Merge pull request #293 from cgzones/spelling

Fix several misspellings
This commit is contained in:
Chris PeBenito 2020-08-13 08:55:28 -04:00 committed by GitHub
commit 5d6f436800
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
33 changed files with 54 additions and 54 deletions

View File

@ -2,7 +2,7 @@
########################################
## <summary>
## Dontaudit acces to the swap file.
## Dontaudit access to the swap file.
## </summary>
## <param name="domain">
## <summary>

View File

@ -120,7 +120,7 @@ interface(`firstboot_rw_pipes',`
########################################
## <summary>
## Do not audit attemps to read and
## Do not audit attempts to read and
## write firstboot unnamed pipes.
## </summary>
## <param name="domain">
@ -139,7 +139,7 @@ interface(`firstboot_dontaudit_rw_pipes',`
########################################
## <summary>
## Do not audit attemps to read and
## Do not audit attempts to read and
## write firstboot unix domain
## stream sockets.
## </summary>

View File

@ -21,7 +21,7 @@ allow cryfs_t self:capability { dac_read_search sys_admin };
allow cryfs_t self:process { getsched signal };
allow cryfs_t self:fifo_file rw_fifo_file_perms;
# CryFS 0.9.10 can check for updates everytime it runs, if it is not compiled with CRYFS_NO_UPDATE_CHECKS (option -DCRYFS_UPDATE_CHECKS=off).
# CryFS 0.9.10 can check for updates every time it runs, if it is not compiled with CRYFS_NO_UPDATE_CHECKS (option -DCRYFS_UPDATE_CHECKS=off).
# When update checks are disabled (for example with Debian package), libcurl is nonetheless initialized.
# curl_global_init() calls Curl_ipv6works(), which uses socket(PF_INET6, SOCK_DGRAM, 0) to check for IPv6 support.
# Hide this useless access.

View File

@ -11,7 +11,7 @@
########################################
## <summary>
## Make the specified type usable for files
## that are exectuables, such as binary programs.
## that are executables, such as binary programs.
## This does not include shared libraries.
## </summary>
## <param name="type">
@ -32,7 +32,7 @@ interface(`corecmd_executable_file',`
########################################
## <summary>
## Make general progams in bin an entrypoint for
## Make general programs in bin an entrypoint for
## the specified domain.
## </summary>
## <param name="domain">
@ -303,7 +303,7 @@ interface(`corecmd_read_bin_sockets',`
## </p>
## <p>
## Typically, this interface should be used when the domain
## executes general system progams within the privileges
## executes general system programs within the privileges
## of the source domain. Some examples of these programs
## are ls, cp, sed, python, and tar. This does not include
## shells, such as bash.

View File

@ -2738,7 +2738,7 @@ interface(`corenet_dontaudit_raw_recvfrom_unlabeled',`
## Allow the specified domain to receive packets from an
## unlabeled connection. On machines that do not utilize
## labeled networking, this will be required on all
## networking domains. On machines tha do utilize
## networking domains. On machines that do utilize
## labeled networking, this will be required for any
## networking domain that is allowed to receive
## network traffic that does not have a label.

View File

@ -211,7 +211,7 @@ ifdef(`distro_debian',`
/etc/udev/devices -d gen_context(system_u:object_r:device_t,s0)
# used by init scripts to initally populate udev /dev
# used by init scripts to initially populate udev /dev
/usr/lib/udev/devices(/.*)? gen_context(system_u:object_r:device_t,s0)
/usr/lib/udev/devices/lp.* -c gen_context(system_u:object_r:printer_device_t,s0)
/usr/lib/udev/devices/null -c gen_context(system_u:object_r:null_device_t,s0)

