diff mbox series

Correct misc typos

Message ID 20220408131031.7825-1-cgzones@googlemail.com (mailing list archive)
State Accepted
Commit fd67b2f4b193
Headers show
Series Correct misc typos | expand

Commit Message

Christian Göttsche April 8, 2022, 1:10 p.m. UTC
Found by typos[1].

[1]: https://github.com/crate-ci/typos

Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
---
 libsemanage/src/genhomedircon.c             | 2 +-
 libsemanage/src/handle.h                    | 2 +-
 libsemanage/src/semanage_store.c            | 2 +-
 libsemanage/tests/test_iface.c              | 2 +-
 policycoreutils/newrole/newrole.pamd        | 2 +-
 policycoreutils/run_init/run_init.pamd      | 2 +-
 python/sepolgen/src/sepolgen/objectmodel.py | 2 +-
 python/sepolgen/src/sepolgen/refpolicy.py   | 2 +-
 python/sepolgen/tests/test_audit.py         | 2 +-
 python/sepolgen/tests/test_refpolicy.py     | 2 +-
 python/sepolicy/sepolicy-bash-completion.sh | 6 +++---
 python/sepolicy/sepolicy/gui.py             | 4 ++--
 12 files changed, 15 insertions(+), 15 deletions(-)

Comments

James Carter April 12, 2022, 1:45 p.m. UTC | #1
On Fri, Apr 8, 2022 at 11:24 AM Christian Göttsche
<cgzones@googlemail.com> wrote:
>
> Found by typos[1].
>
> [1]: https://github.com/crate-ci/typos
>
> Signed-off-by: Christian Göttsche <cgzones@googlemail.com>

