tests/test_iface.c > > +++ b/libsemanage/tests/test_iface.c > > @@ -47,7 +47,7 @@ void test_iface_get_set_msgcon(void); > > void test_iface_create(void); > > void test_iface_clone(void); > > > > -/* iterfaces_policy.h */ > > +/* interfaces_policy.h */ > > void test_iface_query(void); > > void test_iface_exists(void); > > void test_iface_count(void); > > diff --git a/policycoreutils/newrole/newrole.pamd b/policycoreutils/newrole/newrole.pamd > > index de3582f3..683c5441 100644 > > --- a/policycoreutils/newrole/newrole.pamd > > +++ b/policycoreutils/newrole/newrole.pamd > > @@ -1,5 +1,5 @@ > > #%PAM-1.0 > > -# Uncomment the next line if you do not want to enter your passwd everytime > > +# Uncomment the next line if you do not want to enter your passwd every time > > # auth sufficient pam_rootok.so > > auth include system-auth > > account include system-auth > > diff --git a/policycoreutils/run_init/run_init.pamd b/policycoreutils/run_init/run_init.pamd > > index 1c323d20..ef460134 100644 > > --- a/policycoreutils/run_init/run_init.pamd > > +++ b/policycoreutils/run_init/run_init.pamd > > @@ -1,5 +1,5 @@ > > #%PAM-1.0 > > -# Uncomment the next line if you do not want to enter your passwd everytime > > +# Uncomment the next line if you do not want to enter your passwd every time > > #auth sufficient pam_rootok.so > > auth include system-auth > > account include system-auth > > diff --git a/python/sepolgen/src/sepolgen/objectmodel.py b/python/sepolgen/src/sepolgen/objectmodel.py > > index 84955f7c..ccce86c1 100644 > > --- a/python/sepolgen/src/sepolgen/objectmodel.py > > +++ b/python/sepolgen/src/sepolgen/objectmodel.py > > @@ -95,7 +95,7 @@ class PermMappings: > > """The information flow properties of a set of object classes and permissions. > > > > PermMappings maps one or more classes and permissions to their PermMap objects > > - describing their information flow charecteristics. > > + describing their information flow characteristics. > > """ > > def __init__(self): > > self.classes = { } > > diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py > > index 3e907e91..9cac1b95 100644 > > --- a/python/sepolgen/src/sepolgen/refpolicy.py > > +++ b/python/sepolgen/src/sepolgen/refpolicy.py > > @@ -34,7 +34,7 @@ import selinux > > # the data structures that we need for policy generation. > > # > > > > -# Constans for referring to fields > > +# Constants for referring to fields > > SRC_TYPE = 0 > > TGT_TYPE = 1 > > OBJ_CLASS = 2 > > diff --git a/python/sepolgen/tests/test_audit.py b/python/sepolgen/tests/test_audit.py > > index dbe6be2a..b659bf3b 100644 > > --- a/python/sepolgen/tests/test_audit.py > > +++ b/python/sepolgen/tests/test_audit.py > > @@ -230,7 +230,7 @@ class TestGeneration(unittest.TestCase): > > > > self.assertEqual(len(avs), 1) > > > > - def test_genaration_granted(self): > > + def test_generation_granted(self): > > parser = sepolgen.audit.AuditParser() > > parser.parse_string(granted1) > > avs = parser.to_access() > > diff --git a/python/sepolgen/tests/test_refpolicy.py b/python/sepolgen/tests/test_refpolicy.py > > index c7219fd5..a24381a6 100644 > > --- a/python/sepolgen/tests/test_refpolicy.py > > +++ b/python/sepolgen/tests/test_refpolicy.py > > @@ -144,7 +144,7 @@ class TestSecurityContext(unittest.TestCase): > > self.assertNotEqual(sc1, sc3) > > self.assertNotEqual(sc1, sc4) > > > > -class TestObjecClass(unittest.TestCase): > > +class TestObjectClass(unittest.TestCase): > > def test_init(self): > > o = refpolicy.ObjectClass(name="file") > > self.assertEqual(o.name, "file") > > diff --git a/python/sepolicy/sepolicy-bash-completion.sh b/python/sepolicy/sepolicy-bash-completion.sh > > index 779fd75b..13638e4d 100644 > > --- a/python/sepolicy/sepolicy-bash-completion.sh > > +++ b/python/sepolicy/sepolicy-bash-completion.sh > > @@ -36,10 +36,10 @@ __get_all_booleans () { > > __get_all_types () { > > seinfo -t 2> /dev/null | tail -n +3 > > } > > -__get_all_admin_interaces () { > > +__get_all_admin_interfaces () { > > awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }' > > } > > -__get_all_user_role_interaces () { > > +__get_all_user_role_interfaces () { > > awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }' > > } > > __get_all_user_domains () { > > @@ -139,7 +139,7 @@ _sepolicy () { > > COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") ) > > return 0 > > elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then > > - COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") ) > > + COMPREPLY=( $(compgen -W "$( __get_all_admin_interfaces ) " -- "$cur") ) > > return 0 > > elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then > > COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") ) > > diff --git a/python/sepolicy/sepolicy/gui.py b/python/sepolicy/sepolicy/gui.py > > index c9ca158d..4f892f82 100644 > > --- a/python/sepolicy/sepolicy/gui.py > > +++ b/python/sepolicy/sepolicy/gui.py > > @@ -1309,9 +1309,9 @@ class SELinuxGui(): > > filename = i['filename'] > > else: > > filename = None > > - self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename) > > + self.transitions_files_initial_data_insert(i['target'], i['class'], i['transtype'], filename) > > > > - def transitions_files_inital_data_insert(self, path, tclass, dest, name): > > + def transitions_files_initial_data_insert(self, path, tclass, dest, name): > > iter = self.transitions_file_liststore.append() > > self.transitions_file_liststore.set_value(iter, 0, path) > > self.transitions_file_liststore.set_value(iter, 1, tclass) > > -- > > 2.35.1 > >
diff --git a/libsemanage/src/genhomedircon.c b/libsemanage/src/genhomedircon.c index 7ca9afc3..8f8774d3 100644 --- a/libsemanage/src/genhomedircon.c +++ b/libsemanage/src/genhomedircon.c @@ -490,7 +490,7 @@ static int STR_COMPARATOR(const void *a, const void *b) return strcmp((const char *) a, (const char *) b); } -/* make_tempate +/* make_template * @param s the settings holding the paths to various files * @param pred function pointer to function to use as filter for slurp * file filter diff --git a/libsemanage/src/handle.h b/libsemanage/src/handle.h index 4d2aae8f..c7f4e903 100644 --- a/libsemanage/src/handle.h +++ b/libsemanage/src/handle.h @@ -72,7 +72,7 @@ struct semanage_handle { int do_check_contexts; /* whether to run setfiles check the file contexts file */ /* This timeout is used for transactions and waiting for lock - -1 means wait indefinetely + -1 means wait indefinitely 0 means return immediately >0 means wait that many seconds */ int timeout; diff --git a/libsemanage/src/semanage_store.c b/libsemanage/src/semanage_store.c index c6d2c5e7..14a0957a 100644 --- a/libsemanage/src/semanage_store.c +++ b/libsemanage/src/semanage_store.c @@ -1327,7 +1327,7 @@ static char **split_args(const char *arg0, char *arg_string, goto cleanup; s = arg_string; /* parse the argument string one character at a time, - * repsecting quotes and other special characters */ + * respecting quotes and other special characters */ while (s != NULL && *s != '\0') { switch (*s) { case '\\':{ diff --git a/libsemanage/tests/test_iface.c b/libsemanage/tests/test_iface.c index 434372f8..46937e10 100644 --- a/libsemanage/tests/test_iface.c +++ b/libsemanage/tests/test_iface.c @@ -47,7 +47,7 @@ void test_iface_get_set_msgcon(void); void test_iface_create(void); void test_iface_clone(void); -/* iterfaces_policy.h */ +/* interfaces_policy.h */ void test_iface_query(void); void test_iface_exists(void); void test_iface_count(void); diff --git a/policycoreutils/newrole/newrole.pamd b/policycoreutils/newrole/newrole.pamd index de3582f3..683c5441 100644 --- a/policycoreutils/newrole/newrole.pamd +++ b/policycoreutils/newrole/newrole.pamd @@ -1,5 +1,5 @@ #%PAM-1.0 -# Uncomment the next line if you do not want to enter your passwd everytime +# Uncomment the next line if you do not want to enter your passwd every time # auth sufficient pam_rootok.so auth include system-auth account include system-auth diff --git a/policycoreutils/run_init/run_init.pamd b/policycoreutils/run_init/run_init.pamd index 1c323d20..ef460134 100644 --- a/policycoreutils/run_init/run_init.pamd +++ b/policycoreutils/run_init/run_init.pamd @@ -1,5 +1,5 @@ #%PAM-1.0 -# Uncomment the next line if you do not want to enter your passwd everytime +# Uncomment the next line if you do not want to enter your passwd every time #auth sufficient pam_rootok.so auth include system-auth account include system-auth diff --git a/python/sepolgen/src/sepolgen/objectmodel.py b/python/sepolgen/src/sepolgen/objectmodel.py index 84955f7c..ccce86c1 