aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNicolas Iooss <nicolas.iooss@m4x.org>2016-01-18 23:47:56 +0100
committerJason Zaman <jason@perfinion.com>2016-01-31 01:16:57 +0800
commit9127acb6b3ccf559c18c3cf06f64649553ab3c3b (patch)
tree978eccd84545b39fb26fa81b658a6a5996bd2181
parentFix typos in comments from corenetwork module (diff)
downloadhardened-refpolicy-9127acb6.tar.gz
hardened-refpolicy-9127acb6.tar.bz2
hardened-refpolicy-9127acb6.zip
man: Spelling fixes
These typos have been initially reported as a GitHub Pull Request (https://github.com/TresysTechnology/refpolicy/pull/7) but the original author closed the PR without waiting for it to be merged.
-rw-r--r--man/man8/git_selinux.82
-rw-r--r--man/man8/httpd_selinux.82
2 files changed, 2 insertions, 2 deletions
diff --git a/man/man8/git_selinux.8 b/man/man8/git_selinux.8
index e9c43b190..c2142e04e 100644
--- a/man/man8/git_selinux.8
+++ b/man/man8/git_selinux.8
@@ -64,7 +64,7 @@ To allow the Git System daemon mass hosting of users personal repositories you c
sudo setsebool -P git_session_bind_all_unreserved_ports 1
.EE
.SH GIT_SHELL
-The Git policy by default provides a restricted user environment to be used with "Git shell". This default git_shell_u SELinux user can modify and execute generic Git system content (generic system shared respositories with type git_system_content_t).
+The Git policy by default provides a restricted user environment to be used with "Git shell". This default git_shell_u SELinux user can modify and execute generic Git system content (generic system shared repositories with type git_system_content_t).
.PP
To add a new Linux user and map him to this Git shell user domain automatically:
.EX
diff --git a/man/man8/httpd_selinux.8 b/man/man8/httpd_selinux.8
index 16e8b1323..93c4a0a5e 100644
--- a/man/man8/httpd_selinux.8
+++ b/man/man8/httpd_selinux.8
@@ -88,7 +88,7 @@ setsebool -P httpd_unified 0
.EE
.PP
-SELinu policy for httpd can be configured to turn on sending email. This is a security feature, since it would prevent a vulnerabiltiy in http from causing a spam attack. I certain situations, you may want http modules to send mail. You can turn on the httpd_send_mail boolean.
+SELinux policy for httpd can be configured to turn on sending email. This is a security feature, since it would prevent a vulnerability in http from causing a spam attack. I certain situations, you may want http modules to send mail. You can turn on the httpd_send_mail boolean.
.EX
setsebool -P httpd_can_sendmail 1