2
0
mirror of https://github.com/sudo-project/sudo.git synced 2025-08-22 01:49:11 +00:00

Style fixes from Bjarni Ingi Gislason.

This commit is contained in:
Todd C. Miller 2025-02-22 15:31:21 -07:00
parent b04386f631
commit 3ba525a348
2 changed files with 85 additions and 85 deletions

View File

@ -25,7 +25,7 @@
.nr BA @BAMAN@
.nr LC @LCMAN@
.nr PS @PSMAN@
.TH "SUDOERS" "@mansectform@" "February 14, 2025" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.TH "SUDOERS" "@mansectform@" "February 22, 2025" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.nh
.if n .ad l
.SH "NAME"
@ -672,16 +672,16 @@ Resource limits may also be set in the
\fIsudoers\fR
file itself, in which case they override those set by the system.
See the
\fIrlimit_as,\fR
\fIrlimit_core,\fR
\fIrlimit_cpu,\fR
\fIrlimit_data,\fR
\fIrlimit_fsize,\fR
\fIrlimit_locks,\fR
\fIrlimit_memlock,\fR
\fIrlimit_nofile,\fR
\fIrlimit_nproc,\fR
\fIrlimit_rss,\fR
\fIrlimit_as\fR,
\fIrlimit_core\fR,
\fIrlimit_cpu\fR,
\fIrlimit_data\fR,
\fIrlimit_fsize\fR,
\fIrlimit_locks\fR,
\fIrlimit_memlock\fR,
\fIrlimit_nofile\fR,
\fIrlimit_nproc\fR,
\fIrlimit_rss\fR,
\fIrlimit_stack\fR
options described below.
Resource limits in
@ -805,7 +805,7 @@ Cmnd_Alias ::= NAME
Cmnd_Alias_Spec ::= Cmnd_Alias '=' Cmnd_List
NAME ::= [A-Z]([A-Z][0-9]_)*
NAME ::= [A\(enZ]([A\(enZ][0\(en9]_)*
.RE
.fi
.PP
@ -1038,8 +1038,8 @@ only the case for non-networked systems.
.nf
.sp
.RS 0n
digest ::= [A-Fa-f0-9]+ |
[A-Za-z0-9\e+/=]+
digest ::= [A\(enFa\(enf0\(en9]+ |
[A\(enZa\(enz0\(en9\e+/=]+
Digest_Spec ::= "sha224" ':' digest |
"sha256" ':' digest |
@ -1225,7 +1225,7 @@ For example, using openssl:
.nf
.sp
.RS 0n
$ openssl dgst -sha224 /bin/ls
$ openssl dgst \-sha224 /bin/ls
SHA224(/bin/ls)= 118187da8364d490b4a7debbf483004e8f3e053ec954309de2c41a25
.RE
.fi
@ -1234,7 +1234,7 @@ It is also possible to use openssl to generate base64 output:
.nf
.sp
.RS 0n
$ openssl dgst -binary -sha224 /bin/ls | openssl base64
$ openssl dgst \-binary \-sha224 /bin/ls | openssl base64
EYGH2oNk1JC0p9679IMATo8+BT7JVDCd4sQaJQ==
.RE
.fi
@ -1509,7 +1509,7 @@ For example:
.nf
.sp
.RS 0n
$ sudo -u operator /bin/ls
$ sudo \-u operator /bin/ls
.RE
.fi
.PP
@ -1564,9 +1564,9 @@ The following would all be permitted by the sudoers entry above:
.nf
.sp
.RS 0n
$ sudo -u operator /bin/ls
$ sudo -u operator -g operator /bin/ls
$ sudo -g operator /bin/ls
$ sudo \-u operator /bin/ls
$ sudo \-u operator \-g operator /bin/ls
$ sudo \-g operator /bin/ls
.RE
.fi
.PP
@ -1588,7 +1588,7 @@ For example:
.nf
.sp
.RS 0n
$ sudo -g dialer /usr/bin/cu
$ sudo \-g dialer /usr/bin/cu
.RE
.fi
.PP
@ -1729,7 +1729,7 @@ For example:
.nf
.sp
.RS 0n
$ ppriv -l
$ ppriv \-l
.RE
.fi
.PP
@ -1776,7 +1776,7 @@ It is also possible to specify a timezone offset from UTC in hours
and minutes instead of a
\(oqZ\(cq.
