2
0
mirror of https://github.com/sudo-project/sudo.git synced 2025-08-22 09:57:41 +00:00

Regenerate man format manuals

This commit is contained in:
Todd C. Miller 2025-04-28 12:26:52 -06:00
parent b876e3bbf3
commit 9c98d0f4a5
14 changed files with 27 additions and 27 deletions

View File

@ -1391,7 +1391,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -255,7 +255,7 @@ The following plugin-agnostic paths may be set in the
file: file:
.TP 6n .TP 6n
askpass askpass
The fully qualified path to a helper program used to read the user's The fully-qualified path to a helper program used to read the user's
password when no terminal is available. password when no terminal is available.
This may be the case when This may be the case when
\fBsudo\fR \fBsudo\fR
@ -294,7 +294,7 @@ BSD,
macOS and Solaris. macOS and Solaris.
.TP 6n .TP 6n
intercept intercept
The path to a shared library containing a wrappers for the The path to a shared library containing wrappers for the
execve(2), execve(2),
execl(3), execl(3),
execle(3), execle(3),
@ -372,7 +372,7 @@ The default value is
.TP 6n .TP 6n
plugin_dir plugin_dir
The default directory to use when searching for plugins The default directory to use when searching for plugins
that are specified without a fully qualified path name. that are specified without a fully-qualified path name.
The default value is The default value is
\fI@plugindir@\fR. \fI@plugindir@\fR.
.if \n(SL \{\ .if \n(SL \{\
@ -803,11 +803,11 @@ front-end configuration
# Sudo command interception: # Sudo command interception:
# Path intercept /path/to/sudo_intercept.so # Path intercept /path/to/sudo_intercept.so
# #
# Path to a shared library containing replacements for the execv() # Path to a shared library containing replacements for the execv(),
# and execve() library functions that perform a policy check to verify # execve() and fexecve() library functions, which perform a policy
# the command is allowed and simply return an error if not. This is # check to verify whether the command is allowed and simply return
# used to implement the "intercept" functionality on systems that # an error if it is not. This is used to implement the "intercept"
# support LD_PRELOAD or its equivalent. # functionality on systems that support LD_PRELOAD or its equivalent.
# #
# The compiled-in value is usually sufficient and should only be changed # The compiled-in value is usually sufficient and should only be changed
# if you rename or move the sudo_intercept.so file. # if you rename or move the sudo_intercept.so file.
@ -833,7 +833,7 @@ front-end configuration
# Path plugin_dir /path/to/plugins # Path plugin_dir /path/to/plugins
# #
# The default directory to use when searching for plugins that are # The default directory to use when searching for plugins that are
# specified without a fully qualified path name. # specified without a fully-qualified path name.
# #
#Path plugin_dir @plugindir@ #Path plugin_dir @plugindir@
@ -921,7 +921,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -1783,7 +1783,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -290,7 +290,7 @@ was previously interrupted.
It contains the following members: It contains the following members:
.TP 8n .TP 8n
log_id log_id
The the server-side name for an I/O log that was previously The server-side name for an I/O log that was previously
sent to the client by the server. sent to the client by the server.
This may be a path name on the server or some other kind of server-side This may be a path name on the server or some other kind of server-side
identifier. identifier.
@ -876,7 +876,7 @@ sudo(8),
sudo_logsrvd(8) sudo_logsrvd(8)
.PP .PP
\fIProtocol Buffers\fR, \fIProtocol Buffers\fR,
https://developers.google.com/protocol-buffers/. https://protobuf.dev/.
.SH "AUTHORS" .SH "AUTHORS"
Many people have worked on Many people have worked on
\fBsudo\fR \fBsudo\fR
@ -902,7 +902,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -1148,7 +1148,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -471,7 +471,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -5518,7 +5518,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -1880,7 +1880,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -196,7 +196,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -170,7 +170,7 @@ option (or as
It may take command line arguments just as a normal command does. It may take command line arguments just as a normal command does.
Unlike other commands, Unlike other commands,
\(lqsudoedit\(rq \(lqsudoedit\(rq
is a built into is built into
\fBsudo\fR \fBsudo\fR
itself and must be specified in without a leading path. itself and must be specified in without a leading path.
.sp .sp
@ -420,7 +420,7 @@ The query will match
\fInisNetgroupTriple\fR \fInisNetgroupTriple\fR
entries with either the short or long form of the host name or entries with either the short or long form of the host name or
no host name specified in the tuple. no host name specified in the tuple.
If the NIS domain is set, the query will match only match entries If the NIS domain is set, the query will only match entries
that include the domain or for which there is no domain present. that include the domain or for which there is no domain present.
If the NIS domain is If the NIS domain is
\fInot\fR \fInot\fR
@ -1796,7 +1796,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -8138,7 +8138,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -316,7 +316,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -526,7 +526,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using

View File

@ -539,7 +539,7 @@ sudo-workers mailing list,
https://www.sudo.ws/mailman/listinfo/sudo-workers (public) https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
or <sudo@sudo.ws> (private). or <sudo@sudo.ws> (private).
.PP .PP
Please not report security vulnerabilities through public GitHub Please do not report security vulnerabilities through public GitHub
issues, Bugzilla or mailing lists. issues, Bugzilla or mailing lists.
Instead, report them via email to <Todd.Miller@sudo.ws>. Instead, report them via email to <Todd.Miller@sudo.ws>.
You may encrypt your message with PGP if you would like, using You may encrypt your message with PGP if you would like, using