Fix typos

Typos found with codespell.

Signed-off-by: Samanta Navarro <ferivoz@riseup.net>
This commit is contained in:
Samanta Navarro 2022-12-30 11:51:29 +00:00 committed by Serge Hallyn
parent 194014678e
commit b312bc0b4d
6 changed files with 11 additions and 11 deletions

View File

@ -60,7 +60,7 @@
** Added in the password date field, which should always reflect the last ** Added in the password date field, which should always reflect the last
** date the password was changed, for expiry purposes. "passwd" always ** date the password was changed, for expiry purposes. "passwd" always
** updates this field, so the adduser program should set it up right ** updates this field, so the adduser program should set it up right
** initially (or a user could keep thier initial password forever ;) ** initially (or a user could keep their initial password forever ;)
** The number is in days since Jan 1st, 1970. ** The number is in days since Jan 1st, 1970.
** **
** Have fun with it, and someone please make ** Have fun with it, and someone please make

View File

@ -2,6 +2,6 @@
#define _SHADOWLOG_INTERNAL_H #define _SHADOWLOG_INTERNAL_H
extern const char *shadow_progname; /* Program name showed in error messages */ extern const char *shadow_progname; /* Program name showed in error messages */
extern FILE *shadow_logfd; /* file descripter to which error messages are printed */ extern FILE *shadow_logfd; /* file descriptor to which error messages are printed */
#endif /* _SHADOWLOG_INTERNAL_H */ #endif /* _SHADOWLOG_INTERNAL_H */

View File

@ -985,7 +985,7 @@ bool new_subid_range(struct subordinate_range *range, enum subid_type id_type, b
switch (id_type) { switch (id_type) {
case ID_TYPE_UID: case ID_TYPE_UID:
if (!sub_uid_lock()) { if (!sub_uid_lock()) {
printf("Failed loging subuids (errno %d)\n", errno); printf("Failed locking subuids (errno %d)\n", errno);
return false; return false;
} }
if (!sub_uid_open(O_CREAT | O_RDWR)) { if (!sub_uid_open(O_CREAT | O_RDWR)) {
@ -997,7 +997,7 @@ bool new_subid_range(struct subordinate_range *range, enum subid_type id_type, b
break; break;
case ID_TYPE_GID: case ID_TYPE_GID:
if (!sub_gid_lock()) { if (!sub_gid_lock()) {
printf("Failed loging subgids (errno %d)\n", errno); printf("Failed locking subgids (errno %d)\n", errno);
return false; return false;
} }
if (!sub_gid_open(O_CREAT | O_RDWR)) { if (!sub_gid_open(O_CREAT | O_RDWR)) {
@ -1057,7 +1057,7 @@ bool release_subid_range(struct subordinate_range *range, enum subid_type id_typ
switch (id_type) { switch (id_type) {
case ID_TYPE_UID: case ID_TYPE_UID:
if (!sub_uid_lock()) { if (!sub_uid_lock()) {
printf("Failed loging subuids (errno %d)\n", errno); printf("Failed locking subuids (errno %d)\n", errno);
return false; return false;
} }
if (!sub_uid_open(O_CREAT | O_RDWR)) { if (!sub_uid_open(O_CREAT | O_RDWR)) {
@ -1069,7 +1069,7 @@ bool release_subid_range(struct subordinate_range *range, enum subid_type id_typ
break; break;
case ID_TYPE_GID: case ID_TYPE_GID:
if (!sub_gid_lock()) { if (!sub_gid_lock()) {
printf("Failed loging subgids (errno %d)\n", errno); printf("Failed locking subgids (errno %d)\n", errno);
return false; return false;
} }
if (!sub_gid_open(O_CREAT | O_RDWR)) { if (!sub_gid_open(O_CREAT | O_RDWR)) {

View File

@ -562,7 +562,7 @@
<varlistentry condition="gshadow"> <varlistentry condition="gshadow">
<term><filename>/etc/gshadow</filename></term> <term><filename>/etc/gshadow</filename></term>
<listitem> <listitem>
<para>Secure group account informatio.</para> <para>Secure group account information</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
<varlistentry> <varlistentry>

View File

@ -396,7 +396,7 @@ int main (int argc, char **argv)
(void) textdomain (PACKAGE); (void) textdomain (PACKAGE);
/* /*
* Save my name for error messages and save my real gid incase of * Save my name for error messages and save my real gid in case of
* errors. If there is an error i have to exec a new login shell for * errors. If there is an error i have to exec a new login shell for
* the user since her old shell won't have fork'd to create the * the user since her old shell won't have fork'd to create the
* process. Skip over the program name to the next command line * process. Skip over the program name to the next command line
@ -625,7 +625,7 @@ int main (int argc, char **argv)
} }
#endif /* HAVE_SETGROUPS */ #endif /* HAVE_SETGROUPS */
/* /*
* For splitted groups (due to limitations of NIS), check all * For split groups (due to limitations of NIS), check all
* groups of the same GID like the requested group for * groups of the same GID like the requested group for
* membership of the current user. * membership of the current user.
*/ */

View File

@ -409,7 +409,7 @@ static void get_defaults (void)
if (MATCH (buf, DGROUPS)) { if (MATCH (buf, DGROUPS)) {
if (get_groups (cp) != 0) { if (get_groups (cp) != 0) {
fprintf (stderr, fprintf (stderr,
_("%s: the '%s' configuraton in %s has an invalid group, ignoring the bad group\n"), _("%s: the '%s' configuration in %s has an invalid group, ignoring the bad group\n"),
Prog, DGROUPS, default_file); Prog, DGROUPS, default_file);
} }
if (user_groups[0] != NULL) { if (user_groups[0] != NULL) {
@ -2323,7 +2323,7 @@ static void create_home (void)
strcat (path, cp); strcat (path, cp);
if (access (path, F_OK) != 0) { if (access (path, F_OK) != 0) {
/* Check if parent directory is BTRFS, fail if requesting /* Check if parent directory is BTRFS, fail if requesting
subvolume but no BTRFS. The paths cound be different by the subvolume but no BTRFS. The paths could be different by the
trailing slash trailing slash
*/ */
#if WITH_BTRFS #if WITH_BTRFS