For example,
\(oq-0500\(cq
\(oq\-0500\(cq
would correspond to Eastern Standard time in the US.
As an extension, if no
\(oqZ\(cq
@ -2083,10 +2083,10 @@ By default, if the
\fRNOPASSWD\fR
tag is applied to any of a user's entries for the current host,
the user will be able to run
\(oqsudo -l\(cq
\(oqsudo \-l\(cq
without a password.
Additionally, a user may only run
\(oqsudo -v\(cq
\(oqsudo \-v\(cq
without a password if all of the user's entries for the current
host have the
\fRNOPASSWD\fR
@ -2338,7 +2338,7 @@ This kind of rule is impossible to express safely using wildcards.
.nf
.sp
.RS 4n
john ALL = /usr/bin/passwd ^[a-zA-Z0-9_]+$,\e
john ALL = /usr/bin/passwd ^[a\-zA\-Z0\-9_]+$,\e
!/usr/bin/passwd root
.RE
.fi
@ -4265,7 +4265,7 @@ if one exists.
Only available if
\fBsudo\fR
is configured with the
\fR--with-logincap\fR
\fR\-\-with-logincap\fR
option.
This flag is
\fIoff\fR
@ -4373,7 +4373,7 @@ closefrom
Before it executes a command,
\fBsudo\fR
will close all open file descriptors other than standard input,
standard output, and standard error (file descriptors 0-2).
standard output, and standard error (file descriptors 0\(en2).
The
\fIclosefrom\fR
option can be used to specify a different file descriptor at which
@ -4484,9 +4484,9 @@ Set this to 0 to always prompt for a password.
If set to a value less than 0 the user's time stamp will not expire
until the system is rebooted.
This can be used to allow users to create or delete their own time stamps via
\(oqsudo -v\(cq
\(oqsudo \-v\(cq
and
\(oqsudo -k\(cq
\(oqsudo \-k\(cq
respectively.
.TP 18n
umask
@ -5169,7 +5169,7 @@ groups runs
Only available if
\fBsudo\fR
is configured with the
\fR--enable-admin-flag\fR
\fR\-\-enable-admin-flag\fR
option.
The default value is
\fI~/.sudo_as_admin_successful\fR.
@ -5866,7 +5866,7 @@ single value without double-quotes.
The list can be replaced, added to, deleted from, or disabled by using the
\(oq=\(cq,
\(oq+=\(cq,
\(oq-=\(cq,
\(oq\-=\(cq,
and
\(oq\&!\(cq
operators respectively.
@ -5893,7 +5893,7 @@ single value without double-quotes.
The list can be replaced, added to, deleted from, or disabled by using the
\(oq=\(cq,
\(oq+=\(cq,
\(oq-=\(cq,
\(oq\-=\(cq,
and
\(oq\&!\(cq
operators respectively.
@ -6542,7 +6542,7 @@ statement is never executed.
.nf
.sp
.RS 4n
$ sh -s < test.sh
$ sh \-s < test.sh
testing
.RE
.fi
@ -6615,7 +6615,7 @@ flag or the
command tag will enable
\fIlog_stdout\fR
and
\fIlog_stderr.\fR
\fIlog_stderr\fR.
Careful ordering of rules may be necessary to achieve the results
that you expect.
.SS "I/O log format"
@ -6774,7 +6774,7 @@ No post-processing is performed.
For manual viewing, you may wish to convert carriage return characters
in the log to line feeds.