Acked-by: James Carter <jwcart2@gmail.com>

> ---
>  libsemanage/src/genhomedircon.c             | 2 +-
>  libsemanage/src/handle.h                    | 2 +-
>  libsemanage/src/semanage_store.c            | 2 +-
>  libsemanage/tests/test_iface.c              | 2 +-
>  policycoreutils/newrole/newrole.pamd        | 2 +-
>  policycoreutils/run_init/run_init.pamd      | 2 +-
>  python/sepolgen/src/sepolgen/objectmodel.py | 2 +-
>  python/sepolgen/src/sepolgen/refpolicy.py   | 2 +-
>  python/sepolgen/tests/test_audit.py         | 2 +-
>  python/sepolgen/tests/test_refpolicy.py     | 2 +-
>  python/sepolicy/sepolicy-bash-completion.sh | 6 +++---
>  python/sepolicy/sepolicy/gui.py             | 4 ++--
>  12 files changed, 15 insertions(+), 15 deletions(-)
>
> diff --git a/libsemanage/src/genhomedircon.c b/libsemanage/src/genhomedircon.c
> index 7ca9afc3..8f8774d3 100644
> --- a/libsemanage/src/genhomedircon.c
> +++ b/libsemanage/src/genhomedircon.c
> @@ -490,7 +490,7 @@ static int STR_COMPARATOR(const void *a, const void *b)
>         return strcmp((const char *) a, (const char *) b);
>  }
>
> -/* make_tempate
> +/* make_template
>   * @param      s         the settings holding the paths to various files
>   * @param      pred    function pointer to function to use as filter for slurp
>   *                                     file filter
> diff --git a/libsemanage/src/handle.h b/libsemanage/src/handle.h
> index 4d2aae8f..c7f4e903 100644
> --- a/libsemanage/src/handle.h
> +++ b/libsemanage/src/handle.h
> @@ -72,7 +72,7 @@ struct semanage_handle {
>         int do_check_contexts;  /* whether to run setfiles check the file contexts file */
>
>         /* This timeout is used for transactions and waiting for lock
> -          -1 means wait indefinetely
> +          -1 means wait indefinitely
>            0 means return immediately
>            >0 means wait that many seconds */
>         int timeout;
> diff --git a/libsemanage/src/semanage_store.c b/libsemanage/src/semanage_store.c
> index c6d2c5e7..14a0957a 100644
> --- a/libsemanage/src/semanage_store.c
> +++ b/libsemanage/src/semanage_store.c
> @@ -1327,7 +1327,7 @@ static char **split_args(const char *arg0, char *arg_string,
>                 goto cleanup;
>         s = arg_string;
>         /* parse the argument string one character at a time,
> -        * repsecting quotes and other special characters */
> +        * respecting quotes and other special characters */
>         while (s != NULL && *s != '\0') {
>                 switch (*s) {
>                 case '\\':{
> diff --git a/libsemanage/tests/test_iface.c b/libsemanage/tests/test_iface.c
> index 434372f8..46937e10 100644
> --- a/libsemanage/tests/test_iface.c
> +++ b/libsemanage/tests/test_iface.c
> @@ -47,7 +47,7 @@ void test_iface_get_set_msgcon(void);
>  void test_iface_create(void);
>  void test_iface_clone(void);
>
> -/* iterfaces_policy.h */
> +/* interfaces_policy.h */
>  void test_iface_query(void);
>  void test_iface_exists(void);
>  void test_iface_count(void);
> diff --git a/policycoreutils/newrole/newrole.pamd b/policycoreutils/newrole/newrole.pamd
> index de3582f3..683c5441 100644
> --- a/policycoreutils/newrole/newrole.pamd
> +++ b/policycoreutils/newrole/newrole.pamd
> @@ -1,5 +1,5 @@
>  #%PAM-1.0
> -# Uncomment the next line if you do not want to enter your passwd everytime
> +# Uncomment the next line if you do not want to enter your passwd every time
>  # auth       sufficient   pam_rootok.so
>  auth       include     system-auth
>  account    include     system-auth
> diff --git a/policycoreutils/run_init/run_init.pamd b/policycoreutils/run_init/run_init.pamd
> index 1c323d20..ef460134 100644
> --- a/policycoreutils/run_init/run_init.pamd
> +++ b/policycoreutils/run_init/run_init.pamd
> @@ -1,5 +1,5 @@
>  #%PAM-1.0
> -# Uncomment the next line if you do not want to enter your passwd everytime
> +# Uncomment the next line if you do not want to enter your passwd every time
>  #auth       sufficient   pam_rootok.so
>  auth       include     system-auth
>  account    include     system-auth
> diff --git a/python/sepolgen/src/sepolgen/objectmodel.py b/python/sepolgen/src/sepolgen/objectmodel.py
> index 84955f7c..ccce86c1 100644
> --- a/python/sepolgen/src/sepolgen/objectmodel.py
> +++ b/python/sepolgen/src/sepolgen/objectmodel.py
> @@ -95,7 +95,7 @@ class PermMappings:
>      """The information flow properties of a set of object classes and permissions.
>
>      PermMappings maps one or more classes and permissions to their PermMap objects
> -    describing their information flow charecteristics.
> +    describing their information flow characteristics.
>      """
>      def __init__(self):
>          self.classes = { }
> diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py
> index 3e907e91..9cac1b95 100644
> --- a/python/sepolgen/src/sepolgen/refpolicy.py
> +++ b/python/sepolgen/src/sepolgen/refpolicy.py
> @@ -34,7 +34,7 @@ import selinux
>  # the data structures that we need for policy generation.
>  #
>
> -# Constans for referring to fields
> +# Constants for referring to fields
>  SRC_TYPE  = 0
>  TGT_TYPE  = 1
>  OBJ_CLASS = 2
> diff --git a/python/sepolgen/tests/test_audit.py b/python/sepolgen/tests/test_audit.py
> index dbe6be2a..b659bf3b 100644
> --- a/python/sepolgen/tests/test_audit.py
> +++ b/python/sepolgen/tests/test_audit.py
> @@ -230,7 +230,7 @@ class TestGeneration(unittest.TestCase):
>
>          self.assertEqual(len(avs), 1)
>
> -    def test_genaration_granted(self):
> +    def test_generation_granted(self):
>          parser = sepolgen.audit.AuditParser()
>          parser.parse_string(granted1)
>          avs = parser.to_access()
> diff --git a/python/sepolgen/tests/test_refpolicy.py b/python/sepolgen/tests/test_refpolicy.py
> index c7219fd5..a24381a6 100644
> --- a/python/sepolgen/tests/test_refpolicy.py
> +++ b/python/sepolgen/tests/test_refpolicy.py
> @@ -144,7 +144,7 @@ class TestSecurityContext(unittest.TestCase):
>          self.assertNotEqual(sc1, sc3)
>          self.assertNotEqual(sc1, sc4)
>
> -class TestObjecClass(unittest.TestCase):
> +class TestObjectClass(unittest.TestCase):
>      def test_init(self):
>          o = refpolicy.ObjectClass(name="file")
>          self.assertEqual(o.name, "file")
> diff --git a/python/sepolicy/sepolicy-bash-completion.sh b/python/sepolicy/sepolicy-bash-completion.sh
> index 779fd75b..13638e4d 100644
> --- a/python/sepolicy/sepolicy-bash-completion.sh
> +++ b/python/sepolicy/sepolicy-bash-completion.sh
> @@ -36,10 +36,10 @@ __get_all_booleans () {
>  __get_all_types () {
>      seinfo -t 2> /dev/null | tail -n +3
>  }
> -__get_all_admin_interaces () {
> +__get_all_admin_interfaces () {
>      awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }'
>  }
> -__get_all_user_role_interaces () {
> +__get_all_user_role_interfaces () {
>      awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }'
>  }
>  __get_all_user_domains () {
> @@ -139,7 +139,7 @@ _sepolicy () {
>                  COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") )
>                  return 0
>              elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then
> -                COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") )
> +                COMPREPLY=( $(compgen -W "$( __get_all_admin_interfaces ) " -- "$cur") )
>                  return 0
>              elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then
>                  COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") )
> diff --git a/python/sepolicy/sepolicy/gui.py b/python/sepolicy/sepolicy/gui.py
> index c9ca158d..4f892f82 100644
> --- a/python/sepolicy/sepolicy/gui.py
> +++ b/python/sepolicy/sepolicy/gui.py
> @@ -1309,9 +1309,9 @@ class SELinuxGui():
>                  filename = i['filename']
>              else:
>                  filename = None
> -            self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename)
> +            self.transitions_files_initial_data_insert(i['target'], i['class'], i['transtype'], filename)
>
> -    def transitions_files_inital_data_insert(self, path, tclass, dest, name):
> +    def transitions_files_initial_data_insert(self, path, tclass, dest, name):
>          iter = self.transitions_file_liststore.append()
>          self.transitions_file_liststore.set_value(iter, 0, path)
>          self.transitions_file_liststore.set_value(iter, 1, tclass)
> --
> 2.35.1
>
James Carter April 12, 2022, 6:01 p.m. UTC | #2
On Tue, Apr 12, 2022 at 9:45 AM James Carter <jwcart2@gmail.com> wrote:
>
> On Fri, Apr 8, 2022 at 11:24 AM Christian Göttsche
> <cgzones@googlemail.com> wrote:
> >
> > Found by typos[1].
> >
> > [1]: https://github.com/crate-ci/typos
> >
> > Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
>
> Acked-by: James Carter <jwcart2@gmail.com>
>

