mirror of
https://github.com/sudo-project/sudo.git
synced 2025-08-22 01:49:11 +00:00
Regenerate man format manuals
This commit is contained in:
parent
b876e3bbf3
commit
9c98d0f4a5
@ -1391,7 +1391,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -255,7 +255,7 @@ The following plugin-agnostic paths may be set in the
|
||||
file:
|
||||
.TP 6n
|
||||
askpass
|
||||
The fully qualified path to a helper program used to read the user's
|
||||
The fully-qualified path to a helper program used to read the user's
|
||||
password when no terminal is available.
|
||||
This may be the case when
|
||||
\fBsudo\fR
|
||||
@ -294,7 +294,7 @@ BSD,
|
||||
macOS and Solaris.
|
||||
.TP 6n
|
||||
intercept
|
||||
The path to a shared library containing a wrappers for the
|
||||
The path to a shared library containing wrappers for the
|
||||
execve(2),
|
||||
execl(3),
|
||||
execle(3),
|
||||
@ -372,7 +372,7 @@ The default value is
|
||||
.TP 6n
|
||||
plugin_dir
|
||||
The default directory to use when searching for plugins
|
||||
that are specified without a fully qualified path name.
|
||||
that are specified without a fully-qualified path name.
|
||||
The default value is
|
||||
\fI@plugindir@\fR.
|
||||
.if \n(SL \{\
|
||||
@ -803,11 +803,11 @@ front-end configuration
|
||||
# Sudo command interception:
|
||||
# Path intercept /path/to/sudo_intercept.so
|
||||
#
|
||||
# Path to a shared library containing replacements for the execv()
|
||||
# and execve() library functions that perform a policy check to verify
|
||||
# the command is allowed and simply return an error if not. This is
|
||||
# used to implement the "intercept" functionality on systems that
|
||||
# support LD_PRELOAD or its equivalent.
|
||||
# Path to a shared library containing replacements for the execv(),
|
||||
# execve() and fexecve() library functions, which perform a policy
|
||||
# check to verify whether the command is allowed and simply return
|
||||
# an error if it is not. This is used to implement the "intercept"
|
||||
# functionality on systems that support LD_PRELOAD or its equivalent.
|
||||
#
|
||||
# The compiled-in value is usually sufficient and should only be changed
|
||||
# if you rename or move the sudo_intercept.so file.
|
||||
@ -833,7 +833,7 @@ front-end configuration
|
||||
# Path plugin_dir /path/to/plugins
|
||||
#
|
||||
# The default directory to use when searching for plugins that are
|
||||
# specified without a fully qualified path name.
|
||||
# specified without a fully-qualified path name.
|
||||
#
|
||||
#Path plugin_dir @plugindir@
|
||||
|
||||
@ -921,7 +921,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -1783,7 +1783,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -290,7 +290,7 @@ was previously interrupted.
|
||||
It contains the following members:
|
||||
.TP 8n
|
||||
log_id
|
||||
The the server-side name for an I/O log that was previously
|
||||
The server-side name for an I/O log that was previously
|
||||
sent to the client by the server.
|
||||
This may be a path name on the server or some other kind of server-side
|
||||
identifier.
|
||||
@ -876,7 +876,7 @@ sudo(8),
|
||||
sudo_logsrvd(8)
|
||||
.PP
|
||||
\fIProtocol Buffers\fR,
|
||||
https://developers.google.com/protocol-buffers/.
|
||||
https://protobuf.dev/.
|
||||
.SH "AUTHORS"
|
||||
Many people have worked on
|
||||
\fBsudo\fR
|
||||
@ -902,7 +902,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -1148,7 +1148,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -471,7 +471,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -5518,7 +5518,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -1880,7 +1880,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -196,7 +196,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -170,7 +170,7 @@ option (or as
|
||||
It may take command line arguments just as a normal command does.
|
||||
Unlike other commands,
|
||||
\(lqsudoedit\(rq
|
||||
is a built into
|
||||
is built into
|
||||
\fBsudo\fR
|
||||
itself and must be specified in without a leading path.
|
||||
.sp
|
||||
@ -420,7 +420,7 @@ The query will match
|
||||
\fInisNetgroupTriple\fR
|
||||
entries with either the short or long form of the host name or
|
||||
no host name specified in the tuple.
|
||||
If the NIS domain is set, the query will match only match entries
|
||||
If the NIS domain is set, the query will only match entries
|
||||
that include the domain or for which there is no domain present.
|
||||
If the NIS domain is
|
||||
\fInot\fR
|
||||
@ -1796,7 +1796,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -8138,7 +8138,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -316,7 +316,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -526,7 +526,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
@ -539,7 +539,7 @@ sudo-workers mailing list,
|
||||
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
|
||||
or <sudo@sudo.ws> (private).
|
||||
.PP
|
||||
Please not report security vulnerabilities through public GitHub
|
||||
Please do not report security vulnerabilities through public GitHub
|
||||
issues, Bugzilla or mailing lists.
|
||||
Instead, report them via email to <Todd.Miller@sudo.ws>.
|
||||
You may encrypt your message with PGP if you would like, using
|
||||
|
Loading…
x
Reference in New Issue
Block a user