For example:
\(oqgunzip -c ttyin | tr \&"\er\&" \&"\en\&"\(cq
\(oqgunzip \-c ttyin | tr \&"\er\&" \&"\en\&"\(cq
.TP 10n
\fIstdin\fR
The standard input when no terminal is present, or input redirected from
@ -7108,7 +7108,7 @@ to operator.
.nf
.sp
.RS 0n
pete HPPA = /usr/bin/passwd [A-Za-z]*, !/usr/bin/passwd *root*
pete HPPA = /usr/bin/passwd [A\-Za\-z]*, !/usr/bin/passwd *root*
%opers ALL = (: ADMINGRP) /usr/sbin/
.RE
@ -7153,7 +7153,7 @@ As a result, this rule will also allow:
.nf
.sp
.RS 4n
passwd username --expire
passwd username \-\-expire
.RE
.fi
.PP
@ -7225,7 +7225,7 @@ without giving a password.
.nf
.sp
.RS 0n
john ALPHA = /usr/bin/su [!-]*, !/usr/bin/su *root*
john ALPHA = /usr/bin/su [!\-]*, !/usr/bin/su *root*
.RE
.fi
.PP
@ -7318,7 +7318,7 @@ to www.
.sp
.RS 0n
ALL CDROM = NOPASSWD: /sbin/umount /CDROM,\e
/sbin/mount -o nosuid\e,nodev /dev/cd0a /CDROM
/sbin/mount \-o nosuid\e,nodev /dev/cd0a /CDROM
.RE
.fi
.PP
@ -7382,8 +7382,8 @@ file entry:
.nf
.sp
.RS 0n
john ALL = /usr/bin/passwd [a-zA-Z0-9]*, /usr/bin/chsh [a-zA-Z0-9]*,\e
/usr/bin/chfn [a-zA-Z0-9]*, !/usr/bin/* root
john ALL = /usr/bin/passwd [a\-zA\-Z0\-9]*, /usr/bin/chsh [a\-zA\-Z0\-9]*,\e
/usr/bin/chfn [a\-zA\-Z0\-9]*, !/usr/bin/* root
.RE
.fi
.PP

View File

@ -25,7 +25,7 @@
.nr BA @BAMAN@
.nr LC @LCMAN@
.nr PS @PSMAN@
.Dd February 14, 2025
.Dd February 22, 2025
.Dt SUDOERS @mansectform@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
@ -190,7 +190,7 @@ when
requires
authentication, it validates the invoking user's credentials, not
the target user's (or
.Sy @runas_default@ Ns No 's)
.Sy @runas_default@ Ns No 's )
credentials.
This can be changed via
the
@ -656,16 +656,16 @@ Resource limits may also be set in the
.Em sudoers
file itself, in which case they override those set by the system.
See the
.Em rlimit_as,
.Em rlimit_core,
.Em rlimit_cpu,
.Em rlimit_data,
.Em rlimit_fsize,
.Em rlimit_locks,
.Em rlimit_memlock,
.Em rlimit_nofile,
.Em rlimit_nproc,
.Em rlimit_rss,
.Em rlimit_as ,
.Em rlimit_core ,
.Em rlimit_cpu ,
.Em rlimit_data ,
.Em rlimit_fsize ,
.Em rlimit_locks ,
.Em rlimit_memlock ,
.Em rlimit_nofile ,
.Em rlimit_nproc ,
.Em rlimit_rss ,
.Em rlimit_stack
options described below.
Resource limits in
@ -779,7 +779,7 @@ Cmnd_Alias ::= NAME
Cmnd_Alias_Spec ::= Cmnd_Alias '=' Cmnd_List
NAME ::= [A-Z]([A-Z][0-9]_)*
NAME ::= [A\(enZ]([A\(enZ][0\(en9]_)*
.Ed
.Pp
Each
@ -993,8 +993,8 @@ Also, the host name
will only match if that is the actual host name, which is usually
only the case for non-networked systems.