Merged.
thanks,
Jim

> > ---
> >  libsemanage/src/genhomedircon.c             | 2 +-
> >  libsemanage/src/handle.h                    | 2 +-
> >  libsemanage/src/semanage_store.c            | 2 +-
> >  libsemanage/tests/test_iface.c              | 2 +-
> >  policycoreutils/newrole/newrole.pamd        | 2 +-
> >  policycoreutils/run_init/run_init.pamd      | 2 +-
> >  python/sepolgen/src/sepolgen/objectmodel.py | 2 +-
> >  python/sepolgen/src/sepolgen/refpolicy.py   | 2 +-
> >  python/sepolgen/tests/test_audit.py         | 2 +-
> >  python/sepolgen/tests/test_refpolicy.py     | 2 +-
> >  python/sepolicy/sepolicy-bash-completion.sh | 6 +++---
> >  python/sepolicy/sepolicy/gui.py             | 4 ++--
> >  12 files changed, 15 insertions(+), 15 deletions(-)
> >
> > diff --git a/libsemanage/src/genhomedircon.c b/libsemanage/src/genhomedircon.c
> > index 7ca9afc3..8f8774d3 100644
> > --- a/libsemanage/src/genhomedircon.c
> > +++ b/libsemanage/src/genhomedircon.c
> > @@ -490,7 +490,7 @@ static int STR_COMPARATOR(const void *a, const void *b)
> >         return strcmp((const char *) a, (const char *) b);
> >  }
> >
> > -/* make_tempate
> > +/* make_template
> >   * @param      s         the settings holding the paths to various files
> >   * @param      pred    function pointer to function to use as filter for slurp
> >   *                                     file filter
> > diff --git a/libsemanage/src/handle.h b/libsemanage/src/handle.h
> > index 4d2aae8f..c7f4e903 100644
> > --- a/libsemanage/src/handle.h
> > +++ b/libsemanage/src/handle.h
> > @@ -72,7 +72,7 @@ struct semanage_handle {
> >         int do_check_contexts;  /* whether to run setfiles check the file contexts file */
> >
> >         /* This timeout is used for transactions and waiting for lock
> > -          -1 means wait indefinetely
> > +          -1 means wait indefinitely
> >            0 means return immediately
> >            >0 means wait that many seconds */
> >         int timeout;
> > diff --git a/libsemanage/src/semanage_store.c b/libsemanage/src/semanage_store.c
> > index c6d2c5e7..14a0957a 100644
> > --- a/libsemanage/src/semanage_store.c
> > +++ b/libsemanage/src/semanage_store.c
> > @@ -1327,7 +1327,7 @@ static char **split_args(const char *arg0, char *arg_string,
> >                 goto cleanup;
> >         s = arg_string;
> >         /* parse the argument string one character at a time,
> > -        * repsecting quotes and other special characters */
> > +        * respecting quotes and other special characters */
> >         while (s != NULL && *s != '\0') {
> >                 switch (*s) {
> >                 case '\\':{
> > diff --git a/libsemanage/tests/test_iface.c b/libsemanage/tests/test_iface.c
> > index 434372f8..46937e10 100644
> > --- a/libsemanage/tests/test_iface.c
> > +++ b/libsemanage/tests/test_iface.c
> > @@ -47,7 +47,7 @@ void test_iface_get_set_msgcon(void);
> >  void test_iface_create(void);
> >  void test_iface_clone(void);
> >
> > -/* iterfaces_policy.h */
> > +/* interfaces_policy.h */
> >  void test_iface_query(void);
> >  void test_iface_exists(void);
> >  void test_iface_count(void);
> > diff --git a/policycoreutils/newrole/newrole.pamd b/policycoreutils/newrole/newrole.pamd
> > index de3582f3..683c5441 100644
> > --- a/policycoreutils/newrole/newrole.pamd
> > +++ b/policycoreutils/newrole/newrole.pamd
> > @@ -1,5 +1,5 @@
> >  #%PAM-1.0
> > -# Uncomment the next line if you do not want to enter your passwd everytime
> > +# Uncomment the next line if you do not want to enter your passwd every time
> >  # auth       sufficient   pam_rootok.so
> >  auth       include     system-auth
> >  account    include     system-auth
> > diff --git a/policycoreutils/run_init/run_init.pamd b/policycoreutils/run_init/run_init.pamd
> > index 1c323d20..ef460134 100644
> > --- a/policycoreutils/run_init/run_init.pamd
> > +++ b/policycoreutils/run_init/run_init.pamd
> > @@ -1,5 +1,5 @@
> >  #%PAM-1.0
> > -# Uncomment the next line if you do not want to enter your passwd everytime
> > +# Uncomment the next line if you do not want to enter your passwd every time
> >  #auth       sufficient   pam_rootok.so
> >  auth       include     system-auth
> >  account    include     system-auth
> > diff --git a/python/sepolgen/src/sepolgen/objectmodel.py b/python/sepolgen/src/sepolgen/objectmodel.py
> > index 84955f7c..ccce86c1 100644