View File

@ -185,7 +185,7 @@ interface(`domain_dyntrans_type',`
########################################
## <summary>
## Makes caller and execption to the constraint
## Makes caller and exception to the constraint
## preventing changing to the system user
## identity and system role.
## </summary>
@ -1040,7 +1040,7 @@ interface(`domain_dontaudit_rw_all_udp_sockets',`
########################################
## <summary>
## Do not audit attempts to get attribues of
## Do not audit attempts to get attributes of
## all domains IPSEC key management sockets.
## </summary>
## <param name="domain">
@ -1059,7 +1059,7 @@ interface(`domain_dontaudit_getattr_all_key_sockets',`
########################################
## <summary>
## Do not audit attempts to get attribues of
## Do not audit attempts to get attributes of
## all domains packet sockets.
## </summary>
## <param name="domain">
@ -1078,7 +1078,7 @@ interface(`domain_dontaudit_getattr_all_packet_sockets',`
########################################
## <summary>
## Do not audit attempts to get attribues of
## Do not audit attempts to get attributes of
## all domains raw sockets.
## </summary>
## <param name="domain">

View File

@ -5908,7 +5908,7 @@ interface(`files_read_var_lib_symlinks',`
')
# cjp: the next two interfaces really need to be fixed
# in some way. They really neeed their own types.
# in some way. They really need their own types.
########################################
## <summary>
@ -7030,7 +7030,7 @@ interface(`files_manage_all_runtime_dirs',`
## </summary>
## <param name="domain">
## <summary>
## Domain alloed access.
## Domain allowed access.
## </summary>
## </param>
#
@ -7151,7 +7151,7 @@ interface(`files_delete_all_runtime_files',`
## </summary>
## <param name="domain">
## <summary>
## Domain alloed access.
## Domain allowed access.
## </summary>
## </param>
#
@ -7207,7 +7207,7 @@ interface(`files_delete_all_runtime_symlinks',`
## </summary>
## <param name="domain">
## <summary>
## Domain alloed access.
## Domain allowed access.
## </summary>
## </param>
#
@ -7225,7 +7225,7 @@ interface(`files_manage_all_runtime_symlinks',`
## </summary>
## <param name="domain">
## <summary>
## Domain alloed access.
## Domain allowed access.
## </summary>
## </param>
#
@ -7317,7 +7317,7 @@ interface(`files_delete_all_runtime_sockets',`
## </summary>
## <param name="domain">
## <summary>
## Domain alloed access.
## Domain allowed access.
## </summary>
## </param>
#
@ -7472,7 +7472,7 @@ interface(`files_delete_all_pid_dirs',`
## </summary>
## <param name="domain">
## <summary>
## Domain alloed access.
## Domain allowed access.
## </summary>
## </param>
#
@ -7489,7 +7489,7 @@ interface(`files_manage_all_pids',`
## </summary>
## <param name="domain">
## <summary>
## Domain alloed access.
## Domain allowed access.
## </summary>
## </param>
#
@ -7504,7 +7504,7 @@ interface(`files_relabel_all_pid_dirs',`
## </summary>
## <param name="domain">
## <summary>
## Domain alloed access.
## Domain allowed access.
## </summary>
## </param>
#
@ -7519,7 +7519,7 @@ interface(`files_relabel_all_pid_sock_files',`
## </summary>
## <param name="domain">
## <summary>
## Domain alloed access.
## Domain allowed access.
## </summary>
## </param>
#

View File

@ -168,7 +168,7 @@ type var_lib_t;
files_mountpoint(var_lib_t)
#
# var_lock_t is tye type of /var/lock
# var_lock_t is the type of /var/lock
#
type var_lock_t;
files_lock_file(var_lock_t)

View File

@ -1529,7 +1529,7 @@ interface(`fs_manage_noxattr_fs_symlinks',`
########################################
## <summary>
## Relabel all objets from filesystems that
## Relabel all objects from filesystems that
## do not support extended attributes.
## </summary>
## <param name="domain">