.Bd -literal
digest ::= [A-Fa-f0-9]+ |
[A-Za-z0-9\e+/=]+
digest ::= [A\(enFa\(enf0\(en9]+ |
[A\(enZa\(enz0\(en9\e+/=]+
Digest_Spec ::= "sha224" ':' digest |
"sha256" ':' digest |
@ -1177,13 +1177,13 @@ format such as openssl, shasum, sha224sum, sha256sum, sha384sum, sha512sum.
.Pp
For example, using openssl:
.Bd -literal
$ openssl dgst -sha224 /bin/ls
$ openssl dgst \-sha224 /bin/ls
SHA224(/bin/ls)= 118187da8364d490b4a7debbf483004e8f3e053ec954309de2c41a25
.Ed
.Pp
It is also possible to use openssl to generate base64 output:
.Bd -literal
$ openssl dgst -binary -sha224 /bin/ls | openssl base64
$ openssl dgst \-binary \-sha224 /bin/ls | openssl base64
EYGH2oNk1JC0p9679IMATo8+BT7JVDCd4sQaJQ==
.Ed
.Pp
@ -1455,7 +1455,7 @@ only as
.Sy operator .
For example:
.Bd -literal
$ sudo -u operator /bin/ls
$ sudo \-u operator /bin/ls
.Ed
.Pp
It is also possible to override a
@ -1501,9 +1501,9 @@ will run with the group listed in the target user's password database
entry.
The following would all be permitted by the sudoers entry above:
.Bd -literal
$ sudo -u operator /bin/ls
$ sudo -u operator -g operator /bin/ls
$ sudo -g operator /bin/ls
$ sudo \-u operator /bin/ls
$ sudo \-u operator \-g operator /bin/ls
$ sudo \-g operator /bin/ls
.Ed
.Pp
In the following example, user
@ -1519,7 +1519,7 @@ In this example only the group will be set, the command still runs as user
.Sy tcm .
For example:
.Bd -literal
$ sudo -g dialer /usr/bin/cu
$ sudo \-g dialer /usr/bin/cu
.Ed
.Pp
Multiple users and groups may be present in a
@ -1652,7 +1652,7 @@ The
command can be used to list all privileges known to the system.
For example:
.Bd -literal
$ ppriv -l
$ ppriv \-l
.Ed
.Pp
In addition, there are several
@ -1696,7 +1696,7 @@ It is also possible to specify a timezone offset from UTC in hours
and minutes instead of a
.Ql Z .
For example,
.Ql -0500
.Ql \-0500
would correspond to Eastern Standard time in the US.
As an extension, if no
.Ql Z
@ -1983,10 +1983,10 @@ By default, if the
.Dv NOPASSWD
tag is applied to any of a user's entries for the current host,
the user will be able to run
.Ql sudo -l
.Ql sudo \-l
without a password.
Additionally, a user may only run
.Ql sudo -v
.Ql sudo \-v
without a password if all of the user's entries for the current
host have the
.Dv NOPASSWD
@ -2224,7 +2224,7 @@ on any host but is not allowed to change
password.
This kind of rule is impossible to express safely using wildcards.
.Bd -literal -offset 4n
john ALL = /usr/bin/passwd ^[a-zA-Z0-9_]+$,\e
john ALL = /usr/bin/passwd ^[a\-zA\-Z0\-9_]+$,\e
!/usr/bin/passwd root
.Ed
.Pp
@ -4038,7 +4038,7 @@ if one exists.
Only available if
.Nm sudo
is configured with the
.Li --with-logincap
.Li \-\-with-logincap
option.
This flag is
.Em off
@ -4142,7 +4142,7 @@ by default.
Before it executes a command,
.Nm sudo
will close all open file descriptors other than standard input,
standard output, and standard error (file descriptors 0-2).
standard output, and standard error (file descriptors 0\(en2).
The
.Em closefrom
option can be used to specify a different file descriptor at which
@ -4246,9 +4246,9 @@ Set this to 0 to always prompt for a password.