> > --- a/python/sepolgen/src/sepolgen/objectmodel.py
> > +++ b/python/sepolgen/src/sepolgen/objectmodel.py
> > @@ -95,7 +95,7 @@ class PermMappings:
> >      """The information flow properties of a set of object classes and permissions.
> >
> >      PermMappings maps one or more classes and permissions to their PermMap objects
> > -    describing their information flow charecteristics.
> > +    describing their information flow characteristics.
> >      """
> >      def __init__(self):
> >          self.classes = { }
> > diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py
> > index 3e907e91..9cac1b95 100644
> > --- a/python/sepolgen/src/sepolgen/refpolicy.py
> > +++ b/python/sepolgen/src/sepolgen/refpolicy.py
> > @@ -34,7 +34,7 @@ import selinux
> >  # the data structures that we need for policy generation.
> >  #
> >
> > -# Constans for referring to fields
> > +# Constants for referring to fields
> >  SRC_TYPE  = 0
> >  TGT_TYPE  = 1
> >  OBJ_CLASS = 2
> > diff --git a/python/sepolgen/tests/test_audit.py b/python/sepolgen/tests/test_audit.py
> > index dbe6be2a..b659bf3b 100644
> > --- a/python/sepolgen/tests/test_audit.py
> > +++ b/python/sepolgen/tests/test_audit.py
> > @@ -230,7 +230,7 @@ class TestGeneration(unittest.TestCase):
> >
> >          self.assertEqual(len(avs), 1)
> >
> > -    def test_genaration_granted(self):
> > +    def test_generation_granted(self):
> >          parser = sepolgen.audit.AuditParser()
> >          parser.parse_string(granted1)
> >          avs = parser.to_access()
> > diff --git a/python/sepolgen/tests/test_refpolicy.py b/python/sepolgen/tests/test_refpolicy.py
> > index c7219fd5..a24381a6 100644
> > --- a/python/sepolgen/tests/test_refpolicy.py
> > +++ b/python/sepolgen/tests/test_refpolicy.py
> > @@ -144,7 +144,7 @@ class TestSecurityContext(unittest.TestCase):
> >          self.assertNotEqual(sc1, sc3)
> >          self.assertNotEqual(sc1, sc4)
> >
> > -class TestObjecClass(unittest.TestCase):
> > +class TestObjectClass(unittest.TestCase):
> >      def test_init(self):
> >          o = refpolicy.ObjectClass(name="file")
> >          self.assertEqual(o.name, "file")
> > diff --git a/python/sepolicy/sepolicy-bash-completion.sh b/python/sepolicy/sepolicy-bash-completion.sh
> > index 779fd75b..13638e4d 100644
> > --- a/python/sepolicy/sepolicy-bash-completion.sh
> > +++ b/python/sepolicy/sepolicy-bash-completion.sh
> > @@ -36,10 +36,10 @@ __get_all_booleans () {
> >  __get_all_types () {
> >      seinfo -t 2> /dev/null | tail -n +3
> >  }
> > -__get_all_admin_interaces () {
> > +__get_all_admin_interfaces () {
> >      awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }'
> >  }
> > -__get_all_user_role_interaces () {
> > +__get_all_user_role_interfaces () {
> >      awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }'
> >  }
> >  __get_all_user_domains () {
> > @@ -139,7 +139,7 @@ _sepolicy () {
> >                  COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") )
> >                  return 0
> >              elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then
> > -                COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") )
> > +                COMPREPLY=( $(compgen -W "$( __get_all_admin_interfaces ) " -- "$cur") )
> >                  return 0
> >              elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then
> >                  COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") )
> > diff --git a/python/sepolicy/sepolicy/gui.py b/python/sepolicy/sepolicy/gui.py
> > index c9ca158d..4f892f82 100644
> > --- a/python/sepolicy/sepolicy/gui.py
> > +++ b/python/sepolicy/sepolicy/gui.py
> > @@ -1309,9 +1309,9 @@ class SELinuxGui():
> >                  filename = i['filename']
> >              else:
> >                  filename = None
> > -            self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename)
> > +            self.transitions_files_initial_data_insert(i['target'], i['class'], i['transtype'], filename)
> >
> > -    def transitions_files_inital_data_insert(self, path, tclass, dest, name):
> > +    def transitions_files_initial_data_insert(self, path, tclass, dest, name):
> >          iter = self.transitions_file_liststore.append()
> >          self.transitions_file_liststore.set_value(iter, 0, path)
> >          self.transitions_file_liststore.set_value(iter, 1, tclass)
> > --
> > 2.35.1
> >
diff mbox series