100644 --- a/python/sepolgen/src/sepolgen/objectmodel.py +++ b/python/sepolgen/src/sepolgen/objectmodel.py @@ -95,7 +95,7 @@ class PermMappings: """The information flow properties of a set of object classes and permissions. PermMappings maps one or more classes and permissions to their PermMap objects - describing their information flow charecteristics. + describing their information flow characteristics. """ def __init__(self): self.classes = { } diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py index 3e907e91..9cac1b95 100644 --- a/python/sepolgen/src/sepolgen/refpolicy.py +++ b/python/sepolgen/src/sepolgen/refpolicy.py @@ -34,7 +34,7 @@ import selinux # the data structures that we need for policy generation. # -# Constans for referring to fields +# Constants for referring to fields SRC_TYPE = 0 TGT_TYPE = 1 OBJ_CLASS = 2 diff --git a/python/sepolgen/tests/test_audit.py b/python/sepolgen/tests/test_audit.py index dbe6be2a..b659bf3b 100644 --- a/python/sepolgen/tests/test_audit.py +++ b/python/sepolgen/tests/test_audit.py @@ -230,7 +230,7 @@ class TestGeneration(unittest.TestCase): self.assertEqual(len(avs), 1) - def test_genaration_granted(self): + def test_generation_granted(self): parser = sepolgen.audit.AuditParser() parser.parse_string(granted1) avs = parser.to_access() diff --git a/python/sepolgen/tests/test_refpolicy.py b/python/sepolgen/tests/test_refpolicy.py index c7219fd5..a24381a6 100644 --- a/python/sepolgen/tests/test_refpolicy.py +++ b/python/sepolgen/tests/test_refpolicy.py @@ -144,7 +144,7 @@ class TestSecurityContext(unittest.TestCase): self.assertNotEqual(sc1, sc3) self.assertNotEqual(sc1, sc4) -class TestObjecClass(unittest.TestCase): +class TestObjectClass(unittest.TestCase): def test_init(self): o = refpolicy.ObjectClass(name="file") self.assertEqual(o.name, "file") diff --git a/python/sepolicy/sepolicy-bash-completion.sh b/python/sepolicy/sepolicy-bash-completion.sh index 779fd75b..13638e4d 100644 --- a/python/sepolicy/sepolicy-bash-completion.sh +++ b/python/sepolicy/sepolicy-bash-completion.sh @@ -36,10 +36,10 @@ __get_all_booleans () { __get_all_types () { seinfo -t 2> /dev/null | tail -n +3 } -__get_all_admin_interaces () { +__get_all_admin_interfaces () { awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }' } -__get_all_user_role_interaces () { +__get_all_user_role_interfaces () { awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }' } __get_all_user_domains () { @@ -139,7 +139,7 @@ _sepolicy () { COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") ) return 0 elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then - COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") ) + COMPREPLY=( $(compgen -W "$( __get_all_admin_interfaces ) " -- "$cur") ) return 0 elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") ) diff --git a/python/sepolicy/sepolicy/gui.py b/python/sepolicy/sepolicy/gui.py index c9ca158d..4f892f82 100644 --- a/python/sepolicy/sepolicy/gui.py +++ b/python/sepolicy/sepolicy/gui.py @@ -1309,9 +1309,9 @@ class SELinuxGui(): filename = i['filename'] else: filename = None - self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename) + self.transitions_files_initial_data_insert(i['target'], i['class'], i['transtype'], filename) - def transitions_files_inital_data_insert(self, path, tclass, dest, name): + def transitions_files_initial_data_insert(self, path, tclass, dest, name): iter = self.transitions_file_liststore.append() self.transitions_file_liststore.set_value(iter, 0, path) self.transitions_file_liststore.set_value(iter, 1, tclass)
Found by typos[1]. [1]: https://github.com/crate-ci/typos Signed-off-by: Christian Göttsche <cgzones@googlemail.com> --- libsemanage/src/genhomedircon.c | 2 +- libsemanage/src/handle.h | 2 +- libsemanage/src/semanage_store.c | 2 +- libsemanage/tests/test_iface.c | 2 +- policycoreutils/newrole/newrole.pamd | 2 +- policycoreutils/run_init/run_init.pamd | 2 +- python/sepolgen/src/sepolgen/objectmodel.py | 2 +- python/sepolgen/src/sepolgen/refpolicy.py | 2 +- python/sepolgen/tests/test_audit.py | 2 +- python/sepolgen/tests/test_refpolicy.py | 2 +- python/sepolicy/sepolicy-bash-completion.sh | 6 +++--- python/sepolicy/sepolicy/gui.py | 4 ++-- 12 files changed, 15 insertions(+), 15 deletions(-)