If set to a value less than 0 the user's time stamp will not expire
until the system is rebooted.
This can be used to allow users to create or delete their own time stamps via
.Ql sudo -v
.Ql sudo \-v
and
.Ql sudo -k
.Ql sudo \-k
respectively.
.It umask
File mode creation mask to use when running the command.
@ -4872,7 +4872,7 @@ groups runs
Only available if
.Nm sudo
is configured with the
.Li --enable-admin-flag
.Li \-\-enable-admin-flag
option.
The default value is
.Pa ~/.sudo_as_admin_successful .
@ -5488,7 +5488,7 @@ single value without double-quotes.
The list can be replaced, added to, deleted from, or disabled by using the
.Ql = ,
.Ql += ,
.Ql -= ,
.Ql \-= ,
and
.Ql \&!
operators respectively.
@ -5514,7 +5514,7 @@ single value without double-quotes.
The list can be replaced, added to, deleted from, or disabled by using the
.Ql = ,
.Ql += ,
.Ql -= ,
.Ql \-= ,
and
.Ql \&!
operators respectively.
@ -6113,7 +6113,7 @@ This means that the
.Ql echo done
statement is never executed.
.Bd -literal -offset 4n
$ sh -s < test.sh
$ sh \-s < test.sh
testing
.Ed
.Pp
@ -6172,7 +6172,7 @@ flag or the
command tag will enable
.Em log_stdout
and
.Em log_stderr.
.Em log_stderr .
Careful ordering of rules may be necessary to achieve the results
that you expect.
.Ss I/O log format
@ -6296,7 +6296,7 @@ No post-processing is performed.
For manual viewing, you may wish to convert carriage return characters
in the log to line feeds.
For example:
.Ql gunzip -c ttyin | tr \&"\er\&" \&"\en\&"
.Ql gunzip \-c ttyin | tr \&"\er\&" \&"\en\&"
.It Pa stdin
The standard input when no terminal is present, or input redirected from
a pipe or file.
@ -6595,7 +6595,7 @@ may only
.Xr su 1
to operator.
.Bd -literal
pete HPPA = /usr/bin/passwd [A-Za-z]*, !/usr/bin/passwd *root*
pete HPPA = /usr/bin/passwd [A\-Za\-z]*, !/usr/bin/passwd *root*
%opers ALL = (: ADMINGRP) /usr/sbin/
.Ed
@ -6637,7 +6637,7 @@ options to
may be specified after the user argument.
As a result, this rule will also allow:
.Bd -literal -offset 4n
passwd username --expire
passwd username \-\-expire
.Ed
.Pp
which may not be desirable.
@ -6698,7 +6698,7 @@ or
.Pc
without giving a password.
.Bd -literal
john ALPHA = /usr/bin/su [!-]*, !/usr/bin/su *root*
john ALPHA = /usr/bin/su [!\-]*, !/usr/bin/su *root*
.Ed
.Pp
On the
@ -6773,7 +6773,7 @@ web pages) or simply
to www.
.Bd -literal
ALL CDROM = NOPASSWD: /sbin/umount /CDROM,\e
/sbin/mount -o nosuid\e,nodev /dev/cd0a /CDROM
/sbin/mount \-o nosuid\e,nodev /dev/cd0a /CDROM
.Ed
.Pp
Any user may mount or unmount a CD-ROM on the machines in the CDROM
@ -6831,8 +6831,8 @@ For example, given the following
.Em sudoers
file entry:
.Bd -literal
john ALL = /usr/bin/passwd [a-zA-Z0-9]*, /usr/bin/chsh [a-zA-Z0-9]*,\e
/usr/bin/chfn [a-zA-Z0-9]*, !/usr/bin/* root
john ALL = /usr/bin/passwd [a\-zA\-Z0\-9]*, /usr/bin/chsh [a\-zA\-Z0\-9]*,\e
/usr/bin/chfn [a\-zA\-Z0\-9]*, !/usr/bin/* root
.Ed
.Pp
User