Patch

diff --git a/libsemanage/src/genhomedircon.c b/libsemanage/src/genhomedircon.c
index 7ca9afc3..8f8774d3 100644
--- a/libsemanage/src/genhomedircon.c
+++ b/libsemanage/src/genhomedircon.c
@@ -490,7 +490,7 @@  static int STR_COMPARATOR(const void *a, const void *b)
 	return strcmp((const char *) a, (const char *) b);
 }
 
-/* make_tempate
+/* make_template
  * @param	s	  the settings holding the paths to various files
  * @param	pred	function pointer to function to use as filter for slurp
  * 					file filter
diff --git a/libsemanage/src/handle.h b/libsemanage/src/handle.h
index 4d2aae8f..c7f4e903 100644
--- a/libsemanage/src/handle.h
+++ b/libsemanage/src/handle.h
@@ -72,7 +72,7 @@  struct semanage_handle {
 	int do_check_contexts;	/* whether to run setfiles check the file contexts file */
 
 	/* This timeout is used for transactions and waiting for lock
-	   -1 means wait indefinetely
+	   -1 means wait indefinitely
 	   0 means return immediately
 	   >0 means wait that many seconds */
 	int timeout;
diff --git a/libsemanage/src/semanage_store.c b/libsemanage/src/semanage_store.c
index c6d2c5e7..14a0957a 100644
--- a/libsemanage/src/semanage_store.c
+++ b/libsemanage/src/semanage_store.c
@@ -1327,7 +1327,7 @@  static char **split_args(const char *arg0, char *arg_string,
 		goto cleanup;
 	s = arg_string;
 	/* parse the argument string one character at a time,
-	 * repsecting quotes and other special characters */
+	 * respecting quotes and other special characters */
 	while (s != NULL && *s != '\0') {
 		switch (*s) {
 		case '\\':{
diff --git a/libsemanage/tests/test_iface.c b/libsemanage/tests/test_iface.c
index 434372f8..46937e10 100644
--- a/libsemanage/tests/test_iface.c
+++ b/libsemanage/tests/test_iface.c
@@ -47,7 +47,7 @@  void test_iface_get_set_msgcon(void);
 void test_iface_create(void);
 void test_iface_clone(void);
 
-/* iterfaces_policy.h */
+/* interfaces_policy.h */
 void test_iface_query(void);
 void test_iface_exists(void);
 void test_iface_count(void);
diff --git a/policycoreutils/newrole/newrole.pamd b/policycoreutils/newrole/newrole.pamd
index de3582f3..683c5441 100644
--- a/policycoreutils/newrole/newrole.pamd
+++ b/policycoreutils/newrole/newrole.pamd
@@ -1,5 +1,5 @@ 
 #%PAM-1.0
-# Uncomment the next line if you do not want to enter your passwd everytime
+# Uncomment the next line if you do not want to enter your passwd every time
 # auth       sufficient   pam_rootok.so
 auth       include	system-auth
 account    include	system-auth
diff --git a/policycoreutils/run_init/run_init.pamd b/policycoreutils/run_init/run_init.pamd
index 1c323d20..ef460134 100644
--- a/policycoreutils/run_init/run_init.pamd
+++ b/policycoreutils/run_init/run_init.pamd
@@ -1,5 +1,5 @@ 
 #%PAM-1.0
-# Uncomment the next line if you do not want to enter your passwd everytime
+# Uncomment the next line if you do not want to enter your passwd every time
 #auth       sufficient   pam_rootok.so
 auth       include	system-auth
 account    include	system-auth
diff --git a/python/sepolgen/src/sepolgen/objectmodel.py b/python/sepolgen/src/sepolgen/objectmodel.py
index 84955f7c..ccce86c1 100644
--- a/python/sepolgen/src/sepolgen/objectmodel.py
+++ b/python/sepolgen/src/sepolgen/objectmodel.py
@@ -95,7 +95,7 @@  class PermMappings:
     """The information flow properties of a set of object classes and permissions.
 
     PermMappings maps one or more classes and permissions to their PermMap objects
-    describing their information flow charecteristics.
+    describing their information flow characteristics.
     """
     def __init__(self):
         self.classes = { }
diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py
index 3e907e91..9cac1b95 100644
--- a/python/sepolgen/src/sepolgen/refpolicy.py
+++ b/python/sepolgen/src/sepolgen/refpolicy.py
@@ -34,7 +34,7 @@  import selinux
 # the data structures that we need for policy generation.
 #
 
-# Constans for referring to fields
+# Constants for referring to fields
 SRC_TYPE  = 0
 TGT_TYPE  = 1
 OBJ_CLASS = 2
diff --git a/python/sepolgen/tests/test_audit.py b/python/sepolgen/tests/test_audit.py
index dbe6be2a..b659bf3b 100644
--- a/python/sepolgen/tests/test_audit.py
+++ b/python/sepolgen/tests/test_audit.py
@@ -230,7 +230,7 @@  class TestGeneration(unittest.TestCase):
 
         self.assertEqual(len(avs), 1)
 
-    def test_genaration_granted(self):
+    def test_generation_granted(self):
         parser = sepolgen.audit.AuditParser()
         parser.parse_string(granted1)
         avs = parser.to_access()
diff --git a/python/sepolgen/tests/test_refpolicy.py b/python/sepolgen/tests/test_refpolicy.py
index c7219fd5..a24381a6 100644
--- a/python/sepolgen/tests/test_refpolicy.py
+++ b/python/sepolgen/tests/test_refpolicy.py
@@ -144,7 +144,7 @@  class TestSecurityContext(unittest.TestCase):
         self.assertNotEqual(sc1, sc3)
         self.assertNotEqual(sc1, sc4)
 
-class TestObjecClass(unittest.TestCase):
+class TestObjectClass(unittest.TestCase):
     def test_init(self):
         o = refpolicy.ObjectClass(name="file")
         self.assertEqual(o.name, "file")
diff --git a/python/sepolicy/sepolicy-bash-completion.sh b/python/sepolicy/sepolicy-bash-completion.sh
index 779fd75b..13638e4d 100644
--- a/python/sepolicy/sepolicy-bash-completion.sh
+++ b/python/sepolicy/sepolicy-bash-completion.sh
@@ -36,10 +36,10 @@  __get_all_booleans () {
 __get_all_types () {
     seinfo -t 2> /dev/null | tail -n +3
 }
-__get_all_admin_interaces () {
+__get_all_admin_interfaces () {
     awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }'
 }
-__get_all_user_role_interaces () {
+__get_all_user_role_interfaces () {
     awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }'
 }
 __get_all_user_domains () {
@@ -139,7 +139,7 @@  _sepolicy () {
                 COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") )
                 return 0
             elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then
-                COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") )
+                COMPREPLY=( $(compgen -W "$( __get_all_admin_interfaces ) " -- "$cur") )
                 return 0
             elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then
                 COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") )
diff --git a/python/sepolicy/sepolicy/gui.py b/python/sepolicy/sepolicy/gui.py
index c9ca158d..4f892f82 100644
--- a/python/sepolicy/sepolicy/gui.py
+++ b/python/sepolicy/sepolicy/gui.py
@@ -1309,9 +1309,9 @@  class SELinuxGui():
                 filename = i['filename']
             else:
                 filename = None
-            self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename)
+            self.transitions_files_initial_data_insert(i['target'], i['class'], i['transtype'], filename)
 
-    def transitions_files_inital_data_insert(self, path, tclass, dest, name):
+    def transitions_files_initial_data_insert(self, path, tclass, dest, name):
         iter = self.transitions_file_liststore.append()
         self.transitions_file_liststore.set_value(iter, 0, path)
         self.transitions_file_liststore.set_value(iter, 1, tclass)