View File

@ -1251,7 +1251,7 @@ interface(`kernel_rw_software_raid_state',`
########################################
## <summary>
## Allows caller to get attribues of core kernel interface.
## Allows caller to get attributes of core kernel interface.
## </summary>
## <param name="domain">
## <summary>
@ -2270,7 +2270,7 @@ interface(`kernel_read_fs_sysctls',`
########################################
## <summary>
## Read and write fileystem sysctls.
## Read and write filesystem sysctls.
## </summary>
## <param name="domain">
## <summary>
@ -3258,7 +3258,7 @@ interface(`kernel_relabelfrom_unlabeled_chr_devs',`
## unlabeled IPSEC association. Network
## connections that are not protected
## by IPSEC have use an unlabeled
## assocation.
## association.
## </p>
## <p>
## The corenetwork interface
@ -3291,7 +3291,7 @@ interface(`kernel_sendrecv_unlabeled_association',`
## from an unlabeled IPSEC association. Network
## connections that are not protected
## by IPSEC have use an unlabeled
## assocation.
## association.
## </p>
## <p>
## The corenetwork interface

View File

@ -517,7 +517,7 @@ if( ! secure_mode_insmod ) {
########################################
#
# Rules for unconfined acccess to this module
# Rules for unconfined access to this module
#
allow kern_unconfined proc_type:dir { manage_dir_perms relabelfrom relabelto append map execute quotaon mounton audit_access execmod watch };

View File

@ -828,7 +828,7 @@ interface(`mls_fd_use_all_levels',`
########################################
## <summary>
## Make the file descriptors from the
## specifed domain inheritable by
## specified domain inheritable by
## all levels.
## </summary>
## <param name="domain">

View File

@ -534,7 +534,7 @@ interface(`storage_write_scsi_generic',`
########################################
## <summary>
## Set attributes of the device nodes
## for the SCSI generic inerface.
## for the SCSI generic interface.
## </summary>
## <param name="domain">
## <summary>

View File

@ -323,7 +323,7 @@ interface(`term_use_console',`
########################################
## <summary>
## Do not audit attemtps to read from
## Do not audit attempts to read from
## or write to the console.
## </summary>
## <param name="domain">

View File

@ -1,4 +1,4 @@
## <summary>Least privledge terminal user role.</summary>
## <summary>Least privilege terminal user role.</summary>
########################################
## <summary>

View File

@ -1,4 +1,4 @@
## <summary>Least privledge xwindows user role.</summary>
## <summary>Least privilege xwindows user role.</summary>
########################################
## <summary>

View File

@ -108,7 +108,7 @@ gen_tunable(httpd_dbus_avahi, false)
## <desc>
## <p>
## Determine wether httpd can use support.
## Determine whether httpd can use support.
## </p>
## </desc>
gen_tunable(httpd_enable_cgi, false)

View File

@ -104,7 +104,7 @@ miscfiles_read_localization(couchdb_t)
#
# this is a complete policy. It processes the javascript
# ouside the main process, passing data via FIFO.
# outside the main process, passing data via FIFO.
allow couchdb_js_t self:process { execmem getsched setsched };
files_read_usr_files(couchdb_js_t)

View File

@ -296,7 +296,7 @@ interface(`cron_admin_role',`
########################################
## <summary>
## Make the specified program domain
## accessable from the system cron jobs.
## accessible from the system cron jobs.
## </summary>
## <param name="domain">
## <summary>

View File

@ -113,7 +113,7 @@ interface(`mailman_domtrans_cgi',`
## </summary>
## <param name="domain">
## <summary>
## Domain allowd access.
## Domain allowed access.
## </summary>
## </param>
#

View File

@ -69,7 +69,7 @@ interface(`nis_use_ypbind_uncond',`
## <p>
## Allow the specified domain to use the ypbind service
## to access Network Information Service (NIS) services.
## Information that can be retreived from NIS includes
## Information that can be retrieved from NIS includes
## usernames, passwords, home directories, and groups.
## If the network is configured to have a single sign-on
## using NIS, it is likely that any program that does

View File

@ -22,7 +22,7 @@ interface(`oddjob_domtrans',`
########################################
## <summary>
## Make the specified program domain
## accessable from the oddjob.
## accessible from the oddjob.
## </summary>
## <param name="domain">
## <summary>

View File

@ -179,7 +179,7 @@ interface(`rhsmcertd_manage_lib_dirs',`
########################################
## <summary>
## Read rhsmcertd pid files. (Deprectated)
## Read rhsmcertd pid files. (Deprecated)
## </summary>
## <param name="domain">
## <summary>

View File

@ -61,7 +61,7 @@ interface(`ricci_dontaudit_use_modcluster_fds',`
########################################
## <summary>
## Do not audit attempts to read write
## ricci modcluster unamed pipes.
## ricci modcluster unnamed pipes.
## </summary>
## <param name="domain">
## <summary>

View File

@ -1,4 +1,4 @@
## <summary>Shibboleth authentication deamon</summary>
## <summary>Shibboleth authentication daemon</summary>
########################################
## <summary>

View File

@ -24,7 +24,7 @@ interface(`application_type',`
########################################
## <summary>
## Make the specified type usable for files
## that are exectuables, such as binary programs.
## that are executables, such as binary programs.
## This does not include shared libraries.
## </summary>
## <param name="type">

View File

@ -1098,7 +1098,7 @@ interface(`auth_read_pam_pid',`
#######################################
## <summary>
## Do not audit attemps to read PAM PID files. (Deprecated)
## Do not audit attempts to read PAM PID files. (Deprecated)
## </summary>
## <param name="domain">
## <summary>
@ -1241,7 +1241,7 @@ interface(`auth_read_pam_runtime_files',`
#######################################
## <summary>
## Do not audit attemps to read PAM runtime files.
## Do not audit attempts to read PAM runtime files.
## </summary>
## <param name="domain">
## <summary>
@ -1554,7 +1554,7 @@ interface(`auth_run_utempter',`
#######################################
## <summary>
## Do not audit attemps to execute utempter executable.
## Do not audit attempts to execute utempter executable.
## </summary>
## <param name="domain">
## <summary>

View File

@ -146,6 +146,6 @@ optional_policy(`
optional_policy(`
udev_read_db(iptables_t)
# this is for iptables_t to inherit a file hande from xen vif-bridge
# this is for iptables_t to inherit a file handle from xen vif-bridge
udev_manage_runtime_files(iptables_t)
')

View File

@ -997,7 +997,7 @@ interface(`logging_dontaudit_getattr_all_logs',`
########################################
## <summary>
## Read the atttributes of any log file
## Read the attributes of any log file
## </summary>
## <param name="domain">
## <summary>

View File

@ -51,7 +51,7 @@ template(`systemd_role_template',`
allow $3 systemd_user_runtime_notify_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
# This domain is per-role because of the below transitions.
# See the sytemd --user section of systemd.te for the
# See the systemd --user section of systemd.te for the
# remainder of the rules.
allow $1_systemd_t $3:process { setsched rlimitinh };
corecmd_shell_domtrans($1_systemd_t, $3)

View File

@ -480,7 +480,7 @@ optional_policy(`
######################################
#
# systemd log parse enviroment
# systemd log parse environment
#
# Do not audit setsockopt(fd, SOL_SOCKET, SO_SNDBUFFORCE, ...) failure (e.g. when using create_log_socket() internal function)

View File

@ -78,7 +78,7 @@ def getModuleXML(file_name):
module_te = "%s/%s.te" % (module_dir, module_name)
module_if = "%s/%s.if" % (module_dir, module_name)
# Try to open the file, if it cant, just ignore it.
# Try to open the file, if it can't, just ignore it.
try:
module_file = open(module_if, "r")
module_code = module_file.readlines()
@ -201,7 +201,7 @@ def getTunableXML(file_name, kind):
Return all the XML for the tunables/bools in the file specified.
'''
# Try to open the file, if it cant, just ignore it.
# Try to open the file, if it can't, just ignore it.
try:
tunable_file = open(file_name, "r")
tunable_code = tunable_file